Hay
Date
April 20, 2025, 11:09 p.m.

Environment
qemu-x86_64
rk3399-rock-pi-4b

[   13.556537] ==================================================================
[   13.557001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.557823] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.558491] 
[   13.558734] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.558916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.558932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.558952] Call Trace:
[   13.558966]  <TASK>
[   13.558983]  dump_stack_lvl+0x73/0xb0
[   13.559010]  print_report+0xd1/0x650
[   13.559032]  ? __virt_addr_valid+0x1db/0x2d0
[   13.559053]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.559078]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.559100]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.559138]  kasan_report+0x141/0x180
[   13.559160]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.559191]  kasan_check_range+0x10c/0x1c0
[   13.559214]  __kasan_check_write+0x18/0x20
[   13.559234]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.559260]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.559286]  ? kasan_save_alloc_info+0x3b/0x50
[   13.559306]  ? kasan_save_stack+0x45/0x70
[   13.559341]  kasan_bitops_generic+0x116/0x1c0
[   13.559363]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.559384]  ? __pfx_read_tsc+0x10/0x10
[   13.559404]  ? ktime_get_ts64+0x86/0x230
[   13.559428]  kunit_try_run_case+0x1a5/0x480
[   13.559453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.559475]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.559499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.559523]  ? __kthread_parkme+0x82/0x180
[   13.559546]  ? preempt_count_sub+0x50/0x80
[   13.559570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.559594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.559615]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.559638]  kthread+0x337/0x6f0
[   13.559658]  ? trace_preempt_on+0x20/0xc0
[   13.559679]  ? __pfx_kthread+0x10/0x10
[   13.559701]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.559723]  ? calculate_sigpending+0x7b/0xa0
[   13.559744]  ? __pfx_kthread+0x10/0x10
[   13.559765]  ret_from_fork+0x41/0x80
[   13.559785]  ? __pfx_kthread+0x10/0x10
[   13.559806]  ret_from_fork_asm+0x1a/0x30
[   13.559837]  </TASK>
[   13.559847] 
[   13.571337] Allocated by task 281:
[   13.571644]  kasan_save_stack+0x45/0x70
[   13.571836]  kasan_save_track+0x18/0x40
[   13.572007]  kasan_save_alloc_info+0x3b/0x50
[   13.572539]  __kasan_kmalloc+0xb7/0xc0
[   13.572802]  __kmalloc_cache_noprof+0x189/0x420
[   13.573241]  kasan_bitops_generic+0x92/0x1c0
[   13.573469]  kunit_try_run_case+0x1a5/0x480
[   13.573652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.573875]  kthread+0x337/0x6f0
[   13.574025]  ret_from_fork+0x41/0x80
[   13.574541]  ret_from_fork_asm+0x1a/0x30
[   13.574787] 
[   13.575015] The buggy address belongs to the object at ffff8881023f8300
[   13.575015]  which belongs to the cache kmalloc-16 of size 16
[   13.575792] The buggy address is located 8 bytes inside of
[   13.575792]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.576562] 
[   13.576675] The buggy address belongs to the physical page:
[   13.577059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.577517] flags: 0x200000000000000(node=0|zone=2)
[   13.577738] page_type: f5(slab)
[   13.577896] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.578438] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.579011] page dumped because: kasan: bad access detected
[   13.579424] 
[   13.579521] Memory state around the buggy address:
[   13.579728]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.580021]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.580665] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.580985]                       ^
[   13.581356]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.581791]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.582305] ==================================================================
[   13.511658] ==================================================================
[   13.512251] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.512699] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.513291] 
[   13.513401] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.513560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.513575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.513603] Call Trace:
[   13.513616]  <TASK>
[   13.513630]  dump_stack_lvl+0x73/0xb0
[   13.513657]  print_report+0xd1/0x650
[   13.513680]  ? __virt_addr_valid+0x1db/0x2d0
[   13.513702]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.513727]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.513749]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.513779]  kasan_report+0x141/0x180
[   13.513802]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.513833]  kasan_check_range+0x10c/0x1c0
[   13.513856]  __kasan_check_write+0x18/0x20
[   13.513875]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.513900]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.513926]  ? kasan_save_alloc_info+0x3b/0x50
[   13.513946]  ? kasan_save_stack+0x45/0x70
[   13.513971]  kasan_bitops_generic+0x116/0x1c0
[   13.513991]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.514011]  ? __pfx_read_tsc+0x10/0x10
[   13.514031]  ? ktime_get_ts64+0x86/0x230
[   13.514055]  kunit_try_run_case+0x1a5/0x480
[   13.514079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.514100]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.514146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.514170]  ? __kthread_parkme+0x82/0x180
[   13.514191]  ? preempt_count_sub+0x50/0x80
[   13.514228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.514250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.514273]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.514305]  kthread+0x337/0x6f0
[   13.514333]  ? trace_preempt_on+0x20/0xc0
[   13.514356]  ? __pfx_kthread+0x10/0x10
[   13.514377]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.514398]  ? calculate_sigpending+0x7b/0xa0
[   13.514421]  ? __pfx_kthread+0x10/0x10
[   13.514442]  ret_from_fork+0x41/0x80
[   13.514463]  ? __pfx_kthread+0x10/0x10
[   13.514484]  ret_from_fork_asm+0x1a/0x30
[   13.514515]  </TASK>
[   13.514525] 
[   13.522634] Allocated by task 281:
[   13.522807]  kasan_save_stack+0x45/0x70
[   13.523002]  kasan_save_track+0x18/0x40
[   13.524157]  kasan_save_alloc_info+0x3b/0x50
[   13.524377]  __kasan_kmalloc+0xb7/0xc0
[   13.524593]  __kmalloc_cache_noprof+0x189/0x420
[   13.524795]  kasan_bitops_generic+0x92/0x1c0
[   13.525002]  kunit_try_run_case+0x1a5/0x480
[   13.525215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.525487]  kthread+0x337/0x6f0
[   13.525682]  ret_from_fork+0x41/0x80
[   13.525871]  ret_from_fork_asm+0x1a/0x30
[   13.526087] 
[   13.526187] The buggy address belongs to the object at ffff8881023f8300
[   13.526187]  which belongs to the cache kmalloc-16 of size 16
[   13.526739] The buggy address is located 8 bytes inside of
[   13.526739]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.527285] 
[   13.527435] The buggy address belongs to the physical page:
[   13.527648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.528021] flags: 0x200000000000000(node=0|zone=2)
[   13.528288] page_type: f5(slab)
[   13.528510] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.528921] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.529267] page dumped because: kasan: bad access detected
[   13.529591] 
[   13.529662] Memory state around the buggy address:
[   13.529892]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.530193]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.530669] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.530957]                       ^
[   13.531095]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.531530]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.531806] ==================================================================
[   13.630679] ==================================================================
[   13.630992] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.631511] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.631836] 
[   13.631952] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.631995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.632007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.632026] Call Trace:
[   13.632037]  <TASK>
[   13.632050]  dump_stack_lvl+0x73/0xb0
[   13.632073]  print_report+0xd1/0x650
[   13.632095]  ? __virt_addr_valid+0x1db/0x2d0
[   13.632116]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.632151]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.632174]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.632200]  kasan_report+0x141/0x180
[   13.632223]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.632265]  kasan_check_range+0x10c/0x1c0
[   13.632289]  __kasan_check_write+0x18/0x20
[   13.632308]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.632355]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.632381]  ? kasan_save_alloc_info+0x3b/0x50
[   13.632401]  ? kasan_save_stack+0x45/0x70
[   13.632434]  kasan_bitops_generic+0x116/0x1c0
[   13.632455]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.632475]  ? __pfx_read_tsc+0x10/0x10
[   13.632495]  ? ktime_get_ts64+0x86/0x230
[   13.632528]  kunit_try_run_case+0x1a5/0x480
[   13.632551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.632572]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.632595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.632618]  ? __kthread_parkme+0x82/0x180
[   13.632638]  ? preempt_count_sub+0x50/0x80
[   13.632662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.632685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.632716]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.632738]  kthread+0x337/0x6f0
[   13.632759]  ? trace_preempt_on+0x20/0xc0
[   13.632791]  ? __pfx_kthread+0x10/0x10
[   13.632813]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.632834]  ? calculate_sigpending+0x7b/0xa0
[   13.632863]  ? __pfx_kthread+0x10/0x10
[   13.632884]  ret_from_fork+0x41/0x80
[   13.632904]  ? __pfx_kthread+0x10/0x10
[   13.632936]  ret_from_fork_asm+0x1a/0x30
[   13.632966]  </TASK>
[   13.632976] 
[   13.645657] Allocated by task 281:
[   13.645859]  kasan_save_stack+0x45/0x70
[   13.646053]  kasan_save_track+0x18/0x40
[   13.646666]  kasan_save_alloc_info+0x3b/0x50
[   13.647048]  __kasan_kmalloc+0xb7/0xc0
[   13.647282]  __kmalloc_cache_noprof+0x189/0x420
[   13.647625]  kasan_bitops_generic+0x92/0x1c0
[   13.647813]  kunit_try_run_case+0x1a5/0x480
[   13.648165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.648452]  kthread+0x337/0x6f0
[   13.648749]  ret_from_fork+0x41/0x80
[   13.648956]  ret_from_fork_asm+0x1a/0x30
[   13.649375] 
[   13.649477] The buggy address belongs to the object at ffff8881023f8300
[   13.649477]  which belongs to the cache kmalloc-16 of size 16
[   13.650171] The buggy address is located 8 bytes inside of
[   13.650171]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.650778] 
[   13.651004] The buggy address belongs to the physical page:
[   13.651264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.651901] flags: 0x200000000000000(node=0|zone=2)
[   13.652130] page_type: f5(slab)
[   13.652279] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.652699] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.653117] page dumped because: kasan: bad access detected
[   13.653543] 
[   13.653658] Memory state around the buggy address:
[   13.653993]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.654476]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.654785] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.655079]                       ^
[   13.655486]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.655840]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.656213] ==================================================================
[   13.682871] ==================================================================
[   13.683716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.684207] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.684729] 
[   13.684830] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.684873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.684885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.684906] Call Trace:
[   13.684921]  <TASK>
[   13.684936]  dump_stack_lvl+0x73/0xb0
[   13.684960]  print_report+0xd1/0x650
[   13.684982]  ? __virt_addr_valid+0x1db/0x2d0
[   13.685002]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.685027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.685049]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.685075]  kasan_report+0x141/0x180
[   13.685097]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.685262]  kasan_check_range+0x10c/0x1c0
[   13.685296]  __kasan_check_write+0x18/0x20
[   13.685318]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.685357]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.685383]  ? kasan_save_alloc_info+0x3b/0x50
[   13.685437]  ? kasan_save_stack+0x45/0x70
[   13.685463]  kasan_bitops_generic+0x116/0x1c0
[   13.685483]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.685505]  ? __pfx_read_tsc+0x10/0x10
[   13.685523]  ? ktime_get_ts64+0x86/0x230
[   13.685549]  kunit_try_run_case+0x1a5/0x480
[   13.685574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.685596]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.685620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.685644]  ? __kthread_parkme+0x82/0x180
[   13.685665]  ? preempt_count_sub+0x50/0x80
[   13.685689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.685711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.685733]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.685756]  kthread+0x337/0x6f0
[   13.685782]  ? trace_preempt_on+0x20/0xc0
[   13.685804]  ? __pfx_kthread+0x10/0x10
[   13.685826]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.685848]  ? calculate_sigpending+0x7b/0xa0
[   13.685868]  ? __pfx_kthread+0x10/0x10
[   13.685891]  ret_from_fork+0x41/0x80
[   13.685912]  ? __pfx_kthread+0x10/0x10
[   13.685933]  ret_from_fork_asm+0x1a/0x30
[   13.685964]  </TASK>
[   13.685975] 
[   13.697351] Allocated by task 281:
[   13.697626]  kasan_save_stack+0x45/0x70
[   13.698027]  kasan_save_track+0x18/0x40
[   13.698316]  kasan_save_alloc_info+0x3b/0x50
[   13.698686]  __kasan_kmalloc+0xb7/0xc0
[   13.698877]  __kmalloc_cache_noprof+0x189/0x420
[   13.699078]  kasan_bitops_generic+0x92/0x1c0
[   13.699704]  kunit_try_run_case+0x1a5/0x480
[   13.699961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.700414]  kthread+0x337/0x6f0
[   13.700703]  ret_from_fork+0x41/0x80
[   13.700996]  ret_from_fork_asm+0x1a/0x30
[   13.701344] 
[   13.701438] The buggy address belongs to the object at ffff8881023f8300
[   13.701438]  which belongs to the cache kmalloc-16 of size 16
[   13.701925] The buggy address is located 8 bytes inside of
[   13.701925]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.702715] 
[   13.702934] The buggy address belongs to the physical page:
[   13.703426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.703880] flags: 0x200000000000000(node=0|zone=2)
[   13.704240] page_type: f5(slab)
[   13.704412] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.704726] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.705030] page dumped because: kasan: bad access detected
[   13.705632] 
[   13.705865] Memory state around the buggy address:
[   13.706369]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.706807]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.707321] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.707826]                       ^
[   13.708001]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.708678]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.709155] ==================================================================
[   13.657348] ==================================================================
[   13.657653] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.658261] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.658565] 
[   13.658689] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.658749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.658761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.658781] Call Trace:
[   13.658794]  <TASK>
[   13.658811]  dump_stack_lvl+0x73/0xb0
[   13.658835]  print_report+0xd1/0x650
[   13.658857]  ? __virt_addr_valid+0x1db/0x2d0
[   13.658878]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.658903]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.658944]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.658970]  kasan_report+0x141/0x180
[   13.658993]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.659023]  kasan_check_range+0x10c/0x1c0
[   13.659048]  __kasan_check_write+0x18/0x20
[   13.659068]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.659094]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.659121]  ? kasan_save_alloc_info+0x3b/0x50
[   13.659152]  ? kasan_save_stack+0x45/0x70
[   13.659177]  kasan_bitops_generic+0x116/0x1c0
[   13.659215]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.659236]  ? __pfx_read_tsc+0x10/0x10
[   13.659255]  ? ktime_get_ts64+0x86/0x230
[   13.659279]  kunit_try_run_case+0x1a5/0x480
[   13.659303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.659335]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.659357]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.659381]  ? __kthread_parkme+0x82/0x180
[   13.659402]  ? preempt_count_sub+0x50/0x80
[   13.659426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.659450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.659472]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.659494]  kthread+0x337/0x6f0
[   13.659514]  ? trace_preempt_on+0x20/0xc0
[   13.659537]  ? __pfx_kthread+0x10/0x10
[   13.659558]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.659579]  ? calculate_sigpending+0x7b/0xa0
[   13.659600]  ? __pfx_kthread+0x10/0x10
[   13.659622]  ret_from_fork+0x41/0x80
[   13.659641]  ? __pfx_kthread+0x10/0x10
[   13.659663]  ret_from_fork_asm+0x1a/0x30
[   13.659693]  </TASK>
[   13.659705] 
[   13.669964] Allocated by task 281:
[   13.670416]  kasan_save_stack+0x45/0x70
[   13.670706]  kasan_save_track+0x18/0x40
[   13.670945]  kasan_save_alloc_info+0x3b/0x50
[   13.671288]  __kasan_kmalloc+0xb7/0xc0
[   13.671489]  __kmalloc_cache_noprof+0x189/0x420
[   13.671700]  kasan_bitops_generic+0x92/0x1c0
[   13.671895]  kunit_try_run_case+0x1a5/0x480
[   13.672090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.672644]  kthread+0x337/0x6f0
[   13.672942]  ret_from_fork+0x41/0x80
[   13.673397]  ret_from_fork_asm+0x1a/0x30
[   13.673647] 
[   13.673904] The buggy address belongs to the object at ffff8881023f8300
[   13.673904]  which belongs to the cache kmalloc-16 of size 16
[   13.674872] The buggy address is located 8 bytes inside of
[   13.674872]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.675790] 
[   13.675895] The buggy address belongs to the physical page:
[   13.676502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.676839] flags: 0x200000000000000(node=0|zone=2)
[   13.677049] page_type: f5(slab)
[   13.677529] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.677962] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.678492] page dumped because: kasan: bad access detected
[   13.678910] 
[   13.679156] Memory state around the buggy address:
[   13.679404]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.679696]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.679978] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.680577]                       ^
[   13.680882]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.681413]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.682029] ==================================================================
[   13.532399] ==================================================================
[   13.532754] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.533095] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.533752] 
[   13.533934] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.533996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.534007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.534087] Call Trace:
[   13.534102]  <TASK>
[   13.534115]  dump_stack_lvl+0x73/0xb0
[   13.534179]  print_report+0xd1/0x650
[   13.534201]  ? __virt_addr_valid+0x1db/0x2d0
[   13.534222]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.534247]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.534271]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.534297]  kasan_report+0x141/0x180
[   13.534321]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.534361]  kasan_check_range+0x10c/0x1c0
[   13.534385]  __kasan_check_write+0x18/0x20
[   13.534406]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.534431]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.534458]  ? kasan_save_alloc_info+0x3b/0x50
[   13.534478]  ? kasan_save_stack+0x45/0x70
[   13.534503]  kasan_bitops_generic+0x116/0x1c0
[   13.534552]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.534574]  ? __pfx_read_tsc+0x10/0x10
[   13.534592]  ? ktime_get_ts64+0x86/0x230
[   13.534626]  kunit_try_run_case+0x1a5/0x480
[   13.534649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.534696]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.534719]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.534744]  ? __kthread_parkme+0x82/0x180
[   13.534774]  ? preempt_count_sub+0x50/0x80
[   13.534799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.534821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.534843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.534865]  kthread+0x337/0x6f0
[   13.534886]  ? trace_preempt_on+0x20/0xc0
[   13.534909]  ? __pfx_kthread+0x10/0x10
[   13.534930]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.534951]  ? calculate_sigpending+0x7b/0xa0
[   13.534972]  ? __pfx_kthread+0x10/0x10
[   13.534993]  ret_from_fork+0x41/0x80
[   13.535014]  ? __pfx_kthread+0x10/0x10
[   13.535034]  ret_from_fork_asm+0x1a/0x30
[   13.535065]  </TASK>
[   13.535075] 
[   13.544500] Allocated by task 281:
[   13.544721]  kasan_save_stack+0x45/0x70
[   13.544974]  kasan_save_track+0x18/0x40
[   13.545186]  kasan_save_alloc_info+0x3b/0x50
[   13.545404]  __kasan_kmalloc+0xb7/0xc0
[   13.545613]  __kmalloc_cache_noprof+0x189/0x420
[   13.545853]  kasan_bitops_generic+0x92/0x1c0
[   13.546074]  kunit_try_run_case+0x1a5/0x480
[   13.547086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.547312]  kthread+0x337/0x6f0
[   13.547554]  ret_from_fork+0x41/0x80
[   13.547705]  ret_from_fork_asm+0x1a/0x30
[   13.547910] 
[   13.547999] The buggy address belongs to the object at ffff8881023f8300
[   13.547999]  which belongs to the cache kmalloc-16 of size 16
[   13.548976] The buggy address is located 8 bytes inside of
[   13.548976]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.549562] 
[   13.549662] The buggy address belongs to the physical page:
[   13.549913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.550620] flags: 0x200000000000000(node=0|zone=2)
[   13.550832] page_type: f5(slab)
[   13.551174] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.551476] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.551922] page dumped because: kasan: bad access detected
[   13.552369] 
[   13.552462] Memory state around the buggy address:
[   13.552826]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.553289]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.553740] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.554203]                       ^
[   13.554498]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.554962]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.555465] ==================================================================
[   13.583804] ==================================================================
[   13.584123] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.584685] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.585500] 
[   13.585725] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.585791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.585803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.585825] Call Trace:
[   13.585837]  <TASK>
[   13.585857]  dump_stack_lvl+0x73/0xb0
[   13.585884]  print_report+0xd1/0x650
[   13.585907]  ? __virt_addr_valid+0x1db/0x2d0
[   13.585928]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.585954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.585977]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.586002]  kasan_report+0x141/0x180
[   13.586025]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.586056]  kasan_check_range+0x10c/0x1c0
[   13.586080]  __kasan_check_write+0x18/0x20
[   13.586099]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.586157]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.586186]  ? kasan_save_alloc_info+0x3b/0x50
[   13.586205]  ? kasan_save_stack+0x45/0x70
[   13.586230]  kasan_bitops_generic+0x116/0x1c0
[   13.586250]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.586272]  ? __pfx_read_tsc+0x10/0x10
[   13.586291]  ? ktime_get_ts64+0x86/0x230
[   13.586316]  kunit_try_run_case+0x1a5/0x480
[   13.586349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.586370]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.586394]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.586417]  ? __kthread_parkme+0x82/0x180
[   13.586439]  ? preempt_count_sub+0x50/0x80
[   13.586464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.586487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.586509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.586531]  kthread+0x337/0x6f0
[   13.586551]  ? trace_preempt_on+0x20/0xc0
[   13.586574]  ? __pfx_kthread+0x10/0x10
[   13.586596]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.586617]  ? calculate_sigpending+0x7b/0xa0
[   13.586638]  ? __pfx_kthread+0x10/0x10
[   13.586659]  ret_from_fork+0x41/0x80
[   13.586679]  ? __pfx_kthread+0x10/0x10
[   13.586700]  ret_from_fork_asm+0x1a/0x30
[   13.586732]  </TASK>
[   13.586742] 
[   13.597621] Allocated by task 281:
[   13.598063]  kasan_save_stack+0x45/0x70
[   13.598332]  kasan_save_track+0x18/0x40
[   13.598508]  kasan_save_alloc_info+0x3b/0x50
[   13.598696]  __kasan_kmalloc+0xb7/0xc0
[   13.598868]  __kmalloc_cache_noprof+0x189/0x420
[   13.599077]  kasan_bitops_generic+0x92/0x1c0
[   13.599560]  kunit_try_run_case+0x1a5/0x480
[   13.599763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.599998]  kthread+0x337/0x6f0
[   13.600417]  ret_from_fork+0x41/0x80
[   13.600684]  ret_from_fork_asm+0x1a/0x30
[   13.601142] 
[   13.601397] The buggy address belongs to the object at ffff8881023f8300
[   13.601397]  which belongs to the cache kmalloc-16 of size 16
[   13.601969] The buggy address is located 8 bytes inside of
[   13.601969]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.602785] 
[   13.603014] The buggy address belongs to the physical page:
[   13.603384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.603715] flags: 0x200000000000000(node=0|zone=2)
[   13.603930] page_type: f5(slab)
[   13.604085] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.604966] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.605660] page dumped because: kasan: bad access detected
[   13.606091] 
[   13.606534] Memory state around the buggy address:
[   13.606833]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.607474]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.607924] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.608529]                       ^
[   13.608847]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.609543]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.609998] ==================================================================
[   13.611228] ==================================================================
[   13.611489] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.612136] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.612681] 
[   13.612792] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.612838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.612851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.612872] Call Trace:
[   13.612887]  <TASK>
[   13.612901]  dump_stack_lvl+0x73/0xb0
[   13.612925]  print_report+0xd1/0x650
[   13.612948]  ? __virt_addr_valid+0x1db/0x2d0
[   13.612969]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.612994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.613017]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.613043]  kasan_report+0x141/0x180
[   13.613065]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.613096]  kasan_check_range+0x10c/0x1c0
[   13.613120]  __kasan_check_write+0x18/0x20
[   13.613145]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.613171]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.613197]  ? kasan_save_alloc_info+0x3b/0x50
[   13.613218]  ? kasan_save_stack+0x45/0x70
[   13.613243]  kasan_bitops_generic+0x116/0x1c0
[   13.613272]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.613294]  ? __pfx_read_tsc+0x10/0x10
[   13.613313]  ? ktime_get_ts64+0x86/0x230
[   13.613353]  kunit_try_run_case+0x1a5/0x480
[   13.613376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.613397]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.613421]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.613457]  ? __kthread_parkme+0x82/0x180
[   13.613487]  ? preempt_count_sub+0x50/0x80
[   13.613511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.613534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.613575]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.613599]  kthread+0x337/0x6f0
[   13.613618]  ? trace_preempt_on+0x20/0xc0
[   13.613642]  ? __pfx_kthread+0x10/0x10
[   13.613663]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.613685]  ? calculate_sigpending+0x7b/0xa0
[   13.613706]  ? __pfx_kthread+0x10/0x10
[   13.613728]  ret_from_fork+0x41/0x80
[   13.613748]  ? __pfx_kthread+0x10/0x10
[   13.613774]  ret_from_fork_asm+0x1a/0x30
[   13.613805]  </TASK>
[   13.613815] 
[   13.621808] Allocated by task 281:
[   13.622007]  kasan_save_stack+0x45/0x70
[   13.622204]  kasan_save_track+0x18/0x40
[   13.622458]  kasan_save_alloc_info+0x3b/0x50
[   13.622843]  __kasan_kmalloc+0xb7/0xc0
[   13.623026]  __kmalloc_cache_noprof+0x189/0x420
[   13.623178]  kasan_bitops_generic+0x92/0x1c0
[   13.623332]  kunit_try_run_case+0x1a5/0x480
[   13.623494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.623774]  kthread+0x337/0x6f0
[   13.623969]  ret_from_fork+0x41/0x80
[   13.624332]  ret_from_fork_asm+0x1a/0x30
[   13.624530] 
[   13.624612] The buggy address belongs to the object at ffff8881023f8300
[   13.624612]  which belongs to the cache kmalloc-16 of size 16
[   13.624960] The buggy address is located 8 bytes inside of
[   13.624960]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.625441] 
[   13.625533] The buggy address belongs to the physical page:
[   13.625814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.626057] flags: 0x200000000000000(node=0|zone=2)
[   13.626217] page_type: f5(slab)
[   13.626355] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.626697] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.627066] page dumped because: kasan: bad access detected
[   13.627526] 
[   13.627610] Memory state around the buggy address:
[   13.627774]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.628079]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.628552] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.628859]                       ^
[   13.629026]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.629360]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.629657] ==================================================================

[   23.724262] ==================================================================
[   23.724917] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   23.725660] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.726331] 
[   23.726480] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.726513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.726523] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.726533] Call trace:
[   23.726541]  show_stack+0x20/0x38 (C)
[   23.726561]  dump_stack_lvl+0x8c/0xd0
[   23.726579]  print_report+0x118/0x608
[   23.726598]  kasan_report+0xdc/0x128
[   23.726617]  kasan_check_range+0x100/0x1a8
[   23.726637]  __kasan_check_write+0x20/0x30
[   23.726658]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   23.726684]  kasan_bitops_generic+0x110/0x1c8
[   23.726703]  kunit_try_run_case+0x170/0x3f0
[   23.726726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.726751]  kthread+0x328/0x630
[   23.726774]  ret_from_fork+0x10/0x20
[   23.726795] 
[   23.733103] Allocated by task 315:
[   23.733418]  kasan_save_stack+0x3c/0x68
[   23.733778]  kasan_save_track+0x20/0x40
[   23.734136]  kasan_save_alloc_info+0x40/0x58
[   23.734536]  __kasan_kmalloc+0xd4/0xd8
[   23.734886]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.735312]  kasan_bitops_generic+0xa0/0x1c8
[   23.735708]  kunit_try_run_case+0x170/0x3f0
[   23.736101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.736610]  kthread+0x328/0x630
[   23.736920]  ret_from_fork+0x10/0x20
[   23.737258] 
[   23.737404] The buggy address belongs to the object at ffff000001193200
[   23.737404]  which belongs to the cache kmalloc-16 of size 16
[   23.738505] The buggy address is located 8 bytes inside of
[   23.738505]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.739601] 
[   23.739746] The buggy address belongs to the physical page:
[   23.740251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.740958] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.741551] page_type: f5(slab)
[   23.741849] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.742550] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.743246] page dumped because: kasan: bad access detected
[   23.743750] 
[   23.743896] Memory state around the buggy address:
[   23.744333]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.744985]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.745637] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.746286]                       ^
[   23.746610]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.747263]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.747912] ==================================================================
[   23.675690] ==================================================================
[   23.676345] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   23.677089] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.677753] 
[   23.677902] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.677935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.677945] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.677956] Call trace:
[   23.677964]  show_stack+0x20/0x38 (C)
[   23.677984]  dump_stack_lvl+0x8c/0xd0
[   23.678003]  print_report+0x118/0x608
[   23.678022]  kasan_report+0xdc/0x128
[   23.678041]  __asan_report_load8_noabort+0x20/0x30
[   23.678064]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   23.678090]  kasan_bitops_generic+0x110/0x1c8
[   23.678109]  kunit_try_run_case+0x170/0x3f0
[   23.678132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.678158]  kthread+0x328/0x630
[   23.678180]  ret_from_fork+0x10/0x20
[   23.678201] 
[   23.684211] Allocated by task 315:
[   23.684525]  kasan_save_stack+0x3c/0x68
[   23.684884]  kasan_save_track+0x20/0x40
[   23.685244]  kasan_save_alloc_info+0x40/0x58
[   23.685642]  __kasan_kmalloc+0xd4/0xd8
[   23.685993]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.686419]  kasan_bitops_generic+0xa0/0x1c8
[   23.686816]  kunit_try_run_case+0x170/0x3f0
[   23.687208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.687716]  kthread+0x328/0x630
[   23.688026]  ret_from_fork+0x10/0x20
[   23.688364] 
[   23.688510] The buggy address belongs to the object at ffff000001193200
[   23.688510]  which belongs to the cache kmalloc-16 of size 16
[   23.689612] The buggy address is located 8 bytes inside of
[   23.689612]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.690706] 
[   23.690852] The buggy address belongs to the physical page:
[   23.691356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.692064] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.692657] page_type: f5(slab)
[   23.692956] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.693656] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.694351] page dumped because: kasan: bad access detected
[   23.694855] 
[   23.695001] Memory state around the buggy address:
[   23.695438]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.696090]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.696743] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.697392]                       ^
[   23.697715]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.698367]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.699017] ==================================================================
[   23.748692] ==================================================================
[   23.749347] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   23.750091] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.750753] 
[   23.750902] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.750934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.750944] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.750954] Call trace:
[   23.750962]  show_stack+0x20/0x38 (C)
[   23.750982]  dump_stack_lvl+0x8c/0xd0
[   23.751001]  print_report+0x118/0x608
[   23.751020]  kasan_report+0xdc/0x128
[   23.751039]  __asan_report_load8_noabort+0x20/0x30
[   23.751061]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   23.751087]  kasan_bitops_generic+0x110/0x1c8
[   23.751105]  kunit_try_run_case+0x170/0x3f0
[   23.751128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.751154]  kthread+0x328/0x630
[   23.751176]  ret_from_fork+0x10/0x20
[   23.751197] 
[   23.757201] Allocated by task 315:
[   23.757516]  kasan_save_stack+0x3c/0x68
[   23.757876]  kasan_save_track+0x20/0x40
[   23.758234]  kasan_save_alloc_info+0x40/0x58
[   23.758633]  __kasan_kmalloc+0xd4/0xd8
[   23.758984]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.759409]  kasan_bitops_generic+0xa0/0x1c8
[   23.759806]  kunit_try_run_case+0x170/0x3f0
[   23.760200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.760708]  kthread+0x328/0x630
[   23.761018]  ret_from_fork+0x10/0x20
[   23.761356] 
[   23.761502] The buggy address belongs to the object at ffff000001193200
[   23.761502]  which belongs to the cache kmalloc-16 of size 16
[   23.762603] The buggy address is located 8 bytes inside of
[   23.762603]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.763699] 
[   23.763845] The buggy address belongs to the physical page:
[   23.764349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.765056] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.765650] page_type: f5(slab)
[   23.765949] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.766650] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.767344] page dumped because: kasan: bad access detected
[   23.767849] 
[   23.767994] Memory state around the buggy address:
[   23.768431]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.769083]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.769734] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.770385]                       ^
[   23.770708]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.771360]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.772009] ==================================================================
[   23.772770] ==================================================================
[   23.773425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   23.774169] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.774838] 
[   23.774988] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.775020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.775029] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.775040] Call trace:
[   23.775047]  show_stack+0x20/0x38 (C)
[   23.775067]  dump_stack_lvl+0x8c/0xd0
[   23.775086]  print_report+0x118/0x608
[   23.775105]  kasan_report+0xdc/0x128
[   23.775123]  kasan_check_range+0x100/0x1a8
[   23.775143]  __kasan_check_write+0x20/0x30
[   23.775165]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   23.775191]  kasan_bitops_generic+0x110/0x1c8
[   23.775210]  kunit_try_run_case+0x170/0x3f0
[   23.775232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.775258]  kthread+0x328/0x630
[   23.775280]  ret_from_fork+0x10/0x20
[   23.775300] 
[   23.781612] Allocated by task 315:
[   23.781928]  kasan_save_stack+0x3c/0x68
[   23.782288]  kasan_save_track+0x20/0x40
[   23.782646]  kasan_save_alloc_info+0x40/0x58
[   23.783045]  __kasan_kmalloc+0xd4/0xd8
[   23.783397]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.783823]  kasan_bitops_generic+0xa0/0x1c8
[   23.784220]  kunit_try_run_case+0x170/0x3f0
[   23.784613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.785121]  kthread+0x328/0x630
[   23.785430]  ret_from_fork+0x10/0x20
[   23.785767] 
[   23.785913] The buggy address belongs to the object at ffff000001193200
[   23.785913]  which belongs to the cache kmalloc-16 of size 16
[   23.787014] The buggy address is located 8 bytes inside of
[   23.787014]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.788110] 
[   23.788257] The buggy address belongs to the physical page:
[   23.788761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.789468] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.790061] page_type: f5(slab)
[   23.790360] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.791060] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.791755] page dumped because: kasan: bad access detected
[   23.792259] 
[   23.792405] Memory state around the buggy address:
[   23.792841]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.793494]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.794146] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.794795]                       ^
[   23.795119]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.795771]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.796420] ==================================================================
[   23.821857] ==================================================================
[   23.822509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   23.823247] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.823904] 
[   23.824050] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.824077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.824084] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.824093] Call trace:
[   23.824099]  show_stack+0x20/0x38 (C)
[   23.824116]  dump_stack_lvl+0x8c/0xd0
[   23.824132]  print_report+0x118/0x608
[   23.824147]  kasan_report+0xdc/0x128
[   23.824162]  __asan_report_load8_noabort+0x20/0x30
[   23.824180]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   23.824201]  kasan_bitops_generic+0x110/0x1c8
[   23.824216]  kunit_try_run_case+0x170/0x3f0
[   23.824235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.824256]  kthread+0x328/0x630
[   23.824274]  ret_from_fork+0x10/0x20
[   23.824291] 
[   23.830277] Allocated by task 315:
[   23.830589]  kasan_save_stack+0x3c/0x68
[   23.830943]  kasan_save_track+0x20/0x40
[   23.831297]  kasan_save_alloc_info+0x40/0x58
[   23.831691]  __kasan_kmalloc+0xd4/0xd8
[   23.832036]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.832456]  kasan_bitops_generic+0xa0/0x1c8
[   23.832847]  kunit_try_run_case+0x170/0x3f0
[   23.833233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.833735]  kthread+0x328/0x630
[   23.834039]  ret_from_fork+0x10/0x20
[   23.834370] 
[   23.834513] The buggy address belongs to the object at ffff000001193200
[   23.834513]  which belongs to the cache kmalloc-16 of size 16
[   23.835608] The buggy address is located 8 bytes inside of
[   23.835608]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.836697] 
[   23.836841] The buggy address belongs to the physical page:
[   23.837341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.838044] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.838633] page_type: f5(slab)
[   23.838926] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.839620] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.840310] page dumped because: kasan: bad access detected
[   23.840809] 
[   23.840950] Memory state around the buggy address:
[   23.841383]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.842031]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.842678] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.843323]                       ^
[   23.843643]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.844290]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.844935] ==================================================================
[   23.625892] ==================================================================
[   23.626578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   23.627354] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.628033] 
[   23.628199] CPU: 2 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.628249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.628265] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.628283] Call trace:
[   23.628295]  show_stack+0x20/0x38 (C)
[   23.628329]  dump_stack_lvl+0x8c/0xd0
[   23.628361]  print_report+0x118/0x608
[   23.628392]  kasan_report+0xdc/0x128
[   23.628420]  __asan_report_load8_noabort+0x20/0x30
[   23.628455]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   23.628494]  kasan_bitops_generic+0x110/0x1c8
[   23.628523]  kunit_try_run_case+0x170/0x3f0
[   23.628560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.628600]  kthread+0x328/0x630
[   23.628634]  ret_from_fork+0x10/0x20
[   23.628668] 
[   23.634734] Allocated by task 315:
[   23.635061]  kasan_save_stack+0x3c/0x68
[   23.635435]  kasan_save_track+0x20/0x40
[   23.635808]  kasan_save_alloc_info+0x40/0x58
[   23.636221]  __kasan_kmalloc+0xd4/0xd8
[   23.636585]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.637028]  kasan_bitops_generic+0xa0/0x1c8
[   23.637439]  kunit_try_run_case+0x170/0x3f0
[   23.637848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.638374]  kthread+0x328/0x630
[   23.638697]  ret_from_fork+0x10/0x20
[   23.639049] 
[   23.639203] The buggy address belongs to the object at ffff000001193200
[   23.639203]  which belongs to the cache kmalloc-16 of size 16
[   23.640321] The buggy address is located 8 bytes inside of
[   23.640321]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.641436] 
[   23.641592] The buggy address belongs to the physical page:
[   23.642107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.642834] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.643446] page_type: f5(slab)
[   23.643760] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.644476] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.645185] page dumped because: kasan: bad access detected
[   23.645701] 
[   23.645856] Memory state around the buggy address:
[   23.646305]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.646974]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.647642] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.648305]                       ^
[   23.648641]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.649308]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.649972] ==================================================================
[   23.699814] ==================================================================
[   23.700470] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   23.701214] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.701884] 
[   23.702034] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.702068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.702077] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.702088] Call trace:
[   23.702095]  show_stack+0x20/0x38 (C)
[   23.702116]  dump_stack_lvl+0x8c/0xd0
[   23.702135]  print_report+0x118/0x608
[   23.702154]  kasan_report+0xdc/0x128
[   23.702172]  kasan_check_range+0x100/0x1a8
[   23.702193]  __kasan_check_write+0x20/0x30
[   23.702214]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   23.702240]  kasan_bitops_generic+0x110/0x1c8
[   23.702258]  kunit_try_run_case+0x170/0x3f0
[   23.702281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.702307]  kthread+0x328/0x630
[   23.702329]  ret_from_fork+0x10/0x20
[   23.702350] 
[   23.708660] Allocated by task 315:
[   23.708975]  kasan_save_stack+0x3c/0x68
[   23.709336]  kasan_save_track+0x20/0x40
[   23.709695]  kasan_save_alloc_info+0x40/0x58
[   23.710093]  __kasan_kmalloc+0xd4/0xd8
[   23.710443]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.710868]  kasan_bitops_generic+0xa0/0x1c8
[   23.711265]  kunit_try_run_case+0x170/0x3f0
[   23.711657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.712166]  kthread+0x328/0x630
[   23.712476]  ret_from_fork+0x10/0x20
[   23.712812] 
[   23.712958] The buggy address belongs to the object at ffff000001193200
[   23.712958]  which belongs to the cache kmalloc-16 of size 16
[   23.714058] The buggy address is located 8 bytes inside of
[   23.714058]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.715155] 
[   23.715300] The buggy address belongs to the physical page:
[   23.715803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.716510] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.717104] page_type: f5(slab)
[   23.717401] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.718102] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.718796] page dumped because: kasan: bad access detected
[   23.719301] 
[   23.719446] Memory state around the buggy address:
[   23.719883]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.720535]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.721187] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.721837]                       ^
[   23.722160]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.722812]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.723462] ==================================================================
[   23.797186] ==================================================================
[   23.797839] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   23.798583] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.799253] 
[   23.799402] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.799433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.799442] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.799453] Call trace:
[   23.799460]  show_stack+0x20/0x38 (C)
[   23.799480]  dump_stack_lvl+0x8c/0xd0
[   23.799499]  print_report+0x118/0x608
[   23.799517]  kasan_report+0xdc/0x128
[   23.799535]  kasan_check_range+0x100/0x1a8
[   23.799556]  __kasan_check_write+0x20/0x30
[   23.799577]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   23.799602]  kasan_bitops_generic+0x110/0x1c8
[   23.799621]  kunit_try_run_case+0x170/0x3f0
[   23.799643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.799669]  kthread+0x328/0x630
[   23.799690]  ret_from_fork+0x10/0x20
[   23.799711] 
[   23.806023] Allocated by task 315:
[   23.806339]  kasan_save_stack+0x3c/0x68
[   23.806697]  kasan_save_track+0x20/0x40
[   23.807056]  kasan_save_alloc_info+0x40/0x58
[   23.807455]  __kasan_kmalloc+0xd4/0xd8
[   23.807806]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.808232]  kasan_bitops_generic+0xa0/0x1c8
[   23.808627]  kunit_try_run_case+0x170/0x3f0
[   23.809019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.809527]  kthread+0x328/0x630
[   23.809837]  ret_from_fork+0x10/0x20
[   23.810175] 
[   23.810321] The buggy address belongs to the object at ffff000001193200
[   23.810321]  which belongs to the cache kmalloc-16 of size 16
[   23.811421] The buggy address is located 8 bytes inside of
[   23.811421]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.812516] 
[   23.812662] The buggy address belongs to the physical page:
[   23.813166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.813873] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.814468] page_type: f5(slab)
[   23.814765] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.815465] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.816160] page dumped because: kasan: bad access detected
[   23.816664] 
[   23.816809] Memory state around the buggy address:
[   23.817247]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.817900]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.818552] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.819202]                       ^
[   23.819526]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.820177]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.820826] ==================================================================
[   23.600005] ==================================================================
[   23.601047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   23.601821] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.602508] 
[   23.602671] CPU: 2 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.602722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.602737] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.602756] Call trace:
[   23.602768]  show_stack+0x20/0x38 (C)
[   23.602802]  dump_stack_lvl+0x8c/0xd0
[   23.602834]  print_report+0x118/0x608
[   23.602864]  kasan_report+0xdc/0x128
[   23.602893]  kasan_check_range+0x100/0x1a8
[   23.602925]  __kasan_check_write+0x20/0x30
[   23.602957]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   23.602998]  kasan_bitops_generic+0x110/0x1c8
[   23.603027]  kunit_try_run_case+0x170/0x3f0
[   23.603063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.603103]  kthread+0x328/0x630
[   23.603137]  ret_from_fork+0x10/0x20
[   23.603170] 
[   23.609541] Allocated by task 315:
[   23.609868]  kasan_save_stack+0x3c/0x68
[   23.610242]  kasan_save_track+0x20/0x40
[   23.610615]  kasan_save_alloc_info+0x40/0x58
[   23.611030]  __kasan_kmalloc+0xd4/0xd8
[   23.611395]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.611838]  kasan_bitops_generic+0xa0/0x1c8
[   23.612248]  kunit_try_run_case+0x170/0x3f0
[   23.612656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.613182]  kthread+0x328/0x630
[   23.613505]  ret_from_fork+0x10/0x20
[   23.613857] 
[   23.614012] The buggy address belongs to the object at ffff000001193200
[   23.614012]  which belongs to the cache kmalloc-16 of size 16
[   23.615131] The buggy address is located 8 bytes inside of
[   23.615131]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.616246] 
[   23.616401] The buggy address belongs to the physical page:
[   23.616918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.617645] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.618257] page_type: f5(slab)
[   23.618572] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.619289] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.619998] page dumped because: kasan: bad access detected
[   23.620513] 
[   23.620666] Memory state around the buggy address:
[   23.621116]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.621784]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.622454] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.623117]                       ^
[   23.623453]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.624121]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.624784] ==================================================================
[   23.651105] ==================================================================
[   23.651779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   23.652539] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.653212] 
[   23.653368] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.653405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.653415] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.653428] Call trace:
[   23.653436]  show_stack+0x20/0x38 (C)
[   23.653460]  dump_stack_lvl+0x8c/0xd0
[   23.653482]  print_report+0x118/0x608
[   23.653502]  kasan_report+0xdc/0x128
[   23.653520]  kasan_check_range+0x100/0x1a8
[   23.653540]  __kasan_check_write+0x20/0x30
[   23.653562]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   23.653588]  kasan_bitops_generic+0x110/0x1c8
[   23.653607]  kunit_try_run_case+0x170/0x3f0
[   23.653631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.653658]  kthread+0x328/0x630
[   23.653681]  ret_from_fork+0x10/0x20
[   23.653703] 
[   23.660014] Allocated by task 315:
[   23.660333]  kasan_save_stack+0x3c/0x68
[   23.660695]  kasan_save_track+0x20/0x40
[   23.661054]  kasan_save_alloc_info+0x40/0x58
[   23.661452]  __kasan_kmalloc+0xd4/0xd8
[   23.661803]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.662230]  kasan_bitops_generic+0xa0/0x1c8
[   23.662628]  kunit_try_run_case+0x170/0x3f0
[   23.663021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.663531]  kthread+0x328/0x630
[   23.663840]  ret_from_fork+0x10/0x20
[   23.664179] 
[   23.664326] The buggy address belongs to the object at ffff000001193200
[   23.664326]  which belongs to the cache kmalloc-16 of size 16
[   23.665428] The buggy address is located 8 bytes inside of
[   23.665428]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.666524] 
[   23.666671] The buggy address belongs to the physical page:
[   23.667176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.667886] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.668484] page_type: f5(slab)
[   23.668785] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.669487] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.670182] page dumped because: kasan: bad access detected
[   23.670687] 
[   23.670832] Memory state around the buggy address:
[   23.671269]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.671923]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.672575] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.673225]                       ^
[   23.673548]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.674201]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.674850] ==================================================================