Hay
Date
April 20, 2025, 11:09 p.m.

Environment
qemu-x86_64
rk3399-rock-pi-4b

[   13.824559] ==================================================================
[   13.824881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.825783] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.826153] 
[   13.826248] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.826296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.826338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.826633] Call Trace:
[   13.826653]  <TASK>
[   13.826672]  dump_stack_lvl+0x73/0xb0
[   13.826699]  print_report+0xd1/0x650
[   13.826722]  ? __virt_addr_valid+0x1db/0x2d0
[   13.826743]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.826767]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.826790]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.826814]  kasan_report+0x141/0x180
[   13.826836]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.826864]  kasan_check_range+0x10c/0x1c0
[   13.826887]  __kasan_check_write+0x18/0x20
[   13.826907]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.826931]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.826955]  ? kasan_save_alloc_info+0x3b/0x50
[   13.826975]  ? kasan_save_stack+0x45/0x70
[   13.827001]  kasan_bitops_generic+0x121/0x1c0
[   13.827020]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.827041]  ? __pfx_read_tsc+0x10/0x10
[   13.827059]  ? ktime_get_ts64+0x86/0x230
[   13.827085]  kunit_try_run_case+0x1a5/0x480
[   13.827108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.827144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.827168]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.827191]  ? __kthread_parkme+0x82/0x180
[   13.827212]  ? preempt_count_sub+0x50/0x80
[   13.827237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.827259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.827282]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.827304]  kthread+0x337/0x6f0
[   13.827337]  ? trace_preempt_on+0x20/0xc0
[   13.827359]  ? __pfx_kthread+0x10/0x10
[   13.827381]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.827403]  ? calculate_sigpending+0x7b/0xa0
[   13.827425]  ? __pfx_kthread+0x10/0x10
[   13.827446]  ret_from_fork+0x41/0x80
[   13.827466]  ? __pfx_kthread+0x10/0x10
[   13.827487]  ret_from_fork_asm+0x1a/0x30
[   13.827518]  </TASK>
[   13.827528] 
[   13.837427] Allocated by task 281:
[   13.837608]  kasan_save_stack+0x45/0x70
[   13.837793]  kasan_save_track+0x18/0x40
[   13.837968]  kasan_save_alloc_info+0x3b/0x50
[   13.838124]  __kasan_kmalloc+0xb7/0xc0
[   13.838843]  __kmalloc_cache_noprof+0x189/0x420
[   13.839059]  kasan_bitops_generic+0x92/0x1c0
[   13.839269]  kunit_try_run_case+0x1a5/0x480
[   13.839633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.839864]  kthread+0x337/0x6f0
[   13.840149]  ret_from_fork+0x41/0x80
[   13.840287]  ret_from_fork_asm+0x1a/0x30
[   13.840593] 
[   13.840693] The buggy address belongs to the object at ffff8881023f8300
[   13.840693]  which belongs to the cache kmalloc-16 of size 16
[   13.841376] The buggy address is located 8 bytes inside of
[   13.841376]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.841848] 
[   13.841940] The buggy address belongs to the physical page:
[   13.842159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.842712] flags: 0x200000000000000(node=0|zone=2)
[   13.842940] page_type: f5(slab)
[   13.843231] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.843650] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.844017] page dumped because: kasan: bad access detected
[   13.844364] 
[   13.844514] Memory state around the buggy address:
[   13.844705]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.845139]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.845523] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.845814]                       ^
[   13.846085]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.846456]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.846745] ==================================================================
[   13.870733] ==================================================================
[   13.871024] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.871977] Read of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.872513] 
[   13.872837] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.872885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.872897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.872916] Call Trace:
[   13.872930]  <TASK>
[   13.872942]  dump_stack_lvl+0x73/0xb0
[   13.872966]  print_report+0xd1/0x650
[   13.872988]  ? __virt_addr_valid+0x1db/0x2d0
[   13.873009]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.873032]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.873055]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.873078]  kasan_report+0x141/0x180
[   13.873101]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.873238]  kasan_check_range+0x10c/0x1c0
[   13.873266]  __kasan_check_read+0x15/0x20
[   13.873286]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.873311]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.873351]  ? kasan_save_alloc_info+0x3b/0x50
[   13.873371]  ? kasan_save_stack+0x45/0x70
[   13.873396]  kasan_bitops_generic+0x121/0x1c0
[   13.873416]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.873437]  ? __pfx_read_tsc+0x10/0x10
[   13.873456]  ? ktime_get_ts64+0x86/0x230
[   13.873480]  kunit_try_run_case+0x1a5/0x480
[   13.873504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.873525]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.873548]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.873571]  ? __kthread_parkme+0x82/0x180
[   13.873592]  ? preempt_count_sub+0x50/0x80
[   13.873616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.873639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.873661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.873683]  kthread+0x337/0x6f0
[   13.873703]  ? trace_preempt_on+0x20/0xc0
[   13.873726]  ? __pfx_kthread+0x10/0x10
[   13.873747]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.873772]  ? calculate_sigpending+0x7b/0xa0
[   13.873793]  ? __pfx_kthread+0x10/0x10
[   13.873815]  ret_from_fork+0x41/0x80
[   13.873834]  ? __pfx_kthread+0x10/0x10
[   13.873856]  ret_from_fork_asm+0x1a/0x30
[   13.873888]  </TASK>
[   13.873897] 
[   13.883906] Allocated by task 281:
[   13.884180]  kasan_save_stack+0x45/0x70
[   13.884379]  kasan_save_track+0x18/0x40
[   13.884561]  kasan_save_alloc_info+0x3b/0x50
[   13.884756]  __kasan_kmalloc+0xb7/0xc0
[   13.884931]  __kmalloc_cache_noprof+0x189/0x420
[   13.885128]  kasan_bitops_generic+0x92/0x1c0
[   13.885605]  kunit_try_run_case+0x1a5/0x480
[   13.885777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.886139]  kthread+0x337/0x6f0
[   13.886310]  ret_from_fork+0x41/0x80
[   13.886582]  ret_from_fork_asm+0x1a/0x30
[   13.886874] 
[   13.886974] The buggy address belongs to the object at ffff8881023f8300
[   13.886974]  which belongs to the cache kmalloc-16 of size 16
[   13.887564] The buggy address is located 8 bytes inside of
[   13.887564]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.888200] 
[   13.888304] The buggy address belongs to the physical page:
[   13.888535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.888860] flags: 0x200000000000000(node=0|zone=2)
[   13.889072] page_type: f5(slab)
[   13.889479] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.889860] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.890268] page dumped because: kasan: bad access detected
[   13.890507] 
[   13.890715] Memory state around the buggy address:
[   13.890897]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.891511]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.891861] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.892276]                       ^
[   13.892451]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.892906]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.893656] ==================================================================
[   13.790647] ==================================================================
[   13.790911] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.791296] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.791933] 
[   13.792028] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.792070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.792081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.792101] Call Trace:
[   13.792113]  <TASK>
[   13.792125]  dump_stack_lvl+0x73/0xb0
[   13.792169]  print_report+0xd1/0x650
[   13.792191]  ? __virt_addr_valid+0x1db/0x2d0
[   13.793438]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.793831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.793855]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.793881]  kasan_report+0x141/0x180
[   13.793904]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.793933]  kasan_check_range+0x10c/0x1c0
[   13.793957]  __kasan_check_write+0x18/0x20
[   13.793977]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.794001]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.794025]  ? kasan_save_alloc_info+0x3b/0x50
[   13.794044]  ? kasan_save_stack+0x45/0x70
[   13.794070]  kasan_bitops_generic+0x121/0x1c0
[   13.794090]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.794369]  ? __pfx_read_tsc+0x10/0x10
[   13.794400]  ? ktime_get_ts64+0x86/0x230
[   13.794439]  kunit_try_run_case+0x1a5/0x480
[   13.794465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.794488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.794511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.794534]  ? __kthread_parkme+0x82/0x180
[   13.794557]  ? preempt_count_sub+0x50/0x80
[   13.794581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.794604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.794626]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.794649]  kthread+0x337/0x6f0
[   13.794669]  ? trace_preempt_on+0x20/0xc0
[   13.794691]  ? __pfx_kthread+0x10/0x10
[   13.794712]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.794734]  ? calculate_sigpending+0x7b/0xa0
[   13.794754]  ? __pfx_kthread+0x10/0x10
[   13.794777]  ret_from_fork+0x41/0x80
[   13.794797]  ? __pfx_kthread+0x10/0x10
[   13.794818]  ret_from_fork_asm+0x1a/0x30
[   13.794848]  </TASK>
[   13.794859] 
[   13.811333] Allocated by task 281:
[   13.811876]  kasan_save_stack+0x45/0x70
[   13.812466]  kasan_save_track+0x18/0x40
[   13.812966]  kasan_save_alloc_info+0x3b/0x50
[   13.813277]  __kasan_kmalloc+0xb7/0xc0
[   13.813434]  __kmalloc_cache_noprof+0x189/0x420
[   13.813594]  kasan_bitops_generic+0x92/0x1c0
[   13.813737]  kunit_try_run_case+0x1a5/0x480
[   13.813890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.814066]  kthread+0x337/0x6f0
[   13.814196]  ret_from_fork+0x41/0x80
[   13.814335]  ret_from_fork_asm+0x1a/0x30
[   13.814473] 
[   13.814543] The buggy address belongs to the object at ffff8881023f8300
[   13.814543]  which belongs to the cache kmalloc-16 of size 16
[   13.814893] The buggy address is located 8 bytes inside of
[   13.814893]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.815241] 
[   13.815313] The buggy address belongs to the physical page:
[   13.816549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.817643] flags: 0x200000000000000(node=0|zone=2)
[   13.818388] page_type: f5(slab)
[   13.818960] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.819770] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.820143] page dumped because: kasan: bad access detected
[   13.820453] 
[   13.820531] Memory state around the buggy address:
[   13.820869]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.821278]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.821550] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.821950]                       ^
[   13.822183]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.822589]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.822994] ==================================================================
[   13.895099] ==================================================================
[   13.895556] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.895831] Read of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.896050] 
[   13.896131] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.896173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.896187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.896206] Call Trace:
[   13.896220]  <TASK>
[   13.896235]  dump_stack_lvl+0x73/0xb0
[   13.896258]  print_report+0xd1/0x650
[   13.896280]  ? __virt_addr_valid+0x1db/0x2d0
[   13.896300]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.896338]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.896360]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.896383]  kasan_report+0x141/0x180
[   13.896404]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.896431]  __asan_report_load8_noabort+0x18/0x20
[   13.896452]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.896476]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.896499]  ? kasan_save_alloc_info+0x3b/0x50
[   13.896518]  ? kasan_save_stack+0x45/0x70
[   13.896541]  kasan_bitops_generic+0x121/0x1c0
[   13.896561]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.896580]  ? __pfx_read_tsc+0x10/0x10
[   13.896599]  ? ktime_get_ts64+0x86/0x230
[   13.896622]  kunit_try_run_case+0x1a5/0x480
[   13.897172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.897202]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.897227]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.897250]  ? __kthread_parkme+0x82/0x180
[   13.897272]  ? preempt_count_sub+0x50/0x80
[   13.897297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.897332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.897356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.897380]  kthread+0x337/0x6f0
[   13.897401]  ? trace_preempt_on+0x20/0xc0
[   13.897423]  ? __pfx_kthread+0x10/0x10
[   13.897446]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.897468]  ? calculate_sigpending+0x7b/0xa0
[   13.897489]  ? __pfx_kthread+0x10/0x10
[   13.897512]  ret_from_fork+0x41/0x80
[   13.897533]  ? __pfx_kthread+0x10/0x10
[   13.897555]  ret_from_fork_asm+0x1a/0x30
[   13.897586]  </TASK>
[   13.897597] 
[   13.907511] Allocated by task 281:
[   13.907640]  kasan_save_stack+0x45/0x70
[   13.907784]  kasan_save_track+0x18/0x40
[   13.907918]  kasan_save_alloc_info+0x3b/0x50
[   13.908062]  __kasan_kmalloc+0xb7/0xc0
[   13.908381]  __kmalloc_cache_noprof+0x189/0x420
[   13.908768]  kasan_bitops_generic+0x92/0x1c0
[   13.909159]  kunit_try_run_case+0x1a5/0x480
[   13.909541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.910000]  kthread+0x337/0x6f0
[   13.910332]  ret_from_fork+0x41/0x80
[   13.910671]  ret_from_fork_asm+0x1a/0x30
[   13.911032] 
[   13.911211] The buggy address belongs to the object at ffff8881023f8300
[   13.911211]  which belongs to the cache kmalloc-16 of size 16
[   13.912260] The buggy address is located 8 bytes inside of
[   13.912260]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.913074] 
[   13.913218] The buggy address belongs to the physical page:
[   13.913465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.913703] flags: 0x200000000000000(node=0|zone=2)
[   13.913868] page_type: f5(slab)
[   13.913987] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.914440] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.915067] page dumped because: kasan: bad access detected
[   13.915571] 
[   13.915724] Memory state around the buggy address:
[   13.916162]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.916768]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.917383] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.917985]                       ^
[   13.918343]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.918801]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.919013] ==================================================================
[   13.847996] ==================================================================
[   13.848336] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.848919] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.849286] 
[   13.849688] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.849831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.849845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.849866] Call Trace:
[   13.849880]  <TASK>
[   13.849895]  dump_stack_lvl+0x73/0xb0
[   13.849920]  print_report+0xd1/0x650
[   13.849943]  ? __virt_addr_valid+0x1db/0x2d0
[   13.849964]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.849987]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.850009]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.850034]  kasan_report+0x141/0x180
[   13.850056]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.850084]  kasan_check_range+0x10c/0x1c0
[   13.850109]  __kasan_check_write+0x18/0x20
[   13.850207]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.850232]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.850258]  ? kasan_save_alloc_info+0x3b/0x50
[   13.850278]  ? kasan_save_stack+0x45/0x70
[   13.850303]  kasan_bitops_generic+0x121/0x1c0
[   13.850338]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.850360]  ? __pfx_read_tsc+0x10/0x10
[   13.850379]  ? ktime_get_ts64+0x86/0x230
[   13.850404]  kunit_try_run_case+0x1a5/0x480
[   13.850428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.850449]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.850473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.850497]  ? __kthread_parkme+0x82/0x180
[   13.850518]  ? preempt_count_sub+0x50/0x80
[   13.850543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.850566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.850590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.850614]  kthread+0x337/0x6f0
[   13.850636]  ? trace_preempt_on+0x20/0xc0
[   13.850658]  ? __pfx_kthread+0x10/0x10
[   13.850680]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.850702]  ? calculate_sigpending+0x7b/0xa0
[   13.850723]  ? __pfx_kthread+0x10/0x10
[   13.850746]  ret_from_fork+0x41/0x80
[   13.850767]  ? __pfx_kthread+0x10/0x10
[   13.850788]  ret_from_fork_asm+0x1a/0x30
[   13.850819]  </TASK>
[   13.850829] 
[   13.860893] Allocated by task 281:
[   13.861071]  kasan_save_stack+0x45/0x70
[   13.861607]  kasan_save_track+0x18/0x40
[   13.861858]  kasan_save_alloc_info+0x3b/0x50
[   13.862100]  __kasan_kmalloc+0xb7/0xc0
[   13.862370]  __kmalloc_cache_noprof+0x189/0x420
[   13.862699]  kasan_bitops_generic+0x92/0x1c0
[   13.862900]  kunit_try_run_case+0x1a5/0x480
[   13.863214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.863467]  kthread+0x337/0x6f0
[   13.863623]  ret_from_fork+0x41/0x80
[   13.863783]  ret_from_fork_asm+0x1a/0x30
[   13.863961] 
[   13.864038] The buggy address belongs to the object at ffff8881023f8300
[   13.864038]  which belongs to the cache kmalloc-16 of size 16
[   13.864822] The buggy address is located 8 bytes inside of
[   13.864822]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.865451] 
[   13.865691] The buggy address belongs to the physical page:
[   13.865934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.866408] flags: 0x200000000000000(node=0|zone=2)
[   13.866714] page_type: f5(slab)
[   13.866844] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.867306] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.867671] page dumped because: kasan: bad access detected
[   13.867849] 
[   13.867942] Memory state around the buggy address:
[   13.868164]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.868644]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.869015] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.869367]                       ^
[   13.869648]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.869907]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.870198] ==================================================================
[   13.772974] ==================================================================
[   13.773485] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.773926] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.774331] 
[   13.774431] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.774473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.774495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.774516] Call Trace:
[   13.774528]  <TASK>
[   13.774541]  dump_stack_lvl+0x73/0xb0
[   13.774563]  print_report+0xd1/0x650
[   13.774586]  ? __virt_addr_valid+0x1db/0x2d0
[   13.774607]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.774630]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.774652]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.774676]  kasan_report+0x141/0x180
[   13.774700]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.774731]  kasan_check_range+0x10c/0x1c0
[   13.774756]  __kasan_check_write+0x18/0x20
[   13.774777]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.774800]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.774824]  ? kasan_save_alloc_info+0x3b/0x50
[   13.774844]  ? kasan_save_stack+0x45/0x70
[   13.774869]  kasan_bitops_generic+0x121/0x1c0
[   13.774889]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.774910]  ? __pfx_read_tsc+0x10/0x10
[   13.774929]  ? ktime_get_ts64+0x86/0x230
[   13.774953]  kunit_try_run_case+0x1a5/0x480
[   13.774976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.774998]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.775021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.775045]  ? __kthread_parkme+0x82/0x180
[   13.775066]  ? preempt_count_sub+0x50/0x80
[   13.775089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.775112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.775145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.775168]  kthread+0x337/0x6f0
[   13.775189]  ? trace_preempt_on+0x20/0xc0
[   13.775212]  ? __pfx_kthread+0x10/0x10
[   13.775234]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.775255]  ? calculate_sigpending+0x7b/0xa0
[   13.775276]  ? __pfx_kthread+0x10/0x10
[   13.775298]  ret_from_fork+0x41/0x80
[   13.775318]  ? __pfx_kthread+0x10/0x10
[   13.775351]  ret_from_fork_asm+0x1a/0x30
[   13.775383]  </TASK>
[   13.775394] 
[   13.782579] Allocated by task 281:
[   13.782919]  kasan_save_stack+0x45/0x70
[   13.783114]  kasan_save_track+0x18/0x40
[   13.783313]  kasan_save_alloc_info+0x3b/0x50
[   13.783525]  __kasan_kmalloc+0xb7/0xc0
[   13.783711]  __kmalloc_cache_noprof+0x189/0x420
[   13.783927]  kasan_bitops_generic+0x92/0x1c0
[   13.784139]  kunit_try_run_case+0x1a5/0x480
[   13.784354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.784601]  kthread+0x337/0x6f0
[   13.784769]  ret_from_fork+0x41/0x80
[   13.784958]  ret_from_fork_asm+0x1a/0x30
[   13.785130] 
[   13.785226] The buggy address belongs to the object at ffff8881023f8300
[   13.785226]  which belongs to the cache kmalloc-16 of size 16
[   13.785587] The buggy address is located 8 bytes inside of
[   13.785587]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.785937] 
[   13.786009] The buggy address belongs to the physical page:
[   13.786211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.786570] flags: 0x200000000000000(node=0|zone=2)
[   13.786805] page_type: f5(slab)
[   13.786995] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.787546] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.787881] page dumped because: kasan: bad access detected
[   13.788087] 
[   13.788155] Memory state around the buggy address:
[   13.788308]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.788530]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.788742] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.789299]                       ^
[   13.789484]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.789800]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.790120] ==================================================================
[   13.755611] ==================================================================
[   13.755956] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.756421] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.756659] 
[   13.756741] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.756781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.756794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.756813] Call Trace:
[   13.756826]  <TASK>
[   13.756839]  dump_stack_lvl+0x73/0xb0
[   13.756863]  print_report+0xd1/0x650
[   13.756884]  ? __virt_addr_valid+0x1db/0x2d0
[   13.756907]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.756931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.756953]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.756977]  kasan_report+0x141/0x180
[   13.757000]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.757028]  kasan_check_range+0x10c/0x1c0
[   13.757052]  __kasan_check_write+0x18/0x20
[   13.757072]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.757095]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.757120]  ? kasan_save_alloc_info+0x3b/0x50
[   13.757139]  ? kasan_save_stack+0x45/0x70
[   13.757165]  kasan_bitops_generic+0x121/0x1c0
[   13.757184]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.757205]  ? __pfx_read_tsc+0x10/0x10
[   13.757224]  ? ktime_get_ts64+0x86/0x230
[   13.757249]  kunit_try_run_case+0x1a5/0x480
[   13.757272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.757293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.757316]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.757352]  ? __kthread_parkme+0x82/0x180
[   13.757372]  ? preempt_count_sub+0x50/0x80
[   13.757397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.757419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.757441]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.757464]  kthread+0x337/0x6f0
[   13.757491]  ? trace_preempt_on+0x20/0xc0
[   13.757514]  ? __pfx_kthread+0x10/0x10
[   13.757536]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.757558]  ? calculate_sigpending+0x7b/0xa0
[   13.757579]  ? __pfx_kthread+0x10/0x10
[   13.757603]  ret_from_fork+0x41/0x80
[   13.757624]  ? __pfx_kthread+0x10/0x10
[   13.757645]  ret_from_fork_asm+0x1a/0x30
[   13.757677]  </TASK>
[   13.757687] 
[   13.765461] Allocated by task 281:
[   13.765620]  kasan_save_stack+0x45/0x70
[   13.765772]  kasan_save_track+0x18/0x40
[   13.765958]  kasan_save_alloc_info+0x3b/0x50
[   13.766155]  __kasan_kmalloc+0xb7/0xc0
[   13.766285]  __kmalloc_cache_noprof+0x189/0x420
[   13.766531]  kasan_bitops_generic+0x92/0x1c0
[   13.766741]  kunit_try_run_case+0x1a5/0x480
[   13.766953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.767175]  kthread+0x337/0x6f0
[   13.767296]  ret_from_fork+0x41/0x80
[   13.767433]  ret_from_fork_asm+0x1a/0x30
[   13.767571] 
[   13.767639] The buggy address belongs to the object at ffff8881023f8300
[   13.767639]  which belongs to the cache kmalloc-16 of size 16
[   13.767983] The buggy address is located 8 bytes inside of
[   13.767983]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.768352] 
[   13.768449] The buggy address belongs to the physical page:
[   13.768695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.769037] flags: 0x200000000000000(node=0|zone=2)
[   13.769398] page_type: f5(slab)
[   13.769563] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.769899] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.770310] page dumped because: kasan: bad access detected
[   13.770567] 
[   13.770633] Memory state around the buggy address:
[   13.770785]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.770994]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.771202] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.771632]                       ^
[   13.771805]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.772119]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.772454] ==================================================================
[   13.710248] ==================================================================
[   13.710539] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.710869] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.711618] 
[   13.711825] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.711872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.711885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.711912] Call Trace:
[   13.711924]  <TASK>
[   13.711937]  dump_stack_lvl+0x73/0xb0
[   13.711962]  print_report+0xd1/0x650
[   13.711984]  ? __virt_addr_valid+0x1db/0x2d0
[   13.712005]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.712028]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.712050]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.712074]  kasan_report+0x141/0x180
[   13.712098]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.712217]  kasan_check_range+0x10c/0x1c0
[   13.712250]  __kasan_check_write+0x18/0x20
[   13.712271]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.712295]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.712318]  ? kasan_save_alloc_info+0x3b/0x50
[   13.712385]  ? kasan_save_stack+0x45/0x70
[   13.712410]  kasan_bitops_generic+0x121/0x1c0
[   13.712430]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.712451]  ? __pfx_read_tsc+0x10/0x10
[   13.712470]  ? ktime_get_ts64+0x86/0x230
[   13.712495]  kunit_try_run_case+0x1a5/0x480
[   13.712518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.712540]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.712563]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.712587]  ? __kthread_parkme+0x82/0x180
[   13.712608]  ? preempt_count_sub+0x50/0x80
[   13.712633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.712656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.712678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.712701]  kthread+0x337/0x6f0
[   13.712721]  ? trace_preempt_on+0x20/0xc0
[   13.712744]  ? __pfx_kthread+0x10/0x10
[   13.712765]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.712787]  ? calculate_sigpending+0x7b/0xa0
[   13.712808]  ? __pfx_kthread+0x10/0x10
[   13.712830]  ret_from_fork+0x41/0x80
[   13.712849]  ? __pfx_kthread+0x10/0x10
[   13.712871]  ret_from_fork_asm+0x1a/0x30
[   13.712902]  </TASK>
[   13.712911] 
[   13.723977] Allocated by task 281:
[   13.724503]  kasan_save_stack+0x45/0x70
[   13.724769]  kasan_save_track+0x18/0x40
[   13.725097]  kasan_save_alloc_info+0x3b/0x50
[   13.725490]  __kasan_kmalloc+0xb7/0xc0
[   13.725900]  __kmalloc_cache_noprof+0x189/0x420
[   13.726385]  kasan_bitops_generic+0x92/0x1c0
[   13.726604]  kunit_try_run_case+0x1a5/0x480
[   13.726802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.727037]  kthread+0x337/0x6f0
[   13.727416]  ret_from_fork+0x41/0x80
[   13.727706]  ret_from_fork_asm+0x1a/0x30
[   13.728076] 
[   13.728345] The buggy address belongs to the object at ffff8881023f8300
[   13.728345]  which belongs to the cache kmalloc-16 of size 16
[   13.728838] The buggy address is located 8 bytes inside of
[   13.728838]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.729817] 
[   13.729904] The buggy address belongs to the physical page:
[   13.730358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.730857] flags: 0x200000000000000(node=0|zone=2)
[   13.731275] page_type: f5(slab)
[   13.731567] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.732214] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.732543] page dumped because: kasan: bad access detected
[   13.732767] 
[   13.732853] Memory state around the buggy address:
[   13.733053]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.733693]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.734308] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.734807]                       ^
[   13.735101]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.735609]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.736029] ==================================================================
[   13.737426] ==================================================================
[   13.737743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.738455] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281
[   13.738774] 
[   13.738875] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.738919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.738931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.738951] Call Trace:
[   13.738966]  <TASK>
[   13.738982]  dump_stack_lvl+0x73/0xb0
[   13.739007]  print_report+0xd1/0x650
[   13.739029]  ? __virt_addr_valid+0x1db/0x2d0
[   13.739050]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.739073]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.739096]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.739120]  kasan_report+0x141/0x180
[   13.739146]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.739175]  kasan_check_range+0x10c/0x1c0
[   13.739199]  __kasan_check_write+0x18/0x20
[   13.739219]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.739242]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.739267]  ? kasan_save_alloc_info+0x3b/0x50
[   13.739286]  ? kasan_save_stack+0x45/0x70
[   13.739311]  kasan_bitops_generic+0x121/0x1c0
[   13.739341]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.739362]  ? __pfx_read_tsc+0x10/0x10
[   13.739394]  ? ktime_get_ts64+0x86/0x230
[   13.739419]  kunit_try_run_case+0x1a5/0x480
[   13.739443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.739465]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.739488]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.739512]  ? __kthread_parkme+0x82/0x180
[   13.739534]  ? preempt_count_sub+0x50/0x80
[   13.739559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.739581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.739604]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.739626]  kthread+0x337/0x6f0
[   13.739647]  ? trace_preempt_on+0x20/0xc0
[   13.739669]  ? __pfx_kthread+0x10/0x10
[   13.739691]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.739713]  ? calculate_sigpending+0x7b/0xa0
[   13.739734]  ? __pfx_kthread+0x10/0x10
[   13.739756]  ret_from_fork+0x41/0x80
[   13.739775]  ? __pfx_kthread+0x10/0x10
[   13.739797]  ret_from_fork_asm+0x1a/0x30
[   13.739828]  </TASK>
[   13.739838] 
[   13.747929] Allocated by task 281:
[   13.748122]  kasan_save_stack+0x45/0x70
[   13.748348]  kasan_save_track+0x18/0x40
[   13.748541]  kasan_save_alloc_info+0x3b/0x50
[   13.748744]  __kasan_kmalloc+0xb7/0xc0
[   13.748913]  __kmalloc_cache_noprof+0x189/0x420
[   13.749063]  kasan_bitops_generic+0x92/0x1c0
[   13.749206]  kunit_try_run_case+0x1a5/0x480
[   13.749359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.749671]  kthread+0x337/0x6f0
[   13.749844]  ret_from_fork+0x41/0x80
[   13.750025]  ret_from_fork_asm+0x1a/0x30
[   13.750218] 
[   13.750396] The buggy address belongs to the object at ffff8881023f8300
[   13.750396]  which belongs to the cache kmalloc-16 of size 16
[   13.750900] The buggy address is located 8 bytes inside of
[   13.750900]  allocated 9-byte region [ffff8881023f8300, ffff8881023f8309)
[   13.751375] 
[   13.751468] The buggy address belongs to the physical page:
[   13.751705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8
[   13.751987] flags: 0x200000000000000(node=0|zone=2)
[   13.752192] page_type: f5(slab)
[   13.752370] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.752714] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.752998] page dumped because: kasan: bad access detected
[   13.753246] 
[   13.753333] Memory state around the buggy address:
[   13.753497]  ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.753806]  ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.754083] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.754397]                       ^
[   13.754535]  ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.754853]  ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.755085] ==================================================================

[   23.845737] ==================================================================
[   23.846388] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   23.847183] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.847847] 
[   23.847992] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.848019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.848027] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.848036] Call trace:
[   23.848042]  show_stack+0x20/0x38 (C)
[   23.848059]  dump_stack_lvl+0x8c/0xd0
[   23.848074]  print_report+0x118/0x608
[   23.848090]  kasan_report+0xdc/0x128
[   23.848105]  kasan_check_range+0x100/0x1a8
[   23.848122]  __kasan_check_write+0x20/0x30
[   23.848138]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   23.848156]  kasan_bitops_generic+0x11c/0x1c8
[   23.848171]  kunit_try_run_case+0x170/0x3f0
[   23.848190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.848211]  kthread+0x328/0x630
[   23.848229]  ret_from_fork+0x10/0x20
[   23.848246] 
[   23.854593] Allocated by task 315:
[   23.854904]  kasan_save_stack+0x3c/0x68
[   23.855258]  kasan_save_track+0x20/0x40
[   23.855611]  kasan_save_alloc_info+0x40/0x58
[   23.856004]  __kasan_kmalloc+0xd4/0xd8
[   23.856349]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.856769]  kasan_bitops_generic+0xa0/0x1c8
[   23.857160]  kunit_try_run_case+0x170/0x3f0
[   23.857547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.858049]  kthread+0x328/0x630
[   23.858352]  ret_from_fork+0x10/0x20
[   23.858683] 
[   23.858827] The buggy address belongs to the object at ffff000001193200
[   23.858827]  which belongs to the cache kmalloc-16 of size 16
[   23.859920] The buggy address is located 8 bytes inside of
[   23.859920]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.861008] 
[   23.861151] The buggy address belongs to the physical page:
[   23.861651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.862353] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.862943] page_type: f5(slab)
[   23.863236] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.863930] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.864621] page dumped because: kasan: bad access detected
[   23.865121] 
[   23.865263] Memory state around the buggy address:
[   23.865697]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.866344]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.866992] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.867636]                       ^
[   23.867956]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.868603]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.869248] ==================================================================
[   23.966393] ==================================================================
[   23.967043] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   23.967844] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.968501] 
[   23.968647] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.968672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.968680] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.968690] Call trace:
[   23.968695]  show_stack+0x20/0x38 (C)
[   23.968712]  dump_stack_lvl+0x8c/0xd0
[   23.968727]  print_report+0x118/0x608
[   23.968743]  kasan_report+0xdc/0x128
[   23.968758]  __asan_report_load8_noabort+0x20/0x30
[   23.968776]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   23.968794]  kasan_bitops_generic+0x11c/0x1c8
[   23.968809]  kunit_try_run_case+0x170/0x3f0
[   23.968828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.968849]  kthread+0x328/0x630
[   23.968867]  ret_from_fork+0x10/0x20
[   23.968884] 
[   23.974936] Allocated by task 315:
[   23.975248]  kasan_save_stack+0x3c/0x68
[   23.975602]  kasan_save_track+0x20/0x40
[   23.975956]  kasan_save_alloc_info+0x40/0x58
[   23.976349]  __kasan_kmalloc+0xd4/0xd8
[   23.976695]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.977114]  kasan_bitops_generic+0xa0/0x1c8
[   23.977506]  kunit_try_run_case+0x170/0x3f0
[   23.977893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.978395]  kthread+0x328/0x630
[   23.978699]  ret_from_fork+0x10/0x20
[   23.979031] 
[   23.979173] The buggy address belongs to the object at ffff000001193200
[   23.979173]  which belongs to the cache kmalloc-16 of size 16
[   23.980268] The buggy address is located 8 bytes inside of
[   23.980268]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.981358] 
[   23.981500] The buggy address belongs to the physical page:
[   23.981999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.982701] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.983290] page_type: f5(slab)
[   23.983582] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.984276] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.984966] page dumped because: kasan: bad access detected
[   23.985467] 
[   23.985609] Memory state around the buggy address:
[   23.986041]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.986689]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.987335] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.987980]                       ^
[   23.988300]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.988947]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.989592] ==================================================================
[   23.869996] ==================================================================
[   23.870646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   23.871445] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.872102] 
[   23.872247] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.872274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.872281] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.872290] Call trace:
[   23.872296]  show_stack+0x20/0x38 (C)
[   23.872312]  dump_stack_lvl+0x8c/0xd0
[   23.872327]  print_report+0x118/0x608
[   23.872342]  kasan_report+0xdc/0x128
[   23.872357]  __asan_report_load8_noabort+0x20/0x30
[   23.872376]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   23.872393]  kasan_bitops_generic+0x11c/0x1c8
[   23.872408]  kunit_try_run_case+0x170/0x3f0
[   23.872426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.872447]  kthread+0x328/0x630
[   23.872465]  ret_from_fork+0x10/0x20
[   23.872482] 
[   23.878535] Allocated by task 315:
[   23.878846]  kasan_save_stack+0x3c/0x68
[   23.879200]  kasan_save_track+0x20/0x40
[   23.879553]  kasan_save_alloc_info+0x40/0x58
[   23.879947]  __kasan_kmalloc+0xd4/0xd8
[   23.880292]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.880712]  kasan_bitops_generic+0xa0/0x1c8
[   23.881103]  kunit_try_run_case+0x170/0x3f0
[   23.881489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.881991]  kthread+0x328/0x630
[   23.882295]  ret_from_fork+0x10/0x20
[   23.882627] 
[   23.882769] The buggy address belongs to the object at ffff000001193200
[   23.882769]  which belongs to the cache kmalloc-16 of size 16
[   23.883863] The buggy address is located 8 bytes inside of
[   23.883863]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.884952] 
[   23.885094] The buggy address belongs to the physical page:
[   23.885594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.886297] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.886886] page_type: f5(slab)
[   23.887179] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.887873] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.888564] page dumped because: kasan: bad access detected
[   23.889065] 
[   23.889206] Memory state around the buggy address:
[   23.889639]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.890286]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.890934] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.891579]                       ^
[   23.891899]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.892546]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.893191] ==================================================================
[   24.038037] ==================================================================
[   24.038676] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   24.039465] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   24.040110] 
[   24.040248] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.040263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.040267] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.040272] Call trace:
[   24.040276]  show_stack+0x20/0x38 (C)
[   24.040284]  dump_stack_lvl+0x8c/0xd0
[   24.040293]  print_report+0x118/0x608
[   24.040301]  kasan_report+0xdc/0x128
[   24.040310]  __asan_report_load8_noabort+0x20/0x30
[   24.040320]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   24.040330]  kasan_bitops_generic+0x11c/0x1c8
[   24.040338]  kunit_try_run_case+0x170/0x3f0
[   24.040349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.040361]  kthread+0x328/0x630
[   24.040370]  ret_from_fork+0x10/0x20
[   24.040380] 
[   24.046399] Allocated by task 315:
[   24.046704]  kasan_save_stack+0x3c/0x68
[   24.047048]  kasan_save_track+0x20/0x40
[   24.047391]  kasan_save_alloc_info+0x40/0x58
[   24.047774]  __kasan_kmalloc+0xd4/0xd8
[   24.048111]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.048518]  kasan_bitops_generic+0xa0/0x1c8
[   24.048899]  kunit_try_run_case+0x170/0x3f0
[   24.049275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.049765]  kthread+0x328/0x630
[   24.050058]  ret_from_fork+0x10/0x20
[   24.050380] 
[   24.050517] The buggy address belongs to the object at ffff000001193200
[   24.050517]  which belongs to the cache kmalloc-16 of size 16
[   24.051599] The buggy address is located 8 bytes inside of
[   24.051599]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   24.052674] 
[   24.052811] The buggy address belongs to the physical page:
[   24.053302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   24.053994] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.054571] page_type: f5(slab)
[   24.054855] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   24.055538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.056220] page dumped because: kasan: bad access detected
[   24.056712] 
[   24.056850] Memory state around the buggy address:
[   24.057275]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.057912]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   24.058549] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.059185]                       ^
[   24.059498]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.060135]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.060771] ==================================================================
[   23.893918] ==================================================================
[   23.894565] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   23.895365] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.896029] 
[   23.896174] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.896200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.896208] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.896216] Call trace:
[   23.896222]  show_stack+0x20/0x38 (C)
[   23.896238]  dump_stack_lvl+0x8c/0xd0
[   23.896253]  print_report+0x118/0x608
[   23.896269]  kasan_report+0xdc/0x128
[   23.896284]  kasan_check_range+0x100/0x1a8
[   23.896300]  __kasan_check_write+0x20/0x30
[   23.896317]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   23.896335]  kasan_bitops_generic+0x11c/0x1c8
[   23.896350]  kunit_try_run_case+0x170/0x3f0
[   23.896368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.896389]  kthread+0x328/0x630
[   23.896406]  ret_from_fork+0x10/0x20
[   23.896423] 
[   23.902778] Allocated by task 315:
[   23.903088]  kasan_save_stack+0x3c/0x68
[   23.903443]  kasan_save_track+0x20/0x40
[   23.903796]  kasan_save_alloc_info+0x40/0x58
[   23.904190]  __kasan_kmalloc+0xd4/0xd8
[   23.904535]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.904954]  kasan_bitops_generic+0xa0/0x1c8
[   23.905346]  kunit_try_run_case+0x170/0x3f0
[   23.905732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.906234]  kthread+0x328/0x630
[   23.906537]  ret_from_fork+0x10/0x20
[   23.906869] 
[   23.907011] The buggy address belongs to the object at ffff000001193200
[   23.907011]  which belongs to the cache kmalloc-16 of size 16
[   23.908105] The buggy address is located 8 bytes inside of
[   23.908105]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.909194] 
[   23.909337] The buggy address belongs to the physical page:
[   23.909836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.910538] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.911126] page_type: f5(slab)
[   23.911420] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.912114] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.912804] page dumped because: kasan: bad access detected
[   23.913305] 
[   23.913446] Memory state around the buggy address:
[   23.913879]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.914526]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.915173] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.915819]                       ^
[   23.916139]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.916786]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.917431] ==================================================================
[   23.990313] ==================================================================
[   23.990961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   23.991761] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.992425] 
[   23.992570] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.992596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.992604] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.992612] Call trace:
[   23.992618]  show_stack+0x20/0x38 (C)
[   23.992635]  dump_stack_lvl+0x8c/0xd0
[   23.992649]  print_report+0x118/0x608
[   23.992665]  kasan_report+0xdc/0x128
[   23.992680]  kasan_check_range+0x100/0x1a8
[   23.992696]  __kasan_check_write+0x20/0x30
[   23.992714]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   23.992731]  kasan_bitops_generic+0x11c/0x1c8
[   23.992746]  kunit_try_run_case+0x170/0x3f0
[   23.992765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.992785]  kthread+0x328/0x630
[   23.992803]  ret_from_fork+0x10/0x20
[   23.992820] 
[   23.999174] Allocated by task 315:
[   23.999485]  kasan_save_stack+0x3c/0x68
[   23.999839]  kasan_save_track+0x20/0x40
[   24.000192]  kasan_save_alloc_info+0x40/0x58
[   24.000586]  __kasan_kmalloc+0xd4/0xd8
[   24.000932]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.001350]  kasan_bitops_generic+0xa0/0x1c8
[   24.001743]  kunit_try_run_case+0x170/0x3f0
[   24.002130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.002631]  kthread+0x328/0x630
[   24.002935]  ret_from_fork+0x10/0x20
[   24.003267] 
[   24.003410] The buggy address belongs to the object at ffff000001193200
[   24.003410]  which belongs to the cache kmalloc-16 of size 16
[   24.004504] The buggy address is located 8 bytes inside of
[   24.004504]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   24.005592] 
[   24.005735] The buggy address belongs to the physical page:
[   24.006235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   24.006935] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.007524] page_type: f5(slab)
[   24.007818] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   24.008511] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.009201] page dumped because: kasan: bad access detected
[   24.009702] 
[   24.009844] Memory state around the buggy address:
[   24.010277]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.010923]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   24.011570] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.012214]                       ^
[   24.012535]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.013182]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.013826] ==================================================================
[   23.918183] ==================================================================
[   23.918831] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   23.919631] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.920288] 
[   23.920434] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.920459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.920467] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.920476] Call trace:
[   23.920482]  show_stack+0x20/0x38 (C)
[   23.920498]  dump_stack_lvl+0x8c/0xd0
[   23.920513]  print_report+0x118/0x608
[   23.920529]  kasan_report+0xdc/0x128
[   23.920544]  __asan_report_load8_noabort+0x20/0x30
[   23.920562]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   23.920580]  kasan_bitops_generic+0x11c/0x1c8
[   23.920594]  kunit_try_run_case+0x170/0x3f0
[   23.920612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.920633]  kthread+0x328/0x630
[   23.920651]  ret_from_fork+0x10/0x20
[   23.920668] 
[   23.926719] Allocated by task 315:
[   23.927031]  kasan_save_stack+0x3c/0x68
[   23.927385]  kasan_save_track+0x20/0x40
[   23.927738]  kasan_save_alloc_info+0x40/0x58
[   23.928132]  __kasan_kmalloc+0xd4/0xd8
[   23.928477]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.928896]  kasan_bitops_generic+0xa0/0x1c8
[   23.929287]  kunit_try_run_case+0x170/0x3f0
[   23.929674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.930176]  kthread+0x328/0x630
[   23.930479]  ret_from_fork+0x10/0x20
[   23.930811] 
[   23.930954] The buggy address belongs to the object at ffff000001193200
[   23.930954]  which belongs to the cache kmalloc-16 of size 16
[   23.932048] The buggy address is located 8 bytes inside of
[   23.932048]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.933137] 
[   23.933279] The buggy address belongs to the physical page:
[   23.933778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.934479] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.935067] page_type: f5(slab)
[   23.935361] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.936054] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.936744] page dumped because: kasan: bad access detected
[   23.937245] 
[   23.937387] Memory state around the buggy address:
[   23.937820]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.938466]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.939114] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.939759]                       ^
[   23.940079]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.940726]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.941371] ==================================================================
[   24.014638] ==================================================================
[   24.015277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   24.016066] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   24.016712] 
[   24.016850] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.016865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.016869] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.016875] Call trace:
[   24.016878]  show_stack+0x20/0x38 (C)
[   24.016887]  dump_stack_lvl+0x8c/0xd0
[   24.016896]  print_report+0x118/0x608
[   24.016904]  kasan_report+0xdc/0x128
[   24.016913]  __asan_report_load8_noabort+0x20/0x30
[   24.016923]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   24.016933]  kasan_bitops_generic+0x11c/0x1c8
[   24.016941]  kunit_try_run_case+0x170/0x3f0
[   24.016952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.016963]  kthread+0x328/0x630
[   24.016974]  ret_from_fork+0x10/0x20
[   24.016983] 
[   24.023000] Allocated by task 315:
[   24.023304]  kasan_save_stack+0x3c/0x68
[   24.023650]  kasan_save_track+0x20/0x40
[   24.023993]  kasan_save_alloc_info+0x40/0x58
[   24.024376]  __kasan_kmalloc+0xd4/0xd8
[   24.024713]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.025120]  kasan_bitops_generic+0xa0/0x1c8
[   24.025502]  kunit_try_run_case+0x170/0x3f0
[   24.025879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.026370]  kthread+0x328/0x630
[   24.026663]  ret_from_fork+0x10/0x20
[   24.026985] 
[   24.027123] The buggy address belongs to the object at ffff000001193200
[   24.027123]  which belongs to the cache kmalloc-16 of size 16
[   24.028206] The buggy address is located 8 bytes inside of
[   24.028206]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   24.029282] 
[   24.029419] The buggy address belongs to the physical page:
[   24.029911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   24.030603] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.031181] page_type: f5(slab)
[   24.031465] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   24.032149] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.032831] page dumped because: kasan: bad access detected
[   24.033322] 
[   24.033460] Memory state around the buggy address:
[   24.033886]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.034523]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   24.035160] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.035796]                       ^
[   24.036108]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.036745]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.037381] ==================================================================
[   23.942128] ==================================================================
[   23.942776] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   23.943576] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.944240] 
[   23.944385] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.944411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.944419] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.944428] Call trace:
[   23.944434]  show_stack+0x20/0x38 (C)
[   23.944450]  dump_stack_lvl+0x8c/0xd0
[   23.944465]  print_report+0x118/0x608
[   23.944480]  kasan_report+0xdc/0x128
[   23.944495]  kasan_check_range+0x100/0x1a8
[   23.944512]  __kasan_check_write+0x20/0x30
[   23.944530]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   23.944547]  kasan_bitops_generic+0x11c/0x1c8
[   23.944562]  kunit_try_run_case+0x170/0x3f0
[   23.944581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.944602]  kthread+0x328/0x630
[   23.944619]  ret_from_fork+0x10/0x20
[   23.944636] 
[   23.950988] Allocated by task 315:
[   23.951299]  kasan_save_stack+0x3c/0x68
[   23.951653]  kasan_save_track+0x20/0x40
[   23.952007]  kasan_save_alloc_info+0x40/0x58
[   23.952401]  __kasan_kmalloc+0xd4/0xd8
[   23.952747]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.953166]  kasan_bitops_generic+0xa0/0x1c8
[   23.953557]  kunit_try_run_case+0x170/0x3f0
[   23.953944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.954446]  kthread+0x328/0x630
[   23.954750]  ret_from_fork+0x10/0x20
[   23.955082] 
[   23.955224] The buggy address belongs to the object at ffff000001193200
[   23.955224]  which belongs to the cache kmalloc-16 of size 16
[   23.956318] The buggy address is located 8 bytes inside of
[   23.956318]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.957407] 
[   23.957550] The buggy address belongs to the physical page:
[   23.958050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.958751] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.959340] page_type: f5(slab)
[   23.959633] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.960327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.961017] page dumped because: kasan: bad access detected
[   23.961517] 
[   23.961659] Memory state around the buggy address:
[   23.962092]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.962739]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.963387] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.964032]                       ^
[   23.964351]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.964999]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.965643] ==================================================================