Hay
Date
April 22, 2025, 11:09 a.m.

Environment
qemu-x86_64
rk3399-rock-pi-4b

[   21.835776] ==================================================================
[   21.836402] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.837020] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.838772] 
[   21.839156] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.839297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.839338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.839398] Call Trace:
[   21.839437]  <TASK>
[   21.839659]  dump_stack_lvl+0x73/0xb0
[   21.839747]  print_report+0xd1/0x650
[   21.839828]  ? __virt_addr_valid+0x1db/0x2d0
[   21.839902]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.839976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.840055]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.840132]  kasan_report+0x141/0x180
[   21.840207]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.840282]  kasan_check_range+0x10c/0x1c0
[   21.840322]  __kasan_check_write+0x18/0x20
[   21.840352]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.840387]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.840422]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.840507]  ? trace_hardirqs_on+0x37/0xe0
[   21.840550]  ? kasan_bitops_generic+0x92/0x1c0
[   21.840585]  kasan_bitops_generic+0x121/0x1c0
[   21.840616]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.840647]  ? __pfx_read_tsc+0x10/0x10
[   21.840675]  ? ktime_get_ts64+0x86/0x230
[   21.840712]  kunit_try_run_case+0x1a5/0x480
[   21.840746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.840777]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.840813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.840849]  ? __kthread_parkme+0x82/0x180
[   21.840881]  ? preempt_count_sub+0x50/0x80
[   21.840916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.840950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.840981]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.841015]  kthread+0x337/0x6f0
[   21.841045]  ? trace_preempt_on+0x20/0xc0
[   21.841077]  ? __pfx_kthread+0x10/0x10
[   21.841109]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.841140]  ? calculate_sigpending+0x7b/0xa0
[   21.841171]  ? __pfx_kthread+0x10/0x10
[   21.841204]  ret_from_fork+0x41/0x80
[   21.841234]  ? __pfx_kthread+0x10/0x10
[   21.841266]  ret_from_fork_asm+0x1a/0x30
[   21.841310]  </TASK>
[   21.841323] 
[   21.859761] Allocated by task 281:
[   21.860274]  kasan_save_stack+0x45/0x70
[   21.860781]  kasan_save_track+0x18/0x40
[   21.861211]  kasan_save_alloc_info+0x3b/0x50
[   21.861716]  __kasan_kmalloc+0xb7/0xc0
[   21.862219]  __kmalloc_cache_noprof+0x189/0x420
[   21.862728]  kasan_bitops_generic+0x92/0x1c0
[   21.863234]  kunit_try_run_case+0x1a5/0x480
[   21.863700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.864212]  kthread+0x337/0x6f0
[   21.864586]  ret_from_fork+0x41/0x80
[   21.865019]  ret_from_fork_asm+0x1a/0x30
[   21.866228] 
[   21.866560] The buggy address belongs to the object at ffff8881017113c0
[   21.866560]  which belongs to the cache kmalloc-16 of size 16
[   21.867566] The buggy address is located 8 bytes inside of
[   21.867566]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.868574] 
[   21.868833] The buggy address belongs to the physical page:
[   21.869269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   21.870060] flags: 0x200000000000000(node=0|zone=2)
[   21.870644] page_type: f5(slab)
[   21.870991] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.871743] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.872369] page dumped because: kasan: bad access detected
[   21.872792] 
[   21.873047] Memory state around the buggy address:
[   21.873564]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.875003]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.875791] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.876349]                                               ^
[   21.877099]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.877799]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.878404] ==================================================================
[   22.054300] ==================================================================
[   22.055004] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   22.055576] Read of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   22.056194] 
[   22.056376] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.056564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.056596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.056648] Call Trace:
[   22.056698]  <TASK>
[   22.056819]  dump_stack_lvl+0x73/0xb0
[   22.058238]  print_report+0xd1/0x650
[   22.058316]  ? __virt_addr_valid+0x1db/0x2d0
[   22.058389]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   22.059358]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.059477]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   22.059750]  kasan_report+0x141/0x180
[   22.059835]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   22.059923]  kasan_check_range+0x10c/0x1c0
[   22.060003]  __kasan_check_read+0x15/0x20
[   22.060071]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   22.060147]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.060222]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.060288]  ? trace_hardirqs_on+0x37/0xe0
[   22.060350]  ? kasan_bitops_generic+0x92/0x1c0
[   22.060465]  kasan_bitops_generic+0x121/0x1c0
[   22.060569]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.060631]  ? __pfx_read_tsc+0x10/0x10
[   22.060688]  ? ktime_get_ts64+0x86/0x230
[   22.060748]  kunit_try_run_case+0x1a5/0x480
[   22.060815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.060876]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.060941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.061011]  ? __kthread_parkme+0x82/0x180
[   22.061079]  ? preempt_count_sub+0x50/0x80
[   22.061153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.061222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.061292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.061358]  kthread+0x337/0x6f0
[   22.061456]  ? trace_preempt_on+0x20/0xc0
[   22.061562]  ? __pfx_kthread+0x10/0x10
[   22.061655]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.061711]  ? calculate_sigpending+0x7b/0xa0
[   22.061763]  ? __pfx_kthread+0x10/0x10
[   22.061817]  ret_from_fork+0x41/0x80
[   22.061867]  ? __pfx_kthread+0x10/0x10
[   22.061920]  ret_from_fork_asm+0x1a/0x30
[   22.061995]  </TASK>
[   22.062018] 
[   22.078159] Allocated by task 281:
[   22.078706]  kasan_save_stack+0x45/0x70
[   22.079160]  kasan_save_track+0x18/0x40
[   22.079765]  kasan_save_alloc_info+0x3b/0x50
[   22.080117]  __kasan_kmalloc+0xb7/0xc0
[   22.080653]  __kmalloc_cache_noprof+0x189/0x420
[   22.081177]  kasan_bitops_generic+0x92/0x1c0
[   22.081594]  kunit_try_run_case+0x1a5/0x480
[   22.081931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.082463]  kthread+0x337/0x6f0
[   22.082972]  ret_from_fork+0x41/0x80
[   22.083391]  ret_from_fork_asm+0x1a/0x30
[   22.083883] 
[   22.084114] The buggy address belongs to the object at ffff8881017113c0
[   22.084114]  which belongs to the cache kmalloc-16 of size 16
[   22.085014] The buggy address is located 8 bytes inside of
[   22.085014]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   22.086224] 
[   22.086568] The buggy address belongs to the physical page:
[   22.087135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   22.087845] flags: 0x200000000000000(node=0|zone=2)
[   22.088468] page_type: f5(slab)
[   22.089013] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.089715] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.090467] page dumped because: kasan: bad access detected
[   22.090981] 
[   22.091213] Memory state around the buggy address:
[   22.091743]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.092196]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.093032] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.093737]                                               ^
[   22.094302]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.095132]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.095817] ==================================================================
[   22.098098] ==================================================================
[   22.098906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   22.100013] Read of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   22.101160] 
[   22.101813] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.101937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.101975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.102032] Call Trace:
[   22.102080]  <TASK>
[   22.102123]  dump_stack_lvl+0x73/0xb0
[   22.102197]  print_report+0xd1/0x650
[   22.102267]  ? __virt_addr_valid+0x1db/0x2d0
[   22.102331]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   22.102392]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.102970]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   22.103448]  kasan_report+0x141/0x180
[   22.103563]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   22.103662]  __asan_report_load8_noabort+0x18/0x20
[   22.103729]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   22.103768]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.103805]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.103838]  ? trace_hardirqs_on+0x37/0xe0
[   22.103905]  ? kasan_bitops_generic+0x92/0x1c0
[   22.103964]  kasan_bitops_generic+0x121/0x1c0
[   22.104029]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.104101]  ? __pfx_read_tsc+0x10/0x10
[   22.104170]  ? ktime_get_ts64+0x86/0x230
[   22.104254]  kunit_try_run_case+0x1a5/0x480
[   22.104334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.104403]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.104480]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.104578]  ? __kthread_parkme+0x82/0x180
[   22.104657]  ? preempt_count_sub+0x50/0x80
[   22.104737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.104857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.104933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.105007]  kthread+0x337/0x6f0
[   22.105076]  ? trace_preempt_on+0x20/0xc0
[   22.105151]  ? __pfx_kthread+0x10/0x10
[   22.105223]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.105291]  ? calculate_sigpending+0x7b/0xa0
[   22.105364]  ? __pfx_kthread+0x10/0x10
[   22.105443]  ret_from_fork+0x41/0x80
[   22.105555]  ? __pfx_kthread+0x10/0x10
[   22.105649]  ret_from_fork_asm+0x1a/0x30
[   22.105750]  </TASK>
[   22.105784] 
[   22.127573] Allocated by task 281:
[   22.127938]  kasan_save_stack+0x45/0x70
[   22.128548]  kasan_save_track+0x18/0x40
[   22.128962]  kasan_save_alloc_info+0x3b/0x50
[   22.129405]  __kasan_kmalloc+0xb7/0xc0
[   22.129805]  __kmalloc_cache_noprof+0x189/0x420
[   22.130219]  kasan_bitops_generic+0x92/0x1c0
[   22.130815]  kunit_try_run_case+0x1a5/0x480
[   22.131248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.131849]  kthread+0x337/0x6f0
[   22.132256]  ret_from_fork+0x41/0x80
[   22.132795]  ret_from_fork_asm+0x1a/0x30
[   22.133200] 
[   22.133562] The buggy address belongs to the object at ffff8881017113c0
[   22.133562]  which belongs to the cache kmalloc-16 of size 16
[   22.134688] The buggy address is located 8 bytes inside of
[   22.134688]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   22.135774] 
[   22.136046] The buggy address belongs to the physical page:
[   22.136653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   22.137638] flags: 0x200000000000000(node=0|zone=2)
[   22.138169] page_type: f5(slab)
[   22.138595] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.139345] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.140072] page dumped because: kasan: bad access detected
[   22.140640] 
[   22.140856] Memory state around the buggy address:
[   22.141380]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.142093]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.142730] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.143318]                                               ^
[   22.143944]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.144597]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.145675] ==================================================================
[   21.925304] ==================================================================
[   21.926630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.927358] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.928329] 
[   21.928860] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.929036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.929077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.929136] Call Trace:
[   21.929177]  <TASK>
[   21.929205]  dump_stack_lvl+0x73/0xb0
[   21.929245]  print_report+0xd1/0x650
[   21.929280]  ? __virt_addr_valid+0x1db/0x2d0
[   21.929310]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.929343]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.929375]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.929409]  kasan_report+0x141/0x180
[   21.929512]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.929558]  kasan_check_range+0x10c/0x1c0
[   21.929606]  __kasan_check_write+0x18/0x20
[   21.929634]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.929668]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.929703]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.929733]  ? trace_hardirqs_on+0x37/0xe0
[   21.929765]  ? kasan_bitops_generic+0x92/0x1c0
[   21.929797]  kasan_bitops_generic+0x121/0x1c0
[   21.929825]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.929854]  ? __pfx_read_tsc+0x10/0x10
[   21.929881]  ? ktime_get_ts64+0x86/0x230
[   21.929915]  kunit_try_run_case+0x1a5/0x480
[   21.929949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.929980]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.930016]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.930050]  ? __kthread_parkme+0x82/0x180
[   21.930080]  ? preempt_count_sub+0x50/0x80
[   21.930115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.930147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.930180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.930213]  kthread+0x337/0x6f0
[   21.930242]  ? trace_preempt_on+0x20/0xc0
[   21.930274]  ? __pfx_kthread+0x10/0x10
[   21.930305]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.930335]  ? calculate_sigpending+0x7b/0xa0
[   21.930365]  ? __pfx_kthread+0x10/0x10
[   21.930396]  ret_from_fork+0x41/0x80
[   21.930457]  ? __pfx_kthread+0x10/0x10
[   21.930518]  ret_from_fork_asm+0x1a/0x30
[   21.930568]  </TASK>
[   21.930582] 
[   21.949805] Allocated by task 281:
[   21.950273]  kasan_save_stack+0x45/0x70
[   21.950797]  kasan_save_track+0x18/0x40
[   21.951274]  kasan_save_alloc_info+0x3b/0x50
[   21.951804]  __kasan_kmalloc+0xb7/0xc0
[   21.952127]  __kmalloc_cache_noprof+0x189/0x420
[   21.952556]  kasan_bitops_generic+0x92/0x1c0
[   21.953058]  kunit_try_run_case+0x1a5/0x480
[   21.953544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.954170]  kthread+0x337/0x6f0
[   21.954613]  ret_from_fork+0x41/0x80
[   21.955018]  ret_from_fork_asm+0x1a/0x30
[   21.955343] 
[   21.955680] The buggy address belongs to the object at ffff8881017113c0
[   21.955680]  which belongs to the cache kmalloc-16 of size 16
[   21.956820] The buggy address is located 8 bytes inside of
[   21.956820]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.957702] 
[   21.957913] The buggy address belongs to the physical page:
[   21.958544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   21.959297] flags: 0x200000000000000(node=0|zone=2)
[   21.959748] page_type: f5(slab)
[   21.960080] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.960792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.961410] page dumped because: kasan: bad access detected
[   21.961873] 
[   21.962103] Memory state around the buggy address:
[   21.962597]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.963252]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.963898] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.964594]                                               ^
[   21.965139]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.965754]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.966393] ==================================================================
[   21.784840] ==================================================================
[   21.787699] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.790104] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.791656] 
[   21.791860] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.791964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.791992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.792037] Call Trace:
[   21.792743]  <TASK>
[   21.792800]  dump_stack_lvl+0x73/0xb0
[   21.792875]  print_report+0xd1/0x650
[   21.792959]  ? __virt_addr_valid+0x1db/0x2d0
[   21.793037]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.793122]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.793204]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.793289]  kasan_report+0x141/0x180
[   21.793367]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.793546]  kasan_check_range+0x10c/0x1c0
[   21.793647]  __kasan_check_write+0x18/0x20
[   21.793711]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.793784]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.793861]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.793930]  ? trace_hardirqs_on+0x37/0xe0
[   21.793998]  ? kasan_bitops_generic+0x92/0x1c0
[   21.794077]  kasan_bitops_generic+0x121/0x1c0
[   21.794149]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.794227]  ? __pfx_read_tsc+0x10/0x10
[   21.794292]  ? ktime_get_ts64+0x86/0x230
[   21.794370]  kunit_try_run_case+0x1a5/0x480
[   21.794466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.794562]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.794650]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.794727]  ? __kthread_parkme+0x82/0x180
[   21.794788]  ? preempt_count_sub+0x50/0x80
[   21.794853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.794915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.794980]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.795048]  kthread+0x337/0x6f0
[   21.795099]  ? trace_preempt_on+0x20/0xc0
[   21.795159]  ? __pfx_kthread+0x10/0x10
[   21.795216]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.795273]  ? calculate_sigpending+0x7b/0xa0
[   21.795330]  ? __pfx_kthread+0x10/0x10
[   21.795388]  ret_from_fork+0x41/0x80
[   21.795445]  ? __pfx_kthread+0x10/0x10
[   21.795536]  ret_from_fork_asm+0x1a/0x30
[   21.795623]  </TASK>
[   21.795648] 
[   21.815829] Allocated by task 281:
[   21.816270]  kasan_save_stack+0x45/0x70
[   21.816857]  kasan_save_track+0x18/0x40
[   21.817339]  kasan_save_alloc_info+0x3b/0x50
[   21.817738]  __kasan_kmalloc+0xb7/0xc0
[   21.818052]  __kmalloc_cache_noprof+0x189/0x420
[   21.818648]  kasan_bitops_generic+0x92/0x1c0
[   21.819249]  kunit_try_run_case+0x1a5/0x480
[   21.819840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.820514]  kthread+0x337/0x6f0
[   21.821031]  ret_from_fork+0x41/0x80
[   21.821458]  ret_from_fork_asm+0x1a/0x30
[   21.822138] 
[   21.822378] The buggy address belongs to the object at ffff8881017113c0
[   21.822378]  which belongs to the cache kmalloc-16 of size 16
[   21.823577] The buggy address is located 8 bytes inside of
[   21.823577]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.824761] 
[   21.824993] The buggy address belongs to the physical page:
[   21.825859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   21.826596] flags: 0x200000000000000(node=0|zone=2)
[   21.827070] page_type: f5(slab)
[   21.827691] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.828560] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.829149] page dumped because: kasan: bad access detected
[   21.829860] 
[   21.830093] Memory state around the buggy address:
[   21.830568]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.831093]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.831722] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.832405]                                               ^
[   21.833024]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.833556]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.834105] ==================================================================
[   22.011523] ==================================================================
[   22.012246] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   22.013039] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   22.013642] 
[   22.013987] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.014112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.014148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.014205] Call Trace:
[   22.014253]  <TASK>
[   22.014305]  dump_stack_lvl+0x73/0xb0
[   22.014388]  print_report+0xd1/0x650
[   22.014504]  ? __virt_addr_valid+0x1db/0x2d0
[   22.014621]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   22.014706]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.014782]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   22.014860]  kasan_report+0x141/0x180
[   22.014985]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   22.015080]  kasan_check_range+0x10c/0x1c0
[   22.015166]  __kasan_check_write+0x18/0x20
[   22.015276]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   22.015364]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.015465]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.015540]  ? trace_hardirqs_on+0x37/0xe0
[   22.015577]  ? kasan_bitops_generic+0x92/0x1c0
[   22.015612]  kasan_bitops_generic+0x121/0x1c0
[   22.015670]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.015747]  ? __pfx_read_tsc+0x10/0x10
[   22.015850]  ? ktime_get_ts64+0x86/0x230
[   22.015937]  kunit_try_run_case+0x1a5/0x480
[   22.016019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.016091]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.016209]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.016292]  ? __kthread_parkme+0x82/0x180
[   22.016365]  ? preempt_count_sub+0x50/0x80
[   22.016431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.016507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.016547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.016581]  kthread+0x337/0x6f0
[   22.016611]  ? trace_preempt_on+0x20/0xc0
[   22.016645]  ? __pfx_kthread+0x10/0x10
[   22.016678]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.016711]  ? calculate_sigpending+0x7b/0xa0
[   22.016743]  ? __pfx_kthread+0x10/0x10
[   22.016777]  ret_from_fork+0x41/0x80
[   22.016808]  ? __pfx_kthread+0x10/0x10
[   22.016841]  ret_from_fork_asm+0x1a/0x30
[   22.016887]  </TASK>
[   22.016900] 
[   22.033305] Allocated by task 281:
[   22.033827]  kasan_save_stack+0x45/0x70
[   22.034293]  kasan_save_track+0x18/0x40
[   22.034971]  kasan_save_alloc_info+0x3b/0x50
[   22.035430]  __kasan_kmalloc+0xb7/0xc0
[   22.035911]  __kmalloc_cache_noprof+0x189/0x420
[   22.036397]  kasan_bitops_generic+0x92/0x1c0
[   22.036904]  kunit_try_run_case+0x1a5/0x480
[   22.037247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.037656]  kthread+0x337/0x6f0
[   22.037948]  ret_from_fork+0x41/0x80
[   22.038255]  ret_from_fork_asm+0x1a/0x30
[   22.038831] 
[   22.039067] The buggy address belongs to the object at ffff8881017113c0
[   22.039067]  which belongs to the cache kmalloc-16 of size 16
[   22.040123] The buggy address is located 8 bytes inside of
[   22.040123]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   22.041201] 
[   22.041472] The buggy address belongs to the physical page:
[   22.042078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   22.042791] flags: 0x200000000000000(node=0|zone=2)
[   22.043154] page_type: f5(slab)
[   22.043472] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.044181] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.044980] page dumped because: kasan: bad access detected
[   22.045587] 
[   22.045823] Memory state around the buggy address:
[   22.046307]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.047069]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.047799] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.048347]                                               ^
[   22.048764]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.049227]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.051581] ==================================================================
[   21.968204] ==================================================================
[   21.969706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.970467] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.971620] 
[   21.972060] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.972197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.972233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.972293] Call Trace:
[   21.972342]  <TASK>
[   21.972391]  dump_stack_lvl+0x73/0xb0
[   21.972551]  print_report+0xd1/0x650
[   21.972629]  ? __virt_addr_valid+0x1db/0x2d0
[   21.972703]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.972775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.972834]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.972871]  kasan_report+0x141/0x180
[   21.972905]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.972946]  kasan_check_range+0x10c/0x1c0
[   21.972979]  __kasan_check_write+0x18/0x20
[   21.973007]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.973041]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.973077]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.973108]  ? trace_hardirqs_on+0x37/0xe0
[   21.973140]  ? kasan_bitops_generic+0x92/0x1c0
[   21.973173]  kasan_bitops_generic+0x121/0x1c0
[   21.973200]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.973228]  ? __pfx_read_tsc+0x10/0x10
[   21.973256]  ? ktime_get_ts64+0x86/0x230
[   21.973294]  kunit_try_run_case+0x1a5/0x480
[   21.973327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.973357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.973391]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.973471]  ? __kthread_parkme+0x82/0x180
[   21.973536]  ? preempt_count_sub+0x50/0x80
[   21.973571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.973616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.973648]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.973678]  kthread+0x337/0x6f0
[   21.973708]  ? trace_preempt_on+0x20/0xc0
[   21.973740]  ? __pfx_kthread+0x10/0x10
[   21.973771]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.973802]  ? calculate_sigpending+0x7b/0xa0
[   21.973831]  ? __pfx_kthread+0x10/0x10
[   21.973862]  ret_from_fork+0x41/0x80
[   21.973890]  ? __pfx_kthread+0x10/0x10
[   21.973922]  ret_from_fork_asm+0x1a/0x30
[   21.973966]  </TASK>
[   21.973981] 
[   21.990616] Allocated by task 281:
[   21.991093]  kasan_save_stack+0x45/0x70
[   21.991754]  kasan_save_track+0x18/0x40
[   21.992066]  kasan_save_alloc_info+0x3b/0x50
[   21.992626]  __kasan_kmalloc+0xb7/0xc0
[   21.993003]  __kmalloc_cache_noprof+0x189/0x420
[   21.993510]  kasan_bitops_generic+0x92/0x1c0
[   21.993955]  kunit_try_run_case+0x1a5/0x480
[   21.994422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.995004]  kthread+0x337/0x6f0
[   21.995306]  ret_from_fork+0x41/0x80
[   21.995826]  ret_from_fork_asm+0x1a/0x30
[   21.996435] 
[   21.996722] The buggy address belongs to the object at ffff8881017113c0
[   21.996722]  which belongs to the cache kmalloc-16 of size 16
[   21.997770] The buggy address is located 8 bytes inside of
[   21.997770]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.998762] 
[   21.999014] The buggy address belongs to the physical page:
[   21.999565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   22.000259] flags: 0x200000000000000(node=0|zone=2)
[   22.000794] page_type: f5(slab)
[   22.001199] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.001915] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.002441] page dumped because: kasan: bad access detected
[   22.003919] 
[   22.004136] Memory state around the buggy address:
[   22.004625]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.005182]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.007247] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.008498]                                               ^
[   22.008851]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.009464]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.010095] ==================================================================
[   21.742925] ==================================================================
[   21.743475] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.744678] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.745709] 
[   21.746174] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.746305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.746381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.746440] Call Trace:
[   21.746479]  <TASK>
[   21.746546]  dump_stack_lvl+0x73/0xb0
[   21.746621]  print_report+0xd1/0x650
[   21.746699]  ? __virt_addr_valid+0x1db/0x2d0
[   21.746768]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.746863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.746925]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.746962]  kasan_report+0x141/0x180
[   21.746998]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.747042]  kasan_check_range+0x10c/0x1c0
[   21.747079]  __kasan_check_write+0x18/0x20
[   21.747109]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.747144]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.747179]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.747210]  ? trace_hardirqs_on+0x37/0xe0
[   21.747246]  ? kasan_bitops_generic+0x92/0x1c0
[   21.747279]  kasan_bitops_generic+0x121/0x1c0
[   21.747310]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.747340]  ? __pfx_read_tsc+0x10/0x10
[   21.747369]  ? ktime_get_ts64+0x86/0x230
[   21.747404]  kunit_try_run_case+0x1a5/0x480
[   21.747477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.747539]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.747582]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.747620]  ? __kthread_parkme+0x82/0x180
[   21.747654]  ? preempt_count_sub+0x50/0x80
[   21.747691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.747726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.747759]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.747793]  kthread+0x337/0x6f0
[   21.747824]  ? trace_preempt_on+0x20/0xc0
[   21.747858]  ? __pfx_kthread+0x10/0x10
[   21.747891]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.747923]  ? calculate_sigpending+0x7b/0xa0
[   21.747955]  ? __pfx_kthread+0x10/0x10
[   21.747988]  ret_from_fork+0x41/0x80
[   21.748019]  ? __pfx_kthread+0x10/0x10
[   21.748053]  ret_from_fork_asm+0x1a/0x30
[   21.748099]  </TASK>
[   21.748112] 
[   21.766481] Allocated by task 281:
[   21.766905]  kasan_save_stack+0x45/0x70
[   21.767406]  kasan_save_track+0x18/0x40
[   21.767905]  kasan_save_alloc_info+0x3b/0x50
[   21.768348]  __kasan_kmalloc+0xb7/0xc0
[   21.768818]  __kmalloc_cache_noprof+0x189/0x420
[   21.769307]  kasan_bitops_generic+0x92/0x1c0
[   21.769802]  kunit_try_run_case+0x1a5/0x480
[   21.770265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.770817]  kthread+0x337/0x6f0
[   21.771110]  ret_from_fork+0x41/0x80
[   21.771462]  ret_from_fork_asm+0x1a/0x30
[   21.771972] 
[   21.772210] The buggy address belongs to the object at ffff8881017113c0
[   21.772210]  which belongs to the cache kmalloc-16 of size 16
[   21.773332] The buggy address is located 8 bytes inside of
[   21.773332]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.774179] 
[   21.774515] The buggy address belongs to the physical page:
[   21.775035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   21.775746] flags: 0x200000000000000(node=0|zone=2)
[   21.776247] page_type: f5(slab)
[   21.776695] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.777185] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.777956] page dumped because: kasan: bad access detected
[   21.778514] 
[   21.778725] Memory state around the buggy address:
[   21.779192]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.779879]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.780394] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.781042]                                               ^
[   21.781459]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.782173]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.783058] ==================================================================
[   21.879473] ==================================================================
[   21.880612] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.881396] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.882214] 
[   21.882453] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.882543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.882561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.882594] Call Trace:
[   21.882617]  <TASK>
[   21.882640]  dump_stack_lvl+0x73/0xb0
[   21.882679]  print_report+0xd1/0x650
[   21.882714]  ? __virt_addr_valid+0x1db/0x2d0
[   21.882746]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.882780]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.882813]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.882848]  kasan_report+0x141/0x180
[   21.882881]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.882925]  kasan_check_range+0x10c/0x1c0
[   21.883002]  __kasan_check_write+0x18/0x20
[   21.883073]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.883156]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.883242]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.883315]  ? trace_hardirqs_on+0x37/0xe0
[   21.883395]  ? kasan_bitops_generic+0x92/0x1c0
[   21.883500]  kasan_bitops_generic+0x121/0x1c0
[   21.883578]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.883660]  ? __pfx_read_tsc+0x10/0x10
[   21.883726]  ? ktime_get_ts64+0x86/0x230
[   21.883809]  kunit_try_run_case+0x1a5/0x480
[   21.883883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.883952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.884027]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.884104]  ? __kthread_parkme+0x82/0x180
[   21.884232]  ? preempt_count_sub+0x50/0x80
[   21.884274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.884310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.884343]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.884376]  kthread+0x337/0x6f0
[   21.884406]  ? trace_preempt_on+0x20/0xc0
[   21.884470]  ? __pfx_kthread+0x10/0x10
[   21.884535]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.884570]  ? calculate_sigpending+0x7b/0xa0
[   21.884604]  ? __pfx_kthread+0x10/0x10
[   21.884638]  ret_from_fork+0x41/0x80
[   21.884670]  ? __pfx_kthread+0x10/0x10
[   21.884703]  ret_from_fork_asm+0x1a/0x30
[   21.884748]  </TASK>
[   21.884762] 
[   21.905217] Allocated by task 281:
[   21.905900]  kasan_save_stack+0x45/0x70
[   21.906506]  kasan_save_track+0x18/0x40
[   21.907021]  kasan_save_alloc_info+0x3b/0x50
[   21.907613]  __kasan_kmalloc+0xb7/0xc0
[   21.908135]  __kmalloc_cache_noprof+0x189/0x420
[   21.908781]  kasan_bitops_generic+0x92/0x1c0
[   21.909152]  kunit_try_run_case+0x1a5/0x480
[   21.909898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.910353]  kthread+0x337/0x6f0
[   21.911074]  ret_from_fork+0x41/0x80
[   21.911352]  ret_from_fork_asm+0x1a/0x30
[   21.911847] 
[   21.912646] The buggy address belongs to the object at ffff8881017113c0
[   21.912646]  which belongs to the cache kmalloc-16 of size 16
[   21.913729] The buggy address is located 8 bytes inside of
[   21.913729]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.914940] 
[   21.915178] The buggy address belongs to the physical page:
[   21.915953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   21.916801] flags: 0x200000000000000(node=0|zone=2)
[   21.917378] page_type: f5(slab)
[   21.917994] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.919127] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.919670] page dumped because: kasan: bad access detected
[   21.920183] 
[   21.920384] Memory state around the buggy address:
[   21.921294]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.921762]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.922008] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.922243]                                               ^
[   21.922468]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.922933]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.923837] ==================================================================

[   22.227511] ==================================================================
[   22.228156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   22.228953] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.229613] 
[   22.229755] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.229777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.229784] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.229791] Call trace:
[   22.229796]  show_stack+0x20/0x38 (C)
[   22.229809]  dump_stack_lvl+0x8c/0xd0
[   22.229822]  print_report+0x118/0x608
[   22.229835]  kasan_report+0xdc/0x128
[   22.229848]  kasan_check_range+0x100/0x1a8
[   22.229862]  __kasan_check_write+0x20/0x30
[   22.229876]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   22.229891]  kasan_bitops_generic+0x11c/0x1c8
[   22.229904]  kunit_try_run_case+0x170/0x3f0
[   22.229919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.229937]  kthread+0x328/0x630
[   22.229952]  ret_from_fork+0x10/0x20
[   22.229965] 
[   22.236308] Allocated by task 319:
[   22.236616]  kasan_save_stack+0x3c/0x68
[   22.236967]  kasan_save_track+0x20/0x40
[   22.237317]  kasan_save_alloc_info+0x40/0x58
[   22.237705]  __kasan_kmalloc+0xd4/0xd8
[   22.238048]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.238462]  kasan_bitops_generic+0xa0/0x1c8
[   22.238850]  kunit_try_run_case+0x170/0x3f0
[   22.239233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.239730]  kthread+0x328/0x630
[   22.240030]  ret_from_fork+0x10/0x20
[   22.240358] 
[   22.240498] The buggy address belongs to the object at ffff00000a7446c0
[   22.240498]  which belongs to the cache kmalloc-16 of size 16
[   22.241588] The buggy address is located 8 bytes inside of
[   22.241588]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.242673] 
[   22.242814] The buggy address belongs to the physical page:
[   22.243311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.244009] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.244594] page_type: f5(slab)
[   22.244884] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.245574] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.246261] page dumped because: kasan: bad access detected
[   22.246759] 
[   22.246899] Memory state around the buggy address:
[   22.247329]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.247972]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.248616] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.249258]                                               ^
[   22.249757]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.250400]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.251042] ==================================================================
[   22.323907] ==================================================================
[   22.324551] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   22.325347] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.326006] 
[   22.326148] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.326170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.326177] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.326185] Call trace:
[   22.326189]  show_stack+0x20/0x38 (C)
[   22.326203]  dump_stack_lvl+0x8c/0xd0
[   22.326216]  print_report+0x118/0x608
[   22.326228]  kasan_report+0xdc/0x128
[   22.326241]  kasan_check_range+0x100/0x1a8
[   22.326255]  __kasan_check_write+0x20/0x30
[   22.326269]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   22.326285]  kasan_bitops_generic+0x11c/0x1c8
[   22.326297]  kunit_try_run_case+0x170/0x3f0
[   22.326313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.326330]  kthread+0x328/0x630
[   22.326345]  ret_from_fork+0x10/0x20
[   22.326359] 
[   22.332699] Allocated by task 319:
[   22.333007]  kasan_save_stack+0x3c/0x68
[   22.333358]  kasan_save_track+0x20/0x40
[   22.333708]  kasan_save_alloc_info+0x40/0x58
[   22.334098]  __kasan_kmalloc+0xd4/0xd8
[   22.334442]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.334856]  kasan_bitops_generic+0xa0/0x1c8
[   22.335245]  kunit_try_run_case+0x170/0x3f0
[   22.335628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.336125]  kthread+0x328/0x630
[   22.336425]  ret_from_fork+0x10/0x20
[   22.336754] 
[   22.336894] The buggy address belongs to the object at ffff00000a7446c0
[   22.336894]  which belongs to the cache kmalloc-16 of size 16
[   22.337984] The buggy address is located 8 bytes inside of
[   22.337984]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.339069] 
[   22.339209] The buggy address belongs to the physical page:
[   22.339706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.340404] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.340989] page_type: f5(slab)
[   22.341280] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.341971] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.342658] page dumped because: kasan: bad access detected
[   22.343156] 
[   22.343296] Memory state around the buggy address:
[   22.343726]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.344369]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.345013] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.345655]                                               ^
[   22.346154]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.346797]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.347439] ==================================================================
[   22.372155] ==================================================================
[   22.372794] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   22.373583] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.374229] 
[   22.374366] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.374381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.374385] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.374390] Call trace:
[   22.374394]  show_stack+0x20/0x38 (C)
[   22.374403]  dump_stack_lvl+0x8c/0xd0
[   22.374411]  print_report+0x118/0x608
[   22.374420]  kasan_report+0xdc/0x128
[   22.374428]  __asan_report_load8_noabort+0x20/0x30
[   22.374439]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   22.374449]  kasan_bitops_generic+0x11c/0x1c8
[   22.374457]  kunit_try_run_case+0x170/0x3f0
[   22.374467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.374479]  kthread+0x328/0x630
[   22.374489]  ret_from_fork+0x10/0x20
[   22.374499] 
[   22.380517] Allocated by task 319:
[   22.380822]  kasan_save_stack+0x3c/0x68
[   22.381166]  kasan_save_track+0x20/0x40
[   22.381509]  kasan_save_alloc_info+0x40/0x58
[   22.381892]  __kasan_kmalloc+0xd4/0xd8
[   22.382229]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.382636]  kasan_bitops_generic+0xa0/0x1c8
[   22.383018]  kunit_try_run_case+0x170/0x3f0
[   22.383394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.383883]  kthread+0x328/0x630
[   22.384176]  ret_from_fork+0x10/0x20
[   22.384498] 
[   22.384635] The buggy address belongs to the object at ffff00000a7446c0
[   22.384635]  which belongs to the cache kmalloc-16 of size 16
[   22.385717] The buggy address is located 8 bytes inside of
[   22.385717]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.386794] 
[   22.386932] The buggy address belongs to the physical page:
[   22.387424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.388116] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.388693] page_type: f5(slab)
[   22.388978] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.389662] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.390343] page dumped because: kasan: bad access detected
[   22.390835] 
[   22.390973] Memory state around the buggy address:
[   22.391399]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.392036]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.392672] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.393310]                                               ^
[   22.393804]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.394442]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.395077] ==================================================================
[   22.299984] ==================================================================
[   22.300629] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   22.301426] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.302079] 
[   22.302221] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.302243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.302250] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.302258] Call trace:
[   22.302262]  show_stack+0x20/0x38 (C)
[   22.302276]  dump_stack_lvl+0x8c/0xd0
[   22.302290]  print_report+0x118/0x608
[   22.302302]  kasan_report+0xdc/0x128
[   22.302315]  __asan_report_load8_noabort+0x20/0x30
[   22.302331]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   22.302346]  kasan_bitops_generic+0x11c/0x1c8
[   22.302358]  kunit_try_run_case+0x170/0x3f0
[   22.302374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.302392]  kthread+0x328/0x630
[   22.302407]  ret_from_fork+0x10/0x20
[   22.302421] 
[   22.308463] Allocated by task 319:
[   22.308772]  kasan_save_stack+0x3c/0x68
[   22.309123]  kasan_save_track+0x20/0x40
[   22.309473]  kasan_save_alloc_info+0x40/0x58
[   22.309864]  __kasan_kmalloc+0xd4/0xd8
[   22.310206]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.310620]  kasan_bitops_generic+0xa0/0x1c8
[   22.311007]  kunit_try_run_case+0x170/0x3f0
[   22.311390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.311887]  kthread+0x328/0x630
[   22.312187]  ret_from_fork+0x10/0x20
[   22.312515] 
[   22.312656] The buggy address belongs to the object at ffff00000a7446c0
[   22.312656]  which belongs to the cache kmalloc-16 of size 16
[   22.313746] The buggy address is located 8 bytes inside of
[   22.313746]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.314830] 
[   22.314970] The buggy address belongs to the physical page:
[   22.315467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.316165] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.316750] page_type: f5(slab)
[   22.317039] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.317728] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.318417] page dumped because: kasan: bad access detected
[   22.318915] 
[   22.319055] Memory state around the buggy address:
[   22.319484]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.320128]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.320771] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.321412]                                               ^
[   22.321911]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.322555]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.323196] ==================================================================
[   22.275717] ==================================================================
[   22.276363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   22.277162] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.277822] 
[   22.277965] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.277988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.277994] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.278001] Call trace:
[   22.278007]  show_stack+0x20/0x38 (C)
[   22.278021]  dump_stack_lvl+0x8c/0xd0
[   22.278034]  print_report+0x118/0x608
[   22.278048]  kasan_report+0xdc/0x128
[   22.278060]  kasan_check_range+0x100/0x1a8
[   22.278074]  __kasan_check_write+0x20/0x30
[   22.278088]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   22.278103]  kasan_bitops_generic+0x11c/0x1c8
[   22.278115]  kunit_try_run_case+0x170/0x3f0
[   22.278131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.278149]  kthread+0x328/0x630
[   22.278164]  ret_from_fork+0x10/0x20
[   22.278178] 
[   22.284518] Allocated by task 319:
[   22.284827]  kasan_save_stack+0x3c/0x68
[   22.285177]  kasan_save_track+0x20/0x40
[   22.285525]  kasan_save_alloc_info+0x40/0x58
[   22.285916]  __kasan_kmalloc+0xd4/0xd8
[   22.286257]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.286674]  kasan_bitops_generic+0xa0/0x1c8
[   22.287062]  kunit_try_run_case+0x170/0x3f0
[   22.287445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.287942]  kthread+0x328/0x630
[   22.288241]  ret_from_fork+0x10/0x20
[   22.288570] 
[   22.288710] The buggy address belongs to the object at ffff00000a7446c0
[   22.288710]  which belongs to the cache kmalloc-16 of size 16
[   22.289800] The buggy address is located 8 bytes inside of
[   22.289800]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.290883] 
[   22.291023] The buggy address belongs to the physical page:
[   22.291521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.292219] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.292803] page_type: f5(slab)
[   22.293093] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.293783] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.294469] page dumped because: kasan: bad access detected
[   22.294967] 
[   22.295107] Memory state around the buggy address:
[   22.295537]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.296181]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.296824] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.297466]                                               ^
[   22.297965]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.298608]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.299250] ==================================================================
[   22.348145] ==================================================================
[   22.348790] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   22.349586] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.350239] 
[   22.350381] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.350403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.350410] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.350417] Call trace:
[   22.350422]  show_stack+0x20/0x38 (C)
[   22.350435]  dump_stack_lvl+0x8c/0xd0
[   22.350448]  print_report+0x118/0x608
[   22.350461]  kasan_report+0xdc/0x128
[   22.350474]  __asan_report_load8_noabort+0x20/0x30
[   22.350489]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   22.350504]  kasan_bitops_generic+0x11c/0x1c8
[   22.350516]  kunit_try_run_case+0x170/0x3f0
[   22.350531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.350549]  kthread+0x328/0x630
[   22.350564]  ret_from_fork+0x10/0x20
[   22.350578] 
[   22.356620] Allocated by task 319:
[   22.356928]  kasan_save_stack+0x3c/0x68
[   22.357279]  kasan_save_track+0x20/0x40
[   22.357629]  kasan_save_alloc_info+0x40/0x58
[   22.358020]  __kasan_kmalloc+0xd4/0xd8
[   22.358362]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.358776]  kasan_bitops_generic+0xa0/0x1c8
[   22.359164]  kunit_try_run_case+0x170/0x3f0
[   22.359547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.360044]  kthread+0x328/0x630
[   22.360344]  ret_from_fork+0x10/0x20
[   22.360672] 
[   22.360814] The buggy address belongs to the object at ffff00000a7446c0
[   22.360814]  which belongs to the cache kmalloc-16 of size 16
[   22.361904] The buggy address is located 8 bytes inside of
[   22.361904]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.362989] 
[   22.363129] The buggy address belongs to the physical page:
[   22.363626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.364325] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.364908] page_type: f5(slab)
[   22.365198] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.365888] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.366576] page dumped because: kasan: bad access detected
[   22.367074] 
[   22.367215] Memory state around the buggy address:
[   22.367644]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.368288]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.368932] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.369573]                                               ^
[   22.370073]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.370716]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.371357] ==================================================================
[   22.251755] ==================================================================
[   22.252400] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   22.253196] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.253849] 
[   22.253991] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.254013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.254019] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.254027] Call trace:
[   22.254032]  show_stack+0x20/0x38 (C)
[   22.254045]  dump_stack_lvl+0x8c/0xd0
[   22.254058]  print_report+0x118/0x608
[   22.254071]  kasan_report+0xdc/0x128
[   22.254083]  __asan_report_load8_noabort+0x20/0x30
[   22.254099]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   22.254114]  kasan_bitops_generic+0x11c/0x1c8
[   22.254126]  kunit_try_run_case+0x170/0x3f0
[   22.254141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.254159]  kthread+0x328/0x630
[   22.254174]  ret_from_fork+0x10/0x20
[   22.254188] 
[   22.260229] Allocated by task 319:
[   22.260537]  kasan_save_stack+0x3c/0x68
[   22.260889]  kasan_save_track+0x20/0x40
[   22.261239]  kasan_save_alloc_info+0x40/0x58
[   22.261629]  __kasan_kmalloc+0xd4/0xd8
[   22.261971]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.262385]  kasan_bitops_generic+0xa0/0x1c8
[   22.262772]  kunit_try_run_case+0x170/0x3f0
[   22.263154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.263652]  kthread+0x328/0x630
[   22.263951]  ret_from_fork+0x10/0x20
[   22.264279] 
[   22.264420] The buggy address belongs to the object at ffff00000a7446c0
[   22.264420]  which belongs to the cache kmalloc-16 of size 16
[   22.265510] The buggy address is located 8 bytes inside of
[   22.265510]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.266593] 
[   22.266733] The buggy address belongs to the physical page:
[   22.267230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.267928] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.268512] page_type: f5(slab)
[   22.268803] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.269493] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.270180] page dumped because: kasan: bad access detected
[   22.270678] 
[   22.270818] Memory state around the buggy address:
[   22.271247]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.271891]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.272534] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.273176]                                               ^
[   22.273676]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.274320]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.274962] ==================================================================
[   22.178781] ==================================================================
[   22.179434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   22.180232] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.180902] 
[   22.181052] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.181084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.181093] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.181103] Call trace:
[   22.181110]  show_stack+0x20/0x38 (C)
[   22.181131]  dump_stack_lvl+0x8c/0xd0
[   22.181150]  print_report+0x118/0x608
[   22.181169]  kasan_report+0xdc/0x128
[   22.181187]  kasan_check_range+0x100/0x1a8
[   22.181207]  __kasan_check_write+0x20/0x30
[   22.181229]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   22.181250]  kasan_bitops_generic+0x11c/0x1c8
[   22.181269]  kunit_try_run_case+0x170/0x3f0
[   22.181291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.181316]  kthread+0x328/0x630
[   22.181338]  ret_from_fork+0x10/0x20
[   22.181359] 
[   22.187727] Allocated by task 319:
[   22.188043]  kasan_save_stack+0x3c/0x68
[   22.188402]  kasan_save_track+0x20/0x40
[   22.188761]  kasan_save_alloc_info+0x40/0x58
[   22.189160]  __kasan_kmalloc+0xd4/0xd8
[   22.189510]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.189936]  kasan_bitops_generic+0xa0/0x1c8
[   22.190332]  kunit_try_run_case+0x170/0x3f0
[   22.190726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.191235]  kthread+0x328/0x630
[   22.191544]  ret_from_fork+0x10/0x20
[   22.191882] 
[   22.192028] The buggy address belongs to the object at ffff00000a7446c0
[   22.192028]  which belongs to the cache kmalloc-16 of size 16
[   22.193129] The buggy address is located 8 bytes inside of
[   22.193129]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.194226] 
[   22.194372] The buggy address belongs to the physical page:
[   22.194875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.195583] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.196178] page_type: f5(slab)
[   22.196475] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.197176] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.197872] page dumped because: kasan: bad access detected
[   22.198376] 
[   22.198520] Memory state around the buggy address:
[   22.198957]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.199610]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.200263] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.200913]                                               ^
[   22.201419]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.202071]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.202720] ==================================================================
[   22.203570] ==================================================================
[   22.204216] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   22.205013] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.205665] 
[   22.205808] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.205830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.205837] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.205844] Call trace:
[   22.205850]  show_stack+0x20/0x38 (C)
[   22.205863]  dump_stack_lvl+0x8c/0xd0
[   22.205876]  print_report+0x118/0x608
[   22.205889]  kasan_report+0xdc/0x128
[   22.205902]  __asan_report_load8_noabort+0x20/0x30
[   22.205917]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   22.205932]  kasan_bitops_generic+0x11c/0x1c8
[   22.205945]  kunit_try_run_case+0x170/0x3f0
[   22.205960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.205978]  kthread+0x328/0x630
[   22.205993]  ret_from_fork+0x10/0x20
[   22.206007] 
[   22.212049] Allocated by task 319:
[   22.212358]  kasan_save_stack+0x3c/0x68
[   22.212709]  kasan_save_track+0x20/0x40
[   22.213059]  kasan_save_alloc_info+0x40/0x58
[   22.213450]  __kasan_kmalloc+0xd4/0xd8
[   22.213791]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.214206]  kasan_bitops_generic+0xa0/0x1c8
[   22.214593]  kunit_try_run_case+0x170/0x3f0
[   22.214976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.215473]  kthread+0x328/0x630
[   22.215773]  ret_from_fork+0x10/0x20
[   22.216101] 
[   22.216242] The buggy address belongs to the object at ffff00000a7446c0
[   22.216242]  which belongs to the cache kmalloc-16 of size 16
[   22.217332] The buggy address is located 8 bytes inside of
[   22.217332]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.218417] 
[   22.218558] The buggy address belongs to the physical page:
[   22.219055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.219753] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.220338] page_type: f5(slab)
[   22.220629] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.221319] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.222006] page dumped because: kasan: bad access detected
[   22.222503] 
[   22.222644] Memory state around the buggy address:
[   22.223074]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.223717]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.224361] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.225003]                                               ^
[   22.225502]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.226144]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.226786] ==================================================================