Hay
Date
June 2, 2025, 2:11 p.m.

Environment
e850-96
qemu-x86_64

[   42.737527] ==================================================================
[   42.744626] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   42.753565] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   42.760857] 
[   42.762336] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   42.762382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.762398] Hardware name: WinLink E850-96 board (DT)
[   42.762416] Call trace:
[   42.762430]  show_stack+0x20/0x38 (C)
[   42.762461]  dump_stack_lvl+0x8c/0xd0
[   42.762492]  print_report+0x118/0x608
[   42.762521]  kasan_report+0xdc/0x128
[   42.762551]  __asan_report_load8_noabort+0x20/0x30
[   42.762585]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   42.762619]  kasan_bitops_generic+0x11c/0x1c8
[   42.762648]  kunit_try_run_case+0x170/0x3f0
[   42.762678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.762718]  kthread+0x328/0x630
[   42.762747]  ret_from_fork+0x10/0x20
[   42.762778] 
[   42.831429] Allocated by task 308:
[   42.834815]  kasan_save_stack+0x3c/0x68
[   42.838633]  kasan_save_track+0x20/0x40
[   42.842453]  kasan_save_alloc_info+0x40/0x58
[   42.846706]  __kasan_kmalloc+0xd4/0xd8
[   42.850439]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.854953]  kasan_bitops_generic+0xa0/0x1c8
[   42.859206]  kunit_try_run_case+0x170/0x3f0
[   42.863373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.868841]  kthread+0x328/0x630
[   42.872053]  ret_from_fork+0x10/0x20
[   42.875612] 
[   42.877087] The buggy address belongs to the object at ffff0008037171e0
[   42.877087]  which belongs to the cache kmalloc-16 of size 16
[   42.889414] The buggy address is located 8 bytes inside of
[   42.889414]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   42.901653] 
[   42.903129] The buggy address belongs to the physical page:
[   42.908685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   42.916671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.923182] page_type: f5(slab)
[   42.926315] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.934038] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.941757] page dumped because: kasan: bad access detected
[   42.947312] 
[   42.948788] Memory state around the buggy address:
[   42.953566]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   42.960771]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   42.967975] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   42.975177]                                                           ^
[   42.981777]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.988982]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.996183] ==================================================================
[   43.538960] ==================================================================
[   43.546003] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   43.554942] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   43.562320] 
[   43.563801] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   43.563848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.563864] Hardware name: WinLink E850-96 board (DT)
[   43.563883] Call trace:
[   43.563895]  show_stack+0x20/0x38 (C)
[   43.563926]  dump_stack_lvl+0x8c/0xd0
[   43.563957]  print_report+0x118/0x608
[   43.563986]  kasan_report+0xdc/0x128
[   43.564014]  kasan_check_range+0x100/0x1a8
[   43.564044]  __kasan_check_write+0x20/0x30
[   43.564076]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   43.564109]  kasan_bitops_generic+0x11c/0x1c8
[   43.564137]  kunit_try_run_case+0x170/0x3f0
[   43.564169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.564207]  kthread+0x328/0x630
[   43.564238]  ret_from_fork+0x10/0x20
[   43.564269] 
[   43.636277] Allocated by task 308:
[   43.639665]  kasan_save_stack+0x3c/0x68
[   43.643482]  kasan_save_track+0x20/0x40
[   43.647302]  kasan_save_alloc_info+0x40/0x58
[   43.651555]  __kasan_kmalloc+0xd4/0xd8
[   43.655288]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.659802]  kasan_bitops_generic+0xa0/0x1c8
[   43.664055]  kunit_try_run_case+0x170/0x3f0
[   43.668222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.673690]  kthread+0x328/0x630
[   43.676902]  ret_from_fork+0x10/0x20
[   43.680461] 
[   43.681937] The buggy address belongs to the object at ffff0008037171e0
[   43.681937]  which belongs to the cache kmalloc-16 of size 16
[   43.694263] The buggy address is located 8 bytes inside of
[   43.694263]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   43.706502] 
[   43.707978] The buggy address belongs to the physical page:
[   43.713535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   43.721521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.728030] page_type: f5(slab)
[   43.731162] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.738887] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.746606] page dumped because: kasan: bad access detected
[   43.752161] 
[   43.753637] Memory state around the buggy address:
[   43.758415]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   43.765620]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   43.772824] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   43.780025]                                                           ^
[   43.786626]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.793831]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.801032] ==================================================================
[   44.074342] ==================================================================
[   44.081411] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   44.090351] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   44.097642] 
[   44.099123] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   44.099169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.099185] Hardware name: WinLink E850-96 board (DT)
[   44.099206] Call trace:
[   44.099218]  show_stack+0x20/0x38 (C)
[   44.099249]  dump_stack_lvl+0x8c/0xd0
[   44.099279]  print_report+0x118/0x608
[   44.099308]  kasan_report+0xdc/0x128
[   44.099336]  __asan_report_load8_noabort+0x20/0x30
[   44.099371]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   44.099404]  kasan_bitops_generic+0x11c/0x1c8
[   44.099433]  kunit_try_run_case+0x170/0x3f0
[   44.099467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.099504]  kthread+0x328/0x630
[   44.099536]  ret_from_fork+0x10/0x20
[   44.099567] 
[   44.168214] Allocated by task 308:
[   44.171600]  kasan_save_stack+0x3c/0x68
[   44.175419]  kasan_save_track+0x20/0x40
[   44.179238]  kasan_save_alloc_info+0x40/0x58
[   44.183492]  __kasan_kmalloc+0xd4/0xd8
[   44.187224]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.191738]  kasan_bitops_generic+0xa0/0x1c8
[   44.195992]  kunit_try_run_case+0x170/0x3f0
[   44.200158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.205627]  kthread+0x328/0x630
[   44.208839]  ret_from_fork+0x10/0x20
[   44.212398] 
[   44.213873] The buggy address belongs to the object at ffff0008037171e0
[   44.213873]  which belongs to the cache kmalloc-16 of size 16
[   44.226200] The buggy address is located 8 bytes inside of
[   44.226200]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   44.238439] 
[   44.239915] The buggy address belongs to the physical page:
[   44.245471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   44.253458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.259966] page_type: f5(slab)
[   44.263100] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.270823] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.278542] page dumped because: kasan: bad access detected
[   44.284098] 
[   44.285573] Memory state around the buggy address:
[   44.290351]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   44.297556]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   44.304761] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   44.311962]                                                           ^
[   44.318562]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.325768]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.332968] ==================================================================
[   43.808380] ==================================================================
[   43.815443] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   43.824383] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   43.831674] 
[   43.833154] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   43.833200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.833216] Hardware name: WinLink E850-96 board (DT)
[   43.833235] Call trace:
[   43.833247]  show_stack+0x20/0x38 (C)
[   43.833277]  dump_stack_lvl+0x8c/0xd0
[   43.833310]  print_report+0x118/0x608
[   43.833339]  kasan_report+0xdc/0x128
[   43.833366]  __asan_report_load8_noabort+0x20/0x30
[   43.833400]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   43.833435]  kasan_bitops_generic+0x11c/0x1c8
[   43.833462]  kunit_try_run_case+0x170/0x3f0
[   43.833494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.833532]  kthread+0x328/0x630
[   43.833564]  ret_from_fork+0x10/0x20
[   43.833597] 
[   43.902246] Allocated by task 308:
[   43.905633]  kasan_save_stack+0x3c/0x68
[   43.909451]  kasan_save_track+0x20/0x40
[   43.913270]  kasan_save_alloc_info+0x40/0x58
[   43.917523]  __kasan_kmalloc+0xd4/0xd8
[   43.921256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.925770]  kasan_bitops_generic+0xa0/0x1c8
[   43.930023]  kunit_try_run_case+0x170/0x3f0
[   43.934190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.939659]  kthread+0x328/0x630
[   43.942870]  ret_from_fork+0x10/0x20
[   43.946429] 
[   43.947905] The buggy address belongs to the object at ffff0008037171e0
[   43.947905]  which belongs to the cache kmalloc-16 of size 16
[   43.960231] The buggy address is located 8 bytes inside of
[   43.960231]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   43.972470] 
[   43.973946] The buggy address belongs to the physical page:
[   43.979502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   43.987489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.993998] page_type: f5(slab)
[   43.997131] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.004855] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.012574] page dumped because: kasan: bad access detected
[   44.018129] 
[   44.019605] Memory state around the buggy address:
[   44.024384]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   44.031588]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   44.038792] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   44.045994]                                                           ^
[   44.052594]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.059799]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.067000] ==================================================================
[   42.468115] ==================================================================
[   42.475185] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   42.484125] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   42.491503] 
[   42.492983] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   42.493029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.493044] Hardware name: WinLink E850-96 board (DT)
[   42.493063] Call trace:
[   42.493075]  show_stack+0x20/0x38 (C)
[   42.493107]  dump_stack_lvl+0x8c/0xd0
[   42.493138]  print_report+0x118/0x608
[   42.493166]  kasan_report+0xdc/0x128
[   42.493195]  kasan_check_range+0x100/0x1a8
[   42.493227]  __kasan_check_write+0x20/0x30
[   42.493258]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   42.493290]  kasan_bitops_generic+0x11c/0x1c8
[   42.493319]  kunit_try_run_case+0x170/0x3f0
[   42.493349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.493386]  kthread+0x328/0x630
[   42.493417]  ret_from_fork+0x10/0x20
[   42.493448] 
[   42.565460] Allocated by task 308:
[   42.568846]  kasan_save_stack+0x3c/0x68
[   42.572665]  kasan_save_track+0x20/0x40
[   42.576485]  kasan_save_alloc_info+0x40/0x58
[   42.580738]  __kasan_kmalloc+0xd4/0xd8
[   42.584470]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.588984]  kasan_bitops_generic+0xa0/0x1c8
[   42.593238]  kunit_try_run_case+0x170/0x3f0
[   42.597404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.602873]  kthread+0x328/0x630
[   42.606085]  ret_from_fork+0x10/0x20
[   42.609644] 
[   42.611119] The buggy address belongs to the object at ffff0008037171e0
[   42.611119]  which belongs to the cache kmalloc-16 of size 16
[   42.623446] The buggy address is located 8 bytes inside of
[   42.623446]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   42.635685] 
[   42.637161] The buggy address belongs to the physical page:
[   42.642717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   42.650704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.657214] page_type: f5(slab)
[   42.660347] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.668070] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.675789] page dumped because: kasan: bad access detected
[   42.681344] 
[   42.682820] Memory state around the buggy address:
[   42.687598]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   42.694802]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   42.702007] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   42.709208]                                                           ^
[   42.715809]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.723014]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.730215] ==================================================================
[   42.202156] ==================================================================
[   42.209217] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   42.218157] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   42.225448] 
[   42.226930] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   42.226978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.226997] Hardware name: WinLink E850-96 board (DT)
[   42.227012] Call trace:
[   42.227022]  show_stack+0x20/0x38 (C)
[   42.227050]  dump_stack_lvl+0x8c/0xd0
[   42.227083]  print_report+0x118/0x608
[   42.227110]  kasan_report+0xdc/0x128
[   42.227140]  __asan_report_load8_noabort+0x20/0x30
[   42.227172]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   42.227205]  kasan_bitops_generic+0x11c/0x1c8
[   42.227232]  kunit_try_run_case+0x170/0x3f0
[   42.227263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.227300]  kthread+0x328/0x630
[   42.227330]  ret_from_fork+0x10/0x20
[   42.227359] 
[   42.296020] Allocated by task 308:
[   42.299407]  kasan_save_stack+0x3c/0x68
[   42.303225]  kasan_save_track+0x20/0x40
[   42.307044]  kasan_save_alloc_info+0x40/0x58
[   42.311298]  __kasan_kmalloc+0xd4/0xd8
[   42.315030]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.319544]  kasan_bitops_generic+0xa0/0x1c8
[   42.323797]  kunit_try_run_case+0x170/0x3f0
[   42.327964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.333433]  kthread+0x328/0x630
[   42.336644]  ret_from_fork+0x10/0x20
[   42.340203] 
[   42.341679] The buggy address belongs to the object at ffff0008037171e0
[   42.341679]  which belongs to the cache kmalloc-16 of size 16
[   42.354006] The buggy address is located 8 bytes inside of
[   42.354006]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   42.366245] 
[   42.367720] The buggy address belongs to the physical page:
[   42.373279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   42.381263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.387773] page_type: f5(slab)
[   42.390907] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.398629] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.406348] page dumped because: kasan: bad access detected
[   42.411904] 
[   42.413379] Memory state around the buggy address:
[   42.418157]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   42.425362]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   42.432567] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   42.439768]                                                           ^
[   42.446368]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.453573]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.460775] ==================================================================
[   43.003551] ==================================================================
[   43.010594] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   43.019534] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   43.026912] 
[   43.028393] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   43.028439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.028457] Hardware name: WinLink E850-96 board (DT)
[   43.028476] Call trace:
[   43.028486]  show_stack+0x20/0x38 (C)
[   43.028519]  dump_stack_lvl+0x8c/0xd0
[   43.028549]  print_report+0x118/0x608
[   43.028579]  kasan_report+0xdc/0x128
[   43.028608]  kasan_check_range+0x100/0x1a8
[   43.028639]  __kasan_check_write+0x20/0x30
[   43.028671]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   43.028705]  kasan_bitops_generic+0x11c/0x1c8
[   43.028733]  kunit_try_run_case+0x170/0x3f0
[   43.028767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.028804]  kthread+0x328/0x630
[   43.028836]  ret_from_fork+0x10/0x20
[   43.028866] 
[   43.100869] Allocated by task 308:
[   43.104256]  kasan_save_stack+0x3c/0x68
[   43.108074]  kasan_save_track+0x20/0x40
[   43.111893]  kasan_save_alloc_info+0x40/0x58
[   43.116147]  __kasan_kmalloc+0xd4/0xd8
[   43.119879]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.124393]  kasan_bitops_generic+0xa0/0x1c8
[   43.128646]  kunit_try_run_case+0x170/0x3f0
[   43.132813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.138282]  kthread+0x328/0x630
[   43.141493]  ret_from_fork+0x10/0x20
[   43.145053] 
[   43.146528] The buggy address belongs to the object at ffff0008037171e0
[   43.146528]  which belongs to the cache kmalloc-16 of size 16
[   43.158854] The buggy address is located 8 bytes inside of
[   43.158854]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   43.171094] 
[   43.172570] The buggy address belongs to the physical page:
[   43.178127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   43.186113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.192622] page_type: f5(slab)
[   43.195756] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.203478] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.211197] page dumped because: kasan: bad access detected
[   43.216753] 
[   43.218228] Memory state around the buggy address:
[   43.223006]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   43.230211]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   43.237415] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   43.244617]                                                           ^
[   43.251217]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.258422]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.265623] ==================================================================
[   41.932920] ==================================================================
[   41.939950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   41.948803] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   41.956181] 
[   41.957662] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   41.957709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.957726] Hardware name: WinLink E850-96 board (DT)
[   41.957747] Call trace:
[   41.957759]  show_stack+0x20/0x38 (C)
[   41.957792]  dump_stack_lvl+0x8c/0xd0
[   41.957823]  print_report+0x118/0x608
[   41.957852]  kasan_report+0xdc/0x128
[   41.957882]  kasan_check_range+0x100/0x1a8
[   41.957912]  __kasan_check_write+0x20/0x30
[   41.957943]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   41.957977]  kasan_bitops_generic+0x11c/0x1c8
[   41.958005]  kunit_try_run_case+0x170/0x3f0
[   41.958037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.958074]  kthread+0x328/0x630
[   41.958107]  ret_from_fork+0x10/0x20
[   41.958139] 
[   42.030052] Allocated by task 308:
[   42.033439]  kasan_save_stack+0x3c/0x68
[   42.037257]  kasan_save_track+0x20/0x40
[   42.041076]  kasan_save_alloc_info+0x40/0x58
[   42.045329]  __kasan_kmalloc+0xd4/0xd8
[   42.049062]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.053575]  kasan_bitops_generic+0xa0/0x1c8
[   42.057829]  kunit_try_run_case+0x170/0x3f0
[   42.061995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.067464]  kthread+0x328/0x630
[   42.070676]  ret_from_fork+0x10/0x20
[   42.074235] 
[   42.075711] The buggy address belongs to the object at ffff0008037171e0
[   42.075711]  which belongs to the cache kmalloc-16 of size 16
[   42.088037] The buggy address is located 8 bytes inside of
[   42.088037]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   42.100276] 
[   42.101752] The buggy address belongs to the physical page:
[   42.107310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   42.115295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.121805] page_type: f5(slab)
[   42.124938] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.132661] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.140380] page dumped because: kasan: bad access detected
[   42.145935] 
[   42.147411] Memory state around the buggy address:
[   42.152190]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   42.159394]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   42.166598] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   42.173800]                                                           ^
[   42.180400]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.187605]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.194806] ==================================================================
[   43.272967] ==================================================================
[   43.280034] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   43.288974] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   43.296266] 
[   43.297745] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   43.297790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.297804] Hardware name: WinLink E850-96 board (DT)
[   43.297823] Call trace:
[   43.297834]  show_stack+0x20/0x38 (C)
[   43.297863]  dump_stack_lvl+0x8c/0xd0
[   43.297895]  print_report+0x118/0x608
[   43.297921]  kasan_report+0xdc/0x128
[   43.297949]  __asan_report_load8_noabort+0x20/0x30
[   43.297982]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   43.298016]  kasan_bitops_generic+0x11c/0x1c8
[   43.298046]  kunit_try_run_case+0x170/0x3f0
[   43.298080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.298117]  kthread+0x328/0x630
[   43.298148]  ret_from_fork+0x10/0x20
[   43.298178] 
[   43.366837] Allocated by task 308:
[   43.370223]  kasan_save_stack+0x3c/0x68
[   43.374042]  kasan_save_track+0x20/0x40
[   43.377861]  kasan_save_alloc_info+0x40/0x58
[   43.382115]  __kasan_kmalloc+0xd4/0xd8
[   43.385847]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.390361]  kasan_bitops_generic+0xa0/0x1c8
[   43.394614]  kunit_try_run_case+0x170/0x3f0
[   43.398781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.404250]  kthread+0x328/0x630
[   43.407461]  ret_from_fork+0x10/0x20
[   43.411021] 
[   43.412496] The buggy address belongs to the object at ffff0008037171e0
[   43.412496]  which belongs to the cache kmalloc-16 of size 16
[   43.424823] The buggy address is located 8 bytes inside of
[   43.424823]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   43.437062] 
[   43.438538] The buggy address belongs to the physical page:
[   43.444094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   43.452080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.458591] page_type: f5(slab)
[   43.461724] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.469446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.477165] page dumped because: kasan: bad access detected
[   43.482721] 
[   43.484196] Memory state around the buggy address:
[   43.488974]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   43.496179]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   43.503384] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   43.510585]                                                           ^
[   43.517185]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.524390]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.531592] ==================================================================

[   19.672835] ==================================================================
[   19.673543] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   19.673958] Read of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.674609] 
[   19.675147] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.675269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.675300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.675348] Call Trace:
[   19.675391]  <TASK>
[   19.675433]  dump_stack_lvl+0x73/0xb0
[   19.675507]  print_report+0xd1/0x650
[   19.675555]  ? __virt_addr_valid+0x1db/0x2d0
[   19.675605]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   19.675663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.675708]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   19.675768]  kasan_report+0x141/0x180
[   19.675819]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   19.675874]  __asan_report_load8_noabort+0x18/0x20
[   19.675919]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   19.675968]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.676016]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.676065]  ? trace_hardirqs_on+0x37/0xe0
[   19.676150]  ? kasan_bitops_generic+0x92/0x1c0
[   19.676192]  kasan_bitops_generic+0x121/0x1c0
[   19.676217]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.676241]  ? __pfx_read_tsc+0x10/0x10
[   19.676266]  ? ktime_get_ts64+0x86/0x230
[   19.676296]  kunit_try_run_case+0x1a5/0x480
[   19.676324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.676347]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.676374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.676399]  ? __kthread_parkme+0x82/0x180
[   19.676425]  ? preempt_count_sub+0x50/0x80
[   19.676453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.676479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.676504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.676528]  kthread+0x337/0x6f0
[   19.676548]  ? trace_preempt_on+0x20/0xc0
[   19.676573]  ? __pfx_kthread+0x10/0x10
[   19.676593]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.676616]  ? calculate_sigpending+0x7b/0xa0
[   19.676640]  ? __pfx_kthread+0x10/0x10
[   19.676661]  ret_from_fork+0x41/0x80
[   19.676685]  ? __pfx_kthread+0x10/0x10
[   19.676705]  ret_from_fork_asm+0x1a/0x30
[   19.676740]  </TASK>
[   19.676779] 
[   19.686355] Allocated by task 282:
[   19.686733]  kasan_save_stack+0x45/0x70
[   19.688928]  kasan_save_track+0x18/0x40
[   19.689798]  kasan_save_alloc_info+0x3b/0x50
[   19.690192]  __kasan_kmalloc+0xb7/0xc0
[   19.690511]  __kmalloc_cache_noprof+0x189/0x420
[   19.690912]  kasan_bitops_generic+0x92/0x1c0
[   19.691309]  kunit_try_run_case+0x1a5/0x480
[   19.691687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.691932]  kthread+0x337/0x6f0
[   19.692131]  ret_from_fork+0x41/0x80
[   19.692322]  ret_from_fork_asm+0x1a/0x30
[   19.692513] 
[   19.692629] The buggy address belongs to the object at ffff888101d9a440
[   19.692629]  which belongs to the cache kmalloc-16 of size 16
[   19.693188] The buggy address is located 8 bytes inside of
[   19.693188]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.693600] 
[   19.693805] The buggy address belongs to the physical page:
[   19.694284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.694719] flags: 0x200000000000000(node=0|zone=2)
[   19.694962] page_type: f5(slab)
[   19.696139] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.696742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.697928] page dumped because: kasan: bad access detected
[   19.698197] 
[   19.698291] Memory state around the buggy address:
[   19.698489]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.698738]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.699308] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.699820]                                               ^
[   19.700293]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.700831]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.701281] ==================================================================
[   19.546217] ==================================================================
[   19.547289] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   19.548187] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.548915] 
[   19.549080] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.549171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.549187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.549212] Call Trace:
[   19.549238]  <TASK>
[   19.549264]  dump_stack_lvl+0x73/0xb0
[   19.549309]  print_report+0xd1/0x650
[   19.549337]  ? __virt_addr_valid+0x1db/0x2d0
[   19.549363]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   19.549390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.549415]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   19.549440]  kasan_report+0x141/0x180
[   19.549464]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   19.549495]  kasan_check_range+0x10c/0x1c0
[   19.549517]  __kasan_check_write+0x18/0x20
[   19.549539]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   19.549564]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.549591]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.549614]  ? trace_hardirqs_on+0x37/0xe0
[   19.549638]  ? kasan_bitops_generic+0x92/0x1c0
[   19.549665]  kasan_bitops_generic+0x121/0x1c0
[   19.549687]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.549711]  ? __pfx_read_tsc+0x10/0x10
[   19.549733]  ? ktime_get_ts64+0x86/0x230
[   19.549791]  kunit_try_run_case+0x1a5/0x480
[   19.549842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.549884]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.549929]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.549974]  ? __kthread_parkme+0x82/0x180
[   19.550023]  ? preempt_count_sub+0x50/0x80
[   19.550078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.550129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.550172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.550226]  kthread+0x337/0x6f0
[   19.550279]  ? trace_preempt_on+0x20/0xc0
[   19.550328]  ? __pfx_kthread+0x10/0x10
[   19.550372]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.550417]  ? calculate_sigpending+0x7b/0xa0
[   19.550466]  ? __pfx_kthread+0x10/0x10
[   19.550512]  ret_from_fork+0x41/0x80
[   19.550561]  ? __pfx_kthread+0x10/0x10
[   19.550597]  ret_from_fork_asm+0x1a/0x30
[   19.550657]  </TASK>
[   19.550676] 
[   19.564205] Allocated by task 282:
[   19.564530]  kasan_save_stack+0x45/0x70
[   19.564817]  kasan_save_track+0x18/0x40
[   19.565025]  kasan_save_alloc_info+0x3b/0x50
[   19.565236]  __kasan_kmalloc+0xb7/0xc0
[   19.565437]  __kmalloc_cache_noprof+0x189/0x420
[   19.565787]  kasan_bitops_generic+0x92/0x1c0
[   19.566216]  kunit_try_run_case+0x1a5/0x480
[   19.566611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.567077]  kthread+0x337/0x6f0
[   19.567403]  ret_from_fork+0x41/0x80
[   19.567775]  ret_from_fork_asm+0x1a/0x30
[   19.568173] 
[   19.568368] The buggy address belongs to the object at ffff888101d9a440
[   19.568368]  which belongs to the cache kmalloc-16 of size 16
[   19.569011] The buggy address is located 8 bytes inside of
[   19.569011]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.569486] 
[   19.569630] The buggy address belongs to the physical page:
[   19.570131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.570780] flags: 0x200000000000000(node=0|zone=2)
[   19.571269] page_type: f5(slab)
[   19.571614] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.572245] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.572857] page dumped because: kasan: bad access detected
[   19.573275] 
[   19.573465] Memory state around the buggy address:
[   19.573785]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.574162]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.574452] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.575047]                                               ^
[   19.575547]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.576082]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.576555] ==================================================================
[   19.512488] ==================================================================
[   19.512941] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   19.513678] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.514269] 
[   19.514534] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.514651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.514682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.514727] Call Trace:
[   19.514786]  <TASK>
[   19.514845]  dump_stack_lvl+0x73/0xb0
[   19.514929]  print_report+0xd1/0x650
[   19.514998]  ? __virt_addr_valid+0x1db/0x2d0
[   19.515056]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   19.515146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.515188]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   19.515220]  kasan_report+0x141/0x180
[   19.515246]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   19.515303]  kasan_check_range+0x10c/0x1c0
[   19.515342]  __kasan_check_write+0x18/0x20
[   19.515381]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   19.515431]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.515521]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.515569]  ? trace_hardirqs_on+0x37/0xe0
[   19.515613]  ? kasan_bitops_generic+0x92/0x1c0
[   19.515671]  kasan_bitops_generic+0x121/0x1c0
[   19.515760]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.515813]  ? __pfx_read_tsc+0x10/0x10
[   19.515862]  ? ktime_get_ts64+0x86/0x230
[   19.515925]  kunit_try_run_case+0x1a5/0x480
[   19.515972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.515998]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.516024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.516049]  ? __kthread_parkme+0x82/0x180
[   19.516073]  ? preempt_count_sub+0x50/0x80
[   19.516119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.516165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.516192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.516217]  kthread+0x337/0x6f0
[   19.516237]  ? trace_preempt_on+0x20/0xc0
[   19.516263]  ? __pfx_kthread+0x10/0x10
[   19.516284]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.516307]  ? calculate_sigpending+0x7b/0xa0
[   19.516333]  ? __pfx_kthread+0x10/0x10
[   19.516354]  ret_from_fork+0x41/0x80
[   19.516378]  ? __pfx_kthread+0x10/0x10
[   19.516398]  ret_from_fork_asm+0x1a/0x30
[   19.516433]  </TASK>
[   19.516451] 
[   19.531159] Allocated by task 282:
[   19.531475]  kasan_save_stack+0x45/0x70
[   19.531703]  kasan_save_track+0x18/0x40
[   19.532000]  kasan_save_alloc_info+0x3b/0x50
[   19.532295]  __kasan_kmalloc+0xb7/0xc0
[   19.532609]  __kmalloc_cache_noprof+0x189/0x420
[   19.533032]  kasan_bitops_generic+0x92/0x1c0
[   19.533417]  kunit_try_run_case+0x1a5/0x480
[   19.533973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.534470]  kthread+0x337/0x6f0
[   19.534785]  ret_from_fork+0x41/0x80
[   19.535084]  ret_from_fork_asm+0x1a/0x30
[   19.535504] 
[   19.535713] The buggy address belongs to the object at ffff888101d9a440
[   19.535713]  which belongs to the cache kmalloc-16 of size 16
[   19.536202] The buggy address is located 8 bytes inside of
[   19.536202]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.537192] 
[   19.537576] The buggy address belongs to the physical page:
[   19.537989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.538841] flags: 0x200000000000000(node=0|zone=2)
[   19.539178] page_type: f5(slab)
[   19.539391] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.539998] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.540475] page dumped because: kasan: bad access detected
[   19.540860] 
[   19.540986] Memory state around the buggy address:
[   19.541210]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.541958]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.542766] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.543092]                                               ^
[   19.543912]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544373]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544973] ==================================================================
[   19.477768] ==================================================================
[   19.478632] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   19.479121] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.479703] 
[   19.480150] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.480503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.480522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.480546] Call Trace:
[   19.480571]  <TASK>
[   19.480597]  dump_stack_lvl+0x73/0xb0
[   19.480644]  print_report+0xd1/0x650
[   19.480670]  ? __virt_addr_valid+0x1db/0x2d0
[   19.480698]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   19.480724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.480769]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   19.480800]  kasan_report+0x141/0x180
[   19.480825]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   19.480856]  kasan_check_range+0x10c/0x1c0
[   19.480879]  __kasan_check_write+0x18/0x20
[   19.480901]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   19.480927]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.480954]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.480977]  ? trace_hardirqs_on+0x37/0xe0
[   19.481003]  ? kasan_bitops_generic+0x92/0x1c0
[   19.481028]  kasan_bitops_generic+0x121/0x1c0
[   19.481051]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.481075]  ? __pfx_read_tsc+0x10/0x10
[   19.481098]  ? ktime_get_ts64+0x86/0x230
[   19.481144]  kunit_try_run_case+0x1a5/0x480
[   19.481175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.481199]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.481225]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.481249]  ? __kthread_parkme+0x82/0x180
[   19.481274]  ? preempt_count_sub+0x50/0x80
[   19.481301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.481327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.481351]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.481376]  kthread+0x337/0x6f0
[   19.481394]  ? trace_preempt_on+0x20/0xc0
[   19.481418]  ? __pfx_kthread+0x10/0x10
[   19.481438]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.481461]  ? calculate_sigpending+0x7b/0xa0
[   19.481485]  ? __pfx_kthread+0x10/0x10
[   19.481506]  ret_from_fork+0x41/0x80
[   19.481528]  ? __pfx_kthread+0x10/0x10
[   19.481548]  ret_from_fork_asm+0x1a/0x30
[   19.481582]  </TASK>
[   19.481597] 
[   19.497016] Allocated by task 282:
[   19.497498]  kasan_save_stack+0x45/0x70
[   19.497718]  kasan_save_track+0x18/0x40
[   19.497900]  kasan_save_alloc_info+0x3b/0x50
[   19.498522]  __kasan_kmalloc+0xb7/0xc0
[   19.498781]  __kmalloc_cache_noprof+0x189/0x420
[   19.498969]  kasan_bitops_generic+0x92/0x1c0
[   19.499668]  kunit_try_run_case+0x1a5/0x480
[   19.499951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.500723]  kthread+0x337/0x6f0
[   19.500932]  ret_from_fork+0x41/0x80
[   19.501484]  ret_from_fork_asm+0x1a/0x30
[   19.501680] 
[   19.502151] The buggy address belongs to the object at ffff888101d9a440
[   19.502151]  which belongs to the cache kmalloc-16 of size 16
[   19.503051] The buggy address is located 8 bytes inside of
[   19.503051]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.503710] 
[   19.503873] The buggy address belongs to the physical page:
[   19.504080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.505555] flags: 0x200000000000000(node=0|zone=2)
[   19.505872] page_type: f5(slab)
[   19.506343] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.506758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.507312] page dumped because: kasan: bad access detected
[   19.507636] 
[   19.507841] Memory state around the buggy address:
[   19.508219]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.508674]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.509126] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.509553]                                               ^
[   19.510030]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.510548]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.511076] ==================================================================
[   19.444722] ==================================================================
[   19.445095] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   19.445389] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.445948] 
[   19.446217] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.446375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.446405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.446454] Call Trace:
[   19.446499]  <TASK>
[   19.446543]  dump_stack_lvl+0x73/0xb0
[   19.446620]  print_report+0xd1/0x650
[   19.446675]  ? __virt_addr_valid+0x1db/0x2d0
[   19.446728]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   19.446798]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.446853]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   19.446905]  kasan_report+0x141/0x180
[   19.446943]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   19.446988]  kasan_check_range+0x10c/0x1c0
[   19.447022]  __kasan_check_write+0x18/0x20
[   19.447054]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   19.447094]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.447138]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.447176]  ? trace_hardirqs_on+0x37/0xe0
[   19.447218]  ? kasan_bitops_generic+0x92/0x1c0
[   19.447269]  kasan_bitops_generic+0x121/0x1c0
[   19.447310]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.447407]  ? __pfx_read_tsc+0x10/0x10
[   19.447471]  ? ktime_get_ts64+0x86/0x230
[   19.447529]  kunit_try_run_case+0x1a5/0x480
[   19.447588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.447648]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.447725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.447793]  ? __kthread_parkme+0x82/0x180
[   19.447840]  ? preempt_count_sub+0x50/0x80
[   19.447892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.447946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.447991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.448036]  kthread+0x337/0x6f0
[   19.448076]  ? trace_preempt_on+0x20/0xc0
[   19.448142]  ? __pfx_kthread+0x10/0x10
[   19.448187]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.448239]  ? calculate_sigpending+0x7b/0xa0
[   19.448291]  ? __pfx_kthread+0x10/0x10
[   19.448329]  ret_from_fork+0x41/0x80
[   19.448355]  ? __pfx_kthread+0x10/0x10
[   19.448377]  ret_from_fork_asm+0x1a/0x30
[   19.448414]  </TASK>
[   19.448431] 
[   19.462249] Allocated by task 282:
[   19.462577]  kasan_save_stack+0x45/0x70
[   19.462938]  kasan_save_track+0x18/0x40
[   19.463353]  kasan_save_alloc_info+0x3b/0x50
[   19.463607]  __kasan_kmalloc+0xb7/0xc0
[   19.463972]  __kmalloc_cache_noprof+0x189/0x420
[   19.464204]  kasan_bitops_generic+0x92/0x1c0
[   19.464599]  kunit_try_run_case+0x1a5/0x480
[   19.465194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.465566]  kthread+0x337/0x6f0
[   19.465776]  ret_from_fork+0x41/0x80
[   19.466134]  ret_from_fork_asm+0x1a/0x30
[   19.466531] 
[   19.466768] The buggy address belongs to the object at ffff888101d9a440
[   19.466768]  which belongs to the cache kmalloc-16 of size 16
[   19.467331] The buggy address is located 8 bytes inside of
[   19.467331]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.468365] 
[   19.468506] The buggy address belongs to the physical page:
[   19.469044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.469511] flags: 0x200000000000000(node=0|zone=2)
[   19.469775] page_type: f5(slab)
[   19.470095] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.470868] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.471342] page dumped because: kasan: bad access detected
[   19.471732] 
[   19.471951] Memory state around the buggy address:
[   19.472396]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.472672]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.473228] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.473783]                                               ^
[   19.474171]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.474595]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.475822] ==================================================================
[   19.401997] ==================================================================
[   19.402531] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   19.403383] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.403654] 
[   19.403887] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.403995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.404026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.404074] Call Trace:
[   19.404150]  <TASK>
[   19.404201]  dump_stack_lvl+0x73/0xb0
[   19.404274]  print_report+0xd1/0x650
[   19.404329]  ? __virt_addr_valid+0x1db/0x2d0
[   19.404378]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   19.404431]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.404484]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   19.404539]  kasan_report+0x141/0x180
[   19.404587]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   19.404656]  kasan_check_range+0x10c/0x1c0
[   19.404704]  __kasan_check_write+0x18/0x20
[   19.404762]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   19.404812]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.404861]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.404913]  ? trace_hardirqs_on+0x37/0xe0
[   19.404963]  ? kasan_bitops_generic+0x92/0x1c0
[   19.405012]  kasan_bitops_generic+0x121/0x1c0
[   19.405060]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.405142]  ? __pfx_read_tsc+0x10/0x10
[   19.405195]  ? ktime_get_ts64+0x86/0x230
[   19.405258]  kunit_try_run_case+0x1a5/0x480
[   19.405315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.405389]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.405440]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.405488]  ? __kthread_parkme+0x82/0x180
[   19.405527]  ? preempt_count_sub+0x50/0x80
[   19.405575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.405626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.405674]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.405758]  kthread+0x337/0x6f0
[   19.405800]  ? trace_preempt_on+0x20/0xc0
[   19.405860]  ? __pfx_kthread+0x10/0x10
[   19.405902]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.405946]  ? calculate_sigpending+0x7b/0xa0
[   19.405992]  ? __pfx_kthread+0x10/0x10
[   19.406037]  ret_from_fork+0x41/0x80
[   19.406086]  ? __pfx_kthread+0x10/0x10
[   19.406168]  ret_from_fork_asm+0x1a/0x30
[   19.406244]  </TASK>
[   19.406276] 
[   19.428143] Allocated by task 282:
[   19.428494]  kasan_save_stack+0x45/0x70
[   19.428862]  kasan_save_track+0x18/0x40
[   19.429769]  kasan_save_alloc_info+0x3b/0x50
[   19.430091]  __kasan_kmalloc+0xb7/0xc0
[   19.430310]  __kmalloc_cache_noprof+0x189/0x420
[   19.430820]  kasan_bitops_generic+0x92/0x1c0
[   19.431062]  kunit_try_run_case+0x1a5/0x480
[   19.431863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.432444]  kthread+0x337/0x6f0
[   19.432725]  ret_from_fork+0x41/0x80
[   19.433310]  ret_from_fork_asm+0x1a/0x30
[   19.433522] 
[   19.433668] The buggy address belongs to the object at ffff888101d9a440
[   19.433668]  which belongs to the cache kmalloc-16 of size 16
[   19.434806] The buggy address is located 8 bytes inside of
[   19.434806]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.435845] 
[   19.436035] The buggy address belongs to the physical page:
[   19.436623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.437071] flags: 0x200000000000000(node=0|zone=2)
[   19.437481] page_type: f5(slab)
[   19.437675] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.438429] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.438906] page dumped because: kasan: bad access detected
[   19.439724] 
[   19.439963] Memory state around the buggy address:
[   19.440522]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.441092]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.441581] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.441909]                                               ^
[   19.442072]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.442665]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.443221] ==================================================================
[   19.640072] ==================================================================
[   19.640863] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   19.641928] Read of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.642396] 
[   19.642646] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.642798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.642831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.642882] Call Trace:
[   19.642925]  <TASK>
[   19.642970]  dump_stack_lvl+0x73/0xb0
[   19.643044]  print_report+0xd1/0x650
[   19.643097]  ? __virt_addr_valid+0x1db/0x2d0
[   19.643147]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   19.643202]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.643254]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   19.643295]  kasan_report+0x141/0x180
[   19.643322]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   19.643353]  kasan_check_range+0x10c/0x1c0
[   19.643376]  __kasan_check_read+0x15/0x20
[   19.643397]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   19.643423]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.643449]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.643473]  ? trace_hardirqs_on+0x37/0xe0
[   19.643498]  ? kasan_bitops_generic+0x92/0x1c0
[   19.643525]  kasan_bitops_generic+0x121/0x1c0
[   19.643547]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.643571]  ? __pfx_read_tsc+0x10/0x10
[   19.643594]  ? ktime_get_ts64+0x86/0x230
[   19.643632]  kunit_try_run_case+0x1a5/0x480
[   19.643668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.643692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.643719]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.643744]  ? __kthread_parkme+0x82/0x180
[   19.644348]  ? preempt_count_sub+0x50/0x80
[   19.644418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.644472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.644546]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.644597]  kthread+0x337/0x6f0
[   19.644648]  ? trace_preempt_on+0x20/0xc0
[   19.644710]  ? __pfx_kthread+0x10/0x10
[   19.644767]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.644827]  ? calculate_sigpending+0x7b/0xa0
[   19.644872]  ? __pfx_kthread+0x10/0x10
[   19.644916]  ret_from_fork+0x41/0x80
[   19.644975]  ? __pfx_kthread+0x10/0x10
[   19.645021]  ret_from_fork_asm+0x1a/0x30
[   19.645097]  </TASK>
[   19.645515] 
[   19.657987] Allocated by task 282:
[   19.658560]  kasan_save_stack+0x45/0x70
[   19.658863]  kasan_save_track+0x18/0x40
[   19.659293]  kasan_save_alloc_info+0x3b/0x50
[   19.659545]  __kasan_kmalloc+0xb7/0xc0
[   19.659769]  __kmalloc_cache_noprof+0x189/0x420
[   19.660025]  kasan_bitops_generic+0x92/0x1c0
[   19.660407]  kunit_try_run_case+0x1a5/0x480
[   19.660799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.661251]  kthread+0x337/0x6f0
[   19.661567]  ret_from_fork+0x41/0x80
[   19.662050]  ret_from_fork_asm+0x1a/0x30
[   19.662444] 
[   19.662668] The buggy address belongs to the object at ffff888101d9a440
[   19.662668]  which belongs to the cache kmalloc-16 of size 16
[   19.663681] The buggy address is located 8 bytes inside of
[   19.663681]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.664763] 
[   19.664982] The buggy address belongs to the physical page:
[   19.665536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.666113] flags: 0x200000000000000(node=0|zone=2)
[   19.666566] page_type: f5(slab)
[   19.666895] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.667585] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.667928] page dumped because: kasan: bad access detected
[   19.668684] 
[   19.668858] Memory state around the buggy address:
[   19.669362]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.669653]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.669989] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.670299]                                               ^
[   19.670780]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.671076]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.671466] ==================================================================
[   19.578130] ==================================================================
[   19.578674] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   19.579343] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.579650] 
[   19.579891] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.579988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.580010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.580045] Call Trace:
[   19.580082]  <TASK>
[   19.580145]  dump_stack_lvl+0x73/0xb0
[   19.580229]  print_report+0xd1/0x650
[   19.580277]  ? __virt_addr_valid+0x1db/0x2d0
[   19.580331]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   19.580385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.580439]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   19.580492]  kasan_report+0x141/0x180
[   19.580546]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   19.580614]  kasan_check_range+0x10c/0x1c0
[   19.580663]  __kasan_check_write+0x18/0x20
[   19.580706]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   19.580779]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.580833]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.580875]  ? trace_hardirqs_on+0x37/0xe0
[   19.581216]  ? kasan_bitops_generic+0x92/0x1c0
[   19.581287]  kasan_bitops_generic+0x121/0x1c0
[   19.581341]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.581389]  ? __pfx_read_tsc+0x10/0x10
[   19.581436]  ? ktime_get_ts64+0x86/0x230
[   19.581690]  kunit_try_run_case+0x1a5/0x480
[   19.581742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.581791]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.581830]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.581866]  ? __kthread_parkme+0x82/0x180
[   19.581900]  ? preempt_count_sub+0x50/0x80
[   19.581943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.581983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.582024]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.582070]  kthread+0x337/0x6f0
[   19.582108]  ? trace_preempt_on+0x20/0xc0
[   19.582207]  ? __pfx_kthread+0x10/0x10
[   19.582251]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.582297]  ? calculate_sigpending+0x7b/0xa0
[   19.582346]  ? __pfx_kthread+0x10/0x10
[   19.582387]  ret_from_fork+0x41/0x80
[   19.582433]  ? __pfx_kthread+0x10/0x10
[   19.582473]  ret_from_fork_asm+0x1a/0x30
[   19.582569]  </TASK>
[   19.582599] 
[   19.594242] Allocated by task 282:
[   19.594650]  kasan_save_stack+0x45/0x70
[   19.595009]  kasan_save_track+0x18/0x40
[   19.595486]  kasan_save_alloc_info+0x3b/0x50
[   19.595811]  __kasan_kmalloc+0xb7/0xc0
[   19.596092]  __kmalloc_cache_noprof+0x189/0x420
[   19.596405]  kasan_bitops_generic+0x92/0x1c0
[   19.596622]  kunit_try_run_case+0x1a5/0x480
[   19.596854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.597100]  kthread+0x337/0x6f0
[   19.597287]  ret_from_fork+0x41/0x80
[   19.597480]  ret_from_fork_asm+0x1a/0x30
[   19.597853] 
[   19.598107] The buggy address belongs to the object at ffff888101d9a440
[   19.598107]  which belongs to the cache kmalloc-16 of size 16
[   19.599009] The buggy address is located 8 bytes inside of
[   19.599009]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.600278] 
[   19.600473] The buggy address belongs to the physical page:
[   19.600802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.601126] flags: 0x200000000000000(node=0|zone=2)
[   19.601373] page_type: f5(slab)
[   19.601613] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.602220] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.602852] page dumped because: kasan: bad access detected
[   19.603291] 
[   19.603546] Memory state around the buggy address:
[   19.603974]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.604709]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.605092] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.605482]                                               ^
[   19.605734]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.606029]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.606314] ==================================================================
[   19.608476] ==================================================================
[   19.609146] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   19.610162] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.610757] 
[   19.611023] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.611160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.611193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.611242] Call Trace:
[   19.611287]  <TASK>
[   19.611334]  dump_stack_lvl+0x73/0xb0
[   19.611405]  print_report+0xd1/0x650
[   19.611461]  ? __virt_addr_valid+0x1db/0x2d0
[   19.611515]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   19.611570]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.611640]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   19.611698]  kasan_report+0x141/0x180
[   19.612233]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   19.612343]  kasan_check_range+0x10c/0x1c0
[   19.612403]  __kasan_check_write+0x18/0x20
[   19.612450]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   19.612505]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.612566]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.612616]  ? trace_hardirqs_on+0x37/0xe0
[   19.612669]  ? kasan_bitops_generic+0x92/0x1c0
[   19.612726]  kasan_bitops_generic+0x121/0x1c0
[   19.612787]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.612840]  ? __pfx_read_tsc+0x10/0x10
[   19.612887]  ? ktime_get_ts64+0x86/0x230
[   19.612946]  kunit_try_run_case+0x1a5/0x480
[   19.612999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.613039]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.613073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.613097]  ? __kthread_parkme+0x82/0x180
[   19.613156]  ? preempt_count_sub+0x50/0x80
[   19.613189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.613216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.613240]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.613265]  kthread+0x337/0x6f0
[   19.613285]  ? trace_preempt_on+0x20/0xc0
[   19.613310]  ? __pfx_kthread+0x10/0x10
[   19.613329]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.613352]  ? calculate_sigpending+0x7b/0xa0
[   19.613377]  ? __pfx_kthread+0x10/0x10
[   19.613398]  ret_from_fork+0x41/0x80
[   19.613420]  ? __pfx_kthread+0x10/0x10
[   19.613441]  ret_from_fork_asm+0x1a/0x30
[   19.613476]  </TASK>
[   19.613492] 
[   19.625938] Allocated by task 282:
[   19.626307]  kasan_save_stack+0x45/0x70
[   19.626718]  kasan_save_track+0x18/0x40
[   19.627160]  kasan_save_alloc_info+0x3b/0x50
[   19.627649]  __kasan_kmalloc+0xb7/0xc0
[   19.628038]  __kmalloc_cache_noprof+0x189/0x420
[   19.628475]  kasan_bitops_generic+0x92/0x1c0
[   19.628701]  kunit_try_run_case+0x1a5/0x480
[   19.629097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.629545]  kthread+0x337/0x6f0
[   19.629883]  ret_from_fork+0x41/0x80
[   19.630165]  ret_from_fork_asm+0x1a/0x30
[   19.630485] 
[   19.630701] The buggy address belongs to the object at ffff888101d9a440
[   19.630701]  which belongs to the cache kmalloc-16 of size 16
[   19.631525] The buggy address is located 8 bytes inside of
[   19.631525]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.632319] 
[   19.632464] The buggy address belongs to the physical page:
[   19.632706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.633032] flags: 0x200000000000000(node=0|zone=2)
[   19.633607] page_type: f5(slab)
[   19.633987] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.634578] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.635284] page dumped because: kasan: bad access detected
[   19.635868] 
[   19.636061] Memory state around the buggy address:
[   19.636355]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.636650]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.636952] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.637234]                                               ^
[   19.637555]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.638162]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.638778] ==================================================================