Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-x86_64

[   44.312617] ==================================================================
[   44.319672] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.328612] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   44.335903] 
[   44.337386] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   44.337434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.337451] Hardware name: WinLink E850-96 board (DT)
[   44.337470] Call trace:
[   44.337484]  show_stack+0x20/0x38 (C)
[   44.337515]  dump_stack_lvl+0x8c/0xd0
[   44.337550]  print_report+0x118/0x608
[   44.337579]  kasan_report+0xdc/0x128
[   44.337611]  __asan_report_load8_noabort+0x20/0x30
[   44.337645]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.337680]  kasan_bitops_generic+0x11c/0x1c8
[   44.337708]  kunit_try_run_case+0x170/0x3f0
[   44.337743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.337783]  kthread+0x328/0x630
[   44.337816]  ret_from_fork+0x10/0x20
[   44.337849] 
[   44.406474] Allocated by task 310:
[   44.409860]  kasan_save_stack+0x3c/0x68
[   44.413680]  kasan_save_track+0x20/0x40
[   44.417499]  kasan_save_alloc_info+0x40/0x58
[   44.421753]  __kasan_kmalloc+0xd4/0xd8
[   44.425485]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.429999]  kasan_bitops_generic+0xa0/0x1c8
[   44.434252]  kunit_try_run_case+0x170/0x3f0
[   44.438418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.443888]  kthread+0x328/0x630
[   44.447099]  ret_from_fork+0x10/0x20
[   44.450658] 
[   44.452133] The buggy address belongs to the object at ffff000802e0b440
[   44.452133]  which belongs to the cache kmalloc-16 of size 16
[   44.464462] The buggy address is located 8 bytes inside of
[   44.464462]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   44.476699] 
[   44.478175] The buggy address belongs to the physical page:
[   44.483734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   44.491719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.498227] page_type: f5(slab)
[   44.501360] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.509084] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.516803] page dumped because: kasan: bad access detected
[   44.522358] 
[   44.523834] Memory state around the buggy address:
[   44.528613]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   44.535817]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   44.543022] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   44.550223]                                               ^
[   44.555782]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.562987]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.570188] ==================================================================
[   45.644207] ==================================================================
[   45.651249] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.660189] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   45.667567] 
[   45.669050] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   45.669098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.669112] Hardware name: WinLink E850-96 board (DT)
[   45.669131] Call trace:
[   45.669144]  show_stack+0x20/0x38 (C)
[   45.669174]  dump_stack_lvl+0x8c/0xd0
[   45.669206]  print_report+0x118/0x608
[   45.669236]  kasan_report+0xdc/0x128
[   45.669266]  kasan_check_range+0x100/0x1a8
[   45.669300]  __kasan_check_write+0x20/0x30
[   45.669331]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.669367]  kasan_bitops_generic+0x11c/0x1c8
[   45.669396]  kunit_try_run_case+0x170/0x3f0
[   45.669430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.669470]  kthread+0x328/0x630
[   45.669505]  ret_from_fork+0x10/0x20
[   45.669539] 
[   45.741524] Allocated by task 310:
[   45.744910]  kasan_save_stack+0x3c/0x68
[   45.748729]  kasan_save_track+0x20/0x40
[   45.752548]  kasan_save_alloc_info+0x40/0x58
[   45.756802]  __kasan_kmalloc+0xd4/0xd8
[   45.760534]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.765048]  kasan_bitops_generic+0xa0/0x1c8
[   45.769302]  kunit_try_run_case+0x170/0x3f0
[   45.773468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.778937]  kthread+0x328/0x630
[   45.782149]  ret_from_fork+0x10/0x20
[   45.785708] 
[   45.787183] The buggy address belongs to the object at ffff000802e0b440
[   45.787183]  which belongs to the cache kmalloc-16 of size 16
[   45.799510] The buggy address is located 8 bytes inside of
[   45.799510]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   45.811749] 
[   45.813225] The buggy address belongs to the physical page:
[   45.818781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   45.826766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.833276] page_type: f5(slab)
[   45.836412] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.844134] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.851852] page dumped because: kasan: bad access detected
[   45.857408] 
[   45.858883] Memory state around the buggy address:
[   45.863662]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   45.870867]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   45.878071] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   45.885272]                                               ^
[   45.890832]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.898036]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.905237] ==================================================================
[   45.110861] ==================================================================
[   45.117924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.126864] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   45.134242] 
[   45.135725] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   45.135773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.135789] Hardware name: WinLink E850-96 board (DT)
[   45.135811] Call trace:
[   45.135823]  show_stack+0x20/0x38 (C)
[   45.135857]  dump_stack_lvl+0x8c/0xd0
[   45.135891]  print_report+0x118/0x608
[   45.135922]  kasan_report+0xdc/0x128
[   45.135952]  kasan_check_range+0x100/0x1a8
[   45.135985]  __kasan_check_write+0x20/0x30
[   45.136018]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.136055]  kasan_bitops_generic+0x11c/0x1c8
[   45.136084]  kunit_try_run_case+0x170/0x3f0
[   45.136119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.136158]  kthread+0x328/0x630
[   45.136190]  ret_from_fork+0x10/0x20
[   45.136223] 
[   45.208199] Allocated by task 310:
[   45.211584]  kasan_save_stack+0x3c/0x68
[   45.215403]  kasan_save_track+0x20/0x40
[   45.219223]  kasan_save_alloc_info+0x40/0x58
[   45.223476]  __kasan_kmalloc+0xd4/0xd8
[   45.227209]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.231723]  kasan_bitops_generic+0xa0/0x1c8
[   45.235976]  kunit_try_run_case+0x170/0x3f0
[   45.240143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.245612]  kthread+0x328/0x630
[   45.248823]  ret_from_fork+0x10/0x20
[   45.252382] 
[   45.253858] The buggy address belongs to the object at ffff000802e0b440
[   45.253858]  which belongs to the cache kmalloc-16 of size 16
[   45.266184] The buggy address is located 8 bytes inside of
[   45.266184]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   45.278423] 
[   45.279900] The buggy address belongs to the physical page:
[   45.285456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   45.293441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.299951] page_type: f5(slab)
[   45.303086] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.310808] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.318527] page dumped because: kasan: bad access detected
[   45.324082] 
[   45.325558] Memory state around the buggy address:
[   45.330337]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   45.337541]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   45.344746] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   45.351947]                                               ^
[   45.357506]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.364711]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.371912] ==================================================================
[   44.577562] ==================================================================
[   44.584600] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.593538] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   44.600916] 
[   44.602399] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   44.602446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.602462] Hardware name: WinLink E850-96 board (DT)
[   44.602481] Call trace:
[   44.602496]  show_stack+0x20/0x38 (C)
[   44.602528]  dump_stack_lvl+0x8c/0xd0
[   44.602562]  print_report+0x118/0x608
[   44.602593]  kasan_report+0xdc/0x128
[   44.602623]  kasan_check_range+0x100/0x1a8
[   44.602656]  __kasan_check_write+0x20/0x30
[   44.602690]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.602725]  kasan_bitops_generic+0x11c/0x1c8
[   44.602753]  kunit_try_run_case+0x170/0x3f0
[   44.602787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.602825]  kthread+0x328/0x630
[   44.602857]  ret_from_fork+0x10/0x20
[   44.602890] 
[   44.674874] Allocated by task 310:
[   44.678259]  kasan_save_stack+0x3c/0x68
[   44.682078]  kasan_save_track+0x20/0x40
[   44.685898]  kasan_save_alloc_info+0x40/0x58
[   44.690151]  __kasan_kmalloc+0xd4/0xd8
[   44.693884]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.698397]  kasan_bitops_generic+0xa0/0x1c8
[   44.702651]  kunit_try_run_case+0x170/0x3f0
[   44.706817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.712286]  kthread+0x328/0x630
[   44.715498]  ret_from_fork+0x10/0x20
[   44.719057] 
[   44.720532] The buggy address belongs to the object at ffff000802e0b440
[   44.720532]  which belongs to the cache kmalloc-16 of size 16
[   44.732859] The buggy address is located 8 bytes inside of
[   44.732859]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   44.745098] 
[   44.746574] The buggy address belongs to the physical page:
[   44.752133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   44.760116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.766626] page_type: f5(slab)
[   44.769761] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.777483] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.785202] page dumped because: kasan: bad access detected
[   44.790757] 
[   44.792233] Memory state around the buggy address:
[   44.797013]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   44.804216]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   44.811420] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   44.818622]                                               ^
[   44.824181]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.831385]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.838586] ==================================================================
[   44.044439] ==================================================================
[   44.051450] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.060300] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   44.067678] 
[   44.069161] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   44.069210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.069229] Hardware name: WinLink E850-96 board (DT)
[   44.069248] Call trace:
[   44.069262]  show_stack+0x20/0x38 (C)
[   44.069293]  dump_stack_lvl+0x8c/0xd0
[   44.069331]  print_report+0x118/0x608
[   44.069360]  kasan_report+0xdc/0x128
[   44.069392]  kasan_check_range+0x100/0x1a8
[   44.069429]  __kasan_check_write+0x20/0x30
[   44.069460]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.069495]  kasan_bitops_generic+0x11c/0x1c8
[   44.069524]  kunit_try_run_case+0x170/0x3f0
[   44.069558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.069598]  kthread+0x328/0x630
[   44.069633]  ret_from_fork+0x10/0x20
[   44.069668] 
[   44.141548] Allocated by task 310:
[   44.144934]  kasan_save_stack+0x3c/0x68
[   44.148753]  kasan_save_track+0x20/0x40
[   44.152572]  kasan_save_alloc_info+0x40/0x58
[   44.156826]  __kasan_kmalloc+0xd4/0xd8
[   44.160559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.165072]  kasan_bitops_generic+0xa0/0x1c8
[   44.169326]  kunit_try_run_case+0x170/0x3f0
[   44.173492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.178961]  kthread+0x328/0x630
[   44.182173]  ret_from_fork+0x10/0x20
[   44.185731] 
[   44.187207] The buggy address belongs to the object at ffff000802e0b440
[   44.187207]  which belongs to the cache kmalloc-16 of size 16
[   44.199534] The buggy address is located 8 bytes inside of
[   44.199534]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   44.211773] 
[   44.213249] The buggy address belongs to the physical page:
[   44.218807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   44.226792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.233301] page_type: f5(slab)
[   44.236435] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.244158] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.251877] page dumped because: kasan: bad access detected
[   44.257432] 
[   44.258907] Memory state around the buggy address:
[   44.263686]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   44.270890]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   44.278095] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   44.285296]                                               ^
[   44.290855]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.298060]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.305261] ==================================================================
[   46.177543] ==================================================================
[   46.184575] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.193514] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   46.200805] 
[   46.202287] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   46.202332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.202349] Hardware name: WinLink E850-96 board (DT)
[   46.202368] Call trace:
[   46.202382]  show_stack+0x20/0x38 (C)
[   46.202415]  dump_stack_lvl+0x8c/0xd0
[   46.202448]  print_report+0x118/0x608
[   46.202480]  kasan_report+0xdc/0x128
[   46.202509]  __asan_report_load8_noabort+0x20/0x30
[   46.202545]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.202580]  kasan_bitops_generic+0x11c/0x1c8
[   46.202609]  kunit_try_run_case+0x170/0x3f0
[   46.202643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.202686]  kthread+0x328/0x630
[   46.202717]  ret_from_fork+0x10/0x20
[   46.202749] 
[   46.271377] Allocated by task 310:
[   46.274764]  kasan_save_stack+0x3c/0x68
[   46.278582]  kasan_save_track+0x20/0x40
[   46.282401]  kasan_save_alloc_info+0x40/0x58
[   46.286655]  __kasan_kmalloc+0xd4/0xd8
[   46.290388]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.294901]  kasan_bitops_generic+0xa0/0x1c8
[   46.299155]  kunit_try_run_case+0x170/0x3f0
[   46.303321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.308790]  kthread+0x328/0x630
[   46.312002]  ret_from_fork+0x10/0x20
[   46.315561] 
[   46.317036] The buggy address belongs to the object at ffff000802e0b440
[   46.317036]  which belongs to the cache kmalloc-16 of size 16
[   46.329364] The buggy address is located 8 bytes inside of
[   46.329364]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   46.341602] 
[   46.343078] The buggy address belongs to the physical page:
[   46.348635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   46.356620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.363129] page_type: f5(slab)
[   46.366264] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.373986] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.381706] page dumped because: kasan: bad access detected
[   46.387261] 
[   46.388737] Memory state around the buggy address:
[   46.393515]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   46.400719]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   46.407924] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   46.415125]                                               ^
[   46.420684]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.427889]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.435090] ==================================================================
[   45.379264] ==================================================================
[   45.386323] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.395262] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   45.402554] 
[   45.404037] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   45.404082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.404096] Hardware name: WinLink E850-96 board (DT)
[   45.404113] Call trace:
[   45.404125]  show_stack+0x20/0x38 (C)
[   45.404155]  dump_stack_lvl+0x8c/0xd0
[   45.404190]  print_report+0x118/0x608
[   45.404219]  kasan_report+0xdc/0x128
[   45.404248]  __asan_report_load8_noabort+0x20/0x30
[   45.404281]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.404315]  kasan_bitops_generic+0x11c/0x1c8
[   45.404344]  kunit_try_run_case+0x170/0x3f0
[   45.404379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.404418]  kthread+0x328/0x630
[   45.404451]  ret_from_fork+0x10/0x20
[   45.404482] 
[   45.473126] Allocated by task 310:
[   45.476511]  kasan_save_stack+0x3c/0x68
[   45.480330]  kasan_save_track+0x20/0x40
[   45.484150]  kasan_save_alloc_info+0x40/0x58
[   45.488403]  __kasan_kmalloc+0xd4/0xd8
[   45.492136]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.496650]  kasan_bitops_generic+0xa0/0x1c8
[   45.500903]  kunit_try_run_case+0x170/0x3f0
[   45.505069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.510538]  kthread+0x328/0x630
[   45.513750]  ret_from_fork+0x10/0x20
[   45.517309] 
[   45.518784] The buggy address belongs to the object at ffff000802e0b440
[   45.518784]  which belongs to the cache kmalloc-16 of size 16
[   45.531111] The buggy address is located 8 bytes inside of
[   45.531111]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   45.543350] 
[   45.544826] The buggy address belongs to the physical page:
[   45.550382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   45.558367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.564878] page_type: f5(slab)
[   45.568010] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.575735] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.583454] page dumped because: kasan: bad access detected
[   45.589009] 
[   45.590485] Memory state around the buggy address:
[   45.595263]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   45.602468]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   45.609672] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   45.616873]                                               ^
[   45.622433]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.629637]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.636838] ==================================================================
[   44.845907] ==================================================================
[   44.852998] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.861937] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   44.869228] 
[   44.870712] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   44.870758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.870775] Hardware name: WinLink E850-96 board (DT)
[   44.870794] Call trace:
[   44.870808]  show_stack+0x20/0x38 (C)
[   44.870842]  dump_stack_lvl+0x8c/0xd0
[   44.870878]  print_report+0x118/0x608
[   44.870907]  kasan_report+0xdc/0x128
[   44.870937]  __asan_report_load8_noabort+0x20/0x30
[   44.870971]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.871006]  kasan_bitops_generic+0x11c/0x1c8
[   44.871035]  kunit_try_run_case+0x170/0x3f0
[   44.871071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.871111]  kthread+0x328/0x630
[   44.871144]  ret_from_fork+0x10/0x20
[   44.871174] 
[   44.939800] Allocated by task 310:
[   44.943185]  kasan_save_stack+0x3c/0x68
[   44.947005]  kasan_save_track+0x20/0x40
[   44.950824]  kasan_save_alloc_info+0x40/0x58
[   44.955078]  __kasan_kmalloc+0xd4/0xd8
[   44.958810]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.963324]  kasan_bitops_generic+0xa0/0x1c8
[   44.967577]  kunit_try_run_case+0x170/0x3f0
[   44.971744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.977213]  kthread+0x328/0x630
[   44.980424]  ret_from_fork+0x10/0x20
[   44.983983] 
[   44.985459] The buggy address belongs to the object at ffff000802e0b440
[   44.985459]  which belongs to the cache kmalloc-16 of size 16
[   44.997785] The buggy address is located 8 bytes inside of
[   44.997785]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   45.010024] 
[   45.011501] The buggy address belongs to the physical page:
[   45.017057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   45.025043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.031552] page_type: f5(slab)
[   45.034685] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.042410] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.050128] page dumped because: kasan: bad access detected
[   45.055684] 
[   45.057159] Memory state around the buggy address:
[   45.061938]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   45.069142]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   45.076347] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   45.083548]                                               ^
[   45.089107]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.096312]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.103513] ==================================================================
[   45.912585] ==================================================================
[   45.919648] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   45.928588] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   45.935879] 
[   45.937359] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   45.937404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.937421] Hardware name: WinLink E850-96 board (DT)
[   45.937441] Call trace:
[   45.937452]  show_stack+0x20/0x38 (C)
[   45.937484]  dump_stack_lvl+0x8c/0xd0
[   45.937516]  print_report+0x118/0x608
[   45.937547]  kasan_report+0xdc/0x128
[   45.937577]  __asan_report_load8_noabort+0x20/0x30
[   45.937610]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   45.937645]  kasan_bitops_generic+0x11c/0x1c8
[   45.937674]  kunit_try_run_case+0x170/0x3f0
[   45.937709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.937749]  kthread+0x328/0x630
[   45.937781]  ret_from_fork+0x10/0x20
[   45.937814] 
[   46.006451] Allocated by task 310:
[   46.009836]  kasan_save_stack+0x3c/0x68
[   46.013656]  kasan_save_track+0x20/0x40
[   46.017475]  kasan_save_alloc_info+0x40/0x58
[   46.021728]  __kasan_kmalloc+0xd4/0xd8
[   46.025461]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.029975]  kasan_bitops_generic+0xa0/0x1c8
[   46.034228]  kunit_try_run_case+0x170/0x3f0
[   46.038395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.043864]  kthread+0x328/0x630
[   46.047075]  ret_from_fork+0x10/0x20
[   46.050634] 
[   46.052110] The buggy address belongs to the object at ffff000802e0b440
[   46.052110]  which belongs to the cache kmalloc-16 of size 16
[   46.064436] The buggy address is located 8 bytes inside of
[   46.064436]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   46.076675] 
[   46.078151] The buggy address belongs to the physical page:
[   46.083709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   46.091693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.098203] page_type: f5(slab)
[   46.101336] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.109060] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.116779] page dumped because: kasan: bad access detected
[   46.122334] 
[   46.123810] Memory state around the buggy address:
[   46.128589]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   46.135793]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   46.142998] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   46.150199]                                               ^
[   46.155758]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.162963]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.170164] ==================================================================

[   13.208807] ==================================================================
[   13.209175] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.209548] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   13.209951] 
[   13.210066] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.210111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.210123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.210144] Call Trace:
[   13.210162]  <TASK>
[   13.210180]  dump_stack_lvl+0x73/0xb0
[   13.210205]  print_report+0xd1/0x650
[   13.210227]  ? __virt_addr_valid+0x1db/0x2d0
[   13.210250]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.210273]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.210295]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.210318]  kasan_report+0x141/0x180
[   13.210342]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.210369]  kasan_check_range+0x10c/0x1c0
[   13.210389]  __kasan_check_write+0x18/0x20
[   13.210409]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.210432]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.210456]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.210477]  ? trace_hardirqs_on+0x37/0xe0
[   13.210500]  ? kasan_bitops_generic+0x92/0x1c0
[   13.210524]  kasan_bitops_generic+0x121/0x1c0
[   13.210544]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.210582]  ? __pfx_read_tsc+0x10/0x10
[   13.210603]  ? ktime_get_ts64+0x86/0x230
[   13.210629]  kunit_try_run_case+0x1a5/0x480
[   13.210654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.210676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.210701]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.210725]  ? __kthread_parkme+0x82/0x180
[   13.210747]  ? preempt_count_sub+0x50/0x80
[   13.210773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.210797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.210819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.210842]  kthread+0x337/0x6f0
[   13.210859]  ? trace_preempt_on+0x20/0xc0
[   13.210881]  ? __pfx_kthread+0x10/0x10
[   13.210899]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.210931]  ? calculate_sigpending+0x7b/0xa0
[   13.210953]  ? __pfx_kthread+0x10/0x10
[   13.210972]  ret_from_fork+0x41/0x80
[   13.210992]  ? __pfx_kthread+0x10/0x10
[   13.211010]  ret_from_fork_asm+0x1a/0x30
[   13.211041]  </TASK>
[   13.211052] 
[   13.219643] Allocated by task 280:
[   13.219972]  kasan_save_stack+0x45/0x70
[   13.220494]  kasan_save_track+0x18/0x40
[   13.220849]  kasan_save_alloc_info+0x3b/0x50
[   13.221057]  __kasan_kmalloc+0xb7/0xc0
[   13.221230]  __kmalloc_cache_noprof+0x189/0x420
[   13.221416]  kasan_bitops_generic+0x92/0x1c0
[   13.221662]  kunit_try_run_case+0x1a5/0x480
[   13.222000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.222179]  kthread+0x337/0x6f0
[   13.222298]  ret_from_fork+0x41/0x80
[   13.222428]  ret_from_fork_asm+0x1a/0x30
[   13.222623] 
[   13.222718] The buggy address belongs to the object at ffff8881025a7fe0
[   13.222718]  which belongs to the cache kmalloc-16 of size 16
[   13.223207] The buggy address is located 8 bytes inside of
[   13.223207]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   13.223557] 
[   13.223628] The buggy address belongs to the physical page:
[   13.224172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   13.224543] flags: 0x200000000000000(node=0|zone=2)
[   13.224880] page_type: f5(slab)
[   13.225070] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.225376] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.225807] page dumped because: kasan: bad access detected
[   13.226061] 
[   13.226146] Memory state around the buggy address:
[   13.226345]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.226660]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.227235] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.227484]                                                           ^
[   13.227933]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.228222]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.228511] ==================================================================
[   13.147335] ==================================================================
[   13.147579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.147994] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   13.148332] 
[   13.148577] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.148625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.148636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.148658] Call Trace:
[   13.148678]  <TASK>
[   13.148696]  dump_stack_lvl+0x73/0xb0
[   13.148752]  print_report+0xd1/0x650
[   13.148776]  ? __virt_addr_valid+0x1db/0x2d0
[   13.148800]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.148823]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.148846]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.148870]  kasan_report+0x141/0x180
[   13.148892]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.148931]  kasan_check_range+0x10c/0x1c0
[   13.148951]  __kasan_check_write+0x18/0x20
[   13.148971]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.148995]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.149019]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.149041]  ? trace_hardirqs_on+0x37/0xe0
[   13.149063]  ? kasan_bitops_generic+0x92/0x1c0
[   13.149087]  kasan_bitops_generic+0x121/0x1c0
[   13.149106]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.149127]  ? __pfx_read_tsc+0x10/0x10
[   13.149149]  ? ktime_get_ts64+0x86/0x230
[   13.149175]  kunit_try_run_case+0x1a5/0x480
[   13.149199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.149221]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.149245]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.149268]  ? __kthread_parkme+0x82/0x180
[   13.149290]  ? preempt_count_sub+0x50/0x80
[   13.149316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.149340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.149363]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.149386]  kthread+0x337/0x6f0
[   13.149404]  ? trace_preempt_on+0x20/0xc0
[   13.149426]  ? __pfx_kthread+0x10/0x10
[   13.149444]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.149465]  ? calculate_sigpending+0x7b/0xa0
[   13.149487]  ? __pfx_kthread+0x10/0x10
[   13.149505]  ret_from_fork+0x41/0x80
[   13.149526]  ? __pfx_kthread+0x10/0x10
[   13.149544]  ret_from_fork_asm+0x1a/0x30
[   13.149591]  </TASK>
[   13.149602] 
[   13.158511] Allocated by task 280:
[   13.158840]  kasan_save_stack+0x45/0x70
[   13.159011]  kasan_save_track+0x18/0x40
[   13.159204]  kasan_save_alloc_info+0x3b/0x50
[   13.159411]  __kasan_kmalloc+0xb7/0xc0
[   13.159597]  __kmalloc_cache_noprof+0x189/0x420
[   13.160202]  kasan_bitops_generic+0x92/0x1c0
[   13.160370]  kunit_try_run_case+0x1a5/0x480
[   13.160600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.160991]  kthread+0x337/0x6f0
[   13.161160]  ret_from_fork+0x41/0x80
[   13.161328]  ret_from_fork_asm+0x1a/0x30
[   13.161517] 
[   13.161595] The buggy address belongs to the object at ffff8881025a7fe0
[   13.161595]  which belongs to the cache kmalloc-16 of size 16
[   13.162072] The buggy address is located 8 bytes inside of
[   13.162072]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   13.162421] 
[   13.162642] The buggy address belongs to the physical page:
[   13.163152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   13.163485] flags: 0x200000000000000(node=0|zone=2)
[   13.163705] page_type: f5(slab)
[   13.163850] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.164237] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.164474] page dumped because: kasan: bad access detected
[   13.164643] 
[   13.164711] Memory state around the buggy address:
[   13.164876]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.165204]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.165516] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.165997]                                                           ^
[   13.166234]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.166445]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.166654] ==================================================================
[   13.167050] ==================================================================
[   13.167655] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.168084] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   13.168465] 
[   13.168581] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.168628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.168640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.168661] Call Trace:
[   13.168679]  <TASK>
[   13.168697]  dump_stack_lvl+0x73/0xb0
[   13.168722]  print_report+0xd1/0x650
[   13.168744]  ? __virt_addr_valid+0x1db/0x2d0
[   13.168766]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.168789]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.168812]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.168836]  kasan_report+0x141/0x180
[   13.168858]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.168886]  kasan_check_range+0x10c/0x1c0
[   13.168954]  __kasan_check_write+0x18/0x20
[   13.168974]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.168999]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.169023]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.169045]  ? trace_hardirqs_on+0x37/0xe0
[   13.169067]  ? kasan_bitops_generic+0x92/0x1c0
[   13.169091]  kasan_bitops_generic+0x121/0x1c0
[   13.169112]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.169134]  ? __pfx_read_tsc+0x10/0x10
[   13.169154]  ? ktime_get_ts64+0x86/0x230
[   13.169179]  kunit_try_run_case+0x1a5/0x480
[   13.169205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.169227]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.169251]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.169274]  ? __kthread_parkme+0x82/0x180
[   13.169296]  ? preempt_count_sub+0x50/0x80
[   13.169322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.169346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.169369]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.169393]  kthread+0x337/0x6f0
[   13.169410]  ? trace_preempt_on+0x20/0xc0
[   13.169432]  ? __pfx_kthread+0x10/0x10
[   13.169450]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.169471]  ? calculate_sigpending+0x7b/0xa0
[   13.169492]  ? __pfx_kthread+0x10/0x10
[   13.169511]  ret_from_fork+0x41/0x80
[   13.169531]  ? __pfx_kthread+0x10/0x10
[   13.169549]  ret_from_fork_asm+0x1a/0x30
[   13.169590]  </TASK>
[   13.169600] 
[   13.179116] Allocated by task 280:
[   13.179326]  kasan_save_stack+0x45/0x70
[   13.179512]  kasan_save_track+0x18/0x40
[   13.179715]  kasan_save_alloc_info+0x3b/0x50
[   13.179907]  __kasan_kmalloc+0xb7/0xc0
[   13.180051]  __kmalloc_cache_noprof+0x189/0x420
[   13.180202]  kasan_bitops_generic+0x92/0x1c0
[   13.180354]  kunit_try_run_case+0x1a5/0x480
[   13.180512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.181068]  kthread+0x337/0x6f0
[   13.181244]  ret_from_fork+0x41/0x80
[   13.181431]  ret_from_fork_asm+0x1a/0x30
[   13.181632] 
[   13.181726] The buggy address belongs to the object at ffff8881025a7fe0
[   13.181726]  which belongs to the cache kmalloc-16 of size 16
[   13.182437] The buggy address is located 8 bytes inside of
[   13.182437]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   13.183181] 
[   13.183257] The buggy address belongs to the physical page:
[   13.183432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   13.183795] flags: 0x200000000000000(node=0|zone=2)
[   13.184050] page_type: f5(slab)
[   13.184435] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.185017] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.185278] page dumped because: kasan: bad access detected
[   13.185459] 
[   13.185552] Memory state around the buggy address:
[   13.185775]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.186159]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.186408] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.187052]                                                           ^
[   13.187263]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.187580]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.188027] ==================================================================
[   13.107287] ==================================================================
[   13.107835] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.108229] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   13.108481] 
[   13.108569] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.108614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.108626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.108647] Call Trace:
[   13.108665]  <TASK>
[   13.108682]  dump_stack_lvl+0x73/0xb0
[   13.108706]  print_report+0xd1/0x650
[   13.108729]  ? __virt_addr_valid+0x1db/0x2d0
[   13.108751]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.108774]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.108797]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.108821]  kasan_report+0x141/0x180
[   13.108844]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.108872]  kasan_check_range+0x10c/0x1c0
[   13.108893]  __kasan_check_write+0x18/0x20
[   13.108912]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.108947]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.108972]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.108993]  ? trace_hardirqs_on+0x37/0xe0
[   13.109016]  ? kasan_bitops_generic+0x92/0x1c0
[   13.109040]  kasan_bitops_generic+0x121/0x1c0
[   13.109061]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.109082]  ? __pfx_read_tsc+0x10/0x10
[   13.109102]  ? ktime_get_ts64+0x86/0x230
[   13.109127]  kunit_try_run_case+0x1a5/0x480
[   13.109152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.109174]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.109198]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.109221]  ? __kthread_parkme+0x82/0x180
[   13.109243]  ? preempt_count_sub+0x50/0x80
[   13.109268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.109292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.109315]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.109338]  kthread+0x337/0x6f0
[   13.109355]  ? trace_preempt_on+0x20/0xc0
[   13.109377]  ? __pfx_kthread+0x10/0x10
[   13.109395]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.109417]  ? calculate_sigpending+0x7b/0xa0
[   13.109439]  ? __pfx_kthread+0x10/0x10
[   13.109457]  ret_from_fork+0x41/0x80
[   13.109477]  ? __pfx_kthread+0x10/0x10
[   13.109495]  ret_from_fork_asm+0x1a/0x30
[   13.109527]  </TASK>
[   13.109537] 
[   13.118641] Allocated by task 280:
[   13.118979]  kasan_save_stack+0x45/0x70
[   13.119198]  kasan_save_track+0x18/0x40
[   13.119380]  kasan_save_alloc_info+0x3b/0x50
[   13.119610]  __kasan_kmalloc+0xb7/0xc0
[   13.119851]  __kmalloc_cache_noprof+0x189/0x420
[   13.120057]  kasan_bitops_generic+0x92/0x1c0
[   13.120263]  kunit_try_run_case+0x1a5/0x480
[   13.120425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.120818]  kthread+0x337/0x6f0
[   13.120959]  ret_from_fork+0x41/0x80
[   13.121091]  ret_from_fork_asm+0x1a/0x30
[   13.121231] 
[   13.121302] The buggy address belongs to the object at ffff8881025a7fe0
[   13.121302]  which belongs to the cache kmalloc-16 of size 16
[   13.121787] The buggy address is located 8 bytes inside of
[   13.121787]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   13.122262] 
[   13.122344] The buggy address belongs to the physical page:
[   13.123055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   13.123363] flags: 0x200000000000000(node=0|zone=2)
[   13.123560] page_type: f5(slab)
[   13.123743] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.124045] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.124338] page dumped because: kasan: bad access detected
[   13.124509] 
[   13.124577] Memory state around the buggy address:
[   13.124735]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.125169]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.125537] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.125892]                                                           ^
[   13.126173]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.126435]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.126712] ==================================================================
[   13.127171] ==================================================================
[   13.127517] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.128379] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   13.128934] 
[   13.129051] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.129099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.129111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.129133] Call Trace:
[   13.129151]  <TASK>
[   13.129169]  dump_stack_lvl+0x73/0xb0
[   13.129194]  print_report+0xd1/0x650
[   13.129217]  ? __virt_addr_valid+0x1db/0x2d0
[   13.129238]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.129262]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.129284]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.129309]  kasan_report+0x141/0x180
[   13.129331]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.129359]  kasan_check_range+0x10c/0x1c0
[   13.129380]  __kasan_check_write+0x18/0x20
[   13.129399]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.129423]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.129448]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.129469]  ? trace_hardirqs_on+0x37/0xe0
[   13.129491]  ? kasan_bitops_generic+0x92/0x1c0
[   13.129516]  kasan_bitops_generic+0x121/0x1c0
[   13.129537]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.129558]  ? __pfx_read_tsc+0x10/0x10
[   13.129578]  ? ktime_get_ts64+0x86/0x230
[   13.129603]  kunit_try_run_case+0x1a5/0x480
[   13.129628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.129650]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.129675]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.129698]  ? __kthread_parkme+0x82/0x180
[   13.129720]  ? preempt_count_sub+0x50/0x80
[   13.129746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.129769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.129792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.129815]  kthread+0x337/0x6f0
[   13.129832]  ? trace_preempt_on+0x20/0xc0
[   13.129854]  ? __pfx_kthread+0x10/0x10
[   13.129872]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.129893]  ? calculate_sigpending+0x7b/0xa0
[   13.129927]  ? __pfx_kthread+0x10/0x10
[   13.129946]  ret_from_fork+0x41/0x80
[   13.129966]  ? __pfx_kthread+0x10/0x10
[   13.129984]  ret_from_fork_asm+0x1a/0x30
[   13.130015]  </TASK>
[   13.130025] 
[   13.138383] Allocated by task 280:
[   13.138531]  kasan_save_stack+0x45/0x70
[   13.138688]  kasan_save_track+0x18/0x40
[   13.138823]  kasan_save_alloc_info+0x3b/0x50
[   13.138978]  __kasan_kmalloc+0xb7/0xc0
[   13.139121]  __kmalloc_cache_noprof+0x189/0x420
[   13.139338]  kasan_bitops_generic+0x92/0x1c0
[   13.139543]  kunit_try_run_case+0x1a5/0x480
[   13.139932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.140189]  kthread+0x337/0x6f0
[   13.140360]  ret_from_fork+0x41/0x80
[   13.140543]  ret_from_fork_asm+0x1a/0x30
[   13.140766] 
[   13.140860] The buggy address belongs to the object at ffff8881025a7fe0
[   13.140860]  which belongs to the cache kmalloc-16 of size 16
[   13.141237] The buggy address is located 8 bytes inside of
[   13.141237]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   13.141905] 
[   13.142032] The buggy address belongs to the physical page:
[   13.142293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   13.142782] flags: 0x200000000000000(node=0|zone=2)
[   13.143046] page_type: f5(slab)
[   13.143221] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.143569] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.143936] page dumped because: kasan: bad access detected
[   13.144172] 
[   13.144252] Memory state around the buggy address:
[   13.144437]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.144851]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.145368] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.145594]                                                           ^
[   13.146239]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.146540]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.146900] ==================================================================
[   13.229028] ==================================================================
[   13.229369] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.229814] Read of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   13.230059] 
[   13.230172] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.230219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.230231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.230252] Call Trace:
[   13.230271]  <TASK>
[   13.230291]  dump_stack_lvl+0x73/0xb0
[   13.230315]  print_report+0xd1/0x650
[   13.230339]  ? __virt_addr_valid+0x1db/0x2d0
[   13.230361]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.230383]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.230406]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.230429]  kasan_report+0x141/0x180
[   13.230452]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.230481]  kasan_check_range+0x10c/0x1c0
[   13.230501]  __kasan_check_read+0x15/0x20
[   13.230521]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.230545]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.230569]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.230590]  ? trace_hardirqs_on+0x37/0xe0
[   13.230612]  ? kasan_bitops_generic+0x92/0x1c0
[   13.230637]  kasan_bitops_generic+0x121/0x1c0
[   13.230738]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.230765]  ? __pfx_read_tsc+0x10/0x10
[   13.230786]  ? ktime_get_ts64+0x86/0x230
[   13.230812]  kunit_try_run_case+0x1a5/0x480
[   13.230837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.230860]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.230884]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.230908]  ? __kthread_parkme+0x82/0x180
[   13.230943]  ? preempt_count_sub+0x50/0x80
[   13.230969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.230993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.231016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.231039]  kthread+0x337/0x6f0
[   13.231055]  ? trace_preempt_on+0x20/0xc0
[   13.231078]  ? __pfx_kthread+0x10/0x10
[   13.231096]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.231118]  ? calculate_sigpending+0x7b/0xa0
[   13.231140]  ? __pfx_kthread+0x10/0x10
[   13.231158]  ret_from_fork+0x41/0x80
[   13.231179]  ? __pfx_kthread+0x10/0x10
[   13.231197]  ret_from_fork_asm+0x1a/0x30
[   13.231229]  </TASK>
[   13.231240] 
[   13.239552] Allocated by task 280:
[   13.239694]  kasan_save_stack+0x45/0x70
[   13.239843]  kasan_save_track+0x18/0x40
[   13.240092]  kasan_save_alloc_info+0x3b/0x50
[   13.240318]  __kasan_kmalloc+0xb7/0xc0
[   13.240505]  __kmalloc_cache_noprof+0x189/0x420
[   13.240810]  kasan_bitops_generic+0x92/0x1c0
[   13.241038]  kunit_try_run_case+0x1a5/0x480
[   13.241252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.241486]  kthread+0x337/0x6f0
[   13.241647]  ret_from_fork+0x41/0x80
[   13.241840]  ret_from_fork_asm+0x1a/0x30
[   13.242053] 
[   13.242149] The buggy address belongs to the object at ffff8881025a7fe0
[   13.242149]  which belongs to the cache kmalloc-16 of size 16
[   13.242690] The buggy address is located 8 bytes inside of
[   13.242690]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   13.243108] 
[   13.243205] The buggy address belongs to the physical page:
[   13.243450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   13.244091] flags: 0x200000000000000(node=0|zone=2)
[   13.244333] page_type: f5(slab)
[   13.244506] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.244936] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.245216] page dumped because: kasan: bad access detected
[   13.245386] 
[   13.245455] Memory state around the buggy address:
[   13.245698]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.246088]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.246414] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.246783]                                                           ^
[   13.247068]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.247384]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.247647] ==================================================================
[   13.188521] ==================================================================
[   13.189280] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.189872] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   13.190198] 
[   13.190292] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.190339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.190350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.190371] Call Trace:
[   13.190390]  <TASK>
[   13.190408]  dump_stack_lvl+0x73/0xb0
[   13.190435]  print_report+0xd1/0x650
[   13.190457]  ? __virt_addr_valid+0x1db/0x2d0
[   13.190480]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.190504]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.190528]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.190551]  kasan_report+0x141/0x180
[   13.190574]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.190602]  kasan_check_range+0x10c/0x1c0
[   13.190623]  __kasan_check_write+0x18/0x20
[   13.190642]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.190666]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.190690]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.190711]  ? trace_hardirqs_on+0x37/0xe0
[   13.190774]  ? kasan_bitops_generic+0x92/0x1c0
[   13.190802]  kasan_bitops_generic+0x121/0x1c0
[   13.190821]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.190843]  ? __pfx_read_tsc+0x10/0x10
[   13.190863]  ? ktime_get_ts64+0x86/0x230
[   13.190889]  kunit_try_run_case+0x1a5/0x480
[   13.190928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.190951]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.190976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.190999]  ? __kthread_parkme+0x82/0x180
[   13.191021]  ? preempt_count_sub+0x50/0x80
[   13.191047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.191070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.191093]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.191117]  kthread+0x337/0x6f0
[   13.191133]  ? trace_preempt_on+0x20/0xc0
[   13.191157]  ? __pfx_kthread+0x10/0x10
[   13.191175]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.191197]  ? calculate_sigpending+0x7b/0xa0
[   13.191218]  ? __pfx_kthread+0x10/0x10
[   13.191237]  ret_from_fork+0x41/0x80
[   13.191258]  ? __pfx_kthread+0x10/0x10
[   13.191276]  ret_from_fork_asm+0x1a/0x30
[   13.191309]  </TASK>
[   13.191319] 
[   13.200236] Allocated by task 280:
[   13.200432]  kasan_save_stack+0x45/0x70
[   13.200672]  kasan_save_track+0x18/0x40
[   13.200880]  kasan_save_alloc_info+0x3b/0x50
[   13.201087]  __kasan_kmalloc+0xb7/0xc0
[   13.201220]  __kmalloc_cache_noprof+0x189/0x420
[   13.201411]  kasan_bitops_generic+0x92/0x1c0
[   13.201662]  kunit_try_run_case+0x1a5/0x480
[   13.202021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.202204]  kthread+0x337/0x6f0
[   13.202322]  ret_from_fork+0x41/0x80
[   13.202452]  ret_from_fork_asm+0x1a/0x30
[   13.202656] 
[   13.202751] The buggy address belongs to the object at ffff8881025a7fe0
[   13.202751]  which belongs to the cache kmalloc-16 of size 16
[   13.203299] The buggy address is located 8 bytes inside of
[   13.203299]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   13.203954] 
[   13.204038] The buggy address belongs to the physical page:
[   13.204253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   13.204494] flags: 0x200000000000000(node=0|zone=2)
[   13.204711] page_type: f5(slab)
[   13.204884] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.205303] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.205672] page dumped because: kasan: bad access detected
[   13.206142] 
[   13.206227] Memory state around the buggy address:
[   13.206418]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.206790]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.207125] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.207368]                                                           ^
[   13.207671]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.207891]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.208222] ==================================================================
[   13.086622] ==================================================================
[   13.087002] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.087720] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   13.088128] 
[   13.088238] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.088295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.088307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.088328] Call Trace:
[   13.088346]  <TASK>
[   13.088364]  dump_stack_lvl+0x73/0xb0
[   13.088390]  print_report+0xd1/0x650
[   13.088413]  ? __virt_addr_valid+0x1db/0x2d0
[   13.088435]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.088459]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.088482]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.088506]  kasan_report+0x141/0x180
[   13.088529]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.088557]  kasan_check_range+0x10c/0x1c0
[   13.088577]  __kasan_check_write+0x18/0x20
[   13.088597]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.088621]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.088645]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.088667]  ? trace_hardirqs_on+0x37/0xe0
[   13.088688]  ? kasan_bitops_generic+0x92/0x1c0
[   13.088713]  kasan_bitops_generic+0x121/0x1c0
[   13.088733]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.088754]  ? __pfx_read_tsc+0x10/0x10
[   13.088774]  ? ktime_get_ts64+0x86/0x230
[   13.088841]  kunit_try_run_case+0x1a5/0x480
[   13.088868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.088890]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.088914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.088949]  ? __kthread_parkme+0x82/0x180
[   13.088971]  ? preempt_count_sub+0x50/0x80
[   13.088997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.089021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.089043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.089066]  kthread+0x337/0x6f0
[   13.089083]  ? trace_preempt_on+0x20/0xc0
[   13.089105]  ? __pfx_kthread+0x10/0x10
[   13.089123]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.089144]  ? calculate_sigpending+0x7b/0xa0
[   13.089166]  ? __pfx_kthread+0x10/0x10
[   13.089184]  ret_from_fork+0x41/0x80
[   13.089204]  ? __pfx_kthread+0x10/0x10
[   13.089223]  ret_from_fork_asm+0x1a/0x30
[   13.089254]  </TASK>
[   13.089265] 
[   13.098100] Allocated by task 280:
[   13.098294]  kasan_save_stack+0x45/0x70
[   13.098471]  kasan_save_track+0x18/0x40
[   13.098669]  kasan_save_alloc_info+0x3b/0x50
[   13.098935]  __kasan_kmalloc+0xb7/0xc0
[   13.099174]  __kmalloc_cache_noprof+0x189/0x420
[   13.099357]  kasan_bitops_generic+0x92/0x1c0
[   13.099561]  kunit_try_run_case+0x1a5/0x480
[   13.099815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.100039]  kthread+0x337/0x6f0
[   13.100212]  ret_from_fork+0x41/0x80
[   13.100365]  ret_from_fork_asm+0x1a/0x30
[   13.100506] 
[   13.100576] The buggy address belongs to the object at ffff8881025a7fe0
[   13.100576]  which belongs to the cache kmalloc-16 of size 16
[   13.101324] The buggy address is located 8 bytes inside of
[   13.101324]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   13.101972] 
[   13.102072] The buggy address belongs to the physical page:
[   13.102328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   13.103063] flags: 0x200000000000000(node=0|zone=2)
[   13.103240] page_type: f5(slab)
[   13.103367] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.103887] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.104240] page dumped because: kasan: bad access detected
[   13.104497] 
[   13.104580] Memory state around the buggy address:
[   13.104831]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.105140]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.105423] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.105639]                                                           ^
[   13.106153]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.106413]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.106691] ==================================================================
[   13.248222] ==================================================================
[   13.248537] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.249263] Read of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   13.249566] 
[   13.249671] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.249776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.249789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.249810] Call Trace:
[   13.249828]  <TASK>
[   13.249844]  dump_stack_lvl+0x73/0xb0
[   13.249871]  print_report+0xd1/0x650
[   13.249895]  ? __virt_addr_valid+0x1db/0x2d0
[   13.249928]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.249952]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.249975]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.249999]  kasan_report+0x141/0x180
[   13.250021]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.250050]  __asan_report_load8_noabort+0x18/0x20
[   13.250071]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.250098]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.250122]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.250143]  ? trace_hardirqs_on+0x37/0xe0
[   13.250166]  ? kasan_bitops_generic+0x92/0x1c0
[   13.250191]  kasan_bitops_generic+0x121/0x1c0
[   13.250211]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.250232]  ? __pfx_read_tsc+0x10/0x10
[   13.250253]  ? ktime_get_ts64+0x86/0x230
[   13.250277]  kunit_try_run_case+0x1a5/0x480
[   13.250302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.250324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.250347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.250371]  ? __kthread_parkme+0x82/0x180
[   13.250393]  ? preempt_count_sub+0x50/0x80
[   13.250419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.250442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.250465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.250488]  kthread+0x337/0x6f0
[   13.250505]  ? trace_preempt_on+0x20/0xc0
[   13.250527]  ? __pfx_kthread+0x10/0x10
[   13.250545]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.250567]  ? calculate_sigpending+0x7b/0xa0
[   13.250608]  ? __pfx_kthread+0x10/0x10
[   13.250626]  ret_from_fork+0x41/0x80
[   13.250647]  ? __pfx_kthread+0x10/0x10
[   13.250665]  ret_from_fork_asm+0x1a/0x30
[   13.250697]  </TASK>
[   13.250758] 
[   13.258542] Allocated by task 280:
[   13.258814]  kasan_save_stack+0x45/0x70
[   13.259037]  kasan_save_track+0x18/0x40
[   13.259229]  kasan_save_alloc_info+0x3b/0x50
[   13.259432]  __kasan_kmalloc+0xb7/0xc0
[   13.259642]  __kmalloc_cache_noprof+0x189/0x420
[   13.259938]  kasan_bitops_generic+0x92/0x1c0
[   13.260151]  kunit_try_run_case+0x1a5/0x480
[   13.260360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.260532]  kthread+0x337/0x6f0
[   13.261167]  ret_from_fork+0x41/0x80
[   13.261368]  ret_from_fork_asm+0x1a/0x30
[   13.261521] 
[   13.261594] The buggy address belongs to the object at ffff8881025a7fe0
[   13.261594]  which belongs to the cache kmalloc-16 of size 16
[   13.262154] The buggy address is located 8 bytes inside of
[   13.262154]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   13.262731] 
[   13.262830] The buggy address belongs to the physical page:
[   13.263061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   13.263394] flags: 0x200000000000000(node=0|zone=2)
[   13.263608] page_type: f5(slab)
[   13.263759] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.264076] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.264372] page dumped because: kasan: bad access detected
[   13.264573] 
[   13.264666] Memory state around the buggy address:
[   13.264891]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.265240]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.265507] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.265804]                                                           ^
[   13.266068]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.266381]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.266779] ==================================================================