Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-x86_64

[   42.771790] ==================================================================
[   42.778833] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   42.787771] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   42.795062] 
[   42.796543] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   42.796590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.796606] Hardware name: WinLink E850-96 board (DT)
[   42.796624] Call trace:
[   42.796636]  show_stack+0x20/0x38 (C)
[   42.796665]  dump_stack_lvl+0x8c/0xd0
[   42.796697]  print_report+0x118/0x608
[   42.796724]  kasan_report+0xdc/0x128
[   42.796752]  __asan_report_load8_noabort+0x20/0x30
[   42.796790]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   42.796823]  kasan_bitops_generic+0x11c/0x1c8
[   42.796851]  kunit_try_run_case+0x170/0x3f0
[   42.796886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.796924]  kthread+0x328/0x630
[   42.796957]  ret_from_fork+0x10/0x20
[   42.796986] 
[   42.865634] Allocated by task 310:
[   42.869020]  kasan_save_stack+0x3c/0x68
[   42.872839]  kasan_save_track+0x20/0x40
[   42.876658]  kasan_save_alloc_info+0x40/0x58
[   42.880912]  __kasan_kmalloc+0xd4/0xd8
[   42.884644]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.889158]  kasan_bitops_generic+0xa0/0x1c8
[   42.893411]  kunit_try_run_case+0x170/0x3f0
[   42.897578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.903047]  kthread+0x328/0x630
[   42.906258]  ret_from_fork+0x10/0x20
[   42.909817] 
[   42.911293] The buggy address belongs to the object at ffff000800d63020
[   42.911293]  which belongs to the cache kmalloc-16 of size 16
[   42.923620] The buggy address is located 8 bytes inside of
[   42.923620]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   42.935859] 
[   42.937335] The buggy address belongs to the physical page:
[   42.942891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.950876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.957386] page_type: f5(slab)
[   42.960519] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.968244] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.975963] page dumped because: kasan: bad access detected
[   42.981518] 
[   42.982993] Memory state around the buggy address:
[   42.987773]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.994976]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.002181] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.009382]                                   ^
[   43.013900]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.021104]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.028307] ==================================================================
[   44.098140] ==================================================================
[   44.105201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   44.114140] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   44.121431] 
[   44.122912] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   44.122958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.122974] Hardware name: WinLink E850-96 board (DT)
[   44.122993] Call trace:
[   44.123005]  show_stack+0x20/0x38 (C)
[   44.123037]  dump_stack_lvl+0x8c/0xd0
[   44.123069]  print_report+0x118/0x608
[   44.123099]  kasan_report+0xdc/0x128
[   44.123128]  __asan_report_load8_noabort+0x20/0x30
[   44.123160]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   44.123193]  kasan_bitops_generic+0x11c/0x1c8
[   44.123223]  kunit_try_run_case+0x170/0x3f0
[   44.123257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.123297]  kthread+0x328/0x630
[   44.123326]  ret_from_fork+0x10/0x20
[   44.123357] 
[   44.192003] Allocated by task 310:
[   44.195389]  kasan_save_stack+0x3c/0x68
[   44.199208]  kasan_save_track+0x20/0x40
[   44.203027]  kasan_save_alloc_info+0x40/0x58
[   44.207281]  __kasan_kmalloc+0xd4/0xd8
[   44.211013]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.215527]  kasan_bitops_generic+0xa0/0x1c8
[   44.219780]  kunit_try_run_case+0x170/0x3f0
[   44.223947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.229416]  kthread+0x328/0x630
[   44.232628]  ret_from_fork+0x10/0x20
[   44.236186] 
[   44.237664] The buggy address belongs to the object at ffff000800d63020
[   44.237664]  which belongs to the cache kmalloc-16 of size 16
[   44.249989] The buggy address is located 8 bytes inside of
[   44.249989]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   44.262228] 
[   44.263703] The buggy address belongs to the physical page:
[   44.269260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   44.277245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.283755] page_type: f5(slab)
[   44.286888] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.294612] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.302331] page dumped because: kasan: bad access detected
[   44.307887] 
[   44.309362] Memory state around the buggy address:
[   44.314141]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.321345]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.328550] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.335751]                                   ^
[   44.340268]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.347474]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.354674] ==================================================================
[   42.504414] ==================================================================
[   42.511476] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   42.520414] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   42.527792] 
[   42.529273] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   42.529319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.529335] Hardware name: WinLink E850-96 board (DT)
[   42.529352] Call trace:
[   42.529365]  show_stack+0x20/0x38 (C)
[   42.529399]  dump_stack_lvl+0x8c/0xd0
[   42.529433]  print_report+0x118/0x608
[   42.529463]  kasan_report+0xdc/0x128
[   42.529493]  kasan_check_range+0x100/0x1a8
[   42.529525]  __kasan_check_write+0x20/0x30
[   42.529556]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   42.529589]  kasan_bitops_generic+0x11c/0x1c8
[   42.529618]  kunit_try_run_case+0x170/0x3f0
[   42.529655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.529691]  kthread+0x328/0x630
[   42.529723]  ret_from_fork+0x10/0x20
[   42.529753] 
[   42.601749] Allocated by task 310:
[   42.605134]  kasan_save_stack+0x3c/0x68
[   42.608954]  kasan_save_track+0x20/0x40
[   42.612773]  kasan_save_alloc_info+0x40/0x58
[   42.617027]  __kasan_kmalloc+0xd4/0xd8
[   42.620759]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.625273]  kasan_bitops_generic+0xa0/0x1c8
[   42.629526]  kunit_try_run_case+0x170/0x3f0
[   42.633693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.639162]  kthread+0x328/0x630
[   42.642373]  ret_from_fork+0x10/0x20
[   42.645932] 
[   42.647408] The buggy address belongs to the object at ffff000800d63020
[   42.647408]  which belongs to the cache kmalloc-16 of size 16
[   42.659735] The buggy address is located 8 bytes inside of
[   42.659735]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   42.671974] 
[   42.673450] The buggy address belongs to the physical page:
[   42.679006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.686991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.693501] page_type: f5(slab)
[   42.696634] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.704358] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.712077] page dumped because: kasan: bad access detected
[   42.717632] 
[   42.719108] Memory state around the buggy address:
[   42.723888]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.731091]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.738296] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.745497]                                   ^
[   42.750015]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.757219]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.764420] ==================================================================
[   43.566899] ==================================================================
[   43.573961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   43.582898] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   43.590276] 
[   43.591757] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   43.591804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.591820] Hardware name: WinLink E850-96 board (DT)
[   43.591838] Call trace:
[   43.591851]  show_stack+0x20/0x38 (C)
[   43.591880]  dump_stack_lvl+0x8c/0xd0
[   43.591913]  print_report+0x118/0x608
[   43.591942]  kasan_report+0xdc/0x128
[   43.591970]  kasan_check_range+0x100/0x1a8
[   43.592002]  __kasan_check_write+0x20/0x30
[   43.592034]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   43.592068]  kasan_bitops_generic+0x11c/0x1c8
[   43.592096]  kunit_try_run_case+0x170/0x3f0
[   43.592129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.592166]  kthread+0x328/0x630
[   43.592201]  ret_from_fork+0x10/0x20
[   43.592230] 
[   43.664233] Allocated by task 310:
[   43.667619]  kasan_save_stack+0x3c/0x68
[   43.671438]  kasan_save_track+0x20/0x40
[   43.675257]  kasan_save_alloc_info+0x40/0x58
[   43.679511]  __kasan_kmalloc+0xd4/0xd8
[   43.683243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.687757]  kasan_bitops_generic+0xa0/0x1c8
[   43.692011]  kunit_try_run_case+0x170/0x3f0
[   43.696177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.701646]  kthread+0x328/0x630
[   43.704858]  ret_from_fork+0x10/0x20
[   43.708416] 
[   43.709894] The buggy address belongs to the object at ffff000800d63020
[   43.709894]  which belongs to the cache kmalloc-16 of size 16
[   43.722219] The buggy address is located 8 bytes inside of
[   43.722219]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   43.734458] 
[   43.735934] The buggy address belongs to the physical page:
[   43.741489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.749475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.755986] page_type: f5(slab)
[   43.759118] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.766843] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.774561] page dumped because: kasan: bad access detected
[   43.780117] 
[   43.781592] Memory state around the buggy address:
[   43.786373]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.793575]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.800780] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.807981]                                   ^
[   43.812499]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.819704]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.826904] ==================================================================
[   43.834280] ==================================================================
[   43.841316] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   43.850255] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   43.857546] 
[   43.859027] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   43.859074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.859089] Hardware name: WinLink E850-96 board (DT)
[   43.859106] Call trace:
[   43.859120]  show_stack+0x20/0x38 (C)
[   43.859148]  dump_stack_lvl+0x8c/0xd0
[   43.859182]  print_report+0x118/0x608
[   43.859211]  kasan_report+0xdc/0x128
[   43.859241]  __asan_report_load8_noabort+0x20/0x30
[   43.859276]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   43.859310]  kasan_bitops_generic+0x11c/0x1c8
[   43.859338]  kunit_try_run_case+0x170/0x3f0
[   43.859369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.859407]  kthread+0x328/0x630
[   43.859438]  ret_from_fork+0x10/0x20
[   43.859469] 
[   43.928118] Allocated by task 310:
[   43.931504]  kasan_save_stack+0x3c/0x68
[   43.935323]  kasan_save_track+0x20/0x40
[   43.939142]  kasan_save_alloc_info+0x40/0x58
[   43.943396]  __kasan_kmalloc+0xd4/0xd8
[   43.947128]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.951642]  kasan_bitops_generic+0xa0/0x1c8
[   43.955895]  kunit_try_run_case+0x170/0x3f0
[   43.960062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.965531]  kthread+0x328/0x630
[   43.968742]  ret_from_fork+0x10/0x20
[   43.972302] 
[   43.973778] The buggy address belongs to the object at ffff000800d63020
[   43.973778]  which belongs to the cache kmalloc-16 of size 16
[   43.986104] The buggy address is located 8 bytes inside of
[   43.986104]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   43.998343] 
[   43.999819] The buggy address belongs to the physical page:
[   44.005375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   44.013360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.019870] page_type: f5(slab)
[   44.023003] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.030727] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.038446] page dumped because: kasan: bad access detected
[   44.044002] 
[   44.045477] Memory state around the buggy address:
[   44.050255]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.057460]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.064665] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.071866]                                   ^
[   44.076384]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.083588]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.090790] ==================================================================
[   41.973352] ==================================================================
[   41.980406] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   41.989259] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   41.996637] 
[   41.998118] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   41.998164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.998181] Hardware name: WinLink E850-96 board (DT)
[   41.998200] Call trace:
[   41.998213]  show_stack+0x20/0x38 (C)
[   41.998243]  dump_stack_lvl+0x8c/0xd0
[   41.998278]  print_report+0x118/0x608
[   41.998307]  kasan_report+0xdc/0x128
[   41.998335]  kasan_check_range+0x100/0x1a8
[   41.998367]  __kasan_check_write+0x20/0x30
[   41.998397]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   41.998432]  kasan_bitops_generic+0x11c/0x1c8
[   41.998461]  kunit_try_run_case+0x170/0x3f0
[   41.998495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.998532]  kthread+0x328/0x630
[   41.998563]  ret_from_fork+0x10/0x20
[   41.998594] 
[   42.070507] Allocated by task 310:
[   42.073893]  kasan_save_stack+0x3c/0x68
[   42.077712]  kasan_save_track+0x20/0x40
[   42.081531]  kasan_save_alloc_info+0x40/0x58
[   42.085785]  __kasan_kmalloc+0xd4/0xd8
[   42.089517]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.094031]  kasan_bitops_generic+0xa0/0x1c8
[   42.098284]  kunit_try_run_case+0x170/0x3f0
[   42.102451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.107919]  kthread+0x328/0x630
[   42.111132]  ret_from_fork+0x10/0x20
[   42.114690] 
[   42.116166] The buggy address belongs to the object at ffff000800d63020
[   42.116166]  which belongs to the cache kmalloc-16 of size 16
[   42.128493] The buggy address is located 8 bytes inside of
[   42.128493]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   42.140732] 
[   42.142209] The buggy address belongs to the physical page:
[   42.147764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.155749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.162259] page_type: f5(slab)
[   42.165392] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.173117] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.180835] page dumped because: kasan: bad access detected
[   42.186391] 
[   42.187866] Memory state around the buggy address:
[   42.192646]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.199849]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.207054] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.214255]                                   ^
[   42.218773]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.225977]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.233178] ==================================================================
[   43.303010] ==================================================================
[   43.310073] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   43.319013] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   43.326304] 
[   43.327784] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   43.327832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.327849] Hardware name: WinLink E850-96 board (DT)
[   43.327869] Call trace:
[   43.327880]  show_stack+0x20/0x38 (C)
[   43.327909]  dump_stack_lvl+0x8c/0xd0
[   43.327941]  print_report+0x118/0x608
[   43.327970]  kasan_report+0xdc/0x128
[   43.328000]  __asan_report_load8_noabort+0x20/0x30
[   43.328033]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   43.328068]  kasan_bitops_generic+0x11c/0x1c8
[   43.328096]  kunit_try_run_case+0x170/0x3f0
[   43.328131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.328169]  kthread+0x328/0x630
[   43.328202]  ret_from_fork+0x10/0x20
[   43.328231] 
[   43.396876] Allocated by task 310:
[   43.400262]  kasan_save_stack+0x3c/0x68
[   43.404081]  kasan_save_track+0x20/0x40
[   43.407900]  kasan_save_alloc_info+0x40/0x58
[   43.412154]  __kasan_kmalloc+0xd4/0xd8
[   43.415886]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.420400]  kasan_bitops_generic+0xa0/0x1c8
[   43.424653]  kunit_try_run_case+0x170/0x3f0
[   43.428820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.434289]  kthread+0x328/0x630
[   43.437501]  ret_from_fork+0x10/0x20
[   43.441059] 
[   43.442537] The buggy address belongs to the object at ffff000800d63020
[   43.442537]  which belongs to the cache kmalloc-16 of size 16
[   43.454862] The buggy address is located 8 bytes inside of
[   43.454862]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   43.467101] 
[   43.468576] The buggy address belongs to the physical page:
[   43.474132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.482118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.488628] page_type: f5(slab)
[   43.491761] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.499485] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.507205] page dumped because: kasan: bad access detected
[   43.512760] 
[   43.514235] Memory state around the buggy address:
[   43.519014]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.526218]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.533423] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.540624]                                   ^
[   43.545142]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.552346]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.559547] ==================================================================
[   42.240553] ==================================================================
[   42.247590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   42.256530] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   42.263820] 
[   42.265300] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   42.265345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.265360] Hardware name: WinLink E850-96 board (DT)
[   42.265378] Call trace:
[   42.265390]  show_stack+0x20/0x38 (C)
[   42.265424]  dump_stack_lvl+0x8c/0xd0
[   42.265456]  print_report+0x118/0x608
[   42.265486]  kasan_report+0xdc/0x128
[   42.265515]  __asan_report_load8_noabort+0x20/0x30
[   42.265548]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   42.265583]  kasan_bitops_generic+0x11c/0x1c8
[   42.265610]  kunit_try_run_case+0x170/0x3f0
[   42.265645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.265685]  kthread+0x328/0x630
[   42.265715]  ret_from_fork+0x10/0x20
[   42.265747] 
[   42.334392] Allocated by task 310:
[   42.337778]  kasan_save_stack+0x3c/0x68
[   42.341597]  kasan_save_track+0x20/0x40
[   42.345416]  kasan_save_alloc_info+0x40/0x58
[   42.349670]  __kasan_kmalloc+0xd4/0xd8
[   42.353402]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.357916]  kasan_bitops_generic+0xa0/0x1c8
[   42.362170]  kunit_try_run_case+0x170/0x3f0
[   42.366336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.371805]  kthread+0x328/0x630
[   42.375016]  ret_from_fork+0x10/0x20
[   42.378575] 
[   42.380052] The buggy address belongs to the object at ffff000800d63020
[   42.380052]  which belongs to the cache kmalloc-16 of size 16
[   42.392378] The buggy address is located 8 bytes inside of
[   42.392378]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   42.404617] 
[   42.406094] The buggy address belongs to the physical page:
[   42.411648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.419634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.426144] page_type: f5(slab)
[   42.429277] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.437001] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.444720] page dumped because: kasan: bad access detected
[   42.450276] 
[   42.451751] Memory state around the buggy address:
[   42.456530]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.463734]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.470939] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.478140]                                   ^
[   42.482658]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.489862]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.497064] ==================================================================
[   43.035627] ==================================================================
[   43.042716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   43.051656] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   43.059034] 
[   43.060514] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   43.060562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.060577] Hardware name: WinLink E850-96 board (DT)
[   43.060596] Call trace:
[   43.060606]  show_stack+0x20/0x38 (C)
[   43.060636]  dump_stack_lvl+0x8c/0xd0
[   43.060669]  print_report+0x118/0x608
[   43.060698]  kasan_report+0xdc/0x128
[   43.060726]  kasan_check_range+0x100/0x1a8
[   43.060757]  __kasan_check_write+0x20/0x30
[   43.060788]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   43.060822]  kasan_bitops_generic+0x11c/0x1c8
[   43.060853]  kunit_try_run_case+0x170/0x3f0
[   43.060888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.060927]  kthread+0x328/0x630
[   43.060959]  ret_from_fork+0x10/0x20
[   43.060989] 
[   43.132992] Allocated by task 310:
[   43.136376]  kasan_save_stack+0x3c/0x68
[   43.140196]  kasan_save_track+0x20/0x40
[   43.144015]  kasan_save_alloc_info+0x40/0x58
[   43.148268]  __kasan_kmalloc+0xd4/0xd8
[   43.152001]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.156515]  kasan_bitops_generic+0xa0/0x1c8
[   43.160768]  kunit_try_run_case+0x170/0x3f0
[   43.164935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.170404]  kthread+0x328/0x630
[   43.173615]  ret_from_fork+0x10/0x20
[   43.177175] 
[   43.178652] The buggy address belongs to the object at ffff000800d63020
[   43.178652]  which belongs to the cache kmalloc-16 of size 16
[   43.190977] The buggy address is located 8 bytes inside of
[   43.190977]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   43.203216] 
[   43.204692] The buggy address belongs to the physical page:
[   43.210249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.218233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.224743] page_type: f5(slab)
[   43.227876] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.235600] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.243320] page dumped because: kasan: bad access detected
[   43.248875] 
[   43.250350] Memory state around the buggy address:
[   43.255129]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.262334]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.269538] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.276739]                                   ^
[   43.281257]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.288461]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.295664] ==================================================================

[   17.469564] ==================================================================
[   17.469963] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.470748] Read of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   17.471121] 
[   17.471352] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.471453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.471481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.471524] Call Trace:
[   17.471566]  <TASK>
[   17.471607]  dump_stack_lvl+0x73/0xb0
[   17.471673]  print_report+0xd1/0x650
[   17.471720]  ? __virt_addr_valid+0x1db/0x2d0
[   17.471755]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.471782]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.471813]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.471841]  kasan_report+0x141/0x180
[   17.471883]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.471914]  __asan_report_load8_noabort+0x18/0x20
[   17.471939]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.471965]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.471994]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.472017]  ? trace_hardirqs_on+0x37/0xe0
[   17.472044]  ? kasan_bitops_generic+0x92/0x1c0
[   17.472375]  kasan_bitops_generic+0x121/0x1c0
[   17.472445]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.472478]  ? __pfx_read_tsc+0x10/0x10
[   17.472504]  ? ktime_get_ts64+0x86/0x230
[   17.472534]  kunit_try_run_case+0x1a5/0x480
[   17.472564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.472589]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.472617]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.472643]  ? __kthread_parkme+0x82/0x180
[   17.472668]  ? preempt_count_sub+0x50/0x80
[   17.472697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.472723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.472750]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.472775]  kthread+0x337/0x6f0
[   17.472794]  ? trace_preempt_on+0x20/0xc0
[   17.472819]  ? __pfx_kthread+0x10/0x10
[   17.472840]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.472864]  ? calculate_sigpending+0x7b/0xa0
[   17.472888]  ? __pfx_kthread+0x10/0x10
[   17.472908]  ret_from_fork+0x41/0x80
[   17.472931]  ? __pfx_kthread+0x10/0x10
[   17.472951]  ret_from_fork_asm+0x1a/0x30
[   17.472986]  </TASK>
[   17.472999] 
[   17.487051] Allocated by task 282:
[   17.487541]  kasan_save_stack+0x45/0x70
[   17.487910]  kasan_save_track+0x18/0x40
[   17.488099]  kasan_save_alloc_info+0x3b/0x50
[   17.488298]  __kasan_kmalloc+0xb7/0xc0
[   17.488500]  __kmalloc_cache_noprof+0x189/0x420
[   17.489043]  kasan_bitops_generic+0x92/0x1c0
[   17.489897]  kunit_try_run_case+0x1a5/0x480
[   17.490606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.490998]  kthread+0x337/0x6f0
[   17.491568]  ret_from_fork+0x41/0x80
[   17.491824]  ret_from_fork_asm+0x1a/0x30
[   17.492002] 
[   17.492428] The buggy address belongs to the object at ffff8881024d2600
[   17.492428]  which belongs to the cache kmalloc-16 of size 16
[   17.493119] The buggy address is located 8 bytes inside of
[   17.493119]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.493909] 
[   17.494304] The buggy address belongs to the physical page:
[   17.495004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.495581] flags: 0x200000000000000(node=0|zone=2)
[   17.495989] page_type: f5(slab)
[   17.496509] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.496991] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.497731] page dumped because: kasan: bad access detected
[   17.498324] 
[   17.498476] Memory state around the buggy address:
[   17.498676]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.499595]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.500069] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.500573]                       ^
[   17.500779]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.501863]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.502211] ==================================================================
[   17.230843] ==================================================================
[   17.232001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.232923] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   17.234084] 
[   17.234564] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.234684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.234711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.234750] Call Trace:
[   17.234781]  <TASK>
[   17.234819]  dump_stack_lvl+0x73/0xb0
[   17.234881]  print_report+0xd1/0x650
[   17.234924]  ? __virt_addr_valid+0x1db/0x2d0
[   17.234970]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.235020]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.235066]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.235107]  kasan_report+0x141/0x180
[   17.235133]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.235165]  kasan_check_range+0x10c/0x1c0
[   17.235188]  __kasan_check_write+0x18/0x20
[   17.235272]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.235316]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.235374]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.235400]  ? trace_hardirqs_on+0x37/0xe0
[   17.235427]  ? kasan_bitops_generic+0x92/0x1c0
[   17.235453]  kasan_bitops_generic+0x121/0x1c0
[   17.235477]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.235502]  ? __pfx_read_tsc+0x10/0x10
[   17.235525]  ? ktime_get_ts64+0x86/0x230
[   17.235555]  kunit_try_run_case+0x1a5/0x480
[   17.235583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.235607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.235636]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.235662]  ? __kthread_parkme+0x82/0x180
[   17.235688]  ? preempt_count_sub+0x50/0x80
[   17.235717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.235743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.235769]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.235794]  kthread+0x337/0x6f0
[   17.235813]  ? trace_preempt_on+0x20/0xc0
[   17.235837]  ? __pfx_kthread+0x10/0x10
[   17.235857]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.235881]  ? calculate_sigpending+0x7b/0xa0
[   17.235905]  ? __pfx_kthread+0x10/0x10
[   17.235925]  ret_from_fork+0x41/0x80
[   17.235947]  ? __pfx_kthread+0x10/0x10
[   17.235967]  ret_from_fork_asm+0x1a/0x30
[   17.236001]  </TASK>
[   17.236015] 
[   17.247459] Allocated by task 282:
[   17.247829]  kasan_save_stack+0x45/0x70
[   17.248194]  kasan_save_track+0x18/0x40
[   17.248576]  kasan_save_alloc_info+0x3b/0x50
[   17.248892]  __kasan_kmalloc+0xb7/0xc0
[   17.249272]  __kmalloc_cache_noprof+0x189/0x420
[   17.249596]  kasan_bitops_generic+0x92/0x1c0
[   17.250010]  kunit_try_run_case+0x1a5/0x480
[   17.250235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.250701]  kthread+0x337/0x6f0
[   17.251008]  ret_from_fork+0x41/0x80
[   17.251326]  ret_from_fork_asm+0x1a/0x30
[   17.251628] 
[   17.251755] The buggy address belongs to the object at ffff8881024d2600
[   17.251755]  which belongs to the cache kmalloc-16 of size 16
[   17.252147] The buggy address is located 8 bytes inside of
[   17.252147]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.253056] 
[   17.253300] The buggy address belongs to the physical page:
[   17.253577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.254106] flags: 0x200000000000000(node=0|zone=2)
[   17.254366] page_type: f5(slab)
[   17.254563] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.254851] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.255161] page dumped because: kasan: bad access detected
[   17.255399] 
[   17.255561] Memory state around the buggy address:
[   17.255925]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.256549]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.257620] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.258180]                       ^
[   17.258582]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.259130]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.260555] ==================================================================
[   17.433873] ==================================================================
[   17.434348] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.434895] Read of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   17.435459] 
[   17.435711] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.435821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.435850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.435899] Call Trace:
[   17.435945]  <TASK>
[   17.435989]  dump_stack_lvl+0x73/0xb0
[   17.436057]  print_report+0xd1/0x650
[   17.436103]  ? __virt_addr_valid+0x1db/0x2d0
[   17.436149]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.436197]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.436245]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.436299]  kasan_report+0x141/0x180
[   17.436379]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.436443]  kasan_check_range+0x10c/0x1c0
[   17.436492]  __kasan_check_read+0x15/0x20
[   17.436538]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.436590]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.436645]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.436689]  ? trace_hardirqs_on+0x37/0xe0
[   17.436723]  ? kasan_bitops_generic+0x92/0x1c0
[   17.436752]  kasan_bitops_generic+0x121/0x1c0
[   17.436775]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.436800]  ? __pfx_read_tsc+0x10/0x10
[   17.436828]  ? ktime_get_ts64+0x86/0x230
[   17.436877]  kunit_try_run_case+0x1a5/0x480
[   17.436925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.436964]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.437024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.437075]  ? __kthread_parkme+0x82/0x180
[   17.437129]  ? preempt_count_sub+0x50/0x80
[   17.437186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.437240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.437294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.438147]  kthread+0x337/0x6f0
[   17.438253]  ? trace_preempt_on+0x20/0xc0
[   17.438309]  ? __pfx_kthread+0x10/0x10
[   17.438369]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.438421]  ? calculate_sigpending+0x7b/0xa0
[   17.438470]  ? __pfx_kthread+0x10/0x10
[   17.438513]  ret_from_fork+0x41/0x80
[   17.438559]  ? __pfx_kthread+0x10/0x10
[   17.438602]  ret_from_fork_asm+0x1a/0x30
[   17.438673]  </TASK>
[   17.438695] 
[   17.452706] Allocated by task 282:
[   17.453318]  kasan_save_stack+0x45/0x70
[   17.453689]  kasan_save_track+0x18/0x40
[   17.454075]  kasan_save_alloc_info+0x3b/0x50
[   17.454311]  __kasan_kmalloc+0xb7/0xc0
[   17.454597]  __kmalloc_cache_noprof+0x189/0x420
[   17.454951]  kasan_bitops_generic+0x92/0x1c0
[   17.455206]  kunit_try_run_case+0x1a5/0x480
[   17.455516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.456232]  kthread+0x337/0x6f0
[   17.456856]  ret_from_fork+0x41/0x80
[   17.457027]  ret_from_fork_asm+0x1a/0x30
[   17.457562] 
[   17.457686] The buggy address belongs to the object at ffff8881024d2600
[   17.457686]  which belongs to the cache kmalloc-16 of size 16
[   17.458874] The buggy address is located 8 bytes inside of
[   17.458874]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.459706] 
[   17.459916] The buggy address belongs to the physical page:
[   17.460515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.460928] flags: 0x200000000000000(node=0|zone=2)
[   17.461262] page_type: f5(slab)
[   17.461696] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.462429] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.462951] page dumped because: kasan: bad access detected
[   17.463520] 
[   17.463663] Memory state around the buggy address:
[   17.464048]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.464570]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.465497] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.465952]                       ^
[   17.466494]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.467091]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.467637] ==================================================================
[   17.261698] ==================================================================
[   17.263924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.265052] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   17.266470] 
[   17.267493] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.267636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.267680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.267731] Call Trace:
[   17.267774]  <TASK>
[   17.267804]  dump_stack_lvl+0x73/0xb0
[   17.267850]  print_report+0xd1/0x650
[   17.267879]  ? __virt_addr_valid+0x1db/0x2d0
[   17.267905]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.267931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.267957]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.267983]  kasan_report+0x141/0x180
[   17.268009]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.268040]  kasan_check_range+0x10c/0x1c0
[   17.268072]  __kasan_check_write+0x18/0x20
[   17.268106]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.268134]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.268161]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.268185]  ? trace_hardirqs_on+0x37/0xe0
[   17.268235]  ? kasan_bitops_generic+0x92/0x1c0
[   17.268276]  kasan_bitops_generic+0x121/0x1c0
[   17.268310]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.268360]  ? __pfx_read_tsc+0x10/0x10
[   17.268397]  ? ktime_get_ts64+0x86/0x230
[   17.268443]  kunit_try_run_case+0x1a5/0x480
[   17.268484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.268518]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.268559]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.268596]  ? __kthread_parkme+0x82/0x180
[   17.268635]  ? preempt_count_sub+0x50/0x80
[   17.268682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.268719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.268747]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.268773]  kthread+0x337/0x6f0
[   17.268793]  ? trace_preempt_on+0x20/0xc0
[   17.268819]  ? __pfx_kthread+0x10/0x10
[   17.268839]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.268863]  ? calculate_sigpending+0x7b/0xa0
[   17.268889]  ? __pfx_kthread+0x10/0x10
[   17.268909]  ret_from_fork+0x41/0x80
[   17.268932]  ? __pfx_kthread+0x10/0x10
[   17.268952]  ret_from_fork_asm+0x1a/0x30
[   17.268987]  </TASK>
[   17.268999] 
[   17.285562] Allocated by task 282:
[   17.285933]  kasan_save_stack+0x45/0x70
[   17.286768]  kasan_save_track+0x18/0x40
[   17.287046]  kasan_save_alloc_info+0x3b/0x50
[   17.287824]  __kasan_kmalloc+0xb7/0xc0
[   17.288274]  __kmalloc_cache_noprof+0x189/0x420
[   17.288850]  kasan_bitops_generic+0x92/0x1c0
[   17.289410]  kunit_try_run_case+0x1a5/0x480
[   17.289745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.290039]  kthread+0x337/0x6f0
[   17.290361]  ret_from_fork+0x41/0x80
[   17.290547]  ret_from_fork_asm+0x1a/0x30
[   17.290999] 
[   17.291167] The buggy address belongs to the object at ffff8881024d2600
[   17.291167]  which belongs to the cache kmalloc-16 of size 16
[   17.292266] The buggy address is located 8 bytes inside of
[   17.292266]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.292885] 
[   17.293452] The buggy address belongs to the physical page:
[   17.294551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.295004] flags: 0x200000000000000(node=0|zone=2)
[   17.295406] page_type: f5(slab)
[   17.295870] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.296492] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.297277] page dumped because: kasan: bad access detected
[   17.297497] 
[   17.297595] Memory state around the buggy address:
[   17.297940]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.298618]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.299287] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.299884]                       ^
[   17.300539]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.301119]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.301574] ==================================================================
[   17.191855] ==================================================================
[   17.192951] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.193632] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   17.194602] 
[   17.195367] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.195699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.195726] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.195756] Call Trace:
[   17.195774]  <TASK>
[   17.195800]  dump_stack_lvl+0x73/0xb0
[   17.195843]  print_report+0xd1/0x650
[   17.195871]  ? __virt_addr_valid+0x1db/0x2d0
[   17.195899]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.195926]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.195951]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.195978]  kasan_report+0x141/0x180
[   17.196003]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.196035]  kasan_check_range+0x10c/0x1c0
[   17.196058]  __kasan_check_write+0x18/0x20
[   17.196102]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.196130]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.196158]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.196183]  ? trace_hardirqs_on+0x37/0xe0
[   17.196212]  ? kasan_bitops_generic+0x92/0x1c0
[   17.196287]  kasan_bitops_generic+0x121/0x1c0
[   17.196330]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.196387]  ? __pfx_read_tsc+0x10/0x10
[   17.196424]  ? ktime_get_ts64+0x86/0x230
[   17.196471]  kunit_try_run_case+0x1a5/0x480
[   17.196517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.196577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.196625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.196667]  ? __kthread_parkme+0x82/0x180
[   17.196704]  ? preempt_count_sub+0x50/0x80
[   17.196735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.196762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.196790]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.196816]  kthread+0x337/0x6f0
[   17.196834]  ? trace_preempt_on+0x20/0xc0
[   17.196861]  ? __pfx_kthread+0x10/0x10
[   17.196881]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.196906]  ? calculate_sigpending+0x7b/0xa0
[   17.196931]  ? __pfx_kthread+0x10/0x10
[   17.196951]  ret_from_fork+0x41/0x80
[   17.196976]  ? __pfx_kthread+0x10/0x10
[   17.196997]  ret_from_fork_asm+0x1a/0x30
[   17.197045]  </TASK>
[   17.197060] 
[   17.213849] Allocated by task 282:
[   17.214240]  kasan_save_stack+0x45/0x70
[   17.214609]  kasan_save_track+0x18/0x40
[   17.214889]  kasan_save_alloc_info+0x3b/0x50
[   17.215779]  __kasan_kmalloc+0xb7/0xc0
[   17.215972]  __kmalloc_cache_noprof+0x189/0x420
[   17.216213]  kasan_bitops_generic+0x92/0x1c0
[   17.217174]  kunit_try_run_case+0x1a5/0x480
[   17.218066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.218581]  kthread+0x337/0x6f0
[   17.218963]  ret_from_fork+0x41/0x80
[   17.219267]  ret_from_fork_asm+0x1a/0x30
[   17.219471] 
[   17.219638] The buggy address belongs to the object at ffff8881024d2600
[   17.219638]  which belongs to the cache kmalloc-16 of size 16
[   17.220786] The buggy address is located 8 bytes inside of
[   17.220786]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.221885] 
[   17.222086] The buggy address belongs to the physical page:
[   17.222675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.223076] flags: 0x200000000000000(node=0|zone=2)
[   17.223503] page_type: f5(slab)
[   17.223852] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.224905] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.226198] page dumped because: kasan: bad access detected
[   17.226447] 
[   17.226519] Memory state around the buggy address:
[   17.226631]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.226770]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.226904] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.227034]                       ^
[   17.227315]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.227869]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.228879] ==================================================================
[   17.367999] ==================================================================
[   17.368570] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.368944] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   17.369505] 
[   17.369742] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.369825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.369847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.369884] Call Trace:
[   17.369925]  <TASK>
[   17.369965]  dump_stack_lvl+0x73/0xb0
[   17.370020]  print_report+0xd1/0x650
[   17.370094]  ? __virt_addr_valid+0x1db/0x2d0
[   17.370148]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.370226]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.370275]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.370358]  kasan_report+0x141/0x180
[   17.370424]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.370502]  kasan_check_range+0x10c/0x1c0
[   17.370561]  __kasan_check_write+0x18/0x20
[   17.370600]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.370643]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.370690]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.370731]  ? trace_hardirqs_on+0x37/0xe0
[   17.370779]  ? kasan_bitops_generic+0x92/0x1c0
[   17.371446]  kasan_bitops_generic+0x121/0x1c0
[   17.371512]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.371593]  ? __pfx_read_tsc+0x10/0x10
[   17.371630]  ? ktime_get_ts64+0x86/0x230
[   17.371680]  kunit_try_run_case+0x1a5/0x480
[   17.371726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.371767]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.371817]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.372151]  ? __kthread_parkme+0x82/0x180
[   17.372219]  ? preempt_count_sub+0x50/0x80
[   17.372285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.372329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.372562]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.372614]  kthread+0x337/0x6f0
[   17.372653]  ? trace_preempt_on+0x20/0xc0
[   17.372706]  ? __pfx_kthread+0x10/0x10
[   17.372749]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.372800]  ? calculate_sigpending+0x7b/0xa0
[   17.372847]  ? __pfx_kthread+0x10/0x10
[   17.372891]  ret_from_fork+0x41/0x80
[   17.372937]  ? __pfx_kthread+0x10/0x10
[   17.372980]  ret_from_fork_asm+0x1a/0x30
[   17.373051]  </TASK>
[   17.373106] 
[   17.387135] Allocated by task 282:
[   17.388253]  kasan_save_stack+0x45/0x70
[   17.389103]  kasan_save_track+0x18/0x40
[   17.390003]  kasan_save_alloc_info+0x3b/0x50
[   17.390443]  __kasan_kmalloc+0xb7/0xc0
[   17.390735]  __kmalloc_cache_noprof+0x189/0x420
[   17.390961]  kasan_bitops_generic+0x92/0x1c0
[   17.391737]  kunit_try_run_case+0x1a5/0x480
[   17.392000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.392741]  kthread+0x337/0x6f0
[   17.393102]  ret_from_fork+0x41/0x80
[   17.393370]  ret_from_fork_asm+0x1a/0x30
[   17.393637] 
[   17.393758] The buggy address belongs to the object at ffff8881024d2600
[   17.393758]  which belongs to the cache kmalloc-16 of size 16
[   17.394679] The buggy address is located 8 bytes inside of
[   17.394679]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.396075] 
[   17.396260] The buggy address belongs to the physical page:
[   17.396646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.397234] flags: 0x200000000000000(node=0|zone=2)
[   17.397511] page_type: f5(slab)
[   17.397878] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.398622] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.399199] page dumped because: kasan: bad access detected
[   17.399577] 
[   17.399701] Memory state around the buggy address:
[   17.399906]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.400483]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.400859] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.401329]                       ^
[   17.401610]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.402232]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.402925] ==================================================================
[   17.339525] ==================================================================
[   17.340147] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.340895] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   17.341793] 
[   17.341994] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.342292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.342328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.342394] Call Trace:
[   17.342426]  <TASK>
[   17.342527]  dump_stack_lvl+0x73/0xb0
[   17.342594]  print_report+0xd1/0x650
[   17.342625]  ? __virt_addr_valid+0x1db/0x2d0
[   17.342651]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.342677]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.342702]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.342729]  kasan_report+0x141/0x180
[   17.342754]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.342787]  kasan_check_range+0x10c/0x1c0
[   17.342809]  __kasan_check_write+0x18/0x20
[   17.342831]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.342857]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.342884]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.342908]  ? trace_hardirqs_on+0x37/0xe0
[   17.342933]  ? kasan_bitops_generic+0x92/0x1c0
[   17.342959]  kasan_bitops_generic+0x121/0x1c0
[   17.342982]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.343005]  ? __pfx_read_tsc+0x10/0x10
[   17.343027]  ? ktime_get_ts64+0x86/0x230
[   17.343056]  kunit_try_run_case+0x1a5/0x480
[   17.343095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.343121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.343150]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.343177]  ? __kthread_parkme+0x82/0x180
[   17.343201]  ? preempt_count_sub+0x50/0x80
[   17.343231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.343257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.343283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.343309]  kthread+0x337/0x6f0
[   17.343329]  ? trace_preempt_on+0x20/0xc0
[   17.343373]  ? __pfx_kthread+0x10/0x10
[   17.343395]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.343419]  ? calculate_sigpending+0x7b/0xa0
[   17.343443]  ? __pfx_kthread+0x10/0x10
[   17.343464]  ret_from_fork+0x41/0x80
[   17.343488]  ? __pfx_kthread+0x10/0x10
[   17.343508]  ret_from_fork_asm+0x1a/0x30
[   17.343543]  </TASK>
[   17.343555] 
[   17.354974] Allocated by task 282:
[   17.355322]  kasan_save_stack+0x45/0x70
[   17.355641]  kasan_save_track+0x18/0x40
[   17.355843]  kasan_save_alloc_info+0x3b/0x50
[   17.356230]  __kasan_kmalloc+0xb7/0xc0
[   17.356581]  __kmalloc_cache_noprof+0x189/0x420
[   17.356966]  kasan_bitops_generic+0x92/0x1c0
[   17.357349]  kunit_try_run_case+0x1a5/0x480
[   17.357642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.357918]  kthread+0x337/0x6f0
[   17.358283]  ret_from_fork+0x41/0x80
[   17.358636]  ret_from_fork_asm+0x1a/0x30
[   17.358988] 
[   17.359193] The buggy address belongs to the object at ffff8881024d2600
[   17.359193]  which belongs to the cache kmalloc-16 of size 16
[   17.359804] The buggy address is located 8 bytes inside of
[   17.359804]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.360316] 
[   17.360530] The buggy address belongs to the physical page:
[   17.360983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.361538] flags: 0x200000000000000(node=0|zone=2)
[   17.361971] page_type: f5(slab)
[   17.362314] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.362627] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.362904] page dumped because: kasan: bad access detected
[   17.363302] 
[   17.363516] Memory state around the buggy address:
[   17.363915]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.364499]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.365053] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.365660]                       ^
[   17.365919]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.366240]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.366815] ==================================================================
[   17.302970] ==================================================================
[   17.303517] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.304280] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   17.304840] 
[   17.305392] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.305544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.305570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.305612] Call Trace:
[   17.305655]  <TASK>
[   17.305694]  dump_stack_lvl+0x73/0xb0
[   17.305802]  print_report+0xd1/0x650
[   17.305857]  ? __virt_addr_valid+0x1db/0x2d0
[   17.305950]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.306018]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.306071]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.306124]  kasan_report+0x141/0x180
[   17.306173]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.306230]  kasan_check_range+0x10c/0x1c0
[   17.306276]  __kasan_check_write+0x18/0x20
[   17.306300]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.306328]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.306387]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.306425]  ? trace_hardirqs_on+0x37/0xe0
[   17.306462]  ? kasan_bitops_generic+0x92/0x1c0
[   17.306503]  kasan_bitops_generic+0x121/0x1c0
[   17.306537]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.306574]  ? __pfx_read_tsc+0x10/0x10
[   17.306610]  ? ktime_get_ts64+0x86/0x230
[   17.306655]  kunit_try_run_case+0x1a5/0x480
[   17.306708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.306743]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.306787]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.306837]  ? __kthread_parkme+0x82/0x180
[   17.306877]  ? preempt_count_sub+0x50/0x80
[   17.306912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.306939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.306966]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.306991]  kthread+0x337/0x6f0
[   17.307011]  ? trace_preempt_on+0x20/0xc0
[   17.307035]  ? __pfx_kthread+0x10/0x10
[   17.307055]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.307088]  ? calculate_sigpending+0x7b/0xa0
[   17.307112]  ? __pfx_kthread+0x10/0x10
[   17.307133]  ret_from_fork+0x41/0x80
[   17.307155]  ? __pfx_kthread+0x10/0x10
[   17.307177]  ret_from_fork_asm+0x1a/0x30
[   17.307239]  </TASK>
[   17.307270] 
[   17.321549] Allocated by task 282:
[   17.321988]  kasan_save_stack+0x45/0x70
[   17.322705]  kasan_save_track+0x18/0x40
[   17.323013]  kasan_save_alloc_info+0x3b/0x50
[   17.323404]  __kasan_kmalloc+0xb7/0xc0
[   17.323736]  __kmalloc_cache_noprof+0x189/0x420
[   17.324176]  kasan_bitops_generic+0x92/0x1c0
[   17.325351]  kunit_try_run_case+0x1a5/0x480
[   17.325886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.326473]  kthread+0x337/0x6f0
[   17.326670]  ret_from_fork+0x41/0x80
[   17.327280]  ret_from_fork_asm+0x1a/0x30
[   17.327868] 
[   17.327948] The buggy address belongs to the object at ffff8881024d2600
[   17.327948]  which belongs to the cache kmalloc-16 of size 16
[   17.328699] The buggy address is located 8 bytes inside of
[   17.328699]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.329515] 
[   17.329709] The buggy address belongs to the physical page:
[   17.330554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.331141] flags: 0x200000000000000(node=0|zone=2)
[   17.331358] page_type: f5(slab)
[   17.331555] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.332240] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.332815] page dumped because: kasan: bad access detected
[   17.333025] 
[   17.333695] Memory state around the buggy address:
[   17.334481]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.334889]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.335497] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.336232]                       ^
[   17.336564]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.336836]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.337607] ==================================================================
[   17.405191] ==================================================================
[   17.405832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.406368] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   17.406905] 
[   17.407149] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.407251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.407278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.407323] Call Trace:
[   17.407391]  <TASK>
[   17.407450]  dump_stack_lvl+0x73/0xb0
[   17.407513]  print_report+0xd1/0x650
[   17.407561]  ? __virt_addr_valid+0x1db/0x2d0
[   17.407611]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.407672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.407734]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.407781]  kasan_report+0x141/0x180
[   17.407834]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.407892]  kasan_check_range+0x10c/0x1c0
[   17.407936]  __kasan_check_write+0x18/0x20
[   17.407975]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.408040]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.408109]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.408174]  ? trace_hardirqs_on+0x37/0xe0
[   17.408218]  ? kasan_bitops_generic+0x92/0x1c0
[   17.408247]  kasan_bitops_generic+0x121/0x1c0
[   17.408271]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.408295]  ? __pfx_read_tsc+0x10/0x10
[   17.408320]  ? ktime_get_ts64+0x86/0x230
[   17.408374]  kunit_try_run_case+0x1a5/0x480
[   17.408406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.408431]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.408459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.408487]  ? __kthread_parkme+0x82/0x180
[   17.408512]  ? preempt_count_sub+0x50/0x80
[   17.408542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.408571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.408598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.408623]  kthread+0x337/0x6f0
[   17.408642]  ? trace_preempt_on+0x20/0xc0
[   17.408667]  ? __pfx_kthread+0x10/0x10
[   17.408687]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.408711]  ? calculate_sigpending+0x7b/0xa0
[   17.408736]  ? __pfx_kthread+0x10/0x10
[   17.408756]  ret_from_fork+0x41/0x80
[   17.408780]  ? __pfx_kthread+0x10/0x10
[   17.408801]  ret_from_fork_asm+0x1a/0x30
[   17.408836]  </TASK>
[   17.408849] 
[   17.420091] Allocated by task 282:
[   17.420297]  kasan_save_stack+0x45/0x70
[   17.420690]  kasan_save_track+0x18/0x40
[   17.421080]  kasan_save_alloc_info+0x3b/0x50
[   17.421641]  __kasan_kmalloc+0xb7/0xc0
[   17.422005]  __kmalloc_cache_noprof+0x189/0x420
[   17.422436]  kasan_bitops_generic+0x92/0x1c0
[   17.422646]  kunit_try_run_case+0x1a5/0x480
[   17.422850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.423361]  kthread+0x337/0x6f0
[   17.423668]  ret_from_fork+0x41/0x80
[   17.424013]  ret_from_fork_asm+0x1a/0x30
[   17.424397] 
[   17.424596] The buggy address belongs to the object at ffff8881024d2600
[   17.424596]  which belongs to the cache kmalloc-16 of size 16
[   17.425303] The buggy address is located 8 bytes inside of
[   17.425303]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.426009] 
[   17.426273] The buggy address belongs to the physical page:
[   17.426552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.427103] flags: 0x200000000000000(node=0|zone=2)
[   17.427394] page_type: f5(slab)
[   17.427738] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.428255] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.428679] page dumped because: kasan: bad access detected
[   17.429052] 
[   17.429187] Memory state around the buggy address:
[   17.429436]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.429991]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.430432] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.430702]                       ^
[   17.430876]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.431312]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.431964] ==================================================================