Hay
Date
March 19, 2025, 10:35 a.m.

Environment
qemu-x86_64

[   25.097077] ==================================================================
[   25.097522] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.098558] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.099385] 
[   25.100164] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.100303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.100342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.100398] Call Trace:
[   25.100433]  <TASK>
[   25.100486]  dump_stack_lvl+0x73/0xb0
[   25.100594]  print_report+0xd1/0x660
[   25.100667]  ? __virt_addr_valid+0x1db/0x2d0
[   25.101031]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.101135]  kasan_report+0x104/0x140
[   25.101201]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.101245]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.101293]  kasan_check_range+0x10c/0x1c0
[   25.101329]  __kasan_check_write+0x18/0x20
[   25.101358]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.101397]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.101436]  ? kasan_save_alloc_info+0x3b/0x50
[   25.101470]  ? kasan_save_stack+0x3d/0x60
[   25.101508]  kasan_bitops_generic+0x116/0x1c0
[   25.101542]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.101579]  ? __pfx_read_tsc+0x10/0x10
[   25.101612]  ? ktime_get_ts64+0x86/0x240
[   25.101648]  kunit_try_run_case+0x1b2/0x490
[   25.101753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.101815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.101897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.101932]  ? __kthread_parkme+0x82/0x160
[   25.101964]  ? preempt_count_sub+0x50/0x80
[   25.102001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.102037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.102072]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.102106]  kthread+0x323/0x710
[   25.102160]  ? trace_preempt_on+0x20/0xc0
[   25.102196]  ? __pfx_kthread+0x10/0x10
[   25.102227]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.102257]  ? calculate_sigpending+0x7b/0xa0
[   25.102289]  ? __pfx_kthread+0x10/0x10
[   25.102321]  ret_from_fork+0x41/0x80
[   25.102353]  ? __pfx_kthread+0x10/0x10
[   25.102384]  ret_from_fork_asm+0x1a/0x30
[   25.102432]  </TASK>
[   25.102448] 
[   25.121954] Allocated by task 282:
[   25.122305]  kasan_save_stack+0x3d/0x60
[   25.122659]  kasan_save_track+0x18/0x40
[   25.123371]  kasan_save_alloc_info+0x3b/0x50
[   25.124103]  __kasan_kmalloc+0xb7/0xc0
[   25.124584]  __kmalloc_cache_noprof+0x183/0x410
[   25.125185]  kasan_bitops_generic+0x92/0x1c0
[   25.125932]  kunit_try_run_case+0x1b2/0x490
[   25.126574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.127350]  kthread+0x323/0x710
[   25.127879]  ret_from_fork+0x41/0x80
[   25.128430]  ret_from_fork_asm+0x1a/0x30
[   25.128916] 
[   25.129250] The buggy address belongs to the object at ffff888100a7a9a0
[   25.129250]  which belongs to the cache kmalloc-16 of size 16
[   25.130574] The buggy address is located 8 bytes inside of
[   25.130574]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.132106] 
[   25.132393] The buggy address belongs to the physical page:
[   25.132885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.133845] flags: 0x200000000000000(node=0|zone=2)
[   25.134496] page_type: f5(slab)
[   25.135035] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.135924] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.136973] page dumped because: kasan: bad access detected
[   25.137537] 
[   25.138198] Memory state around the buggy address:
[   25.139037]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.139695]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.140392] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.141570]                                   ^
[   25.142293]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.143254]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.144284] ==================================================================
[   25.353584] ==================================================================
[   25.354747] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   25.355340] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.356652] 
[   25.357175] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.357379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.357422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.357481] Call Trace:
[   25.357516]  <TASK>
[   25.357552]  dump_stack_lvl+0x73/0xb0
[   25.357626]  print_report+0xd1/0x660
[   25.357695]  ? __virt_addr_valid+0x1db/0x2d0
[   25.357814]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.358054]  kasan_report+0x104/0x140
[   25.358211]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   25.358294]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   25.358381]  kasan_check_range+0x10c/0x1c0
[   25.358452]  __kasan_check_write+0x18/0x20
[   25.358508]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   25.358583]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.358656]  ? kasan_save_alloc_info+0x3b/0x50
[   25.358992]  ? kasan_save_stack+0x3d/0x60
[   25.359077]  kasan_bitops_generic+0x116/0x1c0
[   25.359145]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.359187]  ? __pfx_read_tsc+0x10/0x10
[   25.359219]  ? ktime_get_ts64+0x86/0x240
[   25.359256]  kunit_try_run_case+0x1b2/0x490
[   25.359292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.359323]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.359354]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.359386]  ? __kthread_parkme+0x82/0x160
[   25.359415]  ? preempt_count_sub+0x50/0x80
[   25.359452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.359486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.359519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.359552]  kthread+0x323/0x710
[   25.359582]  ? trace_preempt_on+0x20/0xc0
[   25.359642]  ? __pfx_kthread+0x10/0x10
[   25.359677]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.359778]  ? calculate_sigpending+0x7b/0xa0
[   25.359858]  ? __pfx_kthread+0x10/0x10
[   25.359917]  ret_from_fork+0x41/0x80
[   25.359983]  ? __pfx_kthread+0x10/0x10
[   25.360039]  ret_from_fork_asm+0x1a/0x30
[   25.360142]  </TASK>
[   25.360168] 
[   25.384925] Allocated by task 282:
[   25.385626]  kasan_save_stack+0x3d/0x60
[   25.386420]  kasan_save_track+0x18/0x40
[   25.386997]  kasan_save_alloc_info+0x3b/0x50
[   25.387682]  __kasan_kmalloc+0xb7/0xc0
[   25.388448]  __kmalloc_cache_noprof+0x183/0x410
[   25.388807]  kasan_bitops_generic+0x92/0x1c0
[   25.389414]  kunit_try_run_case+0x1b2/0x490
[   25.390359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.391074]  kthread+0x323/0x710
[   25.391483]  ret_from_fork+0x41/0x80
[   25.392208]  ret_from_fork_asm+0x1a/0x30
[   25.392637] 
[   25.393368] The buggy address belongs to the object at ffff888100a7a9a0
[   25.393368]  which belongs to the cache kmalloc-16 of size 16
[   25.394444] The buggy address is located 8 bytes inside of
[   25.394444]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.396232] 
[   25.396586] The buggy address belongs to the physical page:
[   25.397165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.398023] flags: 0x200000000000000(node=0|zone=2)
[   25.398570] page_type: f5(slab)
[   25.399142] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.400359] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.401145] page dumped because: kasan: bad access detected
[   25.401975] 
[   25.402289] Memory state around the buggy address:
[   25.402948]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.404288]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.404824] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.405917]                                   ^
[   25.406405]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.407273]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.408381] ==================================================================
[   25.240465] ==================================================================
[   25.241507] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   25.243045] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.244179] 
[   25.244385] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.244510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.244541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.244592] Call Trace:
[   25.244623]  <TASK>
[   25.244656]  dump_stack_lvl+0x73/0xb0
[   25.244743]  print_report+0xd1/0x660
[   25.244803]  ? __virt_addr_valid+0x1db/0x2d0
[   25.244910]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.244969]  kasan_report+0x104/0x140
[   25.245019]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   25.245093]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   25.246636]  kasan_check_range+0x10c/0x1c0
[   25.246973]  __kasan_check_write+0x18/0x20
[   25.247036]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   25.247129]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.247215]  ? kasan_save_alloc_info+0x3b/0x50
[   25.247280]  ? kasan_save_stack+0x3d/0x60
[   25.247355]  kasan_bitops_generic+0x116/0x1c0
[   25.247421]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.247492]  ? __pfx_read_tsc+0x10/0x10
[   25.247548]  ? ktime_get_ts64+0x86/0x240
[   25.247636]  kunit_try_run_case+0x1b2/0x490
[   25.248181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.248263]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.248319]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.248379]  ? __kthread_parkme+0x82/0x160
[   25.248430]  ? preempt_count_sub+0x50/0x80
[   25.248489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.248546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.248608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.248672]  kthread+0x323/0x710
[   25.249039]  ? trace_preempt_on+0x20/0xc0
[   25.249101]  ? __pfx_kthread+0x10/0x10
[   25.249182]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.249232]  ? calculate_sigpending+0x7b/0xa0
[   25.249285]  ? __pfx_kthread+0x10/0x10
[   25.249339]  ret_from_fork+0x41/0x80
[   25.249392]  ? __pfx_kthread+0x10/0x10
[   25.249446]  ret_from_fork_asm+0x1a/0x30
[   25.249530]  </TASK>
[   25.249560] 
[   25.274931] Allocated by task 282:
[   25.275393]  kasan_save_stack+0x3d/0x60
[   25.275891]  kasan_save_track+0x18/0x40
[   25.276510]  kasan_save_alloc_info+0x3b/0x50
[   25.277059]  __kasan_kmalloc+0xb7/0xc0
[   25.279198]  __kmalloc_cache_noprof+0x183/0x410
[   25.279685]  kasan_bitops_generic+0x92/0x1c0
[   25.280199]  kunit_try_run_case+0x1b2/0x490
[   25.281215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.281891]  kthread+0x323/0x710
[   25.282252]  ret_from_fork+0x41/0x80
[   25.283504]  ret_from_fork_asm+0x1a/0x30
[   25.284055] 
[   25.284344] The buggy address belongs to the object at ffff888100a7a9a0
[   25.284344]  which belongs to the cache kmalloc-16 of size 16
[   25.286018] The buggy address is located 8 bytes inside of
[   25.286018]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.286843] 
[   25.287103] The buggy address belongs to the physical page:
[   25.288072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.288991] flags: 0x200000000000000(node=0|zone=2)
[   25.289534] page_type: f5(slab)
[   25.290182] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.290922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.291370] page dumped because: kasan: bad access detected
[   25.292745] 
[   25.292971] Memory state around the buggy address:
[   25.293314]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.293993]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.295022] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.295803]                                   ^
[   25.296274]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.297582]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.298270] ==================================================================
[   25.045448] ==================================================================
[   25.046339] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.047172] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.047819] 
[   25.048202] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.048349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.048385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.048437] Call Trace:
[   25.048475]  <TASK>
[   25.048531]  dump_stack_lvl+0x73/0xb0
[   25.048639]  print_report+0xd1/0x660
[   25.048789]  ? __virt_addr_valid+0x1db/0x2d0
[   25.049312]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.049427]  kasan_report+0x104/0x140
[   25.049492]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.049574]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.049668]  kasan_check_range+0x10c/0x1c0
[   25.049743]  __kasan_check_write+0x18/0x20
[   25.049806]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.049879]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.049958]  ? kasan_save_alloc_info+0x3b/0x50
[   25.050148]  ? kasan_save_stack+0x3d/0x60
[   25.050241]  kasan_bitops_generic+0x116/0x1c0
[   25.050316]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.050390]  ? __pfx_read_tsc+0x10/0x10
[   25.050455]  ? ktime_get_ts64+0x86/0x240
[   25.050522]  kunit_try_run_case+0x1b2/0x490
[   25.050591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.050651]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.050881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.050973]  ? __kthread_parkme+0x82/0x160
[   25.051034]  ? preempt_count_sub+0x50/0x80
[   25.051107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.051220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.051319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.051392]  kthread+0x323/0x710
[   25.051451]  ? trace_preempt_on+0x20/0xc0
[   25.051501]  ? __pfx_kthread+0x10/0x10
[   25.051534]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.051566]  ? calculate_sigpending+0x7b/0xa0
[   25.051628]  ? __pfx_kthread+0x10/0x10
[   25.051664]  ret_from_fork+0x41/0x80
[   25.051752]  ? __pfx_kthread+0x10/0x10
[   25.051859]  ret_from_fork_asm+0x1a/0x30
[   25.051922]  </TASK>
[   25.051953] 
[   25.074230] Allocated by task 282:
[   25.074465]  kasan_save_stack+0x3d/0x60
[   25.074919]  kasan_save_track+0x18/0x40
[   25.075773]  kasan_save_alloc_info+0x3b/0x50
[   25.076439]  __kasan_kmalloc+0xb7/0xc0
[   25.077149]  __kmalloc_cache_noprof+0x183/0x410
[   25.077888]  kasan_bitops_generic+0x92/0x1c0
[   25.078426]  kunit_try_run_case+0x1b2/0x490
[   25.079086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.080035]  kthread+0x323/0x710
[   25.080571]  ret_from_fork+0x41/0x80
[   25.081165]  ret_from_fork_asm+0x1a/0x30
[   25.081987] 
[   25.082348] The buggy address belongs to the object at ffff888100a7a9a0
[   25.082348]  which belongs to the cache kmalloc-16 of size 16
[   25.083837] The buggy address is located 8 bytes inside of
[   25.083837]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.085388] 
[   25.085636] The buggy address belongs to the physical page:
[   25.086155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.086420] flags: 0x200000000000000(node=0|zone=2)
[   25.086593] page_type: f5(slab)
[   25.086722] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.086950] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.088963] page dumped because: kasan: bad access detected
[   25.089518] 
[   25.089747] Memory state around the buggy address:
[   25.090231]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.090907]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.092231] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.092749]                                   ^
[   25.093854]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.094419]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.094973] ==================================================================
[   24.991995] ==================================================================
[   24.992910] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   24.994034] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   24.994559] 
[   24.994822] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   24.994977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.995017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.995075] Call Trace:
[   24.995482]  <TASK>
[   24.995547]  dump_stack_lvl+0x73/0xb0
[   24.995662]  print_report+0xd1/0x660
[   24.995776]  ? __virt_addr_valid+0x1db/0x2d0
[   24.996214]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.996305]  kasan_report+0x104/0x140
[   24.996356]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   24.996401]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   24.996449]  kasan_check_range+0x10c/0x1c0
[   24.996485]  __kasan_check_write+0x18/0x20
[   24.996516]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   24.996554]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   24.996594]  ? kasan_save_alloc_info+0x3b/0x50
[   24.996629]  ? kasan_save_stack+0x3d/0x60
[   24.996667]  kasan_bitops_generic+0x116/0x1c0
[   24.997016]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.997142]  ? __pfx_read_tsc+0x10/0x10
[   24.997185]  ? ktime_get_ts64+0x86/0x240
[   24.997226]  kunit_try_run_case+0x1b2/0x490
[   24.997265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.997299]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.997331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.997364]  ? __kthread_parkme+0x82/0x160
[   24.997396]  ? preempt_count_sub+0x50/0x80
[   24.997435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.997471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.997505]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.997539]  kthread+0x323/0x710
[   24.997570]  ? trace_preempt_on+0x20/0xc0
[   24.997604]  ? __pfx_kthread+0x10/0x10
[   24.997636]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.997666]  ? calculate_sigpending+0x7b/0xa0
[   24.997751]  ? __pfx_kthread+0x10/0x10
[   24.997828]  ret_from_fork+0x41/0x80
[   24.997887]  ? __pfx_kthread+0x10/0x10
[   24.997922]  ret_from_fork_asm+0x1a/0x30
[   24.997972]  </TASK>
[   24.997990] 
[   25.019961] Allocated by task 282:
[   25.020239]  kasan_save_stack+0x3d/0x60
[   25.020651]  kasan_save_track+0x18/0x40
[   25.022798]  kasan_save_alloc_info+0x3b/0x50
[   25.023510]  __kasan_kmalloc+0xb7/0xc0
[   25.023971]  __kmalloc_cache_noprof+0x183/0x410
[   25.024915]  kasan_bitops_generic+0x92/0x1c0
[   25.025593]  kunit_try_run_case+0x1b2/0x490
[   25.026277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.026703]  kthread+0x323/0x710
[   25.027574]  ret_from_fork+0x41/0x80
[   25.028056]  ret_from_fork_asm+0x1a/0x30
[   25.028918] 
[   25.029222] The buggy address belongs to the object at ffff888100a7a9a0
[   25.029222]  which belongs to the cache kmalloc-16 of size 16
[   25.031139] The buggy address is located 8 bytes inside of
[   25.031139]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.032420] 
[   25.033149] The buggy address belongs to the physical page:
[   25.033763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.034528] flags: 0x200000000000000(node=0|zone=2)
[   25.035403] page_type: f5(slab)
[   25.036257] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.037152] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.038066] page dumped because: kasan: bad access detected
[   25.039130] 
[   25.039291] Memory state around the buggy address:
[   25.039772]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.040345]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.041133] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.041530]                                   ^
[   25.042574]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.043475]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.044016] ==================================================================
[   25.299865] ==================================================================
[   25.301508] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   25.302365] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.302943] 
[   25.303475] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.303624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.303663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.303760] Call Trace:
[   25.303803]  <TASK>
[   25.303842]  dump_stack_lvl+0x73/0xb0
[   25.303946]  print_report+0xd1/0x660
[   25.304055]  ? __virt_addr_valid+0x1db/0x2d0
[   25.304206]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.304727]  kasan_report+0x104/0x140
[   25.304862]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   25.304951]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   25.305039]  kasan_check_range+0x10c/0x1c0
[   25.305131]  __kasan_check_write+0x18/0x20
[   25.305193]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   25.305640]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.305770]  ? kasan_save_alloc_info+0x3b/0x50
[   25.305850]  ? kasan_save_stack+0x3d/0x60
[   25.305928]  kasan_bitops_generic+0x116/0x1c0
[   25.305998]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.306065]  ? __pfx_read_tsc+0x10/0x10
[   25.306100]  ? ktime_get_ts64+0x86/0x240
[   25.306180]  kunit_try_run_case+0x1b2/0x490
[   25.306292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.306332]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.306365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.306397]  ? __kthread_parkme+0x82/0x160
[   25.306428]  ? preempt_count_sub+0x50/0x80
[   25.306466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.306501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.306536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.306569]  kthread+0x323/0x710
[   25.306599]  ? trace_preempt_on+0x20/0xc0
[   25.306633]  ? __pfx_kthread+0x10/0x10
[   25.306665]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.306735]  ? calculate_sigpending+0x7b/0xa0
[   25.306803]  ? __pfx_kthread+0x10/0x10
[   25.306862]  ret_from_fork+0x41/0x80
[   25.306927]  ? __pfx_kthread+0x10/0x10
[   25.306961]  ret_from_fork_asm+0x1a/0x30
[   25.307009]  </TASK>
[   25.307027] 
[   25.330784] Allocated by task 282:
[   25.331042]  kasan_save_stack+0x3d/0x60
[   25.331340]  kasan_save_track+0x18/0x40
[   25.331542]  kasan_save_alloc_info+0x3b/0x50
[   25.331740]  __kasan_kmalloc+0xb7/0xc0
[   25.331886]  __kmalloc_cache_noprof+0x183/0x410
[   25.332059]  kasan_bitops_generic+0x92/0x1c0
[   25.332577]  kunit_try_run_case+0x1b2/0x490
[   25.333039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.333868]  kthread+0x323/0x710
[   25.334580]  ret_from_fork+0x41/0x80
[   25.335070]  ret_from_fork_asm+0x1a/0x30
[   25.335525] 
[   25.336382] The buggy address belongs to the object at ffff888100a7a9a0
[   25.336382]  which belongs to the cache kmalloc-16 of size 16
[   25.337749] The buggy address is located 8 bytes inside of
[   25.337749]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.338955] 
[   25.339242] The buggy address belongs to the physical page:
[   25.339776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.340328] flags: 0x200000000000000(node=0|zone=2)
[   25.340732] page_type: f5(slab)
[   25.341184] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.342559] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.343544] page dumped because: kasan: bad access detected
[   25.344564] 
[   25.344955] Memory state around the buggy address:
[   25.345423]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.346336]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.346986] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.348767]                                   ^
[   25.349422]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.350784]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.351695] ==================================================================
[   25.145612] ==================================================================
[   25.146048] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.146528] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.147241] 
[   25.147491] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.148039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.148084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.148167] Call Trace:
[   25.148225]  <TASK>
[   25.148264]  dump_stack_lvl+0x73/0xb0
[   25.148339]  print_report+0xd1/0x660
[   25.148406]  ? __virt_addr_valid+0x1db/0x2d0
[   25.148526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.148602]  kasan_report+0x104/0x140
[   25.148660]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.148739]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.148833]  kasan_check_range+0x10c/0x1c0
[   25.148906]  __kasan_check_write+0x18/0x20
[   25.148965]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.149041]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.149144]  ? kasan_save_alloc_info+0x3b/0x50
[   25.149389]  ? kasan_save_stack+0x3d/0x60
[   25.149475]  kasan_bitops_generic+0x116/0x1c0
[   25.149550]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.149619]  ? __pfx_read_tsc+0x10/0x10
[   25.149678]  ? ktime_get_ts64+0x86/0x240
[   25.149903]  kunit_try_run_case+0x1b2/0x490
[   25.149986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.150047]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.150083]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.150150]  ? __kthread_parkme+0x82/0x160
[   25.150186]  ? preempt_count_sub+0x50/0x80
[   25.150225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.150260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.150295]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.150328]  kthread+0x323/0x710
[   25.150359]  ? trace_preempt_on+0x20/0xc0
[   25.150392]  ? __pfx_kthread+0x10/0x10
[   25.150424]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.150453]  ? calculate_sigpending+0x7b/0xa0
[   25.150483]  ? __pfx_kthread+0x10/0x10
[   25.150515]  ret_from_fork+0x41/0x80
[   25.150547]  ? __pfx_kthread+0x10/0x10
[   25.150578]  ret_from_fork_asm+0x1a/0x30
[   25.150626]  </TASK>
[   25.150641] 
[   25.170617] Allocated by task 282:
[   25.171033]  kasan_save_stack+0x3d/0x60
[   25.171453]  kasan_save_track+0x18/0x40
[   25.171903]  kasan_save_alloc_info+0x3b/0x50
[   25.172738]  __kasan_kmalloc+0xb7/0xc0
[   25.173925]  __kmalloc_cache_noprof+0x183/0x410
[   25.174388]  kasan_bitops_generic+0x92/0x1c0
[   25.175037]  kunit_try_run_case+0x1b2/0x490
[   25.175396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.176166]  kthread+0x323/0x710
[   25.176497]  ret_from_fork+0x41/0x80
[   25.177353]  ret_from_fork_asm+0x1a/0x30
[   25.177890] 
[   25.178141] The buggy address belongs to the object at ffff888100a7a9a0
[   25.178141]  which belongs to the cache kmalloc-16 of size 16
[   25.178888] The buggy address is located 8 bytes inside of
[   25.178888]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.179718] 
[   25.179883] The buggy address belongs to the physical page:
[   25.180596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.181925] flags: 0x200000000000000(node=0|zone=2)
[   25.182433] page_type: f5(slab)
[   25.182990] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.183501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.184415] page dumped because: kasan: bad access detected
[   25.185165] 
[   25.185397] Memory state around the buggy address:
[   25.186040]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.186529]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.187361] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.187966]                                   ^
[   25.188439]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.189528]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.190319] ==================================================================
[   25.191342] ==================================================================
[   25.192260] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.193391] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.194144] 
[   25.194335] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.194462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.194499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.194554] Call Trace:
[   25.194588]  <TASK>
[   25.194621]  dump_stack_lvl+0x73/0xb0
[   25.194888]  print_report+0xd1/0x660
[   25.194979]  ? __virt_addr_valid+0x1db/0x2d0
[   25.195101]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.195205]  kasan_report+0x104/0x140
[   25.195267]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.195345]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.195438]  kasan_check_range+0x10c/0x1c0
[   25.195510]  __kasan_check_write+0x18/0x20
[   25.195570]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.195853]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.195975]  ? kasan_save_alloc_info+0x3b/0x50
[   25.196046]  ? kasan_save_stack+0x3d/0x60
[   25.196142]  kasan_bitops_generic+0x116/0x1c0
[   25.196219]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.196291]  ? __pfx_read_tsc+0x10/0x10
[   25.196348]  ? ktime_get_ts64+0x86/0x240
[   25.196416]  kunit_try_run_case+0x1b2/0x490
[   25.196485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.196549]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.196609]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.196666]  ? __kthread_parkme+0x82/0x160
[   25.196835]  ? preempt_count_sub+0x50/0x80
[   25.196913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.196975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.197041]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.197105]  kthread+0x323/0x710
[   25.197180]  ? trace_preempt_on+0x20/0xc0
[   25.197219]  ? __pfx_kthread+0x10/0x10
[   25.197251]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.197281]  ? calculate_sigpending+0x7b/0xa0
[   25.197314]  ? __pfx_kthread+0x10/0x10
[   25.197345]  ret_from_fork+0x41/0x80
[   25.197376]  ? __pfx_kthread+0x10/0x10
[   25.197408]  ret_from_fork_asm+0x1a/0x30
[   25.197454]  </TASK>
[   25.197471] 
[   25.216316] Allocated by task 282:
[   25.216961]  kasan_save_stack+0x3d/0x60
[   25.217474]  kasan_save_track+0x18/0x40
[   25.218244]  kasan_save_alloc_info+0x3b/0x50
[   25.218626]  __kasan_kmalloc+0xb7/0xc0
[   25.219101]  __kmalloc_cache_noprof+0x183/0x410
[   25.220264]  kasan_bitops_generic+0x92/0x1c0
[   25.220749]  kunit_try_run_case+0x1b2/0x490
[   25.221574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.222141]  kthread+0x323/0x710
[   25.222523]  ret_from_fork+0x41/0x80
[   25.222803]  ret_from_fork_asm+0x1a/0x30
[   25.223597] 
[   25.224306] The buggy address belongs to the object at ffff888100a7a9a0
[   25.224306]  which belongs to the cache kmalloc-16 of size 16
[   25.225304] The buggy address is located 8 bytes inside of
[   25.225304]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.226576] 
[   25.227046] The buggy address belongs to the physical page:
[   25.228107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.229101] flags: 0x200000000000000(node=0|zone=2)
[   25.229481] page_type: f5(slab)
[   25.229901] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.231004] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.232284] page dumped because: kasan: bad access detected
[   25.232844] 
[   25.233066] Memory state around the buggy address:
[   25.233499]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.234552]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.235507] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.236205]                                   ^
[   25.237277]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.237902]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.238392] ==================================================================