Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   26.500304] ==================================================================
[   26.502191] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   26.502844] Read of size 8 at addr fff00000c596b748 by task kunit_try_catch/250
[   26.503422] 
[   26.503680] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   26.503873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.504865] Hardware name: linux,dummy-virt (DT)
[   26.504972] Call trace:
[   26.505345]  show_stack+0x20/0x38 (C)
[   26.505478]  dump_stack_lvl+0x8c/0xd0
[   26.507985]  print_report+0x118/0x608
[   26.508127]  kasan_report+0xdc/0x128
[   26.508256]  __asan_report_load8_noabort+0x20/0x30
[   26.508396]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   26.508528]  kasan_bitops_generic+0x110/0x1c8
[   26.508647]  kunit_try_run_case+0x170/0x3f0
[   26.508767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.508920]  kthread+0x318/0x620
[   26.509911]  ret_from_fork+0x10/0x20
[   26.510043] 
[   26.527744] Allocated by task 250:
[   26.529231]  kasan_save_stack+0x3c/0x68
[   26.531393]  kasan_save_track+0x20/0x40
[   26.533152]  kasan_save_alloc_info+0x40/0x58
[   26.534414]  __kasan_kmalloc+0xd4/0xd8
[   26.535858]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.537194]  kasan_bitops_generic+0xa0/0x1c8
[   26.537615]  kunit_try_run_case+0x170/0x3f0
[   26.539281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.540908]  kthread+0x318/0x620
[   26.541752]  ret_from_fork+0x10/0x20
[   26.543459] 
[   26.544189] The buggy address belongs to the object at fff00000c596b740
[   26.544189]  which belongs to the cache kmalloc-16 of size 16
[   26.545571] The buggy address is located 8 bytes inside of
[   26.545571]  allocated 9-byte region [fff00000c596b740, fff00000c596b749)
[   26.547558] 
[   26.547806] The buggy address belongs to the physical page:
[   26.549498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b
[   26.551816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.552860] page_type: f5(slab)
[   26.554051] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.555688] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.557420] page dumped because: kasan: bad access detected
[   26.559028] 
[   26.559711] Memory state around the buggy address:
[   26.561248]  fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   26.561861]  fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   26.563036] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.563572]                                               ^
[   26.564953]  fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.566812]  fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.570226] ==================================================================
[   26.308262] ==================================================================
[   26.309181] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   26.310086] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250
[   26.310841] 
[   26.311215] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   26.311437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.311526] Hardware name: linux,dummy-virt (DT)
[   26.311623] Call trace:
[   26.311699]  show_stack+0x20/0x38 (C)
[   26.311853]  dump_stack_lvl+0x8c/0xd0
[   26.312018]  print_report+0x118/0x608
[   26.312153]  kasan_report+0xdc/0x128
[   26.312266]  kasan_check_range+0x100/0x1a8
[   26.312382]  __kasan_check_write+0x20/0x30
[   26.312497]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   26.312645]  kasan_bitops_generic+0x110/0x1c8
[   26.312792]  kunit_try_run_case+0x170/0x3f0
[   26.312951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.313153]  kthread+0x318/0x620
[   26.313284]  ret_from_fork+0x10/0x20
[   26.313453] 
[   26.321953] Allocated by task 250:
[   26.323955]  kasan_save_stack+0x3c/0x68
[   26.325300]  kasan_save_track+0x20/0x40
[   26.325733]  kasan_save_alloc_info+0x40/0x58
[   26.326403]  __kasan_kmalloc+0xd4/0xd8
[   26.326806]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.327278]  kasan_bitops_generic+0xa0/0x1c8
[   26.327694]  kunit_try_run_case+0x170/0x3f0
[   26.329594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.330562]  kthread+0x318/0x620
[   26.331766]  ret_from_fork+0x10/0x20
[   26.332448] 
[   26.332838] The buggy address belongs to the object at fff00000c596b740
[   26.332838]  which belongs to the cache kmalloc-16 of size 16
[   26.336678] The buggy address is located 8 bytes inside of
[   26.336678]  allocated 9-byte region [fff00000c596b740, fff00000c596b749)
[   26.338206] 
[   26.338430] The buggy address belongs to the physical page:
[   26.338823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b
[   26.341835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.343554] page_type: f5(slab)
[   26.344648] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.348248] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.348843] page dumped because: kasan: bad access detected
[   26.350125] 
[   26.350539] Memory state around the buggy address:
[   26.351338]  fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   26.352470]  fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   26.353980] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.354575]                                               ^
[   26.355065]  fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.355584]  fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.356435] ==================================================================
[   26.781949] ==================================================================
[   26.784680] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   26.787518] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250
[   26.789616] 
[   26.790609] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   26.790833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.790923] Hardware name: linux,dummy-virt (DT)
[   26.791142] Call trace:
[   26.791203]  show_stack+0x20/0x38 (C)
[   26.791330]  dump_stack_lvl+0x8c/0xd0
[   26.791443]  print_report+0x118/0x608
[   26.791562]  kasan_report+0xdc/0x128
[   26.791681]  kasan_check_range+0x100/0x1a8
[   26.791806]  __kasan_check_write+0x20/0x30
[   26.792113]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   26.792241]  kasan_bitops_generic+0x110/0x1c8
[   26.792365]  kunit_try_run_case+0x170/0x3f0
[   26.792484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.792615]  kthread+0x318/0x620
[   26.792727]  ret_from_fork+0x10/0x20
[   26.792848] 
[   26.811286] Allocated by task 250:
[   26.813620]  kasan_save_stack+0x3c/0x68
[   26.814069]  kasan_save_track+0x20/0x40
[   26.814466]  kasan_save_alloc_info+0x40/0x58
[   26.816065]  __kasan_kmalloc+0xd4/0xd8
[   26.817053]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.819192]  kasan_bitops_generic+0xa0/0x1c8
[   26.821006]  kunit_try_run_case+0x170/0x3f0
[   26.822529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.824171]  kthread+0x318/0x620
[   26.825640]  ret_from_fork+0x10/0x20
[   26.826469] 
[   26.827710] The buggy address belongs to the object at fff00000c596b740
[   26.827710]  which belongs to the cache kmalloc-16 of size 16
[   26.829470] The buggy address is located 8 bytes inside of
[   26.829470]  allocated 9-byte region [fff00000c596b740, fff00000c596b749)
[   26.832859] 
[   26.833570] The buggy address belongs to the physical page:
[   26.835323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b
[   26.836475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.838295] page_type: f5(slab)
[   26.840059] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.841713] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.843142] page dumped because: kasan: bad access detected
[   26.843612] 
[   26.843866] Memory state around the buggy address:
[   26.846252]  fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   26.848269]  fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   26.850297] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.851724]                                               ^
[   26.853674]  fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.855150]  fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.855706] ==================================================================
[   26.934402] ==================================================================
[   26.935981] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   26.939155] Read of size 8 at addr fff00000c596b748 by task kunit_try_catch/250
[   26.941340] 
[   26.941875] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   26.942365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.942438] Hardware name: linux,dummy-virt (DT)
[   26.942513] Call trace:
[   26.942570]  show_stack+0x20/0x38 (C)
[   26.942692]  dump_stack_lvl+0x8c/0xd0
[   26.942813]  print_report+0x118/0x608
[   26.943234]  kasan_report+0xdc/0x128
[   26.943374]  __asan_report_load8_noabort+0x20/0x30
[   26.943507]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   26.943644]  kasan_bitops_generic+0x110/0x1c8
[   26.943777]  kunit_try_run_case+0x170/0x3f0
[   26.943924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.944066]  kthread+0x318/0x620
[   26.944184]  ret_from_fork+0x10/0x20
[   26.944306] 
[   26.956477] Allocated by task 250:
[   26.958240]  kasan_save_stack+0x3c/0x68
[   26.959253]  kasan_save_track+0x20/0x40
[   26.960317]  kasan_save_alloc_info+0x40/0x58
[   26.961761]  __kasan_kmalloc+0xd4/0xd8
[   26.963109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.964663]  kasan_bitops_generic+0xa0/0x1c8
[   26.966276]  kunit_try_run_case+0x170/0x3f0
[   26.967683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.968181]  kthread+0x318/0x620
[   26.968538]  ret_from_fork+0x10/0x20
[   26.970038] 
[   26.970565] The buggy address belongs to the object at fff00000c596b740
[   26.970565]  which belongs to the cache kmalloc-16 of size 16
[   26.974532] The buggy address is located 8 bytes inside of
[   26.974532]  allocated 9-byte region [fff00000c596b740, fff00000c596b749)
[   26.977529] 
[   26.977796] The buggy address belongs to the physical page:
[   26.979970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b
[   26.981664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.983651] page_type: f5(slab)
[   26.984907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.985497] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.987264] page dumped because: kasan: bad access detected
[   26.989026] 
[   26.990053] Memory state around the buggy address:
[   26.991536]  fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   26.993532]  fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   26.994724] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.996948]                                               ^
[   26.998232]  fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.998786]  fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.001381] ==================================================================
[   26.359340] ==================================================================
[   26.362054] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   26.363369] Read of size 8 at addr fff00000c596b748 by task kunit_try_catch/250
[   26.364598] 
[   26.365092] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   26.365291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.365360] Hardware name: linux,dummy-virt (DT)
[   26.365444] Call trace:
[   26.365504]  show_stack+0x20/0x38 (C)
[   26.365629]  dump_stack_lvl+0x8c/0xd0
[   26.365749]  print_report+0x118/0x608
[   26.365867]  kasan_report+0xdc/0x128
[   26.366837]  __asan_report_load8_noabort+0x20/0x30
[   26.366996]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   26.367153]  kasan_bitops_generic+0x110/0x1c8
[   26.367299]  kunit_try_run_case+0x170/0x3f0
[   26.367445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.367603]  kthread+0x318/0x620
[   26.367748]  ret_from_fork+0x10/0x20
[   26.367918] 
[   26.378405] Allocated by task 250:
[   26.379266]  kasan_save_stack+0x3c/0x68
[   26.380079]  kasan_save_track+0x20/0x40
[   26.380525]  kasan_save_alloc_info+0x40/0x58
[   26.380946]  __kasan_kmalloc+0xd4/0xd8
[   26.382535]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.383401]  kasan_bitops_generic+0xa0/0x1c8
[   26.384186]  kunit_try_run_case+0x170/0x3f0
[   26.384956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.386334]  kthread+0x318/0x620
[   26.386987]  ret_from_fork+0x10/0x20
[   26.387573] 
[   26.387813] The buggy address belongs to the object at fff00000c596b740
[   26.387813]  which belongs to the cache kmalloc-16 of size 16
[   26.391430] The buggy address is located 8 bytes inside of
[   26.391430]  allocated 9-byte region [fff00000c596b740, fff00000c596b749)
[   26.395404] 
[   26.396442] The buggy address belongs to the physical page:
[   26.398252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b
[   26.398857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.399407] page_type: f5(slab)
[   26.399764] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.404021] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.406488] page dumped because: kasan: bad access detected
[   26.408081] 
[   26.408912] Memory state around the buggy address:
[   26.410471]  fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   26.412916]  fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   26.415564] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.416858]                                               ^
[   26.419245]  fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.420734]  fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.423738] ==================================================================
[   26.707359] ==================================================================
[   26.711311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   26.712659] Read of size 8 at addr fff00000c596b748 by task kunit_try_catch/250
[   26.713261] 
[   26.713529] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   26.713725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.713795] Hardware name: linux,dummy-virt (DT)
[   26.713875] Call trace:
[   26.715437]  show_stack+0x20/0x38 (C)
[   26.715577]  dump_stack_lvl+0x8c/0xd0
[   26.715710]  print_report+0x118/0x608
[   26.715839]  kasan_report+0xdc/0x128
[   26.715990]  __asan_report_load8_noabort+0x20/0x30
[   26.716110]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   26.716242]  kasan_bitops_generic+0x110/0x1c8
[   26.716365]  kunit_try_run_case+0x170/0x3f0
[   26.716484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.716617]  kthread+0x318/0x620
[   26.716728]  ret_from_fork+0x10/0x20
[   26.716850] 
[   26.734842] Allocated by task 250:
[   26.735929]  kasan_save_stack+0x3c/0x68
[   26.736363]  kasan_save_track+0x20/0x40
[   26.736746]  kasan_save_alloc_info+0x40/0x58
[   26.738467]  __kasan_kmalloc+0xd4/0xd8
[   26.740289]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.741962]  kasan_bitops_generic+0xa0/0x1c8
[   26.743461]  kunit_try_run_case+0x170/0x3f0
[   26.744748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.745258]  kthread+0x318/0x620
[   26.745620]  ret_from_fork+0x10/0x20
[   26.747387] 
[   26.748276] The buggy address belongs to the object at fff00000c596b740
[   26.748276]  which belongs to the cache kmalloc-16 of size 16
[   26.751468] The buggy address is located 8 bytes inside of
[   26.751468]  allocated 9-byte region [fff00000c596b740, fff00000c596b749)
[   26.754585] 
[   26.754855] The buggy address belongs to the physical page:
[   26.756714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b
[   26.758414] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.759931] page_type: f5(slab)
[   26.761422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.763076] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.764639] page dumped because: kasan: bad access detected
[   26.765130] 
[   26.765371] Memory state around the buggy address:
[   26.765776]  fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   26.768721]  fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   26.770855] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.772821]                                               ^
[   26.774629]  fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.775965]  fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.777579] ==================================================================
[   26.571577] ==================================================================
[   26.574638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   26.575650] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250
[   26.579468] 
[   26.581844] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   26.582323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.582403] Hardware name: linux,dummy-virt (DT)
[   26.582496] Call trace:
[   26.582555]  show_stack+0x20/0x38 (C)
[   26.582688]  dump_stack_lvl+0x8c/0xd0
[   26.582816]  print_report+0x118/0x608
[   26.582956]  kasan_report+0xdc/0x128
[   26.583081]  kasan_check_range+0x100/0x1a8
[   26.583203]  __kasan_check_write+0x20/0x30
[   26.583326]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   26.583463]  kasan_bitops_generic+0x110/0x1c8
[   26.583590]  kunit_try_run_case+0x170/0x3f0
[   26.583715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.583855]  kthread+0x318/0x620
[   26.583986]  ret_from_fork+0x10/0x20
[   26.584115] 
[   26.598696] Allocated by task 250:
[   26.601212]  kasan_save_stack+0x3c/0x68
[   26.601778]  kasan_save_track+0x20/0x40
[   26.603163]  kasan_save_alloc_info+0x40/0x58
[   26.603819]  __kasan_kmalloc+0xd4/0xd8
[   26.605059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.605505]  kasan_bitops_generic+0xa0/0x1c8
[   26.605927]  kunit_try_run_case+0x170/0x3f0
[   26.606571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.608815]  kthread+0x318/0x620
[   26.609580]  ret_from_fork+0x10/0x20
[   26.610740] 
[   26.611037] The buggy address belongs to the object at fff00000c596b740
[   26.611037]  which belongs to the cache kmalloc-16 of size 16
[   26.613177] The buggy address is located 8 bytes inside of
[   26.613177]  allocated 9-byte region [fff00000c596b740, fff00000c596b749)
[   26.614705] 
[   26.615068] The buggy address belongs to the physical page:
[   26.615493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b
[   26.617389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.618461] page_type: f5(slab)
[   26.619671] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.621300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.622649] page dumped because: kasan: bad access detected
[   26.623721] 
[   26.624031] Memory state around the buggy address:
[   26.624616]  fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   26.626535]  fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   26.627780] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.629330]                                               ^
[   26.630034]  fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.630585]  fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.631343] ==================================================================
[   26.635457] ==================================================================
[   26.638025] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   26.642024] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250
[   26.644512] 
[   26.644777] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   26.644982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.645053] Hardware name: linux,dummy-virt (DT)
[   26.645129] Call trace:
[   26.645178]  show_stack+0x20/0x38 (C)
[   26.645290]  dump_stack_lvl+0x8c/0xd0
[   26.645400]  print_report+0x118/0x608
[   26.645506]  kasan_report+0xdc/0x128
[   26.645609]  kasan_check_range+0x100/0x1a8
[   26.645710]  __kasan_check_write+0x20/0x30
[   26.645810]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   26.646633]  kasan_bitops_generic+0x110/0x1c8
[   26.646764]  kunit_try_run_case+0x170/0x3f0
[   26.646908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.647043]  kthread+0x318/0x620
[   26.647158]  ret_from_fork+0x10/0x20
[   26.647277] 
[   26.660795] Allocated by task 250:
[   26.662233]  kasan_save_stack+0x3c/0x68
[   26.663623]  kasan_save_track+0x20/0x40
[   26.664994]  kasan_save_alloc_info+0x40/0x58
[   26.666475]  __kasan_kmalloc+0xd4/0xd8
[   26.666874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.668809]  kasan_bitops_generic+0xa0/0x1c8
[   26.670341]  kunit_try_run_case+0x170/0x3f0
[   26.671392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.672614]  kthread+0x318/0x620
[   26.673786]  ret_from_fork+0x10/0x20
[   26.674315] 
[   26.674559] The buggy address belongs to the object at fff00000c596b740
[   26.674559]  which belongs to the cache kmalloc-16 of size 16
[   26.675379] The buggy address is located 8 bytes inside of
[   26.675379]  allocated 9-byte region [fff00000c596b740, fff00000c596b749)
[   26.678798] 
[   26.680415] The buggy address belongs to the physical page:
[   26.681714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b
[   26.684027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.685963] page_type: f5(slab)
[   26.687437] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.689737] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.690539] page dumped because: kasan: bad access detected
[   26.692271] 
[   26.692990] Memory state around the buggy address:
[   26.694651]  fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   26.696489]  fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   26.697063] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.697600]                                               ^
[   26.699604]  fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.701918]  fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.703896] ==================================================================
[   26.860619] ==================================================================
[   26.863573] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   26.866114] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250
[   26.869148] 
[   26.870349] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   26.870546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.870615] Hardware name: linux,dummy-virt (DT)
[   26.870695] Call trace:
[   26.870761]  show_stack+0x20/0x38 (C)
[   26.870910]  dump_stack_lvl+0x8c/0xd0
[   26.871031]  print_report+0x118/0x608
[   26.871151]  kasan_report+0xdc/0x128
[   26.871262]  kasan_check_range+0x100/0x1a8
[   26.871377]  __kasan_check_write+0x20/0x30
[   26.871487]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   26.871615]  kasan_bitops_generic+0x110/0x1c8
[   26.871734]  kunit_try_run_case+0x170/0x3f0
[   26.871848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.871997]  kthread+0x318/0x620
[   26.872112]  ret_from_fork+0x10/0x20
[   26.872229] 
[   26.888066] Allocated by task 250:
[   26.889418]  kasan_save_stack+0x3c/0x68
[   26.890853]  kasan_save_track+0x20/0x40
[   26.892303]  kasan_save_alloc_info+0x40/0x58
[   26.893767]  __kasan_kmalloc+0xd4/0xd8
[   26.895022]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.895461]  kasan_bitops_generic+0xa0/0x1c8
[   26.895878]  kunit_try_run_case+0x170/0x3f0
[   26.898601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.899808]  kthread+0x318/0x620
[   26.901189]  ret_from_fork+0x10/0x20
[   26.902623] 
[   26.903543] The buggy address belongs to the object at fff00000c596b740
[   26.903543]  which belongs to the cache kmalloc-16 of size 16
[   26.904855] The buggy address is located 8 bytes inside of
[   26.904855]  allocated 9-byte region [fff00000c596b740, fff00000c596b749)
[   26.908792] 
[   26.909555] The buggy address belongs to the physical page:
[   26.910272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b
[   26.910878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.913423] page_type: f5(slab)
[   26.914821] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.916870] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.917461] page dumped because: kasan: bad access detected
[   26.918931] 
[   26.919479] Memory state around the buggy address:
[   26.921380]  fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   26.922869]  fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   26.925126] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.926524]                                               ^
[   26.927016]  fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.927579]  fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.930507] ==================================================================
[   26.427625] ==================================================================
[   26.430036] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   26.433525] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250
[   26.435550] 
[   26.436016] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   26.436451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.436524] Hardware name: linux,dummy-virt (DT)
[   26.436604] Call trace:
[   26.436658]  show_stack+0x20/0x38 (C)
[   26.436788]  dump_stack_lvl+0x8c/0xd0
[   26.436927]  print_report+0x118/0x608
[   26.437156]  kasan_report+0xdc/0x128
[   26.438305]  kasan_check_range+0x100/0x1a8
[   26.438433]  __kasan_check_write+0x20/0x30
[   26.438545]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   26.438674]  kasan_bitops_generic+0x110/0x1c8
[   26.438791]  kunit_try_run_case+0x170/0x3f0
[   26.438932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.439065]  kthread+0x318/0x620
[   26.439178]  ret_from_fork+0x10/0x20
[   26.439294] 
[   26.454262] Allocated by task 250:
[   26.454632]  kasan_save_stack+0x3c/0x68
[   26.455054]  kasan_save_track+0x20/0x40
[   26.455446]  kasan_save_alloc_info+0x40/0x58
[   26.455843]  __kasan_kmalloc+0xd4/0xd8
[   26.458024]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.459343]  kasan_bitops_generic+0xa0/0x1c8
[   26.460959]  kunit_try_run_case+0x170/0x3f0
[   26.462914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.464277]  kthread+0x318/0x620
[   26.465591]  ret_from_fork+0x10/0x20
[   26.466496] 
[   26.467317] The buggy address belongs to the object at fff00000c596b740
[   26.467317]  which belongs to the cache kmalloc-16 of size 16
[   26.471216] The buggy address is located 8 bytes inside of
[   26.471216]  allocated 9-byte region [fff00000c596b740, fff00000c596b749)
[   26.472640] 
[   26.473618] The buggy address belongs to the physical page:
[   26.474820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b
[   26.477865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.478962] page_type: f5(slab)
[   26.479329] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   26.480293] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.482866] page dumped because: kasan: bad access detected
[   26.484092] 
[   26.484677] Memory state around the buggy address:
[   26.486835]  fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   26.488373]  fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   26.488945] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.491493]                                               ^
[   26.494236]  fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.495571]  fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.496876] ==================================================================

[   20.475584] ==================================================================
[   20.476208] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   20.476934] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269
[   20.477324] 
[   20.477563] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   20.477662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.477692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.477742] Call Trace:
[   20.477786]  <TASK>
[   20.477825]  dump_stack_lvl+0x73/0xb0
[   20.478409]  print_report+0xd1/0x650
[   20.478470]  ? __virt_addr_valid+0x1db/0x2d0
[   20.478522]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   20.478583]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.478645]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   20.478701]  kasan_report+0x140/0x180
[   20.478755]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   20.478828]  kasan_check_range+0x10c/0x1c0
[   20.478900]  __kasan_check_write+0x18/0x20
[   20.478961]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   20.479020]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.479078]  ? __kmalloc_cache_noprof+0x18a/0x420
[   20.479134]  ? trace_hardirqs_on+0x37/0xe0
[   20.479194]  ? kasan_bitops_generic+0x93/0x1c0
[   20.479258]  kasan_bitops_generic+0x117/0x1c0
[   20.479356]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.479420]  ? __pfx_read_tsc+0x10/0x10
[   20.479471]  ? ktime_get_ts64+0x86/0x230
[   20.479537]  kunit_try_run_case+0x1a6/0x480
[   20.479593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.479643]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.479711]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.479767]  ? __kthread_parkme+0x82/0x160
[   20.479820]  ? preempt_count_sub+0x50/0x80
[   20.479893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.479948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.480011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.480050]  kthread+0x324/0x6e0
[   20.480080]  ? trace_preempt_on+0x20/0xc0
[   20.480111]  ? __pfx_kthread+0x10/0x10
[   20.480139]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.480185]  ? calculate_sigpending+0x7b/0xa0
[   20.480236]  ? __pfx_kthread+0x10/0x10
[   20.480327]  ret_from_fork+0x41/0x80
[   20.480381]  ? __pfx_kthread+0x10/0x10
[   20.480436]  ret_from_fork_asm+0x1a/0x30
[   20.480510]  </TASK>
[   20.480541] 
[   20.493011] Allocated by task 269:
[   20.493250]  kasan_save_stack+0x45/0x70
[   20.493674]  kasan_save_track+0x18/0x40
[   20.494098]  kasan_save_alloc_info+0x3b/0x50
[   20.494565]  __kasan_kmalloc+0xb7/0xc0
[   20.494966]  __kmalloc_cache_noprof+0x18a/0x420
[   20.495437]  kasan_bitops_generic+0x93/0x1c0
[   20.495890]  kunit_try_run_case+0x1a6/0x480
[   20.496250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.496609]  kthread+0x324/0x6e0
[   20.496841]  ret_from_fork+0x41/0x80
[   20.497263]  ret_from_fork_asm+0x1a/0x30
[   20.497680] 
[   20.497904] The buggy address belongs to the object at ffff8881024b01a0
[   20.497904]  which belongs to the cache kmalloc-16 of size 16
[   20.498907] The buggy address is located 8 bytes inside of
[   20.498907]  allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9)
[   20.499604] 
[   20.499767] The buggy address belongs to the physical page:
[   20.500245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0
[   20.500941] flags: 0x200000000000000(node=0|zone=2)
[   20.501473] page_type: f5(slab)
[   20.501825] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.502246] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.502968] page dumped because: kasan: bad access detected
[   20.503521] 
[   20.503752] Memory state around the buggy address:
[   20.504228]  ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.504930]  ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.505520] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.506117]                                   ^
[   20.506462]  ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.507184]  ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.507958] ==================================================================
[   20.547167] ==================================================================
[   20.548342] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   20.548746] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269
[   20.549268] 
[   20.549586] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   20.549695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.549745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.549809] Call Trace:
[   20.549870]  <TASK>
[   20.549911]  dump_stack_lvl+0x73/0xb0
[   20.549982]  print_report+0xd1/0x650
[   20.550039]  ? __virt_addr_valid+0x1db/0x2d0
[   20.550094]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   20.550150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.550212]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   20.550277]  kasan_report+0x140/0x180
[   20.550378]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   20.550458]  kasan_check_range+0x10c/0x1c0
[   20.550500]  __kasan_check_write+0x18/0x20
[   20.550531]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   20.550564]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.550597]  ? __kmalloc_cache_noprof+0x18a/0x420
[   20.550628]  ? trace_hardirqs_on+0x37/0xe0
[   20.550658]  ? kasan_bitops_generic+0x93/0x1c0
[   20.550692]  kasan_bitops_generic+0x117/0x1c0
[   20.550722]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.550752]  ? __pfx_read_tsc+0x10/0x10
[   20.550780]  ? ktime_get_ts64+0x86/0x230
[   20.550812]  kunit_try_run_case+0x1a6/0x480
[   20.550842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.550891]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.550923]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.550954]  ? __kthread_parkme+0x82/0x160
[   20.550983]  ? preempt_count_sub+0x50/0x80
[   20.551013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.551043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.551074]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.551108]  kthread+0x324/0x6e0
[   20.551135]  ? trace_preempt_on+0x20/0xc0
[   20.551163]  ? __pfx_kthread+0x10/0x10
[   20.551192]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.551219]  ? calculate_sigpending+0x7b/0xa0
[   20.551247]  ? __pfx_kthread+0x10/0x10
[   20.551276]  ret_from_fork+0x41/0x80
[   20.551318]  ? __pfx_kthread+0x10/0x10
[   20.551354]  ret_from_fork_asm+0x1a/0x30
[   20.551395]  </TASK>
[   20.551410] 
[   20.566608] Allocated by task 269:
[   20.567094]  kasan_save_stack+0x45/0x70
[   20.567540]  kasan_save_track+0x18/0x40
[   20.567884]  kasan_save_alloc_info+0x3b/0x50
[   20.568342]  __kasan_kmalloc+0xb7/0xc0
[   20.568757]  __kmalloc_cache_noprof+0x18a/0x420
[   20.569083]  kasan_bitops_generic+0x93/0x1c0
[   20.569572]  kunit_try_run_case+0x1a6/0x480
[   20.569987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.570599]  kthread+0x324/0x6e0
[   20.570874]  ret_from_fork+0x41/0x80
[   20.571402]  ret_from_fork_asm+0x1a/0x30
[   20.571784] 
[   20.571947] The buggy address belongs to the object at ffff8881024b01a0
[   20.571947]  which belongs to the cache kmalloc-16 of size 16
[   20.572842] The buggy address is located 8 bytes inside of
[   20.572842]  allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9)
[   20.573878] 
[   20.574028] The buggy address belongs to the physical page:
[   20.574444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0
[   20.575286] flags: 0x200000000000000(node=0|zone=2)
[   20.575758] page_type: f5(slab)
[   20.576170] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.576646] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.577279] page dumped because: kasan: bad access detected
[   20.577865] 
[   20.578083] Memory state around the buggy address:
[   20.578515]  ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.579102]  ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.579805] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.580260]                                   ^
[   20.580689]  ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.581205]  ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.581641] ==================================================================
[   20.442436] ==================================================================
[   20.442739] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   20.443256] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269
[   20.444016] 
[   20.444286] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   20.444426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.444460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.444506] Call Trace:
[   20.444536]  <TASK>
[   20.444573]  dump_stack_lvl+0x73/0xb0
[   20.444673]  print_report+0xd1/0x650
[   20.444731]  ? __virt_addr_valid+0x1db/0x2d0
[   20.444789]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   20.444869]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.444923]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   20.444958]  kasan_report+0x140/0x180
[   20.444988]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   20.445026]  kasan_check_range+0x10c/0x1c0
[   20.445055]  __kasan_check_write+0x18/0x20
[   20.445084]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   20.445115]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.445147]  ? __kmalloc_cache_noprof+0x18a/0x420
[   20.445177]  ? trace_hardirqs_on+0x37/0xe0
[   20.445206]  ? kasan_bitops_generic+0x93/0x1c0
[   20.445240]  kasan_bitops_generic+0x117/0x1c0
[   20.445268]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.445317]  ? __pfx_read_tsc+0x10/0x10
[   20.445351]  ? ktime_get_ts64+0x86/0x230
[   20.445386]  kunit_try_run_case+0x1a6/0x480
[   20.445417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.445445]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.445475]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.445505]  ? __kthread_parkme+0x82/0x160
[   20.445535]  ? preempt_count_sub+0x50/0x80
[   20.445566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.445596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.445629]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.445661]  kthread+0x324/0x6e0
[   20.445688]  ? trace_preempt_on+0x20/0xc0
[   20.445717]  ? __pfx_kthread+0x10/0x10
[   20.445744]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.445772]  ? calculate_sigpending+0x7b/0xa0
[   20.445801]  ? __pfx_kthread+0x10/0x10
[   20.445830]  ret_from_fork+0x41/0x80
[   20.445873]  ? __pfx_kthread+0x10/0x10
[   20.445902]  ret_from_fork_asm+0x1a/0x30
[   20.445942]  </TASK>
[   20.445957] 
[   20.459961] Allocated by task 269:
[   20.460206]  kasan_save_stack+0x45/0x70
[   20.460503]  kasan_save_track+0x18/0x40
[   20.460803]  kasan_save_alloc_info+0x3b/0x50
[   20.461246]  __kasan_kmalloc+0xb7/0xc0
[   20.461679]  __kmalloc_cache_noprof+0x18a/0x420
[   20.462146]  kasan_bitops_generic+0x93/0x1c0
[   20.462576]  kunit_try_run_case+0x1a6/0x480
[   20.462881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.463182]  kthread+0x324/0x6e0
[   20.463559]  ret_from_fork+0x41/0x80
[   20.463950]  ret_from_fork_asm+0x1a/0x30
[   20.464396] 
[   20.464600] The buggy address belongs to the object at ffff8881024b01a0
[   20.464600]  which belongs to the cache kmalloc-16 of size 16
[   20.465528] The buggy address is located 8 bytes inside of
[   20.465528]  allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9)
[   20.466285] 
[   20.466472] The buggy address belongs to the physical page:
[   20.466850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0
[   20.467364] flags: 0x200000000000000(node=0|zone=2)
[   20.467829] page_type: f5(slab)
[   20.468067] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.468590] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.469222] page dumped because: kasan: bad access detected
[   20.469642] 
[   20.469849] Memory state around the buggy address:
[   20.470252]  ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.470804]  ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.471220] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.471746]                                   ^
[   20.472192]  ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.472694]  ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.473146] ==================================================================
[   20.399034] ==================================================================
[   20.399534] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   20.400531] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269
[   20.401203] 
[   20.401466] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   20.401566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.401585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.401613] Call Trace:
[   20.401636]  <TASK>
[   20.401658]  dump_stack_lvl+0x73/0xb0
[   20.401700]  print_report+0xd1/0x650
[   20.401747]  ? __virt_addr_valid+0x1db/0x2d0
[   20.401801]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   20.401876]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.401943]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   20.402009]  kasan_report+0x140/0x180
[   20.402065]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   20.402141]  kasan_check_range+0x10c/0x1c0
[   20.402192]  __kasan_check_write+0x18/0x20
[   20.402242]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   20.402294]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.402345]  ? __kmalloc_cache_noprof+0x18a/0x420
[   20.402391]  ? trace_hardirqs_on+0x37/0xe0
[   20.402437]  ? kasan_bitops_generic+0x93/0x1c0
[   20.402492]  kasan_bitops_generic+0x117/0x1c0
[   20.402542]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.402593]  ? __pfx_read_tsc+0x10/0x10
[   20.402636]  ? ktime_get_ts64+0x86/0x230
[   20.402685]  kunit_try_run_case+0x1a6/0x480
[   20.402735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.402781]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.402833]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.403050]  ? __kthread_parkme+0x82/0x160
[   20.403121]  ? preempt_count_sub+0x50/0x80
[   20.403187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.403243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.403343]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.403387]  kthread+0x324/0x6e0
[   20.403418]  ? trace_preempt_on+0x20/0xc0
[   20.403465]  ? __pfx_kthread+0x10/0x10
[   20.403513]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.403561]  ? calculate_sigpending+0x7b/0xa0
[   20.403595]  ? __pfx_kthread+0x10/0x10
[   20.403627]  ret_from_fork+0x41/0x80
[   20.403653]  ? __pfx_kthread+0x10/0x10
[   20.403692]  ret_from_fork_asm+0x1a/0x30
[   20.403736]  </TASK>
[   20.403750] 
[   20.420786] Allocated by task 269:
[   20.421225]  kasan_save_stack+0x45/0x70
[   20.421876]  kasan_save_track+0x18/0x40
[   20.422284]  kasan_save_alloc_info+0x3b/0x50
[   20.422719]  __kasan_kmalloc+0xb7/0xc0
[   20.423127]  __kmalloc_cache_noprof+0x18a/0x420
[   20.424135]  kasan_bitops_generic+0x93/0x1c0
[   20.424832]  kunit_try_run_case+0x1a6/0x480
[   20.425570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.426243]  kthread+0x324/0x6e0
[   20.426545]  ret_from_fork+0x41/0x80
[   20.426787]  ret_from_fork_asm+0x1a/0x30
[   20.427242] 
[   20.427422] The buggy address belongs to the object at ffff8881024b01a0
[   20.427422]  which belongs to the cache kmalloc-16 of size 16
[   20.428721] The buggy address is located 8 bytes inside of
[   20.428721]  allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9)
[   20.429882] 
[   20.430037] The buggy address belongs to the physical page:
[   20.430721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0
[   20.431370] flags: 0x200000000000000(node=0|zone=2)
[   20.432357] page_type: f5(slab)
[   20.432870] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.433582] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.434143] page dumped because: kasan: bad access detected
[   20.434810] 
[   20.434988] Memory state around the buggy address:
[   20.435709]  ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.436574]  ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.437142] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.437959]                                   ^
[   20.438346]  ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.439002]  ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.439615] ==================================================================
[   20.622672] ==================================================================
[   20.623162] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   20.623939] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269
[   20.624690] 
[   20.624886] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   20.624986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.625015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.625065] Call Trace:
[   20.625108]  <TASK>
[   20.625161]  dump_stack_lvl+0x73/0xb0
[   20.625240]  print_report+0xd1/0x650
[   20.625318]  ? __virt_addr_valid+0x1db/0x2d0
[   20.625381]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   20.625442]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.625502]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   20.625546]  kasan_report+0x140/0x180
[   20.625578]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   20.625618]  kasan_check_range+0x10c/0x1c0
[   20.625649]  __kasan_check_write+0x18/0x20
[   20.625678]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   20.625710]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.625742]  ? __kmalloc_cache_noprof+0x18a/0x420
[   20.625772]  ? trace_hardirqs_on+0x37/0xe0
[   20.625800]  ? kasan_bitops_generic+0x93/0x1c0
[   20.625834]  kasan_bitops_generic+0x117/0x1c0
[   20.625887]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.625919]  ? __pfx_read_tsc+0x10/0x10
[   20.625947]  ? ktime_get_ts64+0x86/0x230
[   20.625980]  kunit_try_run_case+0x1a6/0x480
[   20.626009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.626037]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.626066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.626096]  ? __kthread_parkme+0x82/0x160
[   20.626124]  ? preempt_count_sub+0x50/0x80
[   20.626155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.626184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.626216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.626248]  kthread+0x324/0x6e0
[   20.626275]  ? trace_preempt_on+0x20/0xc0
[   20.626311]  ? __pfx_kthread+0x10/0x10
[   20.626346]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.626374]  ? calculate_sigpending+0x7b/0xa0
[   20.626401]  ? __pfx_kthread+0x10/0x10
[   20.626431]  ret_from_fork+0x41/0x80
[   20.626455]  ? __pfx_kthread+0x10/0x10
[   20.626483]  ret_from_fork_asm+0x1a/0x30
[   20.626523]  </TASK>
[   20.626538] 
[   20.640759] Allocated by task 269:
[   20.641158]  kasan_save_stack+0x45/0x70
[   20.641616]  kasan_save_track+0x18/0x40
[   20.642031]  kasan_save_alloc_info+0x3b/0x50
[   20.642495]  __kasan_kmalloc+0xb7/0xc0
[   20.642892]  __kmalloc_cache_noprof+0x18a/0x420
[   20.643174]  kasan_bitops_generic+0x93/0x1c0
[   20.643632]  kunit_try_run_case+0x1a6/0x480
[   20.643918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.644433]  kthread+0x324/0x6e0
[   20.644798]  ret_from_fork+0x41/0x80
[   20.645177]  ret_from_fork_asm+0x1a/0x30
[   20.645596] 
[   20.645808] The buggy address belongs to the object at ffff8881024b01a0
[   20.645808]  which belongs to the cache kmalloc-16 of size 16
[   20.646614] The buggy address is located 8 bytes inside of
[   20.646614]  allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9)
[   20.647438] 
[   20.647604] The buggy address belongs to the physical page:
[   20.648089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0
[   20.648668] flags: 0x200000000000000(node=0|zone=2)
[   20.649055] page_type: f5(slab)
[   20.649423] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.649998] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.650488] page dumped because: kasan: bad access detected
[   20.650764] 
[   20.650921] Memory state around the buggy address:
[   20.651171]  ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.651817]  ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.652465] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.653075]                                   ^
[   20.653539]  ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.654058]  ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.654561] ==================================================================
[   20.358759] ==================================================================
[   20.359326] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   20.359903] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269
[   20.360997] 
[   20.361274] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   20.361660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.361702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.361760] Call Trace:
[   20.361790]  <TASK>
[   20.361824]  dump_stack_lvl+0x73/0xb0
[   20.361915]  print_report+0xd1/0x650
[   20.361973]  ? __virt_addr_valid+0x1db/0x2d0
[   20.362034]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   20.362084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.362118]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   20.362152]  kasan_report+0x140/0x180
[   20.362181]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   20.362218]  kasan_check_range+0x10c/0x1c0
[   20.362250]  __kasan_check_write+0x18/0x20
[   20.362278]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   20.362335]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.362370]  ? __kmalloc_cache_noprof+0x18a/0x420
[   20.362400]  ? trace_hardirqs_on+0x37/0xe0
[   20.362436]  ? kasan_bitops_generic+0x93/0x1c0
[   20.362496]  kasan_bitops_generic+0x117/0x1c0
[   20.362549]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.362603]  ? __pfx_read_tsc+0x10/0x10
[   20.362636]  ? ktime_get_ts64+0x86/0x230
[   20.362670]  kunit_try_run_case+0x1a6/0x480
[   20.362701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.362728]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.362760]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.362790]  ? __kthread_parkme+0x82/0x160
[   20.362819]  ? preempt_count_sub+0x50/0x80
[   20.362850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.362901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.362934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.362967]  kthread+0x324/0x6e0
[   20.362994]  ? trace_preempt_on+0x20/0xc0
[   20.363024]  ? __pfx_kthread+0x10/0x10
[   20.363052]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.363079]  ? calculate_sigpending+0x7b/0xa0
[   20.363108]  ? __pfx_kthread+0x10/0x10
[   20.363136]  ret_from_fork+0x41/0x80
[   20.363161]  ? __pfx_kthread+0x10/0x10
[   20.363189]  ret_from_fork_asm+0x1a/0x30
[   20.363228]  </TASK>
[   20.363242] 
[   20.379126] Allocated by task 269:
[   20.379387]  kasan_save_stack+0x45/0x70
[   20.379644]  kasan_save_track+0x18/0x40
[   20.379902]  kasan_save_alloc_info+0x3b/0x50
[   20.380331]  __kasan_kmalloc+0xb7/0xc0
[   20.380729]  __kmalloc_cache_noprof+0x18a/0x420
[   20.381376]  kasan_bitops_generic+0x93/0x1c0
[   20.382089]  kunit_try_run_case+0x1a6/0x480
[   20.382734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.383363]  kthread+0x324/0x6e0
[   20.384002]  ret_from_fork+0x41/0x80
[   20.384641]  ret_from_fork_asm+0x1a/0x30
[   20.385082] 
[   20.385287] The buggy address belongs to the object at ffff8881024b01a0
[   20.385287]  which belongs to the cache kmalloc-16 of size 16
[   20.386571] The buggy address is located 8 bytes inside of
[   20.386571]  allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9)
[   20.387643] 
[   20.388170] The buggy address belongs to the physical page:
[   20.388670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0
[   20.389613] flags: 0x200000000000000(node=0|zone=2)
[   20.390232] page_type: f5(slab)
[   20.390870] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.392091] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.392610] page dumped because: kasan: bad access detected
[   20.393161] 
[   20.393347] Memory state around the buggy address:
[   20.394139]  ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.394629]  ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.395175] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.395588]                                   ^
[   20.396386]  ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.397010]  ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.397676] ==================================================================
[   20.583080] ==================================================================
[   20.584055] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   20.584948] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269
[   20.585464] 
[   20.585616] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   20.585671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.585687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.585711] Call Trace:
[   20.585733]  <TASK>
[   20.585756]  dump_stack_lvl+0x73/0xb0
[   20.585793]  print_report+0xd1/0x650
[   20.585823]  ? __virt_addr_valid+0x1db/0x2d0
[   20.585850]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   20.585903]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.585937]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   20.585969]  kasan_report+0x140/0x180
[   20.585996]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   20.586033]  kasan_check_range+0x10c/0x1c0
[   20.586062]  __kasan_check_write+0x18/0x20
[   20.586092]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   20.586122]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.586154]  ? __kmalloc_cache_noprof+0x18a/0x420
[   20.586183]  ? trace_hardirqs_on+0x37/0xe0
[   20.586212]  ? kasan_bitops_generic+0x93/0x1c0
[   20.586245]  kasan_bitops_generic+0x117/0x1c0
[   20.586275]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.586318]  ? __pfx_read_tsc+0x10/0x10
[   20.586367]  ? ktime_get_ts64+0x86/0x230
[   20.586432]  kunit_try_run_case+0x1a6/0x480
[   20.586495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.586553]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.586615]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.586674]  ? __kthread_parkme+0x82/0x160
[   20.586730]  ? preempt_count_sub+0x50/0x80
[   20.586787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.586845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.586929]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.586996]  kthread+0x324/0x6e0
[   20.587053]  ? trace_preempt_on+0x20/0xc0
[   20.587107]  ? __pfx_kthread+0x10/0x10
[   20.587162]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.587211]  ? calculate_sigpending+0x7b/0xa0
[   20.587249]  ? __pfx_kthread+0x10/0x10
[   20.587280]  ret_from_fork+0x41/0x80
[   20.587316]  ? __pfx_kthread+0x10/0x10
[   20.587353]  ret_from_fork_asm+0x1a/0x30
[   20.587395]  </TASK>
[   20.587409] 
[   20.603155] Allocated by task 269:
[   20.603748]  kasan_save_stack+0x45/0x70
[   20.604053]  kasan_save_track+0x18/0x40
[   20.604321]  kasan_save_alloc_info+0x3b/0x50
[   20.604605]  __kasan_kmalloc+0xb7/0xc0
[   20.604850]  __kmalloc_cache_noprof+0x18a/0x420
[   20.605329]  kasan_bitops_generic+0x93/0x1c0
[   20.606315]  kunit_try_run_case+0x1a6/0x480
[   20.606776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.607322]  kthread+0x324/0x6e0
[   20.607966]  ret_from_fork+0x41/0x80
[   20.608535]  ret_from_fork_asm+0x1a/0x30
[   20.608847] 
[   20.608988] The buggy address belongs to the object at ffff8881024b01a0
[   20.608988]  which belongs to the cache kmalloc-16 of size 16
[   20.610528] The buggy address is located 8 bytes inside of
[   20.610528]  allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9)
[   20.611429] 
[   20.611649] The buggy address belongs to the physical page:
[   20.612464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0
[   20.613160] flags: 0x200000000000000(node=0|zone=2)
[   20.613653] page_type: f5(slab)
[   20.614087] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.614758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.615247] page dumped because: kasan: bad access detected
[   20.615755] 
[   20.615920] Memory state around the buggy address:
[   20.616327]  ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.617214]  ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.617936] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.618730]                                   ^
[   20.619310]  ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.620014]  ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.620788] ==================================================================
[   20.509740] ==================================================================
[   20.510536] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   20.511232] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269
[   20.511964] 
[   20.512275] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   20.512417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.512448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.512502] Call Trace:
[   20.512577]  <TASK>
[   20.512636]  dump_stack_lvl+0x73/0xb0
[   20.512713]  print_report+0xd1/0x650
[   20.512771]  ? __virt_addr_valid+0x1db/0x2d0
[   20.512831]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   20.512911]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.512978]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   20.513043]  kasan_report+0x140/0x180
[   20.513091]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   20.513132]  kasan_check_range+0x10c/0x1c0
[   20.513163]  __kasan_check_write+0x18/0x20
[   20.513192]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   20.513224]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.513256]  ? __kmalloc_cache_noprof+0x18a/0x420
[   20.513286]  ? trace_hardirqs_on+0x37/0xe0
[   20.513344]  ? kasan_bitops_generic+0x93/0x1c0
[   20.513381]  kasan_bitops_generic+0x117/0x1c0
[   20.513411]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.513442]  ? __pfx_read_tsc+0x10/0x10
[   20.513470]  ? ktime_get_ts64+0x86/0x230
[   20.513502]  kunit_try_run_case+0x1a6/0x480
[   20.513533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.513559]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.513589]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.513619]  ? __kthread_parkme+0x82/0x160
[   20.513646]  ? preempt_count_sub+0x50/0x80
[   20.513678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.513706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.513737]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.513770]  kthread+0x324/0x6e0
[   20.513796]  ? trace_preempt_on+0x20/0xc0
[   20.513824]  ? __pfx_kthread+0x10/0x10
[   20.513869]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.513900]  ? calculate_sigpending+0x7b/0xa0
[   20.513928]  ? __pfx_kthread+0x10/0x10
[   20.513958]  ret_from_fork+0x41/0x80
[   20.513982]  ? __pfx_kthread+0x10/0x10
[   20.514009]  ret_from_fork_asm+0x1a/0x30
[   20.514050]  </TASK>
[   20.514064] 
[   20.530808] Allocated by task 269:
[   20.531219]  kasan_save_stack+0x45/0x70
[   20.531538]  kasan_save_track+0x18/0x40
[   20.531931]  kasan_save_alloc_info+0x3b/0x50
[   20.532239]  __kasan_kmalloc+0xb7/0xc0
[   20.532597]  __kmalloc_cache_noprof+0x18a/0x420
[   20.533028]  kasan_bitops_generic+0x93/0x1c0
[   20.533466]  kunit_try_run_case+0x1a6/0x480
[   20.533878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.534182]  kthread+0x324/0x6e0
[   20.534439]  ret_from_fork+0x41/0x80
[   20.534873]  ret_from_fork_asm+0x1a/0x30
[   20.535288] 
[   20.535537] The buggy address belongs to the object at ffff8881024b01a0
[   20.535537]  which belongs to the cache kmalloc-16 of size 16
[   20.536634] The buggy address is located 8 bytes inside of
[   20.536634]  allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9)
[   20.537467] 
[   20.537620] The buggy address belongs to the physical page:
[   20.537906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0
[   20.538622] flags: 0x200000000000000(node=0|zone=2)
[   20.539164] page_type: f5(slab)
[   20.539594] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.540242] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.540632] page dumped because: kasan: bad access detected
[   20.541042] 
[   20.541343] Memory state around the buggy address:
[   20.541847]  ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.542552]  ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.543941] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.544462]                                   ^
[   20.545362]  ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.545766]  ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.546298] ==================================================================