Hay
Date
May 12, 2025, 6:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.010715] ==================================================================
[   21.011253] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   21.011719] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.012052] 
[   21.012227] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.012320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.012352] Hardware name: linux,dummy-virt (DT)
[   21.012390] Call trace:
[   21.012418]  show_stack+0x20/0x38 (C)
[   21.012474]  dump_stack_lvl+0x8c/0xd0
[   21.012528]  print_report+0x118/0x608
[   21.012580]  kasan_report+0xdc/0x128
[   21.012629]  kasan_check_range+0x100/0x1a8
[   21.012683]  __kasan_check_write+0x20/0x30
[   21.013050]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   21.013120]  kasan_bitops_generic+0x110/0x1c8
[   21.013175]  kunit_try_run_case+0x170/0x3f0
[   21.013230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.013285]  kthread+0x318/0x620
[   21.013333]  ret_from_fork+0x10/0x20
[   21.013387] 
[   21.017535] Allocated by task 250:
[   21.017973]  kasan_save_stack+0x3c/0x68
[   21.018375]  kasan_save_track+0x20/0x40
[   21.018885]  kasan_save_alloc_info+0x40/0x58
[   21.019207]  __kasan_kmalloc+0xd4/0xd8
[   21.019919]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.020235]  kasan_bitops_generic+0xa0/0x1c8
[   21.020445]  kunit_try_run_case+0x170/0x3f0
[   21.020653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.020881]  kthread+0x318/0x620
[   21.021066]  ret_from_fork+0x10/0x20
[   21.021241] 
[   21.021365] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.021365]  which belongs to the cache kmalloc-16 of size 16
[   21.021817] The buggy address is located 8 bytes inside of
[   21.021817]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.023151] 
[   21.023326] The buggy address belongs to the physical page:
[   21.023624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.024125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.024545] page_type: f5(slab)
[   21.024826] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.025127] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.025471] page dumped because: kasan: bad access detected
[   21.026018] 
[   21.026271] Memory state around the buggy address:
[   21.027375]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.027808]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.028320] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.028707]                                                           ^
[   21.029010]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.029474]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.029889] ==================================================================
[   20.883267] ==================================================================
[   20.883679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   20.884216] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.884565] 
[   20.884692] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.884836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.884875] Hardware name: linux,dummy-virt (DT)
[   20.885045] Call trace:
[   20.885219]  show_stack+0x20/0x38 (C)
[   20.885283]  dump_stack_lvl+0x8c/0xd0
[   20.885340]  print_report+0x118/0x608
[   20.885398]  kasan_report+0xdc/0x128
[   20.885452]  __asan_report_load8_noabort+0x20/0x30
[   20.885506]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   20.885567]  kasan_bitops_generic+0x110/0x1c8
[   20.885622]  kunit_try_run_case+0x170/0x3f0
[   20.885676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.885753]  kthread+0x318/0x620
[   20.885813]  ret_from_fork+0x10/0x20
[   20.885875] 
[   20.889791] Allocated by task 250:
[   20.889978]  kasan_save_stack+0x3c/0x68
[   20.890222]  kasan_save_track+0x20/0x40
[   20.890397]  kasan_save_alloc_info+0x40/0x58
[   20.890594]  __kasan_kmalloc+0xd4/0xd8
[   20.891958]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.892269]  kasan_bitops_generic+0xa0/0x1c8
[   20.892810]  kunit_try_run_case+0x170/0x3f0
[   20.893196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.894079]  kthread+0x318/0x620
[   20.894366]  ret_from_fork+0x10/0x20
[   20.894540] 
[   20.894716] The buggy address belongs to the object at fff00000c1e7a0e0
[   20.894716]  which belongs to the cache kmalloc-16 of size 16
[   20.895239] The buggy address is located 8 bytes inside of
[   20.895239]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   20.895726] 
[   20.896356] The buggy address belongs to the physical page:
[   20.896548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   20.897334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.897821] page_type: f5(slab)
[   20.898106] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.898704] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.899339] page dumped because: kasan: bad access detected
[   20.899802] 
[   20.899946] Memory state around the buggy address:
[   20.900416]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.900846]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.901199] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.901510]                                                           ^
[   20.901808]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.902146]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.902488] ==================================================================
[   20.926036] ==================================================================
[   20.927063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   20.927577] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.928034] 
[   20.928219] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.928328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.928364] Hardware name: linux,dummy-virt (DT)
[   20.928408] Call trace:
[   20.928438]  show_stack+0x20/0x38 (C)
[   20.928502]  dump_stack_lvl+0x8c/0xd0
[   20.928566]  print_report+0x118/0x608
[   20.928625]  kasan_report+0xdc/0x128
[   20.928679]  __asan_report_load8_noabort+0x20/0x30
[   20.929649]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   20.929764]  kasan_bitops_generic+0x110/0x1c8
[   20.929828]  kunit_try_run_case+0x170/0x3f0
[   20.929887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.929948]  kthread+0x318/0x620
[   20.930003]  ret_from_fork+0x10/0x20
[   20.930071] 
[   20.933270] Allocated by task 250:
[   20.933444]  kasan_save_stack+0x3c/0x68
[   20.933639]  kasan_save_track+0x20/0x40
[   20.934131]  kasan_save_alloc_info+0x40/0x58
[   20.935077]  __kasan_kmalloc+0xd4/0xd8
[   20.935667]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.936132]  kasan_bitops_generic+0xa0/0x1c8
[   20.936517]  kunit_try_run_case+0x170/0x3f0
[   20.936761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.936959]  kthread+0x318/0x620
[   20.937302]  ret_from_fork+0x10/0x20
[   20.937542] 
[   20.937735] The buggy address belongs to the object at fff00000c1e7a0e0
[   20.937735]  which belongs to the cache kmalloc-16 of size 16
[   20.938297] The buggy address is located 8 bytes inside of
[   20.938297]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   20.939094] 
[   20.939237] The buggy address belongs to the physical page:
[   20.939442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   20.939720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.939991] page_type: f5(slab)
[   20.940178] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.940454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.940721] page dumped because: kasan: bad access detected
[   20.941661] 
[   20.941791] Memory state around the buggy address:
[   20.941966]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.942865]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.943912] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.944339]                                                           ^
[   20.944818]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.945311]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.945815] ==================================================================
[   20.969153] ==================================================================
[   20.969801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   20.970243] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.970548] 
[   20.971733] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.971872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.971907] Hardware name: linux,dummy-virt (DT)
[   20.971945] Call trace:
[   20.971976]  show_stack+0x20/0x38 (C)
[   20.972038]  dump_stack_lvl+0x8c/0xd0
[   20.972090]  print_report+0x118/0x608
[   20.972142]  kasan_report+0xdc/0x128
[   20.972191]  kasan_check_range+0x100/0x1a8
[   20.972242]  __kasan_check_write+0x20/0x30
[   20.972292]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   20.972347]  kasan_bitops_generic+0x110/0x1c8
[   20.972397]  kunit_try_run_case+0x170/0x3f0
[   20.972448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.972505]  kthread+0x318/0x620
[   20.972555]  ret_from_fork+0x10/0x20
[   20.972612] 
[   20.976422] Allocated by task 250:
[   20.976608]  kasan_save_stack+0x3c/0x68
[   20.976826]  kasan_save_track+0x20/0x40
[   20.977019]  kasan_save_alloc_info+0x40/0x58
[   20.977220]  __kasan_kmalloc+0xd4/0xd8
[   20.977406]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.977600]  kasan_bitops_generic+0xa0/0x1c8
[   20.978938]  kunit_try_run_case+0x170/0x3f0
[   20.979459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.980024]  kthread+0x318/0x620
[   20.980255]  ret_from_fork+0x10/0x20
[   20.980568] 
[   20.980713] The buggy address belongs to the object at fff00000c1e7a0e0
[   20.980713]  which belongs to the cache kmalloc-16 of size 16
[   20.981265] The buggy address is located 8 bytes inside of
[   20.981265]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   20.982346] 
[   20.982884] The buggy address belongs to the physical page:
[   20.983191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   20.983724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.984182] page_type: f5(slab)
[   20.984449] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.984952] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.985369] page dumped because: kasan: bad access detected
[   20.985702] 
[   20.985820] Memory state around the buggy address:
[   20.986283]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.987449]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.987909] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.988323]                                                           ^
[   20.988670]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.989091]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.989522] ==================================================================
[   21.030809] ==================================================================
[   21.031128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   21.032147] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.032655] 
[   21.032905] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.033031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.033070] Hardware name: linux,dummy-virt (DT)
[   21.033126] Call trace:
[   21.033167]  show_stack+0x20/0x38 (C)
[   21.033234]  dump_stack_lvl+0x8c/0xd0
[   21.033291]  print_report+0x118/0x608
[   21.033344]  kasan_report+0xdc/0x128
[   21.033400]  kasan_check_range+0x100/0x1a8
[   21.033456]  __kasan_check_write+0x20/0x30
[   21.033508]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   21.033571]  kasan_bitops_generic+0x110/0x1c8
[   21.033629]  kunit_try_run_case+0x170/0x3f0
[   21.033683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.033762]  kthread+0x318/0x620
[   21.033820]  ret_from_fork+0x10/0x20
[   21.033879] 
[   21.038158] Allocated by task 250:
[   21.038484]  kasan_save_stack+0x3c/0x68
[   21.038883]  kasan_save_track+0x20/0x40
[   21.039472]  kasan_save_alloc_info+0x40/0x58
[   21.039886]  __kasan_kmalloc+0xd4/0xd8
[   21.040162]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.040426]  kasan_bitops_generic+0xa0/0x1c8
[   21.040731]  kunit_try_run_case+0x170/0x3f0
[   21.041113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.041427]  kthread+0x318/0x620
[   21.041679]  ret_from_fork+0x10/0x20
[   21.041922] 
[   21.042107] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.042107]  which belongs to the cache kmalloc-16 of size 16
[   21.043050] The buggy address is located 8 bytes inside of
[   21.043050]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.043908] 
[   21.044093] The buggy address belongs to the physical page:
[   21.044439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.044961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.045331] page_type: f5(slab)
[   21.045529] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.045944] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.046317] page dumped because: kasan: bad access detected
[   21.046755] 
[   21.046900] Memory state around the buggy address:
[   21.047502]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.047893]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.048144] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.048715]                                                           ^
[   21.049050]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.049386]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.049710] ==================================================================
[   20.990428] ==================================================================
[   20.991094] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   20.991511] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.991806] 
[   20.991976] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.992078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.992112] Hardware name: linux,dummy-virt (DT)
[   20.992149] Call trace:
[   20.992176]  show_stack+0x20/0x38 (C)
[   20.992232]  dump_stack_lvl+0x8c/0xd0
[   20.992285]  print_report+0x118/0x608
[   20.992336]  kasan_report+0xdc/0x128
[   20.992386]  __asan_report_load8_noabort+0x20/0x30
[   20.992439]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   20.992494]  kasan_bitops_generic+0x110/0x1c8
[   20.992546]  kunit_try_run_case+0x170/0x3f0
[   20.992600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.992656]  kthread+0x318/0x620
[   20.992707]  ret_from_fork+0x10/0x20
[   20.993107] 
[   20.996683] Allocated by task 250:
[   20.996893]  kasan_save_stack+0x3c/0x68
[   20.997100]  kasan_save_track+0x20/0x40
[   20.997283]  kasan_save_alloc_info+0x40/0x58
[   20.997475]  __kasan_kmalloc+0xd4/0xd8
[   20.997666]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.997941]  kasan_bitops_generic+0xa0/0x1c8
[   20.998195]  kunit_try_run_case+0x170/0x3f0
[   20.998626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.999102]  kthread+0x318/0x620
[   20.999451]  ret_from_fork+0x10/0x20
[   20.999876] 
[   21.000065] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.000065]  which belongs to the cache kmalloc-16 of size 16
[   21.000949] The buggy address is located 8 bytes inside of
[   21.000949]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.001695] 
[   21.001937] The buggy address belongs to the physical page:
[   21.002240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.003712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.004060] page_type: f5(slab)
[   21.004224] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.004833] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.005209] page dumped because: kasan: bad access detected
[   21.005467] 
[   21.005615] Memory state around the buggy address:
[   21.006102]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.006632]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.007070] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.007764]                                                           ^
[   21.008284]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.008721]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.009153] ==================================================================
[   20.904375] ==================================================================
[   20.904688] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   20.905155] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.905892] 
[   20.906139] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.906320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.906360] Hardware name: linux,dummy-virt (DT)
[   20.906402] Call trace:
[   20.906435]  show_stack+0x20/0x38 (C)
[   20.906547]  dump_stack_lvl+0x8c/0xd0
[   20.906612]  print_report+0x118/0x608
[   20.906670]  kasan_report+0xdc/0x128
[   20.906722]  kasan_check_range+0x100/0x1a8
[   20.906803]  __kasan_check_write+0x20/0x30
[   20.906855]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   20.906915]  kasan_bitops_generic+0x110/0x1c8
[   20.906969]  kunit_try_run_case+0x170/0x3f0
[   20.907730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.907815]  kthread+0x318/0x620
[   20.907870]  ret_from_fork+0x10/0x20
[   20.907930] 
[   20.912107] Allocated by task 250:
[   20.912549]  kasan_save_stack+0x3c/0x68
[   20.912903]  kasan_save_track+0x20/0x40
[   20.913236]  kasan_save_alloc_info+0x40/0x58
[   20.913576]  __kasan_kmalloc+0xd4/0xd8
[   20.913926]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.914311]  kasan_bitops_generic+0xa0/0x1c8
[   20.914750]  kunit_try_run_case+0x170/0x3f0
[   20.915812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.916279]  kthread+0x318/0x620
[   20.916573]  ret_from_fork+0x10/0x20
[   20.916791] 
[   20.916932] The buggy address belongs to the object at fff00000c1e7a0e0
[   20.916932]  which belongs to the cache kmalloc-16 of size 16
[   20.917433] The buggy address is located 8 bytes inside of
[   20.917433]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   20.918271] 
[   20.918488] The buggy address belongs to the physical page:
[   20.919162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   20.919749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.920114] page_type: f5(slab)
[   20.920406] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.920969] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.921423] page dumped because: kasan: bad access detected
[   20.921830] 
[   20.922045] Memory state around the buggy address:
[   20.922415]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.922781]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.923145] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.923469]                                                           ^
[   20.923735]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.925123]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.925366] ==================================================================
[   21.051278] ==================================================================
[   21.051567] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   21.051973] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.052533] 
[   21.052690] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.053425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.053472] Hardware name: linux,dummy-virt (DT)
[   21.053511] Call trace:
[   21.053542]  show_stack+0x20/0x38 (C)
[   21.053611]  dump_stack_lvl+0x8c/0xd0
[   21.053668]  print_report+0x118/0x608
[   21.053721]  kasan_report+0xdc/0x128
[   21.053803]  __asan_report_load8_noabort+0x20/0x30
[   21.053859]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   21.053921]  kasan_bitops_generic+0x110/0x1c8
[   21.053978]  kunit_try_run_case+0x170/0x3f0
[   21.054034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.054107]  kthread+0x318/0x620
[   21.054165]  ret_from_fork+0x10/0x20
[   21.054225] 
[   21.058452] Allocated by task 250:
[   21.059453]  kasan_save_stack+0x3c/0x68
[   21.059967]  kasan_save_track+0x20/0x40
[   21.060248]  kasan_save_alloc_info+0x40/0x58
[   21.060509]  __kasan_kmalloc+0xd4/0xd8
[   21.060768]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.061055]  kasan_bitops_generic+0xa0/0x1c8
[   21.061325]  kunit_try_run_case+0x170/0x3f0
[   21.061575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.061882]  kthread+0x318/0x620
[   21.062049]  ret_from_fork+0x10/0x20
[   21.062382] 
[   21.062704] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.062704]  which belongs to the cache kmalloc-16 of size 16
[   21.063857] The buggy address is located 8 bytes inside of
[   21.063857]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.064626] 
[   21.064851] The buggy address belongs to the physical page:
[   21.065155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.065625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.065985] page_type: f5(slab)
[   21.066334] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.066959] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.067392] page dumped because: kasan: bad access detected
[   21.068243] 
[   21.068563] Memory state around the buggy address:
[   21.068829]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.069328]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.069734] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.070164]                                                           ^
[   21.070664]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.071041]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.071641] ==================================================================
[   20.947059] ==================================================================
[   20.947357] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   20.947616] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.948173] 
[   20.948341] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.948435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.948468] Hardware name: linux,dummy-virt (DT)
[   20.948505] Call trace:
[   20.948531]  show_stack+0x20/0x38 (C)
[   20.948586]  dump_stack_lvl+0x8c/0xd0
[   20.948638]  print_report+0x118/0x608
[   20.948687]  kasan_report+0xdc/0x128
[   20.948735]  kasan_check_range+0x100/0x1a8
[   20.949433]  __kasan_check_write+0x20/0x30
[   20.949489]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   20.949547]  kasan_bitops_generic+0x110/0x1c8
[   20.949598]  kunit_try_run_case+0x170/0x3f0
[   20.949651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.949704]  kthread+0x318/0x620
[   20.949765]  ret_from_fork+0x10/0x20
[   20.949821] 
[   20.954421] Allocated by task 250:
[   20.955078]  kasan_save_stack+0x3c/0x68
[   20.955381]  kasan_save_track+0x20/0x40
[   20.955607]  kasan_save_alloc_info+0x40/0x58
[   20.955842]  __kasan_kmalloc+0xd4/0xd8
[   20.956069]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.956323]  kasan_bitops_generic+0xa0/0x1c8
[   20.956570]  kunit_try_run_case+0x170/0x3f0
[   20.957780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.958014]  kthread+0x318/0x620
[   20.958373]  ret_from_fork+0x10/0x20
[   20.959015] 
[   20.959136] The buggy address belongs to the object at fff00000c1e7a0e0
[   20.959136]  which belongs to the cache kmalloc-16 of size 16
[   20.959729] The buggy address is located 8 bytes inside of
[   20.959729]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   20.960704] 
[   20.961030] The buggy address belongs to the physical page:
[   20.961340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   20.961798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.962316] page_type: f5(slab)
[   20.963811] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.964111] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.964517] page dumped because: kasan: bad access detected
[   20.964946] 
[   20.965191] Memory state around the buggy address:
[   20.965494]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.965933]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.966405] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.966843]                                                           ^
[   20.967270]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.967786]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.968329] ==================================================================
[   20.862278] ==================================================================
[   20.863279] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   20.863823] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.864047] 
[   20.864238] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.864341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.864377] Hardware name: linux,dummy-virt (DT)
[   20.864418] Call trace:
[   20.864450]  show_stack+0x20/0x38 (C)
[   20.864511]  dump_stack_lvl+0x8c/0xd0
[   20.864568]  print_report+0x118/0x608
[   20.864640]  kasan_report+0xdc/0x128
[   20.864688]  kasan_check_range+0x100/0x1a8
[   20.864753]  __kasan_check_write+0x20/0x30
[   20.864833]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   20.864895]  kasan_bitops_generic+0x110/0x1c8
[   20.864950]  kunit_try_run_case+0x170/0x3f0
[   20.865027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.865091]  kthread+0x318/0x620
[   20.865144]  ret_from_fork+0x10/0x20
[   20.865225] 
[   20.868822] Allocated by task 250:
[   20.869023]  kasan_save_stack+0x3c/0x68
[   20.869249]  kasan_save_track+0x20/0x40
[   20.869439]  kasan_save_alloc_info+0x40/0x58
[   20.869646]  __kasan_kmalloc+0xd4/0xd8
[   20.870755]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.870965]  kasan_bitops_generic+0xa0/0x1c8
[   20.871140]  kunit_try_run_case+0x170/0x3f0
[   20.871307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.871498]  kthread+0x318/0x620
[   20.872210]  ret_from_fork+0x10/0x20
[   20.872417] 
[   20.872556] The buggy address belongs to the object at fff00000c1e7a0e0
[   20.872556]  which belongs to the cache kmalloc-16 of size 16
[   20.873689] The buggy address is located 8 bytes inside of
[   20.873689]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   20.874369] 
[   20.874820] The buggy address belongs to the physical page:
[   20.875236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   20.875724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.876223] page_type: f5(slab)
[   20.876461] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.876872] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.877271] page dumped because: kasan: bad access detected
[   20.877537] 
[   20.877692] Memory state around the buggy address:
[   20.878044]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.878509]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.878765] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.879255]                                                           ^
[   20.880424]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.880980]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.881435] ==================================================================

[   14.432114] ==================================================================
[   14.432412] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.432801] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.433276] 
[   14.433396] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.433442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.433455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.433478] Call Trace:
[   14.433499]  <TASK>
[   14.433519]  dump_stack_lvl+0x73/0xb0
[   14.433547]  print_report+0xd1/0x650
[   14.433569]  ? __virt_addr_valid+0x1db/0x2d0
[   14.433592]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.433616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.433643]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.433668]  kasan_report+0x140/0x180
[   14.433690]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.433719]  kasan_check_range+0x10c/0x1c0
[   14.433746]  __kasan_check_write+0x18/0x20
[   14.433767]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.433792]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.433856]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.433879]  ? trace_hardirqs_on+0x37/0xe0
[   14.433902]  ? kasan_bitops_generic+0x93/0x1c0
[   14.433945]  kasan_bitops_generic+0x117/0x1c0
[   14.433968]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.433992]  ? __pfx_read_tsc+0x10/0x10
[   14.434029]  ? ktime_get_ts64+0x86/0x230
[   14.434054]  kunit_try_run_case+0x1a6/0x480
[   14.434093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.434114]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.434135]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.434174]  ? __kthread_parkme+0x82/0x160
[   14.434209]  ? preempt_count_sub+0x50/0x80
[   14.434234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.434269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.434307]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.434343]  kthread+0x324/0x6e0
[   14.434368]  ? trace_preempt_on+0x20/0xc0
[   14.434389]  ? __pfx_kthread+0x10/0x10
[   14.434411]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.434435]  ? calculate_sigpending+0x7b/0xa0
[   14.434456]  ? __pfx_kthread+0x10/0x10
[   14.434479]  ret_from_fork+0x41/0x80
[   14.434496]  ? __pfx_kthread+0x10/0x10
[   14.434519]  ret_from_fork_asm+0x1a/0x30
[   14.434550]  </TASK>
[   14.434561] 
[   14.442823] Allocated by task 269:
[   14.443068]  kasan_save_stack+0x45/0x70
[   14.443292]  kasan_save_track+0x18/0x40
[   14.443447]  kasan_save_alloc_info+0x3b/0x50
[   14.443596]  __kasan_kmalloc+0xb7/0xc0
[   14.443738]  __kmalloc_cache_noprof+0x18a/0x420
[   14.443994]  kasan_bitops_generic+0x93/0x1c0
[   14.444225]  kunit_try_run_case+0x1a6/0x480
[   14.444563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.444921]  kthread+0x324/0x6e0
[   14.445120]  ret_from_fork+0x41/0x80
[   14.445347]  ret_from_fork_asm+0x1a/0x30
[   14.445549] 
[   14.445722] The buggy address belongs to the object at ffff888101b28060
[   14.445722]  which belongs to the cache kmalloc-16 of size 16
[   14.446274] The buggy address is located 8 bytes inside of
[   14.446274]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.446639] 
[   14.446714] The buggy address belongs to the physical page:
[   14.446897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.447484] flags: 0x200000000000000(node=0|zone=2)
[   14.447721] page_type: f5(slab)
[   14.447926] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.448293] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.448542] page dumped because: kasan: bad access detected
[   14.448710] 
[   14.449606] Memory state around the buggy address:
[   14.449850]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.450210]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.450533] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.451167]                                                           ^
[   14.451526]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.451916]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.452293] ==================================================================
[   14.453965] ==================================================================
[   14.454368] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.454848] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.455540] 
[   14.455674] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.455866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.455882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.455905] Call Trace:
[   14.455927]  <TASK>
[   14.455949]  dump_stack_lvl+0x73/0xb0
[   14.455981]  print_report+0xd1/0x650
[   14.456003]  ? __virt_addr_valid+0x1db/0x2d0
[   14.456027]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.456051]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.456077]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.456101]  kasan_report+0x140/0x180
[   14.456123]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.456151]  kasan_check_range+0x10c/0x1c0
[   14.456174]  __kasan_check_write+0x18/0x20
[   14.456196]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.456221]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.456246]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.456269]  ? trace_hardirqs_on+0x37/0xe0
[   14.456292]  ? kasan_bitops_generic+0x93/0x1c0
[   14.456317]  kasan_bitops_generic+0x117/0x1c0
[   14.456339]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.456363]  ? __pfx_read_tsc+0x10/0x10
[   14.456385]  ? ktime_get_ts64+0x86/0x230
[   14.456411]  kunit_try_run_case+0x1a6/0x480
[   14.456529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.456553]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.456578]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.456605]  ? __kthread_parkme+0x82/0x160
[   14.456628]  ? preempt_count_sub+0x50/0x80
[   14.456653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.456674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.456701]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.456727]  kthread+0x324/0x6e0
[   14.456748]  ? trace_preempt_on+0x20/0xc0
[   14.456771]  ? __pfx_kthread+0x10/0x10
[   14.456794]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.456817]  ? calculate_sigpending+0x7b/0xa0
[   14.456849]  ? __pfx_kthread+0x10/0x10
[   14.456871]  ret_from_fork+0x41/0x80
[   14.456890]  ? __pfx_kthread+0x10/0x10
[   14.456913]  ret_from_fork_asm+0x1a/0x30
[   14.456944]  </TASK>
[   14.456955] 
[   14.465510] Allocated by task 269:
[   14.465662]  kasan_save_stack+0x45/0x70
[   14.465920]  kasan_save_track+0x18/0x40
[   14.466192]  kasan_save_alloc_info+0x3b/0x50
[   14.466429]  __kasan_kmalloc+0xb7/0xc0
[   14.466622]  __kmalloc_cache_noprof+0x18a/0x420
[   14.466857]  kasan_bitops_generic+0x93/0x1c0
[   14.467079]  kunit_try_run_case+0x1a6/0x480
[   14.467294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.467607]  kthread+0x324/0x6e0
[   14.467820]  ret_from_fork+0x41/0x80
[   14.468030]  ret_from_fork_asm+0x1a/0x30
[   14.468223] 
[   14.468385] The buggy address belongs to the object at ffff888101b28060
[   14.468385]  which belongs to the cache kmalloc-16 of size 16
[   14.469002] The buggy address is located 8 bytes inside of
[   14.469002]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.469915] 
[   14.470019] The buggy address belongs to the physical page:
[   14.470324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.470562] flags: 0x200000000000000(node=0|zone=2)
[   14.470784] page_type: f5(slab)
[   14.470990] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.471369] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.471723] page dumped because: kasan: bad access detected
[   14.471918] 
[   14.471986] Memory state around the buggy address:
[   14.472387]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.472717]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.473023] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.473337]                                                           ^
[   14.473568]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.473955]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.474287] ==================================================================
[   14.538232] ==================================================================
[   14.538885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.539248] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.539599] 
[   14.539706] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.539751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.539764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.539786] Call Trace:
[   14.539807]  <TASK>
[   14.539827]  dump_stack_lvl+0x73/0xb0
[   14.539888]  print_report+0xd1/0x650
[   14.539909]  ? __virt_addr_valid+0x1db/0x2d0
[   14.539932]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.539972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.539997]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.540036]  kasan_report+0x140/0x180
[   14.540067]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.540096]  kasan_check_range+0x10c/0x1c0
[   14.540119]  __kasan_check_write+0x18/0x20
[   14.540141]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.540165]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.540206]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.540242]  ? trace_hardirqs_on+0x37/0xe0
[   14.540265]  ? kasan_bitops_generic+0x93/0x1c0
[   14.540305]  kasan_bitops_generic+0x117/0x1c0
[   14.540341]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.540380]  ? __pfx_read_tsc+0x10/0x10
[   14.540415]  ? ktime_get_ts64+0x86/0x230
[   14.540442]  kunit_try_run_case+0x1a6/0x480
[   14.540466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.540489]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.540511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.540536]  ? __kthread_parkme+0x82/0x160
[   14.540558]  ? preempt_count_sub+0x50/0x80
[   14.540585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.540608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.540634]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.540660]  kthread+0x324/0x6e0
[   14.540682]  ? trace_preempt_on+0x20/0xc0
[   14.540704]  ? __pfx_kthread+0x10/0x10
[   14.540727]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.540751]  ? calculate_sigpending+0x7b/0xa0
[   14.540775]  ? __pfx_kthread+0x10/0x10
[   14.540797]  ret_from_fork+0x41/0x80
[   14.540816]  ? __pfx_kthread+0x10/0x10
[   14.540848]  ret_from_fork_asm+0x1a/0x30
[   14.540879]  </TASK>
[   14.540891] 
[   14.549142] Allocated by task 269:
[   14.549329]  kasan_save_stack+0x45/0x70
[   14.549530]  kasan_save_track+0x18/0x40
[   14.549716]  kasan_save_alloc_info+0x3b/0x50
[   14.549936]  __kasan_kmalloc+0xb7/0xc0
[   14.550134]  __kmalloc_cache_noprof+0x18a/0x420
[   14.550295]  kasan_bitops_generic+0x93/0x1c0
[   14.550442]  kunit_try_run_case+0x1a6/0x480
[   14.550584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.550754]  kthread+0x324/0x6e0
[   14.550935]  ret_from_fork+0x41/0x80
[   14.551207]  ret_from_fork_asm+0x1a/0x30
[   14.551436] 
[   14.551533] The buggy address belongs to the object at ffff888101b28060
[   14.551533]  which belongs to the cache kmalloc-16 of size 16
[   14.552103] The buggy address is located 8 bytes inside of
[   14.552103]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.552644] 
[   14.552738] The buggy address belongs to the physical page:
[   14.553002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.553330] flags: 0x200000000000000(node=0|zone=2)
[   14.553542] page_type: f5(slab)
[   14.553731] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.554065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.554376] page dumped because: kasan: bad access detected
[   14.554589] 
[   14.554705] Memory state around the buggy address:
[   14.554900]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.555261]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.555529] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.555868]                                                           ^
[   14.556267]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.556539]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.556817] ==================================================================
[   14.411936] ==================================================================
[   14.412718] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.413190] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.413564] 
[   14.413682] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.413757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.413770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.413793] Call Trace:
[   14.413807]  <TASK>
[   14.413828]  dump_stack_lvl+0x73/0xb0
[   14.413868]  print_report+0xd1/0x650
[   14.413909]  ? __virt_addr_valid+0x1db/0x2d0
[   14.413932]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.413956]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.413980]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.414005]  kasan_report+0x140/0x180
[   14.414027]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.414054]  kasan_check_range+0x10c/0x1c0
[   14.414077]  __kasan_check_write+0x18/0x20
[   14.414098]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.414122]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.414148]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.414172]  ? trace_hardirqs_on+0x37/0xe0
[   14.414205]  ? kasan_bitops_generic+0x93/0x1c0
[   14.414231]  kasan_bitops_generic+0x117/0x1c0
[   14.414253]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.414277]  ? __pfx_read_tsc+0x10/0x10
[   14.414318]  ? ktime_get_ts64+0x86/0x230
[   14.414344]  kunit_try_run_case+0x1a6/0x480
[   14.414381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.414402]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.414424]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.414449]  ? __kthread_parkme+0x82/0x160
[   14.414472]  ? preempt_count_sub+0x50/0x80
[   14.414497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.414519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.414544]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.414570]  kthread+0x324/0x6e0
[   14.414591]  ? trace_preempt_on+0x20/0xc0
[   14.414613]  ? __pfx_kthread+0x10/0x10
[   14.414635]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.414658]  ? calculate_sigpending+0x7b/0xa0
[   14.414680]  ? __pfx_kthread+0x10/0x10
[   14.414702]  ret_from_fork+0x41/0x80
[   14.414720]  ? __pfx_kthread+0x10/0x10
[   14.414742]  ret_from_fork_asm+0x1a/0x30
[   14.414774]  </TASK>
[   14.414786] 
[   14.422513] Allocated by task 269:
[   14.422715]  kasan_save_stack+0x45/0x70
[   14.422953]  kasan_save_track+0x18/0x40
[   14.423295]  kasan_save_alloc_info+0x3b/0x50
[   14.423527]  __kasan_kmalloc+0xb7/0xc0
[   14.423686]  __kmalloc_cache_noprof+0x18a/0x420
[   14.423847]  kasan_bitops_generic+0x93/0x1c0
[   14.424085]  kunit_try_run_case+0x1a6/0x480
[   14.424287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.424543]  kthread+0x324/0x6e0
[   14.424749]  ret_from_fork+0x41/0x80
[   14.424984]  ret_from_fork_asm+0x1a/0x30
[   14.425229] 
[   14.425325] The buggy address belongs to the object at ffff888101b28060
[   14.425325]  which belongs to the cache kmalloc-16 of size 16
[   14.425933] The buggy address is located 8 bytes inside of
[   14.425933]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.426438] 
[   14.426573] The buggy address belongs to the physical page:
[   14.426750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.427117] flags: 0x200000000000000(node=0|zone=2)
[   14.427353] page_type: f5(slab)
[   14.427529] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.427791] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.428108] page dumped because: kasan: bad access detected
[   14.428376] 
[   14.428473] Memory state around the buggy address:
[   14.428666]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.428992]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.429360] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.429667]                                                           ^
[   14.429950]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.430268]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.430593] ==================================================================
[   14.497533] ==================================================================
[   14.497912] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.499002] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.499255] 
[   14.499343] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.499387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.499400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.499422] Call Trace:
[   14.499444]  <TASK>
[   14.499464]  dump_stack_lvl+0x73/0xb0
[   14.499493]  print_report+0xd1/0x650
[   14.499515]  ? __virt_addr_valid+0x1db/0x2d0
[   14.499539]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.499563]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.499589]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.499614]  kasan_report+0x140/0x180
[   14.499636]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.499689]  kasan_check_range+0x10c/0x1c0
[   14.499712]  __kasan_check_write+0x18/0x20
[   14.499735]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.499776]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.499801]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.499825]  ? trace_hardirqs_on+0x37/0xe0
[   14.499873]  ? kasan_bitops_generic+0x93/0x1c0
[   14.499913]  kasan_bitops_generic+0x117/0x1c0
[   14.499935]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.499959]  ? __pfx_read_tsc+0x10/0x10
[   14.499981]  ? ktime_get_ts64+0x86/0x230
[   14.500006]  kunit_try_run_case+0x1a6/0x480
[   14.500029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.500052]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.500075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.500099]  ? __kthread_parkme+0x82/0x160
[   14.500122]  ? preempt_count_sub+0x50/0x80
[   14.500146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.500168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.500194]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.500218]  kthread+0x324/0x6e0
[   14.500240]  ? trace_preempt_on+0x20/0xc0
[   14.500262]  ? __pfx_kthread+0x10/0x10
[   14.500284]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.500307]  ? calculate_sigpending+0x7b/0xa0
[   14.500329]  ? __pfx_kthread+0x10/0x10
[   14.500355]  ret_from_fork+0x41/0x80
[   14.500373]  ? __pfx_kthread+0x10/0x10
[   14.500395]  ret_from_fork_asm+0x1a/0x30
[   14.500427]  </TASK>
[   14.500439] 
[   14.508603] Allocated by task 269:
[   14.508785]  kasan_save_stack+0x45/0x70
[   14.508995]  kasan_save_track+0x18/0x40
[   14.509132]  kasan_save_alloc_info+0x3b/0x50
[   14.509276]  __kasan_kmalloc+0xb7/0xc0
[   14.509404]  __kmalloc_cache_noprof+0x18a/0x420
[   14.509743]  kasan_bitops_generic+0x93/0x1c0
[   14.509965]  kunit_try_run_case+0x1a6/0x480
[   14.510360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.510640]  kthread+0x324/0x6e0
[   14.510856]  ret_from_fork+0x41/0x80
[   14.511058]  ret_from_fork_asm+0x1a/0x30
[   14.511273] 
[   14.511365] The buggy address belongs to the object at ffff888101b28060
[   14.511365]  which belongs to the cache kmalloc-16 of size 16
[   14.511705] The buggy address is located 8 bytes inside of
[   14.511705]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.512261] 
[   14.512395] The buggy address belongs to the physical page:
[   14.512675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.513071] flags: 0x200000000000000(node=0|zone=2)
[   14.513304] page_type: f5(slab)
[   14.513473] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.513792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.514021] page dumped because: kasan: bad access detected
[   14.514322] 
[   14.514417] Memory state around the buggy address:
[   14.514665]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.515033]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.515388] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.515619]                                                           ^
[   14.515942]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.516319]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.516657] ==================================================================
[   14.557874] ==================================================================
[   14.558240] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.559205] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.559476] 
[   14.559611] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.559676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.559690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.559712] Call Trace:
[   14.559727]  <TASK>
[   14.559748]  dump_stack_lvl+0x73/0xb0
[   14.559779]  print_report+0xd1/0x650
[   14.559820]  ? __virt_addr_valid+0x1db/0x2d0
[   14.559853]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.559877]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.559903]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.559928]  kasan_report+0x140/0x180
[   14.559949]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.559994]  kasan_check_range+0x10c/0x1c0
[   14.560017]  __kasan_check_write+0x18/0x20
[   14.560038]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.560072]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.560097]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.560137]  ? trace_hardirqs_on+0x37/0xe0
[   14.560174]  ? kasan_bitops_generic+0x93/0x1c0
[   14.560212]  kasan_bitops_generic+0x117/0x1c0
[   14.560248]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.560285]  ? __pfx_read_tsc+0x10/0x10
[   14.560308]  ? ktime_get_ts64+0x86/0x230
[   14.560346]  kunit_try_run_case+0x1a6/0x480
[   14.560384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.560405]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.560427]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.560452]  ? __kthread_parkme+0x82/0x160
[   14.560475]  ? preempt_count_sub+0x50/0x80
[   14.560501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.560523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.560551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.560576]  kthread+0x324/0x6e0
[   14.560597]  ? trace_preempt_on+0x20/0xc0
[   14.560620]  ? __pfx_kthread+0x10/0x10
[   14.560642]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.560666]  ? calculate_sigpending+0x7b/0xa0
[   14.560688]  ? __pfx_kthread+0x10/0x10
[   14.560710]  ret_from_fork+0x41/0x80
[   14.560729]  ? __pfx_kthread+0x10/0x10
[   14.560751]  ret_from_fork_asm+0x1a/0x30
[   14.560783]  </TASK>
[   14.560795] 
[   14.568872] Allocated by task 269:
[   14.569064]  kasan_save_stack+0x45/0x70
[   14.569256]  kasan_save_track+0x18/0x40
[   14.569446]  kasan_save_alloc_info+0x3b/0x50
[   14.569609]  __kasan_kmalloc+0xb7/0xc0
[   14.569818]  __kmalloc_cache_noprof+0x18a/0x420
[   14.570066]  kasan_bitops_generic+0x93/0x1c0
[   14.570262]  kunit_try_run_case+0x1a6/0x480
[   14.570420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.570642]  kthread+0x324/0x6e0
[   14.570812]  ret_from_fork+0x41/0x80
[   14.571002]  ret_from_fork_asm+0x1a/0x30
[   14.571390] 
[   14.571464] The buggy address belongs to the object at ffff888101b28060
[   14.571464]  which belongs to the cache kmalloc-16 of size 16
[   14.571843] The buggy address is located 8 bytes inside of
[   14.571843]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.572267] 
[   14.572367] The buggy address belongs to the physical page:
[   14.572674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.573067] flags: 0x200000000000000(node=0|zone=2)
[   14.573329] page_type: f5(slab)
[   14.573501] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.573770] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.574002] page dumped because: kasan: bad access detected
[   14.574512] 
[   14.574627] Memory state around the buggy address:
[   14.574881]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.575216]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.575440] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.575734]                                                           ^
[   14.576064]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.576542]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.576868] ==================================================================
[   14.517822] ==================================================================
[   14.518755] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.519195] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.519539] 
[   14.519647] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.519692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.519704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.519727] Call Trace:
[   14.519748]  <TASK>
[   14.519768]  dump_stack_lvl+0x73/0xb0
[   14.519819]  print_report+0xd1/0x650
[   14.519851]  ? __virt_addr_valid+0x1db/0x2d0
[   14.519874]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.519916]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.519942]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.519966]  kasan_report+0x140/0x180
[   14.519987]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.520016]  kasan_check_range+0x10c/0x1c0
[   14.520038]  __kasan_check_write+0x18/0x20
[   14.520070]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.520095]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.520120]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.520144]  ? trace_hardirqs_on+0x37/0xe0
[   14.520167]  ? kasan_bitops_generic+0x93/0x1c0
[   14.520211]  kasan_bitops_generic+0x117/0x1c0
[   14.520234]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.520266]  ? __pfx_read_tsc+0x10/0x10
[   14.520288]  ? ktime_get_ts64+0x86/0x230
[   14.520312]  kunit_try_run_case+0x1a6/0x480
[   14.520337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.520455]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.520480]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.520506]  ? __kthread_parkme+0x82/0x160
[   14.520528]  ? preempt_count_sub+0x50/0x80
[   14.520553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.520576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.520601]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.520627]  kthread+0x324/0x6e0
[   14.520647]  ? trace_preempt_on+0x20/0xc0
[   14.520670]  ? __pfx_kthread+0x10/0x10
[   14.520692]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.520715]  ? calculate_sigpending+0x7b/0xa0
[   14.520736]  ? __pfx_kthread+0x10/0x10
[   14.520801]  ret_from_fork+0x41/0x80
[   14.520821]  ? __pfx_kthread+0x10/0x10
[   14.520866]  ret_from_fork_asm+0x1a/0x30
[   14.520911]  </TASK>
[   14.520921] 
[   14.529207] Allocated by task 269:
[   14.529406]  kasan_save_stack+0x45/0x70
[   14.529606]  kasan_save_track+0x18/0x40
[   14.529857]  kasan_save_alloc_info+0x3b/0x50
[   14.530145]  __kasan_kmalloc+0xb7/0xc0
[   14.530331]  __kmalloc_cache_noprof+0x18a/0x420
[   14.530555]  kasan_bitops_generic+0x93/0x1c0
[   14.530743]  kunit_try_run_case+0x1a6/0x480
[   14.530918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.531164]  kthread+0x324/0x6e0
[   14.531324]  ret_from_fork+0x41/0x80
[   14.531449]  ret_from_fork_asm+0x1a/0x30
[   14.531637] 
[   14.531733] The buggy address belongs to the object at ffff888101b28060
[   14.531733]  which belongs to the cache kmalloc-16 of size 16
[   14.532362] The buggy address is located 8 bytes inside of
[   14.532362]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.532713] 
[   14.532785] The buggy address belongs to the physical page:
[   14.532963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.533223] flags: 0x200000000000000(node=0|zone=2)
[   14.533454] page_type: f5(slab)
[   14.533646] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.533989] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.534313] page dumped because: kasan: bad access detected
[   14.534607] 
[   14.534758] Memory state around the buggy address:
[   14.534989]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.535267]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.535475] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.535679]                                                           ^
[   14.535975]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.536609]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.536961] ==================================================================
[   14.477611] ==================================================================
[   14.477997] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.478385] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.478690] 
[   14.478810] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.478869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.478882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.478905] Call Trace:
[   14.478921]  <TASK>
[   14.478964]  dump_stack_lvl+0x73/0xb0
[   14.478997]  print_report+0xd1/0x650
[   14.479039]  ? __virt_addr_valid+0x1db/0x2d0
[   14.479064]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.479089]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.479115]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.479140]  kasan_report+0x140/0x180
[   14.479162]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.479191]  kasan_check_range+0x10c/0x1c0
[   14.479214]  __kasan_check_write+0x18/0x20
[   14.479236]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.479276]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.479315]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.479340]  ? trace_hardirqs_on+0x37/0xe0
[   14.479365]  ? kasan_bitops_generic+0x93/0x1c0
[   14.479391]  kasan_bitops_generic+0x117/0x1c0
[   14.479413]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.479438]  ? __pfx_read_tsc+0x10/0x10
[   14.479459]  ? ktime_get_ts64+0x86/0x230
[   14.479486]  kunit_try_run_case+0x1a6/0x480
[   14.479511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.479531]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.479554]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.479580]  ? __kthread_parkme+0x82/0x160
[   14.479603]  ? preempt_count_sub+0x50/0x80
[   14.479629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.479651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.479676]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.479702]  kthread+0x324/0x6e0
[   14.479723]  ? trace_preempt_on+0x20/0xc0
[   14.479744]  ? __pfx_kthread+0x10/0x10
[   14.479766]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.479789]  ? calculate_sigpending+0x7b/0xa0
[   14.479811]  ? __pfx_kthread+0x10/0x10
[   14.479833]  ret_from_fork+0x41/0x80
[   14.479864]  ? __pfx_kthread+0x10/0x10
[   14.479886]  ret_from_fork_asm+0x1a/0x30
[   14.479919]  </TASK>
[   14.479929] 
[   14.488404] Allocated by task 269:
[   14.488570]  kasan_save_stack+0x45/0x70
[   14.488725]  kasan_save_track+0x18/0x40
[   14.488882]  kasan_save_alloc_info+0x3b/0x50
[   14.489132]  __kasan_kmalloc+0xb7/0xc0
[   14.489343]  __kmalloc_cache_noprof+0x18a/0x420
[   14.489583]  kasan_bitops_generic+0x93/0x1c0
[   14.489801]  kunit_try_run_case+0x1a6/0x480
[   14.490034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.490301]  kthread+0x324/0x6e0
[   14.490452]  ret_from_fork+0x41/0x80
[   14.490583]  ret_from_fork_asm+0x1a/0x30
[   14.490726] 
[   14.490799] The buggy address belongs to the object at ffff888101b28060
[   14.490799]  which belongs to the cache kmalloc-16 of size 16
[   14.491313] The buggy address is located 8 bytes inside of
[   14.491313]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.491854] 
[   14.491953] The buggy address belongs to the physical page:
[   14.492198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.492443] flags: 0x200000000000000(node=0|zone=2)
[   14.492613] page_type: f5(slab)
[   14.492789] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.493162] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.493768] page dumped because: kasan: bad access detected
[   14.494145] 
[   14.494293] Memory state around the buggy address:
[   14.494534]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.494866]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.495203] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.495514]                                                           ^
[   14.495887]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.496249]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.496528] ==================================================================