Hay
Date
May 12, 2025, 6:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.112768] ==================================================================
[   21.113188] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   21.113663] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.113977] 
[   21.114179] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.114285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.114318] Hardware name: linux,dummy-virt (DT)
[   21.114378] Call trace:
[   21.114424]  show_stack+0x20/0x38 (C)
[   21.114487]  dump_stack_lvl+0x8c/0xd0
[   21.114543]  print_report+0x118/0x608
[   21.114791]  kasan_report+0xdc/0x128
[   21.114917]  kasan_check_range+0x100/0x1a8
[   21.114981]  __kasan_check_write+0x20/0x30
[   21.115035]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   21.115096]  kasan_bitops_generic+0x11c/0x1c8
[   21.115151]  kunit_try_run_case+0x170/0x3f0
[   21.115212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.115271]  kthread+0x318/0x620
[   21.115322]  ret_from_fork+0x10/0x20
[   21.115382] 
[   21.119292] Allocated by task 250:
[   21.119775]  kasan_save_stack+0x3c/0x68
[   21.120049]  kasan_save_track+0x20/0x40
[   21.120280]  kasan_save_alloc_info+0x40/0x58
[   21.120531]  __kasan_kmalloc+0xd4/0xd8
[   21.120761]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.121508]  kasan_bitops_generic+0xa0/0x1c8
[   21.121859]  kunit_try_run_case+0x170/0x3f0
[   21.122113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.122400]  kthread+0x318/0x620
[   21.122858]  ret_from_fork+0x10/0x20
[   21.123231] 
[   21.123437] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.123437]  which belongs to the cache kmalloc-16 of size 16
[   21.124404] The buggy address is located 8 bytes inside of
[   21.124404]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.125180] 
[   21.125382] The buggy address belongs to the physical page:
[   21.125799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.126122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.126708] page_type: f5(slab)
[   21.126892] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.127278] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.127649] page dumped because: kasan: bad access detected
[   21.127908] 
[   21.128046] Memory state around the buggy address:
[   21.128269]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.128630]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.129339] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.129784]                                                           ^
[   21.131634]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.131986]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.132465] ==================================================================
[   21.184530] ==================================================================
[   21.184806] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   21.185416] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.185664] 
[   21.185861] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.185956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.185992] Hardware name: linux,dummy-virt (DT)
[   21.186029] Call trace:
[   21.186058]  show_stack+0x20/0x38 (C)
[   21.186127]  dump_stack_lvl+0x8c/0xd0
[   21.186186]  print_report+0x118/0x608
[   21.186243]  kasan_report+0xdc/0x128
[   21.186298]  kasan_check_range+0x100/0x1a8
[   21.186353]  __kasan_check_write+0x20/0x30
[   21.186404]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   21.186466]  kasan_bitops_generic+0x11c/0x1c8
[   21.186557]  kunit_try_run_case+0x170/0x3f0
[   21.186614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.186673]  kthread+0x318/0x620
[   21.186726]  ret_from_fork+0x10/0x20
[   21.186800] 
[   21.189648] Allocated by task 250:
[   21.189918]  kasan_save_stack+0x3c/0x68
[   21.190148]  kasan_save_track+0x20/0x40
[   21.190318]  kasan_save_alloc_info+0x40/0x58
[   21.190581]  __kasan_kmalloc+0xd4/0xd8
[   21.190911]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.191145]  kasan_bitops_generic+0xa0/0x1c8
[   21.191502]  kunit_try_run_case+0x170/0x3f0
[   21.191733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.192091]  kthread+0x318/0x620
[   21.192236]  ret_from_fork+0x10/0x20
[   21.192445] 
[   21.192601] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.192601]  which belongs to the cache kmalloc-16 of size 16
[   21.193274] The buggy address is located 8 bytes inside of
[   21.193274]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.193869] 
[   21.194034] The buggy address belongs to the physical page:
[   21.194319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.194695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.195044] page_type: f5(slab)
[   21.195296] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.195566] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.195950] page dumped because: kasan: bad access detected
[   21.196134] 
[   21.196306] Memory state around the buggy address:
[   21.196580]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.197027]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.197420] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.197734]                                                           ^
[   21.198100]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.198434]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.198723] ==================================================================
[   21.092622] ==================================================================
[   21.093014] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   21.093654] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.094204] 
[   21.094425] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.094554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.094591] Hardware name: linux,dummy-virt (DT)
[   21.094631] Call trace:
[   21.094660]  show_stack+0x20/0x38 (C)
[   21.094721]  dump_stack_lvl+0x8c/0xd0
[   21.094794]  print_report+0x118/0x608
[   21.095541]  kasan_report+0xdc/0x128
[   21.095602]  __asan_report_load8_noabort+0x20/0x30
[   21.095661]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   21.095724]  kasan_bitops_generic+0x11c/0x1c8
[   21.095810]  kunit_try_run_case+0x170/0x3f0
[   21.095867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.095927]  kthread+0x318/0x620
[   21.095981]  ret_from_fork+0x10/0x20
[   21.096041] 
[   21.100347] Allocated by task 250:
[   21.100629]  kasan_save_stack+0x3c/0x68
[   21.100956]  kasan_save_track+0x20/0x40
[   21.101237]  kasan_save_alloc_info+0x40/0x58
[   21.101497]  __kasan_kmalloc+0xd4/0xd8
[   21.101771]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.102004]  kasan_bitops_generic+0xa0/0x1c8
[   21.102367]  kunit_try_run_case+0x170/0x3f0
[   21.102788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.103327]  kthread+0x318/0x620
[   21.103563]  ret_from_fork+0x10/0x20
[   21.103837] 
[   21.103989] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.103989]  which belongs to the cache kmalloc-16 of size 16
[   21.104609] The buggy address is located 8 bytes inside of
[   21.104609]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.105138] 
[   21.105242] The buggy address belongs to the physical page:
[   21.105682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.106241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.106710] page_type: f5(slab)
[   21.106942] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.107813] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.108289] page dumped because: kasan: bad access detected
[   21.108603] 
[   21.108756] Memory state around the buggy address:
[   21.109000]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.109402]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.109802] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.110176]                                                           ^
[   21.110609]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.111027]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.111653] ==================================================================
[   21.072641] ==================================================================
[   21.073145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   21.073708] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.074030] 
[   21.074262] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.074367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.074426] Hardware name: linux,dummy-virt (DT)
[   21.074484] Call trace:
[   21.074798]  show_stack+0x20/0x38 (C)
[   21.074868]  dump_stack_lvl+0x8c/0xd0
[   21.074923]  print_report+0x118/0x608
[   21.074978]  kasan_report+0xdc/0x128
[   21.075029]  kasan_check_range+0x100/0x1a8
[   21.075085]  __kasan_check_write+0x20/0x30
[   21.075135]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   21.075195]  kasan_bitops_generic+0x11c/0x1c8
[   21.075249]  kunit_try_run_case+0x170/0x3f0
[   21.075302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.075359]  kthread+0x318/0x620
[   21.075408]  ret_from_fork+0x10/0x20
[   21.075464] 
[   21.079206] Allocated by task 250:
[   21.079488]  kasan_save_stack+0x3c/0x68
[   21.079771]  kasan_save_track+0x20/0x40
[   21.080097]  kasan_save_alloc_info+0x40/0x58
[   21.080515]  __kasan_kmalloc+0xd4/0xd8
[   21.080822]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.081204]  kasan_bitops_generic+0xa0/0x1c8
[   21.081484]  kunit_try_run_case+0x170/0x3f0
[   21.081850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.082153]  kthread+0x318/0x620
[   21.082463]  ret_from_fork+0x10/0x20
[   21.082752] 
[   21.082901] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.082901]  which belongs to the cache kmalloc-16 of size 16
[   21.083531] The buggy address is located 8 bytes inside of
[   21.083531]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.084199] 
[   21.084356] The buggy address belongs to the physical page:
[   21.084556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.085761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.086323] page_type: f5(slab)
[   21.086568] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.087254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.087928] page dumped because: kasan: bad access detected
[   21.088208] 
[   21.088402] Memory state around the buggy address:
[   21.088689]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.089259]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.089620] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.090029]                                                           ^
[   21.090372]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.090970]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.091359] ==================================================================
[   21.199523] ==================================================================
[   21.199840] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   21.200263] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.200478] 
[   21.200666] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.200764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.200798] Hardware name: linux,dummy-virt (DT)
[   21.200833] Call trace:
[   21.200858]  show_stack+0x20/0x38 (C)
[   21.200914]  dump_stack_lvl+0x8c/0xd0
[   21.200965]  print_report+0x118/0x608
[   21.201017]  kasan_report+0xdc/0x128
[   21.201070]  __asan_report_load8_noabort+0x20/0x30
[   21.201121]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   21.201183]  kasan_bitops_generic+0x11c/0x1c8
[   21.201238]  kunit_try_run_case+0x170/0x3f0
[   21.201291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.201350]  kthread+0x318/0x620
[   21.201402]  ret_from_fork+0x10/0x20
[   21.201456] 
[   21.205667] Allocated by task 250:
[   21.206063]  kasan_save_stack+0x3c/0x68
[   21.206389]  kasan_save_track+0x20/0x40
[   21.206559]  kasan_save_alloc_info+0x40/0x58
[   21.206728]  __kasan_kmalloc+0xd4/0xd8
[   21.207270]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.207812]  kasan_bitops_generic+0xa0/0x1c8
[   21.208008]  kunit_try_run_case+0x170/0x3f0
[   21.208360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.208674]  kthread+0x318/0x620
[   21.208901]  ret_from_fork+0x10/0x20
[   21.209206] 
[   21.209331] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.209331]  which belongs to the cache kmalloc-16 of size 16
[   21.209883] The buggy address is located 8 bytes inside of
[   21.209883]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.210426] 
[   21.210616] The buggy address belongs to the physical page:
[   21.210892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.211362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.211798] page_type: f5(slab)
[   21.211993] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.212327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.212692] page dumped because: kasan: bad access detected
[   21.212975] 
[   21.213150] Memory state around the buggy address:
[   21.213436]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.213895]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.214260] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.214612]                                                           ^
[   21.214882]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.215310]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.215635] ==================================================================
[   21.133756] ==================================================================
[   21.134134] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   21.134818] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.135871] 
[   21.136127] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.136243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.136277] Hardware name: linux,dummy-virt (DT)
[   21.136314] Call trace:
[   21.136343]  show_stack+0x20/0x38 (C)
[   21.136405]  dump_stack_lvl+0x8c/0xd0
[   21.136458]  print_report+0x118/0x608
[   21.136511]  kasan_report+0xdc/0x128
[   21.136562]  __asan_report_load8_noabort+0x20/0x30
[   21.136614]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   21.136674]  kasan_bitops_generic+0x11c/0x1c8
[   21.136727]  kunit_try_run_case+0x170/0x3f0
[   21.136803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.136859]  kthread+0x318/0x620
[   21.136909]  ret_from_fork+0x10/0x20
[   21.136965] 
[   21.140450] Allocated by task 250:
[   21.140732]  kasan_save_stack+0x3c/0x68
[   21.141036]  kasan_save_track+0x20/0x40
[   21.141333]  kasan_save_alloc_info+0x40/0x58
[   21.141712]  __kasan_kmalloc+0xd4/0xd8
[   21.141954]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.142313]  kasan_bitops_generic+0xa0/0x1c8
[   21.142591]  kunit_try_run_case+0x170/0x3f0
[   21.142934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.143297]  kthread+0x318/0x620
[   21.143590]  ret_from_fork+0x10/0x20
[   21.143854] 
[   21.143966] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.143966]  which belongs to the cache kmalloc-16 of size 16
[   21.144634] The buggy address is located 8 bytes inside of
[   21.144634]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.145330] 
[   21.145526] The buggy address belongs to the physical page:
[   21.145899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.146233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.146479] page_type: f5(slab)
[   21.146643] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.147113] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.147583] page dumped because: kasan: bad access detected
[   21.148006] 
[   21.148181] Memory state around the buggy address:
[   21.148510]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.149006]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.149427] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.149848]                                                           ^
[   21.150222]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.150684]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.151083] ==================================================================
[   21.169406] ==================================================================
[   21.169816] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   21.170238] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.170668] 
[   21.170880] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.170983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.171020] Hardware name: linux,dummy-virt (DT)
[   21.171058] Call trace:
[   21.171086]  show_stack+0x20/0x38 (C)
[   21.171146]  dump_stack_lvl+0x8c/0xd0
[   21.171204]  print_report+0x118/0x608
[   21.171257]  kasan_report+0xdc/0x128
[   21.171309]  __asan_report_load8_noabort+0x20/0x30
[   21.171366]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   21.171427]  kasan_bitops_generic+0x11c/0x1c8
[   21.171481]  kunit_try_run_case+0x170/0x3f0
[   21.171537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.171597]  kthread+0x318/0x620
[   21.171649]  ret_from_fork+0x10/0x20
[   21.171706] 
[   21.174313] Allocated by task 250:
[   21.174628]  kasan_save_stack+0x3c/0x68
[   21.174968]  kasan_save_track+0x20/0x40
[   21.175175]  kasan_save_alloc_info+0x40/0x58
[   21.175499]  __kasan_kmalloc+0xd4/0xd8
[   21.175708]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.175984]  kasan_bitops_generic+0xa0/0x1c8
[   21.176257]  kunit_try_run_case+0x170/0x3f0
[   21.176517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.176842]  kthread+0x318/0x620
[   21.177097]  ret_from_fork+0x10/0x20
[   21.177286] 
[   21.177391] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.177391]  which belongs to the cache kmalloc-16 of size 16
[   21.177720] The buggy address is located 8 bytes inside of
[   21.177720]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.178427] 
[   21.178595] The buggy address belongs to the physical page:
[   21.178884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.179334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.179633] page_type: f5(slab)
[   21.179861] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.180295] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.180557] page dumped because: kasan: bad access detected
[   21.180877] 
[   21.181004] Memory state around the buggy address:
[   21.181341]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.181773]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.182147] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.182531]                                                           ^
[   21.182895]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183279]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183624] ==================================================================
[   21.152326] ==================================================================
[   21.152630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   21.153242] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.153777] 
[   21.153941] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.154041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.154085] Hardware name: linux,dummy-virt (DT)
[   21.154127] Call trace:
[   21.154176]  show_stack+0x20/0x38 (C)
[   21.154239]  dump_stack_lvl+0x8c/0xd0
[   21.154295]  print_report+0x118/0x608
[   21.154372]  kasan_report+0xdc/0x128
[   21.154435]  kasan_check_range+0x100/0x1a8
[   21.154493]  __kasan_check_write+0x20/0x30
[   21.154547]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   21.155063]  kasan_bitops_generic+0x11c/0x1c8
[   21.155173]  kunit_try_run_case+0x170/0x3f0
[   21.155237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.155301]  kthread+0x318/0x620
[   21.155357]  ret_from_fork+0x10/0x20
[   21.155416] 
[   21.158097] Allocated by task 250:
[   21.158281]  kasan_save_stack+0x3c/0x68
[   21.158467]  kasan_save_track+0x20/0x40
[   21.158629]  kasan_save_alloc_info+0x40/0x58
[   21.158870]  __kasan_kmalloc+0xd4/0xd8
[   21.159164]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.159487]  kasan_bitops_generic+0xa0/0x1c8
[   21.159871]  kunit_try_run_case+0x170/0x3f0
[   21.160216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.160546]  kthread+0x318/0x620
[   21.160789]  ret_from_fork+0x10/0x20
[   21.161043] 
[   21.161215] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.161215]  which belongs to the cache kmalloc-16 of size 16
[   21.162006] The buggy address is located 8 bytes inside of
[   21.162006]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.162588] 
[   21.162735] The buggy address belongs to the physical page:
[   21.163314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.163774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.164126] page_type: f5(slab)
[   21.164451] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.164965] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.165379] page dumped because: kasan: bad access detected
[   21.165762] 
[   21.165903] Memory state around the buggy address:
[   21.166207]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.166627]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.166870] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.167342]                                                           ^
[   21.167922]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.168264]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.168634] ==================================================================
[   21.216459] ==================================================================
[   21.216843] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   21.217141] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.217420] 
[   21.217561] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.217661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.217695] Hardware name: linux,dummy-virt (DT)
[   21.217732] Call trace:
[   21.217781]  show_stack+0x20/0x38 (C)
[   21.217839]  dump_stack_lvl+0x8c/0xd0
[   21.217926]  print_report+0x118/0x608
[   21.217981]  kasan_report+0xdc/0x128
[   21.218035]  __asan_report_load8_noabort+0x20/0x30
[   21.218136]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   21.218212]  kasan_bitops_generic+0x11c/0x1c8
[   21.218267]  kunit_try_run_case+0x170/0x3f0
[   21.218324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.218383]  kthread+0x318/0x620
[   21.218433]  ret_from_fork+0x10/0x20
[   21.218510] 
[   21.220634] Allocated by task 250:
[   21.221528]  kasan_save_stack+0x3c/0x68
[   21.221898]  kasan_save_track+0x20/0x40
[   21.222080]  kasan_save_alloc_info+0x40/0x58
[   21.222408]  __kasan_kmalloc+0xd4/0xd8
[   21.222854]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.223175]  kasan_bitops_generic+0xa0/0x1c8
[   21.223359]  kunit_try_run_case+0x170/0x3f0
[   21.223697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.223997]  kthread+0x318/0x620
[   21.224289]  ret_from_fork+0x10/0x20
[   21.224502] 
[   21.224637] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.224637]  which belongs to the cache kmalloc-16 of size 16
[   21.225148] The buggy address is located 8 bytes inside of
[   21.225148]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.225766] 
[   21.225916] The buggy address belongs to the physical page:
[   21.226212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.226568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.226974] page_type: f5(slab)
[   21.227291] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.227651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.227963] page dumped because: kasan: bad access detected
[   21.228195] 
[   21.228379] Memory state around the buggy address:
[   21.228671]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.228939]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.229319] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.229689]                                                           ^
[   21.230014]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.230324]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.230657] ==================================================================

[   14.663722] ==================================================================
[   14.664215] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   14.664499] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.664811] 
[   14.664938] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.664982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.664995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.665018] Call Trace:
[   14.665037]  <TASK>
[   14.665064]  dump_stack_lvl+0x73/0xb0
[   14.665093]  print_report+0xd1/0x650
[   14.665114]  ? __virt_addr_valid+0x1db/0x2d0
[   14.665137]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   14.665165]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.665191]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   14.665218]  kasan_report+0x140/0x180
[   14.665240]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   14.665272]  kasan_check_range+0x10c/0x1c0
[   14.665295]  __kasan_check_write+0x18/0x20
[   14.665319]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   14.665345]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.665373]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.665397]  ? trace_hardirqs_on+0x37/0xe0
[   14.665420]  ? kasan_bitops_generic+0x93/0x1c0
[   14.665446]  kasan_bitops_generic+0x122/0x1c0
[   14.665469]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.665493]  ? __pfx_read_tsc+0x10/0x10
[   14.665515]  ? ktime_get_ts64+0x86/0x230
[   14.665540]  kunit_try_run_case+0x1a6/0x480
[   14.665564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.665585]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.665606]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.665631]  ? __kthread_parkme+0x82/0x160
[   14.665654]  ? preempt_count_sub+0x50/0x80
[   14.665679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.665701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.665726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.665758]  kthread+0x324/0x6e0
[   14.665779]  ? trace_preempt_on+0x20/0xc0
[   14.665801]  ? __pfx_kthread+0x10/0x10
[   14.665823]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.665856]  ? calculate_sigpending+0x7b/0xa0
[   14.665877]  ? __pfx_kthread+0x10/0x10
[   14.665900]  ret_from_fork+0x41/0x80
[   14.665920]  ? __pfx_kthread+0x10/0x10
[   14.665942]  ret_from_fork_asm+0x1a/0x30
[   14.665974]  </TASK>
[   14.665985] 
[   14.678062] Allocated by task 269:
[   14.678472]  kasan_save_stack+0x45/0x70
[   14.678807]  kasan_save_track+0x18/0x40
[   14.679127]  kasan_save_alloc_info+0x3b/0x50
[   14.679329]  __kasan_kmalloc+0xb7/0xc0
[   14.679498]  __kmalloc_cache_noprof+0x18a/0x420
[   14.679693]  kasan_bitops_generic+0x93/0x1c0
[   14.679897]  kunit_try_run_case+0x1a6/0x480
[   14.680341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.680824]  kthread+0x324/0x6e0
[   14.681093]  ret_from_fork+0x41/0x80
[   14.681392]  ret_from_fork_asm+0x1a/0x30
[   14.681781] 
[   14.682011] The buggy address belongs to the object at ffff888101b28060
[   14.682011]  which belongs to the cache kmalloc-16 of size 16
[   14.682625] The buggy address is located 8 bytes inside of
[   14.682625]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.683211] 
[   14.683312] The buggy address belongs to the physical page:
[   14.683538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.684188] flags: 0x200000000000000(node=0|zone=2)
[   14.684517] page_type: f5(slab)
[   14.684803] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.685440] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.685948] page dumped because: kasan: bad access detected
[   14.686409] 
[   14.686674] Memory state around the buggy address:
[   14.686969]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.687477]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.687779] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.688309]                                                           ^
[   14.688637]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.689257]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.689695] ==================================================================
[   14.623318] ==================================================================
[   14.623821] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.624759] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.625057] 
[   14.625146] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.625211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.625224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.625246] Call Trace:
[   14.625267]  <TASK>
[   14.625305]  dump_stack_lvl+0x73/0xb0
[   14.625334]  print_report+0xd1/0x650
[   14.625356]  ? __virt_addr_valid+0x1db/0x2d0
[   14.625397]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.625423]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.625448]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.625475]  kasan_report+0x140/0x180
[   14.625496]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.625526]  kasan_check_range+0x10c/0x1c0
[   14.625567]  __kasan_check_write+0x18/0x20
[   14.625590]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.625617]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.625657]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.625695]  ? trace_hardirqs_on+0x37/0xe0
[   14.625718]  ? kasan_bitops_generic+0x93/0x1c0
[   14.625749]  kasan_bitops_generic+0x122/0x1c0
[   14.625785]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.625823]  ? __pfx_read_tsc+0x10/0x10
[   14.625854]  ? ktime_get_ts64+0x86/0x230
[   14.625879]  kunit_try_run_case+0x1a6/0x480
[   14.625902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.625924]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.625947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.625972]  ? __kthread_parkme+0x82/0x160
[   14.625994]  ? preempt_count_sub+0x50/0x80
[   14.626019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.626042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.626068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.626094]  kthread+0x324/0x6e0
[   14.626115]  ? trace_preempt_on+0x20/0xc0
[   14.626137]  ? __pfx_kthread+0x10/0x10
[   14.626160]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.626183]  ? calculate_sigpending+0x7b/0xa0
[   14.626219]  ? __pfx_kthread+0x10/0x10
[   14.626242]  ret_from_fork+0x41/0x80
[   14.626261]  ? __pfx_kthread+0x10/0x10
[   14.626283]  ret_from_fork_asm+0x1a/0x30
[   14.626314]  </TASK>
[   14.626325] 
[   14.634553] Allocated by task 269:
[   14.634775]  kasan_save_stack+0x45/0x70
[   14.635004]  kasan_save_track+0x18/0x40
[   14.635216]  kasan_save_alloc_info+0x3b/0x50
[   14.635449]  __kasan_kmalloc+0xb7/0xc0
[   14.635593]  __kmalloc_cache_noprof+0x18a/0x420
[   14.635804]  kasan_bitops_generic+0x93/0x1c0
[   14.636093]  kunit_try_run_case+0x1a6/0x480
[   14.636387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.636572]  kthread+0x324/0x6e0
[   14.636695]  ret_from_fork+0x41/0x80
[   14.636821]  ret_from_fork_asm+0x1a/0x30
[   14.636976] 
[   14.637050] The buggy address belongs to the object at ffff888101b28060
[   14.637050]  which belongs to the cache kmalloc-16 of size 16
[   14.637643] The buggy address is located 8 bytes inside of
[   14.637643]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.638191] 
[   14.638386] The buggy address belongs to the physical page:
[   14.638751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.639152] flags: 0x200000000000000(node=0|zone=2)
[   14.639404] page_type: f5(slab)
[   14.639585] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.639925] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.640327] page dumped because: kasan: bad access detected
[   14.640718] 
[   14.640816] Memory state around the buggy address:
[   14.640990]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.641383]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.641766] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.642122]                                                           ^
[   14.642338]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.642553]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.642784] ==================================================================
[   14.690542] ==================================================================
[   14.690859] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   14.691143] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.691488] 
[   14.691600] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.691645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.691658] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.691680] Call Trace:
[   14.691701]  <TASK>
[   14.691724]  dump_stack_lvl+0x73/0xb0
[   14.691751]  print_report+0xd1/0x650
[   14.691772]  ? __virt_addr_valid+0x1db/0x2d0
[   14.691795]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   14.691821]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.691858]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   14.691884]  kasan_report+0x140/0x180
[   14.691905]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   14.691936]  kasan_check_range+0x10c/0x1c0
[   14.691958]  __kasan_check_write+0x18/0x20
[   14.691980]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   14.692007]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.692033]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.692067]  ? trace_hardirqs_on+0x37/0xe0
[   14.692092]  ? kasan_bitops_generic+0x93/0x1c0
[   14.692118]  kasan_bitops_generic+0x122/0x1c0
[   14.692141]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.692165]  ? __pfx_read_tsc+0x10/0x10
[   14.692188]  ? ktime_get_ts64+0x86/0x230
[   14.692213]  kunit_try_run_case+0x1a6/0x480
[   14.692236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.692258]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.692280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.692308]  ? __kthread_parkme+0x82/0x160
[   14.692330]  ? preempt_count_sub+0x50/0x80
[   14.692356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.692378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.692403]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.692431]  kthread+0x324/0x6e0
[   14.692453]  ? trace_preempt_on+0x20/0xc0
[   14.692475]  ? __pfx_kthread+0x10/0x10
[   14.692497]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.692520]  ? calculate_sigpending+0x7b/0xa0
[   14.692542]  ? __pfx_kthread+0x10/0x10
[   14.692564]  ret_from_fork+0x41/0x80
[   14.692583]  ? __pfx_kthread+0x10/0x10
[   14.692606]  ret_from_fork_asm+0x1a/0x30
[   14.692637]  </TASK>
[   14.692648] 
[   14.700620] Allocated by task 269:
[   14.700790]  kasan_save_stack+0x45/0x70
[   14.700980]  kasan_save_track+0x18/0x40
[   14.701278]  kasan_save_alloc_info+0x3b/0x50
[   14.701464]  __kasan_kmalloc+0xb7/0xc0
[   14.701627]  __kmalloc_cache_noprof+0x18a/0x420
[   14.701830]  kasan_bitops_generic+0x93/0x1c0
[   14.702050]  kunit_try_run_case+0x1a6/0x480
[   14.702224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.702470]  kthread+0x324/0x6e0
[   14.702639]  ret_from_fork+0x41/0x80
[   14.702796]  ret_from_fork_asm+0x1a/0x30
[   14.702993] 
[   14.703117] The buggy address belongs to the object at ffff888101b28060
[   14.703117]  which belongs to the cache kmalloc-16 of size 16
[   14.703481] The buggy address is located 8 bytes inside of
[   14.703481]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.703829] 
[   14.703921] The buggy address belongs to the physical page:
[   14.704174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.704710] flags: 0x200000000000000(node=0|zone=2)
[   14.704937] page_type: f5(slab)
[   14.705062] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.705299] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.705525] page dumped because: kasan: bad access detected
[   14.705753] 
[   14.705857] Memory state around the buggy address:
[   14.706121]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.706448]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.706768] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.707107]                                                           ^
[   14.707411]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.707735]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.708072] ==================================================================
[   14.747209] ==================================================================
[   14.747471] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   14.747896] Read of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.748219] 
[   14.748329] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.748375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.748388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.748411] Call Trace:
[   14.748436]  <TASK>
[   14.748457]  dump_stack_lvl+0x73/0xb0
[   14.748487]  print_report+0xd1/0x650
[   14.748509]  ? __virt_addr_valid+0x1db/0x2d0
[   14.748536]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   14.748565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.748592]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   14.748618]  kasan_report+0x140/0x180
[   14.748639]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   14.748669]  __asan_report_load8_noabort+0x18/0x20
[   14.748693]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   14.748719]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.748746]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.748769]  ? trace_hardirqs_on+0x37/0xe0
[   14.748792]  ? kasan_bitops_generic+0x93/0x1c0
[   14.748818]  kasan_bitops_generic+0x122/0x1c0
[   14.748852]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.748878]  ? __pfx_read_tsc+0x10/0x10
[   14.748899]  ? ktime_get_ts64+0x86/0x230
[   14.748926]  kunit_try_run_case+0x1a6/0x480
[   14.748951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.748973]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.748995]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.749021]  ? __kthread_parkme+0x82/0x160
[   14.749046]  ? preempt_count_sub+0x50/0x80
[   14.749082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.749105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.749131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.749157]  kthread+0x324/0x6e0
[   14.749179]  ? trace_preempt_on+0x20/0xc0
[   14.749202]  ? __pfx_kthread+0x10/0x10
[   14.749224]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.749247]  ? calculate_sigpending+0x7b/0xa0
[   14.749268]  ? __pfx_kthread+0x10/0x10
[   14.749291]  ret_from_fork+0x41/0x80
[   14.749309]  ? __pfx_kthread+0x10/0x10
[   14.749331]  ret_from_fork_asm+0x1a/0x30
[   14.749362]  </TASK>
[   14.749373] 
[   14.756914] Allocated by task 269:
[   14.757044]  kasan_save_stack+0x45/0x70
[   14.757187]  kasan_save_track+0x18/0x40
[   14.757321]  kasan_save_alloc_info+0x3b/0x50
[   14.757469]  __kasan_kmalloc+0xb7/0xc0
[   14.757783]  __kmalloc_cache_noprof+0x18a/0x420
[   14.758024]  kasan_bitops_generic+0x93/0x1c0
[   14.758243]  kunit_try_run_case+0x1a6/0x480
[   14.758458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.758723]  kthread+0x324/0x6e0
[   14.758907]  ret_from_fork+0x41/0x80
[   14.759139]  ret_from_fork_asm+0x1a/0x30
[   14.759340] 
[   14.759440] The buggy address belongs to the object at ffff888101b28060
[   14.759440]  which belongs to the cache kmalloc-16 of size 16
[   14.759853] The buggy address is located 8 bytes inside of
[   14.759853]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.760360] 
[   14.760456] The buggy address belongs to the physical page:
[   14.760956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.761263] flags: 0x200000000000000(node=0|zone=2)
[   14.761429] page_type: f5(slab)
[   14.761576] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.761941] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.762331] page dumped because: kasan: bad access detected
[   14.762556] 
[   14.762640] Memory state around the buggy address:
[   14.762860]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.763189]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.763407] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.763619]                                                           ^
[   14.763818]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.764269]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.764581] ==================================================================
[   14.708970] ==================================================================
[   14.709693] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   14.710122] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.710349] 
[   14.710434] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.710477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.710489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.710510] Call Trace:
[   14.710531]  <TASK>
[   14.710550]  dump_stack_lvl+0x73/0xb0
[   14.710578]  print_report+0xd1/0x650
[   14.710600]  ? __virt_addr_valid+0x1db/0x2d0
[   14.710623]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   14.710649]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.710674]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   14.710700]  kasan_report+0x140/0x180
[   14.710721]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   14.710751]  kasan_check_range+0x10c/0x1c0
[   14.710774]  __kasan_check_write+0x18/0x20
[   14.710796]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   14.710822]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.710859]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.710884]  ? trace_hardirqs_on+0x37/0xe0
[   14.710906]  ? kasan_bitops_generic+0x93/0x1c0
[   14.710931]  kasan_bitops_generic+0x122/0x1c0
[   14.710954]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.710977]  ? __pfx_read_tsc+0x10/0x10
[   14.710999]  ? ktime_get_ts64+0x86/0x230
[   14.711024]  kunit_try_run_case+0x1a6/0x480
[   14.711047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.711080]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.711102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.711127]  ? __kthread_parkme+0x82/0x160
[   14.711150]  ? preempt_count_sub+0x50/0x80
[   14.711176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.711198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.711226]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.711252]  kthread+0x324/0x6e0
[   14.711273]  ? trace_preempt_on+0x20/0xc0
[   14.711295]  ? __pfx_kthread+0x10/0x10
[   14.711317]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.711341]  ? calculate_sigpending+0x7b/0xa0
[   14.711363]  ? __pfx_kthread+0x10/0x10
[   14.711386]  ret_from_fork+0x41/0x80
[   14.711404]  ? __pfx_kthread+0x10/0x10
[   14.711425]  ret_from_fork_asm+0x1a/0x30
[   14.711457]  </TASK>
[   14.711467] 
[   14.719661] Allocated by task 269:
[   14.719806]  kasan_save_stack+0x45/0x70
[   14.719981]  kasan_save_track+0x18/0x40
[   14.720306]  kasan_save_alloc_info+0x3b/0x50
[   14.720516]  __kasan_kmalloc+0xb7/0xc0
[   14.720697]  __kmalloc_cache_noprof+0x18a/0x420
[   14.720866]  kasan_bitops_generic+0x93/0x1c0
[   14.721015]  kunit_try_run_case+0x1a6/0x480
[   14.721159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.721412]  kthread+0x324/0x6e0
[   14.721655]  ret_from_fork+0x41/0x80
[   14.721848]  ret_from_fork_asm+0x1a/0x30
[   14.722062] 
[   14.722157] The buggy address belongs to the object at ffff888101b28060
[   14.722157]  which belongs to the cache kmalloc-16 of size 16
[   14.722574] The buggy address is located 8 bytes inside of
[   14.722574]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.722932] 
[   14.723005] The buggy address belongs to the physical page:
[   14.723189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.723765] flags: 0x200000000000000(node=0|zone=2)
[   14.724020] page_type: f5(slab)
[   14.724192] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.724535] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.724784] page dumped because: kasan: bad access detected
[   14.724963] 
[   14.725032] Memory state around the buggy address:
[   14.725329]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.725643]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.725976] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.726254]                                                           ^
[   14.726453]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.726668]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.726934] ==================================================================
[   14.645115] ==================================================================
[   14.645468] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.646085] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.646486] 
[   14.646609] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.646661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.646676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.646699] Call Trace:
[   14.646714]  <TASK>
[   14.646735]  dump_stack_lvl+0x73/0xb0
[   14.646765]  print_report+0xd1/0x650
[   14.646788]  ? __virt_addr_valid+0x1db/0x2d0
[   14.646811]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.646851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.646877]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.646903]  kasan_report+0x140/0x180
[   14.646924]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.646955]  kasan_check_range+0x10c/0x1c0
[   14.646977]  __kasan_check_write+0x18/0x20
[   14.646999]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.647026]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.647052]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.647076]  ? trace_hardirqs_on+0x37/0xe0
[   14.647099]  ? kasan_bitops_generic+0x93/0x1c0
[   14.647124]  kasan_bitops_generic+0x122/0x1c0
[   14.647147]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.647170]  ? __pfx_read_tsc+0x10/0x10
[   14.647192]  ? ktime_get_ts64+0x86/0x230
[   14.647217]  kunit_try_run_case+0x1a6/0x480
[   14.647242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.647263]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.647285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.647310]  ? __kthread_parkme+0x82/0x160
[   14.647333]  ? preempt_count_sub+0x50/0x80
[   14.647357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.647381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.647406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.647432]  kthread+0x324/0x6e0
[   14.647454]  ? trace_preempt_on+0x20/0xc0
[   14.647476]  ? __pfx_kthread+0x10/0x10
[   14.647497]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.647520]  ? calculate_sigpending+0x7b/0xa0
[   14.647542]  ? __pfx_kthread+0x10/0x10
[   14.647565]  ret_from_fork+0x41/0x80
[   14.647583]  ? __pfx_kthread+0x10/0x10
[   14.647605]  ret_from_fork_asm+0x1a/0x30
[   14.647637]  </TASK>
[   14.647648] 
[   14.655610] Allocated by task 269:
[   14.655753]  kasan_save_stack+0x45/0x70
[   14.655903]  kasan_save_track+0x18/0x40
[   14.656106]  kasan_save_alloc_info+0x3b/0x50
[   14.656319]  __kasan_kmalloc+0xb7/0xc0
[   14.656498]  __kmalloc_cache_noprof+0x18a/0x420
[   14.656713]  kasan_bitops_generic+0x93/0x1c0
[   14.656902]  kunit_try_run_case+0x1a6/0x480
[   14.657103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.657325]  kthread+0x324/0x6e0
[   14.657559]  ret_from_fork+0x41/0x80
[   14.657750]  ret_from_fork_asm+0x1a/0x30
[   14.657920] 
[   14.658018] The buggy address belongs to the object at ffff888101b28060
[   14.658018]  which belongs to the cache kmalloc-16 of size 16
[   14.658540] The buggy address is located 8 bytes inside of
[   14.658540]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.658933] 
[   14.659031] The buggy address belongs to the physical page:
[   14.659337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.659611] flags: 0x200000000000000(node=0|zone=2)
[   14.659864] page_type: f5(slab)
[   14.660009] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.660231] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.660447] page dumped because: kasan: bad access detected
[   14.660611] 
[   14.660678] Memory state around the buggy address:
[   14.660906]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.661468]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.661780] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.662115]                                                           ^
[   14.662316]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.662523]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.662887] ==================================================================
[   14.600279] ==================================================================
[   14.600688] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.601231] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.601527] 
[   14.601642] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.601688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.601701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.601723] Call Trace:
[   14.601736]  <TASK>
[   14.601761]  dump_stack_lvl+0x73/0xb0
[   14.601791]  print_report+0xd1/0x650
[   14.601813]  ? __virt_addr_valid+0x1db/0x2d0
[   14.601846]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.601874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.601899]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.601926]  kasan_report+0x140/0x180
[   14.601947]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.601978]  kasan_check_range+0x10c/0x1c0
[   14.602001]  __kasan_check_write+0x18/0x20
[   14.602023]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.602060]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.602087]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.602130]  ? trace_hardirqs_on+0x37/0xe0
[   14.602168]  ? kasan_bitops_generic+0x93/0x1c0
[   14.602194]  kasan_bitops_generic+0x122/0x1c0
[   14.602217]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.602240]  ? __pfx_read_tsc+0x10/0x10
[   14.602263]  ? ktime_get_ts64+0x86/0x230
[   14.602288]  kunit_try_run_case+0x1a6/0x480
[   14.602312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.602333]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.602356]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.602381]  ? __kthread_parkme+0x82/0x160
[   14.602404]  ? preempt_count_sub+0x50/0x80
[   14.602429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.602451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.602478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.602503]  kthread+0x324/0x6e0
[   14.602524]  ? trace_preempt_on+0x20/0xc0
[   14.602547]  ? __pfx_kthread+0x10/0x10
[   14.602568]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.602610]  ? calculate_sigpending+0x7b/0xa0
[   14.602632]  ? __pfx_kthread+0x10/0x10
[   14.602667]  ret_from_fork+0x41/0x80
[   14.602685]  ? __pfx_kthread+0x10/0x10
[   14.602707]  ret_from_fork_asm+0x1a/0x30
[   14.602738]  </TASK>
[   14.602750] 
[   14.614599] Allocated by task 269:
[   14.614788]  kasan_save_stack+0x45/0x70
[   14.614980]  kasan_save_track+0x18/0x40
[   14.615183]  kasan_save_alloc_info+0x3b/0x50
[   14.615403]  __kasan_kmalloc+0xb7/0xc0
[   14.615585]  __kmalloc_cache_noprof+0x18a/0x420
[   14.615810]  kasan_bitops_generic+0x93/0x1c0
[   14.616022]  kunit_try_run_case+0x1a6/0x480
[   14.616242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.616445]  kthread+0x324/0x6e0
[   14.616637]  ret_from_fork+0x41/0x80
[   14.616833]  ret_from_fork_asm+0x1a/0x30
[   14.617056] 
[   14.617151] The buggy address belongs to the object at ffff888101b28060
[   14.617151]  which belongs to the cache kmalloc-16 of size 16
[   14.617641] The buggy address is located 8 bytes inside of
[   14.617641]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.618123] 
[   14.618222] The buggy address belongs to the physical page:
[   14.618470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.618711] flags: 0x200000000000000(node=0|zone=2)
[   14.618983] page_type: f5(slab)
[   14.619258] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.619607] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.619904] page dumped because: kasan: bad access detected
[   14.620156] 
[   14.620243] Memory state around the buggy address:
[   14.620491]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.620781]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.621089] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.621370]                                                           ^
[   14.621704]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.622042]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.622329] ==================================================================
[   14.727871] ==================================================================
[   14.728965] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   14.729489] Read of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.729847] 
[   14.729942] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.729988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.730000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.730022] Call Trace:
[   14.730041]  <TASK>
[   14.730063]  dump_stack_lvl+0x73/0xb0
[   14.730089]  print_report+0xd1/0x650
[   14.730111]  ? __virt_addr_valid+0x1db/0x2d0
[   14.730134]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   14.730160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.730185]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   14.730211]  kasan_report+0x140/0x180
[   14.730232]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   14.730263]  kasan_check_range+0x10c/0x1c0
[   14.730285]  __kasan_check_read+0x15/0x20
[   14.730306]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   14.730333]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.730359]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.730382]  ? trace_hardirqs_on+0x37/0xe0
[   14.730417]  ? kasan_bitops_generic+0x93/0x1c0
[   14.730443]  kasan_bitops_generic+0x122/0x1c0
[   14.730465]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.730489]  ? __pfx_read_tsc+0x10/0x10
[   14.730511]  ? ktime_get_ts64+0x86/0x230
[   14.730536]  kunit_try_run_case+0x1a6/0x480
[   14.730561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.730582]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.730604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.730629]  ? __kthread_parkme+0x82/0x160
[   14.730652]  ? preempt_count_sub+0x50/0x80
[   14.730676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.730699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.730726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.730751]  kthread+0x324/0x6e0
[   14.730772]  ? trace_preempt_on+0x20/0xc0
[   14.730794]  ? __pfx_kthread+0x10/0x10
[   14.730816]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.730848]  ? calculate_sigpending+0x7b/0xa0
[   14.730871]  ? __pfx_kthread+0x10/0x10
[   14.730893]  ret_from_fork+0x41/0x80
[   14.730912]  ? __pfx_kthread+0x10/0x10
[   14.730934]  ret_from_fork_asm+0x1a/0x30
[   14.730966]  </TASK>
[   14.730976] 
[   14.738619] Allocated by task 269:
[   14.738817]  kasan_save_stack+0x45/0x70
[   14.739054]  kasan_save_track+0x18/0x40
[   14.739248]  kasan_save_alloc_info+0x3b/0x50
[   14.739459]  __kasan_kmalloc+0xb7/0xc0
[   14.739645]  __kmalloc_cache_noprof+0x18a/0x420
[   14.739881]  kasan_bitops_generic+0x93/0x1c0
[   14.740097]  kunit_try_run_case+0x1a6/0x480
[   14.740275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.740491]  kthread+0x324/0x6e0
[   14.740615]  ret_from_fork+0x41/0x80
[   14.740746]  ret_from_fork_asm+0x1a/0x30
[   14.740897] 
[   14.740994] The buggy address belongs to the object at ffff888101b28060
[   14.740994]  which belongs to the cache kmalloc-16 of size 16
[   14.741978] The buggy address is located 8 bytes inside of
[   14.741978]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.742438] 
[   14.742514] The buggy address belongs to the physical page:
[   14.742707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.743039] flags: 0x200000000000000(node=0|zone=2)
[   14.743264] page_type: f5(slab)
[   14.743425] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.743783] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.744143] page dumped because: kasan: bad access detected
[   14.744369] 
[   14.744454] Memory state around the buggy address:
[   14.744634]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.744923]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.745246] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.745532]                                                           ^
[   14.745785]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.746119]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.746398] ==================================================================
[   14.579355] ==================================================================
[   14.579726] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.580616] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269
[   14.580918] 
[   14.581016] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.581061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.581074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.581096] Call Trace:
[   14.581117]  <TASK>
[   14.581138]  dump_stack_lvl+0x73/0xb0
[   14.581168]  print_report+0xd1/0x650
[   14.581191]  ? __virt_addr_valid+0x1db/0x2d0
[   14.581214]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.581240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.581295]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.581323]  kasan_report+0x140/0x180
[   14.581344]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.581394]  kasan_check_range+0x10c/0x1c0
[   14.581417]  __kasan_check_write+0x18/0x20
[   14.581440]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.581466]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.581510]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.581534]  ? trace_hardirqs_on+0x37/0xe0
[   14.581557]  ? kasan_bitops_generic+0x93/0x1c0
[   14.581583]  kasan_bitops_generic+0x122/0x1c0
[   14.581606]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.581629]  ? __pfx_read_tsc+0x10/0x10
[   14.581668]  ? ktime_get_ts64+0x86/0x230
[   14.581694]  kunit_try_run_case+0x1a6/0x480
[   14.581719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.581746]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.581770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.581796]  ? __kthread_parkme+0x82/0x160
[   14.581819]  ? preempt_count_sub+0x50/0x80
[   14.581853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.581876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.581902]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.581927]  kthread+0x324/0x6e0
[   14.581949]  ? trace_preempt_on+0x20/0xc0
[   14.581971]  ? __pfx_kthread+0x10/0x10
[   14.581993]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.582016]  ? calculate_sigpending+0x7b/0xa0
[   14.582039]  ? __pfx_kthread+0x10/0x10
[   14.582081]  ret_from_fork+0x41/0x80
[   14.582118]  ? __pfx_kthread+0x10/0x10
[   14.582140]  ret_from_fork_asm+0x1a/0x30
[   14.582173]  </TASK>
[   14.582184] 
[   14.590499] Allocated by task 269:
[   14.590708]  kasan_save_stack+0x45/0x70
[   14.590971]  kasan_save_track+0x18/0x40
[   14.591303]  kasan_save_alloc_info+0x3b/0x50
[   14.591542]  __kasan_kmalloc+0xb7/0xc0
[   14.591726]  __kmalloc_cache_noprof+0x18a/0x420
[   14.591956]  kasan_bitops_generic+0x93/0x1c0
[   14.592248]  kunit_try_run_case+0x1a6/0x480
[   14.592458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.592719]  kthread+0x324/0x6e0
[   14.592855]  ret_from_fork+0x41/0x80
[   14.593063]  ret_from_fork_asm+0x1a/0x30
[   14.593273] 
[   14.593363] The buggy address belongs to the object at ffff888101b28060
[   14.593363]  which belongs to the cache kmalloc-16 of size 16
[   14.593893] The buggy address is located 8 bytes inside of
[   14.593893]  allocated 9-byte region [ffff888101b28060, ffff888101b28069)
[   14.594410] 
[   14.594527] The buggy address belongs to the physical page:
[   14.594730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28
[   14.595056] flags: 0x200000000000000(node=0|zone=2)
[   14.595293] page_type: f5(slab)
[   14.595463] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.595832] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.596247] page dumped because: kasan: bad access detected
[   14.596419] 
[   14.596488] Memory state around the buggy address:
[   14.596691]  ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.597058]  ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.597401] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.597673]                                                           ^
[   14.597984]  ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.598432]  ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.598700] ==================================================================