Hay
Date
June 2, 2025, 2:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.951064] ==================================================================
[   20.951483] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   20.951787] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   20.952111] 
[   20.952372] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   20.952486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.952524] Hardware name: linux,dummy-virt (DT)
[   20.952593] Call trace:
[   20.952625]  show_stack+0x20/0x38 (C)
[   20.952688]  dump_stack_lvl+0x8c/0xd0
[   20.952746]  print_report+0x118/0x608
[   20.952801]  kasan_report+0xdc/0x128
[   20.952856]  __asan_report_load8_noabort+0x20/0x30
[   20.952911]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   20.952997]  kasan_bitops_generic+0x110/0x1c8
[   20.953059]  kunit_try_run_case+0x170/0x3f0
[   20.953116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.953186]  kthread+0x318/0x620
[   20.953258]  ret_from_fork+0x10/0x20
[   20.953331] 
[   20.957566] Allocated by task 251:
[   20.957821]  kasan_save_stack+0x3c/0x68
[   20.958487]  kasan_save_track+0x20/0x40
[   20.958940]  kasan_save_alloc_info+0x40/0x58
[   20.959371]  __kasan_kmalloc+0xd4/0xd8
[   20.959855]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.960238]  kasan_bitops_generic+0xa0/0x1c8
[   20.960580]  kunit_try_run_case+0x170/0x3f0
[   20.960944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.961389]  kthread+0x318/0x620
[   20.961724]  ret_from_fork+0x10/0x20
[   20.961958] 
[   20.962591] The buggy address belongs to the object at fff00000c3e60680
[   20.962591]  which belongs to the cache kmalloc-16 of size 16
[   20.963273] The buggy address is located 8 bytes inside of
[   20.963273]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   20.963804] 
[   20.963945] The buggy address belongs to the physical page:
[   20.964207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   20.964619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.964967] page_type: f5(slab)
[   20.966042] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.966480] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.967539] page dumped because: kasan: bad access detected
[   20.968038] 
[   20.968268] Memory state around the buggy address:
[   20.968574]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.969059]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.969566] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.970208]                       ^
[   20.970442]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.970740]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.971125] ==================================================================
[   20.972689] ==================================================================
[   20.973050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   20.973635] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   20.974080] 
[   20.974249] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   20.974353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.974388] Hardware name: linux,dummy-virt (DT)
[   20.974433] Call trace:
[   20.974462]  show_stack+0x20/0x38 (C)
[   20.974531]  dump_stack_lvl+0x8c/0xd0
[   20.974589]  print_report+0x118/0x608
[   20.974646]  kasan_report+0xdc/0x128
[   20.974699]  kasan_check_range+0x100/0x1a8
[   20.974749]  __kasan_check_write+0x20/0x30
[   20.974802]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   20.974861]  kasan_bitops_generic+0x110/0x1c8
[   20.974966]  kunit_try_run_case+0x170/0x3f0
[   20.975031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.975091]  kthread+0x318/0x620
[   20.975143]  ret_from_fork+0x10/0x20
[   20.975219] 
[   20.979361] Allocated by task 251:
[   20.979687]  kasan_save_stack+0x3c/0x68
[   20.980015]  kasan_save_track+0x20/0x40
[   20.980369]  kasan_save_alloc_info+0x40/0x58
[   20.980563]  __kasan_kmalloc+0xd4/0xd8
[   20.980825]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.981130]  kasan_bitops_generic+0xa0/0x1c8
[   20.981412]  kunit_try_run_case+0x170/0x3f0
[   20.981690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.982030]  kthread+0x318/0x620
[   20.982544]  ret_from_fork+0x10/0x20
[   20.982791] 
[   20.982971] The buggy address belongs to the object at fff00000c3e60680
[   20.982971]  which belongs to the cache kmalloc-16 of size 16
[   20.983521] The buggy address is located 8 bytes inside of
[   20.983521]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   20.984173] 
[   20.984363] The buggy address belongs to the physical page:
[   20.984666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   20.985062] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.985526] page_type: f5(slab)
[   20.985724] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.986145] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.986390] page dumped because: kasan: bad access detected
[   20.987196] 
[   20.987443] Memory state around the buggy address:
[   20.988084]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.988823]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.989071] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.989302]                       ^
[   20.989461]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.989695]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.989913] ==================================================================
[   21.101943] ==================================================================
[   21.102528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   21.103128] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.103379] 
[   21.103518] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.103621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.103654] Hardware name: linux,dummy-virt (DT)
[   21.103695] Call trace:
[   21.103724]  show_stack+0x20/0x38 (C)
[   21.103786]  dump_stack_lvl+0x8c/0xd0
[   21.103843]  print_report+0x118/0x608
[   21.103899]  kasan_report+0xdc/0x128
[   21.103950]  kasan_check_range+0x100/0x1a8
[   21.104003]  __kasan_check_write+0x20/0x30
[   21.104056]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   21.104112]  kasan_bitops_generic+0x110/0x1c8
[   21.104184]  kunit_try_run_case+0x170/0x3f0
[   21.104242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.104301]  kthread+0x318/0x620
[   21.104354]  ret_from_fork+0x10/0x20
[   21.104409] 
[   21.109637] Allocated by task 251:
[   21.109926]  kasan_save_stack+0x3c/0x68
[   21.110672]  kasan_save_track+0x20/0x40
[   21.110943]  kasan_save_alloc_info+0x40/0x58
[   21.111490]  __kasan_kmalloc+0xd4/0xd8
[   21.111698]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.112130]  kasan_bitops_generic+0xa0/0x1c8
[   21.112504]  kunit_try_run_case+0x170/0x3f0
[   21.112834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.113230]  kthread+0x318/0x620
[   21.113460]  ret_from_fork+0x10/0x20
[   21.113708] 
[   21.113850] The buggy address belongs to the object at fff00000c3e60680
[   21.113850]  which belongs to the cache kmalloc-16 of size 16
[   21.114810] The buggy address is located 8 bytes inside of
[   21.114810]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.115449] 
[   21.115712] The buggy address belongs to the physical page:
[   21.116095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.116556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.116875] page_type: f5(slab)
[   21.117096] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.117518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.118020] page dumped because: kasan: bad access detected
[   21.118324] 
[   21.119480] Memory state around the buggy address:
[   21.119744]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.120021]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.120311] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.120569]                       ^
[   21.120752]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.121026]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.121926] ==================================================================
[   20.991578] ==================================================================
[   20.991853] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   20.992110] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   20.994328] 
[   20.994844] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   20.994969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.995006] Hardware name: linux,dummy-virt (DT)
[   20.995048] Call trace:
[   20.995077]  show_stack+0x20/0x38 (C)
[   20.995146]  dump_stack_lvl+0x8c/0xd0
[   20.995223]  print_report+0x118/0x608
[   20.995283]  kasan_report+0xdc/0x128
[   20.995644]  __asan_report_load8_noabort+0x20/0x30
[   20.995718]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   20.995778]  kasan_bitops_generic+0x110/0x1c8
[   20.995831]  kunit_try_run_case+0x170/0x3f0
[   20.995884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.995942]  kthread+0x318/0x620
[   20.995992]  ret_from_fork+0x10/0x20
[   20.996046] 
[   21.000065] Allocated by task 251:
[   21.000445]  kasan_save_stack+0x3c/0x68
[   21.000688]  kasan_save_track+0x20/0x40
[   21.001013]  kasan_save_alloc_info+0x40/0x58
[   21.001318]  __kasan_kmalloc+0xd4/0xd8
[   21.001557]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.001824]  kasan_bitops_generic+0xa0/0x1c8
[   21.002082]  kunit_try_run_case+0x170/0x3f0
[   21.002327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.002628]  kthread+0x318/0x620
[   21.002844]  ret_from_fork+0x10/0x20
[   21.003090] 
[   21.004504] The buggy address belongs to the object at fff00000c3e60680
[   21.004504]  which belongs to the cache kmalloc-16 of size 16
[   21.005383] The buggy address is located 8 bytes inside of
[   21.005383]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.006330] 
[   21.006548] The buggy address belongs to the physical page:
[   21.007092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.007539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.008010] page_type: f5(slab)
[   21.008312] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.008827] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.009355] page dumped because: kasan: bad access detected
[   21.009834] 
[   21.009971] Memory state around the buggy address:
[   21.010988]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.011651]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.012254] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.012721]                       ^
[   21.012956]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.013570]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.014052] ==================================================================
[   21.123393] ==================================================================
[   21.123775] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   21.124226] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.124637] 
[   21.124838] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.124944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.124978] Hardware name: linux,dummy-virt (DT)
[   21.125020] Call trace:
[   21.125049]  show_stack+0x20/0x38 (C)
[   21.125113]  dump_stack_lvl+0x8c/0xd0
[   21.125185]  print_report+0x118/0x608
[   21.125245]  kasan_report+0xdc/0x128
[   21.125302]  __asan_report_load8_noabort+0x20/0x30
[   21.125359]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   21.125421]  kasan_bitops_generic+0x110/0x1c8
[   21.125479]  kunit_try_run_case+0x170/0x3f0
[   21.125550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.125615]  kthread+0x318/0x620
[   21.125670]  ret_from_fork+0x10/0x20
[   21.125730] 
[   21.129216] Allocated by task 251:
[   21.129553]  kasan_save_stack+0x3c/0x68
[   21.129931]  kasan_save_track+0x20/0x40
[   21.130128]  kasan_save_alloc_info+0x40/0x58
[   21.130960]  __kasan_kmalloc+0xd4/0xd8
[   21.131135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.131388]  kasan_bitops_generic+0xa0/0x1c8
[   21.131759]  kunit_try_run_case+0x170/0x3f0
[   21.132023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.132303]  kthread+0x318/0x620
[   21.132540]  ret_from_fork+0x10/0x20
[   21.132772] 
[   21.132927] The buggy address belongs to the object at fff00000c3e60680
[   21.132927]  which belongs to the cache kmalloc-16 of size 16
[   21.134785] The buggy address is located 8 bytes inside of
[   21.134785]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.135166] 
[   21.135337] The buggy address belongs to the physical page:
[   21.135732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.136075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.136537] page_type: f5(slab)
[   21.136759] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.137130] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.137480] page dumped because: kasan: bad access detected
[   21.137787] 
[   21.137960] Memory state around the buggy address:
[   21.138538]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.138919]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.139241] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.139549]                       ^
[   21.139763]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.140070]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.140933] ==================================================================
[   21.015553] ==================================================================
[   21.015896] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   21.016331] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.016638] 
[   21.016830] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.016928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.016963] Hardware name: linux,dummy-virt (DT)
[   21.017003] Call trace:
[   21.017031]  show_stack+0x20/0x38 (C)
[   21.017092]  dump_stack_lvl+0x8c/0xd0
[   21.017150]  print_report+0x118/0x608
[   21.017336]  kasan_report+0xdc/0x128
[   21.017399]  kasan_check_range+0x100/0x1a8
[   21.017455]  __kasan_check_write+0x20/0x30
[   21.017526]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   21.017594]  kasan_bitops_generic+0x110/0x1c8
[   21.017653]  kunit_try_run_case+0x170/0x3f0
[   21.017712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.017774]  kthread+0x318/0x620
[   21.017835]  ret_from_fork+0x10/0x20
[   21.017894] 
[   21.022404] Allocated by task 251:
[   21.023033]  kasan_save_stack+0x3c/0x68
[   21.023398]  kasan_save_track+0x20/0x40
[   21.023726]  kasan_save_alloc_info+0x40/0x58
[   21.024115]  __kasan_kmalloc+0xd4/0xd8
[   21.024474]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.024866]  kasan_bitops_generic+0xa0/0x1c8
[   21.025254]  kunit_try_run_case+0x170/0x3f0
[   21.025640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.026089]  kthread+0x318/0x620
[   21.026329]  ret_from_fork+0x10/0x20
[   21.027210] 
[   21.027354] The buggy address belongs to the object at fff00000c3e60680
[   21.027354]  which belongs to the cache kmalloc-16 of size 16
[   21.028065] The buggy address is located 8 bytes inside of
[   21.028065]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.028694] 
[   21.028886] The buggy address belongs to the physical page:
[   21.029179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.029776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.030402] page_type: f5(slab)
[   21.030597] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.031246] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.031790] page dumped because: kasan: bad access detected
[   21.032052] 
[   21.032407] Memory state around the buggy address:
[   21.032774]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.033291]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.033591] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.034044]                       ^
[   21.035125]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.035643]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.036117] ==================================================================
[   21.060814] ==================================================================
[   21.061416] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   21.061883] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.062946] 
[   21.063289] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.063400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.063436] Hardware name: linux,dummy-virt (DT)
[   21.063477] Call trace:
[   21.063508]  show_stack+0x20/0x38 (C)
[   21.063576]  dump_stack_lvl+0x8c/0xd0
[   21.063635]  print_report+0x118/0x608
[   21.063712]  kasan_report+0xdc/0x128
[   21.063878]  __asan_report_load8_noabort+0x20/0x30
[   21.063938]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   21.063999]  kasan_bitops_generic+0x110/0x1c8
[   21.064056]  kunit_try_run_case+0x170/0x3f0
[   21.064113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.064195]  kthread+0x318/0x620
[   21.064253]  ret_from_fork+0x10/0x20
[   21.064313] 
[   21.068359] Allocated by task 251:
[   21.068643]  kasan_save_stack+0x3c/0x68
[   21.069074]  kasan_save_track+0x20/0x40
[   21.069452]  kasan_save_alloc_info+0x40/0x58
[   21.069655]  __kasan_kmalloc+0xd4/0xd8
[   21.069828]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.070017]  kasan_bitops_generic+0xa0/0x1c8
[   21.070667]  kunit_try_run_case+0x170/0x3f0
[   21.070876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.071080]  kthread+0x318/0x620
[   21.071251]  ret_from_fork+0x10/0x20
[   21.071525] 
[   21.071693] The buggy address belongs to the object at fff00000c3e60680
[   21.071693]  which belongs to the cache kmalloc-16 of size 16
[   21.072271] The buggy address is located 8 bytes inside of
[   21.072271]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.072978] 
[   21.073102] The buggy address belongs to the physical page:
[   21.073417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.073891] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.074538] page_type: f5(slab)
[   21.074918] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.075570] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.075834] page dumped because: kasan: bad access detected
[   21.076009] 
[   21.076113] Memory state around the buggy address:
[   21.076311]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.076544]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.076761] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.076968]                       ^
[   21.077119]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.077537]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.078717] ==================================================================
[   20.931563] ==================================================================
[   20.932128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   20.932771] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   20.933309] 
[   20.933456] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   20.933579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.933887] Hardware name: linux,dummy-virt (DT)
[   20.933938] Call trace:
[   20.933973]  show_stack+0x20/0x38 (C)
[   20.934040]  dump_stack_lvl+0x8c/0xd0
[   20.934232]  print_report+0x118/0x608
[   20.934335]  kasan_report+0xdc/0x128
[   20.934391]  kasan_check_range+0x100/0x1a8
[   20.934463]  __kasan_check_write+0x20/0x30
[   20.934567]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   20.934630]  kasan_bitops_generic+0x110/0x1c8
[   20.934686]  kunit_try_run_case+0x170/0x3f0
[   20.934743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.934802]  kthread+0x318/0x620
[   20.934855]  ret_from_fork+0x10/0x20
[   20.934914] 
[   20.939960] Allocated by task 251:
[   20.940189]  kasan_save_stack+0x3c/0x68
[   20.940475]  kasan_save_track+0x20/0x40
[   20.940918]  kasan_save_alloc_info+0x40/0x58
[   20.941344]  __kasan_kmalloc+0xd4/0xd8
[   20.941590]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.941905]  kasan_bitops_generic+0xa0/0x1c8
[   20.942502]  kunit_try_run_case+0x170/0x3f0
[   20.942731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.942931]  kthread+0x318/0x620
[   20.943089]  ret_from_fork+0x10/0x20
[   20.943340] 
[   20.943529] The buggy address belongs to the object at fff00000c3e60680
[   20.943529]  which belongs to the cache kmalloc-16 of size 16
[   20.943881] The buggy address is located 8 bytes inside of
[   20.943881]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   20.944594] 
[   20.944793] The buggy address belongs to the physical page:
[   20.945122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   20.945612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.945979] page_type: f5(slab)
[   20.946269] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.946653] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.947193] page dumped because: kasan: bad access detected
[   20.947454] 
[   20.947641] Memory state around the buggy address:
[   20.947867]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.948295]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.948640] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.949075]                       ^
[   20.949337]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.949690]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.950207] ==================================================================
[   21.037221] ==================================================================
[   21.037874] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   21.038634] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.039197] 
[   21.039643] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.039756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.039790] Hardware name: linux,dummy-virt (DT)
[   21.039931] Call trace:
[   21.039964]  show_stack+0x20/0x38 (C)
[   21.040034]  dump_stack_lvl+0x8c/0xd0
[   21.040092]  print_report+0x118/0x608
[   21.040149]  kasan_report+0xdc/0x128
[   21.040227]  kasan_check_range+0x100/0x1a8
[   21.040282]  __kasan_check_write+0x20/0x30
[   21.040335]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   21.040394]  kasan_bitops_generic+0x110/0x1c8
[   21.040451]  kunit_try_run_case+0x170/0x3f0
[   21.040507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.040568]  kthread+0x318/0x620
[   21.040622]  ret_from_fork+0x10/0x20
[   21.040681] 
[   21.045887] Allocated by task 251:
[   21.046449]  kasan_save_stack+0x3c/0x68
[   21.047081]  kasan_save_track+0x20/0x40
[   21.047372]  kasan_save_alloc_info+0x40/0x58
[   21.047774]  __kasan_kmalloc+0xd4/0xd8
[   21.048094]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.048349]  kasan_bitops_generic+0xa0/0x1c8
[   21.048723]  kunit_try_run_case+0x170/0x3f0
[   21.049039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.049369]  kthread+0x318/0x620
[   21.049751]  ret_from_fork+0x10/0x20
[   21.050187] 
[   21.050348] The buggy address belongs to the object at fff00000c3e60680
[   21.050348]  which belongs to the cache kmalloc-16 of size 16
[   21.051654] The buggy address is located 8 bytes inside of
[   21.051654]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.052336] 
[   21.052573] The buggy address belongs to the physical page:
[   21.052866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.053434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.053980] page_type: f5(slab)
[   21.054500] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.055016] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.055587] page dumped because: kasan: bad access detected
[   21.056039] 
[   21.056163] Memory state around the buggy address:
[   21.056565]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.057068]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.057448] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.057980]                       ^
[   21.058426]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.059567]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.059958] ==================================================================
[   21.079779] ==================================================================
[   21.080047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   21.080314] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.080540] 
[   21.080660] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.080755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.080789] Hardware name: linux,dummy-virt (DT)
[   21.080830] Call trace:
[   21.080858]  show_stack+0x20/0x38 (C)
[   21.080917]  dump_stack_lvl+0x8c/0xd0
[   21.080974]  print_report+0x118/0x608
[   21.081028]  kasan_report+0xdc/0x128
[   21.081081]  kasan_check_range+0x100/0x1a8
[   21.081133]  __kasan_check_write+0x20/0x30
[   21.081216]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   21.081274]  kasan_bitops_generic+0x110/0x1c8
[   21.081329]  kunit_try_run_case+0x170/0x3f0
[   21.081385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.081446]  kthread+0x318/0x620
[   21.081848]  ret_from_fork+0x10/0x20
[   21.081923] 
[   21.088473] Allocated by task 251:
[   21.088696]  kasan_save_stack+0x3c/0x68
[   21.088924]  kasan_save_track+0x20/0x40
[   21.089128]  kasan_save_alloc_info+0x40/0x58
[   21.089394]  __kasan_kmalloc+0xd4/0xd8
[   21.089646]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.089905]  kasan_bitops_generic+0xa0/0x1c8
[   21.091281]  kunit_try_run_case+0x170/0x3f0
[   21.091501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.091960]  kthread+0x318/0x620
[   21.092274]  ret_from_fork+0x10/0x20
[   21.092870] 
[   21.093107] The buggy address belongs to the object at fff00000c3e60680
[   21.093107]  which belongs to the cache kmalloc-16 of size 16
[   21.093815] The buggy address is located 8 bytes inside of
[   21.093815]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.095001] 
[   21.095186] The buggy address belongs to the physical page:
[   21.095373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.095698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.095966] page_type: f5(slab)
[   21.096197] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.096553] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.097041] page dumped because: kasan: bad access detected
[   21.097423] 
[   21.097609] Memory state around the buggy address:
[   21.097944]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.098819]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.099282] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.099526]                       ^
[   21.099920]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.100272]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.100541] ==================================================================

[   14.726043] ==================================================================
[   14.726312] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.726770] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   14.727073] 
[   14.727179] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.727217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.727229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.727250] Call Trace:
[   14.727263]  <TASK>
[   14.727276]  dump_stack_lvl+0x73/0xb0
[   14.727301]  print_report+0xd1/0x650
[   14.727322]  ? __virt_addr_valid+0x1db/0x2d0
[   14.727342]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.727366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.727391]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.727415]  kasan_report+0x140/0x180
[   14.727436]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.727465]  kasan_check_range+0x10c/0x1c0
[   14.727487]  __kasan_check_write+0x18/0x20
[   14.727509]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.727536]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.727561]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.727584]  ? trace_hardirqs_on+0x37/0xe0
[   14.727606]  ? kasan_bitops_generic+0x93/0x1c0
[   14.727631]  kasan_bitops_generic+0x117/0x1c0
[   14.727654]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.727675]  ? trace_hardirqs_on+0x37/0xe0
[   14.727697]  ? __pfx_read_tsc+0x10/0x10
[   14.727718]  ? ktime_get_ts64+0x86/0x230
[   14.727740]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.727765]  kunit_try_run_case+0x1a6/0x480
[   14.727788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.727811]  ? queued_spin_lock_slowpath+0x117/0xb40
[   14.727835]  ? __kthread_parkme+0x82/0x160
[   14.727856]  ? preempt_count_sub+0x50/0x80
[   14.727880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.727903]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.727928]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.727954]  kthread+0x324/0x6e0
[   14.727975]  ? trace_preempt_on+0x20/0xc0
[   14.727997]  ? __pfx_kthread+0x10/0x10
[   14.728029]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.728051]  ? calculate_sigpending+0x7b/0xa0
[   14.728071]  ? __pfx_kthread+0x10/0x10
[   14.728093]  ret_from_fork+0x41/0x80
[   14.728111]  ? __pfx_kthread+0x10/0x10
[   14.728133]  ret_from_fork_asm+0x1a/0x30
[   14.728163]  </TASK>
[   14.728173] 
[   14.736730] Allocated by task 269:
[   14.736861]  kasan_save_stack+0x45/0x70
[   14.737003]  kasan_save_track+0x18/0x40
[   14.737209]  kasan_save_alloc_info+0x3b/0x50
[   14.737426]  __kasan_kmalloc+0xb7/0xc0
[   14.737797]  __kmalloc_cache_noprof+0x18a/0x420
[   14.738009]  kasan_bitops_generic+0x93/0x1c0
[   14.738182]  kunit_try_run_case+0x1a6/0x480
[   14.738394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.738718]  kthread+0x324/0x6e0
[   14.738880]  ret_from_fork+0x41/0x80
[   14.739044]  ret_from_fork_asm+0x1a/0x30
[   14.739219] 
[   14.739311] The buggy address belongs to the object at ffff888101b5abe0
[   14.739311]  which belongs to the cache kmalloc-16 of size 16
[   14.739848] The buggy address is located 8 bytes inside of
[   14.739848]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   14.740209] 
[   14.740281] The buggy address belongs to the physical page:
[   14.740460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   14.740804] flags: 0x200000000000000(node=0|zone=2)
[   14.741041] page_type: f5(slab)
[   14.741327] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.741945] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.742194] page dumped because: kasan: bad access detected
[   14.742365] 
[   14.742434] Memory state around the buggy address:
[   14.742586]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.742887]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.743214] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.743534]                                                           ^
[   14.743836]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.744176]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.744535] ==================================================================
[   14.745059] ==================================================================
[   14.745355] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.745868] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   14.746112] 
[   14.746192] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.746228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.746240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.746260] Call Trace:
[   14.746272]  <TASK>
[   14.746286]  dump_stack_lvl+0x73/0xb0
[   14.746310]  print_report+0xd1/0x650
[   14.746332]  ? __virt_addr_valid+0x1db/0x2d0
[   14.746353]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.746377]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.746403]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.746430]  kasan_report+0x140/0x180
[   14.746450]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.746478]  kasan_check_range+0x10c/0x1c0
[   14.746501]  __kasan_check_write+0x18/0x20
[   14.746523]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.746548]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.746574]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.746596]  ? trace_hardirqs_on+0x37/0xe0
[   14.746618]  ? kasan_bitops_generic+0x93/0x1c0
[   14.746645]  kasan_bitops_generic+0x117/0x1c0
[   14.746667]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.746689]  ? trace_hardirqs_on+0x37/0xe0
[   14.746709]  ? __pfx_read_tsc+0x10/0x10
[   14.746730]  ? ktime_get_ts64+0x86/0x230
[   14.746751]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.746777]  kunit_try_run_case+0x1a6/0x480
[   14.746799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.746822]  ? queued_spin_lock_slowpath+0x117/0xb40
[   14.746847]  ? __kthread_parkme+0x82/0x160
[   14.746867]  ? preempt_count_sub+0x50/0x80
[   14.746892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.746914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.746940]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.746965]  kthread+0x324/0x6e0
[   14.746986]  ? trace_preempt_on+0x20/0xc0
[   14.747007]  ? __pfx_kthread+0x10/0x10
[   14.747039]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.747061]  ? calculate_sigpending+0x7b/0xa0
[   14.747082]  ? __pfx_kthread+0x10/0x10
[   14.747104]  ret_from_fork+0x41/0x80
[   14.747121]  ? __pfx_kthread+0x10/0x10
[   14.747143]  ret_from_fork_asm+0x1a/0x30
[   14.747173]  </TASK>
[   14.747183] 
[   14.755923] Allocated by task 269:
[   14.756104]  kasan_save_stack+0x45/0x70
[   14.756257]  kasan_save_track+0x18/0x40
[   14.756390]  kasan_save_alloc_info+0x3b/0x50
[   14.756536]  __kasan_kmalloc+0xb7/0xc0
[   14.756665]  __kmalloc_cache_noprof+0x18a/0x420
[   14.756883]  kasan_bitops_generic+0x93/0x1c0
[   14.757270]  kunit_try_run_case+0x1a6/0x480
[   14.757488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.757939]  kthread+0x324/0x6e0
[   14.758086]  ret_from_fork+0x41/0x80
[   14.758216]  ret_from_fork_asm+0x1a/0x30
[   14.758389] 
[   14.758484] The buggy address belongs to the object at ffff888101b5abe0
[   14.758484]  which belongs to the cache kmalloc-16 of size 16
[   14.759409] The buggy address is located 8 bytes inside of
[   14.759409]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   14.759938] 
[   14.760057] The buggy address belongs to the physical page:
[   14.760281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   14.760753] flags: 0x200000000000000(node=0|zone=2)
[   14.761000] page_type: f5(slab)
[   14.761143] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.761454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.762058] page dumped because: kasan: bad access detected
[   14.762278] 
[   14.762377] Memory state around the buggy address:
[   14.762560]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.762861]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.763101] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.763357]                                                           ^
[   14.763659]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.764068]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.764282] ==================================================================
[   14.819405] ==================================================================
[   14.820113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.820747] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   14.821389] 
[   14.821644] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.821683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.821694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.821714] Call Trace:
[   14.821728]  <TASK>
[   14.821749]  dump_stack_lvl+0x73/0xb0
[   14.821774]  print_report+0xd1/0x650
[   14.821794]  ? __virt_addr_valid+0x1db/0x2d0
[   14.821816]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.821840]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.821865]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.821901]  kasan_report+0x140/0x180
[   14.821923]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.821952]  kasan_check_range+0x10c/0x1c0
[   14.821986]  __kasan_check_write+0x18/0x20
[   14.822008]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.822043]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.822068]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.822092]  ? trace_hardirqs_on+0x37/0xe0
[   14.822114]  ? kasan_bitops_generic+0x93/0x1c0
[   14.822139]  kasan_bitops_generic+0x117/0x1c0
[   14.822162]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.822183]  ? trace_hardirqs_on+0x37/0xe0
[   14.822204]  ? __pfx_read_tsc+0x10/0x10
[   14.822226]  ? ktime_get_ts64+0x86/0x230
[   14.822247]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.822273]  kunit_try_run_case+0x1a6/0x480
[   14.822296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.822318]  ? queued_spin_lock_slowpath+0x117/0xb40
[   14.822342]  ? __kthread_parkme+0x82/0x160
[   14.822365]  ? preempt_count_sub+0x50/0x80
[   14.822388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.822411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.822436]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.822462]  kthread+0x324/0x6e0
[   14.822482]  ? trace_preempt_on+0x20/0xc0
[   14.822503]  ? __pfx_kthread+0x10/0x10
[   14.822526]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.822554]  ? calculate_sigpending+0x7b/0xa0
[   14.822576]  ? __pfx_kthread+0x10/0x10
[   14.822598]  ret_from_fork+0x41/0x80
[   14.822616]  ? __pfx_kthread+0x10/0x10
[   14.822638]  ret_from_fork_asm+0x1a/0x30
[   14.822669]  </TASK>
[   14.822678] 
[   14.836799] Allocated by task 269:
[   14.836934]  kasan_save_stack+0x45/0x70
[   14.837281]  kasan_save_track+0x18/0x40
[   14.837649]  kasan_save_alloc_info+0x3b/0x50
[   14.838207]  __kasan_kmalloc+0xb7/0xc0
[   14.838586]  __kmalloc_cache_noprof+0x18a/0x420
[   14.839117]  kasan_bitops_generic+0x93/0x1c0
[   14.839570]  kunit_try_run_case+0x1a6/0x480
[   14.840075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.840663]  kthread+0x324/0x6e0
[   14.840995]  ret_from_fork+0x41/0x80
[   14.841361]  ret_from_fork_asm+0x1a/0x30
[   14.841818] 
[   14.841999] The buggy address belongs to the object at ffff888101b5abe0
[   14.841999]  which belongs to the cache kmalloc-16 of size 16
[   14.843184] The buggy address is located 8 bytes inside of
[   14.843184]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   14.844376] 
[   14.844574] The buggy address belongs to the physical page:
[   14.845040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   14.845279] flags: 0x200000000000000(node=0|zone=2)
[   14.845440] page_type: f5(slab)
[   14.845589] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.846345] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.847134] page dumped because: kasan: bad access detected
[   14.847686] 
[   14.847847] Memory state around the buggy address:
[   14.848314]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.849037]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.849761] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.849972]                                                           ^
[   14.850181]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.850397]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.850781] ==================================================================
[   14.764629] ==================================================================
[   14.764961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.765979] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   14.766325] 
[   14.766414] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.766452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.766464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.766485] Call Trace:
[   14.766503]  <TASK>
[   14.766517]  dump_stack_lvl+0x73/0xb0
[   14.766543]  print_report+0xd1/0x650
[   14.766563]  ? __virt_addr_valid+0x1db/0x2d0
[   14.766650]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.766675]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.766700]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.766726]  kasan_report+0x140/0x180
[   14.766747]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.766777]  kasan_check_range+0x10c/0x1c0
[   14.766799]  __kasan_check_write+0x18/0x20
[   14.766820]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.766845]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.766869]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.766893]  ? trace_hardirqs_on+0x37/0xe0
[   14.766914]  ? kasan_bitops_generic+0x93/0x1c0
[   14.766940]  kasan_bitops_generic+0x117/0x1c0
[   14.766962]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.766983]  ? trace_hardirqs_on+0x37/0xe0
[   14.767005]  ? __pfx_read_tsc+0x10/0x10
[   14.767036]  ? ktime_get_ts64+0x86/0x230
[   14.767058]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.767084]  kunit_try_run_case+0x1a6/0x480
[   14.767107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.767129]  ? queued_spin_lock_slowpath+0x117/0xb40
[   14.767153]  ? __kthread_parkme+0x82/0x160
[   14.767174]  ? preempt_count_sub+0x50/0x80
[   14.767197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.767220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.767244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.767270]  kthread+0x324/0x6e0
[   14.767291]  ? trace_preempt_on+0x20/0xc0
[   14.767312]  ? __pfx_kthread+0x10/0x10
[   14.767373]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.767395]  ? calculate_sigpending+0x7b/0xa0
[   14.767416]  ? __pfx_kthread+0x10/0x10
[   14.767439]  ret_from_fork+0x41/0x80
[   14.767457]  ? __pfx_kthread+0x10/0x10
[   14.767478]  ret_from_fork_asm+0x1a/0x30
[   14.767509]  </TASK>
[   14.767519] 
[   14.775576] Allocated by task 269:
[   14.775753]  kasan_save_stack+0x45/0x70
[   14.775952]  kasan_save_track+0x18/0x40
[   14.776149]  kasan_save_alloc_info+0x3b/0x50
[   14.776355]  __kasan_kmalloc+0xb7/0xc0
[   14.776537]  __kmalloc_cache_noprof+0x18a/0x420
[   14.776819]  kasan_bitops_generic+0x93/0x1c0
[   14.777029]  kunit_try_run_case+0x1a6/0x480
[   14.777208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.777384]  kthread+0x324/0x6e0
[   14.777505]  ret_from_fork+0x41/0x80
[   14.777630]  ret_from_fork_asm+0x1a/0x30
[   14.778027] 
[   14.778128] The buggy address belongs to the object at ffff888101b5abe0
[   14.778128]  which belongs to the cache kmalloc-16 of size 16
[   14.778671] The buggy address is located 8 bytes inside of
[   14.778671]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   14.779486] 
[   14.779566] The buggy address belongs to the physical page:
[   14.779754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   14.780005] flags: 0x200000000000000(node=0|zone=2)
[   14.780252] page_type: f5(slab)
[   14.780428] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.780747] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.780969] page dumped because: kasan: bad access detected
[   14.782353] 
[   14.782827] Memory state around the buggy address:
[   14.783655]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.784368]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.784600] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.784813]                                                           ^
[   14.785021]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.785240]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.786052] ==================================================================
[   14.786909] ==================================================================
[   14.787474] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.788107] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   14.788685] 
[   14.788900] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.788942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.788954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.788983] Call Trace:
[   14.788996]  <TASK>
[   14.789011]  dump_stack_lvl+0x73/0xb0
[   14.789054]  print_report+0xd1/0x650
[   14.789075]  ? __virt_addr_valid+0x1db/0x2d0
[   14.789096]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.789120]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.789145]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.789169]  kasan_report+0x140/0x180
[   14.789190]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.789218]  kasan_check_range+0x10c/0x1c0
[   14.789240]  __kasan_check_write+0x18/0x20
[   14.789262]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.789286]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.789311]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.789333]  ? trace_hardirqs_on+0x37/0xe0
[   14.789356]  ? kasan_bitops_generic+0x93/0x1c0
[   14.789381]  kasan_bitops_generic+0x117/0x1c0
[   14.789403]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.789425]  ? trace_hardirqs_on+0x37/0xe0
[   14.789446]  ? __pfx_read_tsc+0x10/0x10
[   14.789467]  ? ktime_get_ts64+0x86/0x230
[   14.789487]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.789513]  kunit_try_run_case+0x1a6/0x480
[   14.789535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.789764]  ? queued_spin_lock_slowpath+0x117/0xb40
[   14.789791]  ? __kthread_parkme+0x82/0x160
[   14.789813]  ? preempt_count_sub+0x50/0x80
[   14.789837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.789859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.789886]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.789911]  kthread+0x324/0x6e0
[   14.789933]  ? trace_preempt_on+0x20/0xc0
[   14.789955]  ? __pfx_kthread+0x10/0x10
[   14.789976]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.789998]  ? calculate_sigpending+0x7b/0xa0
[   14.790034]  ? __pfx_kthread+0x10/0x10
[   14.790055]  ret_from_fork+0x41/0x80
[   14.790074]  ? __pfx_kthread+0x10/0x10
[   14.790095]  ret_from_fork_asm+0x1a/0x30
[   14.790125]  </TASK>
[   14.790136] 
[   14.804490] Allocated by task 269:
[   14.804910]  kasan_save_stack+0x45/0x70
[   14.805299]  kasan_save_track+0x18/0x40
[   14.805878]  kasan_save_alloc_info+0x3b/0x50
[   14.806316]  __kasan_kmalloc+0xb7/0xc0
[   14.806702]  __kmalloc_cache_noprof+0x18a/0x420
[   14.807058]  kasan_bitops_generic+0x93/0x1c0
[   14.807399]  kunit_try_run_case+0x1a6/0x480
[   14.807730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.807913]  kthread+0x324/0x6e0
[   14.808046]  ret_from_fork+0x41/0x80
[   14.808174]  ret_from_fork_asm+0x1a/0x30
[   14.808313] 
[   14.808390] The buggy address belongs to the object at ffff888101b5abe0
[   14.808390]  which belongs to the cache kmalloc-16 of size 16
[   14.809250] The buggy address is located 8 bytes inside of
[   14.809250]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   14.810497] 
[   14.810744] The buggy address belongs to the physical page:
[   14.811295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   14.812114] flags: 0x200000000000000(node=0|zone=2)
[   14.812595] page_type: f5(slab)
[   14.812897] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.813613] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.814193] page dumped because: kasan: bad access detected
[   14.814365] 
[   14.814435] Memory state around the buggy address:
[   14.814712]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.815450]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.816276] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.816968]                                                           ^
[   14.817597]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.817871]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.818387] ==================================================================
[   14.705133] ==================================================================
[   14.705572] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.706049] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   14.706360] 
[   14.706468] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.706509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.706520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.706541] Call Trace:
[   14.706554]  <TASK>
[   14.706570]  dump_stack_lvl+0x73/0xb0
[   14.706595]  print_report+0xd1/0x650
[   14.706617]  ? __virt_addr_valid+0x1db/0x2d0
[   14.706638]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.706663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.706688]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.706713]  kasan_report+0x140/0x180
[   14.706734]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.706763]  kasan_check_range+0x10c/0x1c0
[   14.706785]  __kasan_check_write+0x18/0x20
[   14.706808]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.706832]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.706857]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.706880]  ? trace_hardirqs_on+0x37/0xe0
[   14.706901]  ? kasan_bitops_generic+0x93/0x1c0
[   14.706927]  kasan_bitops_generic+0x117/0x1c0
[   14.706949]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.706971]  ? trace_hardirqs_on+0x37/0xe0
[   14.706993]  ? __pfx_read_tsc+0x10/0x10
[   14.707027]  ? ktime_get_ts64+0x86/0x230
[   14.707050]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.707077]  kunit_try_run_case+0x1a6/0x480
[   14.707099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.707122]  ? queued_spin_lock_slowpath+0x117/0xb40
[   14.707146]  ? __kthread_parkme+0x82/0x160
[   14.707166]  ? preempt_count_sub+0x50/0x80
[   14.707191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.707213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.707238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.707265]  kthread+0x324/0x6e0
[   14.707286]  ? trace_preempt_on+0x20/0xc0
[   14.707307]  ? __pfx_kthread+0x10/0x10
[   14.707329]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.707351]  ? calculate_sigpending+0x7b/0xa0
[   14.707374]  ? __pfx_kthread+0x10/0x10
[   14.707396]  ret_from_fork+0x41/0x80
[   14.707415]  ? __pfx_kthread+0x10/0x10
[   14.707436]  ret_from_fork_asm+0x1a/0x30
[   14.707467]  </TASK>
[   14.707478] 
[   14.715525] Allocated by task 269:
[   14.715843]  kasan_save_stack+0x45/0x70
[   14.716061]  kasan_save_track+0x18/0x40
[   14.716308]  kasan_save_alloc_info+0x3b/0x50
[   14.716518]  __kasan_kmalloc+0xb7/0xc0
[   14.716808]  __kmalloc_cache_noprof+0x18a/0x420
[   14.717038]  kasan_bitops_generic+0x93/0x1c0
[   14.717187]  kunit_try_run_case+0x1a6/0x480
[   14.717331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.717539]  kthread+0x324/0x6e0
[   14.717706]  ret_from_fork+0x41/0x80
[   14.717889]  ret_from_fork_asm+0x1a/0x30
[   14.718186] 
[   14.718279] The buggy address belongs to the object at ffff888101b5abe0
[   14.718279]  which belongs to the cache kmalloc-16 of size 16
[   14.718973] The buggy address is located 8 bytes inside of
[   14.718973]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   14.720506] 
[   14.720815] The buggy address belongs to the physical page:
[   14.721321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   14.721696] flags: 0x200000000000000(node=0|zone=2)
[   14.722162] page_type: f5(slab)
[   14.722458] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.722988] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.723231] page dumped because: kasan: bad access detected
[   14.723401] 
[   14.723472] Memory state around the buggy address:
[   14.723662]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.723970]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.724297] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.724729]                                                           ^
[   14.724945]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.725280]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.725562] ==================================================================
[   14.851712] ==================================================================
[   14.852439] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.853268] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   14.854007] 
[   14.854206] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.854257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.854269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.854302] Call Trace:
[   14.854318]  <TASK>
[   14.854342]  dump_stack_lvl+0x73/0xb0
[   14.854366]  print_report+0xd1/0x650
[   14.854387]  ? __virt_addr_valid+0x1db/0x2d0
[   14.854420]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.854444]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.854469]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.854493]  kasan_report+0x140/0x180
[   14.854515]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.854560]  kasan_check_range+0x10c/0x1c0
[   14.854583]  __kasan_check_write+0x18/0x20
[   14.854605]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.854629]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.854654]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.854677]  ? trace_hardirqs_on+0x37/0xe0
[   14.854699]  ? kasan_bitops_generic+0x93/0x1c0
[   14.854739]  kasan_bitops_generic+0x117/0x1c0
[   14.854762]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.854783]  ? trace_hardirqs_on+0x37/0xe0
[   14.854804]  ? __pfx_read_tsc+0x10/0x10
[   14.854826]  ? ktime_get_ts64+0x86/0x230
[   14.854848]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.854875]  kunit_try_run_case+0x1a6/0x480
[   14.854897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.854920]  ? queued_spin_lock_slowpath+0x117/0xb40
[   14.854945]  ? __kthread_parkme+0x82/0x160
[   14.854968]  ? preempt_count_sub+0x50/0x80
[   14.854992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.855023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.855049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.855075]  kthread+0x324/0x6e0
[   14.855096]  ? trace_preempt_on+0x20/0xc0
[   14.855117]  ? __pfx_kthread+0x10/0x10
[   14.855139]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.855162]  ? calculate_sigpending+0x7b/0xa0
[   14.855183]  ? __pfx_kthread+0x10/0x10
[   14.855205]  ret_from_fork+0x41/0x80
[   14.855223]  ? __pfx_kthread+0x10/0x10
[   14.855245]  ret_from_fork_asm+0x1a/0x30
[   14.855276]  </TASK>
[   14.855286] 
[   14.871707] Allocated by task 269:
[   14.871892]  kasan_save_stack+0x45/0x70
[   14.872046]  kasan_save_track+0x18/0x40
[   14.872523]  kasan_save_alloc_info+0x3b/0x50
[   14.872994]  __kasan_kmalloc+0xb7/0xc0
[   14.873147]  __kmalloc_cache_noprof+0x18a/0x420
[   14.873460]  kasan_bitops_generic+0x93/0x1c0
[   14.873954]  kunit_try_run_case+0x1a6/0x480
[   14.874369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.874844]  kthread+0x324/0x6e0
[   14.874995]  ret_from_fork+0x41/0x80
[   14.875169]  ret_from_fork_asm+0x1a/0x30
[   14.875599] 
[   14.875759] The buggy address belongs to the object at ffff888101b5abe0
[   14.875759]  which belongs to the cache kmalloc-16 of size 16
[   14.876901] The buggy address is located 8 bytes inside of
[   14.876901]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   14.877755] 
[   14.877957] The buggy address belongs to the physical page:
[   14.878136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   14.878923] flags: 0x200000000000000(node=0|zone=2)
[   14.879366] page_type: f5(slab)
[   14.879484] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.880252] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.881130] page dumped because: kasan: bad access detected
[   14.881672] 
[   14.881786] Memory state around the buggy address:
[   14.881964]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.882651]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.883165] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.883371]                                                           ^
[   14.883608]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.884292]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.885077] ==================================================================
[   14.885946] ==================================================================
[   14.886663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.887265] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   14.887490] 
[   14.887614] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.887653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.887664] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.887685] Call Trace:
[   14.887699]  <TASK>
[   14.887714]  dump_stack_lvl+0x73/0xb0
[   14.887740]  print_report+0xd1/0x650
[   14.887772]  ? __virt_addr_valid+0x1db/0x2d0
[   14.887792]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.887817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.887852]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.887877]  kasan_report+0x140/0x180
[   14.887898]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.887928]  kasan_check_range+0x10c/0x1c0
[   14.887950]  __kasan_check_write+0x18/0x20
[   14.887971]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.887996]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.888030]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.888053]  ? trace_hardirqs_on+0x37/0xe0
[   14.888075]  ? kasan_bitops_generic+0x93/0x1c0
[   14.888101]  kasan_bitops_generic+0x117/0x1c0
[   14.888123]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.888154]  ? trace_hardirqs_on+0x37/0xe0
[   14.888175]  ? __pfx_read_tsc+0x10/0x10
[   14.888196]  ? ktime_get_ts64+0x86/0x230
[   14.888227]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.888254]  kunit_try_run_case+0x1a6/0x480
[   14.888276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.888299]  ? queued_spin_lock_slowpath+0x117/0xb40
[   14.888323]  ? __kthread_parkme+0x82/0x160
[   14.888353]  ? preempt_count_sub+0x50/0x80
[   14.888377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.888399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.888435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.888461]  kthread+0x324/0x6e0
[   14.888481]  ? trace_preempt_on+0x20/0xc0
[   14.888503]  ? __pfx_kthread+0x10/0x10
[   14.888525]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.888579]  ? calculate_sigpending+0x7b/0xa0
[   14.888601]  ? __pfx_kthread+0x10/0x10
[   14.888623]  ret_from_fork+0x41/0x80
[   14.888641]  ? __pfx_kthread+0x10/0x10
[   14.888664]  ret_from_fork_asm+0x1a/0x30
[   14.888695]  </TASK>
[   14.888705] 
[   14.898163] Allocated by task 269:
[   14.898347]  kasan_save_stack+0x45/0x70
[   14.898568]  kasan_save_track+0x18/0x40
[   14.898822]  kasan_save_alloc_info+0x3b/0x50
[   14.898997]  __kasan_kmalloc+0xb7/0xc0
[   14.899200]  __kmalloc_cache_noprof+0x18a/0x420
[   14.899390]  kasan_bitops_generic+0x93/0x1c0
[   14.899562]  kunit_try_run_case+0x1a6/0x480
[   14.899773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.900032]  kthread+0x324/0x6e0
[   14.900203]  ret_from_fork+0x41/0x80
[   14.900339]  ret_from_fork_asm+0x1a/0x30
[   14.900478] 
[   14.900568] The buggy address belongs to the object at ffff888101b5abe0
[   14.900568]  which belongs to the cache kmalloc-16 of size 16
[   14.901139] The buggy address is located 8 bytes inside of
[   14.901139]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   14.902050] 
[   14.902137] The buggy address belongs to the physical page:
[   14.902382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   14.902678] flags: 0x200000000000000(node=0|zone=2)
[   14.902841] page_type: f5(slab)
[   14.902962] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.903208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.903797] page dumped because: kasan: bad access detected
[   14.904054] 
[   14.904148] Memory state around the buggy address:
[   14.904366]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.904724]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.905067] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.905274]                                                           ^
[   14.905472]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.905709]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.906187] ==================================================================