Hay
Date
June 2, 2025, 2:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.142591] ==================================================================
[   21.143043] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   21.144334] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.144663] 
[   21.144802] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.144907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.144941] Hardware name: linux,dummy-virt (DT)
[   21.144983] Call trace:
[   21.145013]  show_stack+0x20/0x38 (C)
[   21.145078]  dump_stack_lvl+0x8c/0xd0
[   21.145137]  print_report+0x118/0x608
[   21.145209]  kasan_report+0xdc/0x128
[   21.145265]  kasan_check_range+0x100/0x1a8
[   21.145318]  __kasan_check_write+0x20/0x30
[   21.145372]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   21.145437]  kasan_bitops_generic+0x11c/0x1c8
[   21.145492]  kunit_try_run_case+0x170/0x3f0
[   21.145564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.145625]  kthread+0x318/0x620
[   21.145678]  ret_from_fork+0x10/0x20
[   21.145737] 
[   21.149592] Allocated by task 251:
[   21.150899]  kasan_save_stack+0x3c/0x68
[   21.151128]  kasan_save_track+0x20/0x40
[   21.151640]  kasan_save_alloc_info+0x40/0x58
[   21.151825]  __kasan_kmalloc+0xd4/0xd8
[   21.151998]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.152194]  kasan_bitops_generic+0xa0/0x1c8
[   21.152414]  kunit_try_run_case+0x170/0x3f0
[   21.152593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.152875]  kthread+0x318/0x620
[   21.153061]  ret_from_fork+0x10/0x20
[   21.154693] 
[   21.154838] The buggy address belongs to the object at fff00000c3e60680
[   21.154838]  which belongs to the cache kmalloc-16 of size 16
[   21.155472] The buggy address is located 8 bytes inside of
[   21.155472]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.155977] 
[   21.156143] The buggy address belongs to the physical page:
[   21.157175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.157725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.158417] page_type: f5(slab)
[   21.158684] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.159066] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.159460] page dumped because: kasan: bad access detected
[   21.159706] 
[   21.159870] Memory state around the buggy address:
[   21.160146]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.161556]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.162057] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.162577]                       ^
[   21.162942]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.163489]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.163932] ==================================================================
[   21.259442] ==================================================================
[   21.259895] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   21.260844] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.261364] 
[   21.261627] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.261826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.261865] Hardware name: linux,dummy-virt (DT)
[   21.261909] Call trace:
[   21.261942]  show_stack+0x20/0x38 (C)
[   21.262009]  dump_stack_lvl+0x8c/0xd0
[   21.262113]  print_report+0x118/0x608
[   21.262196]  kasan_report+0xdc/0x128
[   21.262256]  kasan_check_range+0x100/0x1a8
[   21.262311]  __kasan_check_write+0x20/0x30
[   21.262368]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   21.262434]  kasan_bitops_generic+0x11c/0x1c8
[   21.262492]  kunit_try_run_case+0x170/0x3f0
[   21.262551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.262613]  kthread+0x318/0x620
[   21.262669]  ret_from_fork+0x10/0x20
[   21.262730] 
[   21.267248] Allocated by task 251:
[   21.267488]  kasan_save_stack+0x3c/0x68
[   21.267894]  kasan_save_track+0x20/0x40
[   21.268265]  kasan_save_alloc_info+0x40/0x58
[   21.268524]  __kasan_kmalloc+0xd4/0xd8
[   21.268905]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.269294]  kasan_bitops_generic+0xa0/0x1c8
[   21.269549]  kunit_try_run_case+0x170/0x3f0
[   21.269958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.270401]  kthread+0x318/0x620
[   21.270707]  ret_from_fork+0x10/0x20
[   21.270934] 
[   21.271204] The buggy address belongs to the object at fff00000c3e60680
[   21.271204]  which belongs to the cache kmalloc-16 of size 16
[   21.271989] The buggy address is located 8 bytes inside of
[   21.271989]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.272710] 
[   21.272936] The buggy address belongs to the physical page:
[   21.273330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.273788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.274151] page_type: f5(slab)
[   21.274398] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.274772] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.275281] page dumped because: kasan: bad access detected
[   21.275874] 
[   21.276089] Memory state around the buggy address:
[   21.276448]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.276961]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.277455] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.277994]                       ^
[   21.278277]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.278854]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.279194] ==================================================================
[   21.184619] ==================================================================
[   21.185066] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   21.185972] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.186368] 
[   21.187514] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.187633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.187669] Hardware name: linux,dummy-virt (DT)
[   21.187710] Call trace:
[   21.187740]  show_stack+0x20/0x38 (C)
[   21.187808]  dump_stack_lvl+0x8c/0xd0
[   21.187863]  print_report+0x118/0x608
[   21.187919]  kasan_report+0xdc/0x128
[   21.187970]  kasan_check_range+0x100/0x1a8
[   21.188023]  __kasan_check_write+0x20/0x30
[   21.188075]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   21.188134]  kasan_bitops_generic+0x11c/0x1c8
[   21.188206]  kunit_try_run_case+0x170/0x3f0
[   21.188262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.188319]  kthread+0x318/0x620
[   21.188372]  ret_from_fork+0x10/0x20
[   21.188427] 
[   21.192636] Allocated by task 251:
[   21.192925]  kasan_save_stack+0x3c/0x68
[   21.193171]  kasan_save_track+0x20/0x40
[   21.193465]  kasan_save_alloc_info+0x40/0x58
[   21.193728]  __kasan_kmalloc+0xd4/0xd8
[   21.193969]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.194386]  kasan_bitops_generic+0xa0/0x1c8
[   21.194728]  kunit_try_run_case+0x170/0x3f0
[   21.195019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.195381]  kthread+0x318/0x620
[   21.195602]  ret_from_fork+0x10/0x20
[   21.195855] 
[   21.195984] The buggy address belongs to the object at fff00000c3e60680
[   21.195984]  which belongs to the cache kmalloc-16 of size 16
[   21.196619] The buggy address is located 8 bytes inside of
[   21.196619]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.197214] 
[   21.197405] The buggy address belongs to the physical page:
[   21.197657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.198160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.198538] page_type: f5(slab)
[   21.198807] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.199208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.199616] page dumped because: kasan: bad access detected
[   21.199905] 
[   21.200086] Memory state around the buggy address:
[   21.200379]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.200710]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.201091] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.201575]                       ^
[   21.201799]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.202250]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.202501] ==================================================================
[   21.299744] ==================================================================
[   21.300138] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   21.300579] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.300855] 
[   21.301049] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.301145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.301191] Hardware name: linux,dummy-virt (DT)
[   21.301232] Call trace:
[   21.301263]  show_stack+0x20/0x38 (C)
[   21.301324]  dump_stack_lvl+0x8c/0xd0
[   21.301380]  print_report+0x118/0x608
[   21.301437]  kasan_report+0xdc/0x128
[   21.301492]  __asan_report_load8_noabort+0x20/0x30
[   21.301563]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   21.301628]  kasan_bitops_generic+0x11c/0x1c8
[   21.301684]  kunit_try_run_case+0x170/0x3f0
[   21.301740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.301801]  kthread+0x318/0x620
[   21.301852]  ret_from_fork+0x10/0x20
[   21.301910] 
[   21.306403] Allocated by task 251:
[   21.306832]  kasan_save_stack+0x3c/0x68
[   21.307169]  kasan_save_track+0x20/0x40
[   21.307410]  kasan_save_alloc_info+0x40/0x58
[   21.307822]  __kasan_kmalloc+0xd4/0xd8
[   21.308250]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.308646]  kasan_bitops_generic+0xa0/0x1c8
[   21.308979]  kunit_try_run_case+0x170/0x3f0
[   21.309334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.309717]  kthread+0x318/0x620
[   21.310043]  ret_from_fork+0x10/0x20
[   21.310216] 
[   21.310527] The buggy address belongs to the object at fff00000c3e60680
[   21.310527]  which belongs to the cache kmalloc-16 of size 16
[   21.311051] The buggy address is located 8 bytes inside of
[   21.311051]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.311788] 
[   21.311971] The buggy address belongs to the physical page:
[   21.312295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.312700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.312995] page_type: f5(slab)
[   21.313539] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.314047] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.314632] page dumped because: kasan: bad access detected
[   21.315060] 
[   21.315211] Memory state around the buggy address:
[   21.315412]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.315936]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.316351] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.316701]                       ^
[   21.316871]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.317455]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.317904] ==================================================================
[   21.280742] ==================================================================
[   21.281215] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   21.281964] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.282337] 
[   21.282480] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.282582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.282615] Hardware name: linux,dummy-virt (DT)
[   21.282657] Call trace:
[   21.282686]  show_stack+0x20/0x38 (C)
[   21.282748]  dump_stack_lvl+0x8c/0xd0
[   21.282809]  print_report+0x118/0x608
[   21.282866]  kasan_report+0xdc/0x128
[   21.282923]  __asan_report_load8_noabort+0x20/0x30
[   21.282979]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   21.283042]  kasan_bitops_generic+0x11c/0x1c8
[   21.283098]  kunit_try_run_case+0x170/0x3f0
[   21.283168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.283236]  kthread+0x318/0x620
[   21.283291]  ret_from_fork+0x10/0x20
[   21.283351] 
[   21.287545] Allocated by task 251:
[   21.287905]  kasan_save_stack+0x3c/0x68
[   21.288236]  kasan_save_track+0x20/0x40
[   21.288562]  kasan_save_alloc_info+0x40/0x58
[   21.288891]  __kasan_kmalloc+0xd4/0xd8
[   21.289203]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.289556]  kasan_bitops_generic+0xa0/0x1c8
[   21.289898]  kunit_try_run_case+0x170/0x3f0
[   21.290274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.290593]  kthread+0x318/0x620
[   21.290804]  ret_from_fork+0x10/0x20
[   21.291033] 
[   21.291436] The buggy address belongs to the object at fff00000c3e60680
[   21.291436]  which belongs to the cache kmalloc-16 of size 16
[   21.292084] The buggy address is located 8 bytes inside of
[   21.292084]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.292435] 
[   21.292545] The buggy address belongs to the physical page:
[   21.292892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.293410] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.293873] page_type: f5(slab)
[   21.294206] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.294618] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.295013] page dumped because: kasan: bad access detected
[   21.295438] 
[   21.295651] Memory state around the buggy address:
[   21.295968]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.296488]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.296948] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.297425]                       ^
[   21.297696]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.298163]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.298692] ==================================================================
[   21.203926] ==================================================================
[   21.204357] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   21.204868] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.205255] 
[   21.205431] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.205541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.205579] Hardware name: linux,dummy-virt (DT)
[   21.205622] Call trace:
[   21.205652]  show_stack+0x20/0x38 (C)
[   21.205716]  dump_stack_lvl+0x8c/0xd0
[   21.205777]  print_report+0x118/0x608
[   21.205835]  kasan_report+0xdc/0x128
[   21.205893]  __asan_report_load8_noabort+0x20/0x30
[   21.205952]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   21.206018]  kasan_bitops_generic+0x11c/0x1c8
[   21.206119]  kunit_try_run_case+0x170/0x3f0
[   21.206203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.206269]  kthread+0x318/0x620
[   21.206323]  ret_from_fork+0x10/0x20
[   21.206386] 
[   21.210063] Allocated by task 251:
[   21.210431]  kasan_save_stack+0x3c/0x68
[   21.210859]  kasan_save_track+0x20/0x40
[   21.211202]  kasan_save_alloc_info+0x40/0x58
[   21.211584]  __kasan_kmalloc+0xd4/0xd8
[   21.211835]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.212097]  kasan_bitops_generic+0xa0/0x1c8
[   21.212361]  kunit_try_run_case+0x170/0x3f0
[   21.212603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.212912]  kthread+0x318/0x620
[   21.213140]  ret_from_fork+0x10/0x20
[   21.213768] 
[   21.213891] The buggy address belongs to the object at fff00000c3e60680
[   21.213891]  which belongs to the cache kmalloc-16 of size 16
[   21.214875] The buggy address is located 8 bytes inside of
[   21.214875]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.215574] 
[   21.215696] The buggy address belongs to the physical page:
[   21.216148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.216685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.217140] page_type: f5(slab)
[   21.217435] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.217983] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.218514] page dumped because: kasan: bad access detected
[   21.218904] 
[   21.219139] Memory state around the buggy address:
[   21.219558]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.219959]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.220353] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.220734]                       ^
[   21.220973]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.221645]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.222091] ==================================================================
[   21.164881] ==================================================================
[   21.165684] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   21.166659] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.167234] 
[   21.167401] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.167508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.167541] Hardware name: linux,dummy-virt (DT)
[   21.167584] Call trace:
[   21.167616]  show_stack+0x20/0x38 (C)
[   21.167683]  dump_stack_lvl+0x8c/0xd0
[   21.167743]  print_report+0x118/0x608
[   21.167800]  kasan_report+0xdc/0x128
[   21.167856]  __asan_report_load8_noabort+0x20/0x30
[   21.167913]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   21.167979]  kasan_bitops_generic+0x11c/0x1c8
[   21.168037]  kunit_try_run_case+0x170/0x3f0
[   21.168095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.168220]  kthread+0x318/0x620
[   21.168339]  ret_from_fork+0x10/0x20
[   21.168403] 
[   21.170587] Allocated by task 251:
[   21.170917]  kasan_save_stack+0x3c/0x68
[   21.171293]  kasan_save_track+0x20/0x40
[   21.171632]  kasan_save_alloc_info+0x40/0x58
[   21.171993]  __kasan_kmalloc+0xd4/0xd8
[   21.173573]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.173889]  kasan_bitops_generic+0xa0/0x1c8
[   21.174439]  kunit_try_run_case+0x170/0x3f0
[   21.174643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.174873]  kthread+0x318/0x620
[   21.175039]  ret_from_fork+0x10/0x20
[   21.175218] 
[   21.175353] The buggy address belongs to the object at fff00000c3e60680
[   21.175353]  which belongs to the cache kmalloc-16 of size 16
[   21.175778] The buggy address is located 8 bytes inside of
[   21.175778]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.177282] 
[   21.177426] The buggy address belongs to the physical page:
[   21.177722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.178639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.178930] page_type: f5(slab)
[   21.179090] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.179344] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.179566] page dumped because: kasan: bad access detected
[   21.179749] 
[   21.179853] Memory state around the buggy address:
[   21.180023]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.181046]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.181583] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.181972]                       ^
[   21.182894]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183309]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183766] ==================================================================
[   21.239384] ==================================================================
[   21.240050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   21.240462] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.240831] 
[   21.241026] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.241124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.241170] Hardware name: linux,dummy-virt (DT)
[   21.241216] Call trace:
[   21.241247]  show_stack+0x20/0x38 (C)
[   21.241312]  dump_stack_lvl+0x8c/0xd0
[   21.241370]  print_report+0x118/0x608
[   21.241426]  kasan_report+0xdc/0x128
[   21.241482]  __asan_report_load8_noabort+0x20/0x30
[   21.241553]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   21.241621]  kasan_bitops_generic+0x11c/0x1c8
[   21.241678]  kunit_try_run_case+0x170/0x3f0
[   21.241736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.241798]  kthread+0x318/0x620
[   21.241850]  ret_from_fork+0x10/0x20
[   21.241907] 
[   21.244685] Allocated by task 251:
[   21.244959]  kasan_save_stack+0x3c/0x68
[   21.245310]  kasan_save_track+0x20/0x40
[   21.245599]  kasan_save_alloc_info+0x40/0x58
[   21.245842]  __kasan_kmalloc+0xd4/0xd8
[   21.246091]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.246290]  kasan_bitops_generic+0xa0/0x1c8
[   21.247068]  kunit_try_run_case+0x170/0x3f0
[   21.247396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.247837]  kthread+0x318/0x620
[   21.248015]  ret_from_fork+0x10/0x20
[   21.248671] 
[   21.249179] The buggy address belongs to the object at fff00000c3e60680
[   21.249179]  which belongs to the cache kmalloc-16 of size 16
[   21.249539] The buggy address is located 8 bytes inside of
[   21.249539]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.249874] 
[   21.249980] The buggy address belongs to the physical page:
[   21.250173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.250431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.250652] page_type: f5(slab)
[   21.250809] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.251059] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.253048] page dumped because: kasan: bad access detected
[   21.253881] 
[   21.254403] Memory state around the buggy address:
[   21.255058]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.255794]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.256597] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.256890]                       ^
[   21.257051]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.257654]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.258167] ==================================================================
[   21.223299] ==================================================================
[   21.223579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   21.224880] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251
[   21.225348] 
[   21.225555] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.225661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.225699] Hardware name: linux,dummy-virt (DT)
[   21.225742] Call trace:
[   21.225775]  show_stack+0x20/0x38 (C)
[   21.225841]  dump_stack_lvl+0x8c/0xd0
[   21.225900]  print_report+0x118/0x608
[   21.225958]  kasan_report+0xdc/0x128
[   21.226015]  kasan_check_range+0x100/0x1a8
[   21.226068]  __kasan_check_write+0x20/0x30
[   21.226142]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   21.226226]  kasan_bitops_generic+0x11c/0x1c8
[   21.226282]  kunit_try_run_case+0x170/0x3f0
[   21.226340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.226402]  kthread+0x318/0x620
[   21.226453]  ret_from_fork+0x10/0x20
[   21.226511] 
[   21.229274] Allocated by task 251:
[   21.229556]  kasan_save_stack+0x3c/0x68
[   21.229832]  kasan_save_track+0x20/0x40
[   21.230116]  kasan_save_alloc_info+0x40/0x58
[   21.230426]  __kasan_kmalloc+0xd4/0xd8
[   21.230746]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.231019]  kasan_bitops_generic+0xa0/0x1c8
[   21.231241]  kunit_try_run_case+0x170/0x3f0
[   21.231522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.231725]  kthread+0x318/0x620
[   21.231923]  ret_from_fork+0x10/0x20
[   21.232254] 
[   21.232372] The buggy address belongs to the object at fff00000c3e60680
[   21.232372]  which belongs to the cache kmalloc-16 of size 16
[   21.232821] The buggy address is located 8 bytes inside of
[   21.232821]  allocated 9-byte region [fff00000c3e60680, fff00000c3e60689)
[   21.233468] 
[   21.233660] The buggy address belongs to the physical page:
[   21.233948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60
[   21.234346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.234697] page_type: f5(slab)
[   21.235020] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.235446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.235811] page dumped because: kasan: bad access detected
[   21.236137] 
[   21.236257] Memory state around the buggy address:
[   21.236514]  fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.236856]  fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.237242] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.237539]                       ^
[   21.237827]  fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.238088]  fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.238487] ==================================================================

[   15.081584] ==================================================================
[   15.082180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   15.082492] Read of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   15.082934] 
[   15.083048] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.083087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.083099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.083119] Call Trace:
[   15.083132]  <TASK>
[   15.083147]  dump_stack_lvl+0x73/0xb0
[   15.083171]  print_report+0xd1/0x650
[   15.083192]  ? __virt_addr_valid+0x1db/0x2d0
[   15.083214]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   15.083240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.083265]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   15.083292]  kasan_report+0x140/0x180
[   15.083313]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   15.083344]  kasan_check_range+0x10c/0x1c0
[   15.083366]  __kasan_check_read+0x15/0x20
[   15.083388]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   15.083415]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.083442]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.083465]  ? trace_hardirqs_on+0x37/0xe0
[   15.083486]  ? kasan_bitops_generic+0x93/0x1c0
[   15.083514]  kasan_bitops_generic+0x122/0x1c0
[   15.083535]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.083556]  ? trace_hardirqs_on+0x37/0xe0
[   15.083657]  ? __pfx_read_tsc+0x10/0x10
[   15.083678]  ? ktime_get_ts64+0x86/0x230
[   15.083700]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.083726]  kunit_try_run_case+0x1a6/0x480
[   15.083749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.083771]  ? queued_spin_lock_slowpath+0x117/0xb40
[   15.083796]  ? __kthread_parkme+0x82/0x160
[   15.083817]  ? preempt_count_sub+0x50/0x80
[   15.083842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.083864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.083889]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.083914]  kthread+0x324/0x6e0
[   15.083936]  ? trace_preempt_on+0x20/0xc0
[   15.083958]  ? __pfx_kthread+0x10/0x10
[   15.083979]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.084001]  ? calculate_sigpending+0x7b/0xa0
[   15.084034]  ? __pfx_kthread+0x10/0x10
[   15.084057]  ret_from_fork+0x41/0x80
[   15.084074]  ? __pfx_kthread+0x10/0x10
[   15.084096]  ret_from_fork_asm+0x1a/0x30
[   15.084126]  </TASK>
[   15.084136] 
[   15.094038] Allocated by task 269:
[   15.094220]  kasan_save_stack+0x45/0x70
[   15.094391]  kasan_save_track+0x18/0x40
[   15.094627]  kasan_save_alloc_info+0x3b/0x50
[   15.094818]  __kasan_kmalloc+0xb7/0xc0
[   15.094995]  __kmalloc_cache_noprof+0x18a/0x420
[   15.095212]  kasan_bitops_generic+0x93/0x1c0
[   15.095409]  kunit_try_run_case+0x1a6/0x480
[   15.095828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.096068]  kthread+0x324/0x6e0
[   15.096223]  ret_from_fork+0x41/0x80
[   15.096351]  ret_from_fork_asm+0x1a/0x30
[   15.096488] 
[   15.096558] The buggy address belongs to the object at ffff888101b5abe0
[   15.096558]  which belongs to the cache kmalloc-16 of size 16
[   15.096923] The buggy address is located 8 bytes inside of
[   15.096923]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   15.097501] 
[   15.097618] The buggy address belongs to the physical page:
[   15.098116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   15.098438] flags: 0x200000000000000(node=0|zone=2)
[   15.098866] page_type: f5(slab)
[   15.098991] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.099227] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.099441] page dumped because: kasan: bad access detected
[   15.100050] 
[   15.100180] Memory state around the buggy address:
[   15.100449]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.101000]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   15.101353] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   15.101840]                                                           ^
[   15.102172]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.102439]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.102641] ==================================================================
[   15.053569] ==================================================================
[   15.053822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   15.054235] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   15.054561] 
[   15.054663] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.054702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.054714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.054733] Call Trace:
[   15.054747]  <TASK>
[   15.054761]  dump_stack_lvl+0x73/0xb0
[   15.054784]  print_report+0xd1/0x650
[   15.054803]  ? __virt_addr_valid+0x1db/0x2d0
[   15.054825]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   15.054850]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.054876]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   15.054901]  kasan_report+0x140/0x180
[   15.054923]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   15.054953]  kasan_check_range+0x10c/0x1c0
[   15.054976]  __kasan_check_write+0x18/0x20
[   15.054998]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   15.055034]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.055062]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.055085]  ? trace_hardirqs_on+0x37/0xe0
[   15.055106]  ? kasan_bitops_generic+0x93/0x1c0
[   15.055132]  kasan_bitops_generic+0x122/0x1c0
[   15.055154]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.055176]  ? trace_hardirqs_on+0x37/0xe0
[   15.055197]  ? __pfx_read_tsc+0x10/0x10
[   15.055218]  ? ktime_get_ts64+0x86/0x230
[   15.055239]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.055265]  kunit_try_run_case+0x1a6/0x480
[   15.055287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.055311]  ? queued_spin_lock_slowpath+0x117/0xb40
[   15.055333]  ? __kthread_parkme+0x82/0x160
[   15.055354]  ? preempt_count_sub+0x50/0x80
[   15.055377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.055399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.055425]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.055451]  kthread+0x324/0x6e0
[   15.055471]  ? trace_preempt_on+0x20/0xc0
[   15.055492]  ? __pfx_kthread+0x10/0x10
[   15.055515]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.055536]  ? calculate_sigpending+0x7b/0xa0
[   15.055557]  ? __pfx_kthread+0x10/0x10
[   15.055578]  ret_from_fork+0x41/0x80
[   15.055596]  ? __pfx_kthread+0x10/0x10
[   15.055617]  ret_from_fork_asm+0x1a/0x30
[   15.055648]  </TASK>
[   15.055657] 
[   15.067288] Allocated by task 269:
[   15.067450]  kasan_save_stack+0x45/0x70
[   15.067596]  kasan_save_track+0x18/0x40
[   15.067785]  kasan_save_alloc_info+0x3b/0x50
[   15.068133]  __kasan_kmalloc+0xb7/0xc0
[   15.068329]  __kmalloc_cache_noprof+0x18a/0x420
[   15.068553]  kasan_bitops_generic+0x93/0x1c0
[   15.068772]  kunit_try_run_case+0x1a6/0x480
[   15.069813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.070224]  kthread+0x324/0x6e0
[   15.070356]  ret_from_fork+0x41/0x80
[   15.070485]  ret_from_fork_asm+0x1a/0x30
[   15.071266] 
[   15.071444] The buggy address belongs to the object at ffff888101b5abe0
[   15.071444]  which belongs to the cache kmalloc-16 of size 16
[   15.073165] The buggy address is located 8 bytes inside of
[   15.073165]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   15.073512] 
[   15.074071] The buggy address belongs to the physical page:
[   15.074765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   15.075849] flags: 0x200000000000000(node=0|zone=2)
[   15.076255] page_type: f5(slab)
[   15.076997] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.077994] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.078248] page dumped because: kasan: bad access detected
[   15.078419] 
[   15.078490] Memory state around the buggy address:
[   15.079123]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.079616]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   15.080039] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   15.080319]                                                           ^
[   15.080577]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.080835]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.081145] ==================================================================
[   15.001957] ==================================================================
[   15.002387] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   15.003289] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   15.003761] 
[   15.004253] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.004313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.004326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.004347] Call Trace:
[   15.004391]  <TASK>
[   15.004408]  dump_stack_lvl+0x73/0xb0
[   15.004436]  print_report+0xd1/0x650
[   15.004458]  ? __virt_addr_valid+0x1db/0x2d0
[   15.004479]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   15.004505]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.004532]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   15.004559]  kasan_report+0x140/0x180
[   15.004580]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   15.004611]  kasan_check_range+0x10c/0x1c0
[   15.004633]  __kasan_check_write+0x18/0x20
[   15.004655]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   15.004681]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.004708]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.004731]  ? trace_hardirqs_on+0x37/0xe0
[   15.004753]  ? kasan_bitops_generic+0x93/0x1c0
[   15.004779]  kasan_bitops_generic+0x122/0x1c0
[   15.004801]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.004824]  ? trace_hardirqs_on+0x37/0xe0
[   15.004846]  ? __pfx_read_tsc+0x10/0x10
[   15.004867]  ? ktime_get_ts64+0x86/0x230
[   15.004889]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.004915]  kunit_try_run_case+0x1a6/0x480
[   15.004937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.004959]  ? queued_spin_lock_slowpath+0x117/0xb40
[   15.004984]  ? __kthread_parkme+0x82/0x160
[   15.005006]  ? preempt_count_sub+0x50/0x80
[   15.005040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.005062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.005088]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.005115]  kthread+0x324/0x6e0
[   15.005135]  ? trace_preempt_on+0x20/0xc0
[   15.005156]  ? __pfx_kthread+0x10/0x10
[   15.005178]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.005199]  ? calculate_sigpending+0x7b/0xa0
[   15.005219]  ? __pfx_kthread+0x10/0x10
[   15.005242]  ret_from_fork+0x41/0x80
[   15.005259]  ? __pfx_kthread+0x10/0x10
[   15.005281]  ret_from_fork_asm+0x1a/0x30
[   15.005311]  </TASK>
[   15.005320] 
[   15.019116] Allocated by task 269:
[   15.019296]  kasan_save_stack+0x45/0x70
[   15.019480]  kasan_save_track+0x18/0x40
[   15.020067]  kasan_save_alloc_info+0x3b/0x50
[   15.020334]  __kasan_kmalloc+0xb7/0xc0
[   15.020685]  __kmalloc_cache_noprof+0x18a/0x420
[   15.021147]  kasan_bitops_generic+0x93/0x1c0
[   15.021433]  kunit_try_run_case+0x1a6/0x480
[   15.021904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.022363]  kthread+0x324/0x6e0
[   15.022563]  ret_from_fork+0x41/0x80
[   15.022884]  ret_from_fork_asm+0x1a/0x30
[   15.023078] 
[   15.023168] The buggy address belongs to the object at ffff888101b5abe0
[   15.023168]  which belongs to the cache kmalloc-16 of size 16
[   15.023953] The buggy address is located 8 bytes inside of
[   15.023953]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   15.025071] 
[   15.025315] The buggy address belongs to the physical page:
[   15.025723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   15.026281] flags: 0x200000000000000(node=0|zone=2)
[   15.026789] page_type: f5(slab)
[   15.027306] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.027772] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.028244] page dumped because: kasan: bad access detected
[   15.028483] 
[   15.028799] Memory state around the buggy address:
[   15.029234]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.029754]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   15.030342] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   15.031087]                                                           ^
[   15.031568]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.032099]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.032594] ==================================================================
[   15.103228] ==================================================================
[   15.103593] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   15.104036] Read of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   15.104434] 
[   15.104577] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.104676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.104690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.104712] Call Trace:
[   15.104728]  <TASK>
[   15.104743]  dump_stack_lvl+0x73/0xb0
[   15.104769]  print_report+0xd1/0x650
[   15.104790]  ? __virt_addr_valid+0x1db/0x2d0
[   15.104811]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   15.104838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.104864]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   15.104890]  kasan_report+0x140/0x180
[   15.104912]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   15.104944]  __asan_report_load8_noabort+0x18/0x20
[   15.104968]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   15.104994]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.105035]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.105058]  ? trace_hardirqs_on+0x37/0xe0
[   15.105081]  ? kasan_bitops_generic+0x93/0x1c0
[   15.105106]  kasan_bitops_generic+0x122/0x1c0
[   15.105128]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.105150]  ? trace_hardirqs_on+0x37/0xe0
[   15.105171]  ? __pfx_read_tsc+0x10/0x10
[   15.105193]  ? ktime_get_ts64+0x86/0x230
[   15.105214]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.105240]  kunit_try_run_case+0x1a6/0x480
[   15.105262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.105285]  ? queued_spin_lock_slowpath+0x117/0xb40
[   15.105310]  ? __kthread_parkme+0x82/0x160
[   15.105331]  ? preempt_count_sub+0x50/0x80
[   15.105355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.105377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.105403]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.105428]  kthread+0x324/0x6e0
[   15.105449]  ? trace_preempt_on+0x20/0xc0
[   15.105471]  ? __pfx_kthread+0x10/0x10
[   15.105493]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.105515]  ? calculate_sigpending+0x7b/0xa0
[   15.105536]  ? __pfx_kthread+0x10/0x10
[   15.105558]  ret_from_fork+0x41/0x80
[   15.105576]  ? __pfx_kthread+0x10/0x10
[   15.105598]  ret_from_fork_asm+0x1a/0x30
[   15.105629]  </TASK>
[   15.105638] 
[   15.117425] Allocated by task 269:
[   15.117899]  kasan_save_stack+0x45/0x70
[   15.118101]  kasan_save_track+0x18/0x40
[   15.118387]  kasan_save_alloc_info+0x3b/0x50
[   15.118660]  __kasan_kmalloc+0xb7/0xc0
[   15.118985]  __kmalloc_cache_noprof+0x18a/0x420
[   15.119312]  kasan_bitops_generic+0x93/0x1c0
[   15.119664]  kunit_try_run_case+0x1a6/0x480
[   15.119849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.120095]  kthread+0x324/0x6e0
[   15.120357]  ret_from_fork+0x41/0x80
[   15.120812]  ret_from_fork_asm+0x1a/0x30
[   15.121062] 
[   15.121147] The buggy address belongs to the object at ffff888101b5abe0
[   15.121147]  which belongs to the cache kmalloc-16 of size 16
[   15.121641] The buggy address is located 8 bytes inside of
[   15.121641]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   15.122195] 
[   15.122325] The buggy address belongs to the physical page:
[   15.122621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   15.122959] flags: 0x200000000000000(node=0|zone=2)
[   15.123131] page_type: f5(slab)
[   15.123298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.124080] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.124538] page dumped because: kasan: bad access detected
[   15.124867] 
[   15.124958] Memory state around the buggy address:
[   15.125338]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.125798]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   15.126243] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   15.126685]                                                           ^
[   15.127134]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.127523]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.128084] ==================================================================
[   14.926516] ==================================================================
[   14.926947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.927372] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   14.927786] 
[   14.927892] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.927930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.927942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.927963] Call Trace:
[   14.927978]  <TASK>
[   14.927994]  dump_stack_lvl+0x73/0xb0
[   14.928029]  print_report+0xd1/0x650
[   14.928049]  ? __virt_addr_valid+0x1db/0x2d0
[   14.928070]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.928096]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.928121]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.928147]  kasan_report+0x140/0x180
[   14.928169]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.928200]  kasan_check_range+0x10c/0x1c0
[   14.928223]  __kasan_check_write+0x18/0x20
[   14.928245]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.928272]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.928299]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.928322]  ? trace_hardirqs_on+0x37/0xe0
[   14.928342]  ? kasan_bitops_generic+0x93/0x1c0
[   14.928369]  kasan_bitops_generic+0x122/0x1c0
[   14.928391]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.928413]  ? trace_hardirqs_on+0x37/0xe0
[   14.928434]  ? __pfx_read_tsc+0x10/0x10
[   14.928455]  ? ktime_get_ts64+0x86/0x230
[   14.928476]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.928501]  kunit_try_run_case+0x1a6/0x480
[   14.928523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.928546]  ? queued_spin_lock_slowpath+0x117/0xb40
[   14.928568]  ? __kthread_parkme+0x82/0x160
[   14.928590]  ? preempt_count_sub+0x50/0x80
[   14.928612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.928635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.928661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.928687]  kthread+0x324/0x6e0
[   14.928707]  ? trace_preempt_on+0x20/0xc0
[   14.928729]  ? __pfx_kthread+0x10/0x10
[   14.928751]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.928772]  ? calculate_sigpending+0x7b/0xa0
[   14.928793]  ? __pfx_kthread+0x10/0x10
[   14.928815]  ret_from_fork+0x41/0x80
[   14.928833]  ? __pfx_kthread+0x10/0x10
[   14.928854]  ret_from_fork_asm+0x1a/0x30
[   14.928885]  </TASK>
[   14.928894] 
[   14.937455] Allocated by task 269:
[   14.937586]  kasan_save_stack+0x45/0x70
[   14.937811]  kasan_save_track+0x18/0x40
[   14.938004]  kasan_save_alloc_info+0x3b/0x50
[   14.938227]  __kasan_kmalloc+0xb7/0xc0
[   14.938412]  __kmalloc_cache_noprof+0x18a/0x420
[   14.938855]  kasan_bitops_generic+0x93/0x1c0
[   14.939097]  kunit_try_run_case+0x1a6/0x480
[   14.939305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.939559]  kthread+0x324/0x6e0
[   14.939808]  ret_from_fork+0x41/0x80
[   14.939998]  ret_from_fork_asm+0x1a/0x30
[   14.940206] 
[   14.940300] The buggy address belongs to the object at ffff888101b5abe0
[   14.940300]  which belongs to the cache kmalloc-16 of size 16
[   14.940908] The buggy address is located 8 bytes inside of
[   14.940908]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   14.941338] 
[   14.941411] The buggy address belongs to the physical page:
[   14.941582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   14.941899] flags: 0x200000000000000(node=0|zone=2)
[   14.942146] page_type: f5(slab)
[   14.942316] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.942895] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.943244] page dumped because: kasan: bad access detected
[   14.943500] 
[   14.943596] Memory state around the buggy address:
[   14.943911]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.944154]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.944367] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.944640]                                                           ^
[   14.944929]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.945247]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.945553] ==================================================================
[   15.033060] ==================================================================
[   15.033329] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   15.033678] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   15.034100] 
[   15.034197] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.034235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.034247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.034269] Call Trace:
[   15.034284]  <TASK>
[   15.034301]  dump_stack_lvl+0x73/0xb0
[   15.034324]  print_report+0xd1/0x650
[   15.034345]  ? __virt_addr_valid+0x1db/0x2d0
[   15.034367]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   15.034393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.034418]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   15.034444]  kasan_report+0x140/0x180
[   15.034465]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   15.034496]  kasan_check_range+0x10c/0x1c0
[   15.034518]  __kasan_check_write+0x18/0x20
[   15.034553]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   15.034580]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.034618]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.034649]  ? trace_hardirqs_on+0x37/0xe0
[   15.034671]  ? kasan_bitops_generic+0x93/0x1c0
[   15.034697]  kasan_bitops_generic+0x122/0x1c0
[   15.034729]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.034752]  ? trace_hardirqs_on+0x37/0xe0
[   15.034774]  ? __pfx_read_tsc+0x10/0x10
[   15.034794]  ? ktime_get_ts64+0x86/0x230
[   15.034816]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.034843]  kunit_try_run_case+0x1a6/0x480
[   15.034866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.034889]  ? queued_spin_lock_slowpath+0x117/0xb40
[   15.034913]  ? __kthread_parkme+0x82/0x160
[   15.034935]  ? preempt_count_sub+0x50/0x80
[   15.034958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.034980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.035006]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.035041]  kthread+0x324/0x6e0
[   15.035061]  ? trace_preempt_on+0x20/0xc0
[   15.035084]  ? __pfx_kthread+0x10/0x10
[   15.035105]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.035126]  ? calculate_sigpending+0x7b/0xa0
[   15.035148]  ? __pfx_kthread+0x10/0x10
[   15.035170]  ret_from_fork+0x41/0x80
[   15.035187]  ? __pfx_kthread+0x10/0x10
[   15.035209]  ret_from_fork_asm+0x1a/0x30
[   15.035239]  </TASK>
[   15.035250] 
[   15.044507] Allocated by task 269:
[   15.044641]  kasan_save_stack+0x45/0x70
[   15.044783]  kasan_save_track+0x18/0x40
[   15.044918]  kasan_save_alloc_info+0x3b/0x50
[   15.045075]  __kasan_kmalloc+0xb7/0xc0
[   15.045204]  __kmalloc_cache_noprof+0x18a/0x420
[   15.045528]  kasan_bitops_generic+0x93/0x1c0
[   15.045779]  kunit_try_run_case+0x1a6/0x480
[   15.046203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.046461]  kthread+0x324/0x6e0
[   15.046717]  ret_from_fork+0x41/0x80
[   15.046918]  ret_from_fork_asm+0x1a/0x30
[   15.047149] 
[   15.047259] The buggy address belongs to the object at ffff888101b5abe0
[   15.047259]  which belongs to the cache kmalloc-16 of size 16
[   15.047851] The buggy address is located 8 bytes inside of
[   15.047851]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   15.048412] 
[   15.048531] The buggy address belongs to the physical page:
[   15.048931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   15.049248] flags: 0x200000000000000(node=0|zone=2)
[   15.049414] page_type: f5(slab)
[   15.049572] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.050267] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.050825] page dumped because: kasan: bad access detected
[   15.051148] 
[   15.051226] Memory state around the buggy address:
[   15.051425]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.051742]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   15.052110] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   15.052360]                                                           ^
[   15.052661]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.052941]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.053164] ==================================================================
[   14.906737] ==================================================================
[   14.907101] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.907505] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   14.908186] 
[   14.908298] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.908337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.908349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.908368] Call Trace:
[   14.908383]  <TASK>
[   14.908396]  dump_stack_lvl+0x73/0xb0
[   14.908422]  print_report+0xd1/0x650
[   14.908443]  ? __virt_addr_valid+0x1db/0x2d0
[   14.908465]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.908491]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.908516]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.908543]  kasan_report+0x140/0x180
[   14.908647]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.908678]  kasan_check_range+0x10c/0x1c0
[   14.908701]  __kasan_check_write+0x18/0x20
[   14.908723]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.908750]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.908777]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.908799]  ? trace_hardirqs_on+0x37/0xe0
[   14.908821]  ? kasan_bitops_generic+0x93/0x1c0
[   14.908847]  kasan_bitops_generic+0x122/0x1c0
[   14.908869]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.908890]  ? trace_hardirqs_on+0x37/0xe0
[   14.908912]  ? __pfx_read_tsc+0x10/0x10
[   14.908934]  ? ktime_get_ts64+0x86/0x230
[   14.908956]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.908982]  kunit_try_run_case+0x1a6/0x480
[   14.909005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.909040]  ? queued_spin_lock_slowpath+0x117/0xb40
[   14.909066]  ? __kthread_parkme+0x82/0x160
[   14.909087]  ? preempt_count_sub+0x50/0x80
[   14.909112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.909134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.909159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.909185]  kthread+0x324/0x6e0
[   14.909206]  ? trace_preempt_on+0x20/0xc0
[   14.909227]  ? __pfx_kthread+0x10/0x10
[   14.909249]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.909271]  ? calculate_sigpending+0x7b/0xa0
[   14.909292]  ? __pfx_kthread+0x10/0x10
[   14.909314]  ret_from_fork+0x41/0x80
[   14.909332]  ? __pfx_kthread+0x10/0x10
[   14.909353]  ret_from_fork_asm+0x1a/0x30
[   14.909384]  </TASK>
[   14.909393] 
[   14.918222] Allocated by task 269:
[   14.918352]  kasan_save_stack+0x45/0x70
[   14.918550]  kasan_save_track+0x18/0x40
[   14.918822]  kasan_save_alloc_info+0x3b/0x50
[   14.919050]  __kasan_kmalloc+0xb7/0xc0
[   14.919221]  __kmalloc_cache_noprof+0x18a/0x420
[   14.919373]  kasan_bitops_generic+0x93/0x1c0
[   14.919531]  kunit_try_run_case+0x1a6/0x480
[   14.920002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.920298]  kthread+0x324/0x6e0
[   14.920484]  ret_from_fork+0x41/0x80
[   14.920755]  ret_from_fork_asm+0x1a/0x30
[   14.920919] 
[   14.920990] The buggy address belongs to the object at ffff888101b5abe0
[   14.920990]  which belongs to the cache kmalloc-16 of size 16
[   14.921534] The buggy address is located 8 bytes inside of
[   14.921534]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   14.922117] 
[   14.922191] The buggy address belongs to the physical page:
[   14.922386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   14.922771] flags: 0x200000000000000(node=0|zone=2)
[   14.922984] page_type: f5(slab)
[   14.923133] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.923414] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.923761] page dumped because: kasan: bad access detected
[   14.924023] 
[   14.924117] Memory state around the buggy address:
[   14.924271]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.924484]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.924696] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.924994]                                                           ^
[   14.925517]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.925920]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.926169] ==================================================================
[   14.975206] ==================================================================
[   14.975545] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.976685] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   14.977455] 
[   14.977575] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.977863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.977878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.977898] Call Trace:
[   14.977913]  <TASK>
[   14.977929]  dump_stack_lvl+0x73/0xb0
[   14.977955]  print_report+0xd1/0x650
[   14.977976]  ? __virt_addr_valid+0x1db/0x2d0
[   14.977997]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.978035]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.978060]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.978087]  kasan_report+0x140/0x180
[   14.978108]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.978139]  kasan_check_range+0x10c/0x1c0
[   14.978162]  __kasan_check_write+0x18/0x20
[   14.978184]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.978211]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.978238]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.978261]  ? trace_hardirqs_on+0x37/0xe0
[   14.978282]  ? kasan_bitops_generic+0x93/0x1c0
[   14.978308]  kasan_bitops_generic+0x122/0x1c0
[   14.978331]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.978353]  ? trace_hardirqs_on+0x37/0xe0
[   14.978376]  ? __pfx_read_tsc+0x10/0x10
[   14.978397]  ? ktime_get_ts64+0x86/0x230
[   14.978418]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.978444]  kunit_try_run_case+0x1a6/0x480
[   14.978467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.978490]  ? queued_spin_lock_slowpath+0x117/0xb40
[   14.978516]  ? __kthread_parkme+0x82/0x160
[   14.978537]  ? preempt_count_sub+0x50/0x80
[   14.978561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.978583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.978609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.978635]  kthread+0x324/0x6e0
[   14.978655]  ? trace_preempt_on+0x20/0xc0
[   14.978677]  ? __pfx_kthread+0x10/0x10
[   14.978698]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.978719]  ? calculate_sigpending+0x7b/0xa0
[   14.978741]  ? __pfx_kthread+0x10/0x10
[   14.978763]  ret_from_fork+0x41/0x80
[   14.978781]  ? __pfx_kthread+0x10/0x10
[   14.978802]  ret_from_fork_asm+0x1a/0x30
[   14.978833]  </TASK>
[   14.978843] 
[   14.989239] Allocated by task 269:
[   14.989374]  kasan_save_stack+0x45/0x70
[   14.989518]  kasan_save_track+0x18/0x40
[   14.989912]  kasan_save_alloc_info+0x3b/0x50
[   14.990136]  __kasan_kmalloc+0xb7/0xc0
[   14.990327]  __kmalloc_cache_noprof+0x18a/0x420
[   14.990550]  kasan_bitops_generic+0x93/0x1c0
[   14.990728]  kunit_try_run_case+0x1a6/0x480
[   14.990901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.991170]  kthread+0x324/0x6e0
[   14.991305]  ret_from_fork+0x41/0x80
[   14.991489]  ret_from_fork_asm+0x1a/0x30
[   14.991677] 
[   14.991750] The buggy address belongs to the object at ffff888101b5abe0
[   14.991750]  which belongs to the cache kmalloc-16 of size 16
[   14.992113] The buggy address is located 8 bytes inside of
[   14.992113]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   14.992629] 
[   14.992721] The buggy address belongs to the physical page:
[   14.993951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   14.994308] flags: 0x200000000000000(node=0|zone=2)
[   14.994523] page_type: f5(slab)
[   14.995003] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.995717] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.996400] page dumped because: kasan: bad access detected
[   14.996891] 
[   14.997159] Memory state around the buggy address:
[   14.997393]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.997932]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.998500] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.999204]                                                           ^
[   14.999900]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.000363]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.000979] ==================================================================
[   14.946001] ==================================================================
[   14.946442] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.947005] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269
[   14.947327] 
[   14.947406] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.947443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.947455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.947475] Call Trace:
[   14.947488]  <TASK>
[   14.947500]  dump_stack_lvl+0x73/0xb0
[   14.947524]  print_report+0xd1/0x650
[   14.947646]  ? __virt_addr_valid+0x1db/0x2d0
[   14.947674]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.947701]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.947726]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.947752]  kasan_report+0x140/0x180
[   14.947773]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.947804]  kasan_check_range+0x10c/0x1c0
[   14.947827]  __kasan_check_write+0x18/0x20
[   14.947851]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.947877]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.947904]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.947927]  ? trace_hardirqs_on+0x37/0xe0
[   14.947949]  ? kasan_bitops_generic+0x93/0x1c0
[   14.947975]  kasan_bitops_generic+0x122/0x1c0
[   14.947998]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.948032]  ? trace_hardirqs_on+0x37/0xe0
[   14.948055]  ? __pfx_read_tsc+0x10/0x10
[   14.948078]  ? ktime_get_ts64+0x86/0x230
[   14.948099]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.948127]  kunit_try_run_case+0x1a6/0x480
[   14.948151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.948174]  ? queued_spin_lock_slowpath+0x117/0xb40
[   14.948199]  ? __kthread_parkme+0x82/0x160
[   14.948220]  ? preempt_count_sub+0x50/0x80
[   14.948244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.948268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.948293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.948319]  kthread+0x324/0x6e0
[   14.948341]  ? trace_preempt_on+0x20/0xc0
[   14.948362]  ? __pfx_kthread+0x10/0x10
[   14.948385]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.948406]  ? calculate_sigpending+0x7b/0xa0
[   14.948428]  ? __pfx_kthread+0x10/0x10
[   14.948450]  ret_from_fork+0x41/0x80
[   14.948468]  ? __pfx_kthread+0x10/0x10
[   14.948489]  ret_from_fork_asm+0x1a/0x30
[   14.948519]  </TASK>
[   14.948529] 
[   14.962304] Allocated by task 269:
[   14.962444]  kasan_save_stack+0x45/0x70
[   14.963212]  kasan_save_track+0x18/0x40
[   14.963933]  kasan_save_alloc_info+0x3b/0x50
[   14.964784]  __kasan_kmalloc+0xb7/0xc0
[   14.965306]  __kmalloc_cache_noprof+0x18a/0x420
[   14.965476]  kasan_bitops_generic+0x93/0x1c0
[   14.965654]  kunit_try_run_case+0x1a6/0x480
[   14.966218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.966432]  kthread+0x324/0x6e0
[   14.966682]  ret_from_fork+0x41/0x80
[   14.966985]  ret_from_fork_asm+0x1a/0x30
[   14.967298] 
[   14.967605] The buggy address belongs to the object at ffff888101b5abe0
[   14.967605]  which belongs to the cache kmalloc-16 of size 16
[   14.968107] The buggy address is located 8 bytes inside of
[   14.968107]  allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9)
[   14.968584] 
[   14.969004] The buggy address belongs to the physical page:
[   14.969220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a
[   14.969768] flags: 0x200000000000000(node=0|zone=2)
[   14.969990] page_type: f5(slab)
[   14.970316] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.970774] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.971343] page dumped because: kasan: bad access detected
[   14.971539] 
[   14.971637] Memory state around the buggy address:
[   14.972240]  ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.972547]  ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.973036] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.973451]                                                           ^
[   14.973863]  ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.974288]  ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.974738] ==================================================================