Hay
Date
Dec. 3, 2024, 11:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   33.798524] ==================================================================
[   33.799213] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.800656] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   33.802765] 
[   33.804074] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.805553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.806058] Hardware name: linux,dummy-virt (DT)
[   33.806811] Call trace:
[   33.807695]  show_stack+0x20/0x38 (C)
[   33.808262]  dump_stack_lvl+0x8c/0xd0
[   33.808771]  print_report+0x118/0x5e0
[   33.810417]  kasan_report+0xc8/0x118
[   33.810908]  __asan_report_load8_noabort+0x20/0x30
[   33.811639]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.812303]  kasan_bitops_generic+0x110/0x1c8
[   33.812929]  kunit_try_run_case+0x14c/0x3d0
[   33.813953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.814743]  kthread+0x24c/0x2d0
[   33.816118]  ret_from_fork+0x10/0x20
[   33.816781] 
[   33.817157] Allocated by task 250:
[   33.817709]  kasan_save_stack+0x3c/0x68
[   33.818259]  kasan_save_track+0x20/0x40
[   33.819441]  kasan_save_alloc_info+0x40/0x58
[   33.820103]  __kasan_kmalloc+0xd4/0xd8
[   33.820649]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.821279]  kasan_bitops_generic+0xa0/0x1c8
[   33.821939]  kunit_try_run_case+0x14c/0x3d0
[   33.822587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.823848]  kthread+0x24c/0x2d0
[   33.824420]  ret_from_fork+0x10/0x20
[   33.824892] 
[   33.825244] The buggy address belongs to the object at fff00000c5732780
[   33.825244]  which belongs to the cache kmalloc-16 of size 16
[   33.827595] The buggy address is located 8 bytes inside of
[   33.827595]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   33.828908] 
[   33.829193] The buggy address belongs to the physical page:
[   33.830134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   33.831118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.832445] page_type: f5(slab)
[   33.833149] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.834221] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.835352] page dumped because: kasan: bad access detected
[   33.836283] 
[   33.836672] Memory state around the buggy address:
[   33.837290]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.838146]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   33.839572] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.840903]                       ^
[   33.841415]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.842244]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.843075] ==================================================================
[   34.124449] ==================================================================
[   34.125086] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.125950] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.126895] 
[   34.127226] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.128481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.129185] Hardware name: linux,dummy-virt (DT)
[   34.130371] Call trace:
[   34.130781]  show_stack+0x20/0x38 (C)
[   34.131318]  dump_stack_lvl+0x8c/0xd0
[   34.131987]  print_report+0x118/0x5e0
[   34.133243]  kasan_report+0xc8/0x118
[   34.133915]  kasan_check_range+0x100/0x1a8
[   34.134663]  __kasan_check_write+0x20/0x30
[   34.135759]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.136536]  kasan_bitops_generic+0x110/0x1c8
[   34.137359]  kunit_try_run_case+0x14c/0x3d0
[   34.138080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.138806]  kthread+0x24c/0x2d0
[   34.140160]  ret_from_fork+0x10/0x20
[   34.140759] 
[   34.141115] Allocated by task 250:
[   34.141701]  kasan_save_stack+0x3c/0x68
[   34.142174]  kasan_save_track+0x20/0x40
[   34.142894]  kasan_save_alloc_info+0x40/0x58
[   34.143608]  __kasan_kmalloc+0xd4/0xd8
[   34.144292]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.145744]  kasan_bitops_generic+0xa0/0x1c8
[   34.146366]  kunit_try_run_case+0x14c/0x3d0
[   34.146942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.147742]  kthread+0x24c/0x2d0
[   34.148349]  ret_from_fork+0x10/0x20
[   34.148822] 
[   34.149203] The buggy address belongs to the object at fff00000c5732780
[   34.149203]  which belongs to the cache kmalloc-16 of size 16
[   34.150949] The buggy address is located 8 bytes inside of
[   34.150949]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.152299] 
[   34.154098] The buggy address belongs to the physical page:
[   34.155538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.156630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.157681] page_type: f5(slab)
[   34.158208] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.159196] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.160072] page dumped because: kasan: bad access detected
[   34.162238] 
[   34.162582] Memory state around the buggy address:
[   34.163239]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.164936]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.165790] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.166828]                       ^
[   34.168093]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.168915]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.169878] ==================================================================
[   33.891382] ==================================================================
[   33.892192] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.894398] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   33.895486] 
[   33.895849] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.897033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.897804] Hardware name: linux,dummy-virt (DT)
[   33.898471] Call trace:
[   33.898879]  show_stack+0x20/0x38 (C)
[   33.899653]  dump_stack_lvl+0x8c/0xd0
[   33.900343]  print_report+0x118/0x5e0
[   33.900804]  kasan_report+0xc8/0x118
[   33.902170]  __asan_report_load8_noabort+0x20/0x30
[   33.902822]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.903932]  kasan_bitops_generic+0x110/0x1c8
[   33.904598]  kunit_try_run_case+0x14c/0x3d0
[   33.905234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.905947]  kthread+0x24c/0x2d0
[   33.906584]  ret_from_fork+0x10/0x20
[   33.908030] 
[   33.908484] Allocated by task 250:
[   33.908750]  kasan_save_stack+0x3c/0x68
[   33.909049]  kasan_save_track+0x20/0x40
[   33.909359]  kasan_save_alloc_info+0x40/0x58
[   33.910702]  __kasan_kmalloc+0xd4/0xd8
[   33.911813]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.912408]  kasan_bitops_generic+0xa0/0x1c8
[   33.912727]  kunit_try_run_case+0x14c/0x3d0
[   33.913033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.913498]  kthread+0x24c/0x2d0
[   33.914118]  ret_from_fork+0x10/0x20
[   33.915473] 
[   33.915872] The buggy address belongs to the object at fff00000c5732780
[   33.915872]  which belongs to the cache kmalloc-16 of size 16
[   33.917522] The buggy address is located 8 bytes inside of
[   33.917522]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   33.919463] 
[   33.919871] The buggy address belongs to the physical page:
[   33.920761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   33.922763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.924172] page_type: f5(slab)
[   33.925593] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.926665] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.928002] page dumped because: kasan: bad access detected
[   33.928858] 
[   33.929224] Memory state around the buggy address:
[   33.929909]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.930863]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   33.931892] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.933109]                       ^
[   33.933625]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.935362]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.936557] ==================================================================
[   33.846763] ==================================================================
[   33.847815] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.848757] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   33.850168] 
[   33.850717] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.851991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.852648] Hardware name: linux,dummy-virt (DT)
[   33.853269] Call trace:
[   33.854094]  show_stack+0x20/0x38 (C)
[   33.854737]  dump_stack_lvl+0x8c/0xd0
[   33.855465]  print_report+0x118/0x5e0
[   33.856870]  kasan_report+0xc8/0x118
[   33.857388]  kasan_check_range+0x100/0x1a8
[   33.858059]  __kasan_check_write+0x20/0x30
[   33.858741]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.860044]  kasan_bitops_generic+0x110/0x1c8
[   33.860711]  kunit_try_run_case+0x14c/0x3d0
[   33.861316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.862167]  kthread+0x24c/0x2d0
[   33.862789]  ret_from_fork+0x10/0x20
[   33.863633] 
[   33.864003] Allocated by task 250:
[   33.864510]  kasan_save_stack+0x3c/0x68
[   33.865070]  kasan_save_track+0x20/0x40
[   33.866168]  kasan_save_alloc_info+0x40/0x58
[   33.866818]  __kasan_kmalloc+0xd4/0xd8
[   33.868078]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.868884]  kasan_bitops_generic+0xa0/0x1c8
[   33.869658]  kunit_try_run_case+0x14c/0x3d0
[   33.870244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.871043]  kthread+0x24c/0x2d0
[   33.871778]  ret_from_fork+0x10/0x20
[   33.872415] 
[   33.872662] The buggy address belongs to the object at fff00000c5732780
[   33.872662]  which belongs to the cache kmalloc-16 of size 16
[   33.874297] The buggy address is located 8 bytes inside of
[   33.874297]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   33.876160] 
[   33.876625] The buggy address belongs to the physical page:
[   33.877354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   33.878538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.879766] page_type: f5(slab)
[   33.880362] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.881392] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.882276] page dumped because: kasan: bad access detected
[   33.882959] 
[   33.884269] Memory state around the buggy address:
[   33.884803]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.885690]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   33.886627] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.887742]                       ^
[   33.888250]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.889213]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.890118] ==================================================================
[   34.075793] ==================================================================
[   34.076422] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.077754] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.079182] 
[   34.079928] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.081356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.082001] Hardware name: linux,dummy-virt (DT)
[   34.082641] Call trace:
[   34.083021]  show_stack+0x20/0x38 (C)
[   34.084073]  dump_stack_lvl+0x8c/0xd0
[   34.085219]  print_report+0x118/0x5e0
[   34.085786]  kasan_report+0xc8/0x118
[   34.086301]  kasan_check_range+0x100/0x1a8
[   34.087007]  __kasan_check_write+0x20/0x30
[   34.087645]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.088684]  kasan_bitops_generic+0x110/0x1c8
[   34.089198]  kunit_try_run_case+0x14c/0x3d0
[   34.089936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.090924]  kthread+0x24c/0x2d0
[   34.091945]  ret_from_fork+0x10/0x20
[   34.092600] 
[   34.092923] Allocated by task 250:
[   34.093986]  kasan_save_stack+0x3c/0x68
[   34.094527]  kasan_save_track+0x20/0x40
[   34.095043]  kasan_save_alloc_info+0x40/0x58
[   34.095764]  __kasan_kmalloc+0xd4/0xd8
[   34.096242]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.097017]  kasan_bitops_generic+0xa0/0x1c8
[   34.097817]  kunit_try_run_case+0x14c/0x3d0
[   34.098517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.099268]  kthread+0x24c/0x2d0
[   34.099805]  ret_from_fork+0x10/0x20
[   34.100818] 
[   34.101315] The buggy address belongs to the object at fff00000c5732780
[   34.101315]  which belongs to the cache kmalloc-16 of size 16
[   34.102629] The buggy address is located 8 bytes inside of
[   34.102629]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.105096] 
[   34.106139] The buggy address belongs to the physical page:
[   34.108897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.110650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.111833] page_type: f5(slab)
[   34.112620] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.113566] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.114472] page dumped because: kasan: bad access detected
[   34.115125] 
[   34.115919] Memory state around the buggy address:
[   34.116477]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.117292]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.118684] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.119312]                       ^
[   34.119888]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.120775]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.121402] ==================================================================
[   33.754615] ==================================================================
[   33.756426] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.757977] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   33.759366] 
[   33.759718] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.761068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.761881] Hardware name: linux,dummy-virt (DT)
[   33.762468] Call trace:
[   33.762887]  show_stack+0x20/0x38 (C)
[   33.763905]  dump_stack_lvl+0x8c/0xd0
[   33.764499]  print_report+0x118/0x5e0
[   33.765177]  kasan_report+0xc8/0x118
[   33.765670]  kasan_check_range+0x100/0x1a8
[   33.766436]  __kasan_check_write+0x20/0x30
[   33.767734]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.768462]  kasan_bitops_generic+0x110/0x1c8
[   33.769127]  kunit_try_run_case+0x14c/0x3d0
[   33.769752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.770543]  kthread+0x24c/0x2d0
[   33.771090]  ret_from_fork+0x10/0x20
[   33.772006] 
[   33.772365] Allocated by task 250:
[   33.773110]  kasan_save_stack+0x3c/0x68
[   33.773818]  kasan_save_track+0x20/0x40
[   33.774562]  kasan_save_alloc_info+0x40/0x58
[   33.775146]  __kasan_kmalloc+0xd4/0xd8
[   33.775741]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.776413]  kasan_bitops_generic+0xa0/0x1c8
[   33.777016]  kunit_try_run_case+0x14c/0x3d0
[   33.777677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.778510]  kthread+0x24c/0x2d0
[   33.779062]  ret_from_fork+0x10/0x20
[   33.779573] 
[   33.780018] The buggy address belongs to the object at fff00000c5732780
[   33.780018]  which belongs to the cache kmalloc-16 of size 16
[   33.781426] The buggy address is located 8 bytes inside of
[   33.781426]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   33.782866] 
[   33.783583] The buggy address belongs to the physical page:
[   33.784271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   33.785258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.786100] page_type: f5(slab)
[   33.786681] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.788448] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.789512] page dumped because: kasan: bad access detected
[   33.790158] 
[   33.790522] Memory state around the buggy address:
[   33.791213]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.792036]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   33.793371] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.794303]                       ^
[   33.794846]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.796049]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.796868] ==================================================================
[   34.032268] ==================================================================
[   34.032932] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.034187] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.035347] 
[   34.036623] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.038291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.039185] Hardware name: linux,dummy-virt (DT)
[   34.039981] Call trace:
[   34.040576]  show_stack+0x20/0x38 (C)
[   34.041229]  dump_stack_lvl+0x8c/0xd0
[   34.041876]  print_report+0x118/0x5e0
[   34.042437]  kasan_report+0xc8/0x118
[   34.043412]  __asan_report_load8_noabort+0x20/0x30
[   34.044159]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.044892]  kasan_bitops_generic+0x110/0x1c8
[   34.045971]  kunit_try_run_case+0x14c/0x3d0
[   34.046623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.048007]  kthread+0x24c/0x2d0
[   34.048516]  ret_from_fork+0x10/0x20
[   34.049107] 
[   34.049448] Allocated by task 250:
[   34.050118]  kasan_save_stack+0x3c/0x68
[   34.050696]  kasan_save_track+0x20/0x40
[   34.051458]  kasan_save_alloc_info+0x40/0x58
[   34.051886]  __kasan_kmalloc+0xd4/0xd8
[   34.053114]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.054165]  kasan_bitops_generic+0xa0/0x1c8
[   34.054809]  kunit_try_run_case+0x14c/0x3d0
[   34.055660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.056587]  kthread+0x24c/0x2d0
[   34.056865]  ret_from_fork+0x10/0x20
[   34.057167] 
[   34.057379] The buggy address belongs to the object at fff00000c5732780
[   34.057379]  which belongs to the cache kmalloc-16 of size 16
[   34.058070] The buggy address is located 8 bytes inside of
[   34.058070]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.058748] 
[   34.058928] The buggy address belongs to the physical page:
[   34.060533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.061503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.062147] page_type: f5(slab)
[   34.062820] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.064809] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.065678] page dumped because: kasan: bad access detected
[   34.066612] 
[   34.067290] Memory state around the buggy address:
[   34.068590]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.069785]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.070716] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.071858]                       ^
[   34.072559]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.073293]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.074172] ==================================================================
[   33.987497] ==================================================================
[   33.988440] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   33.989465] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   33.990460] 
[   33.990874] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.992713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.993400] Hardware name: linux,dummy-virt (DT)
[   33.994246] Call trace:
[   33.994763]  show_stack+0x20/0x38 (C)
[   33.996080]  dump_stack_lvl+0x8c/0xd0
[   33.996640]  print_report+0x118/0x5e0
[   33.997358]  kasan_report+0xc8/0x118
[   33.997957]  kasan_check_range+0x100/0x1a8
[   33.998614]  __kasan_check_write+0x20/0x30
[   33.999317]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.000091]  kasan_bitops_generic+0x110/0x1c8
[   34.000745]  kunit_try_run_case+0x14c/0x3d0
[   34.001728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.002531]  kthread+0x24c/0x2d0
[   34.003790]  ret_from_fork+0x10/0x20
[   34.004353] 
[   34.004651] Allocated by task 250:
[   34.005114]  kasan_save_stack+0x3c/0x68
[   34.005841]  kasan_save_track+0x20/0x40
[   34.006398]  kasan_save_alloc_info+0x40/0x58
[   34.007472]  __kasan_kmalloc+0xd4/0xd8
[   34.007987]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.008658]  kasan_bitops_generic+0xa0/0x1c8
[   34.009315]  kunit_try_run_case+0x14c/0x3d0
[   34.009946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.010646]  kthread+0x24c/0x2d0
[   34.011798]  ret_from_fork+0x10/0x20
[   34.012440] 
[   34.012779] The buggy address belongs to the object at fff00000c5732780
[   34.012779]  which belongs to the cache kmalloc-16 of size 16
[   34.014376] The buggy address is located 8 bytes inside of
[   34.014376]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.015936] 
[   34.016306] The buggy address belongs to the physical page:
[   34.017078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.018366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.019291] page_type: f5(slab)
[   34.019800] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.021776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.022935] page dumped because: kasan: bad access detected
[   34.023691] 
[   34.024021] Memory state around the buggy address:
[   34.025275]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.026238]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.027455] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.028358]                       ^
[   34.028831]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.029586]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030538] ==================================================================
[   34.173887] ==================================================================
[   34.174734] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.175936] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.176665] 
[   34.177023] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.179322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.179901] Hardware name: linux,dummy-virt (DT)
[   34.180518] Call trace:
[   34.180994]  show_stack+0x20/0x38 (C)
[   34.181689]  dump_stack_lvl+0x8c/0xd0
[   34.182179]  print_report+0x118/0x5e0
[   34.182885]  kasan_report+0xc8/0x118
[   34.183478]  __asan_report_load8_noabort+0x20/0x30
[   34.184185]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.184925]  kasan_bitops_generic+0x110/0x1c8
[   34.185558]  kunit_try_run_case+0x14c/0x3d0
[   34.186231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.187138]  kthread+0x24c/0x2d0
[   34.187714]  ret_from_fork+0x10/0x20
[   34.188296] 
[   34.188602] Allocated by task 250:
[   34.189173]  kasan_save_stack+0x3c/0x68
[   34.189784]  kasan_save_track+0x20/0x40
[   34.190587]  kasan_save_alloc_info+0x40/0x58
[   34.191251]  __kasan_kmalloc+0xd4/0xd8
[   34.192021]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.192661]  kasan_bitops_generic+0xa0/0x1c8
[   34.193347]  kunit_try_run_case+0x14c/0x3d0
[   34.193870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.194686]  kthread+0x24c/0x2d0
[   34.195250]  ret_from_fork+0x10/0x20
[   34.195820] 
[   34.196192] The buggy address belongs to the object at fff00000c5732780
[   34.196192]  which belongs to the cache kmalloc-16 of size 16
[   34.197599] The buggy address is located 8 bytes inside of
[   34.197599]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.199052] 
[   34.199353] The buggy address belongs to the physical page:
[   34.200007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.201230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.202210] page_type: f5(slab)
[   34.202878] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.203777] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.204885] page dumped because: kasan: bad access detected
[   34.205887] 
[   34.206420] Memory state around the buggy address:
[   34.207285]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.208526]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.209537] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.210441]                       ^
[   34.210931]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.211923]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.212789] ==================================================================
[   33.938160] ==================================================================
[   33.938911] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   33.941175] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   33.942297] 
[   33.942749] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.944955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.945590] Hardware name: linux,dummy-virt (DT)
[   33.945982] Call trace:
[   33.946201]  show_stack+0x20/0x38 (C)
[   33.946940]  dump_stack_lvl+0x8c/0xd0
[   33.947859]  print_report+0x118/0x5e0
[   33.948767]  kasan_report+0xc8/0x118
[   33.949561]  kasan_check_range+0x100/0x1a8
[   33.950429]  __kasan_check_write+0x20/0x30
[   33.951533]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   33.952758]  kasan_bitops_generic+0x110/0x1c8
[   33.953363]  kunit_try_run_case+0x14c/0x3d0
[   33.954033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.954873]  kthread+0x24c/0x2d0
[   33.955448]  ret_from_fork+0x10/0x20
[   33.956065] 
[   33.956449] Allocated by task 250:
[   33.956955]  kasan_save_stack+0x3c/0x68
[   33.958509]  kasan_save_track+0x20/0x40
[   33.959002]  kasan_save_alloc_info+0x40/0x58
[   33.960030]  __kasan_kmalloc+0xd4/0xd8
[   33.960656]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.961294]  kasan_bitops_generic+0xa0/0x1c8
[   33.961943]  kunit_try_run_case+0x14c/0x3d0
[   33.962572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.963578]  kthread+0x24c/0x2d0
[   33.964074]  ret_from_fork+0x10/0x20
[   33.964601] 
[   33.965011] The buggy address belongs to the object at fff00000c5732780
[   33.965011]  which belongs to the cache kmalloc-16 of size 16
[   33.967211] The buggy address is located 8 bytes inside of
[   33.967211]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   33.968925] 
[   33.969258] The buggy address belongs to the physical page:
[   33.970128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   33.970765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.972616] page_type: f5(slab)
[   33.973568] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.974803] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.975945] page dumped because: kasan: bad access detected
[   33.976868] 
[   33.977230] Memory state around the buggy address:
[   33.977961]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.979823]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   33.980635] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.981590]                       ^
[   33.982056]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.982871]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.984180] ==================================================================

[   29.246598] ==================================================================
[   29.247795] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   29.248509] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.248876] 
[   29.249067] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.249783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.250206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.252115] Call Trace:
[   29.252423]  <TASK>
[   29.253899]  dump_stack_lvl+0x73/0xb0
[   29.254201]  print_report+0xd1/0x640
[   29.254463]  ? __virt_addr_valid+0x1db/0x2d0
[   29.254838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.255381]  kasan_report+0x102/0x140
[   29.256666]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   29.257309]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   29.257929]  kasan_check_range+0x10c/0x1c0
[   29.258358]  __kasan_check_write+0x18/0x20
[   29.258738]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   29.259303]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.259708]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.260196]  ? trace_hardirqs_on+0x37/0xe0
[   29.260664]  ? kasan_bitops_generic+0x93/0x1c0
[   29.260981]  kasan_bitops_generic+0x117/0x1c0
[   29.261455]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.261922]  ? __pfx_read_tsc+0x10/0x10
[   29.262258]  ? ktime_get_ts64+0x86/0x230
[   29.262696]  kunit_try_run_case+0x1b3/0x490
[   29.262991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.263486]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.263897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.264313]  ? __kthread_parkme+0x82/0x160
[   29.264693]  ? preempt_count_sub+0x50/0x80
[   29.265113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.265523]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.265978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.266370]  kthread+0x257/0x310
[   29.266618]  ? __pfx_kthread+0x10/0x10
[   29.266881]  ret_from_fork+0x41/0x80
[   29.267286]  ? __pfx_kthread+0x10/0x10
[   29.267773]  ret_from_fork_asm+0x1a/0x30
[   29.268215]  </TASK>
[   29.268510] 
[   29.268717] Allocated by task 270:
[   29.269076]  kasan_save_stack+0x3d/0x60
[   29.269479]  kasan_save_track+0x18/0x40
[   29.269912]  kasan_save_alloc_info+0x3b/0x50
[   29.270217]  __kasan_kmalloc+0xb7/0xc0
[   29.270506]  __kmalloc_cache_noprof+0x184/0x410
[   29.270927]  kasan_bitops_generic+0x93/0x1c0
[   29.271353]  kunit_try_run_case+0x1b3/0x490
[   29.271869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.272218]  kthread+0x257/0x310
[   29.272458]  ret_from_fork+0x41/0x80
[   29.272865]  ret_from_fork_asm+0x1a/0x30
[   29.273268] 
[   29.273499] The buggy address belongs to the object at ffff888101adffe0
[   29.273499]  which belongs to the cache kmalloc-16 of size 16
[   29.274205] The buggy address is located 8 bytes inside of
[   29.274205]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.275358] 
[   29.275603] The buggy address belongs to the physical page:
[   29.275934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.276592] flags: 0x200000000000000(node=0|zone=2)
[   29.277048] page_type: f5(slab)
[   29.277321] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.277702] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.278306] page dumped because: kasan: bad access detected
[   29.278903] 
[   29.279232] Memory state around the buggy address:
[   29.279796]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.280288]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.281183] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.281535]                                                           ^
[   29.282001]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.282610]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.283363] ==================================================================
[   29.319273] ==================================================================
[   29.320047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   29.320905] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.321541] 
[   29.321777] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.322631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.323012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.323881] Call Trace:
[   29.324110]  <TASK>
[   29.324379]  dump_stack_lvl+0x73/0xb0
[   29.324769]  print_report+0xd1/0x640
[   29.325040]  ? __virt_addr_valid+0x1db/0x2d0
[   29.325505]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.326149]  kasan_report+0x102/0x140
[   29.326513]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   29.326900]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   29.327264]  kasan_check_range+0x10c/0x1c0
[   29.327583]  __kasan_check_write+0x18/0x20
[   29.328003]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   29.328608]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.329146]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.329586]  ? trace_hardirqs_on+0x37/0xe0
[   29.329929]  ? kasan_bitops_generic+0x93/0x1c0
[   29.330253]  kasan_bitops_generic+0x117/0x1c0
[   29.330818]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.331156]  ? __pfx_read_tsc+0x10/0x10
[   29.331422]  ? ktime_get_ts64+0x86/0x230
[   29.331688]  kunit_try_run_case+0x1b3/0x490
[   29.331969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.332438]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.332994]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.333484]  ? __kthread_parkme+0x82/0x160
[   29.333997]  ? preempt_count_sub+0x50/0x80
[   29.334440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.334855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.335414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.335923]  kthread+0x257/0x310
[   29.336279]  ? __pfx_kthread+0x10/0x10
[   29.336672]  ret_from_fork+0x41/0x80
[   29.337047]  ? __pfx_kthread+0x10/0x10
[   29.337439]  ret_from_fork_asm+0x1a/0x30
[   29.338537]  </TASK>
[   29.338728] 
[   29.338879] Allocated by task 270:
[   29.339122]  kasan_save_stack+0x3d/0x60
[   29.339519]  kasan_save_track+0x18/0x40
[   29.339911]  kasan_save_alloc_info+0x3b/0x50
[   29.340349]  __kasan_kmalloc+0xb7/0xc0
[   29.340841]  __kmalloc_cache_noprof+0x184/0x410
[   29.341158]  kasan_bitops_generic+0x93/0x1c0
[   29.341436]  kunit_try_run_case+0x1b3/0x490
[   29.341960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.342470]  kthread+0x257/0x310
[   29.342823]  ret_from_fork+0x41/0x80
[   29.343163]  ret_from_fork_asm+0x1a/0x30
[   29.343615] 
[   29.343770] The buggy address belongs to the object at ffff888101adffe0
[   29.343770]  which belongs to the cache kmalloc-16 of size 16
[   29.346133] The buggy address is located 8 bytes inside of
[   29.346133]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.349147] 
[   29.349391] The buggy address belongs to the physical page:
[   29.349881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.350294] flags: 0x200000000000000(node=0|zone=2)
[   29.350591] page_type: f5(slab)
[   29.350816] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.353405] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.354086] page dumped because: kasan: bad access detected
[   29.355947] 
[   29.356191] Memory state around the buggy address:
[   29.356748]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.357387]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.359306] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.360091]                                                           ^
[   29.360778]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.362006]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.362387] ==================================================================
[   29.164280] ==================================================================
[   29.164892] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   29.165876] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.166461] 
[   29.166954] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.167850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.168289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.169628] Call Trace:
[   29.169854]  <TASK>
[   29.170244]  dump_stack_lvl+0x73/0xb0
[   29.170916]  print_report+0xd1/0x640
[   29.171300]  ? __virt_addr_valid+0x1db/0x2d0
[   29.171763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.172432]  kasan_report+0x102/0x140
[   29.172815]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   29.173401]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   29.173807]  kasan_check_range+0x10c/0x1c0
[   29.174296]  __kasan_check_write+0x18/0x20
[   29.174686]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   29.175285]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.178695]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.179071]  ? trace_hardirqs_on+0x37/0xe0
[   29.179477]  ? kasan_bitops_generic+0x93/0x1c0
[   29.179996]  kasan_bitops_generic+0x117/0x1c0
[   29.180500]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.180904]  ? __pfx_read_tsc+0x10/0x10
[   29.181345]  ? ktime_get_ts64+0x86/0x230
[   29.181742]  kunit_try_run_case+0x1b3/0x490
[   29.182339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.182688]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.183372]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.183831]  ? __kthread_parkme+0x82/0x160
[   29.184272]  ? preempt_count_sub+0x50/0x80
[   29.184782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.186134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.186532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.187087]  kthread+0x257/0x310
[   29.187353]  ? __pfx_kthread+0x10/0x10
[   29.187848]  ret_from_fork+0x41/0x80
[   29.188440]  ? __pfx_kthread+0x10/0x10
[   29.189392]  ret_from_fork_asm+0x1a/0x30
[   29.189977]  </TASK>
[   29.190264] 
[   29.190498] Allocated by task 270:
[   29.190818]  kasan_save_stack+0x3d/0x60
[   29.191128]  kasan_save_track+0x18/0x40
[   29.191578]  kasan_save_alloc_info+0x3b/0x50
[   29.191955]  __kasan_kmalloc+0xb7/0xc0
[   29.192368]  __kmalloc_cache_noprof+0x184/0x410
[   29.192665]  kasan_bitops_generic+0x93/0x1c0
[   29.193166]  kunit_try_run_case+0x1b3/0x490
[   29.193783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.194219]  kthread+0x257/0x310
[   29.194658]  ret_from_fork+0x41/0x80
[   29.194950]  ret_from_fork_asm+0x1a/0x30
[   29.195403] 
[   29.195569] The buggy address belongs to the object at ffff888101adffe0
[   29.195569]  which belongs to the cache kmalloc-16 of size 16
[   29.196519] The buggy address is located 8 bytes inside of
[   29.196519]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.197348] 
[   29.197659] The buggy address belongs to the physical page:
[   29.198084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.198653] flags: 0x200000000000000(node=0|zone=2)
[   29.199090] page_type: f5(slab)
[   29.199472] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.200130] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.200753] page dumped because: kasan: bad access detected
[   29.201043] 
[   29.201268] Memory state around the buggy address:
[   29.201839]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.202724]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.203143] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.203880]                                                           ^
[   29.204489]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.204885]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.205501] ==================================================================
[   29.119015] ==================================================================
[   29.120418] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   29.121160] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.122000] 
[   29.122317] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.123126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.123449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.124215] Call Trace:
[   29.124432]  <TASK>
[   29.124688]  dump_stack_lvl+0x73/0xb0
[   29.125250]  print_report+0xd1/0x640
[   29.125735]  ? __virt_addr_valid+0x1db/0x2d0
[   29.126413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.126794]  kasan_report+0x102/0x140
[   29.127269]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   29.127893]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   29.128532]  kasan_check_range+0x10c/0x1c0
[   29.128819]  __kasan_check_write+0x18/0x20
[   29.129301]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   29.129930]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.130490]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.130975]  ? trace_hardirqs_on+0x37/0xe0
[   29.133175]  ? kasan_bitops_generic+0x93/0x1c0
[   29.133735]  kasan_bitops_generic+0x117/0x1c0
[   29.134517]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.135105]  ? __pfx_read_tsc+0x10/0x10
[   29.135383]  ? ktime_get_ts64+0x86/0x230
[   29.135862]  kunit_try_run_case+0x1b3/0x490
[   29.136341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.136841]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.137207]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.137755]  ? __kthread_parkme+0x82/0x160
[   29.138217]  ? preempt_count_sub+0x50/0x80
[   29.138681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.139985]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.140642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.140956]  kthread+0x257/0x310
[   29.142213]  ? __pfx_kthread+0x10/0x10
[   29.143141]  ret_from_fork+0x41/0x80
[   29.143415]  ? __pfx_kthread+0x10/0x10
[   29.143846]  ret_from_fork_asm+0x1a/0x30
[   29.144260]  </TASK>
[   29.144458] 
[   29.144662] Allocated by task 270:
[   29.145003]  kasan_save_stack+0x3d/0x60
[   29.145670]  kasan_save_track+0x18/0x40
[   29.146116]  kasan_save_alloc_info+0x3b/0x50
[   29.146945]  __kasan_kmalloc+0xb7/0xc0
[   29.147387]  __kmalloc_cache_noprof+0x184/0x410
[   29.148218]  kasan_bitops_generic+0x93/0x1c0
[   29.148743]  kunit_try_run_case+0x1b3/0x490
[   29.149148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.150194]  kthread+0x257/0x310
[   29.150871]  ret_from_fork+0x41/0x80
[   29.151184]  ret_from_fork_asm+0x1a/0x30
[   29.151606] 
[   29.151853] The buggy address belongs to the object at ffff888101adffe0
[   29.151853]  which belongs to the cache kmalloc-16 of size 16
[   29.152680] The buggy address is located 8 bytes inside of
[   29.152680]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.153418] 
[   29.154560] The buggy address belongs to the physical page:
[   29.154857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.155552] flags: 0x200000000000000(node=0|zone=2)
[   29.155891] page_type: f5(slab)
[   29.156293] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.156817] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.157313] page dumped because: kasan: bad access detected
[   29.157855] 
[   29.158149] Memory state around the buggy address:
[   29.158657]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.159116]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.159873] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.160344]                                                           ^
[   29.160721]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.161378]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.161985] ==================================================================
[   29.284419] ==================================================================
[   29.285112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   29.286188] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.286623] 
[   29.286801] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.287582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.288155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.289228] Call Trace:
[   29.289441]  <TASK>
[   29.289634]  dump_stack_lvl+0x73/0xb0
[   29.289915]  print_report+0xd1/0x640
[   29.290292]  ? __virt_addr_valid+0x1db/0x2d0
[   29.290810]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.291340]  kasan_report+0x102/0x140
[   29.291871]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   29.292420]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   29.292967]  kasan_check_range+0x10c/0x1c0
[   29.293285]  __kasan_check_write+0x18/0x20
[   29.293559]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   29.293880]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.294484]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.294951]  ? trace_hardirqs_on+0x37/0xe0
[   29.295379]  ? kasan_bitops_generic+0x93/0x1c0
[   29.295852]  kasan_bitops_generic+0x117/0x1c0
[   29.296302]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.296976]  ? __pfx_read_tsc+0x10/0x10
[   29.297284]  ? ktime_get_ts64+0x86/0x230
[   29.297564]  kunit_try_run_case+0x1b3/0x490
[   29.297843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.298151]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.298453]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.298761]  ? __kthread_parkme+0x82/0x160
[   29.299032]  ? preempt_count_sub+0x50/0x80
[   29.299479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.299942]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.300520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.301024]  kthread+0x257/0x310
[   29.301419]  ? __pfx_kthread+0x10/0x10
[   29.301833]  ret_from_fork+0x41/0x80
[   29.302223]  ? __pfx_kthread+0x10/0x10
[   29.302665]  ret_from_fork_asm+0x1a/0x30
[   29.303113]  </TASK>
[   29.303384] 
[   29.303635] Allocated by task 270:
[   29.303865]  kasan_save_stack+0x3d/0x60
[   29.304191]  kasan_save_track+0x18/0x40
[   29.304604]  kasan_save_alloc_info+0x3b/0x50
[   29.305012]  __kasan_kmalloc+0xb7/0xc0
[   29.305378]  __kmalloc_cache_noprof+0x184/0x410
[   29.305737]  kasan_bitops_generic+0x93/0x1c0
[   29.306014]  kunit_try_run_case+0x1b3/0x490
[   29.306294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.306714]  kthread+0x257/0x310
[   29.307230]  ret_from_fork+0x41/0x80
[   29.307644]  ret_from_fork_asm+0x1a/0x30
[   29.308034] 
[   29.308255] The buggy address belongs to the object at ffff888101adffe0
[   29.308255]  which belongs to the cache kmalloc-16 of size 16
[   29.309428] The buggy address is located 8 bytes inside of
[   29.309428]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.310106] 
[   29.310266] The buggy address belongs to the physical page:
[   29.310554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.310943] flags: 0x200000000000000(node=0|zone=2)
[   29.311441] page_type: f5(slab)
[   29.311790] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.312807] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.313901] page dumped because: kasan: bad access detected
[   29.314390] 
[   29.314656] Memory state around the buggy address:
[   29.315106]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.315735]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.316376] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.316962]                                                           ^
[   29.317318]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.317672]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.318016] ==================================================================
[   29.019341] ==================================================================
[   29.020498] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   29.021005] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.021335] 
[   29.021503] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.023358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.024068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.025372] Call Trace:
[   29.025713]  <TASK>
[   29.026303]  dump_stack_lvl+0x73/0xb0
[   29.027175]  print_report+0xd1/0x640
[   29.027604]  ? __virt_addr_valid+0x1db/0x2d0
[   29.028249]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.028987]  kasan_report+0x102/0x140
[   29.029401]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   29.029952]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   29.031147]  kasan_check_range+0x10c/0x1c0
[   29.031452]  __kasan_check_write+0x18/0x20
[   29.032108]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   29.032979]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.033515]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.033894]  ? trace_hardirqs_on+0x37/0xe0
[   29.034229]  ? kasan_bitops_generic+0x93/0x1c0
[   29.035801]  kasan_bitops_generic+0x117/0x1c0
[   29.036265]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.036635]  ? __pfx_read_tsc+0x10/0x10
[   29.037188]  ? ktime_get_ts64+0x86/0x230
[   29.037515]  kunit_try_run_case+0x1b3/0x490
[   29.038312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.039317]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.040212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.040511]  ? __kthread_parkme+0x82/0x160
[   29.041529]  ? preempt_count_sub+0x50/0x80
[   29.041799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.042357]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.042866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.043291]  kthread+0x257/0x310
[   29.043571]  ? __pfx_kthread+0x10/0x10
[   29.043869]  ret_from_fork+0x41/0x80
[   29.045086]  ? __pfx_kthread+0x10/0x10
[   29.046087]  ret_from_fork_asm+0x1a/0x30
[   29.047024]  </TASK>
[   29.047378] 
[   29.047608] Allocated by task 270:
[   29.048187]  kasan_save_stack+0x3d/0x60
[   29.048741]  kasan_save_track+0x18/0x40
[   29.049601]  kasan_save_alloc_info+0x3b/0x50
[   29.049981]  __kasan_kmalloc+0xb7/0xc0
[   29.050322]  __kmalloc_cache_noprof+0x184/0x410
[   29.050950]  kasan_bitops_generic+0x93/0x1c0
[   29.051302]  kunit_try_run_case+0x1b3/0x490
[   29.051803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.052233]  kthread+0x257/0x310
[   29.052915]  ret_from_fork+0x41/0x80
[   29.053303]  ret_from_fork_asm+0x1a/0x30
[   29.054570] 
[   29.054834] The buggy address belongs to the object at ffff888101adffe0
[   29.054834]  which belongs to the cache kmalloc-16 of size 16
[   29.055718] The buggy address is located 8 bytes inside of
[   29.055718]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.056697] 
[   29.057358] The buggy address belongs to the physical page:
[   29.058071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.058655] flags: 0x200000000000000(node=0|zone=2)
[   29.059403] page_type: f5(slab)
[   29.059719] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.060631] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.061829] page dumped because: kasan: bad access detected
[   29.062389] 
[   29.062557] Memory state around the buggy address:
[   29.063139]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.063741]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.064508] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.065374]                                                           ^
[   29.065940]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.066583]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.067925] ==================================================================
[   29.208956] ==================================================================
[   29.209407] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   29.210876] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.211398] 
[   29.211641] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.212274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.212531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.213309] Call Trace:
[   29.213724]  <TASK>
[   29.213996]  dump_stack_lvl+0x73/0xb0
[   29.214464]  print_report+0xd1/0x640
[   29.214826]  ? __virt_addr_valid+0x1db/0x2d0
[   29.215147]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.215616]  kasan_report+0x102/0x140
[   29.216118]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   29.216719]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   29.217299]  kasan_check_range+0x10c/0x1c0
[   29.217839]  __kasan_check_write+0x18/0x20
[   29.218167]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   29.218592]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.220282]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.221308]  ? trace_hardirqs_on+0x37/0xe0
[   29.222045]  ? kasan_bitops_generic+0x93/0x1c0
[   29.222443]  kasan_bitops_generic+0x117/0x1c0
[   29.223069]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.223805]  ? __pfx_read_tsc+0x10/0x10
[   29.224165]  ? ktime_get_ts64+0x86/0x230
[   29.224706]  kunit_try_run_case+0x1b3/0x490
[   29.225023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.225459]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.225855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.226253]  ? __kthread_parkme+0x82/0x160
[   29.227284]  ? preempt_count_sub+0x50/0x80
[   29.227627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.228235]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.228726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.229235]  kthread+0x257/0x310
[   29.229579]  ? __pfx_kthread+0x10/0x10
[   29.229878]  ret_from_fork+0x41/0x80
[   29.230221]  ? __pfx_kthread+0x10/0x10
[   29.230649]  ret_from_fork_asm+0x1a/0x30
[   29.230984]  </TASK>
[   29.231254] 
[   29.231482] Allocated by task 270:
[   29.231736]  kasan_save_stack+0x3d/0x60
[   29.232117]  kasan_save_track+0x18/0x40
[   29.232372]  kasan_save_alloc_info+0x3b/0x50
[   29.232691]  __kasan_kmalloc+0xb7/0xc0
[   29.233136]  __kmalloc_cache_noprof+0x184/0x410
[   29.233641]  kasan_bitops_generic+0x93/0x1c0
[   29.234082]  kunit_try_run_case+0x1b3/0x490
[   29.234418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.234802]  kthread+0x257/0x310
[   29.235034]  ret_from_fork+0x41/0x80
[   29.235404]  ret_from_fork_asm+0x1a/0x30
[   29.235811] 
[   29.236004] The buggy address belongs to the object at ffff888101adffe0
[   29.236004]  which belongs to the cache kmalloc-16 of size 16
[   29.236907] The buggy address is located 8 bytes inside of
[   29.236907]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.237722] 
[   29.237895] The buggy address belongs to the physical page:
[   29.238322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.239006] flags: 0x200000000000000(node=0|zone=2)
[   29.239417] page_type: f5(slab)
[   29.239741] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.240247] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.240726] page dumped because: kasan: bad access detected
[   29.241211] 
[   29.241418] Memory state around the buggy address:
[   29.241811]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.242265]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.242975] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.243421]                                                           ^
[   29.243845]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.244452]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.244948] ==================================================================
[   29.070069] ==================================================================
[   29.070724] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   29.071623] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.072364] 
[   29.073263] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.074008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.074676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.075477] Call Trace:
[   29.075906]  <TASK>
[   29.076277]  dump_stack_lvl+0x73/0xb0
[   29.076702]  print_report+0xd1/0x640
[   29.077202]  ? __virt_addr_valid+0x1db/0x2d0
[   29.078230]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.078957]  kasan_report+0x102/0x140
[   29.079372]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   29.080210]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   29.080732]  kasan_check_range+0x10c/0x1c0
[   29.081181]  __kasan_check_write+0x18/0x20
[   29.081718]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   29.082734]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.083303]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.084011]  ? trace_hardirqs_on+0x37/0xe0
[   29.084385]  ? kasan_bitops_generic+0x93/0x1c0
[   29.084934]  kasan_bitops_generic+0x117/0x1c0
[   29.085490]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.085972]  ? __pfx_read_tsc+0x10/0x10
[   29.086488]  ? ktime_get_ts64+0x86/0x230
[   29.087125]  kunit_try_run_case+0x1b3/0x490
[   29.087923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.088403]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.088987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.089737]  ? __kthread_parkme+0x82/0x160
[   29.090283]  ? preempt_count_sub+0x50/0x80
[   29.090806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.091413]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.092040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.092969]  kthread+0x257/0x310
[   29.093347]  ? __pfx_kthread+0x10/0x10
[   29.094312]  ret_from_fork+0x41/0x80
[   29.094677]  ? __pfx_kthread+0x10/0x10
[   29.095296]  ret_from_fork_asm+0x1a/0x30
[   29.095756]  </TASK>
[   29.096067] 
[   29.096254] Allocated by task 270:
[   29.096830]  kasan_save_stack+0x3d/0x60
[   29.097389]  kasan_save_track+0x18/0x40
[   29.097705]  kasan_save_alloc_info+0x3b/0x50
[   29.098192]  __kasan_kmalloc+0xb7/0xc0
[   29.098772]  __kmalloc_cache_noprof+0x184/0x410
[   29.099369]  kasan_bitops_generic+0x93/0x1c0
[   29.099667]  kunit_try_run_case+0x1b3/0x490
[   29.100728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.101244]  kthread+0x257/0x310
[   29.101538]  ret_from_fork+0x41/0x80
[   29.102116]  ret_from_fork_asm+0x1a/0x30
[   29.102542] 
[   29.102827] The buggy address belongs to the object at ffff888101adffe0
[   29.102827]  which belongs to the cache kmalloc-16 of size 16
[   29.104378] The buggy address is located 8 bytes inside of
[   29.104378]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.105335] 
[   29.105487] The buggy address belongs to the physical page:
[   29.106179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.107617] flags: 0x200000000000000(node=0|zone=2)
[   29.108358] page_type: f5(slab)
[   29.108919] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.109498] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.110186] page dumped because: kasan: bad access detected
[   29.110820] 
[   29.111027] Memory state around the buggy address:
[   29.111907]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.112718]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.113699] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.114229]                                                           ^
[   29.115068]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.115850]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.116501] ==================================================================