Hay
Date
Dec. 4, 2024, 3:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   35.620370] ==================================================================
[   35.621885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   35.623406] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.624196] 
[   35.624569] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.625879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.626511] Hardware name: linux,dummy-virt (DT)
[   35.627834] Call trace:
[   35.628263]  show_stack+0x20/0x38 (C)
[   35.628759]  dump_stack_lvl+0x8c/0xd0
[   35.629270]  print_report+0x118/0x5e0
[   35.629819]  kasan_report+0xc8/0x118
[   35.631145]  kasan_check_range+0x100/0x1a8
[   35.631933]  __kasan_check_write+0x20/0x30
[   35.632613]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   35.633482]  kasan_bitops_generic+0x110/0x1c8
[   35.635134]  kunit_try_run_case+0x14c/0x3d0
[   35.635943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.636902]  kthread+0x24c/0x2d0
[   35.637583]  ret_from_fork+0x10/0x20
[   35.638696] 
[   35.639037] Allocated by task 249:
[   35.639682]  kasan_save_stack+0x3c/0x68
[   35.640189]  kasan_save_track+0x20/0x40
[   35.640874]  kasan_save_alloc_info+0x40/0x58
[   35.641402]  __kasan_kmalloc+0xd4/0xd8
[   35.642990]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.643773]  kasan_bitops_generic+0xa0/0x1c8
[   35.644329]  kunit_try_run_case+0x14c/0x3d0
[   35.645044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.645913]  kthread+0x24c/0x2d0
[   35.646717]  ret_from_fork+0x10/0x20
[   35.647395] 
[   35.647837] The buggy address belongs to the object at fff00000c6153d80
[   35.647837]  which belongs to the cache kmalloc-16 of size 16
[   35.649339] The buggy address is located 8 bytes inside of
[   35.649339]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.651739] 
[   35.652442] The buggy address belongs to the physical page:
[   35.653442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.654934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.656036] page_type: f5(slab)
[   35.656879] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.658322] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.659575] page dumped because: kasan: bad access detected
[   35.660855] 
[   35.661184] Memory state around the buggy address:
[   35.662231]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.664300]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.665264] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.666526]                       ^
[   35.668325]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.669473]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.670653] ==================================================================
[   35.718215] ==================================================================
[   35.719056] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   35.719908] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.720957] 
[   35.721340] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.723427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.724070] Hardware name: linux,dummy-virt (DT)
[   35.725138] Call trace:
[   35.725459]  show_stack+0x20/0x38 (C)
[   35.726146]  dump_stack_lvl+0x8c/0xd0
[   35.727494]  print_report+0x118/0x5e0
[   35.728280]  kasan_report+0xc8/0x118
[   35.728872]  __asan_report_load8_noabort+0x20/0x30
[   35.729678]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   35.730414]  kasan_bitops_generic+0x110/0x1c8
[   35.731055]  kunit_try_run_case+0x14c/0x3d0
[   35.732050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.732701]  kthread+0x24c/0x2d0
[   35.733357]  ret_from_fork+0x10/0x20
[   35.734566] 
[   35.734946] Allocated by task 249:
[   35.735451]  kasan_save_stack+0x3c/0x68
[   35.736131]  kasan_save_track+0x20/0x40
[   35.737357]  kasan_save_alloc_info+0x40/0x58
[   35.738431]  __kasan_kmalloc+0xd4/0xd8
[   35.739234]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.740006]  kasan_bitops_generic+0xa0/0x1c8
[   35.740869]  kunit_try_run_case+0x14c/0x3d0
[   35.741579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.742361]  kthread+0x24c/0x2d0
[   35.742933]  ret_from_fork+0x10/0x20
[   35.743504] 
[   35.744323] The buggy address belongs to the object at fff00000c6153d80
[   35.744323]  which belongs to the cache kmalloc-16 of size 16
[   35.745667] The buggy address is located 8 bytes inside of
[   35.745667]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.748256] 
[   35.748496] The buggy address belongs to the physical page:
[   35.749390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.750930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.751809] page_type: f5(slab)
[   35.752362] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.753397] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.755208] page dumped because: kasan: bad access detected
[   35.756469] 
[   35.756792] Memory state around the buggy address:
[   35.757860]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.759135]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.759969] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.761230]                       ^
[   35.761738]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.763168]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.763608] ==================================================================
[   35.476872] ==================================================================
[   35.477826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   35.478958] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.481082] 
[   35.481895] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.483533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.484084] Hardware name: linux,dummy-virt (DT)
[   35.484936] Call trace:
[   35.485321]  show_stack+0x20/0x38 (C)
[   35.486130]  dump_stack_lvl+0x8c/0xd0
[   35.486567]  print_report+0x118/0x5e0
[   35.487047]  kasan_report+0xc8/0x118
[   35.487526]  __asan_report_load8_noabort+0x20/0x30
[   35.488644]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   35.489069]  kasan_bitops_generic+0x110/0x1c8
[   35.489394]  kunit_try_run_case+0x14c/0x3d0
[   35.489903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.491768]  kthread+0x24c/0x2d0
[   35.492336]  ret_from_fork+0x10/0x20
[   35.493108] 
[   35.493616] Allocated by task 249:
[   35.494447]  kasan_save_stack+0x3c/0x68
[   35.494976]  kasan_save_track+0x20/0x40
[   35.495856]  kasan_save_alloc_info+0x40/0x58
[   35.496407]  __kasan_kmalloc+0xd4/0xd8
[   35.496998]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.498227]  kasan_bitops_generic+0xa0/0x1c8
[   35.499083]  kunit_try_run_case+0x14c/0x3d0
[   35.499706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.500609]  kthread+0x24c/0x2d0
[   35.501170]  ret_from_fork+0x10/0x20
[   35.501744] 
[   35.502731] The buggy address belongs to the object at fff00000c6153d80
[   35.502731]  which belongs to the cache kmalloc-16 of size 16
[   35.504149] The buggy address is located 8 bytes inside of
[   35.504149]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.506139] 
[   35.506960] The buggy address belongs to the physical page:
[   35.507936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.508941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.509839] page_type: f5(slab)
[   35.510319] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.511474] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.512787] page dumped because: kasan: bad access detected
[   35.513414] 
[   35.514069] Memory state around the buggy address:
[   35.515232]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.516160]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.516881] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.517713]                       ^
[   35.518214]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.519610]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.520876] ==================================================================
[   35.672874] ==================================================================
[   35.674232] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   35.675204] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.676156] 
[   35.676531] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.677787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.678517] Hardware name: linux,dummy-virt (DT)
[   35.679260] Call trace:
[   35.679743]  show_stack+0x20/0x38 (C)
[   35.680268]  dump_stack_lvl+0x8c/0xd0
[   35.681049]  print_report+0x118/0x5e0
[   35.681757]  kasan_report+0xc8/0x118
[   35.682263]  kasan_check_range+0x100/0x1a8
[   35.683585]  __kasan_check_write+0x20/0x30
[   35.684108]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   35.684977]  kasan_bitops_generic+0x110/0x1c8
[   35.686403]  kunit_try_run_case+0x14c/0x3d0
[   35.687096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.687797]  kthread+0x24c/0x2d0
[   35.688428]  ret_from_fork+0x10/0x20
[   35.689033] 
[   35.689408] Allocated by task 249:
[   35.690833]  kasan_save_stack+0x3c/0x68
[   35.691341]  kasan_save_track+0x20/0x40
[   35.692077]  kasan_save_alloc_info+0x40/0x58
[   35.692760]  __kasan_kmalloc+0xd4/0xd8
[   35.693292]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.694653]  kasan_bitops_generic+0xa0/0x1c8
[   35.695230]  kunit_try_run_case+0x14c/0x3d0
[   35.695890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.696718]  kthread+0x24c/0x2d0
[   35.697197]  ret_from_fork+0x10/0x20
[   35.698167] 
[   35.698542] The buggy address belongs to the object at fff00000c6153d80
[   35.698542]  which belongs to the cache kmalloc-16 of size 16
[   35.699885] The buggy address is located 8 bytes inside of
[   35.699885]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.701754] 
[   35.702173] The buggy address belongs to the physical page:
[   35.702981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.704067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.704935] page_type: f5(slab)
[   35.705663] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.707617] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.708272] page dumped because: kasan: bad access detected
[   35.708693] 
[   35.709328] Memory state around the buggy address:
[   35.710270]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.711105]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.711997] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.712930]                       ^
[   35.713667]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.714533]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.715764] ==================================================================
[   35.571011] ==================================================================
[   35.571945] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   35.572832] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.573687] 
[   35.574044] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.575892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.576655] Hardware name: linux,dummy-virt (DT)
[   35.577228] Call trace:
[   35.578103]  show_stack+0x20/0x38 (C)
[   35.578576]  dump_stack_lvl+0x8c/0xd0
[   35.579305]  print_report+0x118/0x5e0
[   35.580382]  kasan_report+0xc8/0x118
[   35.580973]  __asan_report_load8_noabort+0x20/0x30
[   35.581793]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   35.582583]  kasan_bitops_generic+0x110/0x1c8
[   35.583258]  kunit_try_run_case+0x14c/0x3d0
[   35.584251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.585077]  kthread+0x24c/0x2d0
[   35.585699]  ret_from_fork+0x10/0x20
[   35.586528] 
[   35.587645] Allocated by task 249:
[   35.588548]  kasan_save_stack+0x3c/0x68
[   35.589164]  kasan_save_track+0x20/0x40
[   35.589930]  kasan_save_alloc_info+0x40/0x58
[   35.590558]  __kasan_kmalloc+0xd4/0xd8
[   35.591095]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.592052]  kasan_bitops_generic+0xa0/0x1c8
[   35.592737]  kunit_try_run_case+0x14c/0x3d0
[   35.593330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.594251]  kthread+0x24c/0x2d0
[   35.594974]  ret_from_fork+0x10/0x20
[   35.596301] 
[   35.596711] The buggy address belongs to the object at fff00000c6153d80
[   35.596711]  which belongs to the cache kmalloc-16 of size 16
[   35.598117] The buggy address is located 8 bytes inside of
[   35.598117]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.600402] 
[   35.601021] The buggy address belongs to the physical page:
[   35.602171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.603484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.605258] page_type: f5(slab)
[   35.606327] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.608036] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.609029] page dumped because: kasan: bad access detected
[   35.610132] 
[   35.610475] Memory state around the buggy address:
[   35.611218]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.612926]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.613885] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.614315]                       ^
[   35.614581]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.616499]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.617458] ==================================================================
[   35.522453] ==================================================================
[   35.523922] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   35.524735] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.525326] 
[   35.526301] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.528110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.528766] Hardware name: linux,dummy-virt (DT)
[   35.529484] Call trace:
[   35.530575]  show_stack+0x20/0x38 (C)
[   35.531075]  dump_stack_lvl+0x8c/0xd0
[   35.532064]  print_report+0x118/0x5e0
[   35.532672]  kasan_report+0xc8/0x118
[   35.533251]  kasan_check_range+0x100/0x1a8
[   35.534047]  __kasan_check_write+0x20/0x30
[   35.534671]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   35.535468]  kasan_bitops_generic+0x110/0x1c8
[   35.536383]  kunit_try_run_case+0x14c/0x3d0
[   35.537104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.537881]  kthread+0x24c/0x2d0
[   35.538356]  ret_from_fork+0x10/0x20
[   35.539237] 
[   35.539594] Allocated by task 249:
[   35.540072]  kasan_save_stack+0x3c/0x68
[   35.540692]  kasan_save_track+0x20/0x40
[   35.541342]  kasan_save_alloc_info+0x40/0x58
[   35.542416]  __kasan_kmalloc+0xd4/0xd8
[   35.543015]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.544527]  kasan_bitops_generic+0xa0/0x1c8
[   35.545355]  kunit_try_run_case+0x14c/0x3d0
[   35.546412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.547278]  kthread+0x24c/0x2d0
[   35.547817]  ret_from_fork+0x10/0x20
[   35.548439] 
[   35.548781] The buggy address belongs to the object at fff00000c6153d80
[   35.548781]  which belongs to the cache kmalloc-16 of size 16
[   35.550110] The buggy address is located 8 bytes inside of
[   35.550110]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.551811] 
[   35.552107] The buggy address belongs to the physical page:
[   35.553874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.554844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.555925] page_type: f5(slab)
[   35.556466] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.557600] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.558954] page dumped because: kasan: bad access detected
[   35.560232] 
[   35.560558] Memory state around the buggy address:
[   35.561191]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.562258]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.563546] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.564367]                       ^
[   35.564907]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.566468]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.567967] ==================================================================
[   35.765329] ==================================================================
[   35.767433] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   35.768316] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.769166] 
[   35.769565] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.770847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.771478] Hardware name: linux,dummy-virt (DT)
[   35.772954] Call trace:
[   35.773366]  show_stack+0x20/0x38 (C)
[   35.774231]  dump_stack_lvl+0x8c/0xd0
[   35.774819]  print_report+0x118/0x5e0
[   35.775694]  kasan_report+0xc8/0x118
[   35.776279]  kasan_check_range+0x100/0x1a8
[   35.777418]  __kasan_check_write+0x20/0x30
[   35.778392]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   35.779159]  kasan_bitops_generic+0x110/0x1c8
[   35.780007]  kunit_try_run_case+0x14c/0x3d0
[   35.780761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.781724]  kthread+0x24c/0x2d0
[   35.782362]  ret_from_fork+0x10/0x20
[   35.783138] 
[   35.783566] Allocated by task 249:
[   35.784305]  kasan_save_stack+0x3c/0x68
[   35.784927]  kasan_save_track+0x20/0x40
[   35.785678]  kasan_save_alloc_info+0x40/0x58
[   35.786476]  __kasan_kmalloc+0xd4/0xd8
[   35.787226]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.787893]  kasan_bitops_generic+0xa0/0x1c8
[   35.788678]  kunit_try_run_case+0x14c/0x3d0
[   35.789445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.790293]  kthread+0x24c/0x2d0
[   35.790811]  ret_from_fork+0x10/0x20
[   35.791302] 
[   35.791772] The buggy address belongs to the object at fff00000c6153d80
[   35.791772]  which belongs to the cache kmalloc-16 of size 16
[   35.793067] The buggy address is located 8 bytes inside of
[   35.793067]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.794606] 
[   35.794981] The buggy address belongs to the physical page:
[   35.795746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.796745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.797673] page_type: f5(slab)
[   35.798161] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.799117] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.800008] page dumped because: kasan: bad access detected
[   35.800738] 
[   35.801122] Memory state around the buggy address:
[   35.801772]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.802850]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.803691] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.804608]                       ^
[   35.805163]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.806172]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.807057] ==================================================================
[   35.850927] ==================================================================
[   35.851757] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   35.852558] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.853512] 
[   35.853988] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.855476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.855998] Hardware name: linux,dummy-virt (DT)
[   35.856649] Call trace:
[   35.857132]  show_stack+0x20/0x38 (C)
[   35.857772]  dump_stack_lvl+0x8c/0xd0
[   35.858461]  print_report+0x118/0x5e0
[   35.859070]  kasan_report+0xc8/0x118
[   35.859655]  __asan_report_load8_noabort+0x20/0x30
[   35.860292]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   35.861153]  kasan_bitops_generic+0x110/0x1c8
[   35.861673]  kunit_try_run_case+0x14c/0x3d0
[   35.862405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.863115]  kthread+0x24c/0x2d0
[   35.863770]  ret_from_fork+0x10/0x20
[   35.864331] 
[   35.864721] Allocated by task 249:
[   35.865155]  kasan_save_stack+0x3c/0x68
[   35.865807]  kasan_save_track+0x20/0x40
[   35.866390]  kasan_save_alloc_info+0x40/0x58
[   35.866972]  __kasan_kmalloc+0xd4/0xd8
[   35.867678]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.868409]  kasan_bitops_generic+0xa0/0x1c8
[   35.869087]  kunit_try_run_case+0x14c/0x3d0
[   35.869719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.870457]  kthread+0x24c/0x2d0
[   35.870974]  ret_from_fork+0x10/0x20
[   35.871593] 
[   35.871963] The buggy address belongs to the object at fff00000c6153d80
[   35.871963]  which belongs to the cache kmalloc-16 of size 16
[   35.873378] The buggy address is located 8 bytes inside of
[   35.873378]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.874754] 
[   35.875090] The buggy address belongs to the physical page:
[   35.875895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.876804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.877800] page_type: f5(slab)
[   35.878276] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.879267] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.880175] page dumped because: kasan: bad access detected
[   35.880899] 
[   35.881244] Memory state around the buggy address:
[   35.881874]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.882860]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.883668] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.884615]                       ^
[   35.885034]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.885661]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.886262] ==================================================================
[   35.808905] ==================================================================
[   35.810228] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   35.811335] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.812162] 
[   35.812614] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.814517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.815067] Hardware name: linux,dummy-virt (DT)
[   35.815733] Call trace:
[   35.816152]  show_stack+0x20/0x38 (C)
[   35.816744]  dump_stack_lvl+0x8c/0xd0
[   35.817343]  print_report+0x118/0x5e0
[   35.817970]  kasan_report+0xc8/0x118
[   35.818502]  kasan_check_range+0x100/0x1a8
[   35.819270]  __kasan_check_write+0x20/0x30
[   35.820000]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   35.820927]  kasan_bitops_generic+0x110/0x1c8
[   35.821549]  kunit_try_run_case+0x14c/0x3d0
[   35.822252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.823047]  kthread+0x24c/0x2d0
[   35.823687]  ret_from_fork+0x10/0x20
[   35.824409] 
[   35.824846] Allocated by task 249:
[   35.825275]  kasan_save_stack+0x3c/0x68
[   35.825962]  kasan_save_track+0x20/0x40
[   35.826569]  kasan_save_alloc_info+0x40/0x58
[   35.827303]  __kasan_kmalloc+0xd4/0xd8
[   35.827835]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.828562]  kasan_bitops_generic+0xa0/0x1c8
[   35.829211]  kunit_try_run_case+0x14c/0x3d0
[   35.830054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.830769]  kthread+0x24c/0x2d0
[   35.831348]  ret_from_fork+0x10/0x20
[   35.831983] 
[   35.832418] The buggy address belongs to the object at fff00000c6153d80
[   35.832418]  which belongs to the cache kmalloc-16 of size 16
[   35.833786] The buggy address is located 8 bytes inside of
[   35.833786]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.835338] 
[   35.835734] The buggy address belongs to the physical page:
[   35.836382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.837340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.838293] page_type: f5(slab)
[   35.838972] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.839949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.840800] page dumped because: kasan: bad access detected
[   35.841547] 
[   35.841897] Memory state around the buggy address:
[   35.842495]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.843439]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.844390] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.845389]                       ^
[   35.845875]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.846855]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.847805] ==================================================================
[   35.424650] ==================================================================
[   35.425834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   35.426941] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.429296] 
[   35.430297] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.432065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.432957] Hardware name: linux,dummy-virt (DT)
[   35.433442] Call trace:
[   35.434355]  show_stack+0x20/0x38 (C)
[   35.435483]  dump_stack_lvl+0x8c/0xd0
[   35.436466]  print_report+0x118/0x5e0
[   35.437122]  kasan_report+0xc8/0x118
[   35.438032]  kasan_check_range+0x100/0x1a8
[   35.439057]  __kasan_check_write+0x20/0x30
[   35.439834]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   35.440597]  kasan_bitops_generic+0x110/0x1c8
[   35.441434]  kunit_try_run_case+0x14c/0x3d0
[   35.442180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.442992]  kthread+0x24c/0x2d0
[   35.443579]  ret_from_fork+0x10/0x20
[   35.444968] 
[   35.445291] Allocated by task 249:
[   35.445795]  kasan_save_stack+0x3c/0x68
[   35.446396]  kasan_save_track+0x20/0x40
[   35.447019]  kasan_save_alloc_info+0x40/0x58
[   35.447751]  __kasan_kmalloc+0xd4/0xd8
[   35.448321]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.450529]  kasan_bitops_generic+0xa0/0x1c8
[   35.451242]  kunit_try_run_case+0x14c/0x3d0
[   35.452163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.453052]  kthread+0x24c/0x2d0
[   35.453860]  ret_from_fork+0x10/0x20
[   35.454688] 
[   35.455092] The buggy address belongs to the object at fff00000c6153d80
[   35.455092]  which belongs to the cache kmalloc-16 of size 16
[   35.456679] The buggy address is located 8 bytes inside of
[   35.456679]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.458539] 
[   35.459035] The buggy address belongs to the physical page:
[   35.459983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.460949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.462011] page_type: f5(slab)
[   35.462801] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.464023] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.464897] page dumped because: kasan: bad access detected
[   35.466545] 
[   35.467315] Memory state around the buggy address:
[   35.468401]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.469594]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.470856] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.472515]                       ^
[   35.472959]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.474583]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.475386] ==================================================================

[   26.615623] ==================================================================
[   26.616441] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   26.617679] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.618163] 
[   26.618577] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.619396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.619653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.621002] Call Trace:
[   26.621528]  <TASK>
[   26.622139]  dump_stack_lvl+0x73/0xb0
[   26.622550]  print_report+0xd1/0x640
[   26.623292]  ? __virt_addr_valid+0x1db/0x2d0
[   26.623749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.624117]  kasan_report+0x102/0x140
[   26.624669]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   26.625977]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   26.626629]  kasan_check_range+0x10c/0x1c0
[   26.626959]  __kasan_check_write+0x18/0x20
[   26.627493]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   26.628448]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.629619]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.630167]  ? kasan_bitops_generic+0x93/0x1c0
[   26.630521]  kasan_bitops_generic+0x117/0x1c0
[   26.631042]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.632030]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.632601]  kunit_try_run_case+0x1b3/0x490
[   26.633173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.633563]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.634108]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.635036]  ? __kthread_parkme+0x82/0x160
[   26.635463]  ? preempt_count_sub+0x50/0x80
[   26.635872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.636654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.637692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.638610]  kthread+0x257/0x310
[   26.638979]  ? __pfx_kthread+0x10/0x10
[   26.639510]  ret_from_fork+0x41/0x80
[   26.639999]  ? __pfx_kthread+0x10/0x10
[   26.640464]  ret_from_fork_asm+0x1a/0x30
[   26.640993]  </TASK>
[   26.641344] 
[   26.641636] Allocated by task 269:
[   26.642129]  kasan_save_stack+0x3d/0x60
[   26.642591]  kasan_save_track+0x18/0x40
[   26.643166]  kasan_save_alloc_info+0x3b/0x50
[   26.643627]  __kasan_kmalloc+0xb7/0xc0
[   26.644079]  __kmalloc_cache_noprof+0x184/0x410
[   26.644587]  kasan_bitops_generic+0x93/0x1c0
[   26.645049]  kunit_try_run_case+0x1b3/0x490
[   26.645618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.646306]  kthread+0x257/0x310
[   26.646813]  ret_from_fork+0x41/0x80
[   26.647160]  ret_from_fork_asm+0x1a/0x30
[   26.647570] 
[   26.647916] The buggy address belongs to the object at ffff888102795340
[   26.647916]  which belongs to the cache kmalloc-16 of size 16
[   26.648957] The buggy address is located 8 bytes inside of
[   26.648957]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.649993] 
[   26.650322] The buggy address belongs to the physical page:
[   26.650929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.651794] flags: 0x200000000000000(node=0|zone=2)
[   26.652194] page_type: f5(slab)
[   26.652633] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.653554] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.654383] page dumped because: kasan: bad access detected
[   26.655002] 
[   26.655274] Memory state around the buggy address:
[   26.655814]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.656493]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.657076] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.657767]                                               ^
[   26.658220]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.658914]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.659644] ==================================================================
[   26.346335] ==================================================================
[   26.346993] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   26.347718] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.349080] 
[   26.349706] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.350936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.351491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.352197] Call Trace:
[   26.352761]  <TASK>
[   26.353196]  dump_stack_lvl+0x73/0xb0
[   26.353720]  print_report+0xd1/0x640
[   26.354066]  ? __virt_addr_valid+0x1db/0x2d0
[   26.354665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.355274]  kasan_report+0x102/0x140
[   26.355788]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   26.356278]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   26.357471]  kasan_check_range+0x10c/0x1c0
[   26.358055]  __kasan_check_write+0x18/0x20
[   26.358525]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   26.359080]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.359570]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.360734]  ? kasan_bitops_generic+0x93/0x1c0
[   26.361236]  kasan_bitops_generic+0x117/0x1c0
[   26.361740]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.362615]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.363136]  kunit_try_run_case+0x1b3/0x490
[   26.363736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.364421]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.365102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.366182]  ? __kthread_parkme+0x82/0x160
[   26.366600]  ? preempt_count_sub+0x50/0x80
[   26.367289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.367741]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.368532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.369170]  kthread+0x257/0x310
[   26.369790]  ? __pfx_kthread+0x10/0x10
[   26.370161]  ret_from_fork+0x41/0x80
[   26.370787]  ? __pfx_kthread+0x10/0x10
[   26.371451]  ret_from_fork_asm+0x1a/0x30
[   26.371926]  </TASK>
[   26.372153] 
[   26.372331] Allocated by task 269:
[   26.372793]  kasan_save_stack+0x3d/0x60
[   26.373256]  kasan_save_track+0x18/0x40
[   26.373554]  kasan_save_alloc_info+0x3b/0x50
[   26.374516]  __kasan_kmalloc+0xb7/0xc0
[   26.375029]  __kmalloc_cache_noprof+0x184/0x410
[   26.375745]  kasan_bitops_generic+0x93/0x1c0
[   26.376295]  kunit_try_run_case+0x1b3/0x490
[   26.376637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.377291]  kthread+0x257/0x310
[   26.377716]  ret_from_fork+0x41/0x80
[   26.378426]  ret_from_fork_asm+0x1a/0x30
[   26.378746] 
[   26.379206] The buggy address belongs to the object at ffff888102795340
[   26.379206]  which belongs to the cache kmalloc-16 of size 16
[   26.380691] The buggy address is located 8 bytes inside of
[   26.380691]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.381672] 
[   26.381832] The buggy address belongs to the physical page:
[   26.382571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.383885] flags: 0x200000000000000(node=0|zone=2)
[   26.384404] page_type: f5(slab)
[   26.384662] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.385592] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.386647] page dumped because: kasan: bad access detected
[   26.387180] 
[   26.387394] Memory state around the buggy address:
[   26.388466]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.389523]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.390202] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.391103]                                               ^
[   26.391611]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.393258]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.394050] ==================================================================
[   26.559939] ==================================================================
[   26.561302] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   26.562516] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.563301] 
[   26.563481] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.565488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.565950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.567271] Call Trace:
[   26.567546]  <TASK>
[   26.567852]  dump_stack_lvl+0x73/0xb0
[   26.569067]  print_report+0xd1/0x640
[   26.569601]  ? __virt_addr_valid+0x1db/0x2d0
[   26.570215]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.570721]  kasan_report+0x102/0x140
[   26.571676]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   26.572377]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   26.573158]  kasan_check_range+0x10c/0x1c0
[   26.573875]  __kasan_check_write+0x18/0x20
[   26.574512]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   26.575763]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.576685]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.577118]  ? kasan_bitops_generic+0x93/0x1c0
[   26.578061]  kasan_bitops_generic+0x117/0x1c0
[   26.578513]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.579819]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.580284]  kunit_try_run_case+0x1b3/0x490
[   26.581007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.581885]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.582583]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.583808]  ? __kthread_parkme+0x82/0x160
[   26.584192]  ? preempt_count_sub+0x50/0x80
[   26.585271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.585844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.586942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.587431]  kthread+0x257/0x310
[   26.588077]  ? __pfx_kthread+0x10/0x10
[   26.588513]  ret_from_fork+0x41/0x80
[   26.589009]  ? __pfx_kthread+0x10/0x10
[   26.589535]  ret_from_fork_asm+0x1a/0x30
[   26.589807]  </TASK>
[   26.589977] 
[   26.590210] Allocated by task 269:
[   26.591136]  kasan_save_stack+0x3d/0x60
[   26.591598]  kasan_save_track+0x18/0x40
[   26.592305]  kasan_save_alloc_info+0x3b/0x50
[   26.592924]  __kasan_kmalloc+0xb7/0xc0
[   26.593195]  __kmalloc_cache_noprof+0x184/0x410
[   26.593782]  kasan_bitops_generic+0x93/0x1c0
[   26.595423]  kunit_try_run_case+0x1b3/0x490
[   26.596144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.597055]  kthread+0x257/0x310
[   26.597725]  ret_from_fork+0x41/0x80
[   26.598134]  ret_from_fork_asm+0x1a/0x30
[   26.598448] 
[   26.598752] The buggy address belongs to the object at ffff888102795340
[   26.598752]  which belongs to the cache kmalloc-16 of size 16
[   26.601505] The buggy address is located 8 bytes inside of
[   26.601505]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.602756] 
[   26.603690] The buggy address belongs to the physical page:
[   26.604993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.606000] flags: 0x200000000000000(node=0|zone=2)
[   26.606618] page_type: f5(slab)
[   26.607009] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.608056] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.608854] page dumped because: kasan: bad access detected
[   26.609284] 
[   26.609521] Memory state around the buggy address:
[   26.610325]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.611402]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.611764] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.612365]                                               ^
[   26.613263]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.613975]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.614486] ==================================================================
[   26.448912] ==================================================================
[   26.449921] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   26.450301] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.451725] 
[   26.452375] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.454071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.454678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.455934] Call Trace:
[   26.456490]  <TASK>
[   26.456697]  dump_stack_lvl+0x73/0xb0
[   26.457498]  print_report+0xd1/0x640
[   26.458040]  ? __virt_addr_valid+0x1db/0x2d0
[   26.458622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.459847]  kasan_report+0x102/0x140
[   26.460550]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   26.461168]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   26.462827]  kasan_check_range+0x10c/0x1c0
[   26.464045]  __kasan_check_write+0x18/0x20
[   26.464665]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   26.465812]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.466328]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.467274]  ? kasan_bitops_generic+0x93/0x1c0
[   26.467936]  kasan_bitops_generic+0x117/0x1c0
[   26.468420]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.469862]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.470256]  kunit_try_run_case+0x1b3/0x490
[   26.471269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.472161]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.473006]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.473889]  ? __kthread_parkme+0x82/0x160
[   26.474256]  ? preempt_count_sub+0x50/0x80
[   26.475129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.476381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.476891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.477393]  kthread+0x257/0x310
[   26.477733]  ? __pfx_kthread+0x10/0x10
[   26.478161]  ret_from_fork+0x41/0x80
[   26.479121]  ? __pfx_kthread+0x10/0x10
[   26.479782]  ret_from_fork_asm+0x1a/0x30
[   26.480632]  </TASK>
[   26.481099] 
[   26.481751] Allocated by task 269:
[   26.482091]  kasan_save_stack+0x3d/0x60
[   26.483148]  kasan_save_track+0x18/0x40
[   26.483582]  kasan_save_alloc_info+0x3b/0x50
[   26.483984]  __kasan_kmalloc+0xb7/0xc0
[   26.484654]  __kmalloc_cache_noprof+0x184/0x410
[   26.485207]  kasan_bitops_generic+0x93/0x1c0
[   26.485776]  kunit_try_run_case+0x1b3/0x490
[   26.486607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.486961]  kthread+0x257/0x310
[   26.487869]  ret_from_fork+0x41/0x80
[   26.488185]  ret_from_fork_asm+0x1a/0x30
[   26.488861] 
[   26.489089] The buggy address belongs to the object at ffff888102795340
[   26.489089]  which belongs to the cache kmalloc-16 of size 16
[   26.490071] The buggy address is located 8 bytes inside of
[   26.490071]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.491487] 
[   26.491645] The buggy address belongs to the physical page:
[   26.492247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.493273] flags: 0x200000000000000(node=0|zone=2)
[   26.494079] page_type: f5(slab)
[   26.494355] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.495797] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.496622] page dumped because: kasan: bad access detected
[   26.496960] 
[   26.497217] Memory state around the buggy address:
[   26.498284]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.499203]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.500055] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.500746]                                               ^
[   26.501336]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.502443]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.503583] ==================================================================
[   26.504748] ==================================================================
[   26.505661] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   26.506293] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.507321] 
[   26.507499] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.510061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.510667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.511860] Call Trace:
[   26.512089]  <TASK>
[   26.512390]  dump_stack_lvl+0x73/0xb0
[   26.512923]  print_report+0xd1/0x640
[   26.513643]  ? __virt_addr_valid+0x1db/0x2d0
[   26.514242]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.514769]  kasan_report+0x102/0x140
[   26.516030]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   26.516676]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   26.517317]  kasan_check_range+0x10c/0x1c0
[   26.518418]  __kasan_check_write+0x18/0x20
[   26.519134]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   26.519680]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.520575]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.521091]  ? kasan_bitops_generic+0x93/0x1c0
[   26.521993]  kasan_bitops_generic+0x117/0x1c0
[   26.522982]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.523456]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.524299]  kunit_try_run_case+0x1b3/0x490
[   26.524885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.525818]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.526396]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.527716]  ? __kthread_parkme+0x82/0x160
[   26.528191]  ? preempt_count_sub+0x50/0x80
[   26.528812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.529311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.530201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.531262]  kthread+0x257/0x310
[   26.531781]  ? __pfx_kthread+0x10/0x10
[   26.532250]  ret_from_fork+0x41/0x80
[   26.532698]  ? __pfx_kthread+0x10/0x10
[   26.533290]  ret_from_fork_asm+0x1a/0x30
[   26.533713]  </TASK>
[   26.534216] 
[   26.534500] Allocated by task 269:
[   26.534786]  kasan_save_stack+0x3d/0x60
[   26.536180]  kasan_save_track+0x18/0x40
[   26.536655]  kasan_save_alloc_info+0x3b/0x50
[   26.537470]  __kasan_kmalloc+0xb7/0xc0
[   26.537886]  __kmalloc_cache_noprof+0x184/0x410
[   26.538718]  kasan_bitops_generic+0x93/0x1c0
[   26.539185]  kunit_try_run_case+0x1b3/0x490
[   26.539487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.540627]  kthread+0x257/0x310
[   26.541285]  ret_from_fork+0x41/0x80
[   26.541909]  ret_from_fork_asm+0x1a/0x30
[   26.542330] 
[   26.542567] The buggy address belongs to the object at ffff888102795340
[   26.542567]  which belongs to the cache kmalloc-16 of size 16
[   26.543938] The buggy address is located 8 bytes inside of
[   26.543938]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.545944] 
[   26.546122] The buggy address belongs to the physical page:
[   26.546776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.548087] flags: 0x200000000000000(node=0|zone=2)
[   26.548447] page_type: f5(slab)
[   26.549050] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.550501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.551340] page dumped because: kasan: bad access detected
[   26.551941] 
[   26.552196] Memory state around the buggy address:
[   26.552911]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.553373]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.554135] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.555701]                                               ^
[   26.556496]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.557307]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.558259] ==================================================================
[   26.395566] ==================================================================
[   26.396007] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   26.398548] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.400078] 
[   26.400525] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.401728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.402137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.403396] Call Trace:
[   26.403658]  <TASK>
[   26.404230]  dump_stack_lvl+0x73/0xb0
[   26.404788]  print_report+0xd1/0x640
[   26.405294]  ? __virt_addr_valid+0x1db/0x2d0
[   26.405830]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.407039]  kasan_report+0x102/0x140
[   26.407672]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   26.408823]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   26.409484]  kasan_check_range+0x10c/0x1c0
[   26.410039]  __kasan_check_write+0x18/0x20
[   26.410691]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   26.411523]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.412133]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.413034]  ? kasan_bitops_generic+0x93/0x1c0
[   26.413381]  kasan_bitops_generic+0x117/0x1c0
[   26.414278]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.414721]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.415443]  kunit_try_run_case+0x1b3/0x490
[   26.416137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.416959]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.417375]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.418454]  ? __kthread_parkme+0x82/0x160
[   26.418925]  ? preempt_count_sub+0x50/0x80
[   26.419340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.420139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.421128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.422153]  kthread+0x257/0x310
[   26.422646]  ? __pfx_kthread+0x10/0x10
[   26.423093]  ret_from_fork+0x41/0x80
[   26.423712]  ? __pfx_kthread+0x10/0x10
[   26.424227]  ret_from_fork_asm+0x1a/0x30
[   26.424875]  </TASK>
[   26.425296] 
[   26.425796] Allocated by task 269:
[   26.426171]  kasan_save_stack+0x3d/0x60
[   26.426937]  kasan_save_track+0x18/0x40
[   26.427454]  kasan_save_alloc_info+0x3b/0x50
[   26.428159]  __kasan_kmalloc+0xb7/0xc0
[   26.429164]  __kmalloc_cache_noprof+0x184/0x410
[   26.429914]  kasan_bitops_generic+0x93/0x1c0
[   26.430437]  kunit_try_run_case+0x1b3/0x490
[   26.431191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.431728]  kthread+0x257/0x310
[   26.432053]  ret_from_fork+0x41/0x80
[   26.432509]  ret_from_fork_asm+0x1a/0x30
[   26.433023] 
[   26.433241] The buggy address belongs to the object at ffff888102795340
[   26.433241]  which belongs to the cache kmalloc-16 of size 16
[   26.434269] The buggy address is located 8 bytes inside of
[   26.434269]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.435873] 
[   26.436070] The buggy address belongs to the physical page:
[   26.436448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.437834] flags: 0x200000000000000(node=0|zone=2)
[   26.438179] page_type: f5(slab)
[   26.439072] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.439792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.440504] page dumped because: kasan: bad access detected
[   26.441396] 
[   26.441544] Memory state around the buggy address:
[   26.442149]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.443417]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.443924] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.444894]                                               ^
[   26.445573]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.446183]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.446898] ==================================================================
[   26.239743] ==================================================================
[   26.240788] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   26.241945] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.243171] 
[   26.243988] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.245433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.245943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.247562] Call Trace:
[   26.247764]  <TASK>
[   26.248138]  dump_stack_lvl+0x73/0xb0
[   26.249123]  print_report+0xd1/0x640
[   26.249989]  ? __virt_addr_valid+0x1db/0x2d0
[   26.251004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.251616]  kasan_report+0x102/0x140
[   26.252232]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   26.252942]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   26.253425]  kasan_check_range+0x10c/0x1c0
[   26.254140]  __kasan_check_write+0x18/0x20
[   26.254622]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   26.255172]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.255939]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.256634]  ? kasan_bitops_generic+0x93/0x1c0
[   26.257001]  kasan_bitops_generic+0x117/0x1c0
[   26.257723]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.258526]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.258910]  kunit_try_run_case+0x1b3/0x490
[   26.259767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.260247]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.260973]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.261806]  ? __kthread_parkme+0x82/0x160
[   26.262364]  ? preempt_count_sub+0x50/0x80
[   26.262967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.263588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.264291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.265227]  kthread+0x257/0x310
[   26.265703]  ? __pfx_kthread+0x10/0x10
[   26.266104]  ret_from_fork+0x41/0x80
[   26.266634]  ? __pfx_kthread+0x10/0x10
[   26.267241]  ret_from_fork_asm+0x1a/0x30
[   26.267685]  </TASK>
[   26.268160] 
[   26.268514] Allocated by task 269:
[   26.268989]  kasan_save_stack+0x3d/0x60
[   26.269611]  kasan_save_track+0x18/0x40
[   26.270003]  kasan_save_alloc_info+0x3b/0x50
[   26.270766]  __kasan_kmalloc+0xb7/0xc0
[   26.271307]  __kmalloc_cache_noprof+0x184/0x410
[   26.271759]  kasan_bitops_generic+0x93/0x1c0
[   26.272512]  kunit_try_run_case+0x1b3/0x490
[   26.272939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.273672]  kthread+0x257/0x310
[   26.274458]  ret_from_fork+0x41/0x80
[   26.274882]  ret_from_fork_asm+0x1a/0x30
[   26.275182] 
[   26.275433] The buggy address belongs to the object at ffff888102795340
[   26.275433]  which belongs to the cache kmalloc-16 of size 16
[   26.277461] The buggy address is located 8 bytes inside of
[   26.277461]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.278693] 
[   26.279147] The buggy address belongs to the physical page:
[   26.279667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.280353] flags: 0x200000000000000(node=0|zone=2)
[   26.280758] page_type: f5(slab)
[   26.281166] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.282793] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.283839] page dumped because: kasan: bad access detected
[   26.284815] 
[   26.285577] Memory state around the buggy address:
[   26.286056]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.287180]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.288826] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.289911]                                               ^
[   26.290287]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.291363]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.292169] ==================================================================
[   26.296001] ==================================================================
[   26.296959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   26.298117] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.299051] 
[   26.299911] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.302020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.302802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.303716] Call Trace:
[   26.303998]  <TASK>
[   26.304295]  dump_stack_lvl+0x73/0xb0
[   26.305278]  print_report+0xd1/0x640
[   26.305966]  ? __virt_addr_valid+0x1db/0x2d0
[   26.306869]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.307557]  kasan_report+0x102/0x140
[   26.308338]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   26.309005]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   26.309921]  kasan_check_range+0x10c/0x1c0
[   26.310648]  __kasan_check_write+0x18/0x20
[   26.311257]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   26.312039]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.312904]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.313127]  ? kasan_bitops_generic+0x93/0x1c0
[   26.313923]  kasan_bitops_generic+0x117/0x1c0
[   26.314395]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.314866]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.316016]  kunit_try_run_case+0x1b3/0x490
[   26.316475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.316911]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.317370]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.317837]  ? __kthread_parkme+0x82/0x160
[   26.318773]  ? preempt_count_sub+0x50/0x80
[   26.319192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.319795]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.320534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.321008]  kthread+0x257/0x310
[   26.321515]  ? __pfx_kthread+0x10/0x10
[   26.321977]  ret_from_fork+0x41/0x80
[   26.322704]  ? __pfx_kthread+0x10/0x10
[   26.323102]  ret_from_fork_asm+0x1a/0x30
[   26.323809]  </TASK>
[   26.324016] 
[   26.324415] Allocated by task 269:
[   26.324876]  kasan_save_stack+0x3d/0x60
[   26.325521]  kasan_save_track+0x18/0x40
[   26.325892]  kasan_save_alloc_info+0x3b/0x50
[   26.326698]  __kasan_kmalloc+0xb7/0xc0
[   26.327136]  __kmalloc_cache_noprof+0x184/0x410
[   26.327691]  kasan_bitops_generic+0x93/0x1c0
[   26.328071]  kunit_try_run_case+0x1b3/0x490
[   26.328609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.329199]  kthread+0x257/0x310
[   26.329537]  ret_from_fork+0x41/0x80
[   26.329848]  ret_from_fork_asm+0x1a/0x30
[   26.330134] 
[   26.330771] The buggy address belongs to the object at ffff888102795340
[   26.330771]  which belongs to the cache kmalloc-16 of size 16
[   26.332075] The buggy address is located 8 bytes inside of
[   26.332075]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.333401] 
[   26.333567] The buggy address belongs to the physical page:
[   26.334114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.335602] flags: 0x200000000000000(node=0|zone=2)
[   26.336195] page_type: f5(slab)
[   26.336667] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.337389] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.338059] page dumped because: kasan: bad access detected
[   26.338499] 
[   26.338735] Memory state around the buggy address:
[   26.339142]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.340598]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.341453] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.342105]                                               ^
[   26.342834]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.343823]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.344572] ==================================================================