Hay
Date
Dec. 5, 2024, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   33.478827] ==================================================================
[   33.479778] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   33.480696] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.482347] 
[   33.482830] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.484049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.484578] Hardware name: linux,dummy-virt (DT)
[   33.485181] Call trace:
[   33.485562]  show_stack+0x20/0x38 (C)
[   33.486189]  dump_stack_lvl+0x8c/0xd0
[   33.486785]  print_report+0x118/0x5e0
[   33.487364]  kasan_report+0xc8/0x118
[   33.487934]  kasan_check_range+0x100/0x1a8
[   33.488582]  __kasan_check_write+0x20/0x30
[   33.489227]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   33.489939]  kasan_bitops_generic+0x110/0x1c8
[   33.490580]  kunit_try_run_case+0x14c/0x3d0
[   33.491219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.492015]  kthread+0x24c/0x2d0
[   33.492628]  ret_from_fork+0x10/0x20
[   33.493277] 
[   33.493659] Allocated by task 250:
[   33.494193]  kasan_save_stack+0x3c/0x68
[   33.494973]  kasan_save_track+0x20/0x40
[   33.495479]  kasan_save_alloc_info+0x40/0x58
[   33.496221]  __kasan_kmalloc+0xd4/0xd8
[   33.496765]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.497508]  kasan_bitops_generic+0xa0/0x1c8
[   33.498129]  kunit_try_run_case+0x14c/0x3d0
[   33.498738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.499449]  kthread+0x24c/0x2d0
[   33.500200]  ret_from_fork+0x10/0x20
[   33.500734] 
[   33.501074] The buggy address belongs to the object at fff00000c61b4360
[   33.501074]  which belongs to the cache kmalloc-16 of size 16
[   33.502750] The buggy address is located 8 bytes inside of
[   33.502750]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.504357] 
[   33.504655] The buggy address belongs to the physical page:
[   33.505442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.506687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.507710] page_type: f5(slab)
[   33.508330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.509253] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.510458] page dumped because: kasan: bad access detected
[   33.511430] 
[   33.512377] Memory state around the buggy address:
[   33.512979]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.513842]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.514764] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.515636]                                                           ^
[   33.516447]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.517347]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.518317] ==================================================================
[   33.558209] ==================================================================
[   33.559535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   33.560434] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.561422] 
[   33.561752] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.564153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.564637] Hardware name: linux,dummy-virt (DT)
[   33.565369] Call trace:
[   33.565914]  show_stack+0x20/0x38 (C)
[   33.566688]  dump_stack_lvl+0x8c/0xd0
[   33.567269]  print_report+0x118/0x5e0
[   33.567825]  kasan_report+0xc8/0x118
[   33.568557]  kasan_check_range+0x100/0x1a8
[   33.569169]  __kasan_check_write+0x20/0x30
[   33.569783]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   33.570545]  kasan_bitops_generic+0x110/0x1c8
[   33.571228]  kunit_try_run_case+0x14c/0x3d0
[   33.571905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.572692]  kthread+0x24c/0x2d0
[   33.573302]  ret_from_fork+0x10/0x20
[   33.573892] 
[   33.574234] Allocated by task 250:
[   33.574687]  kasan_save_stack+0x3c/0x68
[   33.575371]  kasan_save_track+0x20/0x40
[   33.575978]  kasan_save_alloc_info+0x40/0x58
[   33.576610]  __kasan_kmalloc+0xd4/0xd8
[   33.577193]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.577852]  kasan_bitops_generic+0xa0/0x1c8
[   33.578465]  kunit_try_run_case+0x14c/0x3d0
[   33.579059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.579831]  kthread+0x24c/0x2d0
[   33.580371]  ret_from_fork+0x10/0x20
[   33.580922] 
[   33.581247] The buggy address belongs to the object at fff00000c61b4360
[   33.581247]  which belongs to the cache kmalloc-16 of size 16
[   33.582702] The buggy address is located 8 bytes inside of
[   33.582702]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.584046] 
[   33.584358] The buggy address belongs to the physical page:
[   33.585042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.586059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.586786] page_type: f5(slab)
[   33.587401] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.588337] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.589239] page dumped because: kasan: bad access detected
[   33.589909] 
[   33.590246] Memory state around the buggy address:
[   33.590831]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.591658]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.592580] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.593535]                                                           ^
[   33.594346]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.595280]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.596198] ==================================================================
[   33.362400] ==================================================================
[   33.363206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.364146] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.365087] 
[   33.365592] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.366800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.367336] Hardware name: linux,dummy-virt (DT)
[   33.367938] Call trace:
[   33.368402]  show_stack+0x20/0x38 (C)
[   33.369096]  dump_stack_lvl+0x8c/0xd0
[   33.369663]  print_report+0x118/0x5e0
[   33.370221]  kasan_report+0xc8/0x118
[   33.370798]  kasan_check_range+0x100/0x1a8
[   33.371412]  __kasan_check_write+0x20/0x30
[   33.372051]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.372827]  kasan_bitops_generic+0x110/0x1c8
[   33.373377]  kunit_try_run_case+0x14c/0x3d0
[   33.374128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.374940]  kthread+0x24c/0x2d0
[   33.375477]  ret_from_fork+0x10/0x20
[   33.376155] 
[   33.376451] Allocated by task 250:
[   33.376969]  kasan_save_stack+0x3c/0x68
[   33.377422]  kasan_save_track+0x20/0x40
[   33.378061]  kasan_save_alloc_info+0x40/0x58
[   33.378972]  __kasan_kmalloc+0xd4/0xd8
[   33.379531]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.380202]  kasan_bitops_generic+0xa0/0x1c8
[   33.380947]  kunit_try_run_case+0x14c/0x3d0
[   33.381540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.382245]  kthread+0x24c/0x2d0
[   33.382781]  ret_from_fork+0x10/0x20
[   33.383288] 
[   33.383603] The buggy address belongs to the object at fff00000c61b4360
[   33.383603]  which belongs to the cache kmalloc-16 of size 16
[   33.384996] The buggy address is located 8 bytes inside of
[   33.384996]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.386421] 
[   33.386781] The buggy address belongs to the physical page:
[   33.387564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.388508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.389341] page_type: f5(slab)
[   33.389962] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.390906] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.391796] page dumped because: kasan: bad access detected
[   33.392512] 
[   33.392827] Memory state around the buggy address:
[   33.393502]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.394348]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.395255] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.396094]                                                           ^
[   33.396870]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.397727]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.398602] ==================================================================
[   33.520930] ==================================================================
[   33.521652] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   33.522560] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.523575] 
[   33.524065] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.525235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.525914] Hardware name: linux,dummy-virt (DT)
[   33.526490] Call trace:
[   33.527051]  show_stack+0x20/0x38 (C)
[   33.527648]  dump_stack_lvl+0x8c/0xd0
[   33.528231]  print_report+0x118/0x5e0
[   33.528842]  kasan_report+0xc8/0x118
[   33.529393]  __asan_report_load8_noabort+0x20/0x30
[   33.530074]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   33.530945]  kasan_bitops_generic+0x110/0x1c8
[   33.531703]  kunit_try_run_case+0x14c/0x3d0
[   33.532361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.532996]  kthread+0x24c/0x2d0
[   33.533568]  ret_from_fork+0x10/0x20
[   33.534159] 
[   33.534627] Allocated by task 250:
[   33.535077]  kasan_save_stack+0x3c/0x68
[   33.535762]  kasan_save_track+0x20/0x40
[   33.536354]  kasan_save_alloc_info+0x40/0x58
[   33.537061]  __kasan_kmalloc+0xd4/0xd8
[   33.537557]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.538311]  kasan_bitops_generic+0xa0/0x1c8
[   33.538889]  kunit_try_run_case+0x14c/0x3d0
[   33.539557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.540275]  kthread+0x24c/0x2d0
[   33.540778]  ret_from_fork+0x10/0x20
[   33.541379] 
[   33.541770] The buggy address belongs to the object at fff00000c61b4360
[   33.541770]  which belongs to the cache kmalloc-16 of size 16
[   33.543212] The buggy address is located 8 bytes inside of
[   33.543212]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.544551] 
[   33.544915] The buggy address belongs to the physical page:
[   33.545674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.546554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.547449] page_type: f5(slab)
[   33.548012] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.549009] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.549913] page dumped because: kasan: bad access detected
[   33.550569] 
[   33.550930] Memory state around the buggy address:
[   33.551564]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.552354]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.553296] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.554113]                                                           ^
[   33.555008]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.555891]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.556749] ==================================================================
[   33.600092] ==================================================================
[   33.600854] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   33.601699] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.602613] 
[   33.603092] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.604387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.605071] Hardware name: linux,dummy-virt (DT)
[   33.605653] Call trace:
[   33.606573]  show_stack+0x20/0x38 (C)
[   33.607197]  dump_stack_lvl+0x8c/0xd0
[   33.607794]  print_report+0x118/0x5e0
[   33.608374]  kasan_report+0xc8/0x118
[   33.609405]  kasan_check_range+0x100/0x1a8
[   33.610053]  __kasan_check_write+0x20/0x30
[   33.610649]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   33.611489]  kasan_bitops_generic+0x110/0x1c8
[   33.613058]  kunit_try_run_case+0x14c/0x3d0
[   33.614128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.615302]  kthread+0x24c/0x2d0
[   33.616028]  ret_from_fork+0x10/0x20
[   33.616761] 
[   33.617205] Allocated by task 250:
[   33.617901]  kasan_save_stack+0x3c/0x68
[   33.618700]  kasan_save_track+0x20/0x40
[   33.619494]  kasan_save_alloc_info+0x40/0x58
[   33.620371]  __kasan_kmalloc+0xd4/0xd8
[   33.621102]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.621632]  kasan_bitops_generic+0xa0/0x1c8
[   33.622300]  kunit_try_run_case+0x14c/0x3d0
[   33.622990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.623671]  kthread+0x24c/0x2d0
[   33.624217]  ret_from_fork+0x10/0x20
[   33.624733] 
[   33.625393] The buggy address belongs to the object at fff00000c61b4360
[   33.625393]  which belongs to the cache kmalloc-16 of size 16
[   33.627002] The buggy address is located 8 bytes inside of
[   33.627002]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.628527] 
[   33.628840] The buggy address belongs to the physical page:
[   33.629695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.630727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.631618] page_type: f5(slab)
[   33.632203] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.633205] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.634155] page dumped because: kasan: bad access detected
[   33.634928] 
[   33.635276] Memory state around the buggy address:
[   33.635992]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.637071]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.637970] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.638894]                                                           ^
[   33.639750]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.640618]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.641540] ==================================================================
[   33.643341] ==================================================================
[   33.644241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   33.645515] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.647119] 
[   33.647493] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.648800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.649411] Hardware name: linux,dummy-virt (DT)
[   33.650097] Call trace:
[   33.650534]  show_stack+0x20/0x38 (C)
[   33.651219]  dump_stack_lvl+0x8c/0xd0
[   33.651943]  print_report+0x118/0x5e0
[   33.652564]  kasan_report+0xc8/0x118
[   33.653249]  __asan_report_load8_noabort+0x20/0x30
[   33.653982]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   33.654802]  kasan_bitops_generic+0x110/0x1c8
[   33.655572]  kunit_try_run_case+0x14c/0x3d0
[   33.656334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.657225]  kthread+0x24c/0x2d0
[   33.657856]  ret_from_fork+0x10/0x20
[   33.658609] 
[   33.659304] Allocated by task 250:
[   33.659687]  kasan_save_stack+0x3c/0x68
[   33.660154]  kasan_save_track+0x20/0x40
[   33.660603]  kasan_save_alloc_info+0x40/0x58
[   33.661169]  __kasan_kmalloc+0xd4/0xd8
[   33.662418]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.663291]  kasan_bitops_generic+0xa0/0x1c8
[   33.663916]  kunit_try_run_case+0x14c/0x3d0
[   33.664497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.665452]  kthread+0x24c/0x2d0
[   33.666334]  ret_from_fork+0x10/0x20
[   33.667008] 
[   33.667306] The buggy address belongs to the object at fff00000c61b4360
[   33.667306]  which belongs to the cache kmalloc-16 of size 16
[   33.668638] The buggy address is located 8 bytes inside of
[   33.668638]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.670467] 
[   33.670840] The buggy address belongs to the physical page:
[   33.671519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.672510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.673283] page_type: f5(slab)
[   33.673760] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.674695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.675507] page dumped because: kasan: bad access detected
[   33.676329] 
[   33.676680] Memory state around the buggy address:
[   33.677344]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.678271]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.679204] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.679931]                                                           ^
[   33.680906]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.681828]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.682623] ==================================================================
[   33.400769] ==================================================================
[   33.401604] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.402483] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.404136] 
[   33.404489] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.405694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.406332] Hardware name: linux,dummy-virt (DT)
[   33.406974] Call trace:
[   33.407409]  show_stack+0x20/0x38 (C)
[   33.408018]  dump_stack_lvl+0x8c/0xd0
[   33.408671]  print_report+0x118/0x5e0
[   33.409725]  kasan_report+0xc8/0x118
[   33.410502]  __asan_report_load8_noabort+0x20/0x30
[   33.411344]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.412097]  kasan_bitops_generic+0x110/0x1c8
[   33.412732]  kunit_try_run_case+0x14c/0x3d0
[   33.413388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.414227]  kthread+0x24c/0x2d0
[   33.414736]  ret_from_fork+0x10/0x20
[   33.415391] 
[   33.415805] Allocated by task 250:
[   33.416384]  kasan_save_stack+0x3c/0x68
[   33.416974]  kasan_save_track+0x20/0x40
[   33.417472]  kasan_save_alloc_info+0x40/0x58
[   33.418201]  __kasan_kmalloc+0xd4/0xd8
[   33.418803]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.419515]  kasan_bitops_generic+0xa0/0x1c8
[   33.420109]  kunit_try_run_case+0x14c/0x3d0
[   33.420769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.421504]  kthread+0x24c/0x2d0
[   33.422000]  ret_from_fork+0x10/0x20
[   33.422548] 
[   33.422933] The buggy address belongs to the object at fff00000c61b4360
[   33.422933]  which belongs to the cache kmalloc-16 of size 16
[   33.424368] The buggy address is located 8 bytes inside of
[   33.424368]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.425693] 
[   33.426031] The buggy address belongs to the physical page:
[   33.426667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.427701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.428560] page_type: f5(slab)
[   33.429009] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.429952] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.430926] page dumped because: kasan: bad access detected
[   33.431575] 
[   33.431921] Memory state around the buggy address:
[   33.432601]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.433423]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.434301] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.435244]                                                           ^
[   33.436071]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.436941]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.437785] ==================================================================
[   33.283192] ==================================================================
[   33.284449] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.285498] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.286663] 
[   33.287127] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.288499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.289041] Hardware name: linux,dummy-virt (DT)
[   33.289582] Call trace:
[   33.290102]  show_stack+0x20/0x38 (C)
[   33.290832]  dump_stack_lvl+0x8c/0xd0
[   33.291487]  print_report+0x118/0x5e0
[   33.292059]  kasan_report+0xc8/0x118
[   33.292665]  kasan_check_range+0x100/0x1a8
[   33.293365]  __kasan_check_write+0x20/0x30
[   33.294011]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.294734]  kasan_bitops_generic+0x110/0x1c8
[   33.295433]  kunit_try_run_case+0x14c/0x3d0
[   33.296068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.296836]  kthread+0x24c/0x2d0
[   33.297307]  ret_from_fork+0x10/0x20
[   33.297972] 
[   33.298337] Allocated by task 250:
[   33.298792]  kasan_save_stack+0x3c/0x68
[   33.299511]  kasan_save_track+0x20/0x40
[   33.300170]  kasan_save_alloc_info+0x40/0x58
[   33.300801]  __kasan_kmalloc+0xd4/0xd8
[   33.301342]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.302102]  kasan_bitops_generic+0xa0/0x1c8
[   33.302604]  kunit_try_run_case+0x14c/0x3d0
[   33.303383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.304142]  kthread+0x24c/0x2d0
[   33.304603]  ret_from_fork+0x10/0x20
[   33.305155] 
[   33.305530] The buggy address belongs to the object at fff00000c61b4360
[   33.305530]  which belongs to the cache kmalloc-16 of size 16
[   33.306978] The buggy address is located 8 bytes inside of
[   33.306978]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.308300] 
[   33.308605] The buggy address belongs to the physical page:
[   33.309446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.310322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.311276] page_type: f5(slab)
[   33.311733] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.312762] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.313689] page dumped because: kasan: bad access detected
[   33.314417] 
[   33.314739] Memory state around the buggy address:
[   33.315430]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.316571]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.317435] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.318546]                                                           ^
[   33.319525]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.320510]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.321356] ==================================================================
[   33.439947] ==================================================================
[   33.440897] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   33.441820] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.442519] 
[   33.442868] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.444118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.444673] Hardware name: linux,dummy-virt (DT)
[   33.445302] Call trace:
[   33.445787]  show_stack+0x20/0x38 (C)
[   33.446331]  dump_stack_lvl+0x8c/0xd0
[   33.446954]  print_report+0x118/0x5e0
[   33.447589]  kasan_report+0xc8/0x118
[   33.448209]  kasan_check_range+0x100/0x1a8
[   33.448813]  __kasan_check_write+0x20/0x30
[   33.449443]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   33.450149]  kasan_bitops_generic+0x110/0x1c8
[   33.450865]  kunit_try_run_case+0x14c/0x3d0
[   33.451510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.452307]  kthread+0x24c/0x2d0
[   33.452851]  ret_from_fork+0x10/0x20
[   33.453446] 
[   33.453726] Allocated by task 250:
[   33.454379]  kasan_save_stack+0x3c/0x68
[   33.454894]  kasan_save_track+0x20/0x40
[   33.455510]  kasan_save_alloc_info+0x40/0x58
[   33.456318]  __kasan_kmalloc+0xd4/0xd8
[   33.456856]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.457593]  kasan_bitops_generic+0xa0/0x1c8
[   33.458204]  kunit_try_run_case+0x14c/0x3d0
[   33.458922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.459552]  kthread+0x24c/0x2d0
[   33.460172]  ret_from_fork+0x10/0x20
[   33.460707] 
[   33.461033] The buggy address belongs to the object at fff00000c61b4360
[   33.461033]  which belongs to the cache kmalloc-16 of size 16
[   33.462455] The buggy address is located 8 bytes inside of
[   33.462455]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.463785] 
[   33.464159] The buggy address belongs to the physical page:
[   33.464924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.465815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.466669] page_type: f5(slab)
[   33.467176] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.468208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.469154] page dumped because: kasan: bad access detected
[   33.469801] 
[   33.470115] Memory state around the buggy address:
[   33.470717]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.471845]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.472806] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.473668]                                                           ^
[   33.474511]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.475404]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.476248] ==================================================================
[   33.323052] ==================================================================
[   33.324983] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.326003] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.327058] 
[   33.327536] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.328808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.329426] Hardware name: linux,dummy-virt (DT)
[   33.330038] Call trace:
[   33.330434]  show_stack+0x20/0x38 (C)
[   33.331064]  dump_stack_lvl+0x8c/0xd0
[   33.331603]  print_report+0x118/0x5e0
[   33.332300]  kasan_report+0xc8/0x118
[   33.332924]  __asan_report_load8_noabort+0x20/0x30
[   33.333729]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.334486]  kasan_bitops_generic+0x110/0x1c8
[   33.335139]  kunit_try_run_case+0x14c/0x3d0
[   33.335793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.336566]  kthread+0x24c/0x2d0
[   33.337164]  ret_from_fork+0x10/0x20
[   33.337700] 
[   33.338031] Allocated by task 250:
[   33.338535]  kasan_save_stack+0x3c/0x68
[   33.339212]  kasan_save_track+0x20/0x40
[   33.339780]  kasan_save_alloc_info+0x40/0x58
[   33.340418]  __kasan_kmalloc+0xd4/0xd8
[   33.340980]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.341640]  kasan_bitops_generic+0xa0/0x1c8
[   33.342242]  kunit_try_run_case+0x14c/0x3d0
[   33.342766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.343582]  kthread+0x24c/0x2d0
[   33.344112]  ret_from_fork+0x10/0x20
[   33.344595] 
[   33.345076] The buggy address belongs to the object at fff00000c61b4360
[   33.345076]  which belongs to the cache kmalloc-16 of size 16
[   33.346513] The buggy address is located 8 bytes inside of
[   33.346513]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.347827] 
[   33.348197] The buggy address belongs to the physical page:
[   33.348938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.349823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.350726] page_type: f5(slab)
[   33.351299] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.352169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.353116] page dumped because: kasan: bad access detected
[   33.353797] 
[   33.354156] Memory state around the buggy address:
[   33.354742]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.355673]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.356512] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.357376]                                                           ^
[   33.358168]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.359001]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.359823] ==================================================================

[   31.287018] ==================================================================
[   31.288450] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   31.289052] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.289481] 
[   31.289725] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.290435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.290833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.291347] Call Trace:
[   31.291722]  <TASK>
[   31.292197]  dump_stack_lvl+0x73/0xb0
[   31.292585]  print_report+0xd1/0x640
[   31.292902]  ? __virt_addr_valid+0x1db/0x2d0
[   31.293599]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.293983]  kasan_report+0x102/0x140
[   31.294268]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   31.294833]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   31.295490]  kasan_check_range+0x10c/0x1c0
[   31.296093]  __kasan_check_write+0x18/0x20
[   31.296577]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   31.297141]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.297528]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.297884]  ? trace_hardirqs_on+0x37/0xe0
[   31.298392]  ? kasan_bitops_generic+0x93/0x1c0
[   31.298993]  kasan_bitops_generic+0x117/0x1c0
[   31.299540]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.300352]  ? __pfx_read_tsc+0x10/0x10
[   31.300738]  ? ktime_get_ts64+0x86/0x230
[   31.301169]  kunit_try_run_case+0x1b3/0x490
[   31.301563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.302051]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.302386]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.302749]  ? __kthread_parkme+0x82/0x160
[   31.303079]  ? preempt_count_sub+0x50/0x80
[   31.303757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.304348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.304926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.305438]  kthread+0x257/0x310
[   31.305782]  ? __pfx_kthread+0x10/0x10
[   31.306228]  ret_from_fork+0x41/0x80
[   31.306552]  ? __pfx_kthread+0x10/0x10
[   31.306942]  ret_from_fork_asm+0x1a/0x30
[   31.307411]  </TASK>
[   31.307638] 
[   31.307873] Allocated by task 268:
[   31.308274]  kasan_save_stack+0x3d/0x60
[   31.308770]  kasan_save_track+0x18/0x40
[   31.309145]  kasan_save_alloc_info+0x3b/0x50
[   31.309545]  __kasan_kmalloc+0xb7/0xc0
[   31.310023]  __kmalloc_cache_noprof+0x184/0x410
[   31.310381]  kasan_bitops_generic+0x93/0x1c0
[   31.310709]  kunit_try_run_case+0x1b3/0x490
[   31.311241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.311914]  kthread+0x257/0x310
[   31.312298]  ret_from_fork+0x41/0x80
[   31.312798]  ret_from_fork_asm+0x1a/0x30
[   31.313119] 
[   31.313284] The buggy address belongs to the object at ffff8881025ed7e0
[   31.313284]  which belongs to the cache kmalloc-16 of size 16
[   31.314190] The buggy address is located 8 bytes inside of
[   31.314190]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.315195] 
[   31.315439] The buggy address belongs to the physical page:
[   31.316100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.316556] flags: 0x200000000000000(node=0|zone=2)
[   31.317096] page_type: f5(slab)
[   31.317507] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.318661] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.319408] page dumped because: kasan: bad access detected
[   31.320037] 
[   31.320197] Memory state around the buggy address:
[   31.320508]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.322034]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.322879] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.323369]                                                           ^
[   31.323865]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.324713]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.325405] ==================================================================
[   31.327083] ==================================================================
[   31.328524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   31.329442] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.330072] 
[   31.330301] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.331302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.331578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.332580] Call Trace:
[   31.333440]  <TASK>
[   31.333633]  dump_stack_lvl+0x73/0xb0
[   31.334268]  print_report+0xd1/0x640
[   31.334715]  ? __virt_addr_valid+0x1db/0x2d0
[   31.335438]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.336008]  kasan_report+0x102/0x140
[   31.336555]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   31.337309]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   31.337905]  kasan_check_range+0x10c/0x1c0
[   31.338517]  __kasan_check_write+0x18/0x20
[   31.339072]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   31.339753]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.340504]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.341066]  ? trace_hardirqs_on+0x37/0xe0
[   31.341549]  ? kasan_bitops_generic+0x93/0x1c0
[   31.342106]  kasan_bitops_generic+0x117/0x1c0
[   31.342696]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.343248]  ? __pfx_read_tsc+0x10/0x10
[   31.343813]  ? ktime_get_ts64+0x86/0x230
[   31.344258]  kunit_try_run_case+0x1b3/0x490
[   31.344659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.345240]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.345727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.346282]  ? __kthread_parkme+0x82/0x160
[   31.346667]  ? preempt_count_sub+0x50/0x80
[   31.347220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.347598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.348406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.348959]  kthread+0x257/0x310
[   31.349285]  ? __pfx_kthread+0x10/0x10
[   31.349865]  ret_from_fork+0x41/0x80
[   31.350182]  ? __pfx_kthread+0x10/0x10
[   31.350715]  ret_from_fork_asm+0x1a/0x30
[   31.351136]  </TASK>
[   31.351488] 
[   31.351847] Allocated by task 268:
[   31.352173]  kasan_save_stack+0x3d/0x60
[   31.352714]  kasan_save_track+0x18/0x40
[   31.353153]  kasan_save_alloc_info+0x3b/0x50
[   31.353673]  __kasan_kmalloc+0xb7/0xc0
[   31.354048]  __kmalloc_cache_noprof+0x184/0x410
[   31.354597]  kasan_bitops_generic+0x93/0x1c0
[   31.355210]  kunit_try_run_case+0x1b3/0x490
[   31.355580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.356330]  kthread+0x257/0x310
[   31.356621]  ret_from_fork+0x41/0x80
[   31.357188]  ret_from_fork_asm+0x1a/0x30
[   31.357573] 
[   31.357897] The buggy address belongs to the object at ffff8881025ed7e0
[   31.357897]  which belongs to the cache kmalloc-16 of size 16
[   31.358908] The buggy address is located 8 bytes inside of
[   31.358908]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.360011] 
[   31.360221] The buggy address belongs to the physical page:
[   31.361719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.362825] flags: 0x200000000000000(node=0|zone=2)
[   31.363317] page_type: f5(slab)
[   31.363658] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.364464] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.365896] page dumped because: kasan: bad access detected
[   31.366423] 
[   31.366809] Memory state around the buggy address:
[   31.367265]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.367970]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.368640] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.369343]                                                           ^
[   31.370030]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.370577]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.371367] ==================================================================
[   31.415874] ==================================================================
[   31.416895] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   31.417501] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.418359] 
[   31.418610] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.419647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.420087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.420836] Call Trace:
[   31.421270]  <TASK>
[   31.421589]  dump_stack_lvl+0x73/0xb0
[   31.422062]  print_report+0xd1/0x640
[   31.422553]  ? __virt_addr_valid+0x1db/0x2d0
[   31.423031]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.423721]  kasan_report+0x102/0x140
[   31.424100]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   31.424746]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   31.425448]  kasan_check_range+0x10c/0x1c0
[   31.425907]  __kasan_check_write+0x18/0x20
[   31.426209]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   31.426744]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.427379]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.427953]  ? trace_hardirqs_on+0x37/0xe0
[   31.428858]  ? kasan_bitops_generic+0x93/0x1c0
[   31.429408]  kasan_bitops_generic+0x117/0x1c0
[   31.430070]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.430761]  ? __pfx_read_tsc+0x10/0x10
[   31.431247]  ? ktime_get_ts64+0x86/0x230
[   31.432097]  kunit_try_run_case+0x1b3/0x490
[   31.432458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.432875]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.433314]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.433853]  ? __kthread_parkme+0x82/0x160
[   31.434302]  ? preempt_count_sub+0x50/0x80
[   31.434726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.435232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.436000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.436477]  kthread+0x257/0x310
[   31.437024]  ? __pfx_kthread+0x10/0x10
[   31.437403]  ret_from_fork+0x41/0x80
[   31.437941]  ? __pfx_kthread+0x10/0x10
[   31.438388]  ret_from_fork_asm+0x1a/0x30
[   31.438922]  </TASK>
[   31.439304] 
[   31.439498] Allocated by task 268:
[   31.439961]  kasan_save_stack+0x3d/0x60
[   31.440479]  kasan_save_track+0x18/0x40
[   31.440889]  kasan_save_alloc_info+0x3b/0x50
[   31.441430]  __kasan_kmalloc+0xb7/0xc0
[   31.441915]  __kmalloc_cache_noprof+0x184/0x410
[   31.442525]  kasan_bitops_generic+0x93/0x1c0
[   31.443121]  kunit_try_run_case+0x1b3/0x490
[   31.443668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.444321]  kthread+0x257/0x310
[   31.444807]  ret_from_fork+0x41/0x80
[   31.445242]  ret_from_fork_asm+0x1a/0x30
[   31.445834] 
[   31.446146] The buggy address belongs to the object at ffff8881025ed7e0
[   31.446146]  which belongs to the cache kmalloc-16 of size 16
[   31.447193] The buggy address is located 8 bytes inside of
[   31.447193]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.448315] 
[   31.448481] The buggy address belongs to the physical page:
[   31.449193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.449848] flags: 0x200000000000000(node=0|zone=2)
[   31.450422] page_type: f5(slab)
[   31.450735] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.451524] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.452231] page dumped because: kasan: bad access detected
[   31.452756] 
[   31.453059] Memory state around the buggy address:
[   31.453515]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.454226]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.454977] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.455629]                                                           ^
[   31.456453]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.457773]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.458589] ==================================================================
[   31.244502] ==================================================================
[   31.245505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   31.246628] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.247442] 
[   31.247732] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.248710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.249105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.249972] Call Trace:
[   31.250292]  <TASK>
[   31.250662]  dump_stack_lvl+0x73/0xb0
[   31.251396]  print_report+0xd1/0x640
[   31.251775]  ? __virt_addr_valid+0x1db/0x2d0
[   31.252492]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.253099]  kasan_report+0x102/0x140
[   31.253423]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   31.254186]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   31.254608]  kasan_check_range+0x10c/0x1c0
[   31.255244]  __kasan_check_write+0x18/0x20
[   31.255652]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   31.256291]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.257078]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.257701]  ? trace_hardirqs_on+0x37/0xe0
[   31.258250]  ? kasan_bitops_generic+0x93/0x1c0
[   31.259735]  kasan_bitops_generic+0x117/0x1c0
[   31.260080]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.260458]  ? __pfx_read_tsc+0x10/0x10
[   31.261008]  ? ktime_get_ts64+0x86/0x230
[   31.261320]  kunit_try_run_case+0x1b3/0x490
[   31.261913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.262252]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.262836]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.263278]  ? __kthread_parkme+0x82/0x160
[   31.263643]  ? preempt_count_sub+0x50/0x80
[   31.264136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.264616]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.265340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.265960]  kthread+0x257/0x310
[   31.266294]  ? __pfx_kthread+0x10/0x10
[   31.266707]  ret_from_fork+0x41/0x80
[   31.267033]  ? __pfx_kthread+0x10/0x10
[   31.267404]  ret_from_fork_asm+0x1a/0x30
[   31.268046]  </TASK>
[   31.268338] 
[   31.268504] Allocated by task 268:
[   31.268854]  kasan_save_stack+0x3d/0x60
[   31.269324]  kasan_save_track+0x18/0x40
[   31.269863]  kasan_save_alloc_info+0x3b/0x50
[   31.270254]  __kasan_kmalloc+0xb7/0xc0
[   31.270667]  __kmalloc_cache_noprof+0x184/0x410
[   31.271077]  kasan_bitops_generic+0x93/0x1c0
[   31.271386]  kunit_try_run_case+0x1b3/0x490
[   31.271970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.272611]  kthread+0x257/0x310
[   31.272887]  ret_from_fork+0x41/0x80
[   31.273374]  ret_from_fork_asm+0x1a/0x30
[   31.273892] 
[   31.274156] The buggy address belongs to the object at ffff8881025ed7e0
[   31.274156]  which belongs to the cache kmalloc-16 of size 16
[   31.275190] The buggy address is located 8 bytes inside of
[   31.275190]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.276212] 
[   31.276384] The buggy address belongs to the physical page:
[   31.276867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.277771] flags: 0x200000000000000(node=0|zone=2)
[   31.278109] page_type: f5(slab)
[   31.278398] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.279488] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.280282] page dumped because: kasan: bad access detected
[   31.280655] 
[   31.280842] Memory state around the buggy address:
[   31.281154]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.282256]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.282674] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.283653]                                                           ^
[   31.284454]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.285381]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.286029] ==================================================================
[   31.372722] ==================================================================
[   31.373541] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   31.374458] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.375306] 
[   31.375631] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.376664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.377042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.377779] Call Trace:
[   31.378132]  <TASK>
[   31.378403]  dump_stack_lvl+0x73/0xb0
[   31.378939]  print_report+0xd1/0x640
[   31.379410]  ? __virt_addr_valid+0x1db/0x2d0
[   31.379939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.380494]  kasan_report+0x102/0x140
[   31.381042]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   31.381560]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   31.382292]  kasan_check_range+0x10c/0x1c0
[   31.382651]  __kasan_check_write+0x18/0x20
[   31.383245]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   31.383993]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.384556]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.385110]  ? trace_hardirqs_on+0x37/0xe0
[   31.385698]  ? kasan_bitops_generic+0x93/0x1c0
[   31.386299]  kasan_bitops_generic+0x117/0x1c0
[   31.386837]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.387498]  ? __pfx_read_tsc+0x10/0x10
[   31.387958]  ? ktime_get_ts64+0x86/0x230
[   31.388435]  kunit_try_run_case+0x1b3/0x490
[   31.389023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.389507]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.390114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.390561]  ? __kthread_parkme+0x82/0x160
[   31.391053]  ? preempt_count_sub+0x50/0x80
[   31.391513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.392201]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.393016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.393590]  kthread+0x257/0x310
[   31.393995]  ? __pfx_kthread+0x10/0x10
[   31.394387]  ret_from_fork+0x41/0x80
[   31.394950]  ? __pfx_kthread+0x10/0x10
[   31.395392]  ret_from_fork_asm+0x1a/0x30
[   31.395941]  </TASK>
[   31.396290] 
[   31.396552] Allocated by task 268:
[   31.397099]  kasan_save_stack+0x3d/0x60
[   31.397450]  kasan_save_track+0x18/0x40
[   31.398024]  kasan_save_alloc_info+0x3b/0x50
[   31.398498]  __kasan_kmalloc+0xb7/0xc0
[   31.398924]  __kmalloc_cache_noprof+0x184/0x410
[   31.399502]  kasan_bitops_generic+0x93/0x1c0
[   31.400028]  kunit_try_run_case+0x1b3/0x490
[   31.400484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.401244]  kthread+0x257/0x310
[   31.401575]  ret_from_fork+0x41/0x80
[   31.402072]  ret_from_fork_asm+0x1a/0x30
[   31.402501] 
[   31.402840] The buggy address belongs to the object at ffff8881025ed7e0
[   31.402840]  which belongs to the cache kmalloc-16 of size 16
[   31.403905] The buggy address is located 8 bytes inside of
[   31.403905]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.405096] 
[   31.405387] The buggy address belongs to the physical page:
[   31.405985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.406634] flags: 0x200000000000000(node=0|zone=2)
[   31.407225] page_type: f5(slab)
[   31.407546] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.408419] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.409227] page dumped because: kasan: bad access detected
[   31.409706] 
[   31.409917] Memory state around the buggy address:
[   31.410317]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.411013]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.411631] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.412437]                                                           ^
[   31.413004]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.413924]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.414556] ==================================================================
[   31.149674] ==================================================================
[   31.150412] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   31.150806] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.151718] 
[   31.151957] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.153156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.154397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.155352] Call Trace:
[   31.155670]  <TASK>
[   31.156007]  dump_stack_lvl+0x73/0xb0
[   31.156317]  print_report+0xd1/0x640
[   31.156744]  ? __virt_addr_valid+0x1db/0x2d0
[   31.157260]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.157814]  kasan_report+0x102/0x140
[   31.158136]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   31.158720]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   31.159404]  kasan_check_range+0x10c/0x1c0
[   31.159866]  __kasan_check_write+0x18/0x20
[   31.160322]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   31.160831]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.161455]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.161998]  ? trace_hardirqs_on+0x37/0xe0
[   31.162361]  ? kasan_bitops_generic+0x93/0x1c0
[   31.162907]  kasan_bitops_generic+0x117/0x1c0
[   31.163255]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.163866]  ? __pfx_read_tsc+0x10/0x10
[   31.164330]  ? ktime_get_ts64+0x86/0x230
[   31.164722]  kunit_try_run_case+0x1b3/0x490
[   31.165130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.165701]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.166299]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.166759]  ? __kthread_parkme+0x82/0x160
[   31.167271]  ? preempt_count_sub+0x50/0x80
[   31.167710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.168149]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.168834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.169375]  kthread+0x257/0x310
[   31.169801]  ? __pfx_kthread+0x10/0x10
[   31.170145]  ret_from_fork+0x41/0x80
[   31.170586]  ? __pfx_kthread+0x10/0x10
[   31.171121]  ret_from_fork_asm+0x1a/0x30
[   31.171514]  </TASK>
[   31.171938] 
[   31.172183] Allocated by task 268:
[   31.172534]  kasan_save_stack+0x3d/0x60
[   31.172910]  kasan_save_track+0x18/0x40
[   31.173385]  kasan_save_alloc_info+0x3b/0x50
[   31.173818]  __kasan_kmalloc+0xb7/0xc0
[   31.174229]  __kmalloc_cache_noprof+0x184/0x410
[   31.174831]  kasan_bitops_generic+0x93/0x1c0
[   31.175292]  kunit_try_run_case+0x1b3/0x490
[   31.175627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.176319]  kthread+0x257/0x310
[   31.176661]  ret_from_fork+0x41/0x80
[   31.177164]  ret_from_fork_asm+0x1a/0x30
[   31.177476] 
[   31.177726] The buggy address belongs to the object at ffff8881025ed7e0
[   31.177726]  which belongs to the cache kmalloc-16 of size 16
[   31.178758] The buggy address is located 8 bytes inside of
[   31.178758]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.179839] 
[   31.180011] The buggy address belongs to the physical page:
[   31.180351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.181264] flags: 0x200000000000000(node=0|zone=2)
[   31.181896] page_type: f5(slab)
[   31.182305] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.183070] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.183964] page dumped because: kasan: bad access detected
[   31.184502] 
[   31.184664] Memory state around the buggy address:
[   31.185095]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.185832]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.186473] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.187382]                                                           ^
[   31.188015]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.188756]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.189446] ==================================================================
[   31.191951] ==================================================================
[   31.192695] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   31.194479] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.196286] 
[   31.196554] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.197262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.197449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.198010] Call Trace:
[   31.198459]  <TASK>
[   31.198830]  dump_stack_lvl+0x73/0xb0
[   31.199452]  print_report+0xd1/0x640
[   31.200179]  ? __virt_addr_valid+0x1db/0x2d0
[   31.200926]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.201641]  kasan_report+0x102/0x140
[   31.202358]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   31.202937]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   31.204053]  kasan_check_range+0x10c/0x1c0
[   31.204649]  __kasan_check_write+0x18/0x20
[   31.205018]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   31.205950]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.206477]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.207043]  ? trace_hardirqs_on+0x37/0xe0
[   31.208000]  ? kasan_bitops_generic+0x93/0x1c0
[   31.208625]  kasan_bitops_generic+0x117/0x1c0
[   31.209246]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.209715]  ? __pfx_read_tsc+0x10/0x10
[   31.210456]  ? ktime_get_ts64+0x86/0x230
[   31.211138]  kunit_try_run_case+0x1b3/0x490
[   31.211538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.212474]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.213236]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.213721]  ? __kthread_parkme+0x82/0x160
[   31.214397]  ? preempt_count_sub+0x50/0x80
[   31.215040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.215625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.216543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.217147]  kthread+0x257/0x310
[   31.217759]  ? __pfx_kthread+0x10/0x10
[   31.218375]  ret_from_fork+0x41/0x80
[   31.218810]  ? __pfx_kthread+0x10/0x10
[   31.219206]  ret_from_fork_asm+0x1a/0x30
[   31.219635]  </TASK>
[   31.220456] 
[   31.220629] Allocated by task 268:
[   31.221635]  kasan_save_stack+0x3d/0x60
[   31.222446]  kasan_save_track+0x18/0x40
[   31.223154]  kasan_save_alloc_info+0x3b/0x50
[   31.223742]  __kasan_kmalloc+0xb7/0xc0
[   31.224392]  __kmalloc_cache_noprof+0x184/0x410
[   31.225063]  kasan_bitops_generic+0x93/0x1c0
[   31.225671]  kunit_try_run_case+0x1b3/0x490
[   31.226485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.227627]  kthread+0x257/0x310
[   31.227993]  ret_from_fork+0x41/0x80
[   31.228609]  ret_from_fork_asm+0x1a/0x30
[   31.229287] 
[   31.230107] The buggy address belongs to the object at ffff8881025ed7e0
[   31.230107]  which belongs to the cache kmalloc-16 of size 16
[   31.231476] The buggy address is located 8 bytes inside of
[   31.231476]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.233278] 
[   31.233775] The buggy address belongs to the physical page:
[   31.234202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.235088] flags: 0x200000000000000(node=0|zone=2)
[   31.235482] page_type: f5(slab)
[   31.235854] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.236490] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.237219] page dumped because: kasan: bad access detected
[   31.237784] 
[   31.238149] Memory state around the buggy address:
[   31.238626]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.239250]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.239954] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.240655]                                                           ^
[   31.241274]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.241972]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.242724] ==================================================================
[   31.459795] ==================================================================
[   31.461579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   31.463023] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.464622] 
[   31.464961] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.466009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.466415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.467552] Call Trace:
[   31.468470]  <TASK>
[   31.468980]  dump_stack_lvl+0x73/0xb0
[   31.469391]  print_report+0xd1/0x640
[   31.469802]  ? __virt_addr_valid+0x1db/0x2d0
[   31.470338]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.470713]  kasan_report+0x102/0x140
[   31.471105]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   31.471514]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   31.472153]  kasan_check_range+0x10c/0x1c0
[   31.472542]  __kasan_check_write+0x18/0x20
[   31.472961]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   31.473601]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.474026]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.474584]  ? trace_hardirqs_on+0x37/0xe0
[   31.474903]  ? kasan_bitops_generic+0x93/0x1c0
[   31.475449]  kasan_bitops_generic+0x117/0x1c0
[   31.476029]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.476423]  ? __pfx_read_tsc+0x10/0x10
[   31.476911]  ? ktime_get_ts64+0x86/0x230
[   31.477236]  kunit_try_run_case+0x1b3/0x490
[   31.477699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.478067]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.478624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.479187]  ? __kthread_parkme+0x82/0x160
[   31.479500]  ? preempt_count_sub+0x50/0x80
[   31.480151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.480618]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.481029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.481817]  kthread+0x257/0x310
[   31.482270]  ? __pfx_kthread+0x10/0x10
[   31.482656]  ret_from_fork+0x41/0x80
[   31.483176]  ? __pfx_kthread+0x10/0x10
[   31.483539]  ret_from_fork_asm+0x1a/0x30
[   31.484181]  </TASK>
[   31.484398] 
[   31.484559] Allocated by task 268:
[   31.484831]  kasan_save_stack+0x3d/0x60
[   31.485117]  kasan_save_track+0x18/0x40
[   31.485572]  kasan_save_alloc_info+0x3b/0x50
[   31.486124]  __kasan_kmalloc+0xb7/0xc0
[   31.486953]  __kmalloc_cache_noprof+0x184/0x410
[   31.487665]  kasan_bitops_generic+0x93/0x1c0
[   31.488925]  kunit_try_run_case+0x1b3/0x490
[   31.489217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.489470]  kthread+0x257/0x310
[   31.489634]  ret_from_fork+0x41/0x80
[   31.490313]  ret_from_fork_asm+0x1a/0x30
[   31.491051] 
[   31.491417] The buggy address belongs to the object at ffff8881025ed7e0
[   31.491417]  which belongs to the cache kmalloc-16 of size 16
[   31.492739] The buggy address is located 8 bytes inside of
[   31.492739]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.493932] 
[   31.494257] The buggy address belongs to the physical page:
[   31.494823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.495751] flags: 0x200000000000000(node=0|zone=2)
[   31.496294] page_type: f5(slab)
[   31.496741] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.497491] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.498354] page dumped because: kasan: bad access detected
[   31.498789] 
[   31.499181] Memory state around the buggy address:
[   31.499721]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.500472]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.501303] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.502083]                                                           ^
[   31.502579]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.503451]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.504266] ==================================================================