Hay
Date
Dec. 5, 2024, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   33.956599] ==================================================================
[   33.958251] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   33.959280] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.959977] 
[   33.960274] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.961435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.962094] Hardware name: linux,dummy-virt (DT)
[   33.962784] Call trace:
[   33.963191]  show_stack+0x20/0x38 (C)
[   33.963772]  dump_stack_lvl+0x8c/0xd0
[   33.964399]  print_report+0x118/0x5e0
[   33.964970]  kasan_report+0xc8/0x118
[   33.965457]  __asan_report_load8_noabort+0x20/0x30
[   33.966182]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   33.967141]  kasan_bitops_generic+0x11c/0x1c8
[   33.967804]  kunit_try_run_case+0x14c/0x3d0
[   33.968564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.969230]  kthread+0x24c/0x2d0
[   33.969833]  ret_from_fork+0x10/0x20
[   33.970424] 
[   33.970824] Allocated by task 250:
[   33.971427]  kasan_save_stack+0x3c/0x68
[   33.972034]  kasan_save_track+0x20/0x40
[   33.972525]  kasan_save_alloc_info+0x40/0x58
[   33.973243]  __kasan_kmalloc+0xd4/0xd8
[   33.973804]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.974651]  kasan_bitops_generic+0xa0/0x1c8
[   33.975252]  kunit_try_run_case+0x14c/0x3d0
[   33.975928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.976634]  kthread+0x24c/0x2d0
[   33.977221]  ret_from_fork+0x10/0x20
[   33.977685] 
[   33.978079] The buggy address belongs to the object at fff00000c61b4360
[   33.978079]  which belongs to the cache kmalloc-16 of size 16
[   33.979488] The buggy address is located 8 bytes inside of
[   33.979488]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.980823] 
[   33.981145] The buggy address belongs to the physical page:
[   33.981935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.982858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.983675] page_type: f5(slab)
[   33.984206] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.985165] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.986071] page dumped because: kasan: bad access detected
[   33.986756] 
[   33.987154] Memory state around the buggy address:
[   33.987937]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.988596]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.989486] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.990265]                                                           ^
[   33.991162]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.992092]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.992977] ==================================================================
[   33.919085] ==================================================================
[   33.919853] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   33.920861] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.921646] 
[   33.922122] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.923307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.923856] Hardware name: linux,dummy-virt (DT)
[   33.924430] Call trace:
[   33.924977]  show_stack+0x20/0x38 (C)
[   33.925548]  dump_stack_lvl+0x8c/0xd0
[   33.926183]  print_report+0x118/0x5e0
[   33.926745]  kasan_report+0xc8/0x118
[   33.927408]  kasan_check_range+0x100/0x1a8
[   33.928012]  __kasan_check_write+0x20/0x30
[   33.928658]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   33.929386]  kasan_bitops_generic+0x11c/0x1c8
[   33.930141]  kunit_try_run_case+0x14c/0x3d0
[   33.930784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.931599]  kthread+0x24c/0x2d0
[   33.932198]  ret_from_fork+0x10/0x20
[   33.932849] 
[   33.933163] Allocated by task 250:
[   33.933767]  kasan_save_stack+0x3c/0x68
[   33.934425]  kasan_save_track+0x20/0x40
[   33.935027]  kasan_save_alloc_info+0x40/0x58
[   33.935625]  __kasan_kmalloc+0xd4/0xd8
[   33.936193]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.936862]  kasan_bitops_generic+0xa0/0x1c8
[   33.937348]  kunit_try_run_case+0x14c/0x3d0
[   33.938029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.938765]  kthread+0x24c/0x2d0
[   33.939249]  ret_from_fork+0x10/0x20
[   33.939765] 
[   33.940149] The buggy address belongs to the object at fff00000c61b4360
[   33.940149]  which belongs to the cache kmalloc-16 of size 16
[   33.941555] The buggy address is located 8 bytes inside of
[   33.941555]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.942964] 
[   33.943412] The buggy address belongs to the physical page:
[   33.944106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.944960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.945818] page_type: f5(slab)
[   33.946353] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.947284] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.948161] page dumped because: kasan: bad access detected
[   33.948779] 
[   33.949141] Memory state around the buggy address:
[   33.949660]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.950709]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.951549] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.952379]                                                           ^
[   33.953136]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.954065]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.954978] ==================================================================
[   33.880421] ==================================================================
[   33.881297] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   33.883487] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.884535] 
[   33.885011] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.886457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.887044] Hardware name: linux,dummy-virt (DT)
[   33.887716] Call trace:
[   33.888098]  show_stack+0x20/0x38 (C)
[   33.888728]  dump_stack_lvl+0x8c/0xd0
[   33.889289]  print_report+0x118/0x5e0
[   33.889913]  kasan_report+0xc8/0x118
[   33.890449]  __asan_report_load8_noabort+0x20/0x30
[   33.891230]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   33.891911]  kasan_bitops_generic+0x11c/0x1c8
[   33.892720]  kunit_try_run_case+0x14c/0x3d0
[   33.893368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.894151]  kthread+0x24c/0x2d0
[   33.894662]  ret_from_fork+0x10/0x20
[   33.895351] 
[   33.895664] Allocated by task 250:
[   33.896206]  kasan_save_stack+0x3c/0x68
[   33.896773]  kasan_save_track+0x20/0x40
[   33.897290]  kasan_save_alloc_info+0x40/0x58
[   33.898012]  __kasan_kmalloc+0xd4/0xd8
[   33.898766]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.899668]  kasan_bitops_generic+0xa0/0x1c8
[   33.900084]  kunit_try_run_case+0x14c/0x3d0
[   33.900593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.901311]  kthread+0x24c/0x2d0
[   33.901786]  ret_from_fork+0x10/0x20
[   33.902476] 
[   33.902794] The buggy address belongs to the object at fff00000c61b4360
[   33.902794]  which belongs to the cache kmalloc-16 of size 16
[   33.904118] The buggy address is located 8 bytes inside of
[   33.904118]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.905426] 
[   33.905792] The buggy address belongs to the physical page:
[   33.906529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.907393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.908334] page_type: f5(slab)
[   33.908827] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.909698] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.910726] page dumped because: kasan: bad access detected
[   33.911411] 
[   33.911734] Memory state around the buggy address:
[   33.912456]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.913283]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.914252] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.915090]                                                           ^
[   33.916027]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.916864]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.917703] ==================================================================
[   33.994241] ==================================================================
[   33.995082] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   33.996264] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.997285] 
[   33.997607] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.998833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.999495] Hardware name: linux,dummy-virt (DT)
[   34.000142] Call trace:
[   34.000537]  show_stack+0x20/0x38 (C)
[   34.001205]  dump_stack_lvl+0x8c/0xd0
[   34.001778]  print_report+0x118/0x5e0
[   34.002286]  kasan_report+0xc8/0x118
[   34.002988]  __asan_report_load8_noabort+0x20/0x30
[   34.003648]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   34.004668]  kasan_bitops_generic+0x11c/0x1c8
[   34.005306]  kunit_try_run_case+0x14c/0x3d0
[   34.005822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.006665]  kthread+0x24c/0x2d0
[   34.007279]  ret_from_fork+0x10/0x20
[   34.007768] 
[   34.008178] Allocated by task 250:
[   34.008719]  kasan_save_stack+0x3c/0x68
[   34.009516]  kasan_save_track+0x20/0x40
[   34.010047]  kasan_save_alloc_info+0x40/0x58
[   34.010800]  __kasan_kmalloc+0xd4/0xd8
[   34.011430]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.012079]  kasan_bitops_generic+0xa0/0x1c8
[   34.012633]  kunit_try_run_case+0x14c/0x3d0
[   34.013263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.013974]  kthread+0x24c/0x2d0
[   34.014507]  ret_from_fork+0x10/0x20
[   34.015052] 
[   34.015367] The buggy address belongs to the object at fff00000c61b4360
[   34.015367]  which belongs to the cache kmalloc-16 of size 16
[   34.016804] The buggy address is located 8 bytes inside of
[   34.016804]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   34.018220] 
[   34.018594] The buggy address belongs to the physical page:
[   34.019413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   34.020516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.021428] page_type: f5(slab)
[   34.022020] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.022981] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.023861] page dumped because: kasan: bad access detected
[   34.024563] 
[   34.024846] Memory state around the buggy address:
[   34.025531]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.026363]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.027293] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   34.028136]                                                           ^
[   34.028954]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.029931]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030822] ==================================================================
[   33.723104] ==================================================================
[   33.724270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   33.725355] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.727199] 
[   33.727563] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.728751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.729306] Hardware name: linux,dummy-virt (DT)
[   33.729932] Call trace:
[   33.730410]  show_stack+0x20/0x38 (C)
[   33.731004]  dump_stack_lvl+0x8c/0xd0
[   33.731625]  print_report+0x118/0x5e0
[   33.732233]  kasan_report+0xc8/0x118
[   33.732804]  __asan_report_load8_noabort+0x20/0x30
[   33.733464]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   33.734205]  kasan_bitops_generic+0x11c/0x1c8
[   33.734861]  kunit_try_run_case+0x14c/0x3d0
[   33.735529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.737136]  kthread+0x24c/0x2d0
[   33.737750]  ret_from_fork+0x10/0x20
[   33.738281] 
[   33.738645] Allocated by task 250:
[   33.739109]  kasan_save_stack+0x3c/0x68
[   33.739755]  kasan_save_track+0x20/0x40
[   33.740576]  kasan_save_alloc_info+0x40/0x58
[   33.741366]  __kasan_kmalloc+0xd4/0xd8
[   33.742050]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.742653]  kasan_bitops_generic+0xa0/0x1c8
[   33.743237]  kunit_try_run_case+0x14c/0x3d0
[   33.744073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.744929]  kthread+0x24c/0x2d0
[   33.745530]  ret_from_fork+0x10/0x20
[   33.746196] 
[   33.746568] The buggy address belongs to the object at fff00000c61b4360
[   33.746568]  which belongs to the cache kmalloc-16 of size 16
[   33.747887] The buggy address is located 8 bytes inside of
[   33.747887]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.749350] 
[   33.749727] The buggy address belongs to the physical page:
[   33.750468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.751549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.752605] page_type: f5(slab)
[   33.753197] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.754249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.755210] page dumped because: kasan: bad access detected
[   33.755951] 
[   33.756341] Memory state around the buggy address:
[   33.757060]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.757986]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.758982] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.759928]                                                           ^
[   33.760651]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.761483]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.762431] ==================================================================
[   33.763947] ==================================================================
[   33.764679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   33.765752] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.766856] 
[   33.768161] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.769313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.769802] Hardware name: linux,dummy-virt (DT)
[   33.770346] Call trace:
[   33.770711]  show_stack+0x20/0x38 (C)
[   33.771324]  dump_stack_lvl+0x8c/0xd0
[   33.772012]  print_report+0x118/0x5e0
[   33.772593]  kasan_report+0xc8/0x118
[   33.773264]  kasan_check_range+0x100/0x1a8
[   33.773780]  __kasan_check_write+0x20/0x30
[   33.774490]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   33.775308]  kasan_bitops_generic+0x11c/0x1c8
[   33.775984]  kunit_try_run_case+0x14c/0x3d0
[   33.776613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.777388]  kthread+0x24c/0x2d0
[   33.778067]  ret_from_fork+0x10/0x20
[   33.778668] 
[   33.778994] Allocated by task 250:
[   33.779689]  kasan_save_stack+0x3c/0x68
[   33.780179]  kasan_save_track+0x20/0x40
[   33.780903]  kasan_save_alloc_info+0x40/0x58
[   33.781442]  __kasan_kmalloc+0xd4/0xd8
[   33.782064]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.782749]  kasan_bitops_generic+0xa0/0x1c8
[   33.783411]  kunit_try_run_case+0x14c/0x3d0
[   33.784037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.784733]  kthread+0x24c/0x2d0
[   33.785252]  ret_from_fork+0x10/0x20
[   33.785790] 
[   33.786130] The buggy address belongs to the object at fff00000c61b4360
[   33.786130]  which belongs to the cache kmalloc-16 of size 16
[   33.787537] The buggy address is located 8 bytes inside of
[   33.787537]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.788998] 
[   33.789298] The buggy address belongs to the physical page:
[   33.790122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.791002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.791864] page_type: f5(slab)
[   33.792412] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.793366] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.794262] page dumped because: kasan: bad access detected
[   33.795033] 
[   33.795331] Memory state around the buggy address:
[   33.795922]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.796796]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.797684] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.798571]                                                           ^
[   33.799367]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.800248]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.801144] ==================================================================
[   33.841720] ==================================================================
[   33.843112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   33.844142] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.845016] 
[   33.845345] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.846563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.847148] Hardware name: linux,dummy-virt (DT)
[   33.847798] Call trace:
[   33.848237]  show_stack+0x20/0x38 (C)
[   33.849115]  dump_stack_lvl+0x8c/0xd0
[   33.849634]  print_report+0x118/0x5e0
[   33.850176]  kasan_report+0xc8/0x118
[   33.850894]  kasan_check_range+0x100/0x1a8
[   33.851482]  __kasan_check_write+0x20/0x30
[   33.852203]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   33.853043]  kasan_bitops_generic+0x11c/0x1c8
[   33.853749]  kunit_try_run_case+0x14c/0x3d0
[   33.854465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.855224]  kthread+0x24c/0x2d0
[   33.855818]  ret_from_fork+0x10/0x20
[   33.856370] 
[   33.856746] Allocated by task 250:
[   33.857276]  kasan_save_stack+0x3c/0x68
[   33.857810]  kasan_save_track+0x20/0x40
[   33.858474]  kasan_save_alloc_info+0x40/0x58
[   33.859100]  __kasan_kmalloc+0xd4/0xd8
[   33.859648]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.860275]  kasan_bitops_generic+0xa0/0x1c8
[   33.860929]  kunit_try_run_case+0x14c/0x3d0
[   33.861483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.862270]  kthread+0x24c/0x2d0
[   33.862869]  ret_from_fork+0x10/0x20
[   33.863716] 
[   33.864067] The buggy address belongs to the object at fff00000c61b4360
[   33.864067]  which belongs to the cache kmalloc-16 of size 16
[   33.865472] The buggy address is located 8 bytes inside of
[   33.865472]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.866868] 
[   33.867174] The buggy address belongs to the physical page:
[   33.867993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.868836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.869717] page_type: f5(slab)
[   33.870225] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.871254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.872224] page dumped because: kasan: bad access detected
[   33.872891] 
[   33.873235] Memory state around the buggy address:
[   33.873861]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.874705]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.875609] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.876449]                                                           ^
[   33.877224]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.878201]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.879038] ==================================================================
[   33.684789] ==================================================================
[   33.686067] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   33.687083] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.687825] 
[   33.688219] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.689225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.689852] Hardware name: linux,dummy-virt (DT)
[   33.690606] Call trace:
[   33.691032]  show_stack+0x20/0x38 (C)
[   33.691607]  dump_stack_lvl+0x8c/0xd0
[   33.692203]  print_report+0x118/0x5e0
[   33.692768]  kasan_report+0xc8/0x118
[   33.693333]  kasan_check_range+0x100/0x1a8
[   33.693861]  __kasan_check_write+0x20/0x30
[   33.694402]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   33.695399]  kasan_bitops_generic+0x11c/0x1c8
[   33.696174]  kunit_try_run_case+0x14c/0x3d0
[   33.697045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.697707]  kthread+0x24c/0x2d0
[   33.698380]  ret_from_fork+0x10/0x20
[   33.699088] 
[   33.699423] Allocated by task 250:
[   33.699845]  kasan_save_stack+0x3c/0x68
[   33.700541]  kasan_save_track+0x20/0x40
[   33.701132]  kasan_save_alloc_info+0x40/0x58
[   33.701712]  __kasan_kmalloc+0xd4/0xd8
[   33.702354]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.703105]  kasan_bitops_generic+0xa0/0x1c8
[   33.703759]  kunit_try_run_case+0x14c/0x3d0
[   33.704383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.705092]  kthread+0x24c/0x2d0
[   33.705582]  ret_from_fork+0x10/0x20
[   33.706128] 
[   33.706515] The buggy address belongs to the object at fff00000c61b4360
[   33.706515]  which belongs to the cache kmalloc-16 of size 16
[   33.707909] The buggy address is located 8 bytes inside of
[   33.707909]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.709284] 
[   33.709605] The buggy address belongs to the physical page:
[   33.710426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.711357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.712182] page_type: f5(slab)
[   33.712652] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.713553] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.714513] page dumped because: kasan: bad access detected
[   33.715192] 
[   33.715505] Memory state around the buggy address:
[   33.716152]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.717014]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.717852] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.718720]                                                           ^
[   33.719625]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.720505]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.721378] ==================================================================
[   33.802524] ==================================================================
[   33.803630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   33.804966] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.806305] 
[   33.806729] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.808111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.808642] Hardware name: linux,dummy-virt (DT)
[   33.809249] Call trace:
[   33.809627]  show_stack+0x20/0x38 (C)
[   33.810422]  dump_stack_lvl+0x8c/0xd0
[   33.811246]  print_report+0x118/0x5e0
[   33.811790]  kasan_report+0xc8/0x118
[   33.812441]  __asan_report_load8_noabort+0x20/0x30
[   33.813118]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   33.813950]  kasan_bitops_generic+0x11c/0x1c8
[   33.814682]  kunit_try_run_case+0x14c/0x3d0
[   33.815316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.816085]  kthread+0x24c/0x2d0
[   33.816688]  ret_from_fork+0x10/0x20
[   33.817182] 
[   33.817566] Allocated by task 250:
[   33.818193]  kasan_save_stack+0x3c/0x68
[   33.818773]  kasan_save_track+0x20/0x40
[   33.819260]  kasan_save_alloc_info+0x40/0x58
[   33.820026]  __kasan_kmalloc+0xd4/0xd8
[   33.820732]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.821349]  kasan_bitops_generic+0xa0/0x1c8
[   33.822081]  kunit_try_run_case+0x14c/0x3d0
[   33.822675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.823374]  kthread+0x24c/0x2d0
[   33.824028]  ret_from_fork+0x10/0x20
[   33.824567] 
[   33.825004] The buggy address belongs to the object at fff00000c61b4360
[   33.825004]  which belongs to the cache kmalloc-16 of size 16
[   33.826434] The buggy address is located 8 bytes inside of
[   33.826434]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.827866] 
[   33.828184] The buggy address belongs to the physical page:
[   33.828980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.829806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.830728] page_type: f5(slab)
[   33.831166] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.832151] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.833139] page dumped because: kasan: bad access detected
[   33.833823] 
[   33.834199] Memory state around the buggy address:
[   33.834836]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.835659]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.836544] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.837471]                                                           ^
[   33.838287]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.839158]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.839979] ==================================================================

[   31.593236] ==================================================================
[   31.595120] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   31.597813] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.598671] 
[   31.598989] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.600357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.600744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.601647] Call Trace:
[   31.602173]  <TASK>
[   31.602516]  dump_stack_lvl+0x73/0xb0
[   31.603165]  print_report+0xd1/0x640
[   31.603633]  ? __virt_addr_valid+0x1db/0x2d0
[   31.604246]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.604973]  kasan_report+0x102/0x140
[   31.605445]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   31.606521]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   31.607295]  kasan_check_range+0x10c/0x1c0
[   31.608228]  __kasan_check_write+0x18/0x20
[   31.608639]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   31.609593]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   31.610330]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.611378]  ? trace_hardirqs_on+0x37/0xe0
[   31.611782]  ? kasan_bitops_generic+0x93/0x1c0
[   31.612767]  kasan_bitops_generic+0x122/0x1c0
[   31.613295]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.613806]  ? __pfx_read_tsc+0x10/0x10
[   31.614219]  ? ktime_get_ts64+0x86/0x230
[   31.614659]  kunit_try_run_case+0x1b3/0x490
[   31.615027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.615543]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.615993]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.616456]  ? __kthread_parkme+0x82/0x160
[   31.617086]  ? preempt_count_sub+0x50/0x80
[   31.617502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.618083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.618634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.619378]  kthread+0x257/0x310
[   31.619927]  ? __pfx_kthread+0x10/0x10
[   31.620228]  ret_from_fork+0x41/0x80
[   31.620816]  ? __pfx_kthread+0x10/0x10
[   31.621228]  ret_from_fork_asm+0x1a/0x30
[   31.621646]  </TASK>
[   31.622061] 
[   31.622271] Allocated by task 268:
[   31.622705]  kasan_save_stack+0x3d/0x60
[   31.623221]  kasan_save_track+0x18/0x40
[   31.623657]  kasan_save_alloc_info+0x3b/0x50
[   31.624322]  __kasan_kmalloc+0xb7/0xc0
[   31.624744]  __kmalloc_cache_noprof+0x184/0x410
[   31.625388]  kasan_bitops_generic+0x93/0x1c0
[   31.625899]  kunit_try_run_case+0x1b3/0x490
[   31.626486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.626936]  kthread+0x257/0x310
[   31.627429]  ret_from_fork+0x41/0x80
[   31.627860]  ret_from_fork_asm+0x1a/0x30
[   31.628393] 
[   31.628600] The buggy address belongs to the object at ffff8881025ed7e0
[   31.628600]  which belongs to the cache kmalloc-16 of size 16
[   31.630651] The buggy address is located 8 bytes inside of
[   31.630651]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.632459] 
[   31.632768] The buggy address belongs to the physical page:
[   31.633369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.634059] flags: 0x200000000000000(node=0|zone=2)
[   31.635340] page_type: f5(slab)
[   31.635975] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.636988] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.638225] page dumped because: kasan: bad access detected
[   31.638696] 
[   31.638971] Memory state around the buggy address:
[   31.639521]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.640791]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.642221] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.642788]                                                           ^
[   31.643501]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.644639]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.645839] ==================================================================
[   31.815268] ==================================================================
[   31.815927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   31.816968] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.817636] 
[   31.818098] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.819142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.819847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.820593] Call Trace:
[   31.820926]  <TASK>
[   31.821233]  dump_stack_lvl+0x73/0xb0
[   31.821842]  print_report+0xd1/0x640
[   31.822456]  ? __virt_addr_valid+0x1db/0x2d0
[   31.823061]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.823432]  kasan_report+0x102/0x140
[   31.824179]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   31.824971]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   31.825819]  kasan_check_range+0x10c/0x1c0
[   31.826340]  __kasan_check_write+0x18/0x20
[   31.826978]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   31.827645]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   31.829621]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.831228]  ? trace_hardirqs_on+0x37/0xe0
[   31.832536]  ? kasan_bitops_generic+0x93/0x1c0
[   31.833491]  kasan_bitops_generic+0x122/0x1c0
[   31.834413]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.835676]  ? __pfx_read_tsc+0x10/0x10
[   31.836905]  ? ktime_get_ts64+0x86/0x230
[   31.837196]  kunit_try_run_case+0x1b3/0x490
[   31.837509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.838952]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.840561]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.842206]  ? __kthread_parkme+0x82/0x160
[   31.843533]  ? preempt_count_sub+0x50/0x80
[   31.845290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.845622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.846024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.846376]  kthread+0x257/0x310
[   31.846643]  ? __pfx_kthread+0x10/0x10
[   31.849003]  ret_from_fork+0x41/0x80
[   31.850153]  ? __pfx_kthread+0x10/0x10
[   31.851152]  ret_from_fork_asm+0x1a/0x30
[   31.852617]  </TASK>
[   31.853601] 
[   31.854408] Allocated by task 268:
[   31.855152]  kasan_save_stack+0x3d/0x60
[   31.856865]  kasan_save_track+0x18/0x40
[   31.857706]  kasan_save_alloc_info+0x3b/0x50
[   31.859122]  __kasan_kmalloc+0xb7/0xc0
[   31.860176]  __kmalloc_cache_noprof+0x184/0x410
[   31.861505]  kasan_bitops_generic+0x93/0x1c0
[   31.862228]  kunit_try_run_case+0x1b3/0x490
[   31.862771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.863221]  kthread+0x257/0x310
[   31.863653]  ret_from_fork+0x41/0x80
[   31.864404]  ret_from_fork_asm+0x1a/0x30
[   31.865856] 
[   31.866102] The buggy address belongs to the object at ffff8881025ed7e0
[   31.866102]  which belongs to the cache kmalloc-16 of size 16
[   31.866660] The buggy address is located 8 bytes inside of
[   31.866660]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.869971] 
[   31.870423] The buggy address belongs to the physical page:
[   31.871657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.873337] flags: 0x200000000000000(node=0|zone=2)
[   31.874754] page_type: f5(slab)
[   31.875054] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.875490] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.877233] page dumped because: kasan: bad access detected
[   31.878858] 
[   31.880107] Memory state around the buggy address:
[   31.881363]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.882641]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.884116] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.885016]                                                           ^
[   31.885893]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.886326]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.887015] ==================================================================
[   31.944218] ==================================================================
[   31.945314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   31.946113] Read of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.946979] 
[   31.947266] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.948862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.949495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.950329] Call Trace:
[   31.950628]  <TASK>
[   31.951170]  dump_stack_lvl+0x73/0xb0
[   31.952075]  print_report+0xd1/0x640
[   31.952576]  ? __virt_addr_valid+0x1db/0x2d0
[   31.953108]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.953661]  kasan_report+0x102/0x140
[   31.954073]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   31.954637]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   31.955626]  __asan_report_load8_noabort+0x18/0x20
[   31.956162]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   31.956868]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   31.957514]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.958245]  ? trace_hardirqs_on+0x37/0xe0
[   31.958659]  ? kasan_bitops_generic+0x93/0x1c0
[   31.959373]  kasan_bitops_generic+0x122/0x1c0
[   31.959595]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.960251]  ? __pfx_read_tsc+0x10/0x10
[   31.960552]  ? ktime_get_ts64+0x86/0x230
[   31.961051]  kunit_try_run_case+0x1b3/0x490
[   31.961537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.962113]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.962640]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.963257]  ? __kthread_parkme+0x82/0x160
[   31.963718]  ? preempt_count_sub+0x50/0x80
[   31.964219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.964670]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.965450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.966040]  kthread+0x257/0x310
[   31.966482]  ? __pfx_kthread+0x10/0x10
[   31.966933]  ret_from_fork+0x41/0x80
[   31.967444]  ? __pfx_kthread+0x10/0x10
[   31.967924]  ret_from_fork_asm+0x1a/0x30
[   31.968506]  </TASK>
[   31.968929] 
[   31.969092] Allocated by task 268:
[   31.969535]  kasan_save_stack+0x3d/0x60
[   31.970063]  kasan_save_track+0x18/0x40
[   31.970616]  kasan_save_alloc_info+0x3b/0x50
[   31.971135]  __kasan_kmalloc+0xb7/0xc0
[   31.971660]  __kmalloc_cache_noprof+0x184/0x410
[   31.972190]  kasan_bitops_generic+0x93/0x1c0
[   31.972814]  kunit_try_run_case+0x1b3/0x490
[   31.973359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.973960]  kthread+0x257/0x310
[   31.974445]  ret_from_fork+0x41/0x80
[   31.974941]  ret_from_fork_asm+0x1a/0x30
[   31.975385] 
[   31.975720] The buggy address belongs to the object at ffff8881025ed7e0
[   31.975720]  which belongs to the cache kmalloc-16 of size 16
[   31.976656] The buggy address is located 8 bytes inside of
[   31.976656]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.977893] 
[   31.978199] The buggy address belongs to the physical page:
[   31.978886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.979705] flags: 0x200000000000000(node=0|zone=2)
[   31.980244] page_type: f5(slab)
[   31.980607] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.981372] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.982182] page dumped because: kasan: bad access detected
[   31.982609] 
[   31.982961] Memory state around the buggy address:
[   31.983415]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.984233]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.984985] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.985611]                                                           ^
[   31.986260]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.986935]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.987639] ==================================================================
[   31.889080] ==================================================================
[   31.889948] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   31.891043] Read of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.892209] 
[   31.892497] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.893615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.894230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.895169] Call Trace:
[   31.895813]  <TASK>
[   31.896245]  dump_stack_lvl+0x73/0xb0
[   31.896537]  print_report+0xd1/0x640
[   31.896882]  ? __virt_addr_valid+0x1db/0x2d0
[   31.897457]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.897888]  kasan_report+0x102/0x140
[   31.898415]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   31.899301]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   31.899794]  kasan_check_range+0x10c/0x1c0
[   31.900417]  __kasan_check_read+0x15/0x20
[   31.901049]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   31.901857]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   31.902479]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.903401]  ? trace_hardirqs_on+0x37/0xe0
[   31.903813]  ? kasan_bitops_generic+0x93/0x1c0
[   31.904402]  kasan_bitops_generic+0x122/0x1c0
[   31.905298]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.905653]  ? __pfx_read_tsc+0x10/0x10
[   31.906087]  ? ktime_get_ts64+0x86/0x230
[   31.906558]  kunit_try_run_case+0x1b3/0x490
[   31.906906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.907494]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.908142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.908660]  ? __kthread_parkme+0x82/0x160
[   31.908970]  ? preempt_count_sub+0x50/0x80
[   31.909575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.910399]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.911034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.911661]  kthread+0x257/0x310
[   31.912194]  ? __pfx_kthread+0x10/0x10
[   31.912609]  ret_from_fork+0x41/0x80
[   31.913403]  ? __pfx_kthread+0x10/0x10
[   31.913934]  ret_from_fork_asm+0x1a/0x30
[   31.914655]  </TASK>
[   31.915991] 
[   31.916148] Allocated by task 268:
[   31.916365]  kasan_save_stack+0x3d/0x60
[   31.916627]  kasan_save_track+0x18/0x40
[   31.916909]  kasan_save_alloc_info+0x3b/0x50
[   31.917185]  __kasan_kmalloc+0xb7/0xc0
[   31.917424]  __kmalloc_cache_noprof+0x184/0x410
[   31.919934]  kasan_bitops_generic+0x93/0x1c0
[   31.920922]  kunit_try_run_case+0x1b3/0x490
[   31.922500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.924051]  kthread+0x257/0x310
[   31.924927]  ret_from_fork+0x41/0x80
[   31.925116]  ret_from_fork_asm+0x1a/0x30
[   31.925302] 
[   31.925405] The buggy address belongs to the object at ffff8881025ed7e0
[   31.925405]  which belongs to the cache kmalloc-16 of size 16
[   31.927558] The buggy address is located 8 bytes inside of
[   31.927558]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.929221] 
[   31.929825] The buggy address belongs to the physical page:
[   31.930662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.931419] flags: 0x200000000000000(node=0|zone=2)
[   31.932101] page_type: f5(slab)
[   31.932629] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.933647] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.934590] page dumped because: kasan: bad access detected
[   31.935739] 
[   31.936142] Memory state around the buggy address:
[   31.936824]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.937766]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.938722] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.939677]                                                           ^
[   31.940362]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.941392]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.942290] ==================================================================
[   31.699203] ==================================================================
[   31.699929] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   31.701165] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.702290] 
[   31.702500] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.703915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.704540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.705641] Call Trace:
[   31.705933]  <TASK>
[   31.706531]  dump_stack_lvl+0x73/0xb0
[   31.707396]  print_report+0xd1/0x640
[   31.707832]  ? __virt_addr_valid+0x1db/0x2d0
[   31.708817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.709395]  kasan_report+0x102/0x140
[   31.709987]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   31.710585]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   31.711228]  kasan_check_range+0x10c/0x1c0
[   31.711437]  __kasan_check_write+0x18/0x20
[   31.711628]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   31.712417]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   31.713175]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.713665]  ? trace_hardirqs_on+0x37/0xe0
[   31.714148]  ? kasan_bitops_generic+0x93/0x1c0
[   31.714564]  kasan_bitops_generic+0x122/0x1c0
[   31.715078]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.715818]  ? __pfx_read_tsc+0x10/0x10
[   31.716293]  ? ktime_get_ts64+0x86/0x230
[   31.716703]  kunit_try_run_case+0x1b3/0x490
[   31.717257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.717747]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.718310]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.718941]  ? __kthread_parkme+0x82/0x160
[   31.719341]  ? preempt_count_sub+0x50/0x80
[   31.719918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.720453]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.721096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.721655]  kthread+0x257/0x310
[   31.722152]  ? __pfx_kthread+0x10/0x10
[   31.722655]  ret_from_fork+0x41/0x80
[   31.723072]  ? __pfx_kthread+0x10/0x10
[   31.723566]  ret_from_fork_asm+0x1a/0x30
[   31.724112]  </TASK>
[   31.724434] 
[   31.724713] Allocated by task 268:
[   31.725224]  kasan_save_stack+0x3d/0x60
[   31.725752]  kasan_save_track+0x18/0x40
[   31.726326]  kasan_save_alloc_info+0x3b/0x50
[   31.726907]  __kasan_kmalloc+0xb7/0xc0
[   31.727326]  __kmalloc_cache_noprof+0x184/0x410
[   31.727731]  kasan_bitops_generic+0x93/0x1c0
[   31.728358]  kunit_try_run_case+0x1b3/0x490
[   31.728849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.729448]  kthread+0x257/0x310
[   31.730016]  ret_from_fork+0x41/0x80
[   31.730460]  ret_from_fork_asm+0x1a/0x30
[   31.730916] 
[   31.731183] The buggy address belongs to the object at ffff8881025ed7e0
[   31.731183]  which belongs to the cache kmalloc-16 of size 16
[   31.732255] The buggy address is located 8 bytes inside of
[   31.732255]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.733485] 
[   31.733759] The buggy address belongs to the physical page:
[   31.734385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.735099] flags: 0x200000000000000(node=0|zone=2)
[   31.736378] page_type: f5(slab)
[   31.736778] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.737853] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.738939] page dumped because: kasan: bad access detected
[   31.739440] 
[   31.739659] Memory state around the buggy address:
[   31.740507]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.741194]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.741835] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.742423]                                                           ^
[   31.743139]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.744627]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.745017] ==================================================================
[   31.506043] ==================================================================
[   31.506749] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   31.507788] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.508456] 
[   31.508761] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.509597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.510219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.511043] Call Trace:
[   31.511286]  <TASK>
[   31.511662]  dump_stack_lvl+0x73/0xb0
[   31.512079]  print_report+0xd1/0x640
[   31.512532]  ? __virt_addr_valid+0x1db/0x2d0
[   31.513075]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.513773]  kasan_report+0x102/0x140
[   31.514259]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   31.514983]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   31.515534]  kasan_check_range+0x10c/0x1c0
[   31.516091]  __kasan_check_write+0x18/0x20
[   31.516494]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   31.517102]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   31.517873]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.518301]  ? trace_hardirqs_on+0x37/0xe0
[   31.518828]  ? kasan_bitops_generic+0x93/0x1c0
[   31.519440]  kasan_bitops_generic+0x122/0x1c0
[   31.520171]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.520581]  ? __pfx_read_tsc+0x10/0x10
[   31.521177]  ? ktime_get_ts64+0x86/0x230
[   31.521590]  kunit_try_run_case+0x1b3/0x490
[   31.522029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.522870]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.523958]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.524455]  ? __kthread_parkme+0x82/0x160
[   31.525226]  ? preempt_count_sub+0x50/0x80
[   31.525627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.526162]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.526666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.527525]  kthread+0x257/0x310
[   31.528119]  ? __pfx_kthread+0x10/0x10
[   31.528657]  ret_from_fork+0x41/0x80
[   31.529094]  ? __pfx_kthread+0x10/0x10
[   31.529466]  ret_from_fork_asm+0x1a/0x30
[   31.529893]  </TASK>
[   31.530609] 
[   31.530776] Allocated by task 268:
[   31.531156]  kasan_save_stack+0x3d/0x60
[   31.532021]  kasan_save_track+0x18/0x40
[   31.532426]  kasan_save_alloc_info+0x3b/0x50
[   31.532896]  __kasan_kmalloc+0xb7/0xc0
[   31.533281]  __kmalloc_cache_noprof+0x184/0x410
[   31.534385]  kasan_bitops_generic+0x93/0x1c0
[   31.535097]  kunit_try_run_case+0x1b3/0x490
[   31.535817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.536584]  kthread+0x257/0x310
[   31.537326]  ret_from_fork+0x41/0x80
[   31.538086]  ret_from_fork_asm+0x1a/0x30
[   31.538290] 
[   31.538390] The buggy address belongs to the object at ffff8881025ed7e0
[   31.538390]  which belongs to the cache kmalloc-16 of size 16
[   31.538919] The buggy address is located 8 bytes inside of
[   31.538919]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.540505] 
[   31.540676] The buggy address belongs to the physical page:
[   31.541357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.542653] flags: 0x200000000000000(node=0|zone=2)
[   31.543203] page_type: f5(slab)
[   31.543657] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.544372] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.545046] page dumped because: kasan: bad access detected
[   31.545603] 
[   31.545922] Memory state around the buggy address:
[   31.546408]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.547127]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.547949] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.548556]                                                           ^
[   31.549240]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.549973]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.550663] ==================================================================
[   31.748034] ==================================================================
[   31.751127] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   31.752150] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.752547] 
[   31.752742] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.756578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.758171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.760521] Call Trace:
[   31.761578]  <TASK>
[   31.761801]  dump_stack_lvl+0x73/0xb0
[   31.762090]  print_report+0xd1/0x640
[   31.762370]  ? __virt_addr_valid+0x1db/0x2d0
[   31.762708]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.765263]  kasan_report+0x102/0x140
[   31.766494]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   31.768429]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   31.770084]  kasan_check_range+0x10c/0x1c0
[   31.771562]  __kasan_check_write+0x18/0x20
[   31.772181]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   31.772676]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   31.773295]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.774126]  ? trace_hardirqs_on+0x37/0xe0
[   31.774414]  ? kasan_bitops_generic+0x93/0x1c0
[   31.774745]  kasan_bitops_generic+0x122/0x1c0
[   31.777261]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.779069]  ? __pfx_read_tsc+0x10/0x10
[   31.780534]  ? ktime_get_ts64+0x86/0x230
[   31.782050]  kunit_try_run_case+0x1b3/0x490
[   31.782757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.784285]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.784838]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.785285]  ? __kthread_parkme+0x82/0x160
[   31.785699]  ? preempt_count_sub+0x50/0x80
[   31.786099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.786550]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.788261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.789381]  kthread+0x257/0x310
[   31.790011]  ? __pfx_kthread+0x10/0x10
[   31.790449]  ret_from_fork+0x41/0x80
[   31.791036]  ? __pfx_kthread+0x10/0x10
[   31.791580]  ret_from_fork_asm+0x1a/0x30
[   31.792304]  </TASK>
[   31.792723] 
[   31.793074] Allocated by task 268:
[   31.793559]  kasan_save_stack+0x3d/0x60
[   31.794249]  kasan_save_track+0x18/0x40
[   31.794605]  kasan_save_alloc_info+0x3b/0x50
[   31.795213]  __kasan_kmalloc+0xb7/0xc0
[   31.795827]  __kmalloc_cache_noprof+0x184/0x410
[   31.796377]  kasan_bitops_generic+0x93/0x1c0
[   31.797028]  kunit_try_run_case+0x1b3/0x490
[   31.797482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.798152]  kthread+0x257/0x310
[   31.798706]  ret_from_fork+0x41/0x80
[   31.799308]  ret_from_fork_asm+0x1a/0x30
[   31.799751] 
[   31.800213] The buggy address belongs to the object at ffff8881025ed7e0
[   31.800213]  which belongs to the cache kmalloc-16 of size 16
[   31.801522] The buggy address is located 8 bytes inside of
[   31.801522]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.802745] 
[   31.803038] The buggy address belongs to the physical page:
[   31.803627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.804497] flags: 0x200000000000000(node=0|zone=2)
[   31.805149] page_type: f5(slab)
[   31.805654] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.806452] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.807301] page dumped because: kasan: bad access detected
[   31.807912] 
[   31.808111] Memory state around the buggy address:
[   31.808912]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.809500]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.810321] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.811122]                                                           ^
[   31.811915]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.812650]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.813390] ==================================================================
[   31.552485] ==================================================================
[   31.553196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   31.553999] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.554285] 
[   31.554400] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.554962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.555761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.557505] Call Trace:
[   31.557992]  <TASK>
[   31.558286]  dump_stack_lvl+0x73/0xb0
[   31.559109]  print_report+0xd1/0x640
[   31.559566]  ? __virt_addr_valid+0x1db/0x2d0
[   31.560069]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.560604]  kasan_report+0x102/0x140
[   31.561059]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   31.561742]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   31.562387]  kasan_check_range+0x10c/0x1c0
[   31.562851]  __kasan_check_write+0x18/0x20
[   31.563158]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   31.563931]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   31.564612]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.565093]  ? trace_hardirqs_on+0x37/0xe0
[   31.565395]  ? kasan_bitops_generic+0x93/0x1c0
[   31.566015]  kasan_bitops_generic+0x122/0x1c0
[   31.566542]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.567068]  ? __pfx_read_tsc+0x10/0x10
[   31.567451]  ? ktime_get_ts64+0x86/0x230
[   31.567966]  kunit_try_run_case+0x1b3/0x490
[   31.568467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.568937]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.569441]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.570061]  ? __kthread_parkme+0x82/0x160
[   31.570474]  ? preempt_count_sub+0x50/0x80
[   31.570959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.571306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.572070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.572604]  kthread+0x257/0x310
[   31.572994]  ? __pfx_kthread+0x10/0x10
[   31.573469]  ret_from_fork+0x41/0x80
[   31.573956]  ? __pfx_kthread+0x10/0x10
[   31.574251]  ret_from_fork_asm+0x1a/0x30
[   31.574813]  </TASK>
[   31.575063] 
[   31.575260] Allocated by task 268:
[   31.575540]  kasan_save_stack+0x3d/0x60
[   31.575956]  kasan_save_track+0x18/0x40
[   31.576445]  kasan_save_alloc_info+0x3b/0x50
[   31.577032]  __kasan_kmalloc+0xb7/0xc0
[   31.577312]  __kmalloc_cache_noprof+0x184/0x410
[   31.577952]  kasan_bitops_generic+0x93/0x1c0
[   31.578305]  kunit_try_run_case+0x1b3/0x490
[   31.578614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.579291]  kthread+0x257/0x310
[   31.579729]  ret_from_fork+0x41/0x80
[   31.580241]  ret_from_fork_asm+0x1a/0x30
[   31.580609] 
[   31.580862] The buggy address belongs to the object at ffff8881025ed7e0
[   31.580862]  which belongs to the cache kmalloc-16 of size 16
[   31.581734] The buggy address is located 8 bytes inside of
[   31.581734]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.582799] 
[   31.583071] The buggy address belongs to the physical page:
[   31.583561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.584253] flags: 0x200000000000000(node=0|zone=2)
[   31.584578] page_type: f5(slab)
[   31.584957] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.585855] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.586398] page dumped because: kasan: bad access detected
[   31.586759] 
[   31.586969] Memory state around the buggy address:
[   31.587323]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.588128]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.588946] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.590004]                                                           ^
[   31.590571]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.591191]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.591940] ==================================================================
[   31.648571] ==================================================================
[   31.649628] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   31.650513] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268
[   31.651360] 
[   31.651546] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.653310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.653697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.655111] Call Trace:
[   31.655386]  <TASK>
[   31.655604]  dump_stack_lvl+0x73/0xb0
[   31.656465]  print_report+0xd1/0x640
[   31.657156]  ? __virt_addr_valid+0x1db/0x2d0
[   31.657556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.658248]  kasan_report+0x102/0x140
[   31.658625]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   31.659746]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   31.660297]  kasan_check_range+0x10c/0x1c0
[   31.661205]  __kasan_check_write+0x18/0x20
[   31.661600]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   31.662706]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   31.663283]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.663916]  ? trace_hardirqs_on+0x37/0xe0
[   31.664358]  ? kasan_bitops_generic+0x93/0x1c0
[   31.665189]  kasan_bitops_generic+0x122/0x1c0
[   31.665584]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.666304]  ? __pfx_read_tsc+0x10/0x10
[   31.666704]  ? ktime_get_ts64+0x86/0x230
[   31.667363]  kunit_try_run_case+0x1b3/0x490
[   31.668064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.668505]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.669094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.669675]  ? __kthread_parkme+0x82/0x160
[   31.670225]  ? preempt_count_sub+0x50/0x80
[   31.670629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.671103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.671635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.672644]  kthread+0x257/0x310
[   31.673002]  ? __pfx_kthread+0x10/0x10
[   31.673766]  ret_from_fork+0x41/0x80
[   31.674415]  ? __pfx_kthread+0x10/0x10
[   31.675265]  ret_from_fork_asm+0x1a/0x30
[   31.675629]  </TASK>
[   31.676588] 
[   31.676820] Allocated by task 268:
[   31.677056]  kasan_save_stack+0x3d/0x60
[   31.677786]  kasan_save_track+0x18/0x40
[   31.678251]  kasan_save_alloc_info+0x3b/0x50
[   31.678654]  __kasan_kmalloc+0xb7/0xc0
[   31.679643]  __kmalloc_cache_noprof+0x184/0x410
[   31.680192]  kasan_bitops_generic+0x93/0x1c0
[   31.680822]  kunit_try_run_case+0x1b3/0x490
[   31.681434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.682145]  kthread+0x257/0x310
[   31.682422]  ret_from_fork+0x41/0x80
[   31.682864]  ret_from_fork_asm+0x1a/0x30
[   31.683635] 
[   31.683920] The buggy address belongs to the object at ffff8881025ed7e0
[   31.683920]  which belongs to the cache kmalloc-16 of size 16
[   31.685327] The buggy address is located 8 bytes inside of
[   31.685327]  allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9)
[   31.686476] 
[   31.686714] The buggy address belongs to the physical page:
[   31.687651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed
[   31.688459] flags: 0x200000000000000(node=0|zone=2)
[   31.688925] page_type: f5(slab)
[   31.689466] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.690249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.690842] page dumped because: kasan: bad access detected
[   31.691350] 
[   31.691590] Memory state around the buggy address:
[   31.691998]  ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   31.692491]  ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.693333] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   31.694065]                                                           ^
[   31.694733]  ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.695513]  ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.695967] ==================================================================