Hay
Date
Dec. 6, 2024, 3:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   34.633721] ==================================================================
[   34.634730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.635869] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.636611] 
[   34.637024] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.638244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.638928] Hardware name: linux,dummy-virt (DT)
[   34.639665] Call trace:
[   34.640155]  show_stack+0x20/0x38 (C)
[   34.640837]  dump_stack_lvl+0x8c/0xd0
[   34.641558]  print_report+0x118/0x5e0
[   34.642256]  kasan_report+0xc8/0x118
[   34.642917]  kasan_check_range+0x100/0x1a8
[   34.643582]  __kasan_check_write+0x20/0x30
[   34.644209]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.645040]  kasan_bitops_generic+0x110/0x1c8
[   34.645749]  kunit_try_run_case+0x14c/0x3d0
[   34.646434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.647270]  kthread+0x24c/0x2d0
[   34.647910]  ret_from_fork+0x10/0x20
[   34.648317] 
[   34.648788] Allocated by task 250:
[   34.649533]  kasan_save_stack+0x3c/0x68
[   34.650199]  kasan_save_track+0x20/0x40
[   34.650838]  kasan_save_alloc_info+0x40/0x58
[   34.651613]  __kasan_kmalloc+0xd4/0xd8
[   34.652295]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.652948]  kasan_bitops_generic+0xa0/0x1c8
[   34.653591]  kunit_try_run_case+0x14c/0x3d0
[   34.654246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.655018]  kthread+0x24c/0x2d0
[   34.655620]  ret_from_fork+0x10/0x20
[   34.656198] 
[   34.656630] The buggy address belongs to the object at fff00000c5b518c0
[   34.656630]  which belongs to the cache kmalloc-16 of size 16
[   34.658022] The buggy address is located 8 bytes inside of
[   34.658022]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.659329] 
[   34.659738] The buggy address belongs to the physical page:
[   34.660541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.661482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.662362] page_type: f5(slab)
[   34.662934] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.663912] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.664831] page dumped because: kasan: bad access detected
[   34.665507] 
[   34.665917] Memory state around the buggy address:
[   34.666668]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.667454]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.668404] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.669246]                                               ^
[   34.669955]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.670784]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.671626] ==================================================================
[   34.353003] ==================================================================
[   34.354558] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   34.355542] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.356411] 
[   34.356919] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.358229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.358801] Hardware name: linux,dummy-virt (DT)
[   34.359433] Call trace:
[   34.359868]  show_stack+0x20/0x38 (C)
[   34.360475]  dump_stack_lvl+0x8c/0xd0
[   34.361219]  print_report+0x118/0x5e0
[   34.361862]  kasan_report+0xc8/0x118
[   34.362766]  kasan_check_range+0x100/0x1a8
[   34.363368]  __kasan_check_write+0x20/0x30
[   34.364075]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   34.364790]  kasan_bitops_generic+0x110/0x1c8
[   34.365492]  kunit_try_run_case+0x14c/0x3d0
[   34.366150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.366983]  kthread+0x24c/0x2d0
[   34.367586]  ret_from_fork+0x10/0x20
[   34.368158] 
[   34.368743] Allocated by task 250:
[   34.369397]  kasan_save_stack+0x3c/0x68
[   34.370066]  kasan_save_track+0x20/0x40
[   34.370795]  kasan_save_alloc_info+0x40/0x58
[   34.371481]  __kasan_kmalloc+0xd4/0xd8
[   34.372120]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.372768]  kasan_bitops_generic+0xa0/0x1c8
[   34.373373]  kunit_try_run_case+0x14c/0x3d0
[   34.374012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.375262]  kthread+0x24c/0x2d0
[   34.375922]  ret_from_fork+0x10/0x20
[   34.376482] 
[   34.376878] The buggy address belongs to the object at fff00000c5b518c0
[   34.376878]  which belongs to the cache kmalloc-16 of size 16
[   34.378196] The buggy address is located 8 bytes inside of
[   34.378196]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.379332] 
[   34.379733] The buggy address belongs to the physical page:
[   34.380417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.381773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.382538] page_type: f5(slab)
[   34.383122] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.383958] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.384872] page dumped because: kasan: bad access detected
[   34.385461] 
[   34.385838] Memory state around the buggy address:
[   34.386496]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.387322]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.388186] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.388913]                                               ^
[   34.389696]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.390485]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.391260] ==================================================================
[   34.393249] ==================================================================
[   34.395189] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   34.395942] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.397593] 
[   34.398092] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.399532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.400152] Hardware name: linux,dummy-virt (DT)
[   34.400779] Call trace:
[   34.401184]  show_stack+0x20/0x38 (C)
[   34.402076]  dump_stack_lvl+0x8c/0xd0
[   34.402753]  print_report+0x118/0x5e0
[   34.403456]  kasan_report+0xc8/0x118
[   34.404126]  __asan_report_load8_noabort+0x20/0x30
[   34.404887]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   34.405674]  kasan_bitops_generic+0x110/0x1c8
[   34.406261]  kunit_try_run_case+0x14c/0x3d0
[   34.406973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.407793]  kthread+0x24c/0x2d0
[   34.408393]  ret_from_fork+0x10/0x20
[   34.409038] 
[   34.409403] Allocated by task 250:
[   34.410022]  kasan_save_stack+0x3c/0x68
[   34.410607]  kasan_save_track+0x20/0x40
[   34.411287]  kasan_save_alloc_info+0x40/0x58
[   34.411881]  __kasan_kmalloc+0xd4/0xd8
[   34.412568]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.413209]  kasan_bitops_generic+0xa0/0x1c8
[   34.413945]  kunit_try_run_case+0x14c/0x3d0
[   34.414587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.415405]  kthread+0x24c/0x2d0
[   34.416007]  ret_from_fork+0x10/0x20
[   34.416613] 
[   34.416976] The buggy address belongs to the object at fff00000c5b518c0
[   34.416976]  which belongs to the cache kmalloc-16 of size 16
[   34.418225] The buggy address is located 8 bytes inside of
[   34.418225]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.419574] 
[   34.419993] The buggy address belongs to the physical page:
[   34.420778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.421794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.422676] page_type: f5(slab)
[   34.423221] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.424154] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.425097] page dumped because: kasan: bad access detected
[   34.425807] 
[   34.426226] Memory state around the buggy address:
[   34.426927]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.427823]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.428695] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.429552]                                               ^
[   34.430353]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.431311]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.432216] ==================================================================
[   34.674355] ==================================================================
[   34.675438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.676549] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.677263] 
[   34.677653] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.679215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.679682] Hardware name: linux,dummy-virt (DT)
[   34.680193] Call trace:
[   34.680588]  show_stack+0x20/0x38 (C)
[   34.681265]  dump_stack_lvl+0x8c/0xd0
[   34.682016]  print_report+0x118/0x5e0
[   34.682597]  kasan_report+0xc8/0x118
[   34.683285]  kasan_check_range+0x100/0x1a8
[   34.683922]  __kasan_check_write+0x20/0x30
[   34.684660]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.685535]  kasan_bitops_generic+0x110/0x1c8
[   34.686170]  kunit_try_run_case+0x14c/0x3d0
[   34.686949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.687779]  kthread+0x24c/0x2d0
[   34.688395]  ret_from_fork+0x10/0x20
[   34.689025] 
[   34.689442] Allocated by task 250:
[   34.690056]  kasan_save_stack+0x3c/0x68
[   34.690737]  kasan_save_track+0x20/0x40
[   34.691304]  kasan_save_alloc_info+0x40/0x58
[   34.692027]  __kasan_kmalloc+0xd4/0xd8
[   34.692720]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.693320]  kasan_bitops_generic+0xa0/0x1c8
[   34.694043]  kunit_try_run_case+0x14c/0x3d0
[   34.694842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.695441]  kthread+0x24c/0x2d0
[   34.696007]  ret_from_fork+0x10/0x20
[   34.696690] 
[   34.697062] The buggy address belongs to the object at fff00000c5b518c0
[   34.697062]  which belongs to the cache kmalloc-16 of size 16
[   34.698436] The buggy address is located 8 bytes inside of
[   34.698436]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.699849] 
[   34.700258] The buggy address belongs to the physical page:
[   34.700964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.701905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.702745] page_type: f5(slab)
[   34.703301] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.704301] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.705257] page dumped because: kasan: bad access detected
[   34.705966] 
[   34.706348] Memory state around the buggy address:
[   34.707008]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.708036]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.709075] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.709961]                                               ^
[   34.710782]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.711625]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.712502] ==================================================================
[   34.595982] ==================================================================
[   34.596731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.597549] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.598453] 
[   34.598890] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.600030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.600559] Hardware name: linux,dummy-virt (DT)
[   34.601186] Call trace:
[   34.601686]  show_stack+0x20/0x38 (C)
[   34.602355]  dump_stack_lvl+0x8c/0xd0
[   34.602939]  print_report+0x118/0x5e0
[   34.603639]  kasan_report+0xc8/0x118
[   34.604272]  __asan_report_load8_noabort+0x20/0x30
[   34.604904]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.605732]  kasan_bitops_generic+0x110/0x1c8
[   34.606290]  kunit_try_run_case+0x14c/0x3d0
[   34.607008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.607680]  kthread+0x24c/0x2d0
[   34.608283]  ret_from_fork+0x10/0x20
[   34.608941] 
[   34.609314] Allocated by task 250:
[   34.609784]  kasan_save_stack+0x3c/0x68
[   34.610394]  kasan_save_track+0x20/0x40
[   34.611061]  kasan_save_alloc_info+0x40/0x58
[   34.611755]  __kasan_kmalloc+0xd4/0xd8
[   34.612399]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.613011]  kasan_bitops_generic+0xa0/0x1c8
[   34.613657]  kunit_try_run_case+0x14c/0x3d0
[   34.614264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.614971]  kthread+0x24c/0x2d0
[   34.615573]  ret_from_fork+0x10/0x20
[   34.616219] 
[   34.616619] The buggy address belongs to the object at fff00000c5b518c0
[   34.616619]  which belongs to the cache kmalloc-16 of size 16
[   34.617776] The buggy address is located 8 bytes inside of
[   34.617776]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.618992] 
[   34.619371] The buggy address belongs to the physical page:
[   34.620131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.620982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.621796] page_type: f5(slab)
[   34.622371] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.623285] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.624172] page dumped because: kasan: bad access detected
[   34.624928] 
[   34.625275] Memory state around the buggy address:
[   34.625884]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.626774]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.627636] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.628315]                                               ^
[   34.629114]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.629934]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.630840] ==================================================================
[   34.556056] ==================================================================
[   34.556885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.559283] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.560158] 
[   34.560501] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.561616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.562228] Hardware name: linux,dummy-virt (DT)
[   34.562762] Call trace:
[   34.563243]  show_stack+0x20/0x38 (C)
[   34.564178]  dump_stack_lvl+0x8c/0xd0
[   34.564819]  print_report+0x118/0x5e0
[   34.565429]  kasan_report+0xc8/0x118
[   34.566033]  kasan_check_range+0x100/0x1a8
[   34.566730]  __kasan_check_write+0x20/0x30
[   34.567342]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.568159]  kasan_bitops_generic+0x110/0x1c8
[   34.568975]  kunit_try_run_case+0x14c/0x3d0
[   34.569644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.570310]  kthread+0x24c/0x2d0
[   34.570943]  ret_from_fork+0x10/0x20
[   34.571546] 
[   34.571924] Allocated by task 250:
[   34.572403]  kasan_save_stack+0x3c/0x68
[   34.573047]  kasan_save_track+0x20/0x40
[   34.573642]  kasan_save_alloc_info+0x40/0x58
[   34.574209]  __kasan_kmalloc+0xd4/0xd8
[   34.574852]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.575407]  kasan_bitops_generic+0xa0/0x1c8
[   34.576123]  kunit_try_run_case+0x14c/0x3d0
[   34.576679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.577465]  kthread+0x24c/0x2d0
[   34.577982]  ret_from_fork+0x10/0x20
[   34.578525] 
[   34.578910] The buggy address belongs to the object at fff00000c5b518c0
[   34.578910]  which belongs to the cache kmalloc-16 of size 16
[   34.580059] The buggy address is located 8 bytes inside of
[   34.580059]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.581283] 
[   34.581690] The buggy address belongs to the physical page:
[   34.582416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.583446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.584271] page_type: f5(slab)
[   34.584854] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.585776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.586706] page dumped because: kasan: bad access detected
[   34.587453] 
[   34.587804] Memory state around the buggy address:
[   34.588317]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.589249]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.590029] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.590837]                                               ^
[   34.591637]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.592361]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.593276] ==================================================================
[   34.476019] ==================================================================
[   34.477078] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   34.477978] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.479205] 
[   34.479838] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.481217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.481881] Hardware name: linux,dummy-virt (DT)
[   34.482631] Call trace:
[   34.483132]  show_stack+0x20/0x38 (C)
[   34.483870]  dump_stack_lvl+0x8c/0xd0
[   34.484410]  print_report+0x118/0x5e0
[   34.484932]  kasan_report+0xc8/0x118
[   34.485589]  __asan_report_load8_noabort+0x20/0x30
[   34.486297]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   34.487092]  kasan_bitops_generic+0x110/0x1c8
[   34.487803]  kunit_try_run_case+0x14c/0x3d0
[   34.488498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.489263]  kthread+0x24c/0x2d0
[   34.489780]  ret_from_fork+0x10/0x20
[   34.490406] 
[   34.490805] Allocated by task 250:
[   34.491280]  kasan_save_stack+0x3c/0x68
[   34.491937]  kasan_save_track+0x20/0x40
[   34.492500]  kasan_save_alloc_info+0x40/0x58
[   34.493210]  __kasan_kmalloc+0xd4/0xd8
[   34.493857]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.494459]  kasan_bitops_generic+0xa0/0x1c8
[   34.495123]  kunit_try_run_case+0x14c/0x3d0
[   34.495851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.496617]  kthread+0x24c/0x2d0
[   34.497166]  ret_from_fork+0x10/0x20
[   34.497708] 
[   34.498086] The buggy address belongs to the object at fff00000c5b518c0
[   34.498086]  which belongs to the cache kmalloc-16 of size 16
[   34.499311] The buggy address is located 8 bytes inside of
[   34.499311]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.500637] 
[   34.500960] The buggy address belongs to the physical page:
[   34.501830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.502764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.503856] page_type: f5(slab)
[   34.504447] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.505397] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.506355] page dumped because: kasan: bad access detected
[   34.507029] 
[   34.507411] Memory state around the buggy address:
[   34.508035]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.508818]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.509602] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.510371]                                               ^
[   34.511172]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.512127]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.512894] ==================================================================
[   34.436341] ==================================================================
[   34.437120] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   34.437914] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.439309] 
[   34.439824] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.441093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.441806] Hardware name: linux,dummy-virt (DT)
[   34.442438] Call trace:
[   34.442969]  show_stack+0x20/0x38 (C)
[   34.443677]  dump_stack_lvl+0x8c/0xd0
[   34.444255]  print_report+0x118/0x5e0
[   34.444979]  kasan_report+0xc8/0x118
[   34.445630]  kasan_check_range+0x100/0x1a8
[   34.446251]  __kasan_check_write+0x20/0x30
[   34.447012]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   34.447821]  kasan_bitops_generic+0x110/0x1c8
[   34.448548]  kunit_try_run_case+0x14c/0x3d0
[   34.449288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.450173]  kthread+0x24c/0x2d0
[   34.450758]  ret_from_fork+0x10/0x20
[   34.451456] 
[   34.451887] Allocated by task 250:
[   34.452363]  kasan_save_stack+0x3c/0x68
[   34.453063]  kasan_save_track+0x20/0x40
[   34.453706]  kasan_save_alloc_info+0x40/0x58
[   34.454267]  __kasan_kmalloc+0xd4/0xd8
[   34.454782]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.455416]  kasan_bitops_generic+0xa0/0x1c8
[   34.455955]  kunit_try_run_case+0x14c/0x3d0
[   34.456648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.457279]  kthread+0x24c/0x2d0
[   34.457875]  ret_from_fork+0x10/0x20
[   34.458487] 
[   34.458869] The buggy address belongs to the object at fff00000c5b518c0
[   34.458869]  which belongs to the cache kmalloc-16 of size 16
[   34.460160] The buggy address is located 8 bytes inside of
[   34.460160]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.461387] 
[   34.461788] The buggy address belongs to the physical page:
[   34.462558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.463472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.464249] page_type: f5(slab)
[   34.464779] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.465735] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.466636] page dumped because: kasan: bad access detected
[   34.467329] 
[   34.467690] Memory state around the buggy address:
[   34.468200]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.469146]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.469867] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.470779]                                               ^
[   34.471469]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.472273]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.473121] ==================================================================
[   34.715947] ==================================================================
[   34.716753] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.717652] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.718461] 
[   34.719234] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.720302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.720880] Hardware name: linux,dummy-virt (DT)
[   34.721452] Call trace:
[   34.721931]  show_stack+0x20/0x38 (C)
[   34.722587]  dump_stack_lvl+0x8c/0xd0
[   34.723176]  print_report+0x118/0x5e0
[   34.723730]  kasan_report+0xc8/0x118
[   34.724372]  __asan_report_load8_noabort+0x20/0x30
[   34.725047]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.725792]  kasan_bitops_generic+0x110/0x1c8
[   34.726418]  kunit_try_run_case+0x14c/0x3d0
[   34.727080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.727739]  kthread+0x24c/0x2d0
[   34.728338]  ret_from_fork+0x10/0x20
[   34.728929] 
[   34.729305] Allocated by task 250:
[   34.729819]  kasan_save_stack+0x3c/0x68
[   34.730456]  kasan_save_track+0x20/0x40
[   34.731087]  kasan_save_alloc_info+0x40/0x58
[   34.731717]  __kasan_kmalloc+0xd4/0xd8
[   34.732252]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.732969]  kasan_bitops_generic+0xa0/0x1c8
[   34.733544]  kunit_try_run_case+0x14c/0x3d0
[   34.734213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.734875]  kthread+0x24c/0x2d0
[   34.735462]  ret_from_fork+0x10/0x20
[   34.736075] 
[   34.736433] The buggy address belongs to the object at fff00000c5b518c0
[   34.736433]  which belongs to the cache kmalloc-16 of size 16
[   34.737764] The buggy address is located 8 bytes inside of
[   34.737764]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.738981] 
[   34.739357] The buggy address belongs to the physical page:
[   34.740118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.740908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.741816] page_type: f5(slab)
[   34.742382] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.743356] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.744164] page dumped because: kasan: bad access detected
[   34.744867] 
[   34.745240] Memory state around the buggy address:
[   34.745863]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.746657]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.747599] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.748384]                                               ^
[   34.749098]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.749955]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.750839] ==================================================================
[   34.516926] ==================================================================
[   34.517706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   34.518450] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.519533] 
[   34.520137] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.521473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.522151] Hardware name: linux,dummy-virt (DT)
[   34.522708] Call trace:
[   34.523632]  show_stack+0x20/0x38 (C)
[   34.524675]  dump_stack_lvl+0x8c/0xd0
[   34.525266]  print_report+0x118/0x5e0
[   34.525929]  kasan_report+0xc8/0x118
[   34.526884]  kasan_check_range+0x100/0x1a8
[   34.527418]  __kasan_check_write+0x20/0x30
[   34.528140]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   34.528807]  kasan_bitops_generic+0x110/0x1c8
[   34.529533]  kunit_try_run_case+0x14c/0x3d0
[   34.530160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.530975]  kthread+0x24c/0x2d0
[   34.531619]  ret_from_fork+0x10/0x20
[   34.532202] 
[   34.532597] Allocated by task 250:
[   34.533031]  kasan_save_stack+0x3c/0x68
[   34.533695]  kasan_save_track+0x20/0x40
[   34.534256]  kasan_save_alloc_info+0x40/0x58
[   34.534959]  __kasan_kmalloc+0xd4/0xd8
[   34.535489]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.536239]  kasan_bitops_generic+0xa0/0x1c8
[   34.536866]  kunit_try_run_case+0x14c/0x3d0
[   34.537381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.538332]  kthread+0x24c/0x2d0
[   34.538730]  ret_from_fork+0x10/0x20
[   34.539339] 
[   34.539725] The buggy address belongs to the object at fff00000c5b518c0
[   34.539725]  which belongs to the cache kmalloc-16 of size 16
[   34.540926] The buggy address is located 8 bytes inside of
[   34.540926]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.542263] 
[   34.542606] The buggy address belongs to the physical page:
[   34.543327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.544244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.544928] page_type: f5(slab)
[   34.545493] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.546435] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.547419] page dumped because: kasan: bad access detected
[   34.548034] 
[   34.548409] Memory state around the buggy address:
[   34.549112]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.549861]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.550749] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.551480]                                               ^
[   34.552278]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.553113]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.553996] ==================================================================

[   27.349466] ==================================================================
[   27.351168] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   27.352283] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   27.353131] 
[   27.353402] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   27.355019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.355969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.357424] Call Trace:
[   27.358530]  <TASK>
[   27.359470]  dump_stack_lvl+0x73/0xb0
[   27.359909]  print_report+0xd1/0x640
[   27.360852]  ? __virt_addr_valid+0x1db/0x2d0
[   27.362152]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.362765]  kasan_report+0x102/0x140
[   27.363323]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   27.364124]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   27.364851]  kasan_check_range+0x10c/0x1c0
[   27.365201]  __kasan_check_write+0x18/0x20
[   27.366052]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   27.366715]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.367254]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.367948]  ? trace_hardirqs_on+0x37/0xe0
[   27.369377]  ? kasan_bitops_generic+0x93/0x1c0
[   27.370182]  kasan_bitops_generic+0x117/0x1c0
[   27.370554]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.371670]  ? __pfx_read_tsc+0x10/0x10
[   27.372444]  ? ktime_get_ts64+0x86/0x230
[   27.372735]  kunit_try_run_case+0x1b3/0x490
[   27.373703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.374203]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.374571]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.376041]  ? __kthread_parkme+0x82/0x160
[   27.376469]  ? preempt_count_sub+0x50/0x80
[   27.376867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.377170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.377554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.378505]  kthread+0x257/0x310
[   27.379086]  ? __pfx_kthread+0x10/0x10
[   27.379523]  ret_from_fork+0x41/0x80
[   27.380377]  ? __pfx_kthread+0x10/0x10
[   27.380694]  ret_from_fork_asm+0x1a/0x30
[   27.381041]  </TASK>
[   27.382647] 
[   27.382974] Allocated by task 269:
[   27.383977]  kasan_save_stack+0x3d/0x60
[   27.384272]  kasan_save_track+0x18/0x40
[   27.385795]  kasan_save_alloc_info+0x3b/0x50
[   27.386437]  __kasan_kmalloc+0xb7/0xc0
[   27.387476]  __kmalloc_cache_noprof+0x184/0x410
[   27.387718]  kasan_bitops_generic+0x93/0x1c0
[   27.387912]  kunit_try_run_case+0x1b3/0x490
[   27.388212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.390264]  kthread+0x257/0x310
[   27.390648]  ret_from_fork+0x41/0x80
[   27.391374]  ret_from_fork_asm+0x1a/0x30
[   27.392001] 
[   27.392819] The buggy address belongs to the object at ffff888101b3cce0
[   27.392819]  which belongs to the cache kmalloc-16 of size 16
[   27.394608] The buggy address is located 8 bytes inside of
[   27.394608]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   27.395661] 
[   27.395994] The buggy address belongs to the physical page:
[   27.396794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   27.397429] flags: 0x200000000000000(node=0|zone=2)
[   27.398990] page_type: f5(slab)
[   27.399306] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.400303] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.401157] page dumped because: kasan: bad access detected
[   27.402370] 
[   27.402654] Memory state around the buggy address:
[   27.403232]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   27.404062]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   27.404833] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.405621]                                                           ^
[   27.406263]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.407751]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.408370] ==================================================================
[   27.769426] ==================================================================
[   27.770667] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   27.773172] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   27.773891] 
[   27.774842] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   27.775901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.776364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.777495] Call Trace:
[   27.777799]  <TASK>
[   27.778079]  dump_stack_lvl+0x73/0xb0
[   27.778472]  print_report+0xd1/0x640
[   27.778883]  ? __virt_addr_valid+0x1db/0x2d0
[   27.780863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.782665]  kasan_report+0x102/0x140
[   27.783144]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   27.784330]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   27.784745]  kasan_check_range+0x10c/0x1c0
[   27.785192]  __kasan_check_write+0x18/0x20
[   27.785619]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   27.787424]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.787970]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.788893]  ? trace_hardirqs_on+0x37/0xe0
[   27.789845]  ? kasan_bitops_generic+0x93/0x1c0
[   27.790571]  kasan_bitops_generic+0x117/0x1c0
[   27.791421]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.793075]  ? __pfx_read_tsc+0x10/0x10
[   27.793721]  ? ktime_get_ts64+0x86/0x230
[   27.794850]  kunit_try_run_case+0x1b3/0x490
[   27.795180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.796727]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.798067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.798403]  ? __kthread_parkme+0x82/0x160
[   27.799069]  ? preempt_count_sub+0x50/0x80
[   27.800626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.801123]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.801686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.802616]  kthread+0x257/0x310
[   27.803468]  ? __pfx_kthread+0x10/0x10
[   27.804331]  ret_from_fork+0x41/0x80
[   27.805120]  ? __pfx_kthread+0x10/0x10
[   27.805953]  ret_from_fork_asm+0x1a/0x30
[   27.807127]  </TASK>
[   27.807448] 
[   27.807679] Allocated by task 269:
[   27.808064]  kasan_save_stack+0x3d/0x60
[   27.808494]  kasan_save_track+0x18/0x40
[   27.808894]  kasan_save_alloc_info+0x3b/0x50
[   27.809730]  __kasan_kmalloc+0xb7/0xc0
[   27.811167]  __kmalloc_cache_noprof+0x184/0x410
[   27.811684]  kasan_bitops_generic+0x93/0x1c0
[   27.812062]  kunit_try_run_case+0x1b3/0x490
[   27.812507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.812915]  kthread+0x257/0x310
[   27.814025]  ret_from_fork+0x41/0x80
[   27.814623]  ret_from_fork_asm+0x1a/0x30
[   27.815048] 
[   27.816260] The buggy address belongs to the object at ffff888101b3cce0
[   27.816260]  which belongs to the cache kmalloc-16 of size 16
[   27.818610] The buggy address is located 8 bytes inside of
[   27.818610]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   27.819773] 
[   27.820033] The buggy address belongs to the physical page:
[   27.821173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   27.822864] flags: 0x200000000000000(node=0|zone=2)
[   27.823745] page_type: f5(slab)
[   27.825416] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.826354] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.827013] page dumped because: kasan: bad access detected
[   27.827563] 
[   27.828400] Memory state around the buggy address:
[   27.829139]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   27.830804]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   27.832247] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.832637]                                                           ^
[   27.833542]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.834663]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.835184] ==================================================================
[   27.608004] ==================================================================
[   27.609379] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   27.610153] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   27.610839] 
[   27.612794] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   27.613467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.614234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.615829] Call Trace:
[   27.616191]  <TASK>
[   27.616919]  dump_stack_lvl+0x73/0xb0
[   27.618053]  print_report+0xd1/0x640
[   27.618533]  ? __virt_addr_valid+0x1db/0x2d0
[   27.618925]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.619430]  kasan_report+0x102/0x140
[   27.619792]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   27.621317]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   27.622204]  kasan_check_range+0x10c/0x1c0
[   27.623153]  __kasan_check_write+0x18/0x20
[   27.623953]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   27.624799]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.626040]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.626542]  ? trace_hardirqs_on+0x37/0xe0
[   27.627051]  ? kasan_bitops_generic+0x93/0x1c0
[   27.627878]  kasan_bitops_generic+0x117/0x1c0
[   27.628338]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.628966]  ? __pfx_read_tsc+0x10/0x10
[   27.629984]  ? ktime_get_ts64+0x86/0x230
[   27.630449]  kunit_try_run_case+0x1b3/0x490
[   27.630972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.631970]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.632702]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.633548]  ? __kthread_parkme+0x82/0x160
[   27.634060]  ? preempt_count_sub+0x50/0x80
[   27.634510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.636616]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.637699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.638241]  kthread+0x257/0x310
[   27.638833]  ? __pfx_kthread+0x10/0x10
[   27.639723]  ret_from_fork+0x41/0x80
[   27.640188]  ? __pfx_kthread+0x10/0x10
[   27.640408]  ret_from_fork_asm+0x1a/0x30
[   27.641621]  </TASK>
[   27.642182] 
[   27.642495] Allocated by task 269:
[   27.643096]  kasan_save_stack+0x3d/0x60
[   27.644188]  kasan_save_track+0x18/0x40
[   27.645156]  kasan_save_alloc_info+0x3b/0x50
[   27.645851]  __kasan_kmalloc+0xb7/0xc0
[   27.646132]  __kmalloc_cache_noprof+0x184/0x410
[   27.646629]  kasan_bitops_generic+0x93/0x1c0
[   27.647000]  kunit_try_run_case+0x1b3/0x490
[   27.647522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.649070]  kthread+0x257/0x310
[   27.649505]  ret_from_fork+0x41/0x80
[   27.650083]  ret_from_fork_asm+0x1a/0x30
[   27.650381] 
[   27.650603] The buggy address belongs to the object at ffff888101b3cce0
[   27.650603]  which belongs to the cache kmalloc-16 of size 16
[   27.651741] The buggy address is located 8 bytes inside of
[   27.651741]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   27.653849] 
[   27.654139] The buggy address belongs to the physical page:
[   27.654569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   27.655406] flags: 0x200000000000000(node=0|zone=2)
[   27.655919] page_type: f5(slab)
[   27.656234] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.657221] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.658057] page dumped because: kasan: bad access detected
[   27.658400] 
[   27.658765] Memory state around the buggy address:
[   27.659328]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   27.660015]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   27.660787] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.661260]                                                           ^
[   27.662198]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.662846]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.663705] ==================================================================
[   27.720757] ==================================================================
[   27.722290] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   27.723290] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   27.724193] 
[   27.724789] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   27.725411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.726149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.726802] Call Trace:
[   27.727496]  <TASK>
[   27.727813]  dump_stack_lvl+0x73/0xb0
[   27.728284]  print_report+0xd1/0x640
[   27.728577]  ? __virt_addr_valid+0x1db/0x2d0
[   27.728885]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.729845]  kasan_report+0x102/0x140
[   27.731401]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   27.732175]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   27.732993]  kasan_check_range+0x10c/0x1c0
[   27.733836]  __kasan_check_write+0x18/0x20
[   27.734308]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   27.735159]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.736025]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.736386]  ? trace_hardirqs_on+0x37/0xe0
[   27.737655]  ? kasan_bitops_generic+0x93/0x1c0
[   27.738533]  kasan_bitops_generic+0x117/0x1c0
[   27.739070]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.739499]  ? __pfx_read_tsc+0x10/0x10
[   27.739804]  ? ktime_get_ts64+0x86/0x230
[   27.740663]  kunit_try_run_case+0x1b3/0x490
[   27.741240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.742020]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.742464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.742954]  ? __kthread_parkme+0x82/0x160
[   27.743441]  ? preempt_count_sub+0x50/0x80
[   27.744006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.744494]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.745045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.745530]  kthread+0x257/0x310
[   27.745862]  ? __pfx_kthread+0x10/0x10
[   27.747178]  ret_from_fork+0x41/0x80
[   27.747536]  ? __pfx_kthread+0x10/0x10
[   27.748094]  ret_from_fork_asm+0x1a/0x30
[   27.748400]  </TASK>
[   27.748595] 
[   27.748799] Allocated by task 269:
[   27.749253]  kasan_save_stack+0x3d/0x60
[   27.749747]  kasan_save_track+0x18/0x40
[   27.750398]  kasan_save_alloc_info+0x3b/0x50
[   27.751047]  __kasan_kmalloc+0xb7/0xc0
[   27.751322]  __kmalloc_cache_noprof+0x184/0x410
[   27.751655]  kasan_bitops_generic+0x93/0x1c0
[   27.752141]  kunit_try_run_case+0x1b3/0x490
[   27.752678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.753258]  kthread+0x257/0x310
[   27.753570]  ret_from_fork+0x41/0x80
[   27.754076]  ret_from_fork_asm+0x1a/0x30
[   27.755495] 
[   27.755681] The buggy address belongs to the object at ffff888101b3cce0
[   27.755681]  which belongs to the cache kmalloc-16 of size 16
[   27.756876] The buggy address is located 8 bytes inside of
[   27.756876]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   27.758317] 
[   27.758496] The buggy address belongs to the physical page:
[   27.758832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   27.759791] flags: 0x200000000000000(node=0|zone=2)
[   27.760353] page_type: f5(slab)
[   27.760759] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.761653] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.762181] page dumped because: kasan: bad access detected
[   27.762517] 
[   27.762673] Memory state around the buggy address:
[   27.763149]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   27.763923]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   27.764679] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.765921]                                                           ^
[   27.767241]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.767850]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.768460] ==================================================================
[   27.411447] ==================================================================
[   27.412122] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   27.412990] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   27.414167] 
[   27.414645] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   27.416255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.416892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.418257] Call Trace:
[   27.419142]  <TASK>
[   27.419533]  dump_stack_lvl+0x73/0xb0
[   27.420282]  print_report+0xd1/0x640
[   27.420646]  ? __virt_addr_valid+0x1db/0x2d0
[   27.421371]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.422460]  kasan_report+0x102/0x140
[   27.423253]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   27.423737]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   27.424025]  kasan_check_range+0x10c/0x1c0
[   27.424722]  __kasan_check_write+0x18/0x20
[   27.425867]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   27.427007]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.428372]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.429056]  ? trace_hardirqs_on+0x37/0xe0
[   27.430140]  ? kasan_bitops_generic+0x93/0x1c0
[   27.431429]  kasan_bitops_generic+0x117/0x1c0
[   27.431815]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.432647]  ? __pfx_read_tsc+0x10/0x10
[   27.433995]  ? ktime_get_ts64+0x86/0x230
[   27.435058]  kunit_try_run_case+0x1b3/0x490
[   27.435873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.436204]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.437479]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.438048]  ? __kthread_parkme+0x82/0x160
[   27.440228]  ? preempt_count_sub+0x50/0x80
[   27.440825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.441951]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.442511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.443315]  kthread+0x257/0x310
[   27.444034]  ? __pfx_kthread+0x10/0x10
[   27.444815]  ret_from_fork+0x41/0x80
[   27.446571]  ? __pfx_kthread+0x10/0x10
[   27.447018]  ret_from_fork_asm+0x1a/0x30
[   27.448020]  </TASK>
[   27.448468] 
[   27.449092] Allocated by task 269:
[   27.449743]  kasan_save_stack+0x3d/0x60
[   27.451453]  kasan_save_track+0x18/0x40
[   27.451845]  kasan_save_alloc_info+0x3b/0x50
[   27.453025]  __kasan_kmalloc+0xb7/0xc0
[   27.453817]  __kmalloc_cache_noprof+0x184/0x410
[   27.454415]  kasan_bitops_generic+0x93/0x1c0
[   27.454860]  kunit_try_run_case+0x1b3/0x490
[   27.455235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.455799]  kthread+0x257/0x310
[   27.456433]  ret_from_fork+0x41/0x80
[   27.456706]  ret_from_fork_asm+0x1a/0x30
[   27.457970] 
[   27.458291] The buggy address belongs to the object at ffff888101b3cce0
[   27.458291]  which belongs to the cache kmalloc-16 of size 16
[   27.459519] The buggy address is located 8 bytes inside of
[   27.459519]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   27.460750] 
[   27.461167] The buggy address belongs to the physical page:
[   27.461642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   27.463232] flags: 0x200000000000000(node=0|zone=2)
[   27.464452] page_type: f5(slab)
[   27.464817] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.465985] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.467141] page dumped because: kasan: bad access detected
[   27.468739] 
[   27.468867] Memory state around the buggy address:
[   27.470017]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   27.471181]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   27.472091] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.472686]                                                           ^
[   27.473794]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.475513]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.476148] ==================================================================
[   27.546300] ==================================================================
[   27.547275] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   27.549225] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   27.551309] 
[   27.551705] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   27.552290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.554166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.555440] Call Trace:
[   27.555606]  <TASK>
[   27.556168]  dump_stack_lvl+0x73/0xb0
[   27.556393]  print_report+0xd1/0x640
[   27.557663]  ? __virt_addr_valid+0x1db/0x2d0
[   27.558327]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.558714]  kasan_report+0x102/0x140
[   27.559824]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   27.560783]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   27.561667]  kasan_check_range+0x10c/0x1c0
[   27.562318]  __kasan_check_write+0x18/0x20
[   27.563324]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   27.564318]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.565280]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.566419]  ? trace_hardirqs_on+0x37/0xe0
[   27.567333]  ? kasan_bitops_generic+0x93/0x1c0
[   27.568278]  kasan_bitops_generic+0x117/0x1c0
[   27.569008]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.569680]  ? __pfx_read_tsc+0x10/0x10
[   27.571034]  ? ktime_get_ts64+0x86/0x230
[   27.571532]  kunit_try_run_case+0x1b3/0x490
[   27.571964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.573403]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.574066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.575170]  ? __kthread_parkme+0x82/0x160
[   27.575428]  ? preempt_count_sub+0x50/0x80
[   27.575627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.575836]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.576834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.577237]  kthread+0x257/0x310
[   27.577913]  ? __pfx_kthread+0x10/0x10
[   27.579611]  ret_from_fork+0x41/0x80
[   27.580078]  ? __pfx_kthread+0x10/0x10
[   27.581365]  ret_from_fork_asm+0x1a/0x30
[   27.582087]  </TASK>
[   27.582334] 
[   27.582539] Allocated by task 269:
[   27.582916]  kasan_save_stack+0x3d/0x60
[   27.583387]  kasan_save_track+0x18/0x40
[   27.583890]  kasan_save_alloc_info+0x3b/0x50
[   27.584483]  __kasan_kmalloc+0xb7/0xc0
[   27.584892]  __kmalloc_cache_noprof+0x184/0x410
[   27.585621]  kasan_bitops_generic+0x93/0x1c0
[   27.585993]  kunit_try_run_case+0x1b3/0x490
[   27.586330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.587549]  kthread+0x257/0x310
[   27.587919]  ret_from_fork+0x41/0x80
[   27.588313]  ret_from_fork_asm+0x1a/0x30
[   27.588676] 
[   27.588917] The buggy address belongs to the object at ffff888101b3cce0
[   27.588917]  which belongs to the cache kmalloc-16 of size 16
[   27.591253] The buggy address is located 8 bytes inside of
[   27.591253]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   27.592406] 
[   27.593242] The buggy address belongs to the physical page:
[   27.593926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   27.595747] flags: 0x200000000000000(node=0|zone=2)
[   27.596195] page_type: f5(slab)
[   27.596548] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.597876] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.598810] page dumped because: kasan: bad access detected
[   27.600404] 
[   27.600651] Memory state around the buggy address:
[   27.601036]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   27.601923]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   27.603077] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.603788]                                                           ^
[   27.604702]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.605326]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.606458] ==================================================================
[   27.479307] ==================================================================
[   27.480153] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   27.482515] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   27.483058] 
[   27.483240] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   27.485556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.486614] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.487639] Call Trace:
[   27.487873]  <TASK>
[   27.488437]  dump_stack_lvl+0x73/0xb0
[   27.489204]  print_report+0xd1/0x640
[   27.489863]  ? __virt_addr_valid+0x1db/0x2d0
[   27.491027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.491847]  kasan_report+0x102/0x140
[   27.492448]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   27.493305]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   27.493835]  kasan_check_range+0x10c/0x1c0
[   27.495056]  __kasan_check_write+0x18/0x20
[   27.495496]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   27.496545]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.497292]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.497924]  ? trace_hardirqs_on+0x37/0xe0
[   27.498617]  ? kasan_bitops_generic+0x93/0x1c0
[   27.499347]  kasan_bitops_generic+0x117/0x1c0
[   27.500084]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.501236]  ? __pfx_read_tsc+0x10/0x10
[   27.501484]  ? ktime_get_ts64+0x86/0x230
[   27.502042]  kunit_try_run_case+0x1b3/0x490
[   27.502748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.503813]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.504430]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.504989]  ? __kthread_parkme+0x82/0x160
[   27.505364]  ? preempt_count_sub+0x50/0x80
[   27.506270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.506717]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.508377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.509369]  kthread+0x257/0x310
[   27.510203]  ? __pfx_kthread+0x10/0x10
[   27.511143]  ret_from_fork+0x41/0x80
[   27.511790]  ? __pfx_kthread+0x10/0x10
[   27.512215]  ret_from_fork_asm+0x1a/0x30
[   27.512668]  </TASK>
[   27.512994] 
[   27.513195] Allocated by task 269:
[   27.513646]  kasan_save_stack+0x3d/0x60
[   27.515114]  kasan_save_track+0x18/0x40
[   27.516111]  kasan_save_alloc_info+0x3b/0x50
[   27.516855]  __kasan_kmalloc+0xb7/0xc0
[   27.517127]  __kmalloc_cache_noprof+0x184/0x410
[   27.517360]  kasan_bitops_generic+0x93/0x1c0
[   27.517668]  kunit_try_run_case+0x1b3/0x490
[   27.519363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.520543]  kthread+0x257/0x310
[   27.521047]  ret_from_fork+0x41/0x80
[   27.522150]  ret_from_fork_asm+0x1a/0x30
[   27.523077] 
[   27.523617] The buggy address belongs to the object at ffff888101b3cce0
[   27.523617]  which belongs to the cache kmalloc-16 of size 16
[   27.525710] The buggy address is located 8 bytes inside of
[   27.525710]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   27.527081] 
[   27.527310] The buggy address belongs to the physical page:
[   27.529268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   27.529952] flags: 0x200000000000000(node=0|zone=2)
[   27.531200] page_type: f5(slab)
[   27.531829] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.533187] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.534125] page dumped because: kasan: bad access detected
[   27.535162] 
[   27.535348] Memory state around the buggy address:
[   27.535671]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   27.537326]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   27.538147] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.539495]                                                           ^
[   27.540911]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.542127]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.543526] ==================================================================
[   27.665965] ==================================================================
[   27.667195] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   27.668044] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   27.668865] 
[   27.669132] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   27.671005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.671618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.673642] Call Trace:
[   27.674126]  <TASK>
[   27.674355]  dump_stack_lvl+0x73/0xb0
[   27.675084]  print_report+0xd1/0x640
[   27.675397]  ? __virt_addr_valid+0x1db/0x2d0
[   27.676298]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.676766]  kasan_report+0x102/0x140
[   27.677234]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   27.678589]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   27.679239]  kasan_check_range+0x10c/0x1c0
[   27.679571]  __kasan_check_write+0x18/0x20
[   27.680108]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   27.680615]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.681486]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.682234]  ? trace_hardirqs_on+0x37/0xe0
[   27.682569]  ? kasan_bitops_generic+0x93/0x1c0
[   27.682893]  kasan_bitops_generic+0x117/0x1c0
[   27.683720]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.684380]  ? __pfx_read_tsc+0x10/0x10
[   27.684683]  ? ktime_get_ts64+0x86/0x230
[   27.685338]  kunit_try_run_case+0x1b3/0x490
[   27.685922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.686495]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.687090]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.687518]  ? __kthread_parkme+0x82/0x160
[   27.689196]  ? preempt_count_sub+0x50/0x80
[   27.689583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.690434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.691046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.691793]  kthread+0x257/0x310
[   27.692339]  ? __pfx_kthread+0x10/0x10
[   27.692698]  ret_from_fork+0x41/0x80
[   27.693085]  ? __pfx_kthread+0x10/0x10
[   27.693970]  ret_from_fork_asm+0x1a/0x30
[   27.694685]  </TASK>
[   27.694966] 
[   27.696052] Allocated by task 269:
[   27.696399]  kasan_save_stack+0x3d/0x60
[   27.696800]  kasan_save_track+0x18/0x40
[   27.697383]  kasan_save_alloc_info+0x3b/0x50
[   27.697812]  __kasan_kmalloc+0xb7/0xc0
[   27.698253]  __kmalloc_cache_noprof+0x184/0x410
[   27.698788]  kasan_bitops_generic+0x93/0x1c0
[   27.699319]  kunit_try_run_case+0x1b3/0x490
[   27.699810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.701582]  kthread+0x257/0x310
[   27.702240]  ret_from_fork+0x41/0x80
[   27.703352]  ret_from_fork_asm+0x1a/0x30
[   27.704059] 
[   27.704594] The buggy address belongs to the object at ffff888101b3cce0
[   27.704594]  which belongs to the cache kmalloc-16 of size 16
[   27.706008] The buggy address is located 8 bytes inside of
[   27.706008]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   27.708092] 
[   27.708271] The buggy address belongs to the physical page:
[   27.708968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   27.709720] flags: 0x200000000000000(node=0|zone=2)
[   27.710742] page_type: f5(slab)
[   27.711138] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.711870] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.712663] page dumped because: kasan: bad access detected
[   27.714259] 
[   27.714535] Memory state around the buggy address:
[   27.714829]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   27.715797]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   27.716651] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.717250]                                                           ^
[   27.718040]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.718774]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.719189] ==================================================================