Hay
Date
Dec. 9, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   27.421625] ==================================================================
[   27.422614] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   27.424227] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.425283] 
[   27.425694] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.427546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.428036] Hardware name: linux,dummy-virt (DT)
[   27.428574] Call trace:
[   27.428996]  show_stack+0x20/0x38 (C)
[   27.429643]  dump_stack_lvl+0x8c/0xd0
[   27.430255]  print_report+0x118/0x5e0
[   27.430987]  kasan_report+0xc8/0x118
[   27.431475]  kasan_check_range+0x100/0x1a8
[   27.432218]  __kasan_check_write+0x20/0x30
[   27.433082]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   27.433785]  kasan_bitops_generic+0x110/0x1c8
[   27.434414]  kunit_try_run_case+0x14c/0x3d0
[   27.435254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.436351]  kthread+0x24c/0x2d0
[   27.437074]  ret_from_fork+0x10/0x20
[   27.437616] 
[   27.437956] Allocated by task 249:
[   27.438533]  kasan_save_stack+0x3c/0x68
[   27.439156]  kasan_save_track+0x20/0x40
[   27.439952]  kasan_save_alloc_info+0x40/0x58
[   27.440676]  __kasan_kmalloc+0xd4/0xd8
[   27.441306]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.441978]  kasan_bitops_generic+0xa0/0x1c8
[   27.442717]  kunit_try_run_case+0x14c/0x3d0
[   27.443475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.444314]  kthread+0x24c/0x2d0
[   27.445042]  ret_from_fork+0x10/0x20
[   27.445583] 
[   27.445826] The buggy address belongs to the object at fff00000c11118e0
[   27.445826]  which belongs to the cache kmalloc-16 of size 16
[   27.448147] The buggy address is located 8 bytes inside of
[   27.448147]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.449212] 
[   27.449430] The buggy address belongs to the physical page:
[   27.450479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.451564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.452343] page_type: f5(slab)
[   27.453050] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.454066] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.455097] page dumped because: kasan: bad access detected
[   27.456012] 
[   27.456294] Memory state around the buggy address:
[   27.456883]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.457669]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.458362] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.459279]                                                           ^
[   27.460815]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.461600]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.462326] ==================================================================
[   27.175431] ==================================================================
[   27.177090] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   27.177957] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.179223] 
[   27.179892] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.181076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.181901] Hardware name: linux,dummy-virt (DT)
[   27.182446] Call trace:
[   27.182837]  show_stack+0x20/0x38 (C)
[   27.183632]  dump_stack_lvl+0x8c/0xd0
[   27.184212]  print_report+0x118/0x5e0
[   27.185034]  kasan_report+0xc8/0x118
[   27.185742]  __asan_report_load8_noabort+0x20/0x30
[   27.186509]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   27.187883]  kasan_bitops_generic+0x110/0x1c8
[   27.188501]  kunit_try_run_case+0x14c/0x3d0
[   27.189160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.189954]  kthread+0x24c/0x2d0
[   27.190584]  ret_from_fork+0x10/0x20
[   27.191415] 
[   27.191917] Allocated by task 249:
[   27.192136]  kasan_save_stack+0x3c/0x68
[   27.192375]  kasan_save_track+0x20/0x40
[   27.192620]  kasan_save_alloc_info+0x40/0x58
[   27.193044]  __kasan_kmalloc+0xd4/0xd8
[   27.193833]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.194456]  kasan_bitops_generic+0xa0/0x1c8
[   27.195093]  kunit_try_run_case+0x14c/0x3d0
[   27.195753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.196573]  kthread+0x24c/0x2d0
[   27.197631]  ret_from_fork+0x10/0x20
[   27.198366] 
[   27.198736] The buggy address belongs to the object at fff00000c11118e0
[   27.198736]  which belongs to the cache kmalloc-16 of size 16
[   27.200040] The buggy address is located 8 bytes inside of
[   27.200040]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.201291] 
[   27.201628] The buggy address belongs to the physical page:
[   27.202345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.203228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.204096] page_type: f5(slab)
[   27.204596] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.205805] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.206800] page dumped because: kasan: bad access detected
[   27.207523] 
[   27.207795] Memory state around the buggy address:
[   27.208564]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.209323]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.210034] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.211041]                                                           ^
[   27.212235]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.213294]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.214109] ==================================================================
[   27.463841] ==================================================================
[   27.464536] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   27.465416] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.466270] 
[   27.466766] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.468017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.468779] Hardware name: linux,dummy-virt (DT)
[   27.469460] Call trace:
[   27.469929]  show_stack+0x20/0x38 (C)
[   27.470588]  dump_stack_lvl+0x8c/0xd0
[   27.471317]  print_report+0x118/0x5e0
[   27.472125]  kasan_report+0xc8/0x118
[   27.472874]  kasan_check_range+0x100/0x1a8
[   27.473818]  __kasan_check_write+0x20/0x30
[   27.474200]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   27.474495]  kasan_bitops_generic+0x110/0x1c8
[   27.474825]  kunit_try_run_case+0x14c/0x3d0
[   27.475631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.476414]  kthread+0x24c/0x2d0
[   27.477100]  ret_from_fork+0x10/0x20
[   27.477810] 
[   27.478265] Allocated by task 249:
[   27.479006]  kasan_save_stack+0x3c/0x68
[   27.479448]  kasan_save_track+0x20/0x40
[   27.480507]  kasan_save_alloc_info+0x40/0x58
[   27.481206]  __kasan_kmalloc+0xd4/0xd8
[   27.481894]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.482432]  kasan_bitops_generic+0xa0/0x1c8
[   27.483558]  kunit_try_run_case+0x14c/0x3d0
[   27.484056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.484858]  kthread+0x24c/0x2d0
[   27.485421]  ret_from_fork+0x10/0x20
[   27.486126] 
[   27.486408] The buggy address belongs to the object at fff00000c11118e0
[   27.486408]  which belongs to the cache kmalloc-16 of size 16
[   27.488437] The buggy address is located 8 bytes inside of
[   27.488437]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.489555] 
[   27.489952] The buggy address belongs to the physical page:
[   27.490630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.491936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.492720] page_type: f5(slab)
[   27.493191] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.494097] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.495183] page dumped because: kasan: bad access detected
[   27.495821] 
[   27.496130] Memory state around the buggy address:
[   27.497323]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.498016]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.498814] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.499904]                                                           ^
[   27.500653]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.501509]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.502287] ==================================================================
[   27.296362] ==================================================================
[   27.297122] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   27.298548] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.299731] 
[   27.300007] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.301607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.302134] Hardware name: linux,dummy-virt (DT)
[   27.302713] Call trace:
[   27.303424]  show_stack+0x20/0x38 (C)
[   27.303993]  dump_stack_lvl+0x8c/0xd0
[   27.304575]  print_report+0x118/0x5e0
[   27.305186]  kasan_report+0xc8/0x118
[   27.305745]  kasan_check_range+0x100/0x1a8
[   27.306302]  __kasan_check_write+0x20/0x30
[   27.307177]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   27.307816]  kasan_bitops_generic+0x110/0x1c8
[   27.308480]  kunit_try_run_case+0x14c/0x3d0
[   27.309605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.310328]  kthread+0x24c/0x2d0
[   27.311236]  ret_from_fork+0x10/0x20
[   27.311731] 
[   27.312019] Allocated by task 249:
[   27.312536]  kasan_save_stack+0x3c/0x68
[   27.313086]  kasan_save_track+0x20/0x40
[   27.313632]  kasan_save_alloc_info+0x40/0x58
[   27.314179]  __kasan_kmalloc+0xd4/0xd8
[   27.315542]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.316030]  kasan_bitops_generic+0xa0/0x1c8
[   27.316596]  kunit_try_run_case+0x14c/0x3d0
[   27.317239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.317982]  kthread+0x24c/0x2d0
[   27.318489]  ret_from_fork+0x10/0x20
[   27.319029] 
[   27.319369] The buggy address belongs to the object at fff00000c11118e0
[   27.319369]  which belongs to the cache kmalloc-16 of size 16
[   27.320905] The buggy address is located 8 bytes inside of
[   27.320905]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.322132] 
[   27.322479] The buggy address belongs to the physical page:
[   27.323927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.324933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.325761] page_type: f5(slab)
[   27.326265] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.327222] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.328106] page dumped because: kasan: bad access detected
[   27.328801] 
[   27.329154] Memory state around the buggy address:
[   27.329745]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.330550]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.331641] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.332555]                                                           ^
[   27.333315]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.334069]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.334884] ==================================================================
[   27.504468] ==================================================================
[   27.505226] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   27.505919] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.506842] 
[   27.507170] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.508407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.509050] Hardware name: linux,dummy-virt (DT)
[   27.509635] Call trace:
[   27.510757]  show_stack+0x20/0x38 (C)
[   27.511542]  dump_stack_lvl+0x8c/0xd0
[   27.512021]  print_report+0x118/0x5e0
[   27.512526]  kasan_report+0xc8/0x118
[   27.513318]  __asan_report_load8_noabort+0x20/0x30
[   27.514152]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   27.514931]  kasan_bitops_generic+0x110/0x1c8
[   27.515496]  kunit_try_run_case+0x14c/0x3d0
[   27.515852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.516769]  kthread+0x24c/0x2d0
[   27.517227]  ret_from_fork+0x10/0x20
[   27.517772] 
[   27.518152] Allocated by task 249:
[   27.518814]  kasan_save_stack+0x3c/0x68
[   27.519457]  kasan_save_track+0x20/0x40
[   27.520128]  kasan_save_alloc_info+0x40/0x58
[   27.520825]  __kasan_kmalloc+0xd4/0xd8
[   27.521495]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.522218]  kasan_bitops_generic+0xa0/0x1c8
[   27.522898]  kunit_try_run_case+0x14c/0x3d0
[   27.523555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.524303]  kthread+0x24c/0x2d0
[   27.524913]  ret_from_fork+0x10/0x20
[   27.525537] 
[   27.525972] The buggy address belongs to the object at fff00000c11118e0
[   27.525972]  which belongs to the cache kmalloc-16 of size 16
[   27.527376] The buggy address is located 8 bytes inside of
[   27.527376]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.528802] 
[   27.529230] The buggy address belongs to the physical page:
[   27.529939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.530896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.531725] page_type: f5(slab)
[   27.532284] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.533239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.534013] page dumped because: kasan: bad access detected
[   27.534788] 
[   27.535075] Memory state around the buggy address:
[   27.535646]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.536426]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.537176] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.538026]                                                           ^
[   27.538855]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.539789]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.540666] ==================================================================
[   27.215994] ==================================================================
[   27.217114] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   27.218058] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.219646] 
[   27.220171] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.221411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.221996] Hardware name: linux,dummy-virt (DT)
[   27.222755] Call trace:
[   27.223132]  show_stack+0x20/0x38 (C)
[   27.223650]  dump_stack_lvl+0x8c/0xd0
[   27.224570]  print_report+0x118/0x5e0
[   27.225200]  kasan_report+0xc8/0x118
[   27.225791]  kasan_check_range+0x100/0x1a8
[   27.226432]  __kasan_check_write+0x20/0x30
[   27.227162]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   27.227755]  kasan_bitops_generic+0x110/0x1c8
[   27.228432]  kunit_try_run_case+0x14c/0x3d0
[   27.229717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.230474]  kthread+0x24c/0x2d0
[   27.231303]  ret_from_fork+0x10/0x20
[   27.231765] 
[   27.232137] Allocated by task 249:
[   27.232682]  kasan_save_stack+0x3c/0x68
[   27.233328]  kasan_save_track+0x20/0x40
[   27.233942]  kasan_save_alloc_info+0x40/0x58
[   27.234627]  __kasan_kmalloc+0xd4/0xd8
[   27.235494]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.235963]  kasan_bitops_generic+0xa0/0x1c8
[   27.236854]  kunit_try_run_case+0x14c/0x3d0
[   27.237567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.238439]  kthread+0x24c/0x2d0
[   27.239136]  ret_from_fork+0x10/0x20
[   27.240025] 
[   27.240264] The buggy address belongs to the object at fff00000c11118e0
[   27.240264]  which belongs to the cache kmalloc-16 of size 16
[   27.241811] The buggy address is located 8 bytes inside of
[   27.241811]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.243140] 
[   27.243521] The buggy address belongs to the physical page:
[   27.244683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.245442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.246282] page_type: f5(slab)
[   27.246502] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.247239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.247995] page dumped because: kasan: bad access detected
[   27.248644] 
[   27.249305] Memory state around the buggy address:
[   27.250004]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.250775]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.251526] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.252687]                                                           ^
[   27.253421]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.254413]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.255406] ==================================================================
[   27.256783] ==================================================================
[   27.258052] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   27.258892] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.259615] 
[   27.260759] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.261804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.262297] Hardware name: linux,dummy-virt (DT)
[   27.263056] Call trace:
[   27.263842]  show_stack+0x20/0x38 (C)
[   27.264373]  dump_stack_lvl+0x8c/0xd0
[   27.264918]  print_report+0x118/0x5e0
[   27.265397]  kasan_report+0xc8/0x118
[   27.266052]  __asan_report_load8_noabort+0x20/0x30
[   27.266687]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   27.267505]  kasan_bitops_generic+0x110/0x1c8
[   27.268128]  kunit_try_run_case+0x14c/0x3d0
[   27.268689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.269957]  kthread+0x24c/0x2d0
[   27.270516]  ret_from_fork+0x10/0x20
[   27.271001] 
[   27.271585] Allocated by task 249:
[   27.272060]  kasan_save_stack+0x3c/0x68
[   27.272788]  kasan_save_track+0x20/0x40
[   27.273320]  kasan_save_alloc_info+0x40/0x58
[   27.273878]  __kasan_kmalloc+0xd4/0xd8
[   27.274544]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.275241]  kasan_bitops_generic+0xa0/0x1c8
[   27.276021]  kunit_try_run_case+0x14c/0x3d0
[   27.276622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.277283]  kthread+0x24c/0x2d0
[   27.278056]  ret_from_fork+0x10/0x20
[   27.278531] 
[   27.279331] The buggy address belongs to the object at fff00000c11118e0
[   27.279331]  which belongs to the cache kmalloc-16 of size 16
[   27.280779] The buggy address is located 8 bytes inside of
[   27.280779]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.282076] 
[   27.282412] The buggy address belongs to the physical page:
[   27.283530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.284730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.285472] page_type: f5(slab)
[   27.286043] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.287396] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.288224] page dumped because: kasan: bad access detected
[   27.288879] 
[   27.289188] Memory state around the buggy address:
[   27.289764]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.290581]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.291666] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.292471]                                                           ^
[   27.293441]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.293822]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.294735] ==================================================================
[   27.379832] ==================================================================
[   27.380520] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   27.381778] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.383316] 
[   27.383745] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.384915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.385540] Hardware name: linux,dummy-virt (DT)
[   27.386246] Call trace:
[   27.386747]  show_stack+0x20/0x38 (C)
[   27.387440]  dump_stack_lvl+0x8c/0xd0
[   27.388041]  print_report+0x118/0x5e0
[   27.388724]  kasan_report+0xc8/0x118
[   27.389377]  __asan_report_load8_noabort+0x20/0x30
[   27.390267]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   27.391644]  kasan_bitops_generic+0x110/0x1c8
[   27.392257]  kunit_try_run_case+0x14c/0x3d0
[   27.392826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.393885]  kthread+0x24c/0x2d0
[   27.394437]  ret_from_fork+0x10/0x20
[   27.394685] 
[   27.395306] Allocated by task 249:
[   27.395673]  kasan_save_stack+0x3c/0x68
[   27.396516]  kasan_save_track+0x20/0x40
[   27.397179]  kasan_save_alloc_info+0x40/0x58
[   27.397797]  __kasan_kmalloc+0xd4/0xd8
[   27.398402]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.399154]  kasan_bitops_generic+0xa0/0x1c8
[   27.399961]  kunit_try_run_case+0x14c/0x3d0
[   27.400713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.401529]  kthread+0x24c/0x2d0
[   27.402049]  ret_from_fork+0x10/0x20
[   27.402991] 
[   27.403448] The buggy address belongs to the object at fff00000c11118e0
[   27.403448]  which belongs to the cache kmalloc-16 of size 16
[   27.404938] The buggy address is located 8 bytes inside of
[   27.404938]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.406399] 
[   27.407340] The buggy address belongs to the physical page:
[   27.407899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.408897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.409778] page_type: f5(slab)
[   27.410403] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.411533] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.412691] page dumped because: kasan: bad access detected
[   27.413329] 
[   27.413852] Memory state around the buggy address:
[   27.414559]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.415470]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.416540] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.417436]                                                           ^
[   27.418258]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.419178]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.420453] ==================================================================
[   27.336231] ==================================================================
[   27.337385] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   27.338228] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.339577] 
[   27.339913] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.341033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.342005] Hardware name: linux,dummy-virt (DT)
[   27.342664] Call trace:
[   27.343220]  show_stack+0x20/0x38 (C)
[   27.344249]  dump_stack_lvl+0x8c/0xd0
[   27.345007]  print_report+0x118/0x5e0
[   27.345608]  kasan_report+0xc8/0x118
[   27.346234]  kasan_check_range+0x100/0x1a8
[   27.346934]  __kasan_check_write+0x20/0x30
[   27.347588]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   27.348308]  kasan_bitops_generic+0x110/0x1c8
[   27.349407]  kunit_try_run_case+0x14c/0x3d0
[   27.350027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.350774]  kthread+0x24c/0x2d0
[   27.351492]  ret_from_fork+0x10/0x20
[   27.352230] 
[   27.352561] Allocated by task 249:
[   27.353178]  kasan_save_stack+0x3c/0x68
[   27.353831]  kasan_save_track+0x20/0x40
[   27.354408]  kasan_save_alloc_info+0x40/0x58
[   27.355627]  __kasan_kmalloc+0xd4/0xd8
[   27.356184]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.356798]  kasan_bitops_generic+0xa0/0x1c8
[   27.357517]  kunit_try_run_case+0x14c/0x3d0
[   27.358148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.358868]  kthread+0x24c/0x2d0
[   27.359370]  ret_from_fork+0x10/0x20
[   27.359968] 
[   27.360301] The buggy address belongs to the object at fff00000c11118e0
[   27.360301]  which belongs to the cache kmalloc-16 of size 16
[   27.361940] The buggy address is located 8 bytes inside of
[   27.361940]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.363311] 
[   27.364223] The buggy address belongs to the physical page:
[   27.365112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.366121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.367279] page_type: f5(slab)
[   27.367723] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.368598] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.369525] page dumped because: kasan: bad access detected
[   27.370133] 
[   27.370416] Memory state around the buggy address:
[   27.371827]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.372692]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.373517] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.374503]                                                           ^
[   27.375574]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.376342]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.377077] ==================================================================
[   27.134544] ==================================================================
[   27.135784] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   27.137489] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.138264] 
[   27.138620] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.140009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.140500] Hardware name: linux,dummy-virt (DT)
[   27.141128] Call trace:
[   27.141850]  show_stack+0x20/0x38 (C)
[   27.142562]  dump_stack_lvl+0x8c/0xd0
[   27.143363]  print_report+0x118/0x5e0
[   27.144120]  kasan_report+0xc8/0x118
[   27.144736]  kasan_check_range+0x100/0x1a8
[   27.145339]  __kasan_check_write+0x20/0x30
[   27.145912]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   27.146759]  kasan_bitops_generic+0x110/0x1c8
[   27.147571]  kunit_try_run_case+0x14c/0x3d0
[   27.148330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.149068]  kthread+0x24c/0x2d0
[   27.149608]  ret_from_fork+0x10/0x20
[   27.150261] 
[   27.150647] Allocated by task 249:
[   27.151648]  kasan_save_stack+0x3c/0x68
[   27.152250]  kasan_save_track+0x20/0x40
[   27.152791]  kasan_save_alloc_info+0x40/0x58
[   27.153387]  __kasan_kmalloc+0xd4/0xd8
[   27.153986]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.154557]  kasan_bitops_generic+0xa0/0x1c8
[   27.155260]  kunit_try_run_case+0x14c/0x3d0
[   27.155986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.156717]  kthread+0x24c/0x2d0
[   27.157263]  ret_from_fork+0x10/0x20
[   27.157955] 
[   27.158278] The buggy address belongs to the object at fff00000c11118e0
[   27.158278]  which belongs to the cache kmalloc-16 of size 16
[   27.159738] The buggy address is located 8 bytes inside of
[   27.159738]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.160913] 
[   27.161218] The buggy address belongs to the physical page:
[   27.161872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.162763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.163541] page_type: f5(slab)
[   27.164523] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.165523] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.166472] page dumped because: kasan: bad access detected
[   27.167561] 
[   27.167743] Memory state around the buggy address:
[   27.168396]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.169341]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.170256] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.171169]                                                           ^
[   27.172221]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.173130]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.173987] ==================================================================

[   27.634798] ==================================================================
[   27.636600] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   27.637395] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   27.637998] 
[   27.638309] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.639040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.639486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.641709] Call Trace:
[   27.642012]  <TASK>
[   27.642655]  dump_stack_lvl+0x73/0xb0
[   27.643191]  print_report+0xd1/0x640
[   27.643917]  ? __virt_addr_valid+0x1db/0x2d0
[   27.645058]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.646543]  kasan_report+0x102/0x140
[   27.646811]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   27.647899]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   27.648559]  kasan_check_range+0x10c/0x1c0
[   27.649002]  __kasan_check_write+0x18/0x20
[   27.649379]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   27.649917]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.652020]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.652609]  ? trace_hardirqs_on+0x37/0xe0
[   27.653371]  ? kasan_bitops_generic+0x93/0x1c0
[   27.654060]  kasan_bitops_generic+0x117/0x1c0
[   27.654747]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.655774]  ? __pfx_read_tsc+0x10/0x10
[   27.656664]  ? ktime_get_ts64+0x86/0x230
[   27.657429]  kunit_try_run_case+0x1b3/0x490
[   27.657855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.658474]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.659705]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.660299]  ? __kthread_parkme+0x82/0x160
[   27.661048]  ? preempt_count_sub+0x50/0x80
[   27.662209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.662600]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.663602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.664096]  kthread+0x257/0x310
[   27.664783]  ? __pfx_kthread+0x10/0x10
[   27.665198]  ret_from_fork+0x41/0x80
[   27.665621]  ? __pfx_kthread+0x10/0x10
[   27.666644]  ret_from_fork_asm+0x1a/0x30
[   27.666972]  </TASK>
[   27.668037] 
[   27.669007] Allocated by task 268:
[   27.669289]  kasan_save_stack+0x3d/0x60
[   27.670026]  kasan_save_track+0x18/0x40
[   27.670432]  kasan_save_alloc_info+0x3b/0x50
[   27.671375]  __kasan_kmalloc+0xb7/0xc0
[   27.671856]  __kmalloc_cache_noprof+0x184/0x410
[   27.672879]  kasan_bitops_generic+0x93/0x1c0
[   27.673678]  kunit_try_run_case+0x1b3/0x490
[   27.674584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.675243]  kthread+0x257/0x310
[   27.676075]  ret_from_fork+0x41/0x80
[   27.676861]  ret_from_fork_asm+0x1a/0x30
[   27.677558] 
[   27.677806] The buggy address belongs to the object at ffff888101094760
[   27.677806]  which belongs to the cache kmalloc-16 of size 16
[   27.678707] The buggy address is located 8 bytes inside of
[   27.678707]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   27.679633] 
[   27.679795] The buggy address belongs to the physical page:
[   27.681108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   27.682859] flags: 0x200000000000000(node=0|zone=2)
[   27.683303] page_type: f5(slab)
[   27.684056] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.685455] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.686966] page dumped because: kasan: bad access detected
[   27.687807] 
[   27.688060] Memory state around the buggy address:
[   27.688753]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   27.689970]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   27.691160] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.692581]                                                           ^
[   27.693481]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.694918]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.695840] ==================================================================
[   27.758969] ==================================================================
[   27.759561] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   27.761889] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   27.763054] 
[   27.763525] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.764644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.765041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.765817] Call Trace:
[   27.766106]  <TASK>
[   27.766967]  dump_stack_lvl+0x73/0xb0
[   27.767480]  print_report+0xd1/0x640
[   27.767925]  ? __virt_addr_valid+0x1db/0x2d0
[   27.768593]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.769109]  kasan_report+0x102/0x140
[   27.769677]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   27.770514]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   27.770834]  kasan_check_range+0x10c/0x1c0
[   27.771034]  __kasan_check_write+0x18/0x20
[   27.771227]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   27.771955]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.772622]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.773201]  ? trace_hardirqs_on+0x37/0xe0
[   27.773724]  ? kasan_bitops_generic+0x93/0x1c0
[   27.774792]  kasan_bitops_generic+0x117/0x1c0
[   27.775516]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.776084]  ? __pfx_read_tsc+0x10/0x10
[   27.776633]  ? ktime_get_ts64+0x86/0x230
[   27.777105]  kunit_try_run_case+0x1b3/0x490
[   27.777648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.778140]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.779133]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.779725]  ? __kthread_parkme+0x82/0x160
[   27.780324]  ? preempt_count_sub+0x50/0x80
[   27.780697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.781202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.781845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.782975]  kthread+0x257/0x310
[   27.783583]  ? __pfx_kthread+0x10/0x10
[   27.784048]  ret_from_fork+0x41/0x80
[   27.784622]  ? __pfx_kthread+0x10/0x10
[   27.785148]  ret_from_fork_asm+0x1a/0x30
[   27.785673]  </TASK>
[   27.786036] 
[   27.786857] Allocated by task 268:
[   27.787150]  kasan_save_stack+0x3d/0x60
[   27.787747]  kasan_save_track+0x18/0x40
[   27.788449]  kasan_save_alloc_info+0x3b/0x50
[   27.788847]  __kasan_kmalloc+0xb7/0xc0
[   27.789312]  __kmalloc_cache_noprof+0x184/0x410
[   27.789757]  kasan_bitops_generic+0x93/0x1c0
[   27.790204]  kunit_try_run_case+0x1b3/0x490
[   27.790550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.791824]  kthread+0x257/0x310
[   27.792141]  ret_from_fork+0x41/0x80
[   27.792634]  ret_from_fork_asm+0x1a/0x30
[   27.793151] 
[   27.793510] The buggy address belongs to the object at ffff888101094760
[   27.793510]  which belongs to the cache kmalloc-16 of size 16
[   27.795143] The buggy address is located 8 bytes inside of
[   27.795143]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   27.796425] 
[   27.796676] The buggy address belongs to the physical page:
[   27.797155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   27.798112] flags: 0x200000000000000(node=0|zone=2)
[   27.799134] page_type: f5(slab)
[   27.799582] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.800580] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.801433] page dumped because: kasan: bad access detected
[   27.802059] 
[   27.802613] Memory state around the buggy address:
[   27.802954]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   27.804096]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   27.804992] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.805687]                                                           ^
[   27.806338]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.806975]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.807590] ==================================================================
[   27.578154] ==================================================================
[   27.579565] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   27.581176] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   27.583061] 
[   27.583480] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.584809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.585394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.586191] Call Trace:
[   27.586572]  <TASK>
[   27.586834]  dump_stack_lvl+0x73/0xb0
[   27.587232]  print_report+0xd1/0x640
[   27.587983]  ? __virt_addr_valid+0x1db/0x2d0
[   27.588581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.589388]  kasan_report+0x102/0x140
[   27.589873]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   27.591021]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   27.592088]  kasan_check_range+0x10c/0x1c0
[   27.592665]  __kasan_check_write+0x18/0x20
[   27.593200]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   27.593924]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.594519]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.595387]  ? trace_hardirqs_on+0x37/0xe0
[   27.595733]  ? kasan_bitops_generic+0x93/0x1c0
[   27.596654]  kasan_bitops_generic+0x117/0x1c0
[   27.597317]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.598201]  ? __pfx_read_tsc+0x10/0x10
[   27.598771]  ? ktime_get_ts64+0x86/0x230
[   27.599584]  kunit_try_run_case+0x1b3/0x490
[   27.599940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.601166]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.601775]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.602336]  ? __kthread_parkme+0x82/0x160
[   27.602912]  ? preempt_count_sub+0x50/0x80
[   27.603656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.604241]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.604841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.606159]  kthread+0x257/0x310
[   27.606670]  ? __pfx_kthread+0x10/0x10
[   27.607113]  ret_from_fork+0x41/0x80
[   27.607628]  ? __pfx_kthread+0x10/0x10
[   27.608107]  ret_from_fork_asm+0x1a/0x30
[   27.608969]  </TASK>
[   27.609209] 
[   27.609544] Allocated by task 268:
[   27.609923]  kasan_save_stack+0x3d/0x60
[   27.610798]  kasan_save_track+0x18/0x40
[   27.610994]  kasan_save_alloc_info+0x3b/0x50
[   27.611188]  __kasan_kmalloc+0xb7/0xc0
[   27.611845]  __kmalloc_cache_noprof+0x184/0x410
[   27.612672]  kasan_bitops_generic+0x93/0x1c0
[   27.613905]  kunit_try_run_case+0x1b3/0x490
[   27.614733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.615506]  kthread+0x257/0x310
[   27.615735]  ret_from_fork+0x41/0x80
[   27.616004]  ret_from_fork_asm+0x1a/0x30
[   27.616196] 
[   27.616335] The buggy address belongs to the object at ffff888101094760
[   27.616335]  which belongs to the cache kmalloc-16 of size 16
[   27.618070] The buggy address is located 8 bytes inside of
[   27.618070]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   27.619802] 
[   27.620058] The buggy address belongs to the physical page:
[   27.621018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   27.622529] flags: 0x200000000000000(node=0|zone=2)
[   27.622756] page_type: f5(slab)
[   27.623562] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.624758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.625717] page dumped because: kasan: bad access detected
[   27.626654] 
[   27.626877] Memory state around the buggy address:
[   27.627647]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   27.628607]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   27.629577] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.630069]                                                           ^
[   27.631401]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.632065]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.632682] ==================================================================
[   27.968782] ==================================================================
[   27.969510] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   27.970259] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   27.970924] 
[   27.971171] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.972047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.973078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.974192] Call Trace:
[   27.974596]  <TASK>
[   27.974953]  dump_stack_lvl+0x73/0xb0
[   27.975437]  print_report+0xd1/0x640
[   27.975762]  ? __virt_addr_valid+0x1db/0x2d0
[   27.976399]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.976804]  kasan_report+0x102/0x140
[   27.977163]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   27.977759]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   27.978249]  kasan_check_range+0x10c/0x1c0
[   27.978707]  __kasan_check_write+0x18/0x20
[   27.979430]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   27.980005]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.980583]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.981048]  ? trace_hardirqs_on+0x37/0xe0
[   27.981584]  ? kasan_bitops_generic+0x93/0x1c0
[   27.982014]  kasan_bitops_generic+0x117/0x1c0
[   27.982621]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.982960]  ? __pfx_read_tsc+0x10/0x10
[   27.983608]  ? ktime_get_ts64+0x86/0x230
[   27.984076]  kunit_try_run_case+0x1b3/0x490
[   27.984446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.984882]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.985409]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.985747]  ? __kthread_parkme+0x82/0x160
[   27.986331]  ? preempt_count_sub+0x50/0x80
[   27.986902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.987373]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.988079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.989426]  kthread+0x257/0x310
[   27.990179]  ? __pfx_kthread+0x10/0x10
[   27.990766]  ret_from_fork+0x41/0x80
[   27.991412]  ? __pfx_kthread+0x10/0x10
[   27.991858]  ret_from_fork_asm+0x1a/0x30
[   27.992586]  </TASK>
[   27.992901] 
[   27.993064] Allocated by task 268:
[   27.993549]  kasan_save_stack+0x3d/0x60
[   27.994064]  kasan_save_track+0x18/0x40
[   27.994557]  kasan_save_alloc_info+0x3b/0x50
[   27.995107]  __kasan_kmalloc+0xb7/0xc0
[   27.995699]  __kmalloc_cache_noprof+0x184/0x410
[   27.996223]  kasan_bitops_generic+0x93/0x1c0
[   27.996712]  kunit_try_run_case+0x1b3/0x490
[   27.997333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.997837]  kthread+0x257/0x310
[   27.998091]  ret_from_fork+0x41/0x80
[   27.998617]  ret_from_fork_asm+0x1a/0x30
[   27.999144] 
[   27.999435] The buggy address belongs to the object at ffff888101094760
[   27.999435]  which belongs to the cache kmalloc-16 of size 16
[   28.000567] The buggy address is located 8 bytes inside of
[   28.000567]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   28.001447] 
[   28.001743] The buggy address belongs to the physical page:
[   28.002471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   28.003364] flags: 0x200000000000000(node=0|zone=2)
[   28.003697] page_type: f5(slab)
[   28.003950] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.004917] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.006076] page dumped because: kasan: bad access detected
[   28.006590] 
[   28.006748] Memory state around the buggy address:
[   28.007078]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   28.008159]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   28.009147] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.009731]                                                           ^
[   28.010563]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.011150]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.011933] ==================================================================
[   27.696669] ==================================================================
[   27.697089] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   27.699067] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   27.700455] 
[   27.700635] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.702729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.704292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.705432] Call Trace:
[   27.705942]  <TASK>
[   27.706870]  dump_stack_lvl+0x73/0xb0
[   27.707357]  print_report+0xd1/0x640
[   27.708019]  ? __virt_addr_valid+0x1db/0x2d0
[   27.708833]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.709842]  kasan_report+0x102/0x140
[   27.710867]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   27.711513]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   27.712318]  kasan_check_range+0x10c/0x1c0
[   27.712708]  __kasan_check_write+0x18/0x20
[   27.713860]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   27.714727]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.715265]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.716020]  ? trace_hardirqs_on+0x37/0xe0
[   27.717092]  ? kasan_bitops_generic+0x93/0x1c0
[   27.717572]  kasan_bitops_generic+0x117/0x1c0
[   27.718555]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.719053]  ? __pfx_read_tsc+0x10/0x10
[   27.719558]  ? ktime_get_ts64+0x86/0x230
[   27.719945]  kunit_try_run_case+0x1b3/0x490
[   27.720553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.721635]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.723307]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.723778]  ? __kthread_parkme+0x82/0x160
[   27.724161]  ? preempt_count_sub+0x50/0x80
[   27.724553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.724982]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.726463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.727057]  kthread+0x257/0x310
[   27.727695]  ? __pfx_kthread+0x10/0x10
[   27.728672]  ret_from_fork+0x41/0x80
[   27.729065]  ? __pfx_kthread+0x10/0x10
[   27.729303]  ret_from_fork_asm+0x1a/0x30
[   27.729720]  </TASK>
[   27.730051] 
[   27.730966] Allocated by task 268:
[   27.731318]  kasan_save_stack+0x3d/0x60
[   27.732062]  kasan_save_track+0x18/0x40
[   27.732719]  kasan_save_alloc_info+0x3b/0x50
[   27.733909]  __kasan_kmalloc+0xb7/0xc0
[   27.735036]  __kmalloc_cache_noprof+0x184/0x410
[   27.735745]  kasan_bitops_generic+0x93/0x1c0
[   27.736217]  kunit_try_run_case+0x1b3/0x490
[   27.736693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.738516]  kthread+0x257/0x310
[   27.739122]  ret_from_fork+0x41/0x80
[   27.739673]  ret_from_fork_asm+0x1a/0x30
[   27.740156] 
[   27.740452] The buggy address belongs to the object at ffff888101094760
[   27.740452]  which belongs to the cache kmalloc-16 of size 16
[   27.741640] The buggy address is located 8 bytes inside of
[   27.741640]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   27.743159] 
[   27.743675] The buggy address belongs to the physical page:
[   27.744309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   27.745759] flags: 0x200000000000000(node=0|zone=2)
[   27.746258] page_type: f5(slab)
[   27.746526] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.748146] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.749505] page dumped because: kasan: bad access detected
[   27.750513] 
[   27.750698] Memory state around the buggy address:
[   27.751620]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   27.753072]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   27.753937] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.754735]                                                           ^
[   27.755536]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.756841]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.757496] ==================================================================
[   27.864992] ==================================================================
[   27.866243] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   27.867416] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   27.868951] 
[   27.869158] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.870933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.871557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.872699] Call Trace:
[   27.872964]  <TASK>
[   27.873760]  dump_stack_lvl+0x73/0xb0
[   27.874162]  print_report+0xd1/0x640
[   27.874560]  ? __virt_addr_valid+0x1db/0x2d0
[   27.874998]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.876760]  kasan_report+0x102/0x140
[   27.877145]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   27.878127]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   27.878967]  kasan_check_range+0x10c/0x1c0
[   27.879506]  __kasan_check_write+0x18/0x20
[   27.879708]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   27.880972]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.881696]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.882721]  ? trace_hardirqs_on+0x37/0xe0
[   27.883350]  ? kasan_bitops_generic+0x93/0x1c0
[   27.884035]  kasan_bitops_generic+0x117/0x1c0
[   27.885031]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.885508]  ? __pfx_read_tsc+0x10/0x10
[   27.886896]  ? ktime_get_ts64+0x86/0x230
[   27.887582]  kunit_try_run_case+0x1b3/0x490
[   27.888050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.888501]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.888873]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.889676]  ? __kthread_parkme+0x82/0x160
[   27.890020]  ? preempt_count_sub+0x50/0x80
[   27.890677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.891457]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.892082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.892647]  kthread+0x257/0x310
[   27.893351]  ? __pfx_kthread+0x10/0x10
[   27.893721]  ret_from_fork+0x41/0x80
[   27.893983]  ? __pfx_kthread+0x10/0x10
[   27.894496]  ret_from_fork_asm+0x1a/0x30
[   27.895338]  </TASK>
[   27.895675] 
[   27.895915] Allocated by task 268:
[   27.896704]  kasan_save_stack+0x3d/0x60
[   27.897063]  kasan_save_track+0x18/0x40
[   27.897526]  kasan_save_alloc_info+0x3b/0x50
[   27.898085]  __kasan_kmalloc+0xb7/0xc0
[   27.898404]  __kmalloc_cache_noprof+0x184/0x410
[   27.898930]  kasan_bitops_generic+0x93/0x1c0
[   27.899484]  kunit_try_run_case+0x1b3/0x490
[   27.900686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.901069]  kthread+0x257/0x310
[   27.901502]  ret_from_fork+0x41/0x80
[   27.902074]  ret_from_fork_asm+0x1a/0x30
[   27.902613] 
[   27.902816] The buggy address belongs to the object at ffff888101094760
[   27.902816]  which belongs to the cache kmalloc-16 of size 16
[   27.904005] The buggy address is located 8 bytes inside of
[   27.904005]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   27.904762] 
[   27.904923] The buggy address belongs to the physical page:
[   27.906197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   27.906989] flags: 0x200000000000000(node=0|zone=2)
[   27.907363] page_type: f5(slab)
[   27.907621] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.908402] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.909335] page dumped because: kasan: bad access detected
[   27.910436] 
[   27.910620] Memory state around the buggy address:
[   27.911058]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   27.911767]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   27.912461] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.913103]                                                           ^
[   27.913775]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.915089]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.916031] ==================================================================
[   27.808935] ==================================================================
[   27.809702] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   27.810617] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   27.811140] 
[   27.811546] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.813186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.813723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.814639] Call Trace:
[   27.815059]  <TASK>
[   27.815532]  dump_stack_lvl+0x73/0xb0
[   27.816000]  print_report+0xd1/0x640
[   27.816932]  ? __virt_addr_valid+0x1db/0x2d0
[   27.817434]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.818029]  kasan_report+0x102/0x140
[   27.818628]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   27.819292]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   27.819827]  kasan_check_range+0x10c/0x1c0
[   27.820659]  __kasan_check_write+0x18/0x20
[   27.821139]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   27.821634]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.822112]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.822652]  ? trace_hardirqs_on+0x37/0xe0
[   27.823291]  ? kasan_bitops_generic+0x93/0x1c0
[   27.823746]  kasan_bitops_generic+0x117/0x1c0
[   27.824630]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.825104]  ? __pfx_read_tsc+0x10/0x10
[   27.825688]  ? ktime_get_ts64+0x86/0x230
[   27.826114]  kunit_try_run_case+0x1b3/0x490
[   27.826849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.827287]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.828008]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.828749]  ? __kthread_parkme+0x82/0x160
[   27.829455]  ? preempt_count_sub+0x50/0x80
[   27.830079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.830919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.831348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.832457]  kthread+0x257/0x310
[   27.832700]  ? __pfx_kthread+0x10/0x10
[   27.834020]  ret_from_fork+0x41/0x80
[   27.834920]  ? __pfx_kthread+0x10/0x10
[   27.835511]  ret_from_fork_asm+0x1a/0x30
[   27.836657]  </TASK>
[   27.836842] 
[   27.836977] Allocated by task 268:
[   27.837226]  kasan_save_stack+0x3d/0x60
[   27.838007]  kasan_save_track+0x18/0x40
[   27.838810]  kasan_save_alloc_info+0x3b/0x50
[   27.839691]  __kasan_kmalloc+0xb7/0xc0
[   27.840855]  __kmalloc_cache_noprof+0x184/0x410
[   27.841232]  kasan_bitops_generic+0x93/0x1c0
[   27.841663]  kunit_try_run_case+0x1b3/0x490
[   27.842328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.842977]  kthread+0x257/0x310
[   27.843812]  ret_from_fork+0x41/0x80
[   27.844479]  ret_from_fork_asm+0x1a/0x30
[   27.846371] 
[   27.846645] The buggy address belongs to the object at ffff888101094760
[   27.846645]  which belongs to the cache kmalloc-16 of size 16
[   27.847675] The buggy address is located 8 bytes inside of
[   27.847675]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   27.849763] 
[   27.850007] The buggy address belongs to the physical page:
[   27.850562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   27.851588] flags: 0x200000000000000(node=0|zone=2)
[   27.852090] page_type: f5(slab)
[   27.852793] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.854315] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.855070] page dumped because: kasan: bad access detected
[   27.855427] 
[   27.855663] Memory state around the buggy address:
[   27.856200]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   27.857617]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   27.859172] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.859932]                                                           ^
[   27.860964]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.861406]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.862904] ==================================================================
[   27.917075] ==================================================================
[   27.917847] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   27.919386] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   27.919909] 
[   27.920094] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.921728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.922098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.923496] Call Trace:
[   27.923968]  <TASK>
[   27.924174]  dump_stack_lvl+0x73/0xb0
[   27.924702]  print_report+0xd1/0x640
[   27.925090]  ? __virt_addr_valid+0x1db/0x2d0
[   27.925730]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.926363]  kasan_report+0x102/0x140
[   27.926725]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   27.927352]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   27.928729]  kasan_check_range+0x10c/0x1c0
[   27.929401]  __kasan_check_write+0x18/0x20
[   27.929743]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   27.930350]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.931012]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.932072]  ? trace_hardirqs_on+0x37/0xe0
[   27.932623]  ? kasan_bitops_generic+0x93/0x1c0
[   27.933180]  kasan_bitops_generic+0x117/0x1c0
[   27.933851]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.934434]  ? __pfx_read_tsc+0x10/0x10
[   27.935121]  ? ktime_get_ts64+0x86/0x230
[   27.936134]  kunit_try_run_case+0x1b3/0x490
[   27.936722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.937230]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.937942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.938622]  ? __kthread_parkme+0x82/0x160
[   27.939193]  ? preempt_count_sub+0x50/0x80
[   27.939586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.940050]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.940691]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.941308]  kthread+0x257/0x310
[   27.941712]  ? __pfx_kthread+0x10/0x10
[   27.942057]  ret_from_fork+0x41/0x80
[   27.942354]  ? __pfx_kthread+0x10/0x10
[   27.943934]  ret_from_fork_asm+0x1a/0x30
[   27.944655]  </TASK>
[   27.945079] 
[   27.945356] Allocated by task 268:
[   27.945633]  kasan_save_stack+0x3d/0x60
[   27.946376]  kasan_save_track+0x18/0x40
[   27.946699]  kasan_save_alloc_info+0x3b/0x50
[   27.947127]  __kasan_kmalloc+0xb7/0xc0
[   27.948065]  __kmalloc_cache_noprof+0x184/0x410
[   27.949017]  kasan_bitops_generic+0x93/0x1c0
[   27.949421]  kunit_try_run_case+0x1b3/0x490
[   27.950076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.950733]  kthread+0x257/0x310
[   27.951155]  ret_from_fork+0x41/0x80
[   27.952060]  ret_from_fork_asm+0x1a/0x30
[   27.952535] 
[   27.952969] The buggy address belongs to the object at ffff888101094760
[   27.952969]  which belongs to the cache kmalloc-16 of size 16
[   27.954061] The buggy address is located 8 bytes inside of
[   27.954061]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   27.955090] 
[   27.955244] The buggy address belongs to the physical page:
[   27.956161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   27.957055] flags: 0x200000000000000(node=0|zone=2)
[   27.957582] page_type: f5(slab)
[   27.958777] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.959888] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.960574] page dumped because: kasan: bad access detected
[   27.961116] 
[   27.961336] Memory state around the buggy address:
[   27.961840]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   27.962749]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   27.963913] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.964535]                                                           ^
[   27.965363]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.966063]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.966892] ==================================================================