Hay
Date
Dec. 4, 2024, 3:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   35.978257] ==================================================================
[   35.979314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   35.980359] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.981067] 
[   35.981504] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.983044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.983768] Hardware name: linux,dummy-virt (DT)
[   35.984459] Call trace:
[   35.984985]  show_stack+0x20/0x38 (C)
[   35.985707]  dump_stack_lvl+0x8c/0xd0
[   35.986521]  print_report+0x118/0x5e0
[   35.987142]  kasan_report+0xc8/0x118
[   35.987793]  kasan_check_range+0x100/0x1a8
[   35.988477]  __kasan_check_write+0x20/0x30
[   35.989173]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   35.990063]  kasan_bitops_generic+0x11c/0x1c8
[   35.990788]  kunit_try_run_case+0x14c/0x3d0
[   35.991532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.992372]  kthread+0x24c/0x2d0
[   35.992967]  ret_from_fork+0x10/0x20
[   35.993716] 
[   35.994063] Allocated by task 249:
[   35.994716]  kasan_save_stack+0x3c/0x68
[   35.995430]  kasan_save_track+0x20/0x40
[   35.996092]  kasan_save_alloc_info+0x40/0x58
[   35.996824]  __kasan_kmalloc+0xd4/0xd8
[   35.997449]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.998080]  kasan_bitops_generic+0xa0/0x1c8
[   35.998820]  kunit_try_run_case+0x14c/0x3d0
[   35.999554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.000350]  kthread+0x24c/0x2d0
[   36.000980]  ret_from_fork+0x10/0x20
[   36.001684] 
[   36.002036] The buggy address belongs to the object at fff00000c6153d80
[   36.002036]  which belongs to the cache kmalloc-16 of size 16
[   36.003655] The buggy address is located 8 bytes inside of
[   36.003655]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.005185] 
[   36.005650] The buggy address belongs to the physical page:
[   36.006359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.007527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.008555] page_type: f5(slab)
[   36.009145] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.010172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.011261] page dumped because: kasan: bad access detected
[   36.012001] 
[   36.012347] Memory state around the buggy address:
[   36.013324]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.014311]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.015297] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.016361]                       ^
[   36.016980]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.017974]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.018899] ==================================================================
[   36.183371] ==================================================================
[   36.184262] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   36.185226] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   36.186244] 
[   36.186709] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.187881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.188532] Hardware name: linux,dummy-virt (DT)
[   36.189232] Call trace:
[   36.189648]  show_stack+0x20/0x38 (C)
[   36.190228]  dump_stack_lvl+0x8c/0xd0
[   36.190893]  print_report+0x118/0x5e0
[   36.191413]  kasan_report+0xc8/0x118
[   36.192140]  __asan_report_load8_noabort+0x20/0x30
[   36.192814]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   36.193683]  kasan_bitops_generic+0x11c/0x1c8
[   36.194278]  kunit_try_run_case+0x14c/0x3d0
[   36.195051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.195819]  kthread+0x24c/0x2d0
[   36.196450]  ret_from_fork+0x10/0x20
[   36.197063] 
[   36.197400] Allocated by task 249:
[   36.197922]  kasan_save_stack+0x3c/0x68
[   36.198458]  kasan_save_track+0x20/0x40
[   36.199167]  kasan_save_alloc_info+0x40/0x58
[   36.199802]  __kasan_kmalloc+0xd4/0xd8
[   36.200341]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.201111]  kasan_bitops_generic+0xa0/0x1c8
[   36.201744]  kunit_try_run_case+0x14c/0x3d0
[   36.202347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.203092]  kthread+0x24c/0x2d0
[   36.203609]  ret_from_fork+0x10/0x20
[   36.204137] 
[   36.204468] The buggy address belongs to the object at fff00000c6153d80
[   36.204468]  which belongs to the cache kmalloc-16 of size 16
[   36.205914] The buggy address is located 8 bytes inside of
[   36.205914]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.207381] 
[   36.207803] The buggy address belongs to the physical page:
[   36.208500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.209457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.210338] page_type: f5(slab)
[   36.210877] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.211814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.212731] page dumped because: kasan: bad access detected
[   36.213455] 
[   36.213844] Memory state around the buggy address:
[   36.214566]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.215400]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.216293] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.217169]                       ^
[   36.217670]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.218662]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.219572] ==================================================================
[   36.222155] ==================================================================
[   36.223482] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   36.224206] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   36.224867] 
[   36.225143] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.226695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.227700] Hardware name: linux,dummy-virt (DT)
[   36.228450] Call trace:
[   36.228958]  show_stack+0x20/0x38 (C)
[   36.229719]  dump_stack_lvl+0x8c/0xd0
[   36.230441]  print_report+0x118/0x5e0
[   36.231050]  kasan_report+0xc8/0x118
[   36.231585]  __asan_report_load8_noabort+0x20/0x30
[   36.232234]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   36.233342]  kasan_bitops_generic+0x11c/0x1c8
[   36.234128]  kunit_try_run_case+0x14c/0x3d0
[   36.234819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.235585]  kthread+0x24c/0x2d0
[   36.236442]  ret_from_fork+0x10/0x20
[   36.237120] 
[   36.237333] Allocated by task 249:
[   36.237597]  kasan_save_stack+0x3c/0x68
[   36.238197]  kasan_save_track+0x20/0x40
[   36.238931]  kasan_save_alloc_info+0x40/0x58
[   36.239831]  __kasan_kmalloc+0xd4/0xd8
[   36.240447]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.241240]  kasan_bitops_generic+0xa0/0x1c8
[   36.241929]  kunit_try_run_case+0x14c/0x3d0
[   36.242642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.243436]  kthread+0x24c/0x2d0
[   36.244016]  ret_from_fork+0x10/0x20
[   36.244659] 
[   36.245015] The buggy address belongs to the object at fff00000c6153d80
[   36.245015]  which belongs to the cache kmalloc-16 of size 16
[   36.246650] The buggy address is located 8 bytes inside of
[   36.246650]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.248221] 
[   36.248713] The buggy address belongs to the physical page:
[   36.249405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.250561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.251467] page_type: f5(slab)
[   36.251984] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.253053] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.254115] page dumped because: kasan: bad access detected
[   36.255004] 
[   36.255520] Memory state around the buggy address:
[   36.256121]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.257094]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.257865] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.258922]                       ^
[   36.259417]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.260249]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.261219] ==================================================================
[   35.888022] ==================================================================
[   35.889188] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   35.891645] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.893231] 
[   35.893552] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.895823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.897361] Hardware name: linux,dummy-virt (DT)
[   35.898285] Call trace:
[   35.898870]  show_stack+0x20/0x38 (C)
[   35.899496]  dump_stack_lvl+0x8c/0xd0
[   35.900091]  print_report+0x118/0x5e0
[   35.900675]  kasan_report+0xc8/0x118
[   35.901367]  kasan_check_range+0x100/0x1a8
[   35.902082]  __kasan_check_write+0x20/0x30
[   35.902415]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   35.903135]  kasan_bitops_generic+0x11c/0x1c8
[   35.904185]  kunit_try_run_case+0x14c/0x3d0
[   35.905062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.906027]  kthread+0x24c/0x2d0
[   35.906718]  ret_from_fork+0x10/0x20
[   35.907347] 
[   35.907731] Allocated by task 249:
[   35.908323]  kasan_save_stack+0x3c/0x68
[   35.909018]  kasan_save_track+0x20/0x40
[   35.909728]  kasan_save_alloc_info+0x40/0x58
[   35.910409]  __kasan_kmalloc+0xd4/0xd8
[   35.911060]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.911789]  kasan_bitops_generic+0xa0/0x1c8
[   35.912454]  kunit_try_run_case+0x14c/0x3d0
[   35.913094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.913965]  kthread+0x24c/0x2d0
[   35.914545]  ret_from_fork+0x10/0x20
[   35.915173] 
[   35.915658] The buggy address belongs to the object at fff00000c6153d80
[   35.915658]  which belongs to the cache kmalloc-16 of size 16
[   35.917200] The buggy address is located 8 bytes inside of
[   35.917200]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.918672] 
[   35.919067] The buggy address belongs to the physical page:
[   35.919824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.920907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.921919] page_type: f5(slab)
[   35.922519] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.923508] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.924473] page dumped because: kasan: bad access detected
[   35.924985] 
[   35.925242] Memory state around the buggy address:
[   35.925922]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.926890]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.928018] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.929105]                       ^
[   35.929743]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.930740]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.931793] ==================================================================
[   36.021213] ==================================================================
[   36.022175] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   36.023360] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   36.024218] 
[   36.024791] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.026147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.026929] Hardware name: linux,dummy-virt (DT)
[   36.027655] Call trace:
[   36.028118]  show_stack+0x20/0x38 (C)
[   36.028824]  dump_stack_lvl+0x8c/0xd0
[   36.029537]  print_report+0x118/0x5e0
[   36.030207]  kasan_report+0xc8/0x118
[   36.030858]  __asan_report_load8_noabort+0x20/0x30
[   36.031605]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   36.032461]  kasan_bitops_generic+0x11c/0x1c8
[   36.033155]  kunit_try_run_case+0x14c/0x3d0
[   36.033858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.034698]  kthread+0x24c/0x2d0
[   36.035327]  ret_from_fork+0x10/0x20
[   36.035980] 
[   36.036364] Allocated by task 249:
[   36.037022]  kasan_save_stack+0x3c/0x68
[   36.037679]  kasan_save_track+0x20/0x40
[   36.038441]  kasan_save_alloc_info+0x40/0x58
[   36.039355]  __kasan_kmalloc+0xd4/0xd8
[   36.040041]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.040722]  kasan_bitops_generic+0xa0/0x1c8
[   36.041456]  kunit_try_run_case+0x14c/0x3d0
[   36.042230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.043162]  kthread+0x24c/0x2d0
[   36.043830]  ret_from_fork+0x10/0x20
[   36.044413] 
[   36.044823] The buggy address belongs to the object at fff00000c6153d80
[   36.044823]  which belongs to the cache kmalloc-16 of size 16
[   36.046401] The buggy address is located 8 bytes inside of
[   36.046401]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.047991] 
[   36.048458] The buggy address belongs to the physical page:
[   36.049324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.050387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.051211] page_type: f5(slab)
[   36.051692] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.052872] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.053829] page dumped because: kasan: bad access detected
[   36.054589] 
[   36.055023] Memory state around the buggy address:
[   36.055704]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.056794]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.057762] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.058693]                       ^
[   36.059387]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.060342]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.061261] ==================================================================
[   36.063457] ==================================================================
[   36.064359] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   36.065380] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   36.066382] 
[   36.066958] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.068363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.068999] Hardware name: linux,dummy-virt (DT)
[   36.069767] Call trace:
[   36.070317]  show_stack+0x20/0x38 (C)
[   36.070952]  dump_stack_lvl+0x8c/0xd0
[   36.071706]  print_report+0x118/0x5e0
[   36.072299]  kasan_report+0xc8/0x118
[   36.072882]  kasan_check_range+0x100/0x1a8
[   36.073476]  __kasan_check_write+0x20/0x30
[   36.074131]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   36.075226]  kasan_bitops_generic+0x11c/0x1c8
[   36.075589]  kunit_try_run_case+0x14c/0x3d0
[   36.076060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.076951]  kthread+0x24c/0x2d0
[   36.077560]  ret_from_fork+0x10/0x20
[   36.078346] 
[   36.078718] Allocated by task 249:
[   36.079563]  kasan_save_stack+0x3c/0x68
[   36.080235]  kasan_save_track+0x20/0x40
[   36.080763]  kasan_save_alloc_info+0x40/0x58
[   36.081383]  __kasan_kmalloc+0xd4/0xd8
[   36.081887]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.082750]  kasan_bitops_generic+0xa0/0x1c8
[   36.083344]  kunit_try_run_case+0x14c/0x3d0
[   36.084031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.084744]  kthread+0x24c/0x2d0
[   36.085314]  ret_from_fork+0x10/0x20
[   36.085878] 
[   36.086295] The buggy address belongs to the object at fff00000c6153d80
[   36.086295]  which belongs to the cache kmalloc-16 of size 16
[   36.087708] The buggy address is located 8 bytes inside of
[   36.087708]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.089130] 
[   36.089495] The buggy address belongs to the physical page:
[   36.090375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.091274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.092260] page_type: f5(slab)
[   36.092759] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.093780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.094720] page dumped because: kasan: bad access detected
[   36.095357] 
[   36.095751] Memory state around the buggy address:
[   36.096269]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.097256]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.098045] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.099002]                       ^
[   36.099520]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.100377]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.101227] ==================================================================
[   35.934036] ==================================================================
[   35.934947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   35.936527] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.937483] 
[   35.938008] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.939279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.940038] Hardware name: linux,dummy-virt (DT)
[   35.940742] Call trace:
[   35.941193]  show_stack+0x20/0x38 (C)
[   35.941923]  dump_stack_lvl+0x8c/0xd0
[   35.942564]  print_report+0x118/0x5e0
[   35.943258]  kasan_report+0xc8/0x118
[   35.943977]  __asan_report_load8_noabort+0x20/0x30
[   35.944731]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   35.945655]  kasan_bitops_generic+0x11c/0x1c8
[   35.946350]  kunit_try_run_case+0x14c/0x3d0
[   35.947211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.948025]  kthread+0x24c/0x2d0
[   35.948655]  ret_from_fork+0x10/0x20
[   35.949306] 
[   35.949678] Allocated by task 249:
[   35.950409]  kasan_save_stack+0x3c/0x68
[   35.951102]  kasan_save_track+0x20/0x40
[   35.951837]  kasan_save_alloc_info+0x40/0x58
[   35.952646]  __kasan_kmalloc+0xd4/0xd8
[   35.953290]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.954131]  kasan_bitops_generic+0xa0/0x1c8
[   35.954895]  kunit_try_run_case+0x14c/0x3d0
[   35.955568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.956378]  kthread+0x24c/0x2d0
[   35.956981]  ret_from_fork+0x10/0x20
[   35.957616] 
[   35.958052] The buggy address belongs to the object at fff00000c6153d80
[   35.958052]  which belongs to the cache kmalloc-16 of size 16
[   35.959619] The buggy address is located 8 bytes inside of
[   35.959619]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.961116] 
[   35.961555] The buggy address belongs to the physical page:
[   35.962356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.963474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.964430] page_type: f5(slab)
[   35.965011] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.966101] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.967136] page dumped because: kasan: bad access detected
[   35.967923] 
[   35.968388] Memory state around the buggy address:
[   35.969125]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.970186]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.971313] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.972253]                       ^
[   35.972867]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.973819]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.974821] ==================================================================
[   36.143036] ==================================================================
[   36.143787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   36.145386] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   36.146426] 
[   36.146885] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.148220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.148825] Hardware name: linux,dummy-virt (DT)
[   36.149579] Call trace:
[   36.149958]  show_stack+0x20/0x38 (C)
[   36.150694]  dump_stack_lvl+0x8c/0xd0
[   36.151387]  print_report+0x118/0x5e0
[   36.152012]  kasan_report+0xc8/0x118
[   36.152613]  kasan_check_range+0x100/0x1a8
[   36.153189]  __kasan_check_write+0x20/0x30
[   36.153929]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   36.154790]  kasan_bitops_generic+0x11c/0x1c8
[   36.155446]  kunit_try_run_case+0x14c/0x3d0
[   36.156141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.156941]  kthread+0x24c/0x2d0
[   36.157590]  ret_from_fork+0x10/0x20
[   36.158194] 
[   36.158524] Allocated by task 249:
[   36.159021]  kasan_save_stack+0x3c/0x68
[   36.159737]  kasan_save_track+0x20/0x40
[   36.160233]  kasan_save_alloc_info+0x40/0x58
[   36.160951]  __kasan_kmalloc+0xd4/0xd8
[   36.161459]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.162215]  kasan_bitops_generic+0xa0/0x1c8
[   36.162829]  kunit_try_run_case+0x14c/0x3d0
[   36.163436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.164329]  kthread+0x24c/0x2d0
[   36.164914]  ret_from_fork+0x10/0x20
[   36.165466] 
[   36.165843] The buggy address belongs to the object at fff00000c6153d80
[   36.165843]  which belongs to the cache kmalloc-16 of size 16
[   36.167184] The buggy address is located 8 bytes inside of
[   36.167184]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.168733] 
[   36.169047] The buggy address belongs to the physical page:
[   36.170007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.170973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.171867] page_type: f5(slab)
[   36.172338] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.173401] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.174329] page dumped because: kasan: bad access detected
[   36.175025] 
[   36.175424] Memory state around the buggy address:
[   36.176097]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.176999]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.177865] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.178681]                       ^
[   36.179264]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.180200]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.181189] ==================================================================
[   36.103274] ==================================================================
[   36.104008] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   36.105602] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   36.106587] 
[   36.106936] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.108686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.109202] Hardware name: linux,dummy-virt (DT)
[   36.110468] Call trace:
[   36.111084]  show_stack+0x20/0x38 (C)
[   36.111729]  dump_stack_lvl+0x8c/0xd0
[   36.112277]  print_report+0x118/0x5e0
[   36.112921]  kasan_report+0xc8/0x118
[   36.113405]  __asan_report_load8_noabort+0x20/0x30
[   36.114219]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   36.115111]  kasan_bitops_generic+0x11c/0x1c8
[   36.115867]  kunit_try_run_case+0x14c/0x3d0
[   36.116414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.117200]  kthread+0x24c/0x2d0
[   36.117853]  ret_from_fork+0x10/0x20
[   36.118528] 
[   36.118849] Allocated by task 249:
[   36.119455]  kasan_save_stack+0x3c/0x68
[   36.119966]  kasan_save_track+0x20/0x40
[   36.120659]  kasan_save_alloc_info+0x40/0x58
[   36.121295]  __kasan_kmalloc+0xd4/0xd8
[   36.121938]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.122712]  kasan_bitops_generic+0xa0/0x1c8
[   36.123359]  kunit_try_run_case+0x14c/0x3d0
[   36.123933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.124744]  kthread+0x24c/0x2d0
[   36.125240]  ret_from_fork+0x10/0x20
[   36.125814] 
[   36.126222] The buggy address belongs to the object at fff00000c6153d80
[   36.126222]  which belongs to the cache kmalloc-16 of size 16
[   36.127683] The buggy address is located 8 bytes inside of
[   36.127683]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.129130] 
[   36.129461] The buggy address belongs to the physical page:
[   36.130127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.131130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.132076] page_type: f5(slab)
[   36.132557] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.133521] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.134655] page dumped because: kasan: bad access detected
[   36.135390] 
[   36.135747] Memory state around the buggy address:
[   36.136429]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.137315]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.138134] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.139148]                       ^
[   36.139683]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.140593]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.141607] ==================================================================

[   26.943249] ==================================================================
[   26.944093] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   26.944848] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.946203] 
[   26.947542] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.948720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.949302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.950099] Call Trace:
[   26.950391]  <TASK>
[   26.950708]  dump_stack_lvl+0x73/0xb0
[   26.951134]  print_report+0xd1/0x640
[   26.951437]  ? __virt_addr_valid+0x1db/0x2d0
[   26.952115]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.953159]  kasan_report+0x102/0x140
[   26.954443]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   26.955177]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   26.956537]  kasan_check_range+0x10c/0x1c0
[   26.957426]  __kasan_check_write+0x18/0x20
[   26.957723]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   26.958254]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.958936]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.959526]  ? kasan_bitops_generic+0x93/0x1c0
[   26.960020]  kasan_bitops_generic+0x122/0x1c0
[   26.960685]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.961215]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.961943]  kunit_try_run_case+0x1b3/0x490
[   26.962530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.963051]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.963700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.964231]  ? __kthread_parkme+0x82/0x160
[   26.964718]  ? preempt_count_sub+0x50/0x80
[   26.965153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.965708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.966301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.966996]  kthread+0x257/0x310
[   26.967418]  ? __pfx_kthread+0x10/0x10
[   26.967693]  ret_from_fork+0x41/0x80
[   26.968283]  ? __pfx_kthread+0x10/0x10
[   26.968849]  ret_from_fork_asm+0x1a/0x30
[   26.969201]  </TASK>
[   26.969625] 
[   26.969895] Allocated by task 269:
[   26.970327]  kasan_save_stack+0x3d/0x60
[   26.970617]  kasan_save_track+0x18/0x40
[   26.971207]  kasan_save_alloc_info+0x3b/0x50
[   26.971730]  __kasan_kmalloc+0xb7/0xc0
[   26.972258]  __kmalloc_cache_noprof+0x184/0x410
[   26.972907]  kasan_bitops_generic+0x93/0x1c0
[   26.973493]  kunit_try_run_case+0x1b3/0x490
[   26.974115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.974484]  kthread+0x257/0x310
[   26.974918]  ret_from_fork+0x41/0x80
[   26.975366]  ret_from_fork_asm+0x1a/0x30
[   26.975699] 
[   26.975984] The buggy address belongs to the object at ffff888102795340
[   26.975984]  which belongs to the cache kmalloc-16 of size 16
[   26.977098] The buggy address is located 8 bytes inside of
[   26.977098]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.978183] 
[   26.978400] The buggy address belongs to the physical page:
[   26.979218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.979861] flags: 0x200000000000000(node=0|zone=2)
[   26.980462] page_type: f5(slab)
[   26.980716] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.981754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.982591] page dumped because: kasan: bad access detected
[   26.983165] 
[   26.983346] Memory state around the buggy address:
[   26.983656]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.984756]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.985586] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.986403]                                               ^
[   26.987066]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.987677]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.988370] ==================================================================
[   26.752963] ==================================================================
[   26.753530] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   26.754879] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.756369] 
[   26.756586] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.757631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.758195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.759173] Call Trace:
[   26.759418]  <TASK>
[   26.759760]  dump_stack_lvl+0x73/0xb0
[   26.760090]  print_report+0xd1/0x640
[   26.760392]  ? __virt_addr_valid+0x1db/0x2d0
[   26.760972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.761579]  kasan_report+0x102/0x140
[   26.762016]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   26.762590]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   26.763191]  kasan_check_range+0x10c/0x1c0
[   26.763614]  __kasan_check_write+0x18/0x20
[   26.764135]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   26.764590]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.765341]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.765823]  ? kasan_bitops_generic+0x93/0x1c0
[   26.766287]  kasan_bitops_generic+0x122/0x1c0
[   26.766611]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.767208]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.767866]  kunit_try_run_case+0x1b3/0x490
[   26.768409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.768817]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.769381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.769804]  ? __kthread_parkme+0x82/0x160
[   26.770138]  ? preempt_count_sub+0x50/0x80
[   26.770732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.771238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.771835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.772336]  kthread+0x257/0x310
[   26.772598]  ? __pfx_kthread+0x10/0x10
[   26.773107]  ret_from_fork+0x41/0x80
[   26.773617]  ? __pfx_kthread+0x10/0x10
[   26.774132]  ret_from_fork_asm+0x1a/0x30
[   26.774586]  </TASK>
[   26.774901] 
[   26.775070] Allocated by task 269:
[   26.775345]  kasan_save_stack+0x3d/0x60
[   26.775746]  kasan_save_track+0x18/0x40
[   26.776193]  kasan_save_alloc_info+0x3b/0x50
[   26.776766]  __kasan_kmalloc+0xb7/0xc0
[   26.777178]  __kmalloc_cache_noprof+0x184/0x410
[   26.777525]  kasan_bitops_generic+0x93/0x1c0
[   26.777914]  kunit_try_run_case+0x1b3/0x490
[   26.778416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.779079]  kthread+0x257/0x310
[   26.779511]  ret_from_fork+0x41/0x80
[   26.779841]  ret_from_fork_asm+0x1a/0x30
[   26.780355] 
[   26.780617] The buggy address belongs to the object at ffff888102795340
[   26.780617]  which belongs to the cache kmalloc-16 of size 16
[   26.781530] The buggy address is located 8 bytes inside of
[   26.781530]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.782553] 
[   26.782779] The buggy address belongs to the physical page:
[   26.783410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.783969] flags: 0x200000000000000(node=0|zone=2)
[   26.784550] page_type: f5(slab)
[   26.785002] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.785726] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.786160] page dumped because: kasan: bad access detected
[   26.787717] 
[   26.788103] Memory state around the buggy address:
[   26.788519]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.789583]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.790518] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.790976]                                               ^
[   26.791889]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.792775]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.793468] ==================================================================
[   26.842051] ==================================================================
[   26.842752] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   26.843296] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.844293] 
[   26.844517] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.845207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.845914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.846572] Call Trace:
[   26.846789]  <TASK>
[   26.846986]  dump_stack_lvl+0x73/0xb0
[   26.847302]  print_report+0xd1/0x640
[   26.847788]  ? __virt_addr_valid+0x1db/0x2d0
[   26.848393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.850098]  kasan_report+0x102/0x140
[   26.851915]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   26.852621]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   26.853407]  kasan_check_range+0x10c/0x1c0
[   26.854102]  __kasan_check_write+0x18/0x20
[   26.854598]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   26.855317]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.856071]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.856355]  ? kasan_bitops_generic+0x93/0x1c0
[   26.857038]  kasan_bitops_generic+0x122/0x1c0
[   26.857738]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.858308]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.858954]  kunit_try_run_case+0x1b3/0x490
[   26.859614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.860360]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.861288]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.861729]  ? __kthread_parkme+0x82/0x160
[   26.862108]  ? preempt_count_sub+0x50/0x80
[   26.862543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.863192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.864593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.865099]  kthread+0x257/0x310
[   26.865363]  ? __pfx_kthread+0x10/0x10
[   26.865608]  ret_from_fork+0x41/0x80
[   26.866271]  ? __pfx_kthread+0x10/0x10
[   26.866801]  ret_from_fork_asm+0x1a/0x30
[   26.867784]  </TASK>
[   26.868121] 
[   26.868817] Allocated by task 269:
[   26.869165]  kasan_save_stack+0x3d/0x60
[   26.869675]  kasan_save_track+0x18/0x40
[   26.870284]  kasan_save_alloc_info+0x3b/0x50
[   26.870962]  __kasan_kmalloc+0xb7/0xc0
[   26.871637]  __kmalloc_cache_noprof+0x184/0x410
[   26.872332]  kasan_bitops_generic+0x93/0x1c0
[   26.872662]  kunit_try_run_case+0x1b3/0x490
[   26.873279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.874207]  kthread+0x257/0x310
[   26.874604]  ret_from_fork+0x41/0x80
[   26.875065]  ret_from_fork_asm+0x1a/0x30
[   26.875806] 
[   26.876022] The buggy address belongs to the object at ffff888102795340
[   26.876022]  which belongs to the cache kmalloc-16 of size 16
[   26.877206] The buggy address is located 8 bytes inside of
[   26.877206]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.878606] 
[   26.878999] The buggy address belongs to the physical page:
[   26.879745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.880853] flags: 0x200000000000000(node=0|zone=2)
[   26.881293] page_type: f5(slab)
[   26.881746] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.882599] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.883198] page dumped because: kasan: bad access detected
[   26.884079] 
[   26.884293] Memory state around the buggy address:
[   26.884676]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.885523]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.886573] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.887432]                                               ^
[   26.888030]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.888943]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.889775] ==================================================================
[   26.707102] ==================================================================
[   26.708605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   26.709539] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.710162] 
[   26.710463] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.711583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.712001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.712966] Call Trace:
[   26.713207]  <TASK>
[   26.713627]  dump_stack_lvl+0x73/0xb0
[   26.714021]  print_report+0xd1/0x640
[   26.714538]  ? __virt_addr_valid+0x1db/0x2d0
[   26.715091]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.715877]  kasan_report+0x102/0x140
[   26.716180]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   26.716866]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   26.717685]  kasan_check_range+0x10c/0x1c0
[   26.718142]  __kasan_check_write+0x18/0x20
[   26.718615]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   26.719082]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.719975]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.720411]  ? kasan_bitops_generic+0x93/0x1c0
[   26.720975]  kasan_bitops_generic+0x122/0x1c0
[   26.721430]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.721913]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.722566]  kunit_try_run_case+0x1b3/0x490
[   26.722911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.723543]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.724025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.724649]  ? __kthread_parkme+0x82/0x160
[   26.725334]  ? preempt_count_sub+0x50/0x80
[   26.725888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.726379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.726925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.727852]  kthread+0x257/0x310
[   26.728156]  ? __pfx_kthread+0x10/0x10
[   26.728784]  ret_from_fork+0x41/0x80
[   26.729148]  ? __pfx_kthread+0x10/0x10
[   26.730037]  ret_from_fork_asm+0x1a/0x30
[   26.730551]  </TASK>
[   26.730843] 
[   26.731278] Allocated by task 269:
[   26.731883]  kasan_save_stack+0x3d/0x60
[   26.732439]  kasan_save_track+0x18/0x40
[   26.732897]  kasan_save_alloc_info+0x3b/0x50
[   26.733581]  __kasan_kmalloc+0xb7/0xc0
[   26.734111]  __kmalloc_cache_noprof+0x184/0x410
[   26.734750]  kasan_bitops_generic+0x93/0x1c0
[   26.735301]  kunit_try_run_case+0x1b3/0x490
[   26.735906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.736483]  kthread+0x257/0x310
[   26.737025]  ret_from_fork+0x41/0x80
[   26.737530]  ret_from_fork_asm+0x1a/0x30
[   26.738033] 
[   26.738367] The buggy address belongs to the object at ffff888102795340
[   26.738367]  which belongs to the cache kmalloc-16 of size 16
[   26.739641] The buggy address is located 8 bytes inside of
[   26.739641]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.740943] 
[   26.741122] The buggy address belongs to the physical page:
[   26.741863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.742575] flags: 0x200000000000000(node=0|zone=2)
[   26.743102] page_type: f5(slab)
[   26.743638] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.744435] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.745279] page dumped because: kasan: bad access detected
[   26.745920] 
[   26.746123] Memory state around the buggy address:
[   26.746915]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.747732]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.748432] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.749466]                                               ^
[   26.749915]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.750805]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.751649] ==================================================================
[   26.661448] ==================================================================
[   26.663122] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   26.664025] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.664907] 
[   26.665144] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.666407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.667110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.668430] Call Trace:
[   26.668969]  <TASK>
[   26.669197]  dump_stack_lvl+0x73/0xb0
[   26.669785]  print_report+0xd1/0x640
[   26.670184]  ? __virt_addr_valid+0x1db/0x2d0
[   26.670740]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.671277]  kasan_report+0x102/0x140
[   26.671842]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   26.672497]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   26.673061]  kasan_check_range+0x10c/0x1c0
[   26.673489]  __kasan_check_write+0x18/0x20
[   26.673941]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   26.674602]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.675351]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.675765]  ? kasan_bitops_generic+0x93/0x1c0
[   26.676401]  kasan_bitops_generic+0x122/0x1c0
[   26.676762]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.677598]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.678063]  kunit_try_run_case+0x1b3/0x490
[   26.678785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.679303]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.679759]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.680254]  ? __kthread_parkme+0x82/0x160
[   26.680999]  ? preempt_count_sub+0x50/0x80
[   26.681420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.682115]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.682783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.683205]  kthread+0x257/0x310
[   26.683610]  ? __pfx_kthread+0x10/0x10
[   26.684198]  ret_from_fork+0x41/0x80
[   26.684752]  ? __pfx_kthread+0x10/0x10
[   26.685160]  ret_from_fork_asm+0x1a/0x30
[   26.685695]  </TASK>
[   26.686127] 
[   26.686440] Allocated by task 269:
[   26.686685]  kasan_save_stack+0x3d/0x60
[   26.687206]  kasan_save_track+0x18/0x40
[   26.687855]  kasan_save_alloc_info+0x3b/0x50
[   26.688356]  __kasan_kmalloc+0xb7/0xc0
[   26.688960]  __kmalloc_cache_noprof+0x184/0x410
[   26.689811]  kasan_bitops_generic+0x93/0x1c0
[   26.690210]  kunit_try_run_case+0x1b3/0x490
[   26.690868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.691304]  kthread+0x257/0x310
[   26.691767]  ret_from_fork+0x41/0x80
[   26.692180]  ret_from_fork_asm+0x1a/0x30
[   26.692736] 
[   26.692985] The buggy address belongs to the object at ffff888102795340
[   26.692985]  which belongs to the cache kmalloc-16 of size 16
[   26.695295] The buggy address is located 8 bytes inside of
[   26.695295]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.696355] 
[   26.696667] The buggy address belongs to the physical page:
[   26.697190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.697905] flags: 0x200000000000000(node=0|zone=2)
[   26.698376] page_type: f5(slab)
[   26.698896] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.699559] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.700338] page dumped because: kasan: bad access detected
[   26.700894] 
[   26.701140] Memory state around the buggy address:
[   26.701606]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.702236]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.703055] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.703612]                                               ^
[   26.704124]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.705067]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.705619] ==================================================================
[   26.795564] ==================================================================
[   26.797004] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   26.798276] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.799176] 
[   26.799354] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.801103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.801535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.802802] Call Trace:
[   26.803427]  <TASK>
[   26.803951]  dump_stack_lvl+0x73/0xb0
[   26.804597]  print_report+0xd1/0x640
[   26.805441]  ? __virt_addr_valid+0x1db/0x2d0
[   26.805847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.806414]  kasan_report+0x102/0x140
[   26.807225]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   26.807817]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   26.808670]  kasan_check_range+0x10c/0x1c0
[   26.809148]  __kasan_check_write+0x18/0x20
[   26.809898]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   26.810695]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.811375]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.812123]  ? kasan_bitops_generic+0x93/0x1c0
[   26.812775]  kasan_bitops_generic+0x122/0x1c0
[   26.813485]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.814423]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.814862]  kunit_try_run_case+0x1b3/0x490
[   26.815336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.816188]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.816643]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.817400]  ? __kthread_parkme+0x82/0x160
[   26.818034]  ? preempt_count_sub+0x50/0x80
[   26.818435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.818950]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.819613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.820190]  kthread+0x257/0x310
[   26.820568]  ? __pfx_kthread+0x10/0x10
[   26.820994]  ret_from_fork+0x41/0x80
[   26.821547]  ? __pfx_kthread+0x10/0x10
[   26.822237]  ret_from_fork_asm+0x1a/0x30
[   26.822699]  </TASK>
[   26.823088] 
[   26.823321] Allocated by task 269:
[   26.823786]  kasan_save_stack+0x3d/0x60
[   26.824224]  kasan_save_track+0x18/0x40
[   26.824555]  kasan_save_alloc_info+0x3b/0x50
[   26.825391]  __kasan_kmalloc+0xb7/0xc0
[   26.825735]  __kmalloc_cache_noprof+0x184/0x410
[   26.826824]  kasan_bitops_generic+0x93/0x1c0
[   26.827352]  kunit_try_run_case+0x1b3/0x490
[   26.827658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.828392]  kthread+0x257/0x310
[   26.829025]  ret_from_fork+0x41/0x80
[   26.829870]  ret_from_fork_asm+0x1a/0x30
[   26.830172] 
[   26.830443] The buggy address belongs to the object at ffff888102795340
[   26.830443]  which belongs to the cache kmalloc-16 of size 16
[   26.831386] The buggy address is located 8 bytes inside of
[   26.831386]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.832409] 
[   26.832686] The buggy address belongs to the physical page:
[   26.833335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.834016] flags: 0x200000000000000(node=0|zone=2)
[   26.834418] page_type: f5(slab)
[   26.834826] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.835384] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.836161] page dumped because: kasan: bad access detected
[   26.836613] 
[   26.836839] Memory state around the buggy address:
[   26.837147]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.837789]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.838422] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.839087]                                               ^
[   26.839553]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.839972]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.840735] ==================================================================
[   26.989548] ==================================================================
[   26.990629] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   26.991171] Read of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.992054] 
[   26.992372] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.992973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.993262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.994349] Call Trace:
[   26.994714]  <TASK>
[   26.994997]  dump_stack_lvl+0x73/0xb0
[   26.995561]  print_report+0xd1/0x640
[   26.996168]  ? __virt_addr_valid+0x1db/0x2d0
[   26.996659]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.997199]  kasan_report+0x102/0x140
[   26.997642]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   26.998335]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   26.999093]  kasan_check_range+0x10c/0x1c0
[   26.999587]  __kasan_check_read+0x15/0x20
[   27.000014]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   27.000658]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.001417]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.001861]  ? kasan_bitops_generic+0x93/0x1c0
[   27.002488]  kasan_bitops_generic+0x122/0x1c0
[   27.003047]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.003570]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.004378]  kunit_try_run_case+0x1b3/0x490
[   27.004739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.005164]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.005916]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.006303]  ? __kthread_parkme+0x82/0x160
[   27.006791]  ? preempt_count_sub+0x50/0x80
[   27.007201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.007713]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.008492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.009288]  kthread+0x257/0x310
[   27.009652]  ? __pfx_kthread+0x10/0x10
[   27.010149]  ret_from_fork+0x41/0x80
[   27.010579]  ? __pfx_kthread+0x10/0x10
[   27.010942]  ret_from_fork_asm+0x1a/0x30
[   27.011477]  </TASK>
[   27.011836] 
[   27.012183] Allocated by task 269:
[   27.012528]  kasan_save_stack+0x3d/0x60
[   27.012967]  kasan_save_track+0x18/0x40
[   27.013457]  kasan_save_alloc_info+0x3b/0x50
[   27.013757]  __kasan_kmalloc+0xb7/0xc0
[   27.014340]  __kmalloc_cache_noprof+0x184/0x410
[   27.015079]  kasan_bitops_generic+0x93/0x1c0
[   27.015544]  kunit_try_run_case+0x1b3/0x490
[   27.015968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.016497]  kthread+0x257/0x310
[   27.016748]  ret_from_fork+0x41/0x80
[   27.017228]  ret_from_fork_asm+0x1a/0x30
[   27.017562] 
[   27.017717] The buggy address belongs to the object at ffff888102795340
[   27.017717]  which belongs to the cache kmalloc-16 of size 16
[   27.019174] The buggy address is located 8 bytes inside of
[   27.019174]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   27.020379] 
[   27.020610] The buggy address belongs to the physical page:
[   27.021497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   27.021946] flags: 0x200000000000000(node=0|zone=2)
[   27.022287] page_type: f5(slab)
[   27.022715] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.023576] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.024632] page dumped because: kasan: bad access detected
[   27.025349] 
[   27.025525] Memory state around the buggy address:
[   27.026025]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   27.026598]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.027395] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   27.028096]                                               ^
[   27.028454]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.028855]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.029801] ==================================================================
[   27.031495] ==================================================================
[   27.032066] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   27.033385] Read of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   27.034303] 
[   27.034498] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.035389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.035906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.036576] Call Trace:
[   27.036777]  <TASK>
[   27.037115]  dump_stack_lvl+0x73/0xb0
[   27.037862]  print_report+0xd1/0x640
[   27.038343]  ? __virt_addr_valid+0x1db/0x2d0
[   27.038662]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.039029]  kasan_report+0x102/0x140
[   27.039585]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   27.040406]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   27.041305]  __asan_report_load8_noabort+0x18/0x20
[   27.041831]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   27.042392]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.043003]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.043423]  ? kasan_bitops_generic+0x93/0x1c0
[   27.043863]  kasan_bitops_generic+0x122/0x1c0
[   27.044182]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.044681]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.045552]  kunit_try_run_case+0x1b3/0x490
[   27.046322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.046666]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.047311]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.047916]  ? __kthread_parkme+0x82/0x160
[   27.048321]  ? preempt_count_sub+0x50/0x80
[   27.048895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.049220]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.050023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.050626]  kthread+0x257/0x310
[   27.050984]  ? __pfx_kthread+0x10/0x10
[   27.051466]  ret_from_fork+0x41/0x80
[   27.051832]  ? __pfx_kthread+0x10/0x10
[   27.052569]  ret_from_fork_asm+0x1a/0x30
[   27.052886]  </TASK>
[   27.053078] 
[   27.053238] Allocated by task 269:
[   27.054035]  kasan_save_stack+0x3d/0x60
[   27.054711]  kasan_save_track+0x18/0x40
[   27.055441]  kasan_save_alloc_info+0x3b/0x50
[   27.056306]  __kasan_kmalloc+0xb7/0xc0
[   27.057044]  __kmalloc_cache_noprof+0x184/0x410
[   27.057640]  kasan_bitops_generic+0x93/0x1c0
[   27.058162]  kunit_try_run_case+0x1b3/0x490
[   27.058593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.059144]  kthread+0x257/0x310
[   27.059629]  ret_from_fork+0x41/0x80
[   27.060159]  ret_from_fork_asm+0x1a/0x30
[   27.060616] 
[   27.060964] The buggy address belongs to the object at ffff888102795340
[   27.060964]  which belongs to the cache kmalloc-16 of size 16
[   27.062092] The buggy address is located 8 bytes inside of
[   27.062092]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   27.063238] 
[   27.063508] The buggy address belongs to the physical page:
[   27.063977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   27.064819] flags: 0x200000000000000(node=0|zone=2)
[   27.065428] page_type: f5(slab)
[   27.065808] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.066451] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.067342] page dumped because: kasan: bad access detected
[   27.067857] 
[   27.068015] Memory state around the buggy address:
[   27.068693]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   27.069236]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.070095] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   27.070755]                                               ^
[   27.071424]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.072167]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.072801] ==================================================================
[   26.891342] ==================================================================
[   26.892068] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   26.893087] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269
[   26.893885] 
[   26.894068] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   26.895340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.896428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.897736] Call Trace:
[   26.898040]  <TASK>
[   26.898345]  dump_stack_lvl+0x73/0xb0
[   26.898677]  print_report+0xd1/0x640
[   26.899899]  ? __virt_addr_valid+0x1db/0x2d0
[   26.900682]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.901565]  kasan_report+0x102/0x140
[   26.902858]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   26.903649]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   26.904595]  kasan_check_range+0x10c/0x1c0
[   26.904929]  __kasan_check_write+0x18/0x20
[   26.905576]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   26.906425]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.907354]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.907838]  ? kasan_bitops_generic+0x93/0x1c0
[   26.908280]  kasan_bitops_generic+0x122/0x1c0
[   26.908700]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.909660]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.910253]  kunit_try_run_case+0x1b3/0x490
[   26.910859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.911533]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.912213]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.912690]  ? __kthread_parkme+0x82/0x160
[   26.913471]  ? preempt_count_sub+0x50/0x80
[   26.913775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.914480]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.915189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.916009]  kthread+0x257/0x310
[   26.916497]  ? __pfx_kthread+0x10/0x10
[   26.917095]  ret_from_fork+0x41/0x80
[   26.917463]  ? __pfx_kthread+0x10/0x10
[   26.918195]  ret_from_fork_asm+0x1a/0x30
[   26.919187]  </TASK>
[   26.919434] 
[   26.919575] Allocated by task 269:
[   26.920413]  kasan_save_stack+0x3d/0x60
[   26.921092]  kasan_save_track+0x18/0x40
[   26.921676]  kasan_save_alloc_info+0x3b/0x50
[   26.922301]  __kasan_kmalloc+0xb7/0xc0
[   26.923080]  __kmalloc_cache_noprof+0x184/0x410
[   26.923643]  kasan_bitops_generic+0x93/0x1c0
[   26.924378]  kunit_try_run_case+0x1b3/0x490
[   26.925070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.925566]  kthread+0x257/0x310
[   26.926151]  ret_from_fork+0x41/0x80
[   26.926959]  ret_from_fork_asm+0x1a/0x30
[   26.927528] 
[   26.927724] The buggy address belongs to the object at ffff888102795340
[   26.927724]  which belongs to the cache kmalloc-16 of size 16
[   26.929179] The buggy address is located 8 bytes inside of
[   26.929179]  allocated 9-byte region [ffff888102795340, ffff888102795349)
[   26.930529] 
[   26.931048] The buggy address belongs to the physical page:
[   26.931549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795
[   26.933252] flags: 0x200000000000000(node=0|zone=2)
[   26.934120] page_type: f5(slab)
[   26.934558] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.935318] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.935615] page dumped because: kasan: bad access detected
[   26.936004] 
[   26.936170] Memory state around the buggy address:
[   26.936627]  ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   26.937379]  ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.938195] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.939758]                                               ^
[   26.940351]  ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.940936]  ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.941590] ==================================================================