Hay
Date
Dec. 6, 2024, 3:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   34.907738] ==================================================================
[   34.908986] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.909754] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.910848] 
[   34.911274] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.912658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.913231] Hardware name: linux,dummy-virt (DT)
[   34.913944] Call trace:
[   34.914454]  show_stack+0x20/0x38 (C)
[   34.915076]  dump_stack_lvl+0x8c/0xd0
[   34.915819]  print_report+0x118/0x5e0
[   34.916448]  kasan_report+0xc8/0x118
[   34.917181]  kasan_check_range+0x100/0x1a8
[   34.917833]  __kasan_check_write+0x20/0x30
[   34.918586]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.919428]  kasan_bitops_generic+0x11c/0x1c8
[   34.920146]  kunit_try_run_case+0x14c/0x3d0
[   34.920848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.921638]  kthread+0x24c/0x2d0
[   34.922233]  ret_from_fork+0x10/0x20
[   34.922913] 
[   34.923307] Allocated by task 250:
[   34.923925]  kasan_save_stack+0x3c/0x68
[   34.924499]  kasan_save_track+0x20/0x40
[   34.925184]  kasan_save_alloc_info+0x40/0x58
[   34.925830]  __kasan_kmalloc+0xd4/0xd8
[   34.926487]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.927138]  kasan_bitops_generic+0xa0/0x1c8
[   34.927864]  kunit_try_run_case+0x14c/0x3d0
[   34.928660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.929287]  kthread+0x24c/0x2d0
[   34.929919]  ret_from_fork+0x10/0x20
[   34.930652] 
[   34.930985] The buggy address belongs to the object at fff00000c5b518c0
[   34.930985]  which belongs to the cache kmalloc-16 of size 16
[   34.932157] The buggy address is located 8 bytes inside of
[   34.932157]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.933006] 
[   34.933317] The buggy address belongs to the physical page:
[   34.933874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.934856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.935600] page_type: f5(slab)
[   34.936215] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.937039] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.938012] page dumped because: kasan: bad access detected
[   34.938711] 
[   34.939051] Memory state around the buggy address:
[   34.939709]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.940433]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.941302] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.942140]                                               ^
[   34.942847]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.943633]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.944431] ==================================================================
[   34.946112] ==================================================================
[   34.947051] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.948145] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.948929] 
[   34.949338] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.950474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.951060] Hardware name: linux,dummy-virt (DT)
[   34.951636] Call trace:
[   34.952099]  show_stack+0x20/0x38 (C)
[   34.952703]  dump_stack_lvl+0x8c/0xd0
[   34.953331]  print_report+0x118/0x5e0
[   34.953956]  kasan_report+0xc8/0x118
[   34.954609]  __asan_report_load8_noabort+0x20/0x30
[   34.955224]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.956139]  kasan_bitops_generic+0x11c/0x1c8
[   34.956766]  kunit_try_run_case+0x14c/0x3d0
[   34.957481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.958307]  kthread+0x24c/0x2d0
[   34.958942]  ret_from_fork+0x10/0x20
[   34.959561] 
[   34.959873] Allocated by task 250:
[   34.960440]  kasan_save_stack+0x3c/0x68
[   34.961102]  kasan_save_track+0x20/0x40
[   34.961662]  kasan_save_alloc_info+0x40/0x58
[   34.962350]  __kasan_kmalloc+0xd4/0xd8
[   34.963004]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.963566]  kasan_bitops_generic+0xa0/0x1c8
[   34.964233]  kunit_try_run_case+0x14c/0x3d0
[   34.964894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.965593]  kthread+0x24c/0x2d0
[   34.966219]  ret_from_fork+0x10/0x20
[   34.966851] 
[   34.967223] The buggy address belongs to the object at fff00000c5b518c0
[   34.967223]  which belongs to the cache kmalloc-16 of size 16
[   34.968488] The buggy address is located 8 bytes inside of
[   34.968488]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.969609] 
[   34.969980] The buggy address belongs to the physical page:
[   34.970755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.971554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.972427] page_type: f5(slab)
[   34.973011] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.973875] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.974769] page dumped because: kasan: bad access detected
[   34.975553] 
[   34.975967] Memory state around the buggy address:
[   34.976528]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.977450]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.978181] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.979117]                                               ^
[   34.979768]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.980671]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.981531] ==================================================================
[   35.063205] ==================================================================
[   35.063959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   35.064952] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   35.065674] 
[   35.066081] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.067790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.068343] Hardware name: linux,dummy-virt (DT)
[   35.069077] Call trace:
[   35.069573]  show_stack+0x20/0x38 (C)
[   35.070228]  dump_stack_lvl+0x8c/0xd0
[   35.070748]  print_report+0x118/0x5e0
[   35.071340]  kasan_report+0xc8/0x118
[   35.071897]  __asan_report_load8_noabort+0x20/0x30
[   35.072696]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   35.073618]  kasan_bitops_generic+0x11c/0x1c8
[   35.074332]  kunit_try_run_case+0x14c/0x3d0
[   35.075097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.075736]  kthread+0x24c/0x2d0
[   35.076347]  ret_from_fork+0x10/0x20
[   35.077022] 
[   35.077426] Allocated by task 250:
[   35.077893]  kasan_save_stack+0x3c/0x68
[   35.078469]  kasan_save_track+0x20/0x40
[   35.079072]  kasan_save_alloc_info+0x40/0x58
[   35.079653]  __kasan_kmalloc+0xd4/0xd8
[   35.080267]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.080871]  kasan_bitops_generic+0xa0/0x1c8
[   35.081442]  kunit_try_run_case+0x14c/0x3d0
[   35.082116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.082847]  kthread+0x24c/0x2d0
[   35.083449]  ret_from_fork+0x10/0x20
[   35.084085] 
[   35.084451] The buggy address belongs to the object at fff00000c5b518c0
[   35.084451]  which belongs to the cache kmalloc-16 of size 16
[   35.085652] The buggy address is located 8 bytes inside of
[   35.085652]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   35.087030] 
[   35.087416] The buggy address belongs to the physical page:
[   35.088185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   35.089054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.089828] page_type: f5(slab)
[   35.090392] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.091220] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.092110] page dumped because: kasan: bad access detected
[   35.092864] 
[   35.093240] Memory state around the buggy address:
[   35.093898]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.094655]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.095606] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.096394]                                               ^
[   35.097146]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.098020]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.098892] ==================================================================
[   34.753084] ==================================================================
[   34.754033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.755174] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.756117] 
[   34.756665] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.757757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.758933] Hardware name: linux,dummy-virt (DT)
[   34.759807] Call trace:
[   34.760297]  show_stack+0x20/0x38 (C)
[   34.761032]  dump_stack_lvl+0x8c/0xd0
[   34.761724]  print_report+0x118/0x5e0
[   34.762390]  kasan_report+0xc8/0x118
[   34.763070]  kasan_check_range+0x100/0x1a8
[   34.763670]  __kasan_check_write+0x20/0x30
[   34.764401]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.765289]  kasan_bitops_generic+0x11c/0x1c8
[   34.766023]  kunit_try_run_case+0x14c/0x3d0
[   34.766797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.767500]  kthread+0x24c/0x2d0
[   34.768181]  ret_from_fork+0x10/0x20
[   34.768892] 
[   34.769280] Allocated by task 250:
[   34.769946]  kasan_save_stack+0x3c/0x68
[   34.770695]  kasan_save_track+0x20/0x40
[   34.771327]  kasan_save_alloc_info+0x40/0x58
[   34.772015]  __kasan_kmalloc+0xd4/0xd8
[   34.772552]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.773296]  kasan_bitops_generic+0xa0/0x1c8
[   34.774032]  kunit_try_run_case+0x14c/0x3d0
[   34.774697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.775454]  kthread+0x24c/0x2d0
[   34.776077]  ret_from_fork+0x10/0x20
[   34.776701] 
[   34.777078] The buggy address belongs to the object at fff00000c5b518c0
[   34.777078]  which belongs to the cache kmalloc-16 of size 16
[   34.778298] The buggy address is located 8 bytes inside of
[   34.778298]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.779764] 
[   34.780185] The buggy address belongs to the physical page:
[   34.780916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.781886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.782654] page_type: f5(slab)
[   34.783162] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.784176] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.784961] page dumped because: kasan: bad access detected
[   34.785726] 
[   34.786093] Memory state around the buggy address:
[   34.786726]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.787500]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.788432] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.789254]                                               ^
[   34.790015]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.790918]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.791805] ==================================================================
[   34.983490] ==================================================================
[   34.984745] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.986330] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.987318] 
[   34.988141] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.989322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.989883] Hardware name: linux,dummy-virt (DT)
[   34.990481] Call trace:
[   34.991217]  show_stack+0x20/0x38 (C)
[   34.991770]  dump_stack_lvl+0x8c/0xd0
[   34.992427]  print_report+0x118/0x5e0
[   34.993125]  kasan_report+0xc8/0x118
[   34.993787]  kasan_check_range+0x100/0x1a8
[   34.994460]  __kasan_check_write+0x20/0x30
[   34.995166]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.996041]  kasan_bitops_generic+0x11c/0x1c8
[   34.996756]  kunit_try_run_case+0x14c/0x3d0
[   34.997443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.998252]  kthread+0x24c/0x2d0
[   34.998831]  ret_from_fork+0x10/0x20
[   34.999415] 
[   34.999834] Allocated by task 250:
[   35.000412]  kasan_save_stack+0x3c/0x68
[   35.001139]  kasan_save_track+0x20/0x40
[   35.001675]  kasan_save_alloc_info+0x40/0x58
[   35.002444]  __kasan_kmalloc+0xd4/0xd8
[   35.003128]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.003803]  kasan_bitops_generic+0xa0/0x1c8
[   35.004506]  kunit_try_run_case+0x14c/0x3d0
[   35.005127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.005913]  kthread+0x24c/0x2d0
[   35.006476]  ret_from_fork+0x10/0x20
[   35.007094] 
[   35.007526] The buggy address belongs to the object at fff00000c5b518c0
[   35.007526]  which belongs to the cache kmalloc-16 of size 16
[   35.008816] The buggy address is located 8 bytes inside of
[   35.008816]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   35.010116] 
[   35.010540] The buggy address belongs to the physical page:
[   35.011196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   35.012182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.012871] page_type: f5(slab)
[   35.013439] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.014339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.015364] page dumped because: kasan: bad access detected
[   35.016140] 
[   35.016627] Memory state around the buggy address:
[   35.017209]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.018066]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.019046] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.019983]                                               ^
[   35.020723]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.021650]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.022578] ==================================================================
[   34.830996] ==================================================================
[   34.831787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.833122] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.834017] 
[   34.834423] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.835807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.836420] Hardware name: linux,dummy-virt (DT)
[   34.837006] Call trace:
[   34.837477]  show_stack+0x20/0x38 (C)
[   34.838151]  dump_stack_lvl+0x8c/0xd0
[   34.838732]  print_report+0x118/0x5e0
[   34.839381]  kasan_report+0xc8/0x118
[   34.839990]  kasan_check_range+0x100/0x1a8
[   34.840641]  __kasan_check_write+0x20/0x30
[   34.841273]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.841985]  kasan_bitops_generic+0x11c/0x1c8
[   34.842715]  kunit_try_run_case+0x14c/0x3d0
[   34.843425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.844211]  kthread+0x24c/0x2d0
[   34.844840]  ret_from_fork+0x10/0x20
[   34.845456] 
[   34.845842] Allocated by task 250:
[   34.846410]  kasan_save_stack+0x3c/0x68
[   34.846967]  kasan_save_track+0x20/0x40
[   34.847580]  kasan_save_alloc_info+0x40/0x58
[   34.848203]  __kasan_kmalloc+0xd4/0xd8
[   34.848846]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.849450]  kasan_bitops_generic+0xa0/0x1c8
[   34.850061]  kunit_try_run_case+0x14c/0x3d0
[   34.850753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.851428]  kthread+0x24c/0x2d0
[   34.852024]  ret_from_fork+0x10/0x20
[   34.852586] 
[   34.852944] The buggy address belongs to the object at fff00000c5b518c0
[   34.852944]  which belongs to the cache kmalloc-16 of size 16
[   34.854273] The buggy address is located 8 bytes inside of
[   34.854273]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.855453] 
[   34.855837] The buggy address belongs to the physical page:
[   34.856597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.857433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.858181] page_type: f5(slab)
[   34.858774] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.859783] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.860713] page dumped because: kasan: bad access detected
[   34.861422] 
[   34.861814] Memory state around the buggy address:
[   34.862468]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.863276]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.864119] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.864955]                                               ^
[   34.865694]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.866450]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.867335] ==================================================================
[   35.023934] ==================================================================
[   35.025061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   35.026285] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   35.027719] 
[   35.027993] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.029457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.030169] Hardware name: linux,dummy-virt (DT)
[   35.031002] Call trace:
[   35.031402]  show_stack+0x20/0x38 (C)
[   35.031977]  dump_stack_lvl+0x8c/0xd0
[   35.032661]  print_report+0x118/0x5e0
[   35.033343]  kasan_report+0xc8/0x118
[   35.034069]  __asan_report_load8_noabort+0x20/0x30
[   35.034852]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   35.035227]  kasan_bitops_generic+0x11c/0x1c8
[   35.035544]  kunit_try_run_case+0x14c/0x3d0
[   35.036111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.036885]  kthread+0x24c/0x2d0
[   35.037537]  ret_from_fork+0x10/0x20
[   35.038204] 
[   35.038460] Allocated by task 250:
[   35.038996]  kasan_save_stack+0x3c/0x68
[   35.039676]  kasan_save_track+0x20/0x40
[   35.040354]  kasan_save_alloc_info+0x40/0x58
[   35.041104]  __kasan_kmalloc+0xd4/0xd8
[   35.041845]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.042683]  kasan_bitops_generic+0xa0/0x1c8
[   35.043411]  kunit_try_run_case+0x14c/0x3d0
[   35.044030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.044376]  kthread+0x24c/0x2d0
[   35.044749]  ret_from_fork+0x10/0x20
[   35.045500] 
[   35.045960] The buggy address belongs to the object at fff00000c5b518c0
[   35.045960]  which belongs to the cache kmalloc-16 of size 16
[   35.047563] The buggy address is located 8 bytes inside of
[   35.047563]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   35.048835] 
[   35.049147] The buggy address belongs to the physical page:
[   35.049867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   35.050806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.051608] page_type: f5(slab)
[   35.052184] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.053092] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.053873] page dumped because: kasan: bad access detected
[   35.054634] 
[   35.054961] Memory state around the buggy address:
[   35.055609]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.056481]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.057278] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.058116]                                               ^
[   35.058819]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.059727]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.060479] ==================================================================
[   34.793661] ==================================================================
[   34.794677] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.795566] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.796270] 
[   34.796700] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.797899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.798543] Hardware name: linux,dummy-virt (DT)
[   34.799213] Call trace:
[   34.799698]  show_stack+0x20/0x38 (C)
[   34.800253]  dump_stack_lvl+0x8c/0xd0
[   34.800927]  print_report+0x118/0x5e0
[   34.801547]  kasan_report+0xc8/0x118
[   34.802048]  __asan_report_load8_noabort+0x20/0x30
[   34.802822]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.803561]  kasan_bitops_generic+0x11c/0x1c8
[   34.804274]  kunit_try_run_case+0x14c/0x3d0
[   34.804993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.805812]  kthread+0x24c/0x2d0
[   34.806330]  ret_from_fork+0x10/0x20
[   34.807003] 
[   34.807383] Allocated by task 250:
[   34.807847]  kasan_save_stack+0x3c/0x68
[   34.808483]  kasan_save_track+0x20/0x40
[   34.809068]  kasan_save_alloc_info+0x40/0x58
[   34.809779]  __kasan_kmalloc+0xd4/0xd8
[   34.810402]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.811094]  kasan_bitops_generic+0xa0/0x1c8
[   34.811686]  kunit_try_run_case+0x14c/0x3d0
[   34.812375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.813186]  kthread+0x24c/0x2d0
[   34.813744]  ret_from_fork+0x10/0x20
[   34.814367] 
[   34.814767] The buggy address belongs to the object at fff00000c5b518c0
[   34.814767]  which belongs to the cache kmalloc-16 of size 16
[   34.815909] The buggy address is located 8 bytes inside of
[   34.815909]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.817343] 
[   34.817708] The buggy address belongs to the physical page:
[   34.818446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.819329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.820127] page_type: f5(slab)
[   34.820700] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.821417] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.822393] page dumped because: kasan: bad access detected
[   34.823134] 
[   34.823538] Memory state around the buggy address:
[   34.824157]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.825103]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.825851] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.826717]                                               ^
[   34.827381]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.828237]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.829048] ==================================================================
[   34.870679] ==================================================================
[   34.871425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.872346] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.873063] 
[   34.873465] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.874724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.875353] Hardware name: linux,dummy-virt (DT)
[   34.875939] Call trace:
[   34.876407]  show_stack+0x20/0x38 (C)
[   34.877066]  dump_stack_lvl+0x8c/0xd0
[   34.877733]  print_report+0x118/0x5e0
[   34.878311]  kasan_report+0xc8/0x118
[   34.878858]  __asan_report_load8_noabort+0x20/0x30
[   34.879576]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.880362]  kasan_bitops_generic+0x11c/0x1c8
[   34.881035]  kunit_try_run_case+0x14c/0x3d0
[   34.881692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.882523]  kthread+0x24c/0x2d0
[   34.883127]  ret_from_fork+0x10/0x20
[   34.883699] 
[   34.884083] Allocated by task 250:
[   34.884673]  kasan_save_stack+0x3c/0x68
[   34.885307]  kasan_save_track+0x20/0x40
[   34.885875]  kasan_save_alloc_info+0x40/0x58
[   34.886554]  __kasan_kmalloc+0xd4/0xd8
[   34.887190]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.887809]  kasan_bitops_generic+0xa0/0x1c8
[   34.888486]  kunit_try_run_case+0x14c/0x3d0
[   34.889106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.889842]  kthread+0x24c/0x2d0
[   34.890429]  ret_from_fork+0x10/0x20
[   34.891009] 
[   34.891398] The buggy address belongs to the object at fff00000c5b518c0
[   34.891398]  which belongs to the cache kmalloc-16 of size 16
[   34.892659] The buggy address is located 8 bytes inside of
[   34.892659]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.893814] 
[   34.894190] The buggy address belongs to the physical page:
[   34.894957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.895978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.896760] page_type: f5(slab)
[   34.897398] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.898651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.899311] page dumped because: kasan: bad access detected
[   34.900013] 
[   34.900433] Memory state around the buggy address:
[   34.901075]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.901990]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.902829] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.903889]                                               ^
[   34.904213]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.904667]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.905698] ==================================================================

[   28.259666] ==================================================================
[   28.260151] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   28.262286] Read of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   28.263048] 
[   28.263553] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.263978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.264249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.265644] Call Trace:
[   28.265920]  <TASK>
[   28.266139]  dump_stack_lvl+0x73/0xb0
[   28.266833]  print_report+0xd1/0x640
[   28.267287]  ? __virt_addr_valid+0x1db/0x2d0
[   28.268035]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.268804]  kasan_report+0x102/0x140
[   28.269293]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   28.269924]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   28.270526]  __asan_report_load8_noabort+0x18/0x20
[   28.271304]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   28.271791]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.272570]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.273022]  ? trace_hardirqs_on+0x37/0xe0
[   28.273462]  ? kasan_bitops_generic+0x93/0x1c0
[   28.274007]  kasan_bitops_generic+0x122/0x1c0
[   28.274425]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.274847]  ? __pfx_read_tsc+0x10/0x10
[   28.275402]  ? ktime_get_ts64+0x86/0x230
[   28.275722]  kunit_try_run_case+0x1b3/0x490
[   28.276056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.276706]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.277387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.277888]  ? __kthread_parkme+0x82/0x160
[   28.278274]  ? preempt_count_sub+0x50/0x80
[   28.278785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.279476]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.280310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.280986]  kthread+0x257/0x310
[   28.281425]  ? __pfx_kthread+0x10/0x10
[   28.281795]  ret_from_fork+0x41/0x80
[   28.282321]  ? __pfx_kthread+0x10/0x10
[   28.282784]  ret_from_fork_asm+0x1a/0x30
[   28.283417]  </TASK>
[   28.283785] 
[   28.283994] Allocated by task 269:
[   28.284514]  kasan_save_stack+0x3d/0x60
[   28.284983]  kasan_save_track+0x18/0x40
[   28.285411]  kasan_save_alloc_info+0x3b/0x50
[   28.285724]  __kasan_kmalloc+0xb7/0xc0
[   28.286337]  __kmalloc_cache_noprof+0x184/0x410
[   28.286728]  kasan_bitops_generic+0x93/0x1c0
[   28.287372]  kunit_try_run_case+0x1b3/0x490
[   28.287708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.288502]  kthread+0x257/0x310
[   28.288815]  ret_from_fork+0x41/0x80
[   28.289319]  ret_from_fork_asm+0x1a/0x30
[   28.289868] 
[   28.290196] The buggy address belongs to the object at ffff888101b3cce0
[   28.290196]  which belongs to the cache kmalloc-16 of size 16
[   28.291172] The buggy address is located 8 bytes inside of
[   28.291172]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   28.292369] 
[   28.292540] The buggy address belongs to the physical page:
[   28.293189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   28.293977] flags: 0x200000000000000(node=0|zone=2)
[   28.294363] page_type: f5(slab)
[   28.294848] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.295632] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.296509] page dumped because: kasan: bad access detected
[   28.297153] 
[   28.297336] Memory state around the buggy address:
[   28.297889]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   28.298766]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   28.299467] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.300295]                                                           ^
[   28.300978]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.301745]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.302560] ==================================================================
[   28.146673] ==================================================================
[   28.148748] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   28.149916] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   28.150861] 
[   28.151054] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.152557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.153230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.154194] Call Trace:
[   28.154808]  <TASK>
[   28.155362]  dump_stack_lvl+0x73/0xb0
[   28.155994]  print_report+0xd1/0x640
[   28.156824]  ? __virt_addr_valid+0x1db/0x2d0
[   28.157227]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.157975]  kasan_report+0x102/0x140
[   28.158658]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   28.159841]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   28.160626]  kasan_check_range+0x10c/0x1c0
[   28.161069]  __kasan_check_write+0x18/0x20
[   28.161504]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   28.162756]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.163574]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.164300]  ? trace_hardirqs_on+0x37/0xe0
[   28.164979]  ? kasan_bitops_generic+0x93/0x1c0
[   28.165753]  kasan_bitops_generic+0x122/0x1c0
[   28.166544]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.167281]  ? __pfx_read_tsc+0x10/0x10
[   28.167863]  ? ktime_get_ts64+0x86/0x230
[   28.168281]  kunit_try_run_case+0x1b3/0x490
[   28.168684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.169551]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.170218]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.170992]  ? __kthread_parkme+0x82/0x160
[   28.171656]  ? preempt_count_sub+0x50/0x80
[   28.172352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.173005]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.174146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.174676]  kthread+0x257/0x310
[   28.175343]  ? __pfx_kthread+0x10/0x10
[   28.175950]  ret_from_fork+0x41/0x80
[   28.176542]  ? __pfx_kthread+0x10/0x10
[   28.177191]  ret_from_fork_asm+0x1a/0x30
[   28.177831]  </TASK>
[   28.178402] 
[   28.178685] Allocated by task 269:
[   28.179066]  kasan_save_stack+0x3d/0x60
[   28.180129]  kasan_save_track+0x18/0x40
[   28.180493]  kasan_save_alloc_info+0x3b/0x50
[   28.181194]  __kasan_kmalloc+0xb7/0xc0
[   28.181835]  __kmalloc_cache_noprof+0x184/0x410
[   28.182578]  kasan_bitops_generic+0x93/0x1c0
[   28.183164]  kunit_try_run_case+0x1b3/0x490
[   28.183795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.184661]  kthread+0x257/0x310
[   28.185072]  ret_from_fork+0x41/0x80
[   28.185446]  ret_from_fork_asm+0x1a/0x30
[   28.185849] 
[   28.186705] The buggy address belongs to the object at ffff888101b3cce0
[   28.186705]  which belongs to the cache kmalloc-16 of size 16
[   28.188580] The buggy address is located 8 bytes inside of
[   28.188580]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   28.190003] 
[   28.190522] The buggy address belongs to the physical page:
[   28.191126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   28.192113] flags: 0x200000000000000(node=0|zone=2)
[   28.193022] page_type: f5(slab)
[   28.193744] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.194927] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.196149] page dumped because: kasan: bad access detected
[   28.196569] 
[   28.197119] Memory state around the buggy address:
[   28.197989]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   28.198991]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   28.199996] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.200912]                                                           ^
[   28.201911]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.202909]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.203775] ==================================================================
[   28.001519] ==================================================================
[   28.003178] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   28.004951] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   28.005892] 
[   28.006153] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.007097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.007645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.008310] Call Trace:
[   28.008750]  <TASK>
[   28.009093]  dump_stack_lvl+0x73/0xb0
[   28.009455]  print_report+0xd1/0x640
[   28.009752]  ? __virt_addr_valid+0x1db/0x2d0
[   28.010575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.011393]  kasan_report+0x102/0x140
[   28.011812]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   28.013202]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   28.013836]  kasan_check_range+0x10c/0x1c0
[   28.014588]  __kasan_check_write+0x18/0x20
[   28.015668]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   28.016604]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.017533]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.018152]  ? trace_hardirqs_on+0x37/0xe0
[   28.018366]  ? kasan_bitops_generic+0x93/0x1c0
[   28.018577]  kasan_bitops_generic+0x122/0x1c0
[   28.018780]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.019096]  ? __pfx_read_tsc+0x10/0x10
[   28.019738]  ? ktime_get_ts64+0x86/0x230
[   28.020213]  kunit_try_run_case+0x1b3/0x490
[   28.021023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.021642]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.022832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.023549]  ? __kthread_parkme+0x82/0x160
[   28.024364]  ? preempt_count_sub+0x50/0x80
[   28.025180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.025805]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.026552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.027912]  kthread+0x257/0x310
[   28.028617]  ? __pfx_kthread+0x10/0x10
[   28.029035]  ret_from_fork+0x41/0x80
[   28.029613]  ? __pfx_kthread+0x10/0x10
[   28.030112]  ret_from_fork_asm+0x1a/0x30
[   28.030848]  </TASK>
[   28.031255] 
[   28.031785] Allocated by task 269:
[   28.032075]  kasan_save_stack+0x3d/0x60
[   28.032610]  kasan_save_track+0x18/0x40
[   28.032986]  kasan_save_alloc_info+0x3b/0x50
[   28.033474]  __kasan_kmalloc+0xb7/0xc0
[   28.033840]  __kmalloc_cache_noprof+0x184/0x410
[   28.035425]  kasan_bitops_generic+0x93/0x1c0
[   28.035964]  kunit_try_run_case+0x1b3/0x490
[   28.036498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.037037]  kthread+0x257/0x310
[   28.037497]  ret_from_fork+0x41/0x80
[   28.037924]  ret_from_fork_asm+0x1a/0x30
[   28.038374] 
[   28.038633] The buggy address belongs to the object at ffff888101b3cce0
[   28.038633]  which belongs to the cache kmalloc-16 of size 16
[   28.039806] The buggy address is located 8 bytes inside of
[   28.039806]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   28.041004] 
[   28.041353] The buggy address belongs to the physical page:
[   28.041697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   28.042734] flags: 0x200000000000000(node=0|zone=2)
[   28.043222] page_type: f5(slab)
[   28.043732] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.044516] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.045331] page dumped because: kasan: bad access detected
[   28.045835] 
[   28.046198] Memory state around the buggy address:
[   28.046752]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   28.047524]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   28.048298] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.049014]                                                           ^
[   28.049682]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.050437]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.051562] ==================================================================
[   28.054822] ==================================================================
[   28.055634] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   28.056994] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   28.057619] 
[   28.057891] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.058529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.059145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.060045] Call Trace:
[   28.060778]  <TASK>
[   28.061395]  dump_stack_lvl+0x73/0xb0
[   28.062016]  print_report+0xd1/0x640
[   28.062503]  ? __virt_addr_valid+0x1db/0x2d0
[   28.062725]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.062992]  kasan_report+0x102/0x140
[   28.063822]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   28.065001]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   28.066456]  kasan_check_range+0x10c/0x1c0
[   28.066904]  __kasan_check_write+0x18/0x20
[   28.067255]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   28.068068]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.068834]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.069965]  ? trace_hardirqs_on+0x37/0xe0
[   28.070669]  ? kasan_bitops_generic+0x93/0x1c0
[   28.071494]  kasan_bitops_generic+0x122/0x1c0
[   28.072467]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.073361]  ? __pfx_read_tsc+0x10/0x10
[   28.074093]  ? ktime_get_ts64+0x86/0x230
[   28.075009]  kunit_try_run_case+0x1b3/0x490
[   28.075630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.076125]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.076607]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.077845]  ? __kthread_parkme+0x82/0x160
[   28.079004]  ? preempt_count_sub+0x50/0x80
[   28.079401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.079832]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.080455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.081002]  kthread+0x257/0x310
[   28.081463]  ? __pfx_kthread+0x10/0x10
[   28.081843]  ret_from_fork+0x41/0x80
[   28.082346]  ? __pfx_kthread+0x10/0x10
[   28.082691]  ret_from_fork_asm+0x1a/0x30
[   28.083238]  </TASK>
[   28.083556] 
[   28.083755] Allocated by task 269:
[   28.084133]  kasan_save_stack+0x3d/0x60
[   28.084621]  kasan_save_track+0x18/0x40
[   28.084962]  kasan_save_alloc_info+0x3b/0x50
[   28.085528]  __kasan_kmalloc+0xb7/0xc0
[   28.086000]  __kmalloc_cache_noprof+0x184/0x410
[   28.086572]  kasan_bitops_generic+0x93/0x1c0
[   28.087028]  kunit_try_run_case+0x1b3/0x490
[   28.087379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.087987]  kthread+0x257/0x310
[   28.088342]  ret_from_fork+0x41/0x80
[   28.088702]  ret_from_fork_asm+0x1a/0x30
[   28.089252] 
[   28.089416] The buggy address belongs to the object at ffff888101b3cce0
[   28.089416]  which belongs to the cache kmalloc-16 of size 16
[   28.090642] The buggy address is located 8 bytes inside of
[   28.090642]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   28.091486] 
[   28.091734] The buggy address belongs to the physical page:
[   28.092436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   28.093035] flags: 0x200000000000000(node=0|zone=2)
[   28.093586] page_type: f5(slab)
[   28.093868] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.094531] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.095400] page dumped because: kasan: bad access detected
[   28.095877] 
[   28.096134] Memory state around the buggy address:
[   28.096645]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   28.097236]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   28.097810] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.098293]                                                           ^
[   28.099008]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.099715]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.100255] ==================================================================
[   28.102405] ==================================================================
[   28.103569] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   28.104541] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   28.105271] 
[   28.105473] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.106339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.106785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.107810] Call Trace:
[   28.108171]  <TASK>
[   28.108410]  dump_stack_lvl+0x73/0xb0
[   28.108812]  print_report+0xd1/0x640
[   28.109221]  ? __virt_addr_valid+0x1db/0x2d0
[   28.109750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.110449]  kasan_report+0x102/0x140
[   28.110924]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   28.111701]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   28.112323]  kasan_check_range+0x10c/0x1c0
[   28.112993]  __kasan_check_write+0x18/0x20
[   28.113668]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   28.114313]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.115055]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.115614]  ? trace_hardirqs_on+0x37/0xe0
[   28.116216]  ? kasan_bitops_generic+0x93/0x1c0
[   28.116746]  kasan_bitops_generic+0x122/0x1c0
[   28.117264]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.117717]  ? __pfx_read_tsc+0x10/0x10
[   28.118295]  ? ktime_get_ts64+0x86/0x230
[   28.118696]  kunit_try_run_case+0x1b3/0x490
[   28.119302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.119732]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.120360]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.120848]  ? __kthread_parkme+0x82/0x160
[   28.121410]  ? preempt_count_sub+0x50/0x80
[   28.121750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.122456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.122993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.123574]  kthread+0x257/0x310
[   28.124019]  ? __pfx_kthread+0x10/0x10
[   28.124473]  ret_from_fork+0x41/0x80
[   28.124948]  ? __pfx_kthread+0x10/0x10
[   28.125463]  ret_from_fork_asm+0x1a/0x30
[   28.125972]  </TASK>
[   28.126399] 
[   28.126570] Allocated by task 269:
[   28.126987]  kasan_save_stack+0x3d/0x60
[   28.127575]  kasan_save_track+0x18/0x40
[   28.128001]  kasan_save_alloc_info+0x3b/0x50
[   28.128676]  __kasan_kmalloc+0xb7/0xc0
[   28.129006]  __kmalloc_cache_noprof+0x184/0x410
[   28.129629]  kasan_bitops_generic+0x93/0x1c0
[   28.130142]  kunit_try_run_case+0x1b3/0x490
[   28.130668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.131420]  kthread+0x257/0x310
[   28.131707]  ret_from_fork+0x41/0x80
[   28.132327]  ret_from_fork_asm+0x1a/0x30
[   28.132720] 
[   28.132915] The buggy address belongs to the object at ffff888101b3cce0
[   28.132915]  which belongs to the cache kmalloc-16 of size 16
[   28.134324] The buggy address is located 8 bytes inside of
[   28.134324]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   28.135416] 
[   28.135701] The buggy address belongs to the physical page:
[   28.136140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   28.137005] flags: 0x200000000000000(node=0|zone=2)
[   28.137548] page_type: f5(slab)
[   28.137999] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.138770] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.139477] page dumped because: kasan: bad access detected
[   28.140047] 
[   28.140353] Memory state around the buggy address:
[   28.140754]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   28.141518]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   28.142326] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.143036]                                                           ^
[   28.143692]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.144450]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.145070] ==================================================================
[   27.949508] ==================================================================
[   27.951015] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   27.951729] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   27.954190] 
[   27.954502] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   27.955725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.956458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.957496] Call Trace:
[   27.957797]  <TASK>
[   27.958865]  dump_stack_lvl+0x73/0xb0
[   27.959220]  print_report+0xd1/0x640
[   27.960056]  ? __virt_addr_valid+0x1db/0x2d0
[   27.960745]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.961323]  kasan_report+0x102/0x140
[   27.961696]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   27.962223]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   27.962815]  kasan_check_range+0x10c/0x1c0
[   27.963178]  __kasan_check_write+0x18/0x20
[   27.963806]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   27.964615]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.965906]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.966536]  ? trace_hardirqs_on+0x37/0xe0
[   27.966892]  ? kasan_bitops_generic+0x93/0x1c0
[   27.967520]  kasan_bitops_generic+0x122/0x1c0
[   27.968022]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.968420]  ? __pfx_read_tsc+0x10/0x10
[   27.968789]  ? ktime_get_ts64+0x86/0x230
[   27.969308]  kunit_try_run_case+0x1b3/0x490
[   27.970034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.970919]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.971276]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.972702]  ? __kthread_parkme+0x82/0x160
[   27.973707]  ? preempt_count_sub+0x50/0x80
[   27.974219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.974669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.975909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.977003]  kthread+0x257/0x310
[   27.977864]  ? __pfx_kthread+0x10/0x10
[   27.978382]  ret_from_fork+0x41/0x80
[   27.978785]  ? __pfx_kthread+0x10/0x10
[   27.979661]  ret_from_fork_asm+0x1a/0x30
[   27.980530]  </TASK>
[   27.980983] 
[   27.981507] Allocated by task 269:
[   27.981860]  kasan_save_stack+0x3d/0x60
[   27.982176]  kasan_save_track+0x18/0x40
[   27.982701]  kasan_save_alloc_info+0x3b/0x50
[   27.983162]  __kasan_kmalloc+0xb7/0xc0
[   27.983616]  __kmalloc_cache_noprof+0x184/0x410
[   27.984226]  kasan_bitops_generic+0x93/0x1c0
[   27.984609]  kunit_try_run_case+0x1b3/0x490
[   27.985214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.985797]  kthread+0x257/0x310
[   27.986118]  ret_from_fork+0x41/0x80
[   27.986390]  ret_from_fork_asm+0x1a/0x30
[   27.986951] 
[   27.987296] The buggy address belongs to the object at ffff888101b3cce0
[   27.987296]  which belongs to the cache kmalloc-16 of size 16
[   27.988534] The buggy address is located 8 bytes inside of
[   27.988534]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   27.989642] 
[   27.989838] The buggy address belongs to the physical page:
[   27.990730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   27.991569] flags: 0x200000000000000(node=0|zone=2)
[   27.992062] page_type: f5(slab)
[   27.992492] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.993377] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.993828] page dumped because: kasan: bad access detected
[   27.994495] 
[   27.994762] Memory state around the buggy address:
[   27.995453]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   27.996135]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   27.997152] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.997553]                                                           ^
[   27.998074]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.998963]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.999855] ==================================================================
[   27.837347] ==================================================================
[   27.838959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   27.839891] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   27.840514] 
[   27.840696] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   27.842280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.842759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.843469] Call Trace:
[   27.843798]  <TASK>
[   27.844144]  dump_stack_lvl+0x73/0xb0
[   27.845291]  print_report+0xd1/0x640
[   27.845686]  ? __virt_addr_valid+0x1db/0x2d0
[   27.846091]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.846978]  kasan_report+0x102/0x140
[   27.847345]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   27.847853]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   27.848783]  kasan_check_range+0x10c/0x1c0
[   27.849403]  __kasan_check_write+0x18/0x20
[   27.850446]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   27.850856]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.851594]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.852073]  ? trace_hardirqs_on+0x37/0xe0
[   27.852904]  ? kasan_bitops_generic+0x93/0x1c0
[   27.853528]  kasan_bitops_generic+0x122/0x1c0
[   27.853855]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.854475]  ? __pfx_read_tsc+0x10/0x10
[   27.855054]  ? ktime_get_ts64+0x86/0x230
[   27.855649]  kunit_try_run_case+0x1b3/0x490
[   27.856054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.856461]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.856862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.857678]  ? __kthread_parkme+0x82/0x160
[   27.858088]  ? preempt_count_sub+0x50/0x80
[   27.859305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.859767]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.860177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.860807]  kthread+0x257/0x310
[   27.861348]  ? __pfx_kthread+0x10/0x10
[   27.861881]  ret_from_fork+0x41/0x80
[   27.862374]  ? __pfx_kthread+0x10/0x10
[   27.862657]  ret_from_fork_asm+0x1a/0x30
[   27.863020]  </TASK>
[   27.863338] 
[   27.863722] Allocated by task 269:
[   27.864174]  kasan_save_stack+0x3d/0x60
[   27.864696]  kasan_save_track+0x18/0x40
[   27.865233]  kasan_save_alloc_info+0x3b/0x50
[   27.866150]  __kasan_kmalloc+0xb7/0xc0
[   27.866555]  __kmalloc_cache_noprof+0x184/0x410
[   27.866990]  kasan_bitops_generic+0x93/0x1c0
[   27.867295]  kunit_try_run_case+0x1b3/0x490
[   27.867603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.868691]  kthread+0x257/0x310
[   27.869014]  ret_from_fork+0x41/0x80
[   27.870562]  ret_from_fork_asm+0x1a/0x30
[   27.870915] 
[   27.871111] The buggy address belongs to the object at ffff888101b3cce0
[   27.871111]  which belongs to the cache kmalloc-16 of size 16
[   27.873956] The buggy address is located 8 bytes inside of
[   27.873956]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   27.875783] 
[   27.876046] The buggy address belongs to the physical page:
[   27.876950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   27.878091] flags: 0x200000000000000(node=0|zone=2)
[   27.878995] page_type: f5(slab)
[   27.879468] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.879849] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.880578] page dumped because: kasan: bad access detected
[   27.881117] 
[   27.881404] Memory state around the buggy address:
[   27.881761]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   27.882845]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   27.883864] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.885065]                                                           ^
[   27.886598]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.888540]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.889569] ==================================================================
[   27.891702] ==================================================================
[   27.892309] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   27.892783] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   27.895291] 
[   27.896595] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   27.898115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.898948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.899950] Call Trace:
[   27.900491]  <TASK>
[   27.900794]  dump_stack_lvl+0x73/0xb0
[   27.901456]  print_report+0xd1/0x640
[   27.901888]  ? __virt_addr_valid+0x1db/0x2d0
[   27.902413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.902907]  kasan_report+0x102/0x140
[   27.903807]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   27.904784]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   27.905643]  kasan_check_range+0x10c/0x1c0
[   27.906818]  __kasan_check_write+0x18/0x20
[   27.907545]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   27.908421]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.909078]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.909566]  ? trace_hardirqs_on+0x37/0xe0
[   27.910896]  ? kasan_bitops_generic+0x93/0x1c0
[   27.911532]  kasan_bitops_generic+0x122/0x1c0
[   27.912052]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.912716]  ? __pfx_read_tsc+0x10/0x10
[   27.913391]  ? ktime_get_ts64+0x86/0x230
[   27.914136]  kunit_try_run_case+0x1b3/0x490
[   27.914447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.915101]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.916140]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.916774]  ? __kthread_parkme+0x82/0x160
[   27.917668]  ? preempt_count_sub+0x50/0x80
[   27.918417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.919069]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.919926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.920696]  kthread+0x257/0x310
[   27.921094]  ? __pfx_kthread+0x10/0x10
[   27.922169]  ret_from_fork+0x41/0x80
[   27.922535]  ? __pfx_kthread+0x10/0x10
[   27.923156]  ret_from_fork_asm+0x1a/0x30
[   27.923859]  </TASK>
[   27.924506] 
[   27.924687] Allocated by task 269:
[   27.925102]  kasan_save_stack+0x3d/0x60
[   27.925522]  kasan_save_track+0x18/0x40
[   27.925993]  kasan_save_alloc_info+0x3b/0x50
[   27.927109]  __kasan_kmalloc+0xb7/0xc0
[   27.927387]  __kmalloc_cache_noprof+0x184/0x410
[   27.928263]  kasan_bitops_generic+0x93/0x1c0
[   27.928915]  kunit_try_run_case+0x1b3/0x490
[   27.929675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.930244]  kthread+0x257/0x310
[   27.930739]  ret_from_fork+0x41/0x80
[   27.931421]  ret_from_fork_asm+0x1a/0x30
[   27.931690] 
[   27.932037] The buggy address belongs to the object at ffff888101b3cce0
[   27.932037]  which belongs to the cache kmalloc-16 of size 16
[   27.933953] The buggy address is located 8 bytes inside of
[   27.933953]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   27.935260] 
[   27.935567] The buggy address belongs to the physical page:
[   27.936464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   27.937423] flags: 0x200000000000000(node=0|zone=2)
[   27.938054] page_type: f5(slab)
[   27.938873] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.939781] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.940763] page dumped because: kasan: bad access detected
[   27.941329] 
[   27.941961] Memory state around the buggy address:
[   27.942627]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   27.943610]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   27.944594] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.945382]                                                           ^
[   27.946380]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.947044]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.947979] ==================================================================
[   28.205441] ==================================================================
[   28.207030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   28.208457] Read of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269
[   28.209454] 
[   28.209679] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.211491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.211907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.213017] Call Trace:
[   28.213635]  <TASK>
[   28.214164]  dump_stack_lvl+0x73/0xb0
[   28.214888]  print_report+0xd1/0x640
[   28.215421]  ? __virt_addr_valid+0x1db/0x2d0
[   28.215825]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.216802]  kasan_report+0x102/0x140
[   28.217591]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   28.218520]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   28.219597]  kasan_check_range+0x10c/0x1c0
[   28.220046]  __kasan_check_read+0x15/0x20
[   28.221384]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   28.222015]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.223132]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.223817]  ? trace_hardirqs_on+0x37/0xe0
[   28.224239]  ? kasan_bitops_generic+0x93/0x1c0
[   28.224705]  kasan_bitops_generic+0x122/0x1c0
[   28.225203]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.225680]  ? __pfx_read_tsc+0x10/0x10
[   28.226631]  ? ktime_get_ts64+0x86/0x230
[   28.227113]  kunit_try_run_case+0x1b3/0x490
[   28.227995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.228758]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.229438]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.230049]  ? __kthread_parkme+0x82/0x160
[   28.230967]  ? preempt_count_sub+0x50/0x80
[   28.231775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.232380]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.232970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.233500]  kthread+0x257/0x310
[   28.233890]  ? __pfx_kthread+0x10/0x10
[   28.234737]  ret_from_fork+0x41/0x80
[   28.235317]  ? __pfx_kthread+0x10/0x10
[   28.235847]  ret_from_fork_asm+0x1a/0x30
[   28.236475]  </TASK>
[   28.236696] 
[   28.236884] Allocated by task 269:
[   28.237984]  kasan_save_stack+0x3d/0x60
[   28.238276]  kasan_save_track+0x18/0x40
[   28.239024]  kasan_save_alloc_info+0x3b/0x50
[   28.239755]  __kasan_kmalloc+0xb7/0xc0
[   28.240387]  __kmalloc_cache_noprof+0x184/0x410
[   28.240817]  kasan_bitops_generic+0x93/0x1c0
[   28.241252]  kunit_try_run_case+0x1b3/0x490
[   28.241748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.242196]  kthread+0x257/0x310
[   28.242757]  ret_from_fork+0x41/0x80
[   28.243173]  ret_from_fork_asm+0x1a/0x30
[   28.243590] 
[   28.243790] The buggy address belongs to the object at ffff888101b3cce0
[   28.243790]  which belongs to the cache kmalloc-16 of size 16
[   28.245276] The buggy address is located 8 bytes inside of
[   28.245276]  allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9)
[   28.247560] 
[   28.247788] The buggy address belongs to the physical page:
[   28.248650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c
[   28.249423] flags: 0x200000000000000(node=0|zone=2)
[   28.249753] page_type: f5(slab)
[   28.250205] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.251168] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.251820] page dumped because: kasan: bad access detected
[   28.252580] 
[   28.252835] Memory state around the buggy address:
[   28.253404]  ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   28.254389]  ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   28.255185] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.255799]                                                           ^
[   28.256572]  ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.257311]  ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.258020] ==================================================================