Hay
Date
Dec. 9, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   27.581814] ==================================================================
[   27.582546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   27.583466] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.584202] 
[   27.584560] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.585751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.586289] Hardware name: linux,dummy-virt (DT)
[   27.586891] Call trace:
[   27.587224]  show_stack+0x20/0x38 (C)
[   27.587820]  dump_stack_lvl+0x8c/0xd0
[   27.588409]  print_report+0x118/0x5e0
[   27.589095]  kasan_report+0xc8/0x118
[   27.589633]  __asan_report_load8_noabort+0x20/0x30
[   27.590271]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   27.591005]  kasan_bitops_generic+0x11c/0x1c8
[   27.591548]  kunit_try_run_case+0x14c/0x3d0
[   27.592243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.592966]  kthread+0x24c/0x2d0
[   27.593508]  ret_from_fork+0x10/0x20
[   27.594079] 
[   27.594389] Allocated by task 249:
[   27.594938]  kasan_save_stack+0x3c/0x68
[   27.595516]  kasan_save_track+0x20/0x40
[   27.596113]  kasan_save_alloc_info+0x40/0x58
[   27.596760]  __kasan_kmalloc+0xd4/0xd8
[   27.597289]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.597928]  kasan_bitops_generic+0xa0/0x1c8
[   27.598522]  kunit_try_run_case+0x14c/0x3d0
[   27.599096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.599800]  kthread+0x24c/0x2d0
[   27.600252]  ret_from_fork+0x10/0x20
[   27.600853] 
[   27.601219] The buggy address belongs to the object at fff00000c11118e0
[   27.601219]  which belongs to the cache kmalloc-16 of size 16
[   27.602402] The buggy address is located 8 bytes inside of
[   27.602402]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.603617] 
[   27.603998] The buggy address belongs to the physical page:
[   27.604601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.605361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.606156] page_type: f5(slab)
[   27.606625] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.607374] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.608341] page dumped because: kasan: bad access detected
[   27.609031] 
[   27.609365] Memory state around the buggy address:
[   27.609978]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.610817]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.611566] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.612292]                                                           ^
[   27.613048]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.613937]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.614741] ==================================================================
[   27.765033] ==================================================================
[   27.765664] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   27.766444] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.766890] 
[   27.767303] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.768432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.769067] Hardware name: linux,dummy-virt (DT)
[   27.769758] Call trace:
[   27.770198]  show_stack+0x20/0x38 (C)
[   27.770802]  dump_stack_lvl+0x8c/0xd0
[   27.771446]  print_report+0x118/0x5e0
[   27.772110]  kasan_report+0xc8/0x118
[   27.772785]  kasan_check_range+0x100/0x1a8
[   27.773397]  __kasan_check_write+0x20/0x30
[   27.774116]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   27.774901]  kasan_bitops_generic+0x11c/0x1c8
[   27.775554]  kunit_try_run_case+0x14c/0x3d0
[   27.776186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.776952]  kthread+0x24c/0x2d0
[   27.777516]  ret_from_fork+0x10/0x20
[   27.778136] 
[   27.778491] Allocated by task 249:
[   27.778982]  kasan_save_stack+0x3c/0x68
[   27.779659]  kasan_save_track+0x20/0x40
[   27.780294]  kasan_save_alloc_info+0x40/0x58
[   27.780945]  __kasan_kmalloc+0xd4/0xd8
[   27.781528]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.782124]  kasan_bitops_generic+0xa0/0x1c8
[   27.782674]  kunit_try_run_case+0x14c/0x3d0
[   27.783348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.784089]  kthread+0x24c/0x2d0
[   27.784641]  ret_from_fork+0x10/0x20
[   27.785233] 
[   27.785570] The buggy address belongs to the object at fff00000c11118e0
[   27.785570]  which belongs to the cache kmalloc-16 of size 16
[   27.786900] The buggy address is located 8 bytes inside of
[   27.786900]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.788233] 
[   27.788627] The buggy address belongs to the physical page:
[   27.789333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.790265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.791047] page_type: f5(slab)
[   27.791582] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.792501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.793355] page dumped because: kasan: bad access detected
[   27.794047] 
[   27.794410] Memory state around the buggy address:
[   27.795018]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.795953]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.796805] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.797594]                                                           ^
[   27.798368]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.799198]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.799987] ==================================================================
[   27.616115] ==================================================================
[   27.617063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   27.618638] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.619459] 
[   27.619787] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.620990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.621866] Hardware name: linux,dummy-virt (DT)
[   27.622385] Call trace:
[   27.623166]  show_stack+0x20/0x38 (C)
[   27.623571]  dump_stack_lvl+0x8c/0xd0
[   27.624282]  print_report+0x118/0x5e0
[   27.624981]  kasan_report+0xc8/0x118
[   27.625667]  kasan_check_range+0x100/0x1a8
[   27.626371]  __kasan_check_write+0x20/0x30
[   27.627088]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   27.627930]  kasan_bitops_generic+0x11c/0x1c8
[   27.628646]  kunit_try_run_case+0x14c/0x3d0
[   27.629387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.630204]  kthread+0x24c/0x2d0
[   27.630844]  ret_from_fork+0x10/0x20
[   27.631529] 
[   27.632037] Allocated by task 249:
[   27.632512]  kasan_save_stack+0x3c/0x68
[   27.633045]  kasan_save_track+0x20/0x40
[   27.633613]  kasan_save_alloc_info+0x40/0x58
[   27.634168]  __kasan_kmalloc+0xd4/0xd8
[   27.634819]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.635433]  kasan_bitops_generic+0xa0/0x1c8
[   27.636168]  kunit_try_run_case+0x14c/0x3d0
[   27.636835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.637540]  kthread+0x24c/0x2d0
[   27.638097]  ret_from_fork+0x10/0x20
[   27.638680] 
[   27.639066] The buggy address belongs to the object at fff00000c11118e0
[   27.639066]  which belongs to the cache kmalloc-16 of size 16
[   27.640389] The buggy address is located 8 bytes inside of
[   27.640389]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.641677] 
[   27.642039] The buggy address belongs to the physical page:
[   27.642737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.643679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.644465] page_type: f5(slab)
[   27.645018] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.645951] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.646789] page dumped because: kasan: bad access detected
[   27.647439] 
[   27.647772] Memory state around the buggy address:
[   27.648424]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.649258]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.650126] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.650956]                                                           ^
[   27.651739]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.652560]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.653382] ==================================================================
[   27.801749] ==================================================================
[   27.803058] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   27.804743] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.805597] 
[   27.805967] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.807213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.807807] Hardware name: linux,dummy-virt (DT)
[   27.808427] Call trace:
[   27.808879]  show_stack+0x20/0x38 (C)
[   27.809468]  dump_stack_lvl+0x8c/0xd0
[   27.810071]  print_report+0x118/0x5e0
[   27.810661]  kasan_report+0xc8/0x118
[   27.811261]  __asan_report_load8_noabort+0x20/0x30
[   27.811945]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   27.812739]  kasan_bitops_generic+0x11c/0x1c8
[   27.813372]  kunit_try_run_case+0x14c/0x3d0
[   27.814013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.814751]  kthread+0x24c/0x2d0
[   27.815298]  ret_from_fork+0x10/0x20
[   27.815907] 
[   27.816273] Allocated by task 249:
[   27.816786]  kasan_save_stack+0x3c/0x68
[   27.817399]  kasan_save_track+0x20/0x40
[   27.818024]  kasan_save_alloc_info+0x40/0x58
[   27.818650]  __kasan_kmalloc+0xd4/0xd8
[   27.819240]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.819899]  kasan_bitops_generic+0xa0/0x1c8
[   27.820513]  kunit_try_run_case+0x14c/0x3d0
[   27.821139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.821858]  kthread+0x24c/0x2d0
[   27.822399]  ret_from_fork+0x10/0x20
[   27.822996] 
[   27.823345] The buggy address belongs to the object at fff00000c11118e0
[   27.823345]  which belongs to the cache kmalloc-16 of size 16
[   27.824627] The buggy address is located 8 bytes inside of
[   27.824627]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.825950] 
[   27.826337] The buggy address belongs to the physical page:
[   27.827009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.827934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.828756] page_type: f5(slab)
[   27.829195] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.830116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.830971] page dumped because: kasan: bad access detected
[   27.831654] 
[   27.831994] Memory state around the buggy address:
[   27.832630]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.833552]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.834365] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.835200]                                                           ^
[   27.835993]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.836819]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.837604] ==================================================================
[   27.654616] ==================================================================
[   27.655801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   27.657120] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.657887] 
[   27.658309] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.659447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.660116] Hardware name: linux,dummy-virt (DT)
[   27.660920] Call trace:
[   27.661341]  show_stack+0x20/0x38 (C)
[   27.662090]  dump_stack_lvl+0x8c/0xd0
[   27.662768]  print_report+0x118/0x5e0
[   27.663315]  kasan_report+0xc8/0x118
[   27.663769]  __asan_report_load8_noabort+0x20/0x30
[   27.664404]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   27.665266]  kasan_bitops_generic+0x11c/0x1c8
[   27.665918]  kunit_try_run_case+0x14c/0x3d0
[   27.666568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.667309]  kthread+0x24c/0x2d0
[   27.667878]  ret_from_fork+0x10/0x20
[   27.668473] 
[   27.668868] Allocated by task 249:
[   27.669367]  kasan_save_stack+0x3c/0x68
[   27.669899]  kasan_save_track+0x20/0x40
[   27.670484]  kasan_save_alloc_info+0x40/0x58
[   27.671052]  __kasan_kmalloc+0xd4/0xd8
[   27.671616]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.672210]  kasan_bitops_generic+0xa0/0x1c8
[   27.672854]  kunit_try_run_case+0x14c/0x3d0
[   27.673482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.674131]  kthread+0x24c/0x2d0
[   27.674728]  ret_from_fork+0x10/0x20
[   27.675209] 
[   27.675584] The buggy address belongs to the object at fff00000c11118e0
[   27.675584]  which belongs to the cache kmalloc-16 of size 16
[   27.676867] The buggy address is located 8 bytes inside of
[   27.676867]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.678060] 
[   27.678386] The buggy address belongs to the physical page:
[   27.679001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.680008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.680768] page_type: f5(slab)
[   27.681198] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.682056] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.682817] page dumped because: kasan: bad access detected
[   27.683375] 
[   27.683763] Memory state around the buggy address:
[   27.684410]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.685304]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.686008] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.686905]                                                           ^
[   27.687639]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.688434]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.689158] ==================================================================
[   27.543264] ==================================================================
[   27.543908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   27.544809] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.545854] 
[   27.546210] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.548458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.549103] Hardware name: linux,dummy-virt (DT)
[   27.549793] Call trace:
[   27.550322]  show_stack+0x20/0x38 (C)
[   27.551206]  dump_stack_lvl+0x8c/0xd0
[   27.551730]  print_report+0x118/0x5e0
[   27.552423]  kasan_report+0xc8/0x118
[   27.552969]  kasan_check_range+0x100/0x1a8
[   27.553510]  __kasan_check_write+0x20/0x30
[   27.554054]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   27.554982]  kasan_bitops_generic+0x11c/0x1c8
[   27.555841]  kunit_try_run_case+0x14c/0x3d0
[   27.556457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.557351]  kthread+0x24c/0x2d0
[   27.557842]  ret_from_fork+0x10/0x20
[   27.558333] 
[   27.558625] Allocated by task 249:
[   27.560084]  kasan_save_stack+0x3c/0x68
[   27.560541]  kasan_save_track+0x20/0x40
[   27.561100]  kasan_save_alloc_info+0x40/0x58
[   27.561646]  __kasan_kmalloc+0xd4/0xd8
[   27.562425]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.563433]  kasan_bitops_generic+0xa0/0x1c8
[   27.564131]  kunit_try_run_case+0x14c/0x3d0
[   27.564772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.565442]  kthread+0x24c/0x2d0
[   27.565957]  ret_from_fork+0x10/0x20
[   27.566480] 
[   27.566848] The buggy address belongs to the object at fff00000c11118e0
[   27.566848]  which belongs to the cache kmalloc-16 of size 16
[   27.568129] The buggy address is located 8 bytes inside of
[   27.568129]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.569332] 
[   27.569673] The buggy address belongs to the physical page:
[   27.570334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.571247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.571941] page_type: f5(slab)
[   27.572446] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.573300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.574151] page dumped because: kasan: bad access detected
[   27.574783] 
[   27.575101] Memory state around the buggy address:
[   27.575620]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.576530]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.577316] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.578158]                                                           ^
[   27.578894]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.579626]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.580456] ==================================================================
[   27.839407] ==================================================================
[   27.840064] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   27.841118] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.842037] 
[   27.842361] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.843792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.844300] Hardware name: linux,dummy-virt (DT)
[   27.845068] Call trace:
[   27.845367]  show_stack+0x20/0x38 (C)
[   27.846164]  dump_stack_lvl+0x8c/0xd0
[   27.846691]  print_report+0x118/0x5e0
[   27.847231]  kasan_report+0xc8/0x118
[   27.847981]  __asan_report_load8_noabort+0x20/0x30
[   27.848650]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   27.849418]  kasan_bitops_generic+0x11c/0x1c8
[   27.849946]  kunit_try_run_case+0x14c/0x3d0
[   27.850542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.851323]  kthread+0x24c/0x2d0
[   27.851911]  ret_from_fork+0x10/0x20
[   27.852502] 
[   27.852885] Allocated by task 249:
[   27.853435]  kasan_save_stack+0x3c/0x68
[   27.854057]  kasan_save_track+0x20/0x40
[   27.854692]  kasan_save_alloc_info+0x40/0x58
[   27.855373]  __kasan_kmalloc+0xd4/0xd8
[   27.855961]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.856627]  kasan_bitops_generic+0xa0/0x1c8
[   27.857280]  kunit_try_run_case+0x14c/0x3d0
[   27.857912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.858643]  kthread+0x24c/0x2d0
[   27.859273]  ret_from_fork+0x10/0x20
[   27.859875] 
[   27.860218] The buggy address belongs to the object at fff00000c11118e0
[   27.860218]  which belongs to the cache kmalloc-16 of size 16
[   27.861539] The buggy address is located 8 bytes inside of
[   27.861539]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.862899] 
[   27.863294] The buggy address belongs to the physical page:
[   27.863928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.864934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.865759] page_type: f5(slab)
[   27.866293] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.867199] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.868047] page dumped because: kasan: bad access detected
[   27.868741] 
[   27.869085] Memory state around the buggy address:
[   27.869733]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.870618]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.871462] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.872276]                                                           ^
[   27.873102]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.873939]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.874786] ==================================================================
[   27.690946] ==================================================================
[   27.691550] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   27.692629] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.693838] 
[   27.694302] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.695507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.696166] Hardware name: linux,dummy-virt (DT)
[   27.696873] Call trace:
[   27.697339]  show_stack+0x20/0x38 (C)
[   27.697833]  dump_stack_lvl+0x8c/0xd0
[   27.698589]  print_report+0x118/0x5e0
[   27.699345]  kasan_report+0xc8/0x118
[   27.700033]  kasan_check_range+0x100/0x1a8
[   27.700769]  __kasan_check_write+0x20/0x30
[   27.701267]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   27.701921]  kasan_bitops_generic+0x11c/0x1c8
[   27.702456]  kunit_try_run_case+0x14c/0x3d0
[   27.703283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.704109]  kthread+0x24c/0x2d0
[   27.704782]  ret_from_fork+0x10/0x20
[   27.705294] 
[   27.705577] Allocated by task 249:
[   27.706060]  kasan_save_stack+0x3c/0x68
[   27.706550]  kasan_save_track+0x20/0x40
[   27.707152]  kasan_save_alloc_info+0x40/0x58
[   27.707654]  __kasan_kmalloc+0xd4/0xd8
[   27.708282]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.708967]  kasan_bitops_generic+0xa0/0x1c8
[   27.709580]  kunit_try_run_case+0x14c/0x3d0
[   27.710220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.710988]  kthread+0x24c/0x2d0
[   27.711588]  ret_from_fork+0x10/0x20
[   27.712113] 
[   27.712460] The buggy address belongs to the object at fff00000c11118e0
[   27.712460]  which belongs to the cache kmalloc-16 of size 16
[   27.713687] The buggy address is located 8 bytes inside of
[   27.713687]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.715035] 
[   27.715424] The buggy address belongs to the physical page:
[   27.716127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.717098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.717897] page_type: f5(slab)
[   27.718435] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.719337] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.720192] page dumped because: kasan: bad access detected
[   27.720878] 
[   27.721203] Memory state around the buggy address:
[   27.721852]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.722769]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.723589] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.724371]                                                           ^
[   27.725155]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.725993]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.726793] ==================================================================
[   27.728378] ==================================================================
[   27.729047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   27.730586] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.732476] 
[   27.732981] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.734180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.734732] Hardware name: linux,dummy-virt (DT)
[   27.735302] Call trace:
[   27.735808]  show_stack+0x20/0x38 (C)
[   27.736431]  dump_stack_lvl+0x8c/0xd0
[   27.737076]  print_report+0x118/0x5e0
[   27.737653]  kasan_report+0xc8/0x118
[   27.738256]  __asan_report_load8_noabort+0x20/0x30
[   27.738956]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   27.739723]  kasan_bitops_generic+0x11c/0x1c8
[   27.740363]  kunit_try_run_case+0x14c/0x3d0
[   27.741005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.741770]  kthread+0x24c/0x2d0
[   27.742346]  ret_from_fork+0x10/0x20
[   27.742873] 
[   27.743168] Allocated by task 249:
[   27.743730]  kasan_save_stack+0x3c/0x68
[   27.744282]  kasan_save_track+0x20/0x40
[   27.744833]  kasan_save_alloc_info+0x40/0x58
[   27.745388]  __kasan_kmalloc+0xd4/0xd8
[   27.745927]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.746511]  kasan_bitops_generic+0xa0/0x1c8
[   27.747147]  kunit_try_run_case+0x14c/0x3d0
[   27.747749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.748510]  kthread+0x24c/0x2d0
[   27.749091]  ret_from_fork+0x10/0x20
[   27.749598] 
[   27.749910] The buggy address belongs to the object at fff00000c11118e0
[   27.749910]  which belongs to the cache kmalloc-16 of size 16
[   27.751050] The buggy address is located 8 bytes inside of
[   27.751050]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.752049] 
[   27.752416] The buggy address belongs to the physical page:
[   27.753216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.754091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.754983] page_type: f5(slab)
[   27.755537] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.756332] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.757161] page dumped because: kasan: bad access detected
[   27.757859] 
[   27.758165] Memory state around the buggy address:
[   27.758738]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.759513]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.760223] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.761027]                                                           ^
[   27.761815]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.762572]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.763315] ==================================================================

[   28.013384] ==================================================================
[   28.014792] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   28.016112] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   28.016804] 
[   28.017121] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.018002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.018537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.019463] Call Trace:
[   28.019748]  <TASK>
[   28.020420]  dump_stack_lvl+0x73/0xb0
[   28.021354]  print_report+0xd1/0x640
[   28.021713]  ? __virt_addr_valid+0x1db/0x2d0
[   28.022289]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.022773]  kasan_report+0x102/0x140
[   28.023191]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   28.023736]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   28.024341]  kasan_check_range+0x10c/0x1c0
[   28.024811]  __kasan_check_write+0x18/0x20
[   28.025307]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   28.025729]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.026430]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.026975]  ? trace_hardirqs_on+0x37/0xe0
[   28.027376]  ? kasan_bitops_generic+0x93/0x1c0
[   28.027946]  kasan_bitops_generic+0x122/0x1c0
[   28.028421]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.028796]  ? __pfx_read_tsc+0x10/0x10
[   28.029301]  ? ktime_get_ts64+0x86/0x230
[   28.029726]  kunit_try_run_case+0x1b3/0x490
[   28.030248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.030620]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.031171]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.031705]  ? __kthread_parkme+0x82/0x160
[   28.032044]  ? preempt_count_sub+0x50/0x80
[   28.032573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.033202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.033706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.034279]  kthread+0x257/0x310
[   28.034569]  ? __pfx_kthread+0x10/0x10
[   28.035056]  ret_from_fork+0x41/0x80
[   28.035544]  ? __pfx_kthread+0x10/0x10
[   28.036064]  ret_from_fork_asm+0x1a/0x30
[   28.036406]  </TASK>
[   28.036740] 
[   28.037022] Allocated by task 268:
[   28.037484]  kasan_save_stack+0x3d/0x60
[   28.038008]  kasan_save_track+0x18/0x40
[   28.038419]  kasan_save_alloc_info+0x3b/0x50
[   28.038825]  __kasan_kmalloc+0xb7/0xc0
[   28.039190]  __kmalloc_cache_noprof+0x184/0x410
[   28.039521]  kasan_bitops_generic+0x93/0x1c0
[   28.039820]  kunit_try_run_case+0x1b3/0x490
[   28.040388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.041109]  kthread+0x257/0x310
[   28.041400]  ret_from_fork+0x41/0x80
[   28.041672]  ret_from_fork_asm+0x1a/0x30
[   28.042475] 
[   28.042724] The buggy address belongs to the object at ffff888101094760
[   28.042724]  which belongs to the cache kmalloc-16 of size 16
[   28.043709] The buggy address is located 8 bytes inside of
[   28.043709]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   28.044648] 
[   28.045010] The buggy address belongs to the physical page:
[   28.045444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   28.046148] flags: 0x200000000000000(node=0|zone=2)
[   28.046632] page_type: f5(slab)
[   28.047064] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.047758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.048588] page dumped because: kasan: bad access detected
[   28.049110] 
[   28.049289] Memory state around the buggy address:
[   28.049815]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   28.050565]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   28.052083] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.052730]                                                           ^
[   28.053712]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.054083]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.054734] ==================================================================
[   28.247633] ==================================================================
[   28.248564] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   28.249332] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   28.250047] 
[   28.250233] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.251454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.251809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.252661] Call Trace:
[   28.252891]  <TASK>
[   28.253279]  dump_stack_lvl+0x73/0xb0
[   28.253672]  print_report+0xd1/0x640
[   28.254133]  ? __virt_addr_valid+0x1db/0x2d0
[   28.254672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.255321]  kasan_report+0x102/0x140
[   28.255802]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   28.256359]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   28.257215]  kasan_check_range+0x10c/0x1c0
[   28.257624]  __kasan_check_write+0x18/0x20
[   28.258124]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   28.258916]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.259479]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.260118]  ? trace_hardirqs_on+0x37/0xe0
[   28.260589]  ? kasan_bitops_generic+0x93/0x1c0
[   28.261105]  kasan_bitops_generic+0x122/0x1c0
[   28.261492]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.262105]  ? __pfx_read_tsc+0x10/0x10
[   28.262610]  ? ktime_get_ts64+0x86/0x230
[   28.263169]  kunit_try_run_case+0x1b3/0x490
[   28.263586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.264165]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.264638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.265433]  ? __kthread_parkme+0x82/0x160
[   28.266028]  ? preempt_count_sub+0x50/0x80
[   28.266503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.267087]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.267700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.268297]  kthread+0x257/0x310
[   28.268764]  ? __pfx_kthread+0x10/0x10
[   28.269237]  ret_from_fork+0x41/0x80
[   28.269720]  ? __pfx_kthread+0x10/0x10
[   28.270011]  ret_from_fork_asm+0x1a/0x30
[   28.270363]  </TASK>
[   28.270830] 
[   28.271133] Allocated by task 268:
[   28.271598]  kasan_save_stack+0x3d/0x60
[   28.271881]  kasan_save_track+0x18/0x40
[   28.272393]  kasan_save_alloc_info+0x3b/0x50
[   28.273003]  __kasan_kmalloc+0xb7/0xc0
[   28.273407]  __kmalloc_cache_noprof+0x184/0x410
[   28.273717]  kasan_bitops_generic+0x93/0x1c0
[   28.274427]  kunit_try_run_case+0x1b3/0x490
[   28.275105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.275587]  kthread+0x257/0x310
[   28.275901]  ret_from_fork+0x41/0x80
[   28.276493]  ret_from_fork_asm+0x1a/0x30
[   28.277152] 
[   28.277332] The buggy address belongs to the object at ffff888101094760
[   28.277332]  which belongs to the cache kmalloc-16 of size 16
[   28.278425] The buggy address is located 8 bytes inside of
[   28.278425]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   28.279560] 
[   28.279722] The buggy address belongs to the physical page:
[   28.280199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   28.281330] flags: 0x200000000000000(node=0|zone=2)
[   28.282191] page_type: f5(slab)
[   28.282608] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.283051] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.284231] page dumped because: kasan: bad access detected
[   28.284858] 
[   28.285123] Memory state around the buggy address:
[   28.285926]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   28.286672]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   28.287529] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.288182]                                                           ^
[   28.288918]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.289601]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.290008] ==================================================================
[   28.106295] ==================================================================
[   28.106900] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   28.107818] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   28.108766] 
[   28.108947] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.110305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.111355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.112919] Call Trace:
[   28.113527]  <TASK>
[   28.114004]  dump_stack_lvl+0x73/0xb0
[   28.114664]  print_report+0xd1/0x640
[   28.115349]  ? __virt_addr_valid+0x1db/0x2d0
[   28.116096]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.116752]  kasan_report+0x102/0x140
[   28.117189]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   28.117811]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   28.118645]  kasan_check_range+0x10c/0x1c0
[   28.119340]  __kasan_check_write+0x18/0x20
[   28.120078]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   28.120655]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.121784]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.122782]  ? trace_hardirqs_on+0x37/0xe0
[   28.123344]  ? kasan_bitops_generic+0x93/0x1c0
[   28.123776]  kasan_bitops_generic+0x122/0x1c0
[   28.124394]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.125116]  ? __pfx_read_tsc+0x10/0x10
[   28.125618]  ? ktime_get_ts64+0x86/0x230
[   28.126184]  kunit_try_run_case+0x1b3/0x490
[   28.126505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.127511]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.128290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.128747]  ? __kthread_parkme+0x82/0x160
[   28.129202]  ? preempt_count_sub+0x50/0x80
[   28.129693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.130762]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.131543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.132155]  kthread+0x257/0x310
[   28.132540]  ? __pfx_kthread+0x10/0x10
[   28.133316]  ret_from_fork+0x41/0x80
[   28.133601]  ? __pfx_kthread+0x10/0x10
[   28.134131]  ret_from_fork_asm+0x1a/0x30
[   28.134497]  </TASK>
[   28.134895] 
[   28.135121] Allocated by task 268:
[   28.135485]  kasan_save_stack+0x3d/0x60
[   28.135822]  kasan_save_track+0x18/0x40
[   28.136387]  kasan_save_alloc_info+0x3b/0x50
[   28.137082]  __kasan_kmalloc+0xb7/0xc0
[   28.137443]  __kmalloc_cache_noprof+0x184/0x410
[   28.138103]  kasan_bitops_generic+0x93/0x1c0
[   28.138511]  kunit_try_run_case+0x1b3/0x490
[   28.139062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.139477]  kthread+0x257/0x310
[   28.140010]  ret_from_fork+0x41/0x80
[   28.140561]  ret_from_fork_asm+0x1a/0x30
[   28.140905] 
[   28.141229] The buggy address belongs to the object at ffff888101094760
[   28.141229]  which belongs to the cache kmalloc-16 of size 16
[   28.142290] The buggy address is located 8 bytes inside of
[   28.142290]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   28.143511] 
[   28.143812] The buggy address belongs to the physical page:
[   28.144237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   28.145076] flags: 0x200000000000000(node=0|zone=2)
[   28.145603] page_type: f5(slab)
[   28.146026] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.146867] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.147514] page dumped because: kasan: bad access detected
[   28.148118] 
[   28.148393] Memory state around the buggy address:
[   28.148919]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   28.149634]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   28.150283] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.151011]                                                           ^
[   28.151720]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.152352]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.153030] ==================================================================
[   28.056843] ==================================================================
[   28.058217] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   28.059026] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   28.059710] 
[   28.059988] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.061585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.062506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.063726] Call Trace:
[   28.064145]  <TASK>
[   28.064388]  dump_stack_lvl+0x73/0xb0
[   28.065172]  print_report+0xd1/0x640
[   28.065896]  ? __virt_addr_valid+0x1db/0x2d0
[   28.066338]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.067205]  kasan_report+0x102/0x140
[   28.067904]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   28.068676]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   28.069251]  kasan_check_range+0x10c/0x1c0
[   28.069811]  __kasan_check_write+0x18/0x20
[   28.070334]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   28.071021]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.071725]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.072618]  ? trace_hardirqs_on+0x37/0xe0
[   28.072998]  ? kasan_bitops_generic+0x93/0x1c0
[   28.073620]  kasan_bitops_generic+0x122/0x1c0
[   28.074313]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.074853]  ? __pfx_read_tsc+0x10/0x10
[   28.075385]  ? ktime_get_ts64+0x86/0x230
[   28.076345]  kunit_try_run_case+0x1b3/0x490
[   28.077361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.077802]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.078423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.079280]  ? __kthread_parkme+0x82/0x160
[   28.080052]  ? preempt_count_sub+0x50/0x80
[   28.080366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.080860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.081667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.082301]  kthread+0x257/0x310
[   28.082575]  ? __pfx_kthread+0x10/0x10
[   28.083076]  ret_from_fork+0x41/0x80
[   28.083538]  ? __pfx_kthread+0x10/0x10
[   28.084197]  ret_from_fork_asm+0x1a/0x30
[   28.084619]  </TASK>
[   28.085372] 
[   28.085964] Allocated by task 268:
[   28.086364]  kasan_save_stack+0x3d/0x60
[   28.087097]  kasan_save_track+0x18/0x40
[   28.087904]  kasan_save_alloc_info+0x3b/0x50
[   28.088367]  __kasan_kmalloc+0xb7/0xc0
[   28.088763]  __kmalloc_cache_noprof+0x184/0x410
[   28.089219]  kasan_bitops_generic+0x93/0x1c0
[   28.089527]  kunit_try_run_case+0x1b3/0x490
[   28.089847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.090486]  kthread+0x257/0x310
[   28.091148]  ret_from_fork+0x41/0x80
[   28.091441]  ret_from_fork_asm+0x1a/0x30
[   28.091670] 
[   28.092315] The buggy address belongs to the object at ffff888101094760
[   28.092315]  which belongs to the cache kmalloc-16 of size 16
[   28.093613] The buggy address is located 8 bytes inside of
[   28.093613]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   28.094739] 
[   28.095071] The buggy address belongs to the physical page:
[   28.095661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   28.097162] flags: 0x200000000000000(node=0|zone=2)
[   28.097833] page_type: f5(slab)
[   28.098490] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.099346] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.099633] page dumped because: kasan: bad access detected
[   28.100050] 
[   28.100333] Memory state around the buggy address:
[   28.100891]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   28.101342]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   28.102107] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.102558]                                                           ^
[   28.103695]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.104506]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.105131] ==================================================================
[   28.343378] ==================================================================
[   28.344101] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   28.344779] Read of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   28.345595] 
[   28.345995] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.347111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.347684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.348806] Call Trace:
[   28.349431]  <TASK>
[   28.349857]  dump_stack_lvl+0x73/0xb0
[   28.350481]  print_report+0xd1/0x640
[   28.351042]  ? __virt_addr_valid+0x1db/0x2d0
[   28.351625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.352404]  kasan_report+0x102/0x140
[   28.352797]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   28.353589]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   28.354493]  kasan_check_range+0x10c/0x1c0
[   28.355095]  __kasan_check_read+0x15/0x20
[   28.355643]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   28.356280]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.357098]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.357671]  ? trace_hardirqs_on+0x37/0xe0
[   28.358213]  ? kasan_bitops_generic+0x93/0x1c0
[   28.358798]  kasan_bitops_generic+0x122/0x1c0
[   28.359439]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.360082]  ? __pfx_read_tsc+0x10/0x10
[   28.360544]  ? ktime_get_ts64+0x86/0x230
[   28.361216]  kunit_try_run_case+0x1b3/0x490
[   28.361794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.362505]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.363150]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.363866]  ? __kthread_parkme+0x82/0x160
[   28.364427]  ? preempt_count_sub+0x50/0x80
[   28.364979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.365595]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.366338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.367035]  kthread+0x257/0x310
[   28.367444]  ? __pfx_kthread+0x10/0x10
[   28.368054]  ret_from_fork+0x41/0x80
[   28.368546]  ? __pfx_kthread+0x10/0x10
[   28.369115]  ret_from_fork_asm+0x1a/0x30
[   28.369669]  </TASK>
[   28.370155] 
[   28.370348] Allocated by task 268:
[   28.370767]  kasan_save_stack+0x3d/0x60
[   28.371119]  kasan_save_track+0x18/0x40
[   28.371662]  kasan_save_alloc_info+0x3b/0x50
[   28.372008]  __kasan_kmalloc+0xb7/0xc0
[   28.372716]  __kmalloc_cache_noprof+0x184/0x410
[   28.373092]  kasan_bitops_generic+0x93/0x1c0
[   28.373731]  kunit_try_run_case+0x1b3/0x490
[   28.374359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.375052]  kthread+0x257/0x310
[   28.375480]  ret_from_fork+0x41/0x80
[   28.375952]  ret_from_fork_asm+0x1a/0x30
[   28.376524] 
[   28.376860] The buggy address belongs to the object at ffff888101094760
[   28.376860]  which belongs to the cache kmalloc-16 of size 16
[   28.378123] The buggy address is located 8 bytes inside of
[   28.378123]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   28.379339] 
[   28.379633] The buggy address belongs to the physical page:
[   28.380446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   28.381217] flags: 0x200000000000000(node=0|zone=2)
[   28.381699] page_type: f5(slab)
[   28.382298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.383121] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.383963] page dumped because: kasan: bad access detected
[   28.384498] 
[   28.384865] Memory state around the buggy address:
[   28.385442]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   28.386122]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   28.386934] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.387548]                                                           ^
[   28.388293]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.389038]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.389640] ==================================================================
[   28.291654] ==================================================================
[   28.292741] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   28.293815] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   28.294502] 
[   28.294769] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.295750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.296090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.296938] Call Trace:
[   28.297189]  <TASK>
[   28.297489]  dump_stack_lvl+0x73/0xb0
[   28.297840]  print_report+0xd1/0x640
[   28.298364]  ? __virt_addr_valid+0x1db/0x2d0
[   28.299037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.299468]  kasan_report+0x102/0x140
[   28.300136]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   28.300664]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   28.301325]  kasan_check_range+0x10c/0x1c0
[   28.301936]  __kasan_check_write+0x18/0x20
[   28.302633]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   28.304074]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.304592]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.305047]  ? trace_hardirqs_on+0x37/0xe0
[   28.305563]  ? kasan_bitops_generic+0x93/0x1c0
[   28.306830]  kasan_bitops_generic+0x122/0x1c0
[   28.307131]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.307721]  ? __pfx_read_tsc+0x10/0x10
[   28.308304]  ? ktime_get_ts64+0x86/0x230
[   28.309069]  kunit_try_run_case+0x1b3/0x490
[   28.309952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.310478]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.310974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.311504]  ? __kthread_parkme+0x82/0x160
[   28.311931]  ? preempt_count_sub+0x50/0x80
[   28.313500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.314657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.315440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.316149]  kthread+0x257/0x310
[   28.316503]  ? __pfx_kthread+0x10/0x10
[   28.317190]  ret_from_fork+0x41/0x80
[   28.317744]  ? __pfx_kthread+0x10/0x10
[   28.318330]  ret_from_fork_asm+0x1a/0x30
[   28.318955]  </TASK>
[   28.319291] 
[   28.319767] Allocated by task 268:
[   28.320087]  kasan_save_stack+0x3d/0x60
[   28.320514]  kasan_save_track+0x18/0x40
[   28.321386]  kasan_save_alloc_info+0x3b/0x50
[   28.321782]  __kasan_kmalloc+0xb7/0xc0
[   28.322143]  __kmalloc_cache_noprof+0x184/0x410
[   28.322966]  kasan_bitops_generic+0x93/0x1c0
[   28.323449]  kunit_try_run_case+0x1b3/0x490
[   28.324350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.325237]  kthread+0x257/0x310
[   28.325592]  ret_from_fork+0x41/0x80
[   28.325926]  ret_from_fork_asm+0x1a/0x30
[   28.326618] 
[   28.326980] The buggy address belongs to the object at ffff888101094760
[   28.326980]  which belongs to the cache kmalloc-16 of size 16
[   28.328378] The buggy address is located 8 bytes inside of
[   28.328378]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   28.329823] 
[   28.330276] The buggy address belongs to the physical page:
[   28.331423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   28.332159] flags: 0x200000000000000(node=0|zone=2)
[   28.332981] page_type: f5(slab)
[   28.333597] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.334437] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.335326] page dumped because: kasan: bad access detected
[   28.336125] 
[   28.336357] Memory state around the buggy address:
[   28.337461]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   28.338080]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   28.338703] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.339392]                                                           ^
[   28.340117]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.340957]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.341715] ==================================================================
[   28.390920] ==================================================================
[   28.391622] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   28.392683] Read of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   28.393786] 
[   28.393982] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.395039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.395332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.396783] Call Trace:
[   28.397283]  <TASK>
[   28.397689]  dump_stack_lvl+0x73/0xb0
[   28.398222]  print_report+0xd1/0x640
[   28.398844]  ? __virt_addr_valid+0x1db/0x2d0
[   28.399443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.400238]  kasan_report+0x102/0x140
[   28.400678]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   28.401414]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   28.402149]  __asan_report_load8_noabort+0x18/0x20
[   28.402708]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   28.403446]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.404243]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.404803]  ? trace_hardirqs_on+0x37/0xe0
[   28.405346]  ? kasan_bitops_generic+0x93/0x1c0
[   28.405975]  kasan_bitops_generic+0x122/0x1c0
[   28.406438]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.407009]  ? __pfx_read_tsc+0x10/0x10
[   28.407534]  ? ktime_get_ts64+0x86/0x230
[   28.408036]  kunit_try_run_case+0x1b3/0x490
[   28.408642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.409192]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.409979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.410696]  ? __kthread_parkme+0x82/0x160
[   28.411181]  ? preempt_count_sub+0x50/0x80
[   28.411815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.412436]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.413063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.413684]  kthread+0x257/0x310
[   28.414201]  ? __pfx_kthread+0x10/0x10
[   28.414716]  ret_from_fork+0x41/0x80
[   28.415320]  ? __pfx_kthread+0x10/0x10
[   28.415873]  ret_from_fork_asm+0x1a/0x30
[   28.416400]  </TASK>
[   28.416865] 
[   28.417022] Allocated by task 268:
[   28.417656]  kasan_save_stack+0x3d/0x60
[   28.418188]  kasan_save_track+0x18/0x40
[   28.418794]  kasan_save_alloc_info+0x3b/0x50
[   28.419312]  __kasan_kmalloc+0xb7/0xc0
[   28.419875]  __kmalloc_cache_noprof+0x184/0x410
[   28.420427]  kasan_bitops_generic+0x93/0x1c0
[   28.420852]  kunit_try_run_case+0x1b3/0x490
[   28.421120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.421887]  kthread+0x257/0x310
[   28.422141]  ret_from_fork+0x41/0x80
[   28.422585]  ret_from_fork_asm+0x1a/0x30
[   28.423424] 
[   28.423613] The buggy address belongs to the object at ffff888101094760
[   28.423613]  which belongs to the cache kmalloc-16 of size 16
[   28.425111] The buggy address is located 8 bytes inside of
[   28.425111]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   28.426362] 
[   28.426614] The buggy address belongs to the physical page:
[   28.427399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   28.428227] flags: 0x200000000000000(node=0|zone=2)
[   28.428885] page_type: f5(slab)
[   28.429416] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.430282] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.431041] page dumped because: kasan: bad access detected
[   28.431662] 
[   28.431960] Memory state around the buggy address:
[   28.432488]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   28.433159]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   28.433891] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.434365]                                                           ^
[   28.434983]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.435590]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.436347] ==================================================================
[   28.154335] ==================================================================
[   28.154834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   28.155890] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   28.156440] 
[   28.156716] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.157836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.158309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.159142] Call Trace:
[   28.159541]  <TASK>
[   28.159959]  dump_stack_lvl+0x73/0xb0
[   28.160296]  print_report+0xd1/0x640
[   28.160896]  ? __virt_addr_valid+0x1db/0x2d0
[   28.161441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.161965]  kasan_report+0x102/0x140
[   28.162513]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   28.163153]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   28.163812]  kasan_check_range+0x10c/0x1c0
[   28.164443]  __kasan_check_write+0x18/0x20
[   28.165292]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   28.165560]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.166013]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.166696]  ? trace_hardirqs_on+0x37/0xe0
[   28.167156]  ? kasan_bitops_generic+0x93/0x1c0
[   28.167645]  kasan_bitops_generic+0x122/0x1c0
[   28.168303]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.168851]  ? __pfx_read_tsc+0x10/0x10
[   28.169412]  ? ktime_get_ts64+0x86/0x230
[   28.169993]  kunit_try_run_case+0x1b3/0x490
[   28.170490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.171092]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.171687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.172188]  ? __kthread_parkme+0x82/0x160
[   28.172730]  ? preempt_count_sub+0x50/0x80
[   28.173133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.173700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.174233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.174928]  kthread+0x257/0x310
[   28.175254]  ? __pfx_kthread+0x10/0x10
[   28.175801]  ret_from_fork+0x41/0x80
[   28.176204]  ? __pfx_kthread+0x10/0x10
[   28.176608]  ret_from_fork_asm+0x1a/0x30
[   28.177202]  </TASK>
[   28.177488] 
[   28.177792] Allocated by task 268:
[   28.178242]  kasan_save_stack+0x3d/0x60
[   28.178703]  kasan_save_track+0x18/0x40
[   28.179190]  kasan_save_alloc_info+0x3b/0x50
[   28.179716]  __kasan_kmalloc+0xb7/0xc0
[   28.180236]  __kmalloc_cache_noprof+0x184/0x410
[   28.180726]  kasan_bitops_generic+0x93/0x1c0
[   28.181350]  kunit_try_run_case+0x1b3/0x490
[   28.181806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.182436]  kthread+0x257/0x310
[   28.182811]  ret_from_fork+0x41/0x80
[   28.183189]  ret_from_fork_asm+0x1a/0x30
[   28.183810] 
[   28.184097] The buggy address belongs to the object at ffff888101094760
[   28.184097]  which belongs to the cache kmalloc-16 of size 16
[   28.185034] The buggy address is located 8 bytes inside of
[   28.185034]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   28.186300] 
[   28.186558] The buggy address belongs to the physical page:
[   28.187176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   28.187929] flags: 0x200000000000000(node=0|zone=2)
[   28.188454] page_type: f5(slab)
[   28.188862] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.189652] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.190470] page dumped because: kasan: bad access detected
[   28.191129] 
[   28.191324] Memory state around the buggy address:
[   28.191908]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   28.192643]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   28.193299] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.194122]                                                           ^
[   28.194799]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.195495]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.196214] ==================================================================
[   28.197533] ==================================================================
[   28.198014] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   28.199148] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268
[   28.199887] 
[   28.200187] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.201497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.201971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.202794] Call Trace:
[   28.203055]  <TASK>
[   28.203564]  dump_stack_lvl+0x73/0xb0
[   28.204217]  print_report+0xd1/0x640
[   28.205044]  ? __virt_addr_valid+0x1db/0x2d0
[   28.205625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.206380]  kasan_report+0x102/0x140
[   28.206889]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   28.207925]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   28.208679]  kasan_check_range+0x10c/0x1c0
[   28.209283]  __kasan_check_write+0x18/0x20
[   28.210005]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   28.210727]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.211488]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.212078]  ? trace_hardirqs_on+0x37/0xe0
[   28.212642]  ? kasan_bitops_generic+0x93/0x1c0
[   28.213226]  kasan_bitops_generic+0x122/0x1c0
[   28.213712]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.214377]  ? __pfx_read_tsc+0x10/0x10
[   28.214965]  ? ktime_get_ts64+0x86/0x230
[   28.215429]  kunit_try_run_case+0x1b3/0x490
[   28.215940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.216510]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.216972]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.217642]  ? __kthread_parkme+0x82/0x160
[   28.218120]  ? preempt_count_sub+0x50/0x80
[   28.218529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.219108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.219795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.220302]  kthread+0x257/0x310
[   28.220789]  ? __pfx_kthread+0x10/0x10
[   28.221175]  ret_from_fork+0x41/0x80
[   28.221564]  ? __pfx_kthread+0x10/0x10
[   28.221964]  ret_from_fork_asm+0x1a/0x30
[   28.222531]  </TASK>
[   28.222931] 
[   28.223187] Allocated by task 268:
[   28.223613]  kasan_save_stack+0x3d/0x60
[   28.224092]  kasan_save_track+0x18/0x40
[   28.224551]  kasan_save_alloc_info+0x3b/0x50
[   28.225134]  __kasan_kmalloc+0xb7/0xc0
[   28.225497]  __kmalloc_cache_noprof+0x184/0x410
[   28.226066]  kasan_bitops_generic+0x93/0x1c0
[   28.226500]  kunit_try_run_case+0x1b3/0x490
[   28.227106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.228009]  kthread+0x257/0x310
[   28.228247]  ret_from_fork+0x41/0x80
[   28.229331]  ret_from_fork_asm+0x1a/0x30
[   28.230005] 
[   28.230169] The buggy address belongs to the object at ffff888101094760
[   28.230169]  which belongs to the cache kmalloc-16 of size 16
[   28.231391] The buggy address is located 8 bytes inside of
[   28.231391]  allocated 9-byte region [ffff888101094760, ffff888101094769)
[   28.233154] 
[   28.233583] The buggy address belongs to the physical page:
[   28.234097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   28.235606] flags: 0x200000000000000(node=0|zone=2)
[   28.236328] page_type: f5(slab)
[   28.236805] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.237745] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.238380] page dumped because: kasan: bad access detected
[   28.239508] 
[   28.239716] Memory state around the buggy address:
[   28.240068]  ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   28.241172]  ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   28.242082] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.243099]                                                           ^
[   28.243641]  ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.244634]  ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.245563] ==================================================================