Hay
Date
Dec. 3, 2024, 11:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   34.488423] ==================================================================
[   34.489444] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   34.490629] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.491744] 
[   34.492491] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.493885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.494482] Hardware name: linux,dummy-virt (DT)
[   34.495134] Call trace:
[   34.495575]  show_stack+0x20/0x38 (C)
[   34.496140]  dump_stack_lvl+0x8c/0xd0
[   34.496728]  print_report+0x118/0x5e0
[   34.497255]  kasan_report+0xc8/0x118
[   34.497786]  __asan_report_load8_noabort+0x20/0x30
[   34.498723]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   34.499584]  kasan_bitops_generic+0x11c/0x1c8
[   34.500356]  kunit_try_run_case+0x14c/0x3d0
[   34.501169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.501913]  kthread+0x24c/0x2d0
[   34.502448]  ret_from_fork+0x10/0x20
[   34.502969] 
[   34.503300] Allocated by task 250:
[   34.504088]  kasan_save_stack+0x3c/0x68
[   34.504738]  kasan_save_track+0x20/0x40
[   34.505394]  kasan_save_alloc_info+0x40/0x58
[   34.506037]  __kasan_kmalloc+0xd4/0xd8
[   34.506623]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.507297]  kasan_bitops_generic+0xa0/0x1c8
[   34.507888]  kunit_try_run_case+0x14c/0x3d0
[   34.508566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.509223]  kthread+0x24c/0x2d0
[   34.509824]  ret_from_fork+0x10/0x20
[   34.510469] 
[   34.510816] The buggy address belongs to the object at fff00000c5732780
[   34.510816]  which belongs to the cache kmalloc-16 of size 16
[   34.512160] The buggy address is located 8 bytes inside of
[   34.512160]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.513506] 
[   34.513943] The buggy address belongs to the physical page:
[   34.514649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.515604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.516464] page_type: f5(slab)
[   34.516944] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.517964] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.518836] page dumped because: kasan: bad access detected
[   34.519552] 
[   34.519868] Memory state around the buggy address:
[   34.520525]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.521371]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.522243] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.523171]                       ^
[   34.523720]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.524754]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.525754] ==================================================================
[   34.449859] ==================================================================
[   34.450733] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.451855] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.452866] 
[   34.453197] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.454440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.455073] Hardware name: linux,dummy-virt (DT)
[   34.455624] Call trace:
[   34.456085]  show_stack+0x20/0x38 (C)
[   34.456686]  dump_stack_lvl+0x8c/0xd0
[   34.457377]  print_report+0x118/0x5e0
[   34.457901]  kasan_report+0xc8/0x118
[   34.458605]  kasan_check_range+0x100/0x1a8
[   34.459226]  __kasan_check_write+0x20/0x30
[   34.459937]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.460853]  kasan_bitops_generic+0x11c/0x1c8
[   34.461557]  kunit_try_run_case+0x14c/0x3d0
[   34.462234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.463008]  kthread+0x24c/0x2d0
[   34.463642]  ret_from_fork+0x10/0x20
[   34.464238] 
[   34.464627] Allocated by task 250:
[   34.465121]  kasan_save_stack+0x3c/0x68
[   34.465655]  kasan_save_track+0x20/0x40
[   34.466288]  kasan_save_alloc_info+0x40/0x58
[   34.466998]  __kasan_kmalloc+0xd4/0xd8
[   34.467599]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.468271]  kasan_bitops_generic+0xa0/0x1c8
[   34.468878]  kunit_try_run_case+0x14c/0x3d0
[   34.469589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.470294]  kthread+0x24c/0x2d0
[   34.470808]  ret_from_fork+0x10/0x20
[   34.471347] 
[   34.471808] The buggy address belongs to the object at fff00000c5732780
[   34.471808]  which belongs to the cache kmalloc-16 of size 16
[   34.473227] The buggy address is located 8 bytes inside of
[   34.473227]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.474573] 
[   34.474904] The buggy address belongs to the physical page:
[   34.475601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.476569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.477395] page_type: f5(slab)
[   34.477978] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.478877] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.479828] page dumped because: kasan: bad access detected
[   34.480597] 
[   34.480925] Memory state around the buggy address:
[   34.481527]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.482566]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.483442] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.484282]                       ^
[   34.484917]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.485875]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.486738] ==================================================================
[   34.527835] ==================================================================
[   34.529003] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   34.530670] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.531572] 
[   34.531987] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.533968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.534261] Hardware name: linux,dummy-virt (DT)
[   34.534769] Call trace:
[   34.535289]  show_stack+0x20/0x38 (C)
[   34.535914]  dump_stack_lvl+0x8c/0xd0
[   34.536631]  print_report+0x118/0x5e0
[   34.537410]  kasan_report+0xc8/0x118
[   34.538008]  __asan_report_load8_noabort+0x20/0x30
[   34.538820]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   34.539702]  kasan_bitops_generic+0x11c/0x1c8
[   34.540463]  kunit_try_run_case+0x14c/0x3d0
[   34.541182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.542221]  kthread+0x24c/0x2d0
[   34.542817]  ret_from_fork+0x10/0x20
[   34.543526] 
[   34.543829] Allocated by task 250:
[   34.544488]  kasan_save_stack+0x3c/0x68
[   34.544967]  kasan_save_track+0x20/0x40
[   34.545601]  kasan_save_alloc_info+0x40/0x58
[   34.546289]  __kasan_kmalloc+0xd4/0xd8
[   34.546767]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.547667]  kasan_bitops_generic+0xa0/0x1c8
[   34.548473]  kunit_try_run_case+0x14c/0x3d0
[   34.549076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.549796]  kthread+0x24c/0x2d0
[   34.550417]  ret_from_fork+0x10/0x20
[   34.551033] 
[   34.551450] The buggy address belongs to the object at fff00000c5732780
[   34.551450]  which belongs to the cache kmalloc-16 of size 16
[   34.552778] The buggy address is located 8 bytes inside of
[   34.552778]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.554105] 
[   34.554491] The buggy address belongs to the physical page:
[   34.555303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.556279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.557129] page_type: f5(slab)
[   34.557613] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.558578] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.559552] page dumped because: kasan: bad access detected
[   34.560243] 
[   34.560563] Memory state around the buggy address:
[   34.561173]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.562070]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.562977] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.563801]                       ^
[   34.564376]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.565144]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.566004] ==================================================================
[   34.253865] ==================================================================
[   34.254716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.256158] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.256974] 
[   34.257404] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.258662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.259190] Hardware name: linux,dummy-virt (DT)
[   34.259958] Call trace:
[   34.260374]  show_stack+0x20/0x38 (C)
[   34.260908]  dump_stack_lvl+0x8c/0xd0
[   34.261531]  print_report+0x118/0x5e0
[   34.262212]  kasan_report+0xc8/0x118
[   34.262880]  __asan_report_load8_noabort+0x20/0x30
[   34.263616]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.264354]  kasan_bitops_generic+0x11c/0x1c8
[   34.264975]  kunit_try_run_case+0x14c/0x3d0
[   34.265670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.266515]  kthread+0x24c/0x2d0
[   34.267111]  ret_from_fork+0x10/0x20
[   34.267725] 
[   34.268101] Allocated by task 250:
[   34.268599]  kasan_save_stack+0x3c/0x68
[   34.269282]  kasan_save_track+0x20/0x40
[   34.269965]  kasan_save_alloc_info+0x40/0x58
[   34.270616]  __kasan_kmalloc+0xd4/0xd8
[   34.271251]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.271921]  kasan_bitops_generic+0xa0/0x1c8
[   34.272600]  kunit_try_run_case+0x14c/0x3d0
[   34.273232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.274017]  kthread+0x24c/0x2d0
[   34.274564]  ret_from_fork+0x10/0x20
[   34.275059] 
[   34.275463] The buggy address belongs to the object at fff00000c5732780
[   34.275463]  which belongs to the cache kmalloc-16 of size 16
[   34.276832] The buggy address is located 8 bytes inside of
[   34.276832]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.278283] 
[   34.278629] The buggy address belongs to the physical page:
[   34.279437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.280350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.281238] page_type: f5(slab)
[   34.281740] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.282769] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.283764] page dumped because: kasan: bad access detected
[   34.284593] 
[   34.284884] Memory state around the buggy address:
[   34.285529]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.286468]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.287357] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.288205]                       ^
[   34.288674]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.289593]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.290574] ==================================================================
[   34.293601] ==================================================================
[   34.294646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.296758] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.297320] 
[   34.298067] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.299455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.299977] Hardware name: linux,dummy-virt (DT)
[   34.300727] Call trace:
[   34.301075]  show_stack+0x20/0x38 (C)
[   34.301847]  dump_stack_lvl+0x8c/0xd0
[   34.302433]  print_report+0x118/0x5e0
[   34.302998]  kasan_report+0xc8/0x118
[   34.303618]  kasan_check_range+0x100/0x1a8
[   34.304215]  __kasan_check_write+0x20/0x30
[   34.304868]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.305721]  kasan_bitops_generic+0x11c/0x1c8
[   34.306308]  kunit_try_run_case+0x14c/0x3d0
[   34.306961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.307927]  kthread+0x24c/0x2d0
[   34.308463]  ret_from_fork+0x10/0x20
[   34.309115] 
[   34.309571] Allocated by task 250:
[   34.310281]  kasan_save_stack+0x3c/0x68
[   34.310870]  kasan_save_track+0x20/0x40
[   34.311528]  kasan_save_alloc_info+0x40/0x58
[   34.312141]  __kasan_kmalloc+0xd4/0xd8
[   34.312700]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.313233]  kasan_bitops_generic+0xa0/0x1c8
[   34.313963]  kunit_try_run_case+0x14c/0x3d0
[   34.314549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.315232]  kthread+0x24c/0x2d0
[   34.315747]  ret_from_fork+0x10/0x20
[   34.316301] 
[   34.316608] The buggy address belongs to the object at fff00000c5732780
[   34.316608]  which belongs to the cache kmalloc-16 of size 16
[   34.317996] The buggy address is located 8 bytes inside of
[   34.317996]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.319406] 
[   34.319735] The buggy address belongs to the physical page:
[   34.320510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.321527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.322418] page_type: f5(slab)
[   34.322973] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.324346] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.325226] page dumped because: kasan: bad access detected
[   34.325933] 
[   34.326243] Memory state around the buggy address:
[   34.326883]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.327827]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.328691] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.329669]                       ^
[   34.330187]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.331093]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.332011] ==================================================================
[   34.333586] ==================================================================
[   34.334273] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.335514] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.336417] 
[   34.336777] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.338098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.338698] Hardware name: linux,dummy-virt (DT)
[   34.339287] Call trace:
[   34.339851]  show_stack+0x20/0x38 (C)
[   34.340436]  dump_stack_lvl+0x8c/0xd0
[   34.341140]  print_report+0x118/0x5e0
[   34.341732]  kasan_report+0xc8/0x118
[   34.342365]  __asan_report_load8_noabort+0x20/0x30
[   34.343223]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.344104]  kasan_bitops_generic+0x11c/0x1c8
[   34.344751]  kunit_try_run_case+0x14c/0x3d0
[   34.345394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.346140]  kthread+0x24c/0x2d0
[   34.346669]  ret_from_fork+0x10/0x20
[   34.347207] 
[   34.347696] Allocated by task 250:
[   34.348238]  kasan_save_stack+0x3c/0x68
[   34.348764]  kasan_save_track+0x20/0x40
[   34.349522]  kasan_save_alloc_info+0x40/0x58
[   34.350229]  __kasan_kmalloc+0xd4/0xd8
[   34.350915]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.351536]  kasan_bitops_generic+0xa0/0x1c8
[   34.352216]  kunit_try_run_case+0x14c/0x3d0
[   34.352814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.353609]  kthread+0x24c/0x2d0
[   34.354220]  ret_from_fork+0x10/0x20
[   34.354789] 
[   34.355076] The buggy address belongs to the object at fff00000c5732780
[   34.355076]  which belongs to the cache kmalloc-16 of size 16
[   34.356527] The buggy address is located 8 bytes inside of
[   34.356527]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.357926] 
[   34.358351] The buggy address belongs to the physical page:
[   34.359016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.360043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.360863] page_type: f5(slab)
[   34.361344] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.362359] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.363259] page dumped because: kasan: bad access detected
[   34.364024] 
[   34.364396] Memory state around the buggy address:
[   34.365008]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.365996]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.366822] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.367675]                       ^
[   34.368205]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.369120]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.370003] ==================================================================
[   34.410450] ==================================================================
[   34.411270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.412225] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.414170] 
[   34.414513] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.416160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.416734] Hardware name: linux,dummy-virt (DT)
[   34.417361] Call trace:
[   34.417813]  show_stack+0x20/0x38 (C)
[   34.418469]  dump_stack_lvl+0x8c/0xd0
[   34.418946]  print_report+0x118/0x5e0
[   34.419690]  kasan_report+0xc8/0x118
[   34.420378]  __asan_report_load8_noabort+0x20/0x30
[   34.421007]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.421808]  kasan_bitops_generic+0x11c/0x1c8
[   34.422508]  kunit_try_run_case+0x14c/0x3d0
[   34.423123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.423835]  kthread+0x24c/0x2d0
[   34.424526]  ret_from_fork+0x10/0x20
[   34.425168] 
[   34.425534] Allocated by task 250:
[   34.426156]  kasan_save_stack+0x3c/0x68
[   34.426684]  kasan_save_track+0x20/0x40
[   34.427308]  kasan_save_alloc_info+0x40/0x58
[   34.427948]  __kasan_kmalloc+0xd4/0xd8
[   34.428544]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.429206]  kasan_bitops_generic+0xa0/0x1c8
[   34.429730]  kunit_try_run_case+0x14c/0x3d0
[   34.430452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.431057]  kthread+0x24c/0x2d0
[   34.431667]  ret_from_fork+0x10/0x20
[   34.432394] 
[   34.432707] The buggy address belongs to the object at fff00000c5732780
[   34.432707]  which belongs to the cache kmalloc-16 of size 16
[   34.434186] The buggy address is located 8 bytes inside of
[   34.434186]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.435615] 
[   34.435901] The buggy address belongs to the physical page:
[   34.436728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.437633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.438512] page_type: f5(slab)
[   34.439092] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.440030] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.441042] page dumped because: kasan: bad access detected
[   34.441805] 
[   34.442160] Memory state around the buggy address:
[   34.442829]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.443677]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.444604] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.445555]                       ^
[   34.446052]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.446944]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.447870] ==================================================================
[   34.215604] ==================================================================
[   34.216504] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.217437] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.218834] 
[   34.219368] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.220565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.221100] Hardware name: linux,dummy-virt (DT)
[   34.221689] Call trace:
[   34.222160]  show_stack+0x20/0x38 (C)
[   34.222736]  dump_stack_lvl+0x8c/0xd0
[   34.223285]  print_report+0x118/0x5e0
[   34.223938]  kasan_report+0xc8/0x118
[   34.224539]  kasan_check_range+0x100/0x1a8
[   34.225107]  __kasan_check_write+0x20/0x30
[   34.225805]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.226597]  kasan_bitops_generic+0x11c/0x1c8
[   34.227220]  kunit_try_run_case+0x14c/0x3d0
[   34.227934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.228770]  kthread+0x24c/0x2d0
[   34.229362]  ret_from_fork+0x10/0x20
[   34.229994] 
[   34.230379] Allocated by task 250:
[   34.230925]  kasan_save_stack+0x3c/0x68
[   34.231478]  kasan_save_track+0x20/0x40
[   34.232044]  kasan_save_alloc_info+0x40/0x58
[   34.232721]  __kasan_kmalloc+0xd4/0xd8
[   34.233285]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.233935]  kasan_bitops_generic+0xa0/0x1c8
[   34.234568]  kunit_try_run_case+0x14c/0x3d0
[   34.235154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.235824]  kthread+0x24c/0x2d0
[   34.236399]  ret_from_fork+0x10/0x20
[   34.236949] 
[   34.237257] The buggy address belongs to the object at fff00000c5732780
[   34.237257]  which belongs to the cache kmalloc-16 of size 16
[   34.238816] The buggy address is located 8 bytes inside of
[   34.238816]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.240092] 
[   34.240414] The buggy address belongs to the physical page:
[   34.241175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.242252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.243028] page_type: f5(slab)
[   34.243661] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.244703] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.245703] page dumped because: kasan: bad access detected
[   34.246402] 
[   34.246727] Memory state around the buggy address:
[   34.247348]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.248168]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.249056] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.249987]                       ^
[   34.250466]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.251361]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.252231] ==================================================================
[   34.372222] ==================================================================
[   34.373049] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.374051] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.374905] 
[   34.375269] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.376549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.377101] Hardware name: linux,dummy-virt (DT)
[   34.377750] Call trace:
[   34.378239]  show_stack+0x20/0x38 (C)
[   34.378796]  dump_stack_lvl+0x8c/0xd0
[   34.379464]  print_report+0x118/0x5e0
[   34.380034]  kasan_report+0xc8/0x118
[   34.380627]  kasan_check_range+0x100/0x1a8
[   34.381258]  __kasan_check_write+0x20/0x30
[   34.382007]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.382906]  kasan_bitops_generic+0x11c/0x1c8
[   34.383535]  kunit_try_run_case+0x14c/0x3d0
[   34.384121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.384896]  kthread+0x24c/0x2d0
[   34.385438]  ret_from_fork+0x10/0x20
[   34.386113] 
[   34.386447] Allocated by task 250:
[   34.386969]  kasan_save_stack+0x3c/0x68
[   34.387695]  kasan_save_track+0x20/0x40
[   34.388119]  kasan_save_alloc_info+0x40/0x58
[   34.388867]  __kasan_kmalloc+0xd4/0xd8
[   34.389416]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.390164]  kasan_bitops_generic+0xa0/0x1c8
[   34.390720]  kunit_try_run_case+0x14c/0x3d0
[   34.391443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.392104]  kthread+0x24c/0x2d0
[   34.392705]  ret_from_fork+0x10/0x20
[   34.393207] 
[   34.393567] The buggy address belongs to the object at fff00000c5732780
[   34.393567]  which belongs to the cache kmalloc-16 of size 16
[   34.394958] The buggy address is located 8 bytes inside of
[   34.394958]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.396230] 
[   34.396564] The buggy address belongs to the physical page:
[   34.397195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.398168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.399099] page_type: f5(slab)
[   34.399588] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.400613] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.401494] page dumped because: kasan: bad access detected
[   34.402253] 
[   34.402588] Memory state around the buggy address:
[   34.403200]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.404096]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.405005] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.405843]                       ^
[   34.406359]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.407266]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.408131] ==================================================================

[   29.487299] ==================================================================
[   29.487888] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   29.488673] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.489208] 
[   29.489428] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.490256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.490739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.491385] Call Trace:
[   29.491731]  <TASK>
[   29.492017]  dump_stack_lvl+0x73/0xb0
[   29.492634]  print_report+0xd1/0x640
[   29.492866]  ? __virt_addr_valid+0x1db/0x2d0
[   29.493172]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.493690]  kasan_report+0x102/0x140
[   29.494105]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   29.494524]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   29.495011]  kasan_check_range+0x10c/0x1c0
[   29.495577]  __kasan_check_write+0x18/0x20
[   29.495855]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   29.496221]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.496980]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.497596]  ? trace_hardirqs_on+0x37/0xe0
[   29.498028]  ? kasan_bitops_generic+0x93/0x1c0
[   29.498645]  kasan_bitops_generic+0x122/0x1c0
[   29.499578]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.500887]  ? __pfx_read_tsc+0x10/0x10
[   29.501306]  ? ktime_get_ts64+0x86/0x230
[   29.502666]  kunit_try_run_case+0x1b3/0x490
[   29.502940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.503558]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.504146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.504741]  ? __kthread_parkme+0x82/0x160
[   29.505128]  ? preempt_count_sub+0x50/0x80
[   29.505458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.506035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.506925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.507541]  kthread+0x257/0x310
[   29.507879]  ? __pfx_kthread+0x10/0x10
[   29.508199]  ret_from_fork+0x41/0x80
[   29.508640]  ? __pfx_kthread+0x10/0x10
[   29.509096]  ret_from_fork_asm+0x1a/0x30
[   29.509912]  </TASK>
[   29.510155] 
[   29.510304] Allocated by task 270:
[   29.510866]  kasan_save_stack+0x3d/0x60
[   29.511432]  kasan_save_track+0x18/0x40
[   29.511696]  kasan_save_alloc_info+0x3b/0x50
[   29.512244]  __kasan_kmalloc+0xb7/0xc0
[   29.512861]  __kmalloc_cache_noprof+0x184/0x410
[   29.513367]  kasan_bitops_generic+0x93/0x1c0
[   29.514016]  kunit_try_run_case+0x1b3/0x490
[   29.514594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.515077]  kthread+0x257/0x310
[   29.515431]  ret_from_fork+0x41/0x80
[   29.515897]  ret_from_fork_asm+0x1a/0x30
[   29.516361] 
[   29.516668] The buggy address belongs to the object at ffff888101adffe0
[   29.516668]  which belongs to the cache kmalloc-16 of size 16
[   29.517599] The buggy address is located 8 bytes inside of
[   29.517599]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.518920] 
[   29.519093] The buggy address belongs to the physical page:
[   29.519551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.520332] flags: 0x200000000000000(node=0|zone=2)
[   29.521119] page_type: f5(slab)
[   29.521353] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.522099] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.522682] page dumped because: kasan: bad access detected
[   29.523273] 
[   29.523542] Memory state around the buggy address:
[   29.524158]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.524887]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.525492] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.526240]                                                           ^
[   29.526769]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.527484]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.527962] ==================================================================
[   29.529338] ==================================================================
[   29.530767] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   29.531466] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.531993] 
[   29.532243] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.532896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.533306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.534219] Call Trace:
[   29.534504]  <TASK>
[   29.534727]  dump_stack_lvl+0x73/0xb0
[   29.535169]  print_report+0xd1/0x640
[   29.535492]  ? __virt_addr_valid+0x1db/0x2d0
[   29.535854]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.536311]  kasan_report+0x102/0x140
[   29.536761]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   29.537296]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   29.537864]  kasan_check_range+0x10c/0x1c0
[   29.538171]  __kasan_check_write+0x18/0x20
[   29.538633]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   29.539208]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.539835]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.540248]  ? trace_hardirqs_on+0x37/0xe0
[   29.540588]  ? kasan_bitops_generic+0x93/0x1c0
[   29.541034]  kasan_bitops_generic+0x122/0x1c0
[   29.541527]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.542012]  ? __pfx_read_tsc+0x10/0x10
[   29.542370]  ? ktime_get_ts64+0x86/0x230
[   29.542799]  kunit_try_run_case+0x1b3/0x490
[   29.543126]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.543539]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.544001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.544540]  ? __kthread_parkme+0x82/0x160
[   29.544893]  ? preempt_count_sub+0x50/0x80
[   29.545251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.545645]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.545986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.546569]  kthread+0x257/0x310
[   29.546947]  ? __pfx_kthread+0x10/0x10
[   29.547365]  ret_from_fork+0x41/0x80
[   29.547766]  ? __pfx_kthread+0x10/0x10
[   29.548126]  ret_from_fork_asm+0x1a/0x30
[   29.548602]  </TASK>
[   29.548794] 
[   29.548928] Allocated by task 270:
[   29.549284]  kasan_save_stack+0x3d/0x60
[   29.549726]  kasan_save_track+0x18/0x40
[   29.550123]  kasan_save_alloc_info+0x3b/0x50
[   29.550409]  __kasan_kmalloc+0xb7/0xc0
[   29.550836]  __kmalloc_cache_noprof+0x184/0x410
[   29.551168]  kasan_bitops_generic+0x93/0x1c0
[   29.551626]  kunit_try_run_case+0x1b3/0x490
[   29.551994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.552390]  kthread+0x257/0x310
[   29.552791]  ret_from_fork+0x41/0x80
[   29.553175]  ret_from_fork_asm+0x1a/0x30
[   29.555307] 
[   29.558428] The buggy address belongs to the object at ffff888101adffe0
[   29.558428]  which belongs to the cache kmalloc-16 of size 16
[   29.559254] The buggy address is located 8 bytes inside of
[   29.559254]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.560250] 
[   29.560947] The buggy address belongs to the physical page:
[   29.561389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.562021] flags: 0x200000000000000(node=0|zone=2)
[   29.562540] page_type: f5(slab)
[   29.562949] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.563518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.564033] page dumped because: kasan: bad access detected
[   29.564658] 
[   29.564859] Memory state around the buggy address:
[   29.565172]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.566092]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.566672] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.567194]                                                           ^
[   29.567841]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.568523]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.568968] ==================================================================
[   29.365594] ==================================================================
[   29.366528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   29.367456] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.368049] 
[   29.368242] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.369408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.370021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.371129] Call Trace:
[   29.371500]  <TASK>
[   29.371836]  dump_stack_lvl+0x73/0xb0
[   29.372338]  print_report+0xd1/0x640
[   29.372802]  ? __virt_addr_valid+0x1db/0x2d0
[   29.373164]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.374130]  kasan_report+0x102/0x140
[   29.374614]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   29.375171]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   29.375620]  kasan_check_range+0x10c/0x1c0
[   29.376170]  __kasan_check_write+0x18/0x20
[   29.376662]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   29.377366]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.377948]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.378216]  ? trace_hardirqs_on+0x37/0xe0
[   29.378726]  ? kasan_bitops_generic+0x93/0x1c0
[   29.379072]  kasan_bitops_generic+0x122/0x1c0
[   29.379544]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.379965]  ? __pfx_read_tsc+0x10/0x10
[   29.380421]  ? ktime_get_ts64+0x86/0x230
[   29.380723]  kunit_try_run_case+0x1b3/0x490
[   29.381244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.381673]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.382189]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.382658]  ? __kthread_parkme+0x82/0x160
[   29.383049]  ? preempt_count_sub+0x50/0x80
[   29.383373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.383872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.384491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.384973]  kthread+0x257/0x310
[   29.385313]  ? __pfx_kthread+0x10/0x10
[   29.385592]  ret_from_fork+0x41/0x80
[   29.386101]  ? __pfx_kthread+0x10/0x10
[   29.386509]  ret_from_fork_asm+0x1a/0x30
[   29.386962]  </TASK>
[   29.387169] 
[   29.387356] Allocated by task 270:
[   29.387776]  kasan_save_stack+0x3d/0x60
[   29.388197]  kasan_save_track+0x18/0x40
[   29.388697]  kasan_save_alloc_info+0x3b/0x50
[   29.388996]  __kasan_kmalloc+0xb7/0xc0
[   29.389423]  __kmalloc_cache_noprof+0x184/0x410
[   29.389836]  kasan_bitops_generic+0x93/0x1c0
[   29.390297]  kunit_try_run_case+0x1b3/0x490
[   29.390631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.390945]  kthread+0x257/0x310
[   29.391298]  ret_from_fork+0x41/0x80
[   29.391849]  ret_from_fork_asm+0x1a/0x30
[   29.392277] 
[   29.392508] The buggy address belongs to the object at ffff888101adffe0
[   29.392508]  which belongs to the cache kmalloc-16 of size 16
[   29.393148] The buggy address is located 8 bytes inside of
[   29.393148]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.394386] 
[   29.394598] The buggy address belongs to the physical page:
[   29.395199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.395601] flags: 0x200000000000000(node=0|zone=2)
[   29.395895] page_type: f5(slab)
[   29.396227] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.396881] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.397531] page dumped because: kasan: bad access detected
[   29.398332] 
[   29.398567] Memory state around the buggy address:
[   29.398829]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.399489]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.399934] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.400482]                                                           ^
[   29.401077]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.401441]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.401790] ==================================================================
[   29.607870] ==================================================================
[   29.608571] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   29.610370] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.611102] 
[   29.611346] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.612164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.612417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.612885] Call Trace:
[   29.613097]  <TASK>
[   29.613411]  dump_stack_lvl+0x73/0xb0
[   29.613967]  print_report+0xd1/0x640
[   29.614425]  ? __virt_addr_valid+0x1db/0x2d0
[   29.614873]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.615466]  kasan_report+0x102/0x140
[   29.615871]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   29.616530]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   29.617133]  kasan_check_range+0x10c/0x1c0
[   29.617632]  __kasan_check_write+0x18/0x20
[   29.618092]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   29.618731]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.619225]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.619577]  ? trace_hardirqs_on+0x37/0xe0
[   29.619940]  ? kasan_bitops_generic+0x93/0x1c0
[   29.620479]  kasan_bitops_generic+0x122/0x1c0
[   29.620994]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.621846]  ? __pfx_read_tsc+0x10/0x10
[   29.622299]  ? ktime_get_ts64+0x86/0x230
[   29.622770]  kunit_try_run_case+0x1b3/0x490
[   29.623515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.623895]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.624385]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.625543]  ? __kthread_parkme+0x82/0x160
[   29.625980]  ? preempt_count_sub+0x50/0x80
[   29.626297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.626832]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.627934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.628246]  kthread+0x257/0x310
[   29.628892]  ? __pfx_kthread+0x10/0x10
[   29.629365]  ret_from_fork+0x41/0x80
[   29.629832]  ? __pfx_kthread+0x10/0x10
[   29.630249]  ret_from_fork_asm+0x1a/0x30
[   29.630794]  </TASK>
[   29.631082] 
[   29.631282] Allocated by task 270:
[   29.631733]  kasan_save_stack+0x3d/0x60
[   29.632035]  kasan_save_track+0x18/0x40
[   29.632525]  kasan_save_alloc_info+0x3b/0x50
[   29.632985]  __kasan_kmalloc+0xb7/0xc0
[   29.633389]  __kmalloc_cache_noprof+0x184/0x410
[   29.633945]  kasan_bitops_generic+0x93/0x1c0
[   29.634380]  kunit_try_run_case+0x1b3/0x490
[   29.634751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.635265]  kthread+0x257/0x310
[   29.635684]  ret_from_fork+0x41/0x80
[   29.636086]  ret_from_fork_asm+0x1a/0x30
[   29.636594] 
[   29.636793] The buggy address belongs to the object at ffff888101adffe0
[   29.636793]  which belongs to the cache kmalloc-16 of size 16
[   29.637806] The buggy address is located 8 bytes inside of
[   29.637806]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.638735] 
[   29.638986] The buggy address belongs to the physical page:
[   29.639488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.640138] flags: 0x200000000000000(node=0|zone=2)
[   29.640707] page_type: f5(slab)
[   29.641135] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.641643] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.642412] page dumped because: kasan: bad access detected
[   29.642945] 
[   29.643257] Memory state around the buggy address:
[   29.643805]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.644700]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.645380] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.645934]                                                           ^
[   29.646743]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.647424]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.647963] ==================================================================
[   29.446156] ==================================================================
[   29.446802] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   29.447776] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.448521] 
[   29.448877] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.449589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.449980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.451011] Call Trace:
[   29.451272]  <TASK>
[   29.451598]  dump_stack_lvl+0x73/0xb0
[   29.452037]  print_report+0xd1/0x640
[   29.452663]  ? __virt_addr_valid+0x1db/0x2d0
[   29.453192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.453828]  kasan_report+0x102/0x140
[   29.454110]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   29.454710]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   29.455584]  kasan_check_range+0x10c/0x1c0
[   29.456028]  __kasan_check_write+0x18/0x20
[   29.456593]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   29.457209]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.457816]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.458481]  ? trace_hardirqs_on+0x37/0xe0
[   29.458998]  ? kasan_bitops_generic+0x93/0x1c0
[   29.459360]  kasan_bitops_generic+0x122/0x1c0
[   29.460018]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.460626]  ? __pfx_read_tsc+0x10/0x10
[   29.461139]  ? ktime_get_ts64+0x86/0x230
[   29.461571]  kunit_try_run_case+0x1b3/0x490
[   29.462126]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.462654]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.463243]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.463723]  ? __kthread_parkme+0x82/0x160
[   29.464196]  ? preempt_count_sub+0x50/0x80
[   29.464674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.465146]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.465741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.466283]  kthread+0x257/0x310
[   29.466856]  ? __pfx_kthread+0x10/0x10
[   29.467185]  ret_from_fork+0x41/0x80
[   29.467702]  ? __pfx_kthread+0x10/0x10
[   29.468203]  ret_from_fork_asm+0x1a/0x30
[   29.468800]  </TASK>
[   29.469092] 
[   29.469389] Allocated by task 270:
[   29.469740]  kasan_save_stack+0x3d/0x60
[   29.470269]  kasan_save_track+0x18/0x40
[   29.470773]  kasan_save_alloc_info+0x3b/0x50
[   29.471213]  __kasan_kmalloc+0xb7/0xc0
[   29.471608]  __kmalloc_cache_noprof+0x184/0x410
[   29.472195]  kasan_bitops_generic+0x93/0x1c0
[   29.472617]  kunit_try_run_case+0x1b3/0x490
[   29.472893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.473393]  kthread+0x257/0x310
[   29.474003]  ret_from_fork+0x41/0x80
[   29.474390]  ret_from_fork_asm+0x1a/0x30
[   29.474979] 
[   29.475362] The buggy address belongs to the object at ffff888101adffe0
[   29.475362]  which belongs to the cache kmalloc-16 of size 16
[   29.476030] The buggy address is located 8 bytes inside of
[   29.476030]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.477211] 
[   29.477364] The buggy address belongs to the physical page:
[   29.477954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.478774] flags: 0x200000000000000(node=0|zone=2)
[   29.479252] page_type: f5(slab)
[   29.479639] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.480391] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.481176] page dumped because: kasan: bad access detected
[   29.481693] 
[   29.481975] Memory state around the buggy address:
[   29.482433]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.483140]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.483571] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.484175]                                                           ^
[   29.484767]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.485374]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.485921] ==================================================================
[   29.690931] ==================================================================
[   29.691569] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   29.692251] Read of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.692913] 
[   29.693225] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.693860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.694330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.695025] Call Trace:
[   29.695339]  <TASK>
[   29.695704]  dump_stack_lvl+0x73/0xb0
[   29.696148]  print_report+0xd1/0x640
[   29.696585]  ? __virt_addr_valid+0x1db/0x2d0
[   29.697127]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.697679]  kasan_report+0x102/0x140
[   29.698138]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   29.698693]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   29.699333]  __asan_report_load8_noabort+0x18/0x20
[   29.699916]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   29.700424]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.701102]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.701551]  ? trace_hardirqs_on+0x37/0xe0
[   29.702066]  ? kasan_bitops_generic+0x93/0x1c0
[   29.702504]  kasan_bitops_generic+0x122/0x1c0
[   29.703026]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.703527]  ? __pfx_read_tsc+0x10/0x10
[   29.704000]  ? ktime_get_ts64+0x86/0x230
[   29.704466]  kunit_try_run_case+0x1b3/0x490
[   29.704900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.705318]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.705806]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.706219]  ? __kthread_parkme+0x82/0x160
[   29.706644]  ? preempt_count_sub+0x50/0x80
[   29.706983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.707630]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.708072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.708698]  kthread+0x257/0x310
[   29.709026]  ? __pfx_kthread+0x10/0x10
[   29.709494]  ret_from_fork+0x41/0x80
[   29.709846]  ? __pfx_kthread+0x10/0x10
[   29.710132]  ret_from_fork_asm+0x1a/0x30
[   29.710429]  </TASK>
[   29.710775] 
[   29.711416] Allocated by task 270:
[   29.712258]  kasan_save_stack+0x3d/0x60
[   29.712700]  kasan_save_track+0x18/0x40
[   29.712937]  kasan_save_alloc_info+0x3b/0x50
[   29.714007]  __kasan_kmalloc+0xb7/0xc0
[   29.714415]  __kmalloc_cache_noprof+0x184/0x410
[   29.714787]  kasan_bitops_generic+0x93/0x1c0
[   29.715234]  kunit_try_run_case+0x1b3/0x490
[   29.715752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.716309]  kthread+0x257/0x310
[   29.717110]  ret_from_fork+0x41/0x80
[   29.717614]  ret_from_fork_asm+0x1a/0x30
[   29.717880] 
[   29.718145] The buggy address belongs to the object at ffff888101adffe0
[   29.718145]  which belongs to the cache kmalloc-16 of size 16
[   29.719027] The buggy address is located 8 bytes inside of
[   29.719027]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.719996] 
[   29.720526] The buggy address belongs to the physical page:
[   29.721411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.721800] flags: 0x200000000000000(node=0|zone=2)
[   29.722199] page_type: f5(slab)
[   29.723026] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.723991] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.724478] page dumped because: kasan: bad access detected
[   29.725046] 
[   29.725318] Memory state around the buggy address:
[   29.726043]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.727105]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.727631] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.728156]                                                           ^
[   29.729135]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.729800]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.730347] ==================================================================
[   29.570654] ==================================================================
[   29.571327] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   29.572030] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.572595] 
[   29.572863] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.573684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.574105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.574741] Call Trace:
[   29.574993]  <TASK>
[   29.575311]  dump_stack_lvl+0x73/0xb0
[   29.575751]  print_report+0xd1/0x640
[   29.576208]  ? __virt_addr_valid+0x1db/0x2d0
[   29.576662]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.577088]  kasan_report+0x102/0x140
[   29.577527]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   29.578112]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   29.578737]  kasan_check_range+0x10c/0x1c0
[   29.579190]  __kasan_check_write+0x18/0x20
[   29.579536]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   29.580152]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.580632]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.581134]  ? trace_hardirqs_on+0x37/0xe0
[   29.581625]  ? kasan_bitops_generic+0x93/0x1c0
[   29.581976]  kasan_bitops_generic+0x122/0x1c0
[   29.582498]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.582913]  ? __pfx_read_tsc+0x10/0x10
[   29.583323]  ? ktime_get_ts64+0x86/0x230
[   29.583805]  kunit_try_run_case+0x1b3/0x490
[   29.584173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.584644]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.585121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.585717]  ? __kthread_parkme+0x82/0x160
[   29.586087]  ? preempt_count_sub+0x50/0x80
[   29.586586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.586903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.587286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.587888]  kthread+0x257/0x310
[   29.588308]  ? __pfx_kthread+0x10/0x10
[   29.588789]  ret_from_fork+0x41/0x80
[   29.589224]  ? __pfx_kthread+0x10/0x10
[   29.589680]  ret_from_fork_asm+0x1a/0x30
[   29.590074]  </TASK>
[   29.590346] 
[   29.590629] Allocated by task 270:
[   29.590874]  kasan_save_stack+0x3d/0x60
[   29.591154]  kasan_save_track+0x18/0x40
[   29.591406]  kasan_save_alloc_info+0x3b/0x50
[   29.591701]  __kasan_kmalloc+0xb7/0xc0
[   29.591947]  __kmalloc_cache_noprof+0x184/0x410
[   29.592426]  kasan_bitops_generic+0x93/0x1c0
[   29.592853]  kunit_try_run_case+0x1b3/0x490
[   29.593376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.593922]  kthread+0x257/0x310
[   29.594277]  ret_from_fork+0x41/0x80
[   29.594761]  ret_from_fork_asm+0x1a/0x30
[   29.595214] 
[   29.595423] The buggy address belongs to the object at ffff888101adffe0
[   29.595423]  which belongs to the cache kmalloc-16 of size 16
[   29.596471] The buggy address is located 8 bytes inside of
[   29.596471]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.597320] 
[   29.597518] The buggy address belongs to the physical page:
[   29.597817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.598392] flags: 0x200000000000000(node=0|zone=2)
[   29.598981] page_type: f5(slab)
[   29.599384] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.600092] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.600793] page dumped because: kasan: bad access detected
[   29.601325] 
[   29.601560] Memory state around the buggy address:
[   29.601892]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.602376]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.602887] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.603542]                                                           ^
[   29.604131]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.604728]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.605345] ==================================================================
[   29.402816] ==================================================================
[   29.403518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   29.404366] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.405244] 
[   29.405530] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.406690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.407424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.409330] Call Trace:
[   29.409750]  <TASK>
[   29.411280]  dump_stack_lvl+0x73/0xb0
[   29.412001]  print_report+0xd1/0x640
[   29.412372]  ? __virt_addr_valid+0x1db/0x2d0
[   29.412939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.413417]  kasan_report+0x102/0x140
[   29.413820]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   29.414336]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   29.415039]  kasan_check_range+0x10c/0x1c0
[   29.415558]  __kasan_check_write+0x18/0x20
[   29.416072]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   29.416453]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.417290]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.417640]  ? trace_hardirqs_on+0x37/0xe0
[   29.418345]  ? kasan_bitops_generic+0x93/0x1c0
[   29.418929]  kasan_bitops_generic+0x122/0x1c0
[   29.419643]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.420146]  ? __pfx_read_tsc+0x10/0x10
[   29.420386]  ? ktime_get_ts64+0x86/0x230
[   29.421078]  kunit_try_run_case+0x1b3/0x490
[   29.421628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.422086]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.422594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.423128]  ? __kthread_parkme+0x82/0x160
[   29.423567]  ? preempt_count_sub+0x50/0x80
[   29.424018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.424520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.425099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.425615]  kthread+0x257/0x310
[   29.425988]  ? __pfx_kthread+0x10/0x10
[   29.426410]  ret_from_fork+0x41/0x80
[   29.426953]  ? __pfx_kthread+0x10/0x10
[   29.427352]  ret_from_fork_asm+0x1a/0x30
[   29.427884]  </TASK>
[   29.428227] 
[   29.428375] Allocated by task 270:
[   29.428836]  kasan_save_stack+0x3d/0x60
[   29.429306]  kasan_save_track+0x18/0x40
[   29.429688]  kasan_save_alloc_info+0x3b/0x50
[   29.430160]  __kasan_kmalloc+0xb7/0xc0
[   29.430609]  __kmalloc_cache_noprof+0x184/0x410
[   29.431081]  kasan_bitops_generic+0x93/0x1c0
[   29.431544]  kunit_try_run_case+0x1b3/0x490
[   29.431946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.432563]  kthread+0x257/0x310
[   29.432885]  ret_from_fork+0x41/0x80
[   29.433331]  ret_from_fork_asm+0x1a/0x30
[   29.433794] 
[   29.434027] The buggy address belongs to the object at ffff888101adffe0
[   29.434027]  which belongs to the cache kmalloc-16 of size 16
[   29.434600] The buggy address is located 8 bytes inside of
[   29.434600]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.435671] 
[   29.435890] The buggy address belongs to the physical page:
[   29.436363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.436888] flags: 0x200000000000000(node=0|zone=2)
[   29.437515] page_type: f5(slab)
[   29.437873] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.438567] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.439375] page dumped because: kasan: bad access detected
[   29.439979] 
[   29.440348] Memory state around the buggy address:
[   29.440846]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.441485]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.442093] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.442856]                                                           ^
[   29.443600]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.443965]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.444707] ==================================================================
[   29.649390] ==================================================================
[   29.650169] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   29.651035] Read of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270
[   29.651543] 
[   29.651871] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.652714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.653129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.653901] Call Trace:
[   29.654192]  <TASK>
[   29.654765]  dump_stack_lvl+0x73/0xb0
[   29.655243]  print_report+0xd1/0x640
[   29.655760]  ? __virt_addr_valid+0x1db/0x2d0
[   29.656194]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.656855]  kasan_report+0x102/0x140
[   29.657246]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   29.657919]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   29.658421]  kasan_check_range+0x10c/0x1c0
[   29.658973]  __kasan_check_read+0x15/0x20
[   29.659410]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   29.660065]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.660718]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.661100]  ? trace_hardirqs_on+0x37/0xe0
[   29.661631]  ? kasan_bitops_generic+0x93/0x1c0
[   29.662115]  kasan_bitops_generic+0x122/0x1c0
[   29.662620]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.663079]  ? __pfx_read_tsc+0x10/0x10
[   29.663557]  ? ktime_get_ts64+0x86/0x230
[   29.664037]  kunit_try_run_case+0x1b3/0x490
[   29.664619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.665064]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.665509]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.666141]  ? __kthread_parkme+0x82/0x160
[   29.666630]  ? preempt_count_sub+0x50/0x80
[   29.667000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.667643]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.668263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.668811]  kthread+0x257/0x310
[   29.669285]  ? __pfx_kthread+0x10/0x10
[   29.669784]  ret_from_fork+0x41/0x80
[   29.670261]  ? __pfx_kthread+0x10/0x10
[   29.670688]  ret_from_fork_asm+0x1a/0x30
[   29.670990]  </TASK>
[   29.671281] 
[   29.671502] Allocated by task 270:
[   29.671849]  kasan_save_stack+0x3d/0x60
[   29.672267]  kasan_save_track+0x18/0x40
[   29.672655]  kasan_save_alloc_info+0x3b/0x50
[   29.673049]  __kasan_kmalloc+0xb7/0xc0
[   29.673729]  __kmalloc_cache_noprof+0x184/0x410
[   29.674024]  kasan_bitops_generic+0x93/0x1c0
[   29.674311]  kunit_try_run_case+0x1b3/0x490
[   29.674575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.675109]  kthread+0x257/0x310
[   29.675468]  ret_from_fork+0x41/0x80
[   29.675854]  ret_from_fork_asm+0x1a/0x30
[   29.676275] 
[   29.676497] The buggy address belongs to the object at ffff888101adffe0
[   29.676497]  which belongs to the cache kmalloc-16 of size 16
[   29.678304] The buggy address is located 8 bytes inside of
[   29.678304]  allocated 9-byte region [ffff888101adffe0, ffff888101adffe9)
[   29.679792] 
[   29.680175] The buggy address belongs to the physical page:
[   29.680505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf
[   29.681190] flags: 0x200000000000000(node=0|zone=2)
[   29.681820] page_type: f5(slab)
[   29.682265] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.682884] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.683312] page dumped because: kasan: bad access detected
[   29.684117] 
[   29.684264] Memory state around the buggy address:
[   29.684754]  ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   29.685321]  ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   29.685914] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.686574]                                                           ^
[   29.687209]  ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.687702]  ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   29.688314] ==================================================================