Hay
Date
Nov. 20, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   40.404573] ==================================================================
[   40.406187] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   40.407183] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.407952] 
[   40.408355] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.410107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.410693] Hardware name: linux,dummy-virt (DT)
[   40.411331] Call trace:
[   40.411776]  show_stack+0x20/0x38 (C)
[   40.412369]  dump_stack_lvl+0x8c/0xd0
[   40.412868]  print_report+0x118/0x5e0
[   40.413482]  kasan_report+0xc8/0x118
[   40.414057]  __asan_report_load8_noabort+0x20/0x30
[   40.414702]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   40.415600]  kasan_bitops_generic+0x11c/0x1c8
[   40.416133]  kunit_try_run_case+0x14c/0x3d0
[   40.416814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.417485]  kthread+0x24c/0x2d0
[   40.418030]  ret_from_fork+0x10/0x20
[   40.418634] 
[   40.418930] Allocated by task 250:
[   40.419421]  kasan_save_stack+0x3c/0x68
[   40.420025]  kasan_save_track+0x20/0x40
[   40.420586]  kasan_save_alloc_info+0x40/0x58
[   40.421131]  __kasan_kmalloc+0xd4/0xd8
[   40.421722]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.422347]  kasan_bitops_generic+0xa0/0x1c8
[   40.423082]  kunit_try_run_case+0x14c/0x3d0
[   40.423692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.424407]  kthread+0x24c/0x2d0
[   40.424958]  ret_from_fork+0x10/0x20
[   40.425522] 
[   40.425875] The buggy address belongs to the object at fff00000c1bb3c00
[   40.425875]  which belongs to the cache kmalloc-16 of size 16
[   40.426973] The buggy address is located 8 bytes inside of
[   40.426973]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.428160] 
[   40.428532] The buggy address belongs to the physical page:
[   40.429162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.429999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.430793] page_type: f5(slab)
[   40.431291] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.432116] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.432901] page dumped because: kasan: bad access detected
[   40.433609] 
[   40.433950] Memory state around the buggy address:
[   40.434510]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.435302]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.436178] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.436970]                       ^
[   40.437521]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.438251]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.439106] ==================================================================
[   40.661116] ==================================================================
[   40.661814] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   40.662729] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.664087] 
[   40.664479] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.665400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.666000] Hardware name: linux,dummy-virt (DT)
[   40.666621] Call trace:
[   40.666969]  show_stack+0x20/0x38 (C)
[   40.667603]  dump_stack_lvl+0x8c/0xd0
[   40.668167]  print_report+0x118/0x5e0
[   40.668744]  kasan_report+0xc8/0x118
[   40.669236]  __asan_report_load8_noabort+0x20/0x30
[   40.669929]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   40.670586]  kasan_bitops_generic+0x11c/0x1c8
[   40.671231]  kunit_try_run_case+0x14c/0x3d0
[   40.671831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.672592]  kthread+0x24c/0x2d0
[   40.673134]  ret_from_fork+0x10/0x20
[   40.673684] 
[   40.674002] Allocated by task 250:
[   40.674554]  kasan_save_stack+0x3c/0x68
[   40.675093]  kasan_save_track+0x20/0x40
[   40.675635]  kasan_save_alloc_info+0x40/0x58
[   40.676289]  __kasan_kmalloc+0xd4/0xd8
[   40.676871]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.677494]  kasan_bitops_generic+0xa0/0x1c8
[   40.678096]  kunit_try_run_case+0x14c/0x3d0
[   40.678734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.679462]  kthread+0x24c/0x2d0
[   40.679997]  ret_from_fork+0x10/0x20
[   40.680596] 
[   40.680943] The buggy address belongs to the object at fff00000c1bb3c00
[   40.680943]  which belongs to the cache kmalloc-16 of size 16
[   40.682023] The buggy address is located 8 bytes inside of
[   40.682023]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.683331] 
[   40.683706] The buggy address belongs to the physical page:
[   40.684272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.685177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.685977] page_type: f5(slab)
[   40.686514] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.687272] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.688162] page dumped because: kasan: bad access detected
[   40.688797] 
[   40.689149] Memory state around the buggy address:
[   40.689687]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.690526]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.691282] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.692027]                       ^
[   40.692588]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.693316]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.694083] ==================================================================
[   40.478582] ==================================================================
[   40.479367] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   40.481035] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.481769] 
[   40.482165] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.483314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.484416] Hardware name: linux,dummy-virt (DT)
[   40.485234] Call trace:
[   40.485885]  show_stack+0x20/0x38 (C)
[   40.486650]  dump_stack_lvl+0x8c/0xd0
[   40.487361]  print_report+0x118/0x5e0
[   40.488080]  kasan_report+0xc8/0x118
[   40.488799]  __asan_report_load8_noabort+0x20/0x30
[   40.489600]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   40.490491]  kasan_bitops_generic+0x11c/0x1c8
[   40.491070]  kunit_try_run_case+0x14c/0x3d0
[   40.491653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.492313]  kthread+0x24c/0x2d0
[   40.492898]  ret_from_fork+0x10/0x20
[   40.493504] 
[   40.493860] Allocated by task 250:
[   40.494350]  kasan_save_stack+0x3c/0x68
[   40.495020]  kasan_save_track+0x20/0x40
[   40.495560]  kasan_save_alloc_info+0x40/0x58
[   40.496101]  __kasan_kmalloc+0xd4/0xd8
[   40.496674]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.497208]  kasan_bitops_generic+0xa0/0x1c8
[   40.497848]  kunit_try_run_case+0x14c/0x3d0
[   40.498424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.499046]  kthread+0x24c/0x2d0
[   40.499590]  ret_from_fork+0x10/0x20
[   40.500094] 
[   40.500462] The buggy address belongs to the object at fff00000c1bb3c00
[   40.500462]  which belongs to the cache kmalloc-16 of size 16
[   40.501576] The buggy address is located 8 bytes inside of
[   40.501576]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.502792] 
[   40.503154] The buggy address belongs to the physical page:
[   40.503696] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.504673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.505369] page_type: f5(slab)
[   40.505915] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.506665] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.507559] page dumped because: kasan: bad access detected
[   40.508250] 
[   40.508578] Memory state around the buggy address:
[   40.509215]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.509904]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.510776] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.511425]                       ^
[   40.511973]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.512709]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.513562] ==================================================================
[   40.515869] ==================================================================
[   40.516697] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   40.517638] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.518533] 
[   40.518920] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.519857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.520436] Hardware name: linux,dummy-virt (DT)
[   40.521064] Call trace:
[   40.521524]  show_stack+0x20/0x38 (C)
[   40.522028]  dump_stack_lvl+0x8c/0xd0
[   40.522652]  print_report+0x118/0x5e0
[   40.523199]  kasan_report+0xc8/0x118
[   40.523757]  kasan_check_range+0x100/0x1a8
[   40.524320]  __kasan_check_write+0x20/0x30
[   40.525032]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   40.525758]  kasan_bitops_generic+0x11c/0x1c8
[   40.526414]  kunit_try_run_case+0x14c/0x3d0
[   40.527074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.527777]  kthread+0x24c/0x2d0
[   40.528364]  ret_from_fork+0x10/0x20
[   40.528995] 
[   40.529341] Allocated by task 250:
[   40.529855]  kasan_save_stack+0x3c/0x68
[   40.530328]  kasan_save_track+0x20/0x40
[   40.530952]  kasan_save_alloc_info+0x40/0x58
[   40.531490]  __kasan_kmalloc+0xd4/0xd8
[   40.532059]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.532671]  kasan_bitops_generic+0xa0/0x1c8
[   40.533292]  kunit_try_run_case+0x14c/0x3d0
[   40.533844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.534594]  kthread+0x24c/0x2d0
[   40.535191]  ret_from_fork+0x10/0x20
[   40.535769] 
[   40.536072] The buggy address belongs to the object at fff00000c1bb3c00
[   40.536072]  which belongs to the cache kmalloc-16 of size 16
[   40.537259] The buggy address is located 8 bytes inside of
[   40.537259]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.539051] 
[   40.539595] The buggy address belongs to the physical page:
[   40.540228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.541096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.541832] page_type: f5(slab)
[   40.542319] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.543094] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.543927] page dumped because: kasan: bad access detected
[   40.544580] 
[   40.544953] Memory state around the buggy address:
[   40.545500]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.546308]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.547086] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.547775]                       ^
[   40.548327]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.549114]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.549970] ==================================================================
[   40.588965] ==================================================================
[   40.590230] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   40.591327] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.592208] 
[   40.592588] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.593650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.594206] Hardware name: linux,dummy-virt (DT)
[   40.594842] Call trace:
[   40.595266]  show_stack+0x20/0x38 (C)
[   40.595892]  dump_stack_lvl+0x8c/0xd0
[   40.596455]  print_report+0x118/0x5e0
[   40.597058]  kasan_report+0xc8/0x118
[   40.597652]  kasan_check_range+0x100/0x1a8
[   40.598287]  __kasan_check_write+0x20/0x30
[   40.598941]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   40.599718]  kasan_bitops_generic+0x11c/0x1c8
[   40.600371]  kunit_try_run_case+0x14c/0x3d0
[   40.601028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.601710]  kthread+0x24c/0x2d0
[   40.602281]  ret_from_fork+0x10/0x20
[   40.602881] 
[   40.603234] Allocated by task 250:
[   40.603757]  kasan_save_stack+0x3c/0x68
[   40.604361]  kasan_save_track+0x20/0x40
[   40.604912]  kasan_save_alloc_info+0x40/0x58
[   40.605497]  __kasan_kmalloc+0xd4/0xd8
[   40.606020]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.606661]  kasan_bitops_generic+0xa0/0x1c8
[   40.607183]  kunit_try_run_case+0x14c/0x3d0
[   40.607815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.608474]  kthread+0x24c/0x2d0
[   40.608914]  ret_from_fork+0x10/0x20
[   40.609478] 
[   40.609817] The buggy address belongs to the object at fff00000c1bb3c00
[   40.609817]  which belongs to the cache kmalloc-16 of size 16
[   40.610866] The buggy address is located 8 bytes inside of
[   40.610866]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.612049] 
[   40.612407] The buggy address belongs to the physical page:
[   40.613043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.613937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.614684] page_type: f5(slab)
[   40.615187] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.616046] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.616877] page dumped because: kasan: bad access detected
[   40.617529] 
[   40.617869] Memory state around the buggy address:
[   40.618437]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.619296]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.620113] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.620895]                       ^
[   40.621330]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.622092]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.622952] ==================================================================
[   40.442352] ==================================================================
[   40.443106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   40.443991] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.444794] 
[   40.445255] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.446574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.447089] Hardware name: linux,dummy-virt (DT)
[   40.447651] Call trace:
[   40.448015]  show_stack+0x20/0x38 (C)
[   40.448690]  dump_stack_lvl+0x8c/0xd0
[   40.449328]  print_report+0x118/0x5e0
[   40.449878]  kasan_report+0xc8/0x118
[   40.450511]  kasan_check_range+0x100/0x1a8
[   40.451056]  __kasan_check_write+0x20/0x30
[   40.451694]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   40.452454]  kasan_bitops_generic+0x11c/0x1c8
[   40.453108]  kunit_try_run_case+0x14c/0x3d0
[   40.453726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.454507]  kthread+0x24c/0x2d0
[   40.455121]  ret_from_fork+0x10/0x20
[   40.455729] 
[   40.456054] Allocated by task 250:
[   40.456506]  kasan_save_stack+0x3c/0x68
[   40.457118]  kasan_save_track+0x20/0x40
[   40.457728]  kasan_save_alloc_info+0x40/0x58
[   40.458366]  __kasan_kmalloc+0xd4/0xd8
[   40.458921]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.459583]  kasan_bitops_generic+0xa0/0x1c8
[   40.460105]  kunit_try_run_case+0x14c/0x3d0
[   40.460766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.461494]  kthread+0x24c/0x2d0
[   40.462027]  ret_from_fork+0x10/0x20
[   40.462582] 
[   40.462928] The buggy address belongs to the object at fff00000c1bb3c00
[   40.462928]  which belongs to the cache kmalloc-16 of size 16
[   40.464138] The buggy address is located 8 bytes inside of
[   40.464138]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.465419] 
[   40.465788] The buggy address belongs to the physical page:
[   40.466409] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.467263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.468086] page_type: f5(slab)
[   40.468642] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.469572] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.470425] page dumped because: kasan: bad access detected
[   40.471129] 
[   40.471485] Memory state around the buggy address:
[   40.471996]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.472864]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.473632] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.474360]                       ^
[   40.475267]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.476215]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.477187] ==================================================================
[   40.625185] ==================================================================
[   40.625919] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   40.626941] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.627748] 
[   40.628135] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.629268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.629713] Hardware name: linux,dummy-virt (DT)
[   40.630327] Call trace:
[   40.630832]  show_stack+0x20/0x38 (C)
[   40.631432]  dump_stack_lvl+0x8c/0xd0
[   40.631988]  print_report+0x118/0x5e0
[   40.632619]  kasan_report+0xc8/0x118
[   40.633204]  __asan_report_load8_noabort+0x20/0x30
[   40.633899]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   40.634645]  kasan_bitops_generic+0x11c/0x1c8
[   40.635276]  kunit_try_run_case+0x14c/0x3d0
[   40.635852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.636577]  kthread+0x24c/0x2d0
[   40.637019]  ret_from_fork+0x10/0x20
[   40.637633] 
[   40.637951] Allocated by task 250:
[   40.638511]  kasan_save_stack+0x3c/0x68
[   40.639011]  kasan_save_track+0x20/0x40
[   40.639631]  kasan_save_alloc_info+0x40/0x58
[   40.640266]  __kasan_kmalloc+0xd4/0xd8
[   40.640862]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.641546]  kasan_bitops_generic+0xa0/0x1c8
[   40.642095]  kunit_try_run_case+0x14c/0x3d0
[   40.642758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.643415]  kthread+0x24c/0x2d0
[   40.643975]  ret_from_fork+0x10/0x20
[   40.644561] 
[   40.644900] The buggy address belongs to the object at fff00000c1bb3c00
[   40.644900]  which belongs to the cache kmalloc-16 of size 16
[   40.646054] The buggy address is located 8 bytes inside of
[   40.646054]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.647148] 
[   40.647510] The buggy address belongs to the physical page:
[   40.648210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.649119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.649831] page_type: f5(slab)
[   40.650236] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.651581] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.652399] page dumped because: kasan: bad access detected
[   40.652993] 
[   40.653349] Memory state around the buggy address:
[   40.653950]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.654819]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.655544] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.656394]                       ^
[   40.656898]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.657644]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.658461] ==================================================================
[   40.551825] ==================================================================
[   40.552624] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   40.554053] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.555240] 
[   40.555619] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.557455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.557986] Hardware name: linux,dummy-virt (DT)
[   40.558571] Call trace:
[   40.558954]  show_stack+0x20/0x38 (C)
[   40.559859]  dump_stack_lvl+0x8c/0xd0
[   40.560430]  print_report+0x118/0x5e0
[   40.561092]  kasan_report+0xc8/0x118
[   40.561723]  __asan_report_load8_noabort+0x20/0x30
[   40.562306]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   40.563155]  kasan_bitops_generic+0x11c/0x1c8
[   40.563799]  kunit_try_run_case+0x14c/0x3d0
[   40.564434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.565118]  kthread+0x24c/0x2d0
[   40.565672]  ret_from_fork+0x10/0x20
[   40.566284] 
[   40.566683] Allocated by task 250:
[   40.567173]  kasan_save_stack+0x3c/0x68
[   40.567723]  kasan_save_track+0x20/0x40
[   40.568339]  kasan_save_alloc_info+0x40/0x58
[   40.568917]  __kasan_kmalloc+0xd4/0xd8
[   40.569529]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.570143]  kasan_bitops_generic+0xa0/0x1c8
[   40.570817]  kunit_try_run_case+0x14c/0x3d0
[   40.571353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.572102]  kthread+0x24c/0x2d0
[   40.572660]  ret_from_fork+0x10/0x20
[   40.573164] 
[   40.573570] The buggy address belongs to the object at fff00000c1bb3c00
[   40.573570]  which belongs to the cache kmalloc-16 of size 16
[   40.574797] The buggy address is located 8 bytes inside of
[   40.574797]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.575992] 
[   40.576377] The buggy address belongs to the physical page:
[   40.577127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.577911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.578792] page_type: f5(slab)
[   40.579306] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.580197] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.581056] page dumped because: kasan: bad access detected
[   40.581694] 
[   40.582058] Memory state around the buggy address:
[   40.582750]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.583582]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.584392] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.585113]                       ^
[   40.585661]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.586469]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.587223] ==================================================================
[   40.368789] ==================================================================
[   40.369621] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   40.370591] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.371336] 
[   40.371740] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.372912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.373390] Hardware name: linux,dummy-virt (DT)
[   40.374028] Call trace:
[   40.374475]  show_stack+0x20/0x38 (C)
[   40.375124]  dump_stack_lvl+0x8c/0xd0
[   40.375703]  print_report+0x118/0x5e0
[   40.376315]  kasan_report+0xc8/0x118
[   40.376911]  kasan_check_range+0x100/0x1a8
[   40.377550]  __kasan_check_write+0x20/0x30
[   40.378173]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   40.378945]  kasan_bitops_generic+0x11c/0x1c8
[   40.379549]  kunit_try_run_case+0x14c/0x3d0
[   40.380167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.380819]  kthread+0x24c/0x2d0
[   40.381391]  ret_from_fork+0x10/0x20
[   40.382019] 
[   40.382317] Allocated by task 250:
[   40.382858]  kasan_save_stack+0x3c/0x68
[   40.383345]  kasan_save_track+0x20/0x40
[   40.383949]  kasan_save_alloc_info+0x40/0x58
[   40.384578]  __kasan_kmalloc+0xd4/0xd8
[   40.385088]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.385755]  kasan_bitops_generic+0xa0/0x1c8
[   40.386381]  kunit_try_run_case+0x14c/0x3d0
[   40.386971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.387682]  kthread+0x24c/0x2d0
[   40.388222]  ret_from_fork+0x10/0x20
[   40.388806] 
[   40.389111] The buggy address belongs to the object at fff00000c1bb3c00
[   40.389111]  which belongs to the cache kmalloc-16 of size 16
[   40.390291] The buggy address is located 8 bytes inside of
[   40.390291]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.391325] 
[   40.391698] The buggy address belongs to the physical page:
[   40.392397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.393314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.394118] page_type: f5(slab)
[   40.394663] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.395634] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.396358] page dumped because: kasan: bad access detected
[   40.397073] 
[   40.397415] Memory state around the buggy address:
[   40.397912]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.398796]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.399543] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.400334]                       ^
[   40.400888]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.401715]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.402560] ==================================================================

[   32.413346] ==================================================================
[   32.414547] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   32.415413] Read of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   32.416248] 
[   32.416430] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.417372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.417808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.418556] Call Trace:
[   32.418920]  <TASK>
[   32.419123]  dump_stack_lvl+0x73/0xb0
[   32.419533]  print_report+0xd1/0x640
[   32.420573]  ? __virt_addr_valid+0x1db/0x2d0
[   32.421155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.421721]  kasan_report+0x102/0x140
[   32.422167]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   32.422691]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   32.424087]  kasan_check_range+0x10c/0x1c0
[   32.424506]  __kasan_check_read+0x15/0x20
[   32.424923]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   32.425457]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.426538]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.427191]  ? trace_hardirqs_on+0x37/0xe0
[   32.427828]  ? kasan_bitops_generic+0x93/0x1c0
[   32.428377]  kasan_bitops_generic+0x122/0x1c0
[   32.428938]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.429501]  ? __pfx_read_tsc+0x10/0x10
[   32.430085]  ? ktime_get_ts64+0x84/0x230
[   32.430455]  kunit_try_run_case+0x1b3/0x490
[   32.430947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.431416]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.431990]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.432537]  ? __kthread_parkme+0x82/0x160
[   32.433068]  ? preempt_count_sub+0x50/0x80
[   32.433503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.433850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.434717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.435279]  kthread+0x257/0x310
[   32.435802]  ? __pfx_kthread+0x10/0x10
[   32.436267]  ret_from_fork+0x41/0x80
[   32.436684]  ? __pfx_kthread+0x10/0x10
[   32.437244]  ret_from_fork_asm+0x1a/0x30
[   32.437619]  </TASK>
[   32.438016] 
[   32.438290] Allocated by task 268:
[   32.438562]  kasan_save_stack+0x3d/0x60
[   32.439113]  kasan_save_track+0x18/0x40
[   32.439601]  kasan_save_alloc_info+0x3b/0x50
[   32.440315]  __kasan_kmalloc+0xb7/0xc0
[   32.440586]  __kmalloc_cache_noprof+0x184/0x410
[   32.441437]  kasan_bitops_generic+0x93/0x1c0
[   32.442035]  kunit_try_run_case+0x1b3/0x490
[   32.442670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.443183]  kthread+0x257/0x310
[   32.443569]  ret_from_fork+0x41/0x80
[   32.443958]  ret_from_fork_asm+0x1a/0x30
[   32.444539] 
[   32.444917] The buggy address belongs to the object at ffff888101a98520
[   32.444917]  which belongs to the cache kmalloc-16 of size 16
[   32.447063] The buggy address is located 8 bytes inside of
[   32.447063]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   32.448409] 
[   32.448649] The buggy address belongs to the physical page:
[   32.449346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   32.449980] flags: 0x200000000000000(node=0|zone=2)
[   32.450524] page_type: f5(slab)
[   32.450931] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.451825] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.452544] page dumped because: kasan: bad access detected
[   32.453134] 
[   32.453383] Memory state around the buggy address:
[   32.454048]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   32.454654]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   32.455423] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.456302]                                   ^
[   32.456845]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.457576]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.458300] ==================================================================
[   32.232560] ==================================================================
[   32.234808] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   32.235805] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   32.236505] 
[   32.236811] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.238376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.239249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.240597] Call Trace:
[   32.241122]  <TASK>
[   32.241399]  dump_stack_lvl+0x73/0xb0
[   32.241839]  print_report+0xd1/0x640
[   32.242728]  ? __virt_addr_valid+0x1db/0x2d0
[   32.243350]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.243916]  kasan_report+0x102/0x140
[   32.244108]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   32.244369]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   32.244657]  kasan_check_range+0x10c/0x1c0
[   32.245125]  __kasan_check_write+0x18/0x20
[   32.245579]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   32.246342]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.247152]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.247676]  ? trace_hardirqs_on+0x37/0xe0
[   32.248375]  ? kasan_bitops_generic+0x93/0x1c0
[   32.249235]  kasan_bitops_generic+0x122/0x1c0
[   32.249842]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.250454]  ? __pfx_read_tsc+0x10/0x10
[   32.250945]  ? ktime_get_ts64+0x84/0x230
[   32.251327]  kunit_try_run_case+0x1b3/0x490
[   32.252041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.252468]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.252966]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.253470]  ? __kthread_parkme+0x82/0x160
[   32.254259]  ? preempt_count_sub+0x50/0x80
[   32.254761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.255255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.255848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.256374]  kthread+0x257/0x310
[   32.256926]  ? __pfx_kthread+0x10/0x10
[   32.257504]  ret_from_fork+0x41/0x80
[   32.257866]  ? __pfx_kthread+0x10/0x10
[   32.258480]  ret_from_fork_asm+0x1a/0x30
[   32.258927]  </TASK>
[   32.259195] 
[   32.259351] Allocated by task 268:
[   32.259909]  kasan_save_stack+0x3d/0x60
[   32.260176]  kasan_save_track+0x18/0x40
[   32.260468]  kasan_save_alloc_info+0x3b/0x50
[   32.260894]  __kasan_kmalloc+0xb7/0xc0
[   32.261247]  __kmalloc_cache_noprof+0x184/0x410
[   32.261688]  kasan_bitops_generic+0x93/0x1c0
[   32.262137]  kunit_try_run_case+0x1b3/0x490
[   32.262666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.263209]  kthread+0x257/0x310
[   32.263464]  ret_from_fork+0x41/0x80
[   32.263954]  ret_from_fork_asm+0x1a/0x30
[   32.264311] 
[   32.264465] The buggy address belongs to the object at ffff888101a98520
[   32.264465]  which belongs to the cache kmalloc-16 of size 16
[   32.265530] The buggy address is located 8 bytes inside of
[   32.265530]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   32.266496] 
[   32.266812] The buggy address belongs to the physical page:
[   32.267335] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   32.267878] flags: 0x200000000000000(node=0|zone=2)
[   32.268419] page_type: f5(slab)
[   32.268868] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.269328] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.270075] page dumped because: kasan: bad access detected
[   32.270757] 
[   32.270977] Memory state around the buggy address:
[   32.271278]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   32.272068]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   32.272560] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.273356]                                   ^
[   32.274734]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.275355]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.275929] ==================================================================
[   32.369010] ==================================================================
[   32.369837] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   32.370531] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   32.371213] 
[   32.371465] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.372330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.372832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.375502] Call Trace:
[   32.376055]  <TASK>
[   32.376363]  dump_stack_lvl+0x73/0xb0
[   32.377187]  print_report+0xd1/0x640
[   32.377533]  ? __virt_addr_valid+0x1db/0x2d0
[   32.378126]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.378662]  kasan_report+0x102/0x140
[   32.378952]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   32.380256]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   32.380899]  kasan_check_range+0x10c/0x1c0
[   32.381372]  __kasan_check_write+0x18/0x20
[   32.382354]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   32.382817]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.383642]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.384104]  ? trace_hardirqs_on+0x37/0xe0
[   32.384519]  ? kasan_bitops_generic+0x93/0x1c0
[   32.385178]  kasan_bitops_generic+0x122/0x1c0
[   32.385770]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.386634]  ? __pfx_read_tsc+0x10/0x10
[   32.387123]  ? ktime_get_ts64+0x84/0x230
[   32.387570]  kunit_try_run_case+0x1b3/0x490
[   32.388263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.389053]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.389793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.390020]  ? __kthread_parkme+0x82/0x160
[   32.390218]  ? preempt_count_sub+0x50/0x80
[   32.390410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.390625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.391529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.392401]  kthread+0x257/0x310
[   32.393149]  ? __pfx_kthread+0x10/0x10
[   32.393672]  ret_from_fork+0x41/0x80
[   32.394259]  ? __pfx_kthread+0x10/0x10
[   32.394938]  ret_from_fork_asm+0x1a/0x30
[   32.395298]  </TASK>
[   32.395925] 
[   32.396162] Allocated by task 268:
[   32.396558]  kasan_save_stack+0x3d/0x60
[   32.396970]  kasan_save_track+0x18/0x40
[   32.397293]  kasan_save_alloc_info+0x3b/0x50
[   32.398126]  __kasan_kmalloc+0xb7/0xc0
[   32.398408]  __kmalloc_cache_noprof+0x184/0x410
[   32.398987]  kasan_bitops_generic+0x93/0x1c0
[   32.399336]  kunit_try_run_case+0x1b3/0x490
[   32.399853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.400259]  kthread+0x257/0x310
[   32.400755]  ret_from_fork+0x41/0x80
[   32.401126]  ret_from_fork_asm+0x1a/0x30
[   32.401538] 
[   32.401843] The buggy address belongs to the object at ffff888101a98520
[   32.401843]  which belongs to the cache kmalloc-16 of size 16
[   32.402666] The buggy address is located 8 bytes inside of
[   32.402666]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   32.403817] 
[   32.404049] The buggy address belongs to the physical page:
[   32.404486] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   32.405197] flags: 0x200000000000000(node=0|zone=2)
[   32.405533] page_type: f5(slab)
[   32.406011] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.406654] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.407328] page dumped because: kasan: bad access detected
[   32.407880] 
[   32.408099] Memory state around the buggy address:
[   32.408472]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   32.409134]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   32.409770] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.410320]                                   ^
[   32.410849]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.411467]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.412196] ==================================================================
[   32.068259] ==================================================================
[   32.069007] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   32.070659] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   32.072236] 
[   32.072462] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.073395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.074676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.075863] Call Trace:
[   32.076470]  <TASK>
[   32.076795]  dump_stack_lvl+0x73/0xb0
[   32.077803]  print_report+0xd1/0x640
[   32.078650]  ? __virt_addr_valid+0x1db/0x2d0
[   32.079072]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.080019]  kasan_report+0x102/0x140
[   32.080503]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   32.081503]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   32.082755]  kasan_check_range+0x10c/0x1c0
[   32.083313]  __kasan_check_write+0x18/0x20
[   32.083608]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   32.084895]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.085918]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.086412]  ? trace_hardirqs_on+0x37/0xe0
[   32.087159]  ? kasan_bitops_generic+0x93/0x1c0
[   32.088013]  kasan_bitops_generic+0x122/0x1c0
[   32.088461]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.089223]  ? __pfx_read_tsc+0x10/0x10
[   32.089512]  ? ktime_get_ts64+0x84/0x230
[   32.090446]  kunit_try_run_case+0x1b3/0x490
[   32.091183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.091905]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.092556]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.093499]  ? __kthread_parkme+0x82/0x160
[   32.093932]  ? preempt_count_sub+0x50/0x80
[   32.094977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.095410]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.096350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.096869]  kthread+0x257/0x310
[   32.097226]  ? __pfx_kthread+0x10/0x10
[   32.097587]  ret_from_fork+0x41/0x80
[   32.098736]  ? __pfx_kthread+0x10/0x10
[   32.099400]  ret_from_fork_asm+0x1a/0x30
[   32.100063]  </TASK>
[   32.100446] 
[   32.100978] Allocated by task 268:
[   32.101441]  kasan_save_stack+0x3d/0x60
[   32.101860]  kasan_save_track+0x18/0x40
[   32.102764]  kasan_save_alloc_info+0x3b/0x50
[   32.103216]  __kasan_kmalloc+0xb7/0xc0
[   32.103643]  __kmalloc_cache_noprof+0x184/0x410
[   32.104053]  kasan_bitops_generic+0x93/0x1c0
[   32.104507]  kunit_try_run_case+0x1b3/0x490
[   32.105271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.106026]  kthread+0x257/0x310
[   32.106835]  ret_from_fork+0x41/0x80
[   32.107414]  ret_from_fork_asm+0x1a/0x30
[   32.108011] 
[   32.108272] The buggy address belongs to the object at ffff888101a98520
[   32.108272]  which belongs to the cache kmalloc-16 of size 16
[   32.109825] The buggy address is located 8 bytes inside of
[   32.109825]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   32.111981] 
[   32.112619] The buggy address belongs to the physical page:
[   32.113450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   32.114509] flags: 0x200000000000000(node=0|zone=2)
[   32.115797] page_type: f5(slab)
[   32.116196] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.117296] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.118599] page dumped because: kasan: bad access detected
[   32.119320] 
[   32.119519] Memory state around the buggy address:
[   32.120536]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   32.121349]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   32.122062] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.123252]                                   ^
[   32.123916]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.124985]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.125906] ==================================================================
[   32.277374] ==================================================================
[   32.278320] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   32.280023] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   32.281149] 
[   32.281328] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.282268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.283571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.285606] Call Trace:
[   32.286064]  <TASK>
[   32.286253]  dump_stack_lvl+0x73/0xb0
[   32.286792]  print_report+0xd1/0x640
[   32.287166]  ? __virt_addr_valid+0x1db/0x2d0
[   32.287603]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.288479]  kasan_report+0x102/0x140
[   32.288962]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   32.289570]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   32.290215]  kasan_check_range+0x10c/0x1c0
[   32.290770]  __kasan_check_write+0x18/0x20
[   32.291162]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   32.292298]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.292975]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.293468]  ? trace_hardirqs_on+0x37/0xe0
[   32.294144]  ? kasan_bitops_generic+0x93/0x1c0
[   32.294905]  kasan_bitops_generic+0x122/0x1c0
[   32.295537]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.296320]  ? __pfx_read_tsc+0x10/0x10
[   32.296689]  ? ktime_get_ts64+0x84/0x230
[   32.297162]  kunit_try_run_case+0x1b3/0x490
[   32.297579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.298496]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.299212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.300050]  ? __kthread_parkme+0x82/0x160
[   32.300617]  ? preempt_count_sub+0x50/0x80
[   32.301588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.302060]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.302635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.303479]  kthread+0x257/0x310
[   32.304124]  ? __pfx_kthread+0x10/0x10
[   32.304564]  ret_from_fork+0x41/0x80
[   32.305268]  ? __pfx_kthread+0x10/0x10
[   32.305590]  ret_from_fork_asm+0x1a/0x30
[   32.306175]  </TASK>
[   32.306436] 
[   32.307263] Allocated by task 268:
[   32.307571]  kasan_save_stack+0x3d/0x60
[   32.308214]  kasan_save_track+0x18/0x40
[   32.308626]  kasan_save_alloc_info+0x3b/0x50
[   32.309095]  __kasan_kmalloc+0xb7/0xc0
[   32.309490]  __kmalloc_cache_noprof+0x184/0x410
[   32.309970]  kasan_bitops_generic+0x93/0x1c0
[   32.310975]  kunit_try_run_case+0x1b3/0x490
[   32.311478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.312275]  kthread+0x257/0x310
[   32.312828]  ret_from_fork+0x41/0x80
[   32.313609]  ret_from_fork_asm+0x1a/0x30
[   32.314293] 
[   32.314569] The buggy address belongs to the object at ffff888101a98520
[   32.314569]  which belongs to the cache kmalloc-16 of size 16
[   32.315535] The buggy address is located 8 bytes inside of
[   32.315535]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   32.317265] 
[   32.317595] The buggy address belongs to the physical page:
[   32.318354] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   32.319081] flags: 0x200000000000000(node=0|zone=2)
[   32.319608] page_type: f5(slab)
[   32.320687] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.321333] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.322394] page dumped because: kasan: bad access detected
[   32.323218] 
[   32.323592] Memory state around the buggy address:
[   32.324185]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   32.325348]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   32.325948] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.326958]                                   ^
[   32.327554]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.328367]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.328716] ==================================================================
[   32.126751] ==================================================================
[   32.128036] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   32.129823] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   32.130750] 
[   32.131457] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.132572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.133453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.135527] Call Trace:
[   32.135979]  <TASK>
[   32.136109]  dump_stack_lvl+0x73/0xb0
[   32.136842]  print_report+0xd1/0x640
[   32.137472]  ? __virt_addr_valid+0x1db/0x2d0
[   32.138545]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.139579]  kasan_report+0x102/0x140
[   32.140018]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   32.141032]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   32.141956]  kasan_check_range+0x10c/0x1c0
[   32.142651]  __kasan_check_write+0x18/0x20
[   32.143509]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   32.144119]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.145122]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.145855]  ? trace_hardirqs_on+0x37/0xe0
[   32.146718]  ? kasan_bitops_generic+0x93/0x1c0
[   32.147397]  kasan_bitops_generic+0x122/0x1c0
[   32.147866]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.148286]  ? __pfx_read_tsc+0x10/0x10
[   32.148659]  ? ktime_get_ts64+0x84/0x230
[   32.149061]  kunit_try_run_case+0x1b3/0x490
[   32.149486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.150567]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.151683]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.152256]  ? __kthread_parkme+0x82/0x160
[   32.152922]  ? preempt_count_sub+0x50/0x80
[   32.153557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.154150]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.155082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.156067]  kthread+0x257/0x310
[   32.156779]  ? __pfx_kthread+0x10/0x10
[   32.157147]  ret_from_fork+0x41/0x80
[   32.157537]  ? __pfx_kthread+0x10/0x10
[   32.157869]  ret_from_fork_asm+0x1a/0x30
[   32.158626]  </TASK>
[   32.158957] 
[   32.159144] Allocated by task 268:
[   32.159383]  kasan_save_stack+0x3d/0x60
[   32.160021]  kasan_save_track+0x18/0x40
[   32.160339]  kasan_save_alloc_info+0x3b/0x50
[   32.160814]  __kasan_kmalloc+0xb7/0xc0
[   32.161447]  __kmalloc_cache_noprof+0x184/0x410
[   32.161777]  kasan_bitops_generic+0x93/0x1c0
[   32.162506]  kunit_try_run_case+0x1b3/0x490
[   32.163442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.163959]  kthread+0x257/0x310
[   32.164199]  ret_from_fork+0x41/0x80
[   32.164664]  ret_from_fork_asm+0x1a/0x30
[   32.165324] 
[   32.165499] The buggy address belongs to the object at ffff888101a98520
[   32.165499]  which belongs to the cache kmalloc-16 of size 16
[   32.166749] The buggy address is located 8 bytes inside of
[   32.166749]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   32.168062] 
[   32.168270] The buggy address belongs to the physical page:
[   32.168595] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   32.169609] flags: 0x200000000000000(node=0|zone=2)
[   32.170032] page_type: f5(slab)
[   32.170289] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.171364] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.172140] page dumped because: kasan: bad access detected
[   32.172901] 
[   32.173055] Memory state around the buggy address:
[   32.173406]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   32.174536]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   32.175551] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.176015]                                   ^
[   32.176520]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.177212]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.178212] ==================================================================
[   32.178928] ==================================================================
[   32.179659] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   32.180458] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   32.181177] 
[   32.181595] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.182546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.182839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.183819] Call Trace:
[   32.184159]  <TASK>
[   32.184452]  dump_stack_lvl+0x73/0xb0
[   32.184907]  print_report+0xd1/0x640
[   32.185340]  ? __virt_addr_valid+0x1db/0x2d0
[   32.185653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.186412]  kasan_report+0x102/0x140
[   32.186891]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   32.187598]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   32.188526]  kasan_check_range+0x10c/0x1c0
[   32.188906]  __kasan_check_write+0x18/0x20
[   32.189456]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   32.189876]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.190879]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.191561]  ? trace_hardirqs_on+0x37/0xe0
[   32.192244]  ? kasan_bitops_generic+0x93/0x1c0
[   32.192689]  kasan_bitops_generic+0x122/0x1c0
[   32.193093]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.193496]  ? __pfx_read_tsc+0x10/0x10
[   32.194029]  ? ktime_get_ts64+0x84/0x230
[   32.194342]  kunit_try_run_case+0x1b3/0x490
[   32.194650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.195231]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.195729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.196265]  ? __kthread_parkme+0x82/0x160
[   32.196628]  ? preempt_count_sub+0x50/0x80
[   32.196954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.197509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.198435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.199034]  kthread+0x257/0x310
[   32.199313]  ? __pfx_kthread+0x10/0x10
[   32.199597]  ret_from_fork+0x41/0x80
[   32.200089]  ? __pfx_kthread+0x10/0x10
[   32.200930]  ret_from_fork_asm+0x1a/0x30
[   32.201794]  </TASK>
[   32.202071] 
[   32.202557] Allocated by task 268:
[   32.202821]  kasan_save_stack+0x3d/0x60
[   32.203096]  kasan_save_track+0x18/0x40
[   32.203600]  kasan_save_alloc_info+0x3b/0x50
[   32.204138]  __kasan_kmalloc+0xb7/0xc0
[   32.204928]  __kmalloc_cache_noprof+0x184/0x410
[   32.205398]  kasan_bitops_generic+0x93/0x1c0
[   32.205867]  kunit_try_run_case+0x1b3/0x490
[   32.206426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.207064]  kthread+0x257/0x310
[   32.207503]  ret_from_fork+0x41/0x80
[   32.207955]  ret_from_fork_asm+0x1a/0x30
[   32.208378] 
[   32.208611] The buggy address belongs to the object at ffff888101a98520
[   32.208611]  which belongs to the cache kmalloc-16 of size 16
[   32.209393] The buggy address is located 8 bytes inside of
[   32.209393]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   32.212448] 
[   32.212602] The buggy address belongs to the physical page:
[   32.213843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   32.214502] flags: 0x200000000000000(node=0|zone=2)
[   32.215433] page_type: f5(slab)
[   32.216543] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.217816] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.219436] page dumped because: kasan: bad access detected
[   32.220861] 
[   32.221242] Memory state around the buggy address:
[   32.222444]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   32.224139]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   32.225511] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.227406]                                   ^
[   32.227686]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.230071]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.231128] ==================================================================
[   32.459775] ==================================================================
[   32.461250] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   32.462388] Read of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   32.462968] 
[   32.463264] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.464357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.464889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.465595] Call Trace:
[   32.466319]  <TASK>
[   32.466648]  dump_stack_lvl+0x73/0xb0
[   32.467164]  print_report+0xd1/0x640
[   32.467476]  ? __virt_addr_valid+0x1db/0x2d0
[   32.467931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.468733]  kasan_report+0x102/0x140
[   32.469434]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   32.470288]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   32.470568]  __asan_report_load8_noabort+0x18/0x20
[   32.471390]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   32.472673]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.473397]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.473861]  ? trace_hardirqs_on+0x37/0xe0
[   32.474381]  ? kasan_bitops_generic+0x93/0x1c0
[   32.474772]  kasan_bitops_generic+0x122/0x1c0
[   32.475327]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.475749]  ? __pfx_read_tsc+0x10/0x10
[   32.476139]  ? ktime_get_ts64+0x84/0x230
[   32.476609]  kunit_try_run_case+0x1b3/0x490
[   32.477085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.477524]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.478214]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.478910]  ? __kthread_parkme+0x82/0x160
[   32.479369]  ? preempt_count_sub+0x50/0x80
[   32.480021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.480642]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.481316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.481835]  kthread+0x257/0x310
[   32.482105]  ? __pfx_kthread+0x10/0x10
[   32.482620]  ret_from_fork+0x41/0x80
[   32.483101]  ? __pfx_kthread+0x10/0x10
[   32.483613]  ret_from_fork_asm+0x1a/0x30
[   32.484062]  </TASK>
[   32.485893] 
[   32.486560] Allocated by task 268:
[   32.487901]  kasan_save_stack+0x3d/0x60
[   32.488160]  kasan_save_track+0x18/0x40
[   32.488549]  kasan_save_alloc_info+0x3b/0x50
[   32.488932]  __kasan_kmalloc+0xb7/0xc0
[   32.489925]  __kmalloc_cache_noprof+0x184/0x410
[   32.490232]  kasan_bitops_generic+0x93/0x1c0
[   32.491790]  kunit_try_run_case+0x1b3/0x490
[   32.492052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.492364]  kthread+0x257/0x310
[   32.493615]  ret_from_fork+0x41/0x80
[   32.494388]  ret_from_fork_asm+0x1a/0x30
[   32.495275] 
[   32.495522] The buggy address belongs to the object at ffff888101a98520
[   32.495522]  which belongs to the cache kmalloc-16 of size 16
[   32.497361] The buggy address is located 8 bytes inside of
[   32.497361]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   32.497980] 
[   32.498126] The buggy address belongs to the physical page:
[   32.498409] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   32.500096] flags: 0x200000000000000(node=0|zone=2)
[   32.500944] page_type: f5(slab)
[   32.501345] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.501917] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.502730] page dumped because: kasan: bad access detected
[   32.503188] 
[   32.503433] Memory state around the buggy address:
[   32.503851]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   32.504454]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   32.505144] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.505718]                                   ^
[   32.506125]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.506916]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.507424] ==================================================================
[   32.329888] ==================================================================
[   32.330938] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   32.332119] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   32.333349] 
[   32.333561] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.334920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.335100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.335427] Call Trace:
[   32.335553]  <TASK>
[   32.335750]  dump_stack_lvl+0x73/0xb0
[   32.336134]  print_report+0xd1/0x640
[   32.336406]  ? __virt_addr_valid+0x1db/0x2d0
[   32.336754]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.337099]  kasan_report+0x102/0x140
[   32.337383]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   32.338264]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   32.339252]  kasan_check_range+0x10c/0x1c0
[   32.339878]  __kasan_check_write+0x18/0x20
[   32.340305]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   32.340888]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.341288]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.341640]  ? trace_hardirqs_on+0x37/0xe0
[   32.342090]  ? kasan_bitops_generic+0x93/0x1c0
[   32.342621]  kasan_bitops_generic+0x122/0x1c0
[   32.342999]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.343554]  ? __pfx_read_tsc+0x10/0x10
[   32.343951]  ? ktime_get_ts64+0x84/0x230
[   32.344446]  kunit_try_run_case+0x1b3/0x490
[   32.344926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.345304]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.345933]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.346374]  ? __kthread_parkme+0x82/0x160
[   32.346897]  ? preempt_count_sub+0x50/0x80
[   32.347270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.347726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.348350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.348939]  kthread+0x257/0x310
[   32.349201]  ? __pfx_kthread+0x10/0x10
[   32.349758]  ret_from_fork+0x41/0x80
[   32.350203]  ? __pfx_kthread+0x10/0x10
[   32.350721]  ret_from_fork_asm+0x1a/0x30
[   32.351252]  </TASK>
[   32.351499] 
[   32.351727] Allocated by task 268:
[   32.352141]  kasan_save_stack+0x3d/0x60
[   32.352664]  kasan_save_track+0x18/0x40
[   32.352997]  kasan_save_alloc_info+0x3b/0x50
[   32.353294]  __kasan_kmalloc+0xb7/0xc0
[   32.353843]  __kmalloc_cache_noprof+0x184/0x410
[   32.354385]  kasan_bitops_generic+0x93/0x1c0
[   32.354936]  kunit_try_run_case+0x1b3/0x490
[   32.355311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.355846]  kthread+0x257/0x310
[   32.356200]  ret_from_fork+0x41/0x80
[   32.356588]  ret_from_fork_asm+0x1a/0x30
[   32.357127] 
[   32.357303] The buggy address belongs to the object at ffff888101a98520
[   32.357303]  which belongs to the cache kmalloc-16 of size 16
[   32.358246] The buggy address is located 8 bytes inside of
[   32.358246]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   32.359230] 
[   32.359450] The buggy address belongs to the physical page:
[   32.359946] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   32.360497] flags: 0x200000000000000(node=0|zone=2)
[   32.361150] page_type: f5(slab)
[   32.361564] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.362284] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.363071] page dumped because: kasan: bad access detected
[   32.363506] 
[   32.363799] Memory state around the buggy address:
[   32.364099]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   32.364918]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   32.365472] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.366252]                                   ^
[   32.366723]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.367192]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.367918] ==================================================================