Hay
Date
Nov. 22, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   38.081525] ==================================================================
[   38.082379] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   38.083810] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   38.085055] 
[   38.085430] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   38.086620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.087456] Hardware name: linux,dummy-virt (DT)
[   38.088547] Call trace:
[   38.088871]  show_stack+0x20/0x38 (C)
[   38.089577]  dump_stack_lvl+0x8c/0xd0
[   38.090146]  print_report+0x118/0x5e0
[   38.092063]  kasan_report+0xc8/0x118
[   38.092905]  __asan_report_load8_noabort+0x20/0x30
[   38.093621]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   38.094172]  kasan_bitops_generic+0x11c/0x1c8
[   38.095045]  kunit_try_run_case+0x14c/0x3d0
[   38.095626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.096605]  kthread+0x24c/0x2d0
[   38.097137]  ret_from_fork+0x10/0x20
[   38.097693] 
[   38.098149] Allocated by task 250:
[   38.098721]  kasan_save_stack+0x3c/0x68
[   38.099526]  kasan_save_track+0x20/0x40
[   38.100327]  kasan_save_alloc_info+0x40/0x58
[   38.100971]  __kasan_kmalloc+0xd4/0xd8
[   38.101723]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.102421]  kasan_bitops_generic+0xa0/0x1c8
[   38.103187]  kunit_try_run_case+0x14c/0x3d0
[   38.103918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.104660]  kthread+0x24c/0x2d0
[   38.105115]  ret_from_fork+0x10/0x20
[   38.105808] 
[   38.106205] The buggy address belongs to the object at fff00000c5ce6800
[   38.106205]  which belongs to the cache kmalloc-16 of size 16
[   38.107421] The buggy address is located 8 bytes inside of
[   38.107421]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   38.109020] 
[   38.109331] The buggy address belongs to the physical page:
[   38.110116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   38.111183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.111875] page_type: f5(slab)
[   38.112578] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   38.113508] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   38.114419] page dumped because: kasan: bad access detected
[   38.115111] 
[   38.115507] Memory state around the buggy address:
[   38.116091]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   38.117165]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   38.117982] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.119030]                       ^
[   38.119660]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.120536]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.121418] ==================================================================
[   38.381117] ==================================================================
[   38.382083] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   38.383166] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   38.384197] 
[   38.384815] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   38.386020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.386797] Hardware name: linux,dummy-virt (DT)
[   38.387531] Call trace:
[   38.388107]  show_stack+0x20/0x38 (C)
[   38.388803]  dump_stack_lvl+0x8c/0xd0
[   38.389567]  print_report+0x118/0x5e0
[   38.390319]  kasan_report+0xc8/0x118
[   38.391040]  __asan_report_load8_noabort+0x20/0x30
[   38.391787]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   38.392684]  kasan_bitops_generic+0x11c/0x1c8
[   38.393499]  kunit_try_run_case+0x14c/0x3d0
[   38.394345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.395208]  kthread+0x24c/0x2d0
[   38.395834]  ret_from_fork+0x10/0x20
[   38.396499] 
[   38.396837] Allocated by task 250:
[   38.397656]  kasan_save_stack+0x3c/0x68
[   38.398210]  kasan_save_track+0x20/0x40
[   38.399112]  kasan_save_alloc_info+0x40/0x58
[   38.399944]  __kasan_kmalloc+0xd4/0xd8
[   38.400748]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.401692]  kasan_bitops_generic+0xa0/0x1c8
[   38.402594]  kunit_try_run_case+0x14c/0x3d0
[   38.403501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.404372]  kthread+0x24c/0x2d0
[   38.404938]  ret_from_fork+0x10/0x20
[   38.405984] 
[   38.406273] The buggy address belongs to the object at fff00000c5ce6800
[   38.406273]  which belongs to the cache kmalloc-16 of size 16
[   38.407794] The buggy address is located 8 bytes inside of
[   38.407794]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   38.409291] 
[   38.409818] The buggy address belongs to the physical page:
[   38.410531] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   38.411554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.412408] page_type: f5(slab)
[   38.412895] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   38.413893] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   38.414800] page dumped because: kasan: bad access detected
[   38.415506] 
[   38.415834] Memory state around the buggy address:
[   38.416368]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   38.417377]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   38.418178] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.419100]                       ^
[   38.419762]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.420681]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.421702] ==================================================================
[   38.215282] ==================================================================
[   38.216177] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   38.217397] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   38.218147] 
[   38.218488] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   38.221049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.222404] Hardware name: linux,dummy-virt (DT)
[   38.223083] Call trace:
[   38.223667]  show_stack+0x20/0x38 (C)
[   38.224235]  dump_stack_lvl+0x8c/0xd0
[   38.224924]  print_report+0x118/0x5e0
[   38.225585]  kasan_report+0xc8/0x118
[   38.226256]  kasan_check_range+0x100/0x1a8
[   38.227000]  __kasan_check_write+0x20/0x30
[   38.227708]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   38.228560]  kasan_bitops_generic+0x11c/0x1c8
[   38.229236]  kunit_try_run_case+0x14c/0x3d0
[   38.229900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.230799]  kthread+0x24c/0x2d0
[   38.231315]  ret_from_fork+0x10/0x20
[   38.231946] 
[   38.232317] Allocated by task 250:
[   38.232886]  kasan_save_stack+0x3c/0x68
[   38.233425]  kasan_save_track+0x20/0x40
[   38.234133]  kasan_save_alloc_info+0x40/0x58
[   38.234739]  __kasan_kmalloc+0xd4/0xd8
[   38.235475]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.236113]  kasan_bitops_generic+0xa0/0x1c8
[   38.236957]  kunit_try_run_case+0x14c/0x3d0
[   38.237638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.238385]  kthread+0x24c/0x2d0
[   38.238928]  ret_from_fork+0x10/0x20
[   38.239492] 
[   38.239825] The buggy address belongs to the object at fff00000c5ce6800
[   38.239825]  which belongs to the cache kmalloc-16 of size 16
[   38.241332] The buggy address is located 8 bytes inside of
[   38.241332]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   38.242828] 
[   38.243238] The buggy address belongs to the physical page:
[   38.244095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   38.245045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.246023] page_type: f5(slab)
[   38.246571] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   38.247515] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   38.248509] page dumped because: kasan: bad access detected
[   38.249187] 
[   38.249561] Memory state around the buggy address:
[   38.250197]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   38.251115]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   38.252113] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.252945]                       ^
[   38.253585]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.254478]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.255227] ==================================================================
[   38.298067] ==================================================================
[   38.298883] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   38.299840] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   38.300584] 
[   38.301077] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   38.302334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.302933] Hardware name: linux,dummy-virt (DT)
[   38.303598] Call trace:
[   38.304100]  show_stack+0x20/0x38 (C)
[   38.304868]  dump_stack_lvl+0x8c/0xd0
[   38.305535]  print_report+0x118/0x5e0
[   38.306190]  kasan_report+0xc8/0x118
[   38.306903]  kasan_check_range+0x100/0x1a8
[   38.307577]  __kasan_check_write+0x20/0x30
[   38.308208]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   38.308949]  kasan_bitops_generic+0x11c/0x1c8
[   38.309737]  kunit_try_run_case+0x14c/0x3d0
[   38.310562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.311347]  kthread+0x24c/0x2d0
[   38.312035]  ret_from_fork+0x10/0x20
[   38.312688] 
[   38.313032] Allocated by task 250:
[   38.313517]  kasan_save_stack+0x3c/0x68
[   38.314203]  kasan_save_track+0x20/0x40
[   38.314811]  kasan_save_alloc_info+0x40/0x58
[   38.315348]  __kasan_kmalloc+0xd4/0xd8
[   38.316047]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.316590]  kasan_bitops_generic+0xa0/0x1c8
[   38.317303]  kunit_try_run_case+0x14c/0x3d0
[   38.317936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.318836]  kthread+0x24c/0x2d0
[   38.319274]  ret_from_fork+0x10/0x20
[   38.319940] 
[   38.320275] The buggy address belongs to the object at fff00000c5ce6800
[   38.320275]  which belongs to the cache kmalloc-16 of size 16
[   38.321948] The buggy address is located 8 bytes inside of
[   38.321948]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   38.323356] 
[   38.323750] The buggy address belongs to the physical page:
[   38.324376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   38.325485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.326429] page_type: f5(slab)
[   38.326911] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   38.327866] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   38.328847] page dumped because: kasan: bad access detected
[   38.329565] 
[   38.329920] Memory state around the buggy address:
[   38.330510]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   38.331465]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   38.332394] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.333339]                       ^
[   38.333898]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.334748]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.335546] ==================================================================
[   38.168388] ==================================================================
[   38.169470] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   38.170814] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   38.171749] 
[   38.172159] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   38.174947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.175406] Hardware name: linux,dummy-virt (DT)
[   38.175862] Call trace:
[   38.176163]  show_stack+0x20/0x38 (C)
[   38.176617]  dump_stack_lvl+0x8c/0xd0
[   38.177041]  print_report+0x118/0x5e0
[   38.177657]  kasan_report+0xc8/0x118
[   38.179981]  __asan_report_load8_noabort+0x20/0x30
[   38.182495]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   38.184558]  kasan_bitops_generic+0x11c/0x1c8
[   38.186343]  kunit_try_run_case+0x14c/0x3d0
[   38.187691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.188364]  kthread+0x24c/0x2d0
[   38.189052]  ret_from_fork+0x10/0x20
[   38.189610] 
[   38.190012] Allocated by task 250:
[   38.190702]  kasan_save_stack+0x3c/0x68
[   38.191571]  kasan_save_track+0x20/0x40
[   38.192168]  kasan_save_alloc_info+0x40/0x58
[   38.192977]  __kasan_kmalloc+0xd4/0xd8
[   38.193612]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.194251]  kasan_bitops_generic+0xa0/0x1c8
[   38.194858]  kunit_try_run_case+0x14c/0x3d0
[   38.195573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.196303]  kthread+0x24c/0x2d0
[   38.196856]  ret_from_fork+0x10/0x20
[   38.197381] 
[   38.197820] The buggy address belongs to the object at fff00000c5ce6800
[   38.197820]  which belongs to the cache kmalloc-16 of size 16
[   38.199227] The buggy address is located 8 bytes inside of
[   38.199227]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   38.200696] 
[   38.201100] The buggy address belongs to the physical page:
[   38.201805] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   38.202864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.203756] page_type: f5(slab)
[   38.204375] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   38.205328] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   38.206199] page dumped because: kasan: bad access detected
[   38.206966] 
[   38.207307] Memory state around the buggy address:
[   38.208035]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   38.208900]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   38.209889] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.210701]                       ^
[   38.211281]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.212063]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.212991] ==================================================================
[   38.042325] ==================================================================
[   38.043183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   38.044132] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   38.045074] 
[   38.045425] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   38.046718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.047383] Hardware name: linux,dummy-virt (DT)
[   38.047955] Call trace:
[   38.048453]  show_stack+0x20/0x38 (C)
[   38.049019]  dump_stack_lvl+0x8c/0xd0
[   38.049708]  print_report+0x118/0x5e0
[   38.050301]  kasan_report+0xc8/0x118
[   38.050858]  kasan_check_range+0x100/0x1a8
[   38.051415]  __kasan_check_write+0x20/0x30
[   38.052142]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   38.053021]  kasan_bitops_generic+0x11c/0x1c8
[   38.053720]  kunit_try_run_case+0x14c/0x3d0
[   38.054516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.055342]  kthread+0x24c/0x2d0
[   38.055865]  ret_from_fork+0x10/0x20
[   38.056538] 
[   38.056845] Allocated by task 250:
[   38.057455]  kasan_save_stack+0x3c/0x68
[   38.058152]  kasan_save_track+0x20/0x40
[   38.058727]  kasan_save_alloc_info+0x40/0x58
[   38.059363]  __kasan_kmalloc+0xd4/0xd8
[   38.059980]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.060512]  kasan_bitops_generic+0xa0/0x1c8
[   38.061234]  kunit_try_run_case+0x14c/0x3d0
[   38.061755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.062592]  kthread+0x24c/0x2d0
[   38.063202]  ret_from_fork+0x10/0x20
[   38.063779] 
[   38.064081] The buggy address belongs to the object at fff00000c5ce6800
[   38.064081]  which belongs to the cache kmalloc-16 of size 16
[   38.065547] The buggy address is located 8 bytes inside of
[   38.065547]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   38.066971] 
[   38.067310] The buggy address belongs to the physical page:
[   38.068098] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   38.069129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.070045] page_type: f5(slab)
[   38.070740] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   38.071701] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   38.072599] page dumped because: kasan: bad access detected
[   38.073225] 
[   38.073621] Memory state around the buggy address:
[   38.074340]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   38.075235]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   38.076081] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.077000]                       ^
[   38.077506]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.078319]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.079326] ==================================================================
[   38.338556] ==================================================================
[   38.340216] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   38.341239] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   38.341979] 
[   38.342297] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   38.343672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.344550] Hardware name: linux,dummy-virt (DT)
[   38.345522] Call trace:
[   38.345919]  show_stack+0x20/0x38 (C)
[   38.346536]  dump_stack_lvl+0x8c/0xd0
[   38.347140]  print_report+0x118/0x5e0
[   38.347856]  kasan_report+0xc8/0x118
[   38.348549]  __asan_report_load8_noabort+0x20/0x30
[   38.349211]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   38.350131]  kasan_bitops_generic+0x11c/0x1c8
[   38.350716]  kunit_try_run_case+0x14c/0x3d0
[   38.351475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.352124]  kthread+0x24c/0x2d0
[   38.352810]  ret_from_fork+0x10/0x20
[   38.353464] 
[   38.353808] Allocated by task 250:
[   38.354456]  kasan_save_stack+0x3c/0x68
[   38.355164]  kasan_save_track+0x20/0x40
[   38.355849]  kasan_save_alloc_info+0x40/0x58
[   38.356533]  __kasan_kmalloc+0xd4/0xd8
[   38.357088]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.357660]  kasan_bitops_generic+0xa0/0x1c8
[   38.358386]  kunit_try_run_case+0x14c/0x3d0
[   38.359079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.359978]  kthread+0x24c/0x2d0
[   38.360466]  ret_from_fork+0x10/0x20
[   38.361051] 
[   38.361926] The buggy address belongs to the object at fff00000c5ce6800
[   38.361926]  which belongs to the cache kmalloc-16 of size 16
[   38.363319] The buggy address is located 8 bytes inside of
[   38.363319]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   38.364763] 
[   38.365121] The buggy address belongs to the physical page:
[   38.365852] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   38.366909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.368274] page_type: f5(slab)
[   38.368816] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   38.369943] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   38.370973] page dumped because: kasan: bad access detected
[   38.371809] 
[   38.372302] Memory state around the buggy address:
[   38.373097]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   38.373975]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   38.375069] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.376052]                       ^
[   38.376763]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.377653]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.378569] ==================================================================
[   38.256964] ==================================================================
[   38.257911] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   38.259765] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   38.260866] 
[   38.261076] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   38.261790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.262482] Hardware name: linux,dummy-virt (DT)
[   38.263238] Call trace:
[   38.263731]  show_stack+0x20/0x38 (C)
[   38.264260]  dump_stack_lvl+0x8c/0xd0
[   38.264978]  print_report+0x118/0x5e0
[   38.265812]  kasan_report+0xc8/0x118
[   38.266416]  __asan_report_load8_noabort+0x20/0x30
[   38.267176]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   38.267775]  kasan_bitops_generic+0x11c/0x1c8
[   38.268221]  kunit_try_run_case+0x14c/0x3d0
[   38.268675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.269154]  kthread+0x24c/0x2d0
[   38.269550]  ret_from_fork+0x10/0x20
[   38.269981] 
[   38.270260] Allocated by task 250:
[   38.270677]  kasan_save_stack+0x3c/0x68
[   38.271179]  kasan_save_track+0x20/0x40
[   38.271858]  kasan_save_alloc_info+0x40/0x58
[   38.272563]  __kasan_kmalloc+0xd4/0xd8
[   38.273921]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.274822]  kasan_bitops_generic+0xa0/0x1c8
[   38.277398]  kunit_try_run_case+0x14c/0x3d0
[   38.278117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.278790]  kthread+0x24c/0x2d0
[   38.279325]  ret_from_fork+0x10/0x20
[   38.279874] 
[   38.280156] The buggy address belongs to the object at fff00000c5ce6800
[   38.280156]  which belongs to the cache kmalloc-16 of size 16
[   38.281594] The buggy address is located 8 bytes inside of
[   38.281594]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   38.283008] 
[   38.283351] The buggy address belongs to the physical page:
[   38.284123] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   38.285212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.286109] page_type: f5(slab)
[   38.286738] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   38.287767] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   38.288734] page dumped because: kasan: bad access detected
[   38.289460] 
[   38.289810] Memory state around the buggy address:
[   38.290410]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   38.291333]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   38.292113] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.293086]                       ^
[   38.293597]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.294515]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.295401] ==================================================================
[   38.123184] ==================================================================
[   38.124806] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   38.125895] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   38.127335] 
[   38.127925] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   38.129318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.130202] Hardware name: linux,dummy-virt (DT)
[   38.131081] Call trace:
[   38.131729]  show_stack+0x20/0x38 (C)
[   38.132556]  dump_stack_lvl+0x8c/0xd0
[   38.133144]  print_report+0x118/0x5e0
[   38.134293]  kasan_report+0xc8/0x118
[   38.135054]  kasan_check_range+0x100/0x1a8
[   38.135853]  __kasan_check_write+0x20/0x30
[   38.136748]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   38.137778]  kasan_bitops_generic+0x11c/0x1c8
[   38.138596]  kunit_try_run_case+0x14c/0x3d0
[   38.139209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.139951]  kthread+0x24c/0x2d0
[   38.141051]  ret_from_fork+0x10/0x20
[   38.141668] 
[   38.142203] Allocated by task 250:
[   38.142678]  kasan_save_stack+0x3c/0x68
[   38.143299]  kasan_save_track+0x20/0x40
[   38.143926]  kasan_save_alloc_info+0x40/0x58
[   38.144670]  __kasan_kmalloc+0xd4/0xd8
[   38.145529]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.146333]  kasan_bitops_generic+0xa0/0x1c8
[   38.147139]  kunit_try_run_case+0x14c/0x3d0
[   38.147919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.148791]  kthread+0x24c/0x2d0
[   38.149312]  ret_from_fork+0x10/0x20
[   38.150214] 
[   38.150554] The buggy address belongs to the object at fff00000c5ce6800
[   38.150554]  which belongs to the cache kmalloc-16 of size 16
[   38.152381] The buggy address is located 8 bytes inside of
[   38.152381]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   38.154145] 
[   38.154744] The buggy address belongs to the physical page:
[   38.155569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   38.156566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.157390] page_type: f5(slab)
[   38.157923] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   38.158891] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   38.159831] page dumped because: kasan: bad access detected
[   38.160627] 
[   38.161008] Memory state around the buggy address:
[   38.161648]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   38.162713]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   38.163517] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.164503]                       ^
[   38.164953]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.165969]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.166952] ==================================================================

[   28.840533] ==================================================================
[   28.842343] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   28.843045] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   28.843427] 
[   28.843667] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   28.844518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.844801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.845395] Call Trace:
[   28.845605]  <TASK>
[   28.845812]  dump_stack_lvl+0x73/0xb0
[   28.846352]  print_report+0xd1/0x640
[   28.846801]  ? __virt_addr_valid+0x1db/0x2d0
[   28.847294]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.847733]  kasan_report+0x102/0x140
[   28.848077]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   28.848912]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   28.849305]  kasan_check_range+0x10c/0x1c0
[   28.849761]  __kasan_check_write+0x18/0x20
[   28.850136]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   28.850765]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.851414]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.851717]  ? trace_hardirqs_on+0x37/0xe0
[   28.852155]  ? kasan_bitops_generic+0x93/0x1c0
[   28.852695]  kasan_bitops_generic+0x122/0x1c0
[   28.853172]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.853577]  ? __pfx_read_tsc+0x10/0x10
[   28.853880]  ? ktime_get_ts64+0x84/0x230
[   28.854294]  kunit_try_run_case+0x1b3/0x490
[   28.854804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.855318]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.855729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.856072]  ? __kthread_parkme+0x82/0x160
[   28.856358]  ? preempt_count_sub+0x50/0x80
[   28.856651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.858965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.859551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.860170]  kthread+0x257/0x310
[   28.860549]  ? __pfx_kthread+0x10/0x10
[   28.861900]  ret_from_fork+0x41/0x80
[   28.862909]  ? __pfx_kthread+0x10/0x10
[   28.864073]  ret_from_fork_asm+0x1a/0x30
[   28.864478]  </TASK>
[   28.864949] 
[   28.865289] Allocated by task 269:
[   28.865696]  kasan_save_stack+0x3d/0x60
[   28.866330]  kasan_save_track+0x18/0x40
[   28.866866]  kasan_save_alloc_info+0x3b/0x50
[   28.867464]  __kasan_kmalloc+0xb7/0xc0
[   28.867886]  __kmalloc_cache_noprof+0x184/0x410
[   28.868348]  kasan_bitops_generic+0x93/0x1c0
[   28.868746]  kunit_try_run_case+0x1b3/0x490
[   28.869583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.870135]  kthread+0x257/0x310
[   28.871135]  ret_from_fork+0x41/0x80
[   28.871506]  ret_from_fork_asm+0x1a/0x30
[   28.871948] 
[   28.872160] The buggy address belongs to the object at ffff888100f9bce0
[   28.872160]  which belongs to the cache kmalloc-16 of size 16
[   28.873069] The buggy address is located 8 bytes inside of
[   28.873069]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   28.873850] 
[   28.874080] The buggy address belongs to the physical page:
[   28.874564] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   28.875321] flags: 0x200000000000000(node=0|zone=2)
[   28.875812] page_type: f5(slab)
[   28.876173] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.876765] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.877325] page dumped because: kasan: bad access detected
[   28.877890] 
[   28.878184] Memory state around the buggy address:
[   28.878615]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.879143]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.879607] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.880297]                                                           ^
[   28.880874]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.881336]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.882010] ==================================================================
[   28.921765] ==================================================================
[   28.922531] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   28.923371] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   28.924071] 
[   28.924354] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   28.925296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.925711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.926616] Call Trace:
[   28.926952]  <TASK>
[   28.927231]  dump_stack_lvl+0x73/0xb0
[   28.927671]  print_report+0xd1/0x640
[   28.928022]  ? __virt_addr_valid+0x1db/0x2d0
[   28.928491]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.928944]  kasan_report+0x102/0x140
[   28.929414]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   28.930050]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   28.930780]  kasan_check_range+0x10c/0x1c0
[   28.931338]  __kasan_check_write+0x18/0x20
[   28.931771]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   28.932449]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.933154]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.934709]  ? trace_hardirqs_on+0x37/0xe0
[   28.935206]  ? kasan_bitops_generic+0x93/0x1c0
[   28.936241]  kasan_bitops_generic+0x122/0x1c0
[   28.936732]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.937116]  ? __pfx_read_tsc+0x10/0x10
[   28.937391]  ? ktime_get_ts64+0x84/0x230
[   28.937792]  kunit_try_run_case+0x1b3/0x490
[   28.938456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.939524]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.940148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.940518]  ? __kthread_parkme+0x82/0x160
[   28.941082]  ? preempt_count_sub+0x50/0x80
[   28.941573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.942382]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.943042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.943388]  kthread+0x257/0x310
[   28.943634]  ? __pfx_kthread+0x10/0x10
[   28.944054]  ret_from_fork+0x41/0x80
[   28.944614]  ? __pfx_kthread+0x10/0x10
[   28.945201]  ret_from_fork_asm+0x1a/0x30
[   28.945770]  </TASK>
[   28.946176] 
[   28.946521] Allocated by task 269:
[   28.947069]  kasan_save_stack+0x3d/0x60
[   28.947532]  kasan_save_track+0x18/0x40
[   28.948063]  kasan_save_alloc_info+0x3b/0x50
[   28.948789]  __kasan_kmalloc+0xb7/0xc0
[   28.949397]  __kmalloc_cache_noprof+0x184/0x410
[   28.950035]  kasan_bitops_generic+0x93/0x1c0
[   28.950627]  kunit_try_run_case+0x1b3/0x490
[   28.951154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.952043]  kthread+0x257/0x310
[   28.952498]  ret_from_fork+0x41/0x80
[   28.952810]  ret_from_fork_asm+0x1a/0x30
[   28.953237] 
[   28.953499] The buggy address belongs to the object at ffff888100f9bce0
[   28.953499]  which belongs to the cache kmalloc-16 of size 16
[   28.954391] The buggy address is located 8 bytes inside of
[   28.954391]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   28.955335] 
[   28.955594] The buggy address belongs to the physical page:
[   28.956039] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   28.956734] flags: 0x200000000000000(node=0|zone=2)
[   28.957202] page_type: f5(slab)
[   28.957605] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.958300] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.958943] page dumped because: kasan: bad access detected
[   28.959241] 
[   28.959500] Memory state around the buggy address:
[   28.960009]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.960649]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.961366] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.961940]                                                           ^
[   28.962503]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.963097]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.963634] ==================================================================
[   29.002630] ==================================================================
[   29.004485] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   29.005367] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   29.006053] 
[   29.006367] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.007036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.007510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.008107] Call Trace:
[   29.008503]  <TASK>
[   29.008729]  dump_stack_lvl+0x73/0xb0
[   29.009229]  print_report+0xd1/0x640
[   29.009620]  ? __virt_addr_valid+0x1db/0x2d0
[   29.009961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.010348]  kasan_report+0x102/0x140
[   29.010622]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   29.011161]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   29.011868]  kasan_check_range+0x10c/0x1c0
[   29.012406]  __kasan_check_write+0x18/0x20
[   29.012871]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   29.013548]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.014223]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.014782]  ? trace_hardirqs_on+0x37/0xe0
[   29.015280]  ? kasan_bitops_generic+0x93/0x1c0
[   29.015740]  kasan_bitops_generic+0x122/0x1c0
[   29.016240]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.016794]  ? __pfx_read_tsc+0x10/0x10
[   29.017096]  ? ktime_get_ts64+0x84/0x230
[   29.017431]  kunit_try_run_case+0x1b3/0x490
[   29.017725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.018059]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.018485]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.019089]  ? __kthread_parkme+0x82/0x160
[   29.019615]  ? preempt_count_sub+0x50/0x80
[   29.020155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.020677]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.021341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.021915]  kthread+0x257/0x310
[   29.022385]  ? __pfx_kthread+0x10/0x10
[   29.022795]  ret_from_fork+0x41/0x80
[   29.023223]  ? __pfx_kthread+0x10/0x10
[   29.023716]  ret_from_fork_asm+0x1a/0x30
[   29.024187]  </TASK>
[   29.024535] 
[   29.024780] Allocated by task 269:
[   29.025068]  kasan_save_stack+0x3d/0x60
[   29.025378]  kasan_save_track+0x18/0x40
[   29.025634]  kasan_save_alloc_info+0x3b/0x50
[   29.026027]  __kasan_kmalloc+0xb7/0xc0
[   29.026437]  __kmalloc_cache_noprof+0x184/0x410
[   29.026919]  kasan_bitops_generic+0x93/0x1c0
[   29.027389]  kunit_try_run_case+0x1b3/0x490
[   29.029865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.030470]  kthread+0x257/0x310
[   29.030859]  ret_from_fork+0x41/0x80
[   29.031262]  ret_from_fork_asm+0x1a/0x30
[   29.031560] 
[   29.031709] The buggy address belongs to the object at ffff888100f9bce0
[   29.031709]  which belongs to the cache kmalloc-16 of size 16
[   29.034774] The buggy address is located 8 bytes inside of
[   29.034774]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   29.036053] 
[   29.036285] The buggy address belongs to the physical page:
[   29.038947] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   29.039489] flags: 0x200000000000000(node=0|zone=2)
[   29.039908] page_type: f5(slab)
[   29.040438] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.041230] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.041760] page dumped because: kasan: bad access detected
[   29.042237] 
[   29.042463] Memory state around the buggy address:
[   29.042943]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.043334]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.043957] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.044510]                                                           ^
[   29.045166]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.045539]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.046179] ==================================================================
[   29.047810] ==================================================================
[   29.048397] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   29.049168] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   29.049855] 
[   29.050114] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.051157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.051467] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.052598] Call Trace:
[   29.052944]  <TASK>
[   29.053223]  dump_stack_lvl+0x73/0xb0
[   29.053648]  print_report+0xd1/0x640
[   29.054026]  ? __virt_addr_valid+0x1db/0x2d0
[   29.054855]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.055496]  kasan_report+0x102/0x140
[   29.055774]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   29.056189]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   29.056987]  kasan_check_range+0x10c/0x1c0
[   29.057655]  __kasan_check_write+0x18/0x20
[   29.058119]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   29.058880]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.059840]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.060472]  ? trace_hardirqs_on+0x37/0xe0
[   29.061000]  ? kasan_bitops_generic+0x93/0x1c0
[   29.061707]  kasan_bitops_generic+0x122/0x1c0
[   29.062418]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.062799]  ? __pfx_read_tsc+0x10/0x10
[   29.063290]  ? ktime_get_ts64+0x84/0x230
[   29.063780]  kunit_try_run_case+0x1b3/0x490
[   29.064301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.065048]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.065452]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.066121]  ? __kthread_parkme+0x82/0x160
[   29.066776]  ? preempt_count_sub+0x50/0x80
[   29.067318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.068020]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.068778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.069498]  kthread+0x257/0x310
[   29.069786]  ? __pfx_kthread+0x10/0x10
[   29.070232]  ret_from_fork+0x41/0x80
[   29.070573]  ? __pfx_kthread+0x10/0x10
[   29.070945]  ret_from_fork_asm+0x1a/0x30
[   29.071936]  </TASK>
[   29.072139] 
[   29.072279] Allocated by task 269:
[   29.072423]  kasan_save_stack+0x3d/0x60
[   29.072574]  kasan_save_track+0x18/0x40
[   29.072714]  kasan_save_alloc_info+0x3b/0x50
[   29.073592]  __kasan_kmalloc+0xb7/0xc0
[   29.074483]  __kmalloc_cache_noprof+0x184/0x410
[   29.074924]  kasan_bitops_generic+0x93/0x1c0
[   29.075844]  kunit_try_run_case+0x1b3/0x490
[   29.076286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.076753]  kthread+0x257/0x310
[   29.077068]  ret_from_fork+0x41/0x80
[   29.077422]  ret_from_fork_asm+0x1a/0x30
[   29.077789] 
[   29.078992] The buggy address belongs to the object at ffff888100f9bce0
[   29.078992]  which belongs to the cache kmalloc-16 of size 16
[   29.080442] The buggy address is located 8 bytes inside of
[   29.080442]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   29.081265] 
[   29.081488] The buggy address belongs to the physical page:
[   29.082191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   29.082644] flags: 0x200000000000000(node=0|zone=2)
[   29.083110] page_type: f5(slab)
[   29.083495] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.084444] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.084958] page dumped because: kasan: bad access detected
[   29.085439] 
[   29.085737] Memory state around the buggy address:
[   29.086102]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.086465]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.087098] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.087664]                                                           ^
[   29.088351]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.088981]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.089857] ==================================================================
[   29.092740] ==================================================================
[   29.093666] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   29.094335] Read of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   29.094892] 
[   29.095065] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.095932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.096364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.097352] Call Trace:
[   29.097557]  <TASK>
[   29.097747]  dump_stack_lvl+0x73/0xb0
[   29.098449]  print_report+0xd1/0x640
[   29.098904]  ? __virt_addr_valid+0x1db/0x2d0
[   29.099401]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.099914]  kasan_report+0x102/0x140
[   29.100299]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   29.100954]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   29.101518]  kasan_check_range+0x10c/0x1c0
[   29.101814]  __kasan_check_read+0x15/0x20
[   29.102132]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   29.102739]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.103468]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.103982]  ? trace_hardirqs_on+0x37/0xe0
[   29.104386]  ? kasan_bitops_generic+0x93/0x1c0
[   29.105790]  kasan_bitops_generic+0x122/0x1c0
[   29.106668]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.107181]  ? __pfx_read_tsc+0x10/0x10
[   29.108063]  ? ktime_get_ts64+0x84/0x230
[   29.108591]  kunit_try_run_case+0x1b3/0x490
[   29.109054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.109883]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.110470]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.110945]  ? __kthread_parkme+0x82/0x160
[   29.111414]  ? preempt_count_sub+0x50/0x80
[   29.111788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.112300]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.112781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.113249]  kthread+0x257/0x310
[   29.113676]  ? __pfx_kthread+0x10/0x10
[   29.114045]  ret_from_fork+0x41/0x80
[   29.114608]  ? __pfx_kthread+0x10/0x10
[   29.115004]  ret_from_fork_asm+0x1a/0x30
[   29.115309]  </TASK>
[   29.115591] 
[   29.115804] Allocated by task 269:
[   29.116194]  kasan_save_stack+0x3d/0x60
[   29.116615]  kasan_save_track+0x18/0x40
[   29.116945]  kasan_save_alloc_info+0x3b/0x50
[   29.117507]  __kasan_kmalloc+0xb7/0xc0
[   29.117804]  __kmalloc_cache_noprof+0x184/0x410
[   29.118346]  kasan_bitops_generic+0x93/0x1c0
[   29.118634]  kunit_try_run_case+0x1b3/0x490
[   29.118947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.119307]  kthread+0x257/0x310
[   29.119678]  ret_from_fork+0x41/0x80
[   29.120081]  ret_from_fork_asm+0x1a/0x30
[   29.120707] 
[   29.121016] The buggy address belongs to the object at ffff888100f9bce0
[   29.121016]  which belongs to the cache kmalloc-16 of size 16
[   29.122364] The buggy address is located 8 bytes inside of
[   29.122364]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   29.123366] 
[   29.123561] The buggy address belongs to the physical page:
[   29.124059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   29.124698] flags: 0x200000000000000(node=0|zone=2)
[   29.125022] page_type: f5(slab)
[   29.125262] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.125644] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.126328] page dumped because: kasan: bad access detected
[   29.126907] 
[   29.127236] Memory state around the buggy address:
[   29.127875]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.128590]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.129292] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.129784]                                                           ^
[   29.130262]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.130803]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.131180] ==================================================================
[   28.883217] ==================================================================
[   28.883918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   28.884699] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   28.885806] 
[   28.886126] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   28.886766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.887161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.887993] Call Trace:
[   28.888384]  <TASK>
[   28.888593]  dump_stack_lvl+0x73/0xb0
[   28.888944]  print_report+0xd1/0x640
[   28.889352]  ? __virt_addr_valid+0x1db/0x2d0
[   28.889717]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.890376]  kasan_report+0x102/0x140
[   28.890782]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   28.891475]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   28.892121]  kasan_check_range+0x10c/0x1c0
[   28.892625]  __kasan_check_write+0x18/0x20
[   28.893138]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   28.893760]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.894324]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.894817]  ? trace_hardirqs_on+0x37/0xe0
[   28.895214]  ? kasan_bitops_generic+0x93/0x1c0
[   28.895724]  kasan_bitops_generic+0x122/0x1c0
[   28.896161]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.896735]  ? __pfx_read_tsc+0x10/0x10
[   28.897131]  ? ktime_get_ts64+0x84/0x230
[   28.897634]  kunit_try_run_case+0x1b3/0x490
[   28.898166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.898545]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.899045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.899614]  ? __kthread_parkme+0x82/0x160
[   28.899991]  ? preempt_count_sub+0x50/0x80
[   28.900469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.900975]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.901538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.902010]  kthread+0x257/0x310
[   28.902434]  ? __pfx_kthread+0x10/0x10
[   28.902873]  ret_from_fork+0x41/0x80
[   28.903351]  ? __pfx_kthread+0x10/0x10
[   28.903760]  ret_from_fork_asm+0x1a/0x30
[   28.904162]  </TASK>
[   28.904467] 
[   28.904683] Allocated by task 269:
[   28.904997]  kasan_save_stack+0x3d/0x60
[   28.905264]  kasan_save_track+0x18/0x40
[   28.905521]  kasan_save_alloc_info+0x3b/0x50
[   28.905797]  __kasan_kmalloc+0xb7/0xc0
[   28.906235]  __kmalloc_cache_noprof+0x184/0x410
[   28.906741]  kasan_bitops_generic+0x93/0x1c0
[   28.907214]  kunit_try_run_case+0x1b3/0x490
[   28.907701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.908243]  kthread+0x257/0x310
[   28.908651]  ret_from_fork+0x41/0x80
[   28.909027]  ret_from_fork_asm+0x1a/0x30
[   28.909493] 
[   28.909714] The buggy address belongs to the object at ffff888100f9bce0
[   28.909714]  which belongs to the cache kmalloc-16 of size 16
[   28.910793] The buggy address is located 8 bytes inside of
[   28.910793]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   28.911917] 
[   28.912108] The buggy address belongs to the physical page:
[   28.912654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   28.913201] flags: 0x200000000000000(node=0|zone=2)
[   28.913632] page_type: f5(slab)
[   28.914007] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.914716] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.915436] page dumped because: kasan: bad access detected
[   28.915966] 
[   28.916179] Memory state around the buggy address:
[   28.916676]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.917422]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.918106] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.918611]                                                           ^
[   28.919057]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.919588]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.920168] ==================================================================
[   29.132540] ==================================================================
[   29.133374] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   29.134929] Read of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   29.135812] 
[   29.136018] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.139955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.140573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.141165] Call Trace:
[   29.141571]  <TASK>
[   29.141947]  dump_stack_lvl+0x73/0xb0
[   29.142344]  print_report+0xd1/0x640
[   29.142764]  ? __virt_addr_valid+0x1db/0x2d0
[   29.143169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.143876]  kasan_report+0x102/0x140
[   29.144417]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   29.145203]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   29.146074]  __asan_report_load8_noabort+0x18/0x20
[   29.146718]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   29.147344]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.147991]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.148527]  ? trace_hardirqs_on+0x37/0xe0
[   29.149046]  ? kasan_bitops_generic+0x93/0x1c0
[   29.149578]  kasan_bitops_generic+0x122/0x1c0
[   29.150279]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.150698]  ? __pfx_read_tsc+0x10/0x10
[   29.151326]  ? ktime_get_ts64+0x84/0x230
[   29.151739]  kunit_try_run_case+0x1b3/0x490
[   29.152063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.152676]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.153325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.153650]  ? __kthread_parkme+0x82/0x160
[   29.154117]  ? preempt_count_sub+0x50/0x80
[   29.154694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.155201]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.155859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.156485]  kthread+0x257/0x310
[   29.156749]  ? __pfx_kthread+0x10/0x10
[   29.157331]  ret_from_fork+0x41/0x80
[   29.157860]  ? __pfx_kthread+0x10/0x10
[   29.158417]  ret_from_fork_asm+0x1a/0x30
[   29.158890]  </TASK>
[   29.159178] 
[   29.159522] Allocated by task 269:
[   29.159876]  kasan_save_stack+0x3d/0x60
[   29.160451]  kasan_save_track+0x18/0x40
[   29.160713]  kasan_save_alloc_info+0x3b/0x50
[   29.161295]  __kasan_kmalloc+0xb7/0xc0
[   29.161708]  __kmalloc_cache_noprof+0x184/0x410
[   29.162195]  kasan_bitops_generic+0x93/0x1c0
[   29.162702]  kunit_try_run_case+0x1b3/0x490
[   29.163190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.163555]  kthread+0x257/0x310
[   29.163967]  ret_from_fork+0x41/0x80
[   29.164376]  ret_from_fork_asm+0x1a/0x30
[   29.164797] 
[   29.165228] The buggy address belongs to the object at ffff888100f9bce0
[   29.165228]  which belongs to the cache kmalloc-16 of size 16
[   29.166189] The buggy address is located 8 bytes inside of
[   29.166189]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   29.166944] 
[   29.167286] The buggy address belongs to the physical page:
[   29.167802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   29.168507] flags: 0x200000000000000(node=0|zone=2)
[   29.168996] page_type: f5(slab)
[   29.169492] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.170102] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.170791] page dumped because: kasan: bad access detected
[   29.171206] 
[   29.171546] Memory state around the buggy address:
[   29.172052]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.172474]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.173043] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   29.173781]                                                           ^
[   29.174457]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.175171]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.175710] ==================================================================
[   28.793224] ==================================================================
[   28.793618] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   28.796315] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   28.796929] 
[   28.797082] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   28.797529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.797759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.800539] Call Trace:
[   28.800732]  <TASK>
[   28.800963]  dump_stack_lvl+0x73/0xb0
[   28.801228]  print_report+0xd1/0x640
[   28.801495]  ? __virt_addr_valid+0x1db/0x2d0
[   28.801769]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.804868]  kasan_report+0x102/0x140
[   28.805593]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   28.806336]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   28.807189]  kasan_check_range+0x10c/0x1c0
[   28.807878]  __kasan_check_write+0x18/0x20
[   28.808255]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   28.809093]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.809898]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.810269]  ? trace_hardirqs_on+0x37/0xe0
[   28.810701]  ? kasan_bitops_generic+0x93/0x1c0
[   28.811295]  kasan_bitops_generic+0x122/0x1c0
[   28.811852]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.812510]  ? __pfx_read_tsc+0x10/0x10
[   28.813058]  ? ktime_get_ts64+0x84/0x230
[   28.813575]  kunit_try_run_case+0x1b3/0x490
[   28.813919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.814545]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.815121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.815938]  ? __kthread_parkme+0x82/0x160
[   28.816458]  ? preempt_count_sub+0x50/0x80
[   28.816998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.817609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.818058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.818538]  kthread+0x257/0x310
[   28.818913]  ? __pfx_kthread+0x10/0x10
[   28.819358]  ret_from_fork+0x41/0x80
[   28.819817]  ? __pfx_kthread+0x10/0x10
[   28.820129]  ret_from_fork_asm+0x1a/0x30
[   28.820656]  </TASK>
[   28.820971] 
[   28.821173] Allocated by task 269:
[   28.821536]  kasan_save_stack+0x3d/0x60
[   28.821947]  kasan_save_track+0x18/0x40
[   28.822304]  kasan_save_alloc_info+0x3b/0x50
[   28.822775]  __kasan_kmalloc+0xb7/0xc0
[   28.823235]  __kmalloc_cache_noprof+0x184/0x410
[   28.823762]  kasan_bitops_generic+0x93/0x1c0
[   28.824374]  kunit_try_run_case+0x1b3/0x490
[   28.824683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.825283]  kthread+0x257/0x310
[   28.825612]  ret_from_fork+0x41/0x80
[   28.826002]  ret_from_fork_asm+0x1a/0x30
[   28.827488] 
[   28.828027] The buggy address belongs to the object at ffff888100f9bce0
[   28.828027]  which belongs to the cache kmalloc-16 of size 16
[   28.829037] The buggy address is located 8 bytes inside of
[   28.829037]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   28.829928] 
[   28.830304] The buggy address belongs to the physical page:
[   28.831543] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   28.832201] flags: 0x200000000000000(node=0|zone=2)
[   28.832929] page_type: f5(slab)
[   28.833379] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.834175] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.834961] page dumped because: kasan: bad access detected
[   28.835567] 
[   28.835916] Memory state around the buggy address:
[   28.836611]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.837427]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.838050] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.838282]                                                           ^
[   28.838483]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.838688]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.839009] ==================================================================
[   28.966242] ==================================================================
[   28.966660] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   28.967095] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   28.967871] 
[   28.968100] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   28.968985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.969355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.970059] Call Trace:
[   28.970319]  <TASK>
[   28.970645]  dump_stack_lvl+0x73/0xb0
[   28.971028]  print_report+0xd1/0x640
[   28.971544]  ? __virt_addr_valid+0x1db/0x2d0
[   28.971936]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.972315]  kasan_report+0x102/0x140
[   28.972591]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   28.973243]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   28.973891]  kasan_check_range+0x10c/0x1c0
[   28.974413]  __kasan_check_write+0x18/0x20
[   28.974870]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   28.975360]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.976060]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.976415]  ? trace_hardirqs_on+0x37/0xe0
[   28.976727]  ? kasan_bitops_generic+0x93/0x1c0
[   28.977323]  kasan_bitops_generic+0x122/0x1c0
[   28.977818]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.978465]  ? __pfx_read_tsc+0x10/0x10
[   28.978910]  ? ktime_get_ts64+0x84/0x230
[   28.979312]  kunit_try_run_case+0x1b3/0x490
[   28.979691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.980195]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.980552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.981036]  ? __kthread_parkme+0x82/0x160
[   28.981595]  ? preempt_count_sub+0x50/0x80
[   28.982070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.982638]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.983169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.983596]  kthread+0x257/0x310
[   28.984031]  ? __pfx_kthread+0x10/0x10
[   28.984523]  ret_from_fork+0x41/0x80
[   28.984895]  ? __pfx_kthread+0x10/0x10
[   28.985165]  ret_from_fork_asm+0x1a/0x30
[   28.985522]  </TASK>
[   28.985843] 
[   28.986074] Allocated by task 269:
[   28.986480]  kasan_save_stack+0x3d/0x60
[   28.986916]  kasan_save_track+0x18/0x40
[   28.987388]  kasan_save_alloc_info+0x3b/0x50
[   28.987854]  __kasan_kmalloc+0xb7/0xc0
[   28.988322]  __kmalloc_cache_noprof+0x184/0x410
[   28.988713]  kasan_bitops_generic+0x93/0x1c0
[   28.989027]  kunit_try_run_case+0x1b3/0x490
[   28.989347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.989921]  kthread+0x257/0x310
[   28.990327]  ret_from_fork+0x41/0x80
[   28.990725]  ret_from_fork_asm+0x1a/0x30
[   28.991195] 
[   28.991457] The buggy address belongs to the object at ffff888100f9bce0
[   28.991457]  which belongs to the cache kmalloc-16 of size 16
[   28.992283] The buggy address is located 8 bytes inside of
[   28.992283]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   28.992858] 
[   28.993131] The buggy address belongs to the physical page:
[   28.993684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   28.994452] flags: 0x200000000000000(node=0|zone=2)
[   28.994975] page_type: f5(slab)
[   28.995357] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.996002] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.996485] page dumped because: kasan: bad access detected
[   28.997043] 
[   28.997297] Memory state around the buggy address:
[   28.997593]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.998166]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.998845] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.999389]                                                           ^
[   28.999963]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.000378]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.000737] ==================================================================