Hay
Date
Nov. 26, 2024, 6:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   35.170250] ==================================================================
[   35.171046] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   35.171793] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   35.172773] 
[   35.173244] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.174478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.175135] Hardware name: linux,dummy-virt (DT)
[   35.175726] Call trace:
[   35.176210]  show_stack+0x20/0x38 (C)
[   35.176746]  dump_stack_lvl+0x8c/0xd0
[   35.177300]  print_report+0x118/0x5e0
[   35.177890]  kasan_report+0xc8/0x118
[   35.178413]  kasan_check_range+0x100/0x1a8
[   35.179169]  __kasan_check_write+0x20/0x30
[   35.179930]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   35.180829]  kasan_bitops_generic+0x11c/0x1c8
[   35.181532]  kunit_try_run_case+0x14c/0x3d0
[   35.182132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.182988]  kthread+0x24c/0x2d0
[   35.183634]  ret_from_fork+0x10/0x20
[   35.184291] 
[   35.184699] Allocated by task 250:
[   35.185315]  kasan_save_stack+0x3c/0x68
[   35.185834]  kasan_save_track+0x20/0x40
[   35.186492]  kasan_save_alloc_info+0x40/0x58
[   35.187163]  __kasan_kmalloc+0xd4/0xd8
[   35.187855]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.188549]  kasan_bitops_generic+0xa0/0x1c8
[   35.189275]  kunit_try_run_case+0x14c/0x3d0
[   35.189992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.190680]  kthread+0x24c/0x2d0
[   35.191288]  ret_from_fork+0x10/0x20
[   35.191850] 
[   35.192249] The buggy address belongs to the object at fff00000c57c32c0
[   35.192249]  which belongs to the cache kmalloc-16 of size 16
[   35.193554] The buggy address is located 8 bytes inside of
[   35.193554]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   35.194776] 
[   35.195201] The buggy address belongs to the physical page:
[   35.196027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   35.196882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.197790] page_type: f5(slab)
[   35.198423] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.199351] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.200146] page dumped because: kasan: bad access detected
[   35.200940] 
[   35.201338] Memory state around the buggy address:
[   35.201996]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   35.202792]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.203711] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.204422]                                               ^
[   35.205589]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.206501]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.207345] ==================================================================
[   35.249838] ==================================================================
[   35.250615] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   35.251073] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   35.251438] 
[   35.251614] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.252985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.253988] Hardware name: linux,dummy-virt (DT)
[   35.254804] Call trace:
[   35.255236]  show_stack+0x20/0x38 (C)
[   35.255995]  dump_stack_lvl+0x8c/0xd0
[   35.256619]  print_report+0x118/0x5e0
[   35.257270]  kasan_report+0xc8/0x118
[   35.257888]  kasan_check_range+0x100/0x1a8
[   35.258582]  __kasan_check_write+0x20/0x30
[   35.259248]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   35.260096]  kasan_bitops_generic+0x11c/0x1c8
[   35.260726]  kunit_try_run_case+0x14c/0x3d0
[   35.261426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.262222]  kthread+0x24c/0x2d0
[   35.262811]  ret_from_fork+0x10/0x20
[   35.263457] 
[   35.263811] Allocated by task 250:
[   35.264428]  kasan_save_stack+0x3c/0x68
[   35.265016]  kasan_save_track+0x20/0x40
[   35.265714]  kasan_save_alloc_info+0x40/0x58
[   35.266331]  __kasan_kmalloc+0xd4/0xd8
[   35.267005]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.267653]  kasan_bitops_generic+0xa0/0x1c8
[   35.268362]  kunit_try_run_case+0x14c/0x3d0
[   35.268973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.269772]  kthread+0x24c/0x2d0
[   35.270233]  ret_from_fork+0x10/0x20
[   35.270839] 
[   35.271258] The buggy address belongs to the object at fff00000c57c32c0
[   35.271258]  which belongs to the cache kmalloc-16 of size 16
[   35.273015] The buggy address is located 8 bytes inside of
[   35.273015]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   35.274303] 
[   35.274710] The buggy address belongs to the physical page:
[   35.275399] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   35.276442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.277268] page_type: f5(slab)
[   35.277804] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.278735] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.279609] page dumped because: kasan: bad access detected
[   35.280300] 
[   35.280672] Memory state around the buggy address:
[   35.281419]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   35.282257]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.283048] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.283937]                                               ^
[   35.284615]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.285572]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.286487] ==================================================================
[   35.123622] ==================================================================
[   35.125242] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   35.126547] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   35.127814] 
[   35.128308] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.129613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.130477] Hardware name: linux,dummy-virt (DT)
[   35.131322] Call trace:
[   35.131973]  show_stack+0x20/0x38 (C)
[   35.132784]  dump_stack_lvl+0x8c/0xd0
[   35.133683]  print_report+0x118/0x5e0
[   35.134256]  kasan_report+0xc8/0x118
[   35.134865]  __asan_report_load8_noabort+0x20/0x30
[   35.136013]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   35.137074]  kasan_bitops_generic+0x11c/0x1c8
[   35.137896]  kunit_try_run_case+0x14c/0x3d0
[   35.138730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.139665]  kthread+0x24c/0x2d0
[   35.141079]  ret_from_fork+0x10/0x20
[   35.141378] 
[   35.141538] Allocated by task 250:
[   35.141767]  kasan_save_stack+0x3c/0x68
[   35.142821]  kasan_save_track+0x20/0x40
[   35.143543]  kasan_save_alloc_info+0x40/0x58
[   35.144256]  __kasan_kmalloc+0xd4/0xd8
[   35.144832]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.145652]  kasan_bitops_generic+0xa0/0x1c8
[   35.146390]  kunit_try_run_case+0x14c/0x3d0
[   35.147171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.147849]  kthread+0x24c/0x2d0
[   35.148475]  ret_from_fork+0x10/0x20
[   35.149065] 
[   35.149726] The buggy address belongs to the object at fff00000c57c32c0
[   35.149726]  which belongs to the cache kmalloc-16 of size 16
[   35.152128] The buggy address is located 8 bytes inside of
[   35.152128]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   35.153555] 
[   35.153938] The buggy address belongs to the physical page:
[   35.154672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   35.155707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.157048] page_type: f5(slab)
[   35.157474] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.158173] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.158968] page dumped because: kasan: bad access detected
[   35.159582] 
[   35.159973] Memory state around the buggy address:
[   35.160867]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   35.161684]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.162422] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.163582]                                               ^
[   35.164751]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.165895]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.166702] ==================================================================
[   35.328505] ==================================================================
[   35.329341] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   35.330432] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   35.331372] 
[   35.331788] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.333113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.333845] Hardware name: linux,dummy-virt (DT)
[   35.334541] Call trace:
[   35.335099]  show_stack+0x20/0x38 (C)
[   35.335832]  dump_stack_lvl+0x8c/0xd0
[   35.336537]  print_report+0x118/0x5e0
[   35.337220]  kasan_report+0xc8/0x118
[   35.337950]  kasan_check_range+0x100/0x1a8
[   35.338683]  __kasan_check_write+0x20/0x30
[   35.339421]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   35.340364]  kasan_bitops_generic+0x11c/0x1c8
[   35.341117]  kunit_try_run_case+0x14c/0x3d0
[   35.341885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.342610]  kthread+0x24c/0x2d0
[   35.343199]  ret_from_fork+0x10/0x20
[   35.343879] 
[   35.344309] Allocated by task 250:
[   35.344790]  kasan_save_stack+0x3c/0x68
[   35.345547]  kasan_save_track+0x20/0x40
[   35.346160]  kasan_save_alloc_info+0x40/0x58
[   35.346792]  __kasan_kmalloc+0xd4/0xd8
[   35.347457]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.348080]  kasan_bitops_generic+0xa0/0x1c8
[   35.348781]  kunit_try_run_case+0x14c/0x3d0
[   35.349417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.350197]  kthread+0x24c/0x2d0
[   35.350712]  ret_from_fork+0x10/0x20
[   35.351365] 
[   35.351748] The buggy address belongs to the object at fff00000c57c32c0
[   35.351748]  which belongs to the cache kmalloc-16 of size 16
[   35.352978] The buggy address is located 8 bytes inside of
[   35.352978]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   35.354270] 
[   35.354724] The buggy address belongs to the physical page:
[   35.355335] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   35.356380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.357147] page_type: f5(slab)
[   35.357756] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.358662] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.359564] page dumped because: kasan: bad access detected
[   35.360265] 
[   35.360612] Memory state around the buggy address:
[   35.361310]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   35.362185]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.363072] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.363894]                                               ^
[   35.364589]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.365509]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.366291] ==================================================================
[   35.209318] ==================================================================
[   35.211180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   35.212063] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   35.213133] 
[   35.213545] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.214652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.215229] Hardware name: linux,dummy-virt (DT)
[   35.215851] Call trace:
[   35.216315]  show_stack+0x20/0x38 (C)
[   35.216989]  dump_stack_lvl+0x8c/0xd0
[   35.217620]  print_report+0x118/0x5e0
[   35.218235]  kasan_report+0xc8/0x118
[   35.218760]  __asan_report_load8_noabort+0x20/0x30
[   35.219468]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   35.220291]  kasan_bitops_generic+0x11c/0x1c8
[   35.221117]  kunit_try_run_case+0x14c/0x3d0
[   35.221713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.222443]  kthread+0x24c/0x2d0
[   35.223100]  ret_from_fork+0x10/0x20
[   35.223725] 
[   35.224133] Allocated by task 250:
[   35.224746]  kasan_save_stack+0x3c/0x68
[   35.225416]  kasan_save_track+0x20/0x40
[   35.226080]  kasan_save_alloc_info+0x40/0x58
[   35.226698]  __kasan_kmalloc+0xd4/0xd8
[   35.227339]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.228025]  kasan_bitops_generic+0xa0/0x1c8
[   35.228736]  kunit_try_run_case+0x14c/0x3d0
[   35.229339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.230164]  kthread+0x24c/0x2d0
[   35.230676]  ret_from_fork+0x10/0x20
[   35.231334] 
[   35.231714] The buggy address belongs to the object at fff00000c57c32c0
[   35.231714]  which belongs to the cache kmalloc-16 of size 16
[   35.233035] The buggy address is located 8 bytes inside of
[   35.233035]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   35.234302] 
[   35.234722] The buggy address belongs to the physical page:
[   35.235542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   35.236453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.237248] page_type: f5(slab)
[   35.237843] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.238736] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.239624] page dumped because: kasan: bad access detected
[   35.240314] 
[   35.240701] Memory state around the buggy address:
[   35.241395]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   35.242265]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.243164] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.243988]                                               ^
[   35.244674]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.245589]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.246433] ==================================================================
[   35.405682] ==================================================================
[   35.406535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   35.407812] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   35.408559] 
[   35.409027] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.410195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.410783] Hardware name: linux,dummy-virt (DT)
[   35.411370] Call trace:
[   35.411867]  show_stack+0x20/0x38 (C)
[   35.412500]  dump_stack_lvl+0x8c/0xd0
[   35.413099]  print_report+0x118/0x5e0
[   35.413794]  kasan_report+0xc8/0x118
[   35.414431]  __asan_report_load8_noabort+0x20/0x30
[   35.415117]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   35.416039]  kasan_bitops_generic+0x11c/0x1c8
[   35.416696]  kunit_try_run_case+0x14c/0x3d0
[   35.417362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.418253]  kthread+0x24c/0x2d0
[   35.418751]  ret_from_fork+0x10/0x20
[   35.419425] 
[   35.420088] Allocated by task 250:
[   35.420758]  kasan_save_stack+0x3c/0x68
[   35.421292]  kasan_save_track+0x20/0x40
[   35.421843]  kasan_save_alloc_info+0x40/0x58
[   35.422577]  __kasan_kmalloc+0xd4/0xd8
[   35.423084]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.423700]  kasan_bitops_generic+0xa0/0x1c8
[   35.424292]  kunit_try_run_case+0x14c/0x3d0
[   35.424832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.425655]  kthread+0x24c/0x2d0
[   35.426233]  ret_from_fork+0x10/0x20
[   35.426741] 
[   35.427126] The buggy address belongs to the object at fff00000c57c32c0
[   35.427126]  which belongs to the cache kmalloc-16 of size 16
[   35.428339] The buggy address is located 8 bytes inside of
[   35.428339]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   35.429359] 
[   35.429731] The buggy address belongs to the physical page:
[   35.430480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   35.431337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.432115] page_type: f5(slab)
[   35.432673] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.433551] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.434518] page dumped because: kasan: bad access detected
[   35.435206] 
[   35.435576] Memory state around the buggy address:
[   35.436246]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   35.437056]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.437935] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.438708]                                               ^
[   35.439297]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.440214]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.440989] ==================================================================
[   35.368052] ==================================================================
[   35.368924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   35.370017] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   35.370993] 
[   35.371427] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.372425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.373112] Hardware name: linux,dummy-virt (DT)
[   35.373726] Call trace:
[   35.374276]  show_stack+0x20/0x38 (C)
[   35.374945]  dump_stack_lvl+0x8c/0xd0
[   35.375663]  print_report+0x118/0x5e0
[   35.376286]  kasan_report+0xc8/0x118
[   35.376971]  __asan_report_load8_noabort+0x20/0x30
[   35.377602]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   35.378502]  kasan_bitops_generic+0x11c/0x1c8
[   35.379130]  kunit_try_run_case+0x14c/0x3d0
[   35.379850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.380600]  kthread+0x24c/0x2d0
[   35.381186]  ret_from_fork+0x10/0x20
[   35.381820] 
[   35.382255] Allocated by task 250:
[   35.382838]  kasan_save_stack+0x3c/0x68
[   35.383472]  kasan_save_track+0x20/0x40
[   35.384142]  kasan_save_alloc_info+0x40/0x58
[   35.384777]  __kasan_kmalloc+0xd4/0xd8
[   35.385487]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.386120]  kasan_bitops_generic+0xa0/0x1c8
[   35.386798]  kunit_try_run_case+0x14c/0x3d0
[   35.387441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.388212]  kthread+0x24c/0x2d0
[   35.388764]  ret_from_fork+0x10/0x20
[   35.389320] 
[   35.389729] The buggy address belongs to the object at fff00000c57c32c0
[   35.389729]  which belongs to the cache kmalloc-16 of size 16
[   35.390955] The buggy address is located 8 bytes inside of
[   35.390955]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   35.392220] 
[   35.392621] The buggy address belongs to the physical page:
[   35.393272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   35.394226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.395097] page_type: f5(slab)
[   35.395676] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.396541] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.397427] page dumped because: kasan: bad access detected
[   35.398144] 
[   35.398526] Memory state around the buggy address:
[   35.399107]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   35.400025]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.400874] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.401706]                                               ^
[   35.402421]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.403281]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.404107] ==================================================================
[   35.289086] ==================================================================
[   35.289795] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   35.290751] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   35.291423] 
[   35.291871] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.293139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.293733] Hardware name: linux,dummy-virt (DT)
[   35.294422] Call trace:
[   35.294941]  show_stack+0x20/0x38 (C)
[   35.295534]  dump_stack_lvl+0x8c/0xd0
[   35.296233]  print_report+0x118/0x5e0
[   35.296865]  kasan_report+0xc8/0x118
[   35.297558]  __asan_report_load8_noabort+0x20/0x30
[   35.298252]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   35.299120]  kasan_bitops_generic+0x11c/0x1c8
[   35.299822]  kunit_try_run_case+0x14c/0x3d0
[   35.300465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.301285]  kthread+0x24c/0x2d0
[   35.301863]  ret_from_fork+0x10/0x20
[   35.302506] 
[   35.302931] Allocated by task 250:
[   35.303439]  kasan_save_stack+0x3c/0x68
[   35.304069]  kasan_save_track+0x20/0x40
[   35.304729]  kasan_save_alloc_info+0x40/0x58
[   35.305408]  __kasan_kmalloc+0xd4/0xd8
[   35.306075]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.306685]  kasan_bitops_generic+0xa0/0x1c8
[   35.307390]  kunit_try_run_case+0x14c/0x3d0
[   35.308004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.308815]  kthread+0x24c/0x2d0
[   35.309337]  ret_from_fork+0x10/0x20
[   35.309987] 
[   35.310363] The buggy address belongs to the object at fff00000c57c32c0
[   35.310363]  which belongs to the cache kmalloc-16 of size 16
[   35.311693] The buggy address is located 8 bytes inside of
[   35.311693]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   35.312946] 
[   35.313327] The buggy address belongs to the physical page:
[   35.313990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   35.315046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.315924] page_type: f5(slab)
[   35.316406] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.317500] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.318355] page dumped because: kasan: bad access detected
[   35.319049] 
[   35.319455] Memory state around the buggy address:
[   35.320097]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   35.320857]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.321779] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.322617]                                               ^
[   35.323311]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.324175]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.325012] ==================================================================
[   35.081189] ==================================================================
[   35.081783] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   35.082519] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   35.083471] 
[   35.083878] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.086078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.086766] Hardware name: linux,dummy-virt (DT)
[   35.087519] Call trace:
[   35.087990]  show_stack+0x20/0x38 (C)
[   35.088884]  dump_stack_lvl+0x8c/0xd0
[   35.089755]  print_report+0x118/0x5e0
[   35.090327]  kasan_report+0xc8/0x118
[   35.091029]  kasan_check_range+0x100/0x1a8
[   35.091607]  __kasan_check_write+0x20/0x30
[   35.092279]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   35.093581]  kasan_bitops_generic+0x11c/0x1c8
[   35.094050]  kunit_try_run_case+0x14c/0x3d0
[   35.094611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.095283]  kthread+0x24c/0x2d0
[   35.095875]  ret_from_fork+0x10/0x20
[   35.096815] 
[   35.097206] Allocated by task 250:
[   35.097795]  kasan_save_stack+0x3c/0x68
[   35.098294]  kasan_save_track+0x20/0x40
[   35.098763]  kasan_save_alloc_info+0x40/0x58
[   35.099449]  __kasan_kmalloc+0xd4/0xd8
[   35.100072]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.100756]  kasan_bitops_generic+0xa0/0x1c8
[   35.101436]  kunit_try_run_case+0x14c/0x3d0
[   35.102031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.103798]  kthread+0x24c/0x2d0
[   35.104516]  ret_from_fork+0x10/0x20
[   35.105088] 
[   35.105368] The buggy address belongs to the object at fff00000c57c32c0
[   35.105368]  which belongs to the cache kmalloc-16 of size 16
[   35.106427] The buggy address is located 8 bytes inside of
[   35.106427]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   35.107879] 
[   35.108335] The buggy address belongs to the physical page:
[   35.109445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   35.110586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.111533] page_type: f5(slab)
[   35.112217] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.113715] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.114470] page dumped because: kasan: bad access detected
[   35.115437] 
[   35.115966] Memory state around the buggy address:
[   35.117023]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   35.117820]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.118406] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.119216]                                               ^
[   35.120051]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.121376]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.121931] ==================================================================

[   35.117252] ==================================================================
[   35.117975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   35.119403] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.120657] 
[   35.121083] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.122163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.122435] Hardware name: linux,dummy-virt (DT)
[   35.122914] Call trace:
[   35.123431]  show_stack+0x20/0x38 (C)
[   35.124201]  dump_stack_lvl+0x8c/0xd0
[   35.124959]  print_report+0x118/0x5e0
[   35.125681]  kasan_report+0xc8/0x118
[   35.126351]  kasan_check_range+0x100/0x1a8
[   35.127190]  __kasan_check_write+0x20/0x30
[   35.128067]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   35.128888]  kasan_bitops_generic+0x11c/0x1c8
[   35.129762]  kunit_try_run_case+0x14c/0x3d0
[   35.130598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.131298]  kthread+0x24c/0x2d0
[   35.131877]  ret_from_fork+0x10/0x20
[   35.132601] 
[   35.132906] Allocated by task 250:
[   35.133385]  kasan_save_stack+0x3c/0x68
[   35.134053]  kasan_save_track+0x20/0x40
[   35.134706]  kasan_save_alloc_info+0x40/0x58
[   35.135357]  __kasan_kmalloc+0xd4/0xd8
[   35.135909]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.136579]  kasan_bitops_generic+0xa0/0x1c8
[   35.137198]  kunit_try_run_case+0x14c/0x3d0
[   35.137823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.138571]  kthread+0x24c/0x2d0
[   35.139125]  ret_from_fork+0x10/0x20
[   35.139787] 
[   35.140175] The buggy address belongs to the object at fff00000c5e082a0
[   35.140175]  which belongs to the cache kmalloc-16 of size 16
[   35.141170] The buggy address is located 8 bytes inside of
[   35.141170]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.142489] 
[   35.142893] The buggy address belongs to the physical page:
[   35.143638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.144615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.145295] page_type: f5(slab)
[   35.145888] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.146785] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.147751] page dumped because: kasan: bad access detected
[   35.148394] 
[   35.148791] Memory state around the buggy address:
[   35.149454]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.150307]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.151222] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.152097]                                   ^
[   35.152806]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.153611]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.154386] ==================================================================
[   35.238410] ==================================================================
[   35.239196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   35.240159] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.241021] 
[   35.241410] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.242632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.243262] Hardware name: linux,dummy-virt (DT)
[   35.243961] Call trace:
[   35.244341]  show_stack+0x20/0x38 (C)
[   35.245069]  dump_stack_lvl+0x8c/0xd0
[   35.245720]  print_report+0x118/0x5e0
[   35.246400]  kasan_report+0xc8/0x118
[   35.246991]  __asan_report_load8_noabort+0x20/0x30
[   35.247791]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   35.248758]  kasan_bitops_generic+0x11c/0x1c8
[   35.249508]  kunit_try_run_case+0x14c/0x3d0
[   35.250110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.250985]  kthread+0x24c/0x2d0
[   35.251560]  ret_from_fork+0x10/0x20
[   35.252223] 
[   35.252625] Allocated by task 250:
[   35.253240]  kasan_save_stack+0x3c/0x68
[   35.253869]  kasan_save_track+0x20/0x40
[   35.254510]  kasan_save_alloc_info+0x40/0x58
[   35.255251]  __kasan_kmalloc+0xd4/0xd8
[   35.255857]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.256618]  kasan_bitops_generic+0xa0/0x1c8
[   35.257229]  kunit_try_run_case+0x14c/0x3d0
[   35.257959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.258658]  kthread+0x24c/0x2d0
[   35.259268]  ret_from_fork+0x10/0x20
[   35.259877] 
[   35.260298] The buggy address belongs to the object at fff00000c5e082a0
[   35.260298]  which belongs to the cache kmalloc-16 of size 16
[   35.261509] The buggy address is located 8 bytes inside of
[   35.261509]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.262849] 
[   35.263271] The buggy address belongs to the physical page:
[   35.264011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.265032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.265928] page_type: f5(slab)
[   35.266484] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.267638] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.268479] page dumped because: kasan: bad access detected
[   35.269248] 
[   35.269678] Memory state around the buggy address:
[   35.270303]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.271161]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.272042] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.272962]                                   ^
[   35.273564]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.274447]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.275328] ==================================================================
[   35.428598] ==================================================================
[   35.429350] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   35.430397] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.431698] 
[   35.432058] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.433100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.434165] Hardware name: linux,dummy-virt (DT)
[   35.434821] Call trace:
[   35.435194]  show_stack+0x20/0x38 (C)
[   35.435848]  dump_stack_lvl+0x8c/0xd0
[   35.436435]  print_report+0x118/0x5e0
[   35.437406]  kasan_report+0xc8/0x118
[   35.437928]  __asan_report_load8_noabort+0x20/0x30
[   35.438701]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   35.439365]  kasan_bitops_generic+0x11c/0x1c8
[   35.440088]  kunit_try_run_case+0x14c/0x3d0
[   35.440775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.441403]  kthread+0x24c/0x2d0
[   35.442016]  ret_from_fork+0x10/0x20
[   35.442666] 
[   35.442983] Allocated by task 250:
[   35.443564]  kasan_save_stack+0x3c/0x68
[   35.444174]  kasan_save_track+0x20/0x40
[   35.444773]  kasan_save_alloc_info+0x40/0x58
[   35.445462]  __kasan_kmalloc+0xd4/0xd8
[   35.446008]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.446677]  kasan_bitops_generic+0xa0/0x1c8
[   35.447271]  kunit_try_run_case+0x14c/0x3d0
[   35.447952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.448683]  kthread+0x24c/0x2d0
[   35.449303]  ret_from_fork+0x10/0x20
[   35.449936] 
[   35.450307] The buggy address belongs to the object at fff00000c5e082a0
[   35.450307]  which belongs to the cache kmalloc-16 of size 16
[   35.451486] The buggy address is located 8 bytes inside of
[   35.451486]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.452944] 
[   35.453310] The buggy address belongs to the physical page:
[   35.453987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.454802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.455703] page_type: f5(slab)
[   35.456213] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.457164] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.458049] page dumped because: kasan: bad access detected
[   35.458766] 
[   35.459124] Memory state around the buggy address:
[   35.459742]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.460698]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.461436] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.462305]                                   ^
[   35.462903]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.463723]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.464609] ==================================================================
[   35.196426] ==================================================================
[   35.197781] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   35.199102] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.199950] 
[   35.200357] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.202622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.203131] Hardware name: linux,dummy-virt (DT)
[   35.203816] Call trace:
[   35.204251]  show_stack+0x20/0x38 (C)
[   35.204871]  dump_stack_lvl+0x8c/0xd0
[   35.205508]  print_report+0x118/0x5e0
[   35.206192]  kasan_report+0xc8/0x118
[   35.206846]  kasan_check_range+0x100/0x1a8
[   35.207447]  __kasan_check_write+0x20/0x30
[   35.208158]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   35.209051]  kasan_bitops_generic+0x11c/0x1c8
[   35.209694]  kunit_try_run_case+0x14c/0x3d0
[   35.210257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.211078]  kthread+0x24c/0x2d0
[   35.211704]  ret_from_fork+0x10/0x20
[   35.212243] 
[   35.212653] Allocated by task 250:
[   35.213196]  kasan_save_stack+0x3c/0x68
[   35.213736]  kasan_save_track+0x20/0x40
[   35.214357]  kasan_save_alloc_info+0x40/0x58
[   35.214968]  __kasan_kmalloc+0xd4/0xd8
[   35.215568]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.216278]  kasan_bitops_generic+0xa0/0x1c8
[   35.216932]  kunit_try_run_case+0x14c/0x3d0
[   35.217511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.218316]  kthread+0x24c/0x2d0
[   35.218861]  ret_from_fork+0x10/0x20
[   35.219468] 
[   35.219856] The buggy address belongs to the object at fff00000c5e082a0
[   35.219856]  which belongs to the cache kmalloc-16 of size 16
[   35.221130] The buggy address is located 8 bytes inside of
[   35.221130]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.222651] 
[   35.223114] The buggy address belongs to the physical page:
[   35.224017] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.225032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.225900] page_type: f5(slab)
[   35.226492] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.227505] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.228479] page dumped because: kasan: bad access detected
[   35.229215] 
[   35.229650] Memory state around the buggy address:
[   35.230391]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.231424]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.232333] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.233125]                                   ^
[   35.233861]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.234663]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.235681] ==================================================================
[   35.276980] ==================================================================
[   35.278135] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   35.279131] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.280165] 
[   35.280851] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.282656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.283225] Hardware name: linux,dummy-virt (DT)
[   35.283862] Call trace:
[   35.284289]  show_stack+0x20/0x38 (C)
[   35.285079]  dump_stack_lvl+0x8c/0xd0
[   35.285651]  print_report+0x118/0x5e0
[   35.286232]  kasan_report+0xc8/0x118
[   35.286842]  kasan_check_range+0x100/0x1a8
[   35.287465]  __kasan_check_write+0x20/0x30
[   35.288104]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   35.288876]  kasan_bitops_generic+0x11c/0x1c8
[   35.289607]  kunit_try_run_case+0x14c/0x3d0
[   35.290229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.291062]  kthread+0x24c/0x2d0
[   35.291626]  ret_from_fork+0x10/0x20
[   35.292214] 
[   35.292575] Allocated by task 250:
[   35.293143]  kasan_save_stack+0x3c/0x68
[   35.293744]  kasan_save_track+0x20/0x40
[   35.294379]  kasan_save_alloc_info+0x40/0x58
[   35.294996]  __kasan_kmalloc+0xd4/0xd8
[   35.295481]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.296214]  kasan_bitops_generic+0xa0/0x1c8
[   35.296763]  kunit_try_run_case+0x14c/0x3d0
[   35.297430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.298075]  kthread+0x24c/0x2d0
[   35.298669]  ret_from_fork+0x10/0x20
[   35.299185] 
[   35.299584] The buggy address belongs to the object at fff00000c5e082a0
[   35.299584]  which belongs to the cache kmalloc-16 of size 16
[   35.300745] The buggy address is located 8 bytes inside of
[   35.300745]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.302183] 
[   35.302550] The buggy address belongs to the physical page:
[   35.303313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.304173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.305053] page_type: f5(slab)
[   35.305651] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.306594] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.307391] page dumped because: kasan: bad access detected
[   35.308106] 
[   35.308485] Memory state around the buggy address:
[   35.309119]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.310001]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.310895] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.311697]                                   ^
[   35.312376]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.313153]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.313981] ==================================================================
[   35.315457] ==================================================================
[   35.316132] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   35.317120] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.318118] 
[   35.318496] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.319593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.320144] Hardware name: linux,dummy-virt (DT)
[   35.320770] Call trace:
[   35.321244]  show_stack+0x20/0x38 (C)
[   35.321915]  dump_stack_lvl+0x8c/0xd0
[   35.322478]  print_report+0x118/0x5e0
[   35.323138]  kasan_report+0xc8/0x118
[   35.323726]  __asan_report_load8_noabort+0x20/0x30
[   35.324399]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   35.325287]  kasan_bitops_generic+0x11c/0x1c8
[   35.326017]  kunit_try_run_case+0x14c/0x3d0
[   35.326718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.327547]  kthread+0x24c/0x2d0
[   35.328140]  ret_from_fork+0x10/0x20
[   35.328803] 
[   35.329163] Allocated by task 250:
[   35.329677]  kasan_save_stack+0x3c/0x68
[   35.330301]  kasan_save_track+0x20/0x40
[   35.330810]  kasan_save_alloc_info+0x40/0x58
[   35.331476]  __kasan_kmalloc+0xd4/0xd8
[   35.332157]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.332795]  kasan_bitops_generic+0xa0/0x1c8
[   35.333393]  kunit_try_run_case+0x14c/0x3d0
[   35.334096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.334894]  kthread+0x24c/0x2d0
[   35.335483]  ret_from_fork+0x10/0x20
[   35.336120] 
[   35.336448] The buggy address belongs to the object at fff00000c5e082a0
[   35.336448]  which belongs to the cache kmalloc-16 of size 16
[   35.337643] The buggy address is located 8 bytes inside of
[   35.337643]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.338952] 
[   35.339273] The buggy address belongs to the physical page:
[   35.340056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.341095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.341898] page_type: f5(slab)
[   35.342433] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.343339] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.344323] page dumped because: kasan: bad access detected
[   35.344897] 
[   35.345274] Memory state around the buggy address:
[   35.345995]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.346798]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.347726] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.348453]                                   ^
[   35.349175]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.350026]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.350778] ==================================================================
[   35.352073] ==================================================================
[   35.353661] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   35.354556] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.355443] 
[   35.355806] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.356939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.357577] Hardware name: linux,dummy-virt (DT)
[   35.358152] Call trace:
[   35.358646]  show_stack+0x20/0x38 (C)
[   35.359289]  dump_stack_lvl+0x8c/0xd0
[   35.359887]  print_report+0x118/0x5e0
[   35.360555]  kasan_report+0xc8/0x118
[   35.361147]  kasan_check_range+0x100/0x1a8
[   35.361852]  __kasan_check_write+0x20/0x30
[   35.362394]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   35.363256]  kasan_bitops_generic+0x11c/0x1c8
[   35.363988]  kunit_try_run_case+0x14c/0x3d0
[   35.364565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.365381]  kthread+0x24c/0x2d0
[   35.365906]  ret_from_fork+0x10/0x20
[   35.366586] 
[   35.366958] Allocated by task 250:
[   35.367544]  kasan_save_stack+0x3c/0x68
[   35.368189]  kasan_save_track+0x20/0x40
[   35.368718]  kasan_save_alloc_info+0x40/0x58
[   35.369390]  __kasan_kmalloc+0xd4/0xd8
[   35.369944]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.370662]  kasan_bitops_generic+0xa0/0x1c8
[   35.371249]  kunit_try_run_case+0x14c/0x3d0
[   35.371943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.372605]  kthread+0x24c/0x2d0
[   35.373181]  ret_from_fork+0x10/0x20
[   35.373769] 
[   35.374136] The buggy address belongs to the object at fff00000c5e082a0
[   35.374136]  which belongs to the cache kmalloc-16 of size 16
[   35.375371] The buggy address is located 8 bytes inside of
[   35.375371]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.376597] 
[   35.376990] The buggy address belongs to the physical page:
[   35.377611] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.378644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.379287] page_type: f5(slab)
[   35.379886] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.380901] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.381626] page dumped because: kasan: bad access detected
[   35.382380] 
[   35.382775] Memory state around the buggy address:
[   35.383300]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.384240]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.384923] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.385850]                                   ^
[   35.386481]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.387450]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.388283] ==================================================================
[   35.390696] ==================================================================
[   35.391598] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   35.392516] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.393269] 
[   35.393668] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.394967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.395587] Hardware name: linux,dummy-virt (DT)
[   35.396286] Call trace:
[   35.396754]  show_stack+0x20/0x38 (C)
[   35.397396]  dump_stack_lvl+0x8c/0xd0
[   35.397922]  print_report+0x118/0x5e0
[   35.398579]  kasan_report+0xc8/0x118
[   35.399167]  __asan_report_load8_noabort+0x20/0x30
[   35.399830]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   35.400723]  kasan_bitops_generic+0x11c/0x1c8
[   35.401405]  kunit_try_run_case+0x14c/0x3d0
[   35.402002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.402830]  kthread+0x24c/0x2d0
[   35.403448]  ret_from_fork+0x10/0x20
[   35.404113] 
[   35.404492] Allocated by task 250:
[   35.405048]  kasan_save_stack+0x3c/0x68
[   35.405666]  kasan_save_track+0x20/0x40
[   35.406313]  kasan_save_alloc_info+0x40/0x58
[   35.407010]  __kasan_kmalloc+0xd4/0xd8
[   35.407612]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.408229]  kasan_bitops_generic+0xa0/0x1c8
[   35.408941]  kunit_try_run_case+0x14c/0x3d0
[   35.409635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.410335]  kthread+0x24c/0x2d0
[   35.410942]  ret_from_fork+0x10/0x20
[   35.411574] 
[   35.411916] The buggy address belongs to the object at fff00000c5e082a0
[   35.411916]  which belongs to the cache kmalloc-16 of size 16
[   35.413084] The buggy address is located 8 bytes inside of
[   35.413084]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.414364] 
[   35.414744] The buggy address belongs to the physical page:
[   35.415508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.417043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.417839] page_type: f5(slab)
[   35.418400] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.419211] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.420062] page dumped because: kasan: bad access detected
[   35.420847] 
[   35.421162] Memory state around the buggy address:
[   35.421821]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.422635]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.423474] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.424322]                                   ^
[   35.424847]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.425778]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.426624] ==================================================================
[   35.157714] ==================================================================
[   35.158773] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   35.159823] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.160584] 
[   35.161088] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.162485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.163134] Hardware name: linux,dummy-virt (DT)
[   35.163848] Call trace:
[   35.165338]  show_stack+0x20/0x38 (C)
[   35.165874]  dump_stack_lvl+0x8c/0xd0
[   35.166378]  print_report+0x118/0x5e0
[   35.167036]  kasan_report+0xc8/0x118
[   35.167615]  __asan_report_load8_noabort+0x20/0x30
[   35.168304]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   35.169173]  kasan_bitops_generic+0x11c/0x1c8
[   35.169878]  kunit_try_run_case+0x14c/0x3d0
[   35.170478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.171160]  kthread+0x24c/0x2d0
[   35.171772]  ret_from_fork+0x10/0x20
[   35.172412] 
[   35.172749] Allocated by task 250:
[   35.173310]  kasan_save_stack+0x3c/0x68
[   35.173966]  kasan_save_track+0x20/0x40
[   35.174562]  kasan_save_alloc_info+0x40/0x58
[   35.175091]  __kasan_kmalloc+0xd4/0xd8
[   35.175732]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.176441]  kasan_bitops_generic+0xa0/0x1c8
[   35.177058]  kunit_try_run_case+0x14c/0x3d0
[   35.177591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.178375]  kthread+0x24c/0x2d0
[   35.178973]  ret_from_fork+0x10/0x20
[   35.179457] 
[   35.179858] The buggy address belongs to the object at fff00000c5e082a0
[   35.179858]  which belongs to the cache kmalloc-16 of size 16
[   35.181102] The buggy address is located 8 bytes inside of
[   35.181102]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.182401] 
[   35.182803] The buggy address belongs to the physical page:
[   35.183579] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.184412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.185270] page_type: f5(slab)
[   35.185849] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.186721] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.187723] page dumped because: kasan: bad access detected
[   35.188486] 
[   35.188845] Memory state around the buggy address:
[   35.189890]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.190773]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.191575] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.192387]                                   ^
[   35.193015]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.193957]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.194672] ==================================================================

[   29.602969] ==================================================================
[   29.603370] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   29.603452] Read of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.603452] 
[   29.605097] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.605097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.605097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.605097] Call Trace:
[   29.605097]  <TASK>
[   29.605097]  dump_stack_lvl+0x73/0xb0
[   29.605097]  print_report+0xd1/0x640
[   29.605097]  ? __virt_addr_valid+0x1db/0x2d0
[   29.605097]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.605097]  kasan_report+0x102/0x140
[   29.605097]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   29.605097]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   29.605097]  __asan_report_load8_noabort+0x18/0x20
[   29.605097]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   29.605097]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.605097]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.605097]  ? __pfx_read_hpet+0x10/0x10
[   29.605097]  ? kasan_bitops_generic+0x93/0x1c0
[   29.605097]  kasan_bitops_generic+0x122/0x1c0
[   29.605097]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.605097]  ? ktime_get_ts64+0x84/0x230
[   29.605097]  kunit_try_run_case+0x1b3/0x490
[   29.605097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.605097]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.605097]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.605097]  ? __kthread_parkme+0x82/0x160
[   29.605097]  ? preempt_count_sub+0x50/0x80
[   29.605097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.605097]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.605097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.605097]  kthread+0x257/0x310
[   29.605097]  ? __pfx_kthread+0x10/0x10
[   29.605097]  ret_from_fork+0x41/0x80
[   29.605097]  ? __pfx_kthread+0x10/0x10
[   29.605097]  ret_from_fork_asm+0x1a/0x30
[   29.605097]  </TASK>
[   29.605097] 
[   29.605097] Allocated by task 270:
[   29.605097]  kasan_save_stack+0x3d/0x60
[   29.605097]  kasan_save_track+0x18/0x40
[   29.605097]  kasan_save_alloc_info+0x3b/0x50
[   29.605097]  __kasan_kmalloc+0xb7/0xc0
[   29.605097]  __kmalloc_cache_noprof+0x184/0x410
[   29.605097]  kasan_bitops_generic+0x93/0x1c0
[   29.605097]  kunit_try_run_case+0x1b3/0x490
[   29.605097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.605097]  kthread+0x257/0x310
[   29.605097]  ret_from_fork+0x41/0x80
[   29.605097]  ret_from_fork_asm+0x1a/0x30
[   29.605097] 
[   29.605097] The buggy address belongs to the object at ffff888101a46900
[   29.605097]  which belongs to the cache kmalloc-16 of size 16
[   29.605097] The buggy address is located 8 bytes inside of
[   29.605097]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.605097] 
[   29.605097] The buggy address belongs to the physical page:
[   29.605097] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.605097] flags: 0x200000000000000(node=0|zone=2)
[   29.605097] page_type: f5(slab)
[   29.605097] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.605097] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.605097] page dumped because: kasan: bad access detected
[   29.605097] 
[   29.605097] Memory state around the buggy address:
[   29.605097]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.605097]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.605097] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.605097]                       ^
[   29.605097]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.605097]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.605097] ==================================================================
[   29.286711] ==================================================================
[   29.287372] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   29.287372] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.287372] 
[   29.287372] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.287372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.287372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.287372] Call Trace:
[   29.287372]  <TASK>
[   29.287372]  dump_stack_lvl+0x73/0xb0
[   29.287372]  print_report+0xd1/0x640
[   29.287372]  ? __virt_addr_valid+0x1db/0x2d0
[   29.287372]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.287372]  kasan_report+0x102/0x140
[   29.287372]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   29.287372]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   29.287372]  kasan_check_range+0x10c/0x1c0
[   29.287372]  __kasan_check_write+0x18/0x20
[   29.287372]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   29.287372]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.287372]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.287372]  ? __pfx_read_hpet+0x10/0x10
[   29.287372]  ? kasan_bitops_generic+0x93/0x1c0
[   29.287372]  kasan_bitops_generic+0x122/0x1c0
[   29.287372]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.287372]  ? ktime_get_ts64+0x84/0x230
[   29.287372]  kunit_try_run_case+0x1b3/0x490
[   29.287372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.287372]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.287372]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.287372]  ? __kthread_parkme+0x82/0x160
[   29.287372]  ? preempt_count_sub+0x50/0x80
[   29.287372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.287372]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.287372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.287372]  kthread+0x257/0x310
[   29.287372]  ? __pfx_kthread+0x10/0x10
[   29.287372]  ret_from_fork+0x41/0x80
[   29.287372]  ? __pfx_kthread+0x10/0x10
[   29.287372]  ret_from_fork_asm+0x1a/0x30
[   29.287372]  </TASK>
[   29.287372] 
[   29.287372] Allocated by task 270:
[   29.287372]  kasan_save_stack+0x3d/0x60
[   29.287372]  kasan_save_track+0x18/0x40
[   29.287372]  kasan_save_alloc_info+0x3b/0x50
[   29.287372]  __kasan_kmalloc+0xb7/0xc0
[   29.287372]  __kmalloc_cache_noprof+0x184/0x410
[   29.287372]  kasan_bitops_generic+0x93/0x1c0
[   29.287372]  kunit_try_run_case+0x1b3/0x490
[   29.287372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.287372]  kthread+0x257/0x310
[   29.287372]  ret_from_fork+0x41/0x80
[   29.287372]  ret_from_fork_asm+0x1a/0x30
[   29.287372] 
[   29.287372] The buggy address belongs to the object at ffff888101a46900
[   29.287372]  which belongs to the cache kmalloc-16 of size 16
[   29.287372] The buggy address is located 8 bytes inside of
[   29.287372]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.287372] 
[   29.287372] The buggy address belongs to the physical page:
[   29.287372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.287372] flags: 0x200000000000000(node=0|zone=2)
[   29.287372] page_type: f5(slab)
[   29.287372] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.287372] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.287372] page dumped because: kasan: bad access detected
[   29.287372] 
[   29.287372] Memory state around the buggy address:
[   29.287372]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.287372]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.287372] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.287372]                       ^
[   29.287372]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.287372]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.287372] ==================================================================
[   29.464087] ==================================================================
[   29.464602] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   29.464602] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.466518] 
[   29.466518] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.466518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.466518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.466518] Call Trace:
[   29.466518]  <TASK>
[   29.466518]  dump_stack_lvl+0x73/0xb0
[   29.466518]  print_report+0xd1/0x640
[   29.466518]  ? __virt_addr_valid+0x1db/0x2d0
[   29.466518]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.466518]  kasan_report+0x102/0x140
[   29.466518]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   29.466518]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   29.466518]  kasan_check_range+0x10c/0x1c0
[   29.466518]  __kasan_check_write+0x18/0x20
[   29.466518]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   29.466518]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.466518]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.466518]  ? __pfx_read_hpet+0x10/0x10
[   29.466518]  ? kasan_bitops_generic+0x93/0x1c0
[   29.466518]  kasan_bitops_generic+0x122/0x1c0
[   29.466518]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.466518]  ? ktime_get_ts64+0x84/0x230
[   29.466518]  kunit_try_run_case+0x1b3/0x490
[   29.466518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.466518]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.466518]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.466518]  ? __kthread_parkme+0x82/0x160
[   29.466518]  ? preempt_count_sub+0x50/0x80
[   29.466518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.466518]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.466518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.466518]  kthread+0x257/0x310
[   29.466518]  ? __pfx_kthread+0x10/0x10
[   29.466518]  ret_from_fork+0x41/0x80
[   29.466518]  ? __pfx_kthread+0x10/0x10
[   29.466518]  ret_from_fork_asm+0x1a/0x30
[   29.466518]  </TASK>
[   29.466518] 
[   29.466518] Allocated by task 270:
[   29.466518]  kasan_save_stack+0x3d/0x60
[   29.466518]  kasan_save_track+0x18/0x40
[   29.466518]  kasan_save_alloc_info+0x3b/0x50
[   29.466518]  __kasan_kmalloc+0xb7/0xc0
[   29.466518]  __kmalloc_cache_noprof+0x184/0x410
[   29.466518]  kasan_bitops_generic+0x93/0x1c0
[   29.466518]  kunit_try_run_case+0x1b3/0x490
[   29.466518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.466518]  kthread+0x257/0x310
[   29.466518]  ret_from_fork+0x41/0x80
[   29.466518]  ret_from_fork_asm+0x1a/0x30
[   29.466518] 
[   29.466518] The buggy address belongs to the object at ffff888101a46900
[   29.466518]  which belongs to the cache kmalloc-16 of size 16
[   29.466518] The buggy address is located 8 bytes inside of
[   29.466518]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.466518] 
[   29.466518] The buggy address belongs to the physical page:
[   29.466518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.466518] flags: 0x200000000000000(node=0|zone=2)
[   29.466518] page_type: f5(slab)
[   29.466518] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.466518] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.466518] page dumped because: kasan: bad access detected
[   29.466518] 
[   29.466518] Memory state around the buggy address:
[   29.466518]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.466518]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.466518] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.466518]                       ^
[   29.466518]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.466518]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.466518] ==================================================================
[   29.552758] ==================================================================
[   29.553437] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   29.553437] Read of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.553437] 
[   29.553437] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.553437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.553437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.553437] Call Trace:
[   29.553437]  <TASK>
[   29.553437]  dump_stack_lvl+0x73/0xb0
[   29.553437]  print_report+0xd1/0x640
[   29.553437]  ? __virt_addr_valid+0x1db/0x2d0
[   29.553437]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.553437]  kasan_report+0x102/0x140
[   29.553437]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   29.553437]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   29.553437]  kasan_check_range+0x10c/0x1c0
[   29.553437]  __kasan_check_read+0x15/0x20
[   29.553437]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   29.553437]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.553437]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.553437]  ? __pfx_read_hpet+0x10/0x10
[   29.553437]  ? kasan_bitops_generic+0x93/0x1c0
[   29.553437]  kasan_bitops_generic+0x122/0x1c0
[   29.553437]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.553437]  ? ktime_get_ts64+0x84/0x230
[   29.553437]  kunit_try_run_case+0x1b3/0x490
[   29.553437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.553437]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.553437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.553437]  ? __kthread_parkme+0x82/0x160
[   29.553437]  ? preempt_count_sub+0x50/0x80
[   29.553437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.553437]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.553437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.553437]  kthread+0x257/0x310
[   29.553437]  ? __pfx_kthread+0x10/0x10
[   29.553437]  ret_from_fork+0x41/0x80
[   29.553437]  ? __pfx_kthread+0x10/0x10
[   29.553437]  ret_from_fork_asm+0x1a/0x30
[   29.553437]  </TASK>
[   29.553437] 
[   29.553437] Allocated by task 270:
[   29.553437]  kasan_save_stack+0x3d/0x60
[   29.553437]  kasan_save_track+0x18/0x40
[   29.553437]  kasan_save_alloc_info+0x3b/0x50
[   29.553437]  __kasan_kmalloc+0xb7/0xc0
[   29.553437]  __kmalloc_cache_noprof+0x184/0x410
[   29.553437]  kasan_bitops_generic+0x93/0x1c0
[   29.553437]  kunit_try_run_case+0x1b3/0x490
[   29.553437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.553437]  kthread+0x257/0x310
[   29.553437]  ret_from_fork+0x41/0x80
[   29.553437]  ret_from_fork_asm+0x1a/0x30
[   29.553437] 
[   29.553437] The buggy address belongs to the object at ffff888101a46900
[   29.553437]  which belongs to the cache kmalloc-16 of size 16
[   29.553437] The buggy address is located 8 bytes inside of
[   29.553437]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.553437] 
[   29.553437] The buggy address belongs to the physical page:
[   29.553437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.553437] flags: 0x200000000000000(node=0|zone=2)
[   29.553437] page_type: f5(slab)
[   29.553437] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.553437] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.553437] page dumped because: kasan: bad access detected
[   29.553437] 
[   29.553437] Memory state around the buggy address:
[   29.553437]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.553437]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.553437] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.553437]                       ^
[   29.553437]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.553437]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.553437] ==================================================================
[   29.425016] ==================================================================
[   29.425509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   29.425509] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.425509] 
[   29.425509] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.425509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.425509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.425509] Call Trace:
[   29.425509]  <TASK>
[   29.425509]  dump_stack_lvl+0x73/0xb0
[   29.425509]  print_report+0xd1/0x640
[   29.425509]  ? __virt_addr_valid+0x1db/0x2d0
[   29.425509]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.425509]  kasan_report+0x102/0x140
[   29.425509]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   29.425509]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   29.425509]  kasan_check_range+0x10c/0x1c0
[   29.425509]  __kasan_check_write+0x18/0x20
[   29.425509]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   29.425509]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.425509]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.425509]  ? __pfx_read_hpet+0x10/0x10
[   29.425509]  ? kasan_bitops_generic+0x93/0x1c0
[   29.425509]  kasan_bitops_generic+0x122/0x1c0
[   29.425509]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.425509]  ? ktime_get_ts64+0x84/0x230
[   29.425509]  kunit_try_run_case+0x1b3/0x490
[   29.425509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.425509]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.425509]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.425509]  ? __kthread_parkme+0x82/0x160
[   29.425509]  ? preempt_count_sub+0x50/0x80
[   29.425509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.425509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.425509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.425509]  kthread+0x257/0x310
[   29.425509]  ? __pfx_kthread+0x10/0x10
[   29.425509]  ret_from_fork+0x41/0x80
[   29.425509]  ? __pfx_kthread+0x10/0x10
[   29.425509]  ret_from_fork_asm+0x1a/0x30
[   29.425509]  </TASK>
[   29.425509] 
[   29.425509] Allocated by task 270:
[   29.425509]  kasan_save_stack+0x3d/0x60
[   29.425509]  kasan_save_track+0x18/0x40
[   29.425509]  kasan_save_alloc_info+0x3b/0x50
[   29.425509]  __kasan_kmalloc+0xb7/0xc0
[   29.425509]  __kmalloc_cache_noprof+0x184/0x410
[   29.425509]  kasan_bitops_generic+0x93/0x1c0
[   29.425509]  kunit_try_run_case+0x1b3/0x490
[   29.425509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.425509]  kthread+0x257/0x310
[   29.425509]  ret_from_fork+0x41/0x80
[   29.425509]  ret_from_fork_asm+0x1a/0x30
[   29.425509] 
[   29.425509] The buggy address belongs to the object at ffff888101a46900
[   29.425509]  which belongs to the cache kmalloc-16 of size 16
[   29.425509] The buggy address is located 8 bytes inside of
[   29.425509]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.425509] 
[   29.425509] The buggy address belongs to the physical page:
[   29.425509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.425509] flags: 0x200000000000000(node=0|zone=2)
[   29.425509] page_type: f5(slab)
[   29.425509] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.425509] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.425509] page dumped because: kasan: bad access detected
[   29.425509] 
[   29.425509] Memory state around the buggy address:
[   29.425509]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.425509]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.425509] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.425509]                       ^
[   29.425509]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.425509]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.425509] ==================================================================
[   29.385375] ==================================================================
[   29.385705] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   29.385705] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.386365] 
[   29.386365] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.386365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.386365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.386365] Call Trace:
[   29.386365]  <TASK>
[   29.386365]  dump_stack_lvl+0x73/0xb0
[   29.386365]  print_report+0xd1/0x640
[   29.386365]  ? __virt_addr_valid+0x1db/0x2d0
[   29.386365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.386365]  kasan_report+0x102/0x140
[   29.386365]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   29.386365]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   29.386365]  kasan_check_range+0x10c/0x1c0
[   29.386365]  __kasan_check_write+0x18/0x20
[   29.386365]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   29.386365]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.386365]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.386365]  ? __pfx_read_hpet+0x10/0x10
[   29.386365]  ? kasan_bitops_generic+0x93/0x1c0
[   29.386365]  kasan_bitops_generic+0x122/0x1c0
[   29.386365]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.386365]  ? ktime_get_ts64+0x84/0x230
[   29.386365]  kunit_try_run_case+0x1b3/0x490
[   29.386365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.386365]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.386365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.386365]  ? __kthread_parkme+0x82/0x160
[   29.386365]  ? preempt_count_sub+0x50/0x80
[   29.386365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.386365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.386365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.386365]  kthread+0x257/0x310
[   29.386365]  ? __pfx_kthread+0x10/0x10
[   29.386365]  ret_from_fork+0x41/0x80
[   29.386365]  ? __pfx_kthread+0x10/0x10
[   29.386365]  ret_from_fork_asm+0x1a/0x30
[   29.386365]  </TASK>
[   29.386365] 
[   29.386365] Allocated by task 270:
[   29.386365]  kasan_save_stack+0x3d/0x60
[   29.386365]  kasan_save_track+0x18/0x40
[   29.386365]  kasan_save_alloc_info+0x3b/0x50
[   29.386365]  __kasan_kmalloc+0xb7/0xc0
[   29.386365]  __kmalloc_cache_noprof+0x184/0x410
[   29.386365]  kasan_bitops_generic+0x93/0x1c0
[   29.386365]  kunit_try_run_case+0x1b3/0x490
[   29.386365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.386365]  kthread+0x257/0x310
[   29.386365]  ret_from_fork+0x41/0x80
[   29.386365]  ret_from_fork_asm+0x1a/0x30
[   29.386365] 
[   29.386365] The buggy address belongs to the object at ffff888101a46900
[   29.386365]  which belongs to the cache kmalloc-16 of size 16
[   29.386365] The buggy address is located 8 bytes inside of
[   29.386365]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.386365] 
[   29.386365] The buggy address belongs to the physical page:
[   29.386365] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.386365] flags: 0x200000000000000(node=0|zone=2)
[   29.386365] page_type: f5(slab)
[   29.386365] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.386365] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.386365] page dumped because: kasan: bad access detected
[   29.386365] 
[   29.386365] Memory state around the buggy address:
[   29.386365]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.386365]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.386365] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.386365]                       ^
[   29.386365]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.386365]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.386365] ==================================================================
[   29.509934] ==================================================================
[   29.510206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   29.510206] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.510206] 
[   29.510206] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.510206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.510206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.510206] Call Trace:
[   29.510206]  <TASK>
[   29.510206]  dump_stack_lvl+0x73/0xb0
[   29.510206]  print_report+0xd1/0x640
[   29.510206]  ? __virt_addr_valid+0x1db/0x2d0
[   29.510206]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.510206]  kasan_report+0x102/0x140
[   29.510206]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   29.510206]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   29.510206]  kasan_check_range+0x10c/0x1c0
[   29.510206]  __kasan_check_write+0x18/0x20
[   29.510206]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   29.510206]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.510206]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.510206]  ? __pfx_read_hpet+0x10/0x10
[   29.510206]  ? kasan_bitops_generic+0x93/0x1c0
[   29.510206]  kasan_bitops_generic+0x122/0x1c0
[   29.510206]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.510206]  ? ktime_get_ts64+0x84/0x230
[   29.510206]  kunit_try_run_case+0x1b3/0x490
[   29.510206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.510206]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.510206]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.510206]  ? __kthread_parkme+0x82/0x160
[   29.510206]  ? preempt_count_sub+0x50/0x80
[   29.510206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.510206]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.510206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.510206]  kthread+0x257/0x310
[   29.510206]  ? __pfx_kthread+0x10/0x10
[   29.510206]  ret_from_fork+0x41/0x80
[   29.510206]  ? __pfx_kthread+0x10/0x10
[   29.510206]  ret_from_fork_asm+0x1a/0x30
[   29.510206]  </TASK>
[   29.510206] 
[   29.510206] Allocated by task 270:
[   29.510206]  kasan_save_stack+0x3d/0x60
[   29.510206]  kasan_save_track+0x18/0x40
[   29.510206]  kasan_save_alloc_info+0x3b/0x50
[   29.510206]  __kasan_kmalloc+0xb7/0xc0
[   29.510206]  __kmalloc_cache_noprof+0x184/0x410
[   29.510206]  kasan_bitops_generic+0x93/0x1c0
[   29.510206]  kunit_try_run_case+0x1b3/0x490
[   29.510206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.510206]  kthread+0x257/0x310
[   29.510206]  ret_from_fork+0x41/0x80
[   29.510206]  ret_from_fork_asm+0x1a/0x30
[   29.510206] 
[   29.510206] The buggy address belongs to the object at ffff888101a46900
[   29.510206]  which belongs to the cache kmalloc-16 of size 16
[   29.510206] The buggy address is located 8 bytes inside of
[   29.510206]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.510206] 
[   29.510206] The buggy address belongs to the physical page:
[   29.510206] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.510206] flags: 0x200000000000000(node=0|zone=2)
[   29.510206] page_type: f5(slab)
[   29.510206] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.510206] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.510206] page dumped because: kasan: bad access detected
[   29.510206] 
[   29.510206] Memory state around the buggy address:
[   29.510206]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.510206]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.510206] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.510206]                       ^
[   29.510206]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.510206]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.510206] ==================================================================
[   29.248612] ==================================================================
[   29.249241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   29.249241] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.249241] 
[   29.249241] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.249241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.249241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.249241] Call Trace:
[   29.249241]  <TASK>
[   29.249241]  dump_stack_lvl+0x73/0xb0
[   29.249241]  print_report+0xd1/0x640
[   29.249241]  ? __virt_addr_valid+0x1db/0x2d0
[   29.249241]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.249241]  kasan_report+0x102/0x140
[   29.249241]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   29.249241]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   29.249241]  kasan_check_range+0x10c/0x1c0
[   29.249241]  __kasan_check_write+0x18/0x20
[   29.249241]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   29.249241]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.249241]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.249241]  ? __pfx_read_hpet+0x10/0x10
[   29.249241]  ? kasan_bitops_generic+0x93/0x1c0
[   29.249241]  kasan_bitops_generic+0x122/0x1c0
[   29.249241]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.249241]  ? ktime_get_ts64+0x84/0x230
[   29.249241]  kunit_try_run_case+0x1b3/0x490
[   29.249241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.249241]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.249241]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.249241]  ? __kthread_parkme+0x82/0x160
[   29.249241]  ? preempt_count_sub+0x50/0x80
[   29.249241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.249241]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.249241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.249241]  kthread+0x257/0x310
[   29.249241]  ? __pfx_kthread+0x10/0x10
[   29.249241]  ret_from_fork+0x41/0x80
[   29.249241]  ? __pfx_kthread+0x10/0x10
[   29.249241]  ret_from_fork_asm+0x1a/0x30
[   29.249241]  </TASK>
[   29.249241] 
[   29.249241] Allocated by task 270:
[   29.249241]  kasan_save_stack+0x3d/0x60
[   29.249241]  kasan_save_track+0x18/0x40
[   29.249241]  kasan_save_alloc_info+0x3b/0x50
[   29.249241]  __kasan_kmalloc+0xb7/0xc0
[   29.249241]  __kmalloc_cache_noprof+0x184/0x410
[   29.249241]  kasan_bitops_generic+0x93/0x1c0
[   29.249241]  kunit_try_run_case+0x1b3/0x490
[   29.249241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.249241]  kthread+0x257/0x310
[   29.249241]  ret_from_fork+0x41/0x80
[   29.249241]  ret_from_fork_asm+0x1a/0x30
[   29.249241] 
[   29.249241] The buggy address belongs to the object at ffff888101a46900
[   29.249241]  which belongs to the cache kmalloc-16 of size 16
[   29.249241] The buggy address is located 8 bytes inside of
[   29.249241]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.249241] 
[   29.249241] The buggy address belongs to the physical page:
[   29.249241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.249241] flags: 0x200000000000000(node=0|zone=2)
[   29.249241] page_type: f5(slab)
[   29.249241] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.249241] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.249241] page dumped because: kasan: bad access detected
[   29.249241] 
[   29.249241] Memory state around the buggy address:
[   29.249241]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.249241]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.249241] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.249241]                       ^
[   29.249241]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.249241]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.249241] ==================================================================
[   29.333103] ==================================================================
[   29.333781] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   29.333781] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.333781] 
[   29.333781] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.333781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.333781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.333781] Call Trace:
[   29.333781]  <TASK>
[   29.333781]  dump_stack_lvl+0x73/0xb0
[   29.333781]  print_report+0xd1/0x640
[   29.333781]  ? __virt_addr_valid+0x1db/0x2d0
[   29.333781]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.333781]  kasan_report+0x102/0x140
[   29.333781]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   29.333781]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   29.333781]  kasan_check_range+0x10c/0x1c0
[   29.333781]  __kasan_check_write+0x18/0x20
[   29.333781]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   29.333781]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.333781]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.333781]  ? __pfx_read_hpet+0x10/0x10
[   29.333781]  ? kasan_bitops_generic+0x93/0x1c0
[   29.333781]  kasan_bitops_generic+0x122/0x1c0
[   29.333781]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.333781]  ? ktime_get_ts64+0x84/0x230
[   29.333781]  kunit_try_run_case+0x1b3/0x490
[   29.333781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.333781]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.333781]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.333781]  ? __kthread_parkme+0x82/0x160
[   29.333781]  ? preempt_count_sub+0x50/0x80
[   29.333781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.333781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.333781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.333781]  kthread+0x257/0x310
[   29.333781]  ? __pfx_kthread+0x10/0x10
[   29.333781]  ret_from_fork+0x41/0x80
[   29.333781]  ? __pfx_kthread+0x10/0x10
[   29.333781]  ret_from_fork_asm+0x1a/0x30
[   29.333781]  </TASK>
[   29.333781] 
[   29.333781] Allocated by task 270:
[   29.333781]  kasan_save_stack+0x3d/0x60
[   29.333781]  kasan_save_track+0x18/0x40
[   29.333781]  kasan_save_alloc_info+0x3b/0x50
[   29.333781]  __kasan_kmalloc+0xb7/0xc0
[   29.333781]  __kmalloc_cache_noprof+0x184/0x410
[   29.333781]  kasan_bitops_generic+0x93/0x1c0
[   29.333781]  kunit_try_run_case+0x1b3/0x490
[   29.333781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.333781]  kthread+0x257/0x310
[   29.333781]  ret_from_fork+0x41/0x80
[   29.333781]  ret_from_fork_asm+0x1a/0x30
[   29.333781] 
[   29.333781] The buggy address belongs to the object at ffff888101a46900
[   29.333781]  which belongs to the cache kmalloc-16 of size 16
[   29.333781] The buggy address is located 8 bytes inside of
[   29.333781]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.333781] 
[   29.333781] The buggy address belongs to the physical page:
[   29.333781] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.333781] flags: 0x200000000000000(node=0|zone=2)
[   29.333781] page_type: f5(slab)
[   29.333781] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.333781] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.333781] page dumped because: kasan: bad access detected
[   29.333781] 
[   29.333781] Memory state around the buggy address:
[   29.333781]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.333781]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.333781] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.333781]                       ^
[   29.333781]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.333781]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.333781] ==================================================================

[   24.293921] ==================================================================
[   24.295130] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   24.296073] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   24.296826] 
[   24.297083] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.298065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.298536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.299274] Call Trace:
[   24.299544]  <TASK>
[   24.299914]  dump_stack_lvl+0x73/0xb0
[   24.300326]  print_report+0xd1/0x640
[   24.300808]  ? __virt_addr_valid+0x1db/0x2d0
[   24.301318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.301814]  kasan_report+0x102/0x140
[   24.302256]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   24.302763]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   24.303163]  kasan_check_range+0x10c/0x1c0
[   24.303690]  __kasan_check_write+0x18/0x20
[   24.304190]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   24.304857]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.305622]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.306169]  ? trace_hardirqs_on+0x37/0xe0
[   24.306641]  ? kasan_bitops_generic+0x93/0x1c0
[   24.306973]  kasan_bitops_generic+0x122/0x1c0
[   24.307479]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.308079]  ? __pfx_read_tsc+0x10/0x10
[   24.308447]  ? ktime_get_ts64+0x84/0x230
[   24.309004]  kunit_try_run_case+0x1b3/0x490
[   24.309501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.309947]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.310413]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.310959]  ? __kthread_parkme+0x82/0x160
[   24.311411]  ? preempt_count_sub+0x50/0x80
[   24.311973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.312347]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.312950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.313513]  kthread+0x257/0x310
[   24.313952]  ? __pfx_kthread+0x10/0x10
[   24.314390]  ret_from_fork+0x41/0x80
[   24.314781]  ? __pfx_kthread+0x10/0x10
[   24.315067]  ret_from_fork_asm+0x1a/0x30
[   24.315678]  </TASK>
[   24.315961] 
[   24.316181] Allocated by task 268:
[   24.316554]  kasan_save_stack+0x3d/0x60
[   24.317021]  kasan_save_track+0x18/0x40
[   24.317289]  kasan_save_alloc_info+0x3b/0x50
[   24.317647]  __kasan_kmalloc+0xb7/0xc0
[   24.317923]  __kmalloc_cache_noprof+0x184/0x410
[   24.318228]  kasan_bitops_generic+0x93/0x1c0
[   24.318539]  kunit_try_run_case+0x1b3/0x490
[   24.319053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.319669]  kthread+0x257/0x310
[   24.320050]  ret_from_fork+0x41/0x80
[   24.320449]  ret_from_fork_asm+0x1a/0x30
[   24.321266] 
[   24.321508] The buggy address belongs to the object at ffff8881028a7080
[   24.321508]  which belongs to the cache kmalloc-16 of size 16
[   24.324334] The buggy address is located 8 bytes inside of
[   24.324334]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   24.325443] 
[   24.326568] The buggy address belongs to the physical page:
[   24.327008] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   24.327658] flags: 0x200000000000000(node=0|zone=2)
[   24.328181] page_type: f5(slab)
[   24.328452] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.329122] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.329816] page dumped because: kasan: bad access detected
[   24.330263] 
[   24.330541] Memory state around the buggy address:
[   24.330923]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.331453]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.332060] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.332523]                       ^
[   24.332976]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.333663]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.334141] ==================================================================
[   24.250994] ==================================================================
[   24.251689] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   24.252469] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   24.254065] 
[   24.254305] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.254956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.255403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.255986] Call Trace:
[   24.256208]  <TASK>
[   24.256414]  dump_stack_lvl+0x73/0xb0
[   24.256920]  print_report+0xd1/0x640
[   24.257341]  ? __virt_addr_valid+0x1db/0x2d0
[   24.257917]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.258503]  kasan_report+0x102/0x140
[   24.260252]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   24.261033]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   24.261613]  kasan_check_range+0x10c/0x1c0
[   24.262074]  __kasan_check_write+0x18/0x20
[   24.262527]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   24.263184]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.263672]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.264193]  ? trace_hardirqs_on+0x37/0xe0
[   24.264669]  ? kasan_bitops_generic+0x93/0x1c0
[   24.265166]  kasan_bitops_generic+0x122/0x1c0
[   24.265709]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.266172]  ? __pfx_read_tsc+0x10/0x10
[   24.266632]  ? ktime_get_ts64+0x84/0x230
[   24.267123]  kunit_try_run_case+0x1b3/0x490
[   24.267635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.267957]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.268279]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.268748]  ? __kthread_parkme+0x82/0x160
[   24.269250]  ? preempt_count_sub+0x50/0x80
[   24.269768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.270270]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.270935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.271504]  kthread+0x257/0x310
[   24.271973]  ? __pfx_kthread+0x10/0x10
[   24.272404]  ret_from_fork+0x41/0x80
[   24.272899]  ? __pfx_kthread+0x10/0x10
[   24.273187]  ret_from_fork_asm+0x1a/0x30
[   24.273533]  </TASK>
[   24.273894] 
[   24.274169] Allocated by task 268:
[   24.274557]  kasan_save_stack+0x3d/0x60
[   24.275043]  kasan_save_track+0x18/0x40
[   24.275470]  kasan_save_alloc_info+0x3b/0x50
[   24.275987]  __kasan_kmalloc+0xb7/0xc0
[   24.276442]  __kmalloc_cache_noprof+0x184/0x410
[   24.276911]  kasan_bitops_generic+0x93/0x1c0
[   24.277207]  kunit_try_run_case+0x1b3/0x490
[   24.277517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.277893]  kthread+0x257/0x310
[   24.278155]  ret_from_fork+0x41/0x80
[   24.278661]  ret_from_fork_asm+0x1a/0x30
[   24.279096] 
[   24.279317] The buggy address belongs to the object at ffff8881028a7080
[   24.279317]  which belongs to the cache kmalloc-16 of size 16
[   24.280391] The buggy address is located 8 bytes inside of
[   24.280391]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   24.281511] 
[   24.281789] The buggy address belongs to the physical page:
[   24.282229] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   24.282964] flags: 0x200000000000000(node=0|zone=2)
[   24.283503] page_type: f5(slab)
[   24.283797] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.284187] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.284654] page dumped because: kasan: bad access detected
[   24.285162] 
[   24.285430] Memory state around the buggy address:
[   24.285958]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.286729]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.287403] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.288096]                       ^
[   24.288747]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.290249]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.291232] ==================================================================
[   24.083937] ==================================================================
[   24.085282] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   24.085854] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   24.086299] 
[   24.086555] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.087442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.087928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.088406] Call Trace:
[   24.088783]  <TASK>
[   24.089072]  dump_stack_lvl+0x73/0xb0
[   24.089507]  print_report+0xd1/0x640
[   24.089891]  ? __virt_addr_valid+0x1db/0x2d0
[   24.090282]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.090863]  kasan_report+0x102/0x140
[   24.091276]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   24.093157]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   24.093585]  kasan_check_range+0x10c/0x1c0
[   24.094052]  __kasan_check_write+0x18/0x20
[   24.095521]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   24.096323]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.097126]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.097924]  ? trace_hardirqs_on+0x37/0xe0
[   24.098567]  ? kasan_bitops_generic+0x93/0x1c0
[   24.099224]  kasan_bitops_generic+0x122/0x1c0
[   24.099964]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.100563]  ? __pfx_read_tsc+0x10/0x10
[   24.101260]  ? ktime_get_ts64+0x84/0x230
[   24.101658]  kunit_try_run_case+0x1b3/0x490
[   24.102056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.102466]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.103425]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.104126]  ? __kthread_parkme+0x82/0x160
[   24.104793]  ? preempt_count_sub+0x50/0x80
[   24.105103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.105873]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.106405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.107344]  kthread+0x257/0x310
[   24.107996]  ? __pfx_kthread+0x10/0x10
[   24.108533]  ret_from_fork+0x41/0x80
[   24.109149]  ? __pfx_kthread+0x10/0x10
[   24.109501]  ret_from_fork_asm+0x1a/0x30
[   24.110111]  </TASK>
[   24.110403] 
[   24.110976] Allocated by task 268:
[   24.111326]  kasan_save_stack+0x3d/0x60
[   24.112158]  kasan_save_track+0x18/0x40
[   24.112536]  kasan_save_alloc_info+0x3b/0x50
[   24.113172]  __kasan_kmalloc+0xb7/0xc0
[   24.113609]  __kmalloc_cache_noprof+0x184/0x410
[   24.114215]  kasan_bitops_generic+0x93/0x1c0
[   24.114672]  kunit_try_run_case+0x1b3/0x490
[   24.115346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.115669]  kthread+0x257/0x310
[   24.116343]  ret_from_fork+0x41/0x80
[   24.116823]  ret_from_fork_asm+0x1a/0x30
[   24.117192] 
[   24.117418] The buggy address belongs to the object at ffff8881028a7080
[   24.117418]  which belongs to the cache kmalloc-16 of size 16
[   24.118148] The buggy address is located 8 bytes inside of
[   24.118148]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   24.119241] 
[   24.119506] The buggy address belongs to the physical page:
[   24.119865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   24.120443] flags: 0x200000000000000(node=0|zone=2)
[   24.120931] page_type: f5(slab)
[   24.121392] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.122024] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.122416] page dumped because: kasan: bad access detected
[   24.122946] 
[   24.123237] Memory state around the buggy address:
[   24.123664]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.124178]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.124979] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.125419]                       ^
[   24.125832]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.126400]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.126789] ==================================================================
[   24.041734] ==================================================================
[   24.042325] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   24.044531] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   24.045172] 
[   24.045428] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.046259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.046633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.047216] Call Trace:
[   24.047551]  <TASK>
[   24.048399]  dump_stack_lvl+0x73/0xb0
[   24.048957]  print_report+0xd1/0x640
[   24.049389]  ? __virt_addr_valid+0x1db/0x2d0
[   24.049940]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.050472]  kasan_report+0x102/0x140
[   24.050760]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   24.051414]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   24.052015]  kasan_check_range+0x10c/0x1c0
[   24.052509]  __kasan_check_write+0x18/0x20
[   24.052817]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   24.053508]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.054121]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.054657]  ? trace_hardirqs_on+0x37/0xe0
[   24.055017]  ? kasan_bitops_generic+0x93/0x1c0
[   24.055579]  kasan_bitops_generic+0x122/0x1c0
[   24.056107]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.056442]  ? __pfx_read_tsc+0x10/0x10
[   24.056959]  ? ktime_get_ts64+0x84/0x230
[   24.057408]  kunit_try_run_case+0x1b3/0x490
[   24.058080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.058423]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.058937]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.059652]  ? __kthread_parkme+0x82/0x160
[   24.060031]  ? preempt_count_sub+0x50/0x80
[   24.060335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.060678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.061275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.061956]  kthread+0x257/0x310
[   24.062366]  ? __pfx_kthread+0x10/0x10
[   24.062926]  ret_from_fork+0x41/0x80
[   24.063345]  ? __pfx_kthread+0x10/0x10
[   24.063787]  ret_from_fork_asm+0x1a/0x30
[   24.064292]  </TASK>
[   24.064599] 
[   24.064768] Allocated by task 268:
[   24.065146]  kasan_save_stack+0x3d/0x60
[   24.065578]  kasan_save_track+0x18/0x40
[   24.066011]  kasan_save_alloc_info+0x3b/0x50
[   24.066317]  __kasan_kmalloc+0xb7/0xc0
[   24.066651]  __kmalloc_cache_noprof+0x184/0x410
[   24.067117]  kasan_bitops_generic+0x93/0x1c0
[   24.067646]  kunit_try_run_case+0x1b3/0x490
[   24.068136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.068545]  kthread+0x257/0x310
[   24.068799]  ret_from_fork+0x41/0x80
[   24.069054]  ret_from_fork_asm+0x1a/0x30
[   24.069469] 
[   24.069806] The buggy address belongs to the object at ffff8881028a7080
[   24.069806]  which belongs to the cache kmalloc-16 of size 16
[   24.072126] The buggy address is located 8 bytes inside of
[   24.072126]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   24.072996] 
[   24.073223] The buggy address belongs to the physical page:
[   24.073914] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   24.075716] flags: 0x200000000000000(node=0|zone=2)
[   24.076458] page_type: f5(slab)
[   24.076935] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.077408] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.077958] page dumped because: kasan: bad access detected
[   24.078423] 
[   24.078731] Memory state around the buggy address:
[   24.079094]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.079781]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.080225] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.080786]                       ^
[   24.081025]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.081682]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.082239] ==================================================================
[   24.172900] ==================================================================
[   24.173352] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   24.174919] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   24.175884] 
[   24.176205] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.177562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.177979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.178830] Call Trace:
[   24.179052]  <TASK>
[   24.179324]  dump_stack_lvl+0x73/0xb0
[   24.179787]  print_report+0xd1/0x640
[   24.180197]  ? __virt_addr_valid+0x1db/0x2d0
[   24.180551]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.181163]  kasan_report+0x102/0x140
[   24.181465]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   24.182078]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   24.182676]  kasan_check_range+0x10c/0x1c0
[   24.183142]  __kasan_check_write+0x18/0x20
[   24.183553]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   24.184189]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.184693]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.185179]  ? trace_hardirqs_on+0x37/0xe0
[   24.185608]  ? kasan_bitops_generic+0x93/0x1c0
[   24.186100]  kasan_bitops_generic+0x122/0x1c0
[   24.186620]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.187043]  ? __pfx_read_tsc+0x10/0x10
[   24.187323]  ? ktime_get_ts64+0x84/0x230
[   24.187833]  kunit_try_run_case+0x1b3/0x490
[   24.188298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.188843]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.189235]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.189652]  ? __kthread_parkme+0x82/0x160
[   24.190114]  ? preempt_count_sub+0x50/0x80
[   24.190559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.190984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.191529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.191922]  kthread+0x257/0x310
[   24.192191]  ? __pfx_kthread+0x10/0x10
[   24.192673]  ret_from_fork+0x41/0x80
[   24.193081]  ? __pfx_kthread+0x10/0x10
[   24.193524]  ret_from_fork_asm+0x1a/0x30
[   24.194025]  </TASK>
[   24.194309] 
[   24.194546] Allocated by task 268:
[   24.194950]  kasan_save_stack+0x3d/0x60
[   24.195395]  kasan_save_track+0x18/0x40
[   24.196684]  kasan_save_alloc_info+0x3b/0x50
[   24.197039]  __kasan_kmalloc+0xb7/0xc0
[   24.197303]  __kmalloc_cache_noprof+0x184/0x410
[   24.197762]  kasan_bitops_generic+0x93/0x1c0
[   24.198204]  kunit_try_run_case+0x1b3/0x490
[   24.198685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.199193]  kthread+0x257/0x310
[   24.199622]  ret_from_fork+0x41/0x80
[   24.200022]  ret_from_fork_asm+0x1a/0x30
[   24.200332] 
[   24.200512] The buggy address belongs to the object at ffff8881028a7080
[   24.200512]  which belongs to the cache kmalloc-16 of size 16
[   24.201480] The buggy address is located 8 bytes inside of
[   24.201480]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   24.202116] 
[   24.202281] The buggy address belongs to the physical page:
[   24.202694] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   24.203380] flags: 0x200000000000000(node=0|zone=2)
[   24.203929] page_type: f5(slab)
[   24.204285] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.205021] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.205775] page dumped because: kasan: bad access detected
[   24.206285] 
[   24.206527] Memory state around the buggy address:
[   24.206969]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.207402]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.207996] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.208357]                       ^
[   24.208739]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.209377]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.210056] ==================================================================
[   24.335861] ==================================================================
[   24.337569] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   24.338408] Read of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   24.338912] 
[   24.339193] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.340048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.340465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.341091] Call Trace:
[   24.341448]  <TASK>
[   24.341785]  dump_stack_lvl+0x73/0xb0
[   24.342244]  print_report+0xd1/0x640
[   24.342554]  ? __virt_addr_valid+0x1db/0x2d0
[   24.343118]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.343737]  kasan_report+0x102/0x140
[   24.344126]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   24.344875]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   24.345539]  kasan_check_range+0x10c/0x1c0
[   24.346889]  __kasan_check_read+0x15/0x20
[   24.347317]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   24.347997]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.348415]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.349007]  ? trace_hardirqs_on+0x37/0xe0
[   24.349467]  ? kasan_bitops_generic+0x93/0x1c0
[   24.350065]  kasan_bitops_generic+0x122/0x1c0
[   24.350398]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.351353]  ? __pfx_read_tsc+0x10/0x10
[   24.352369]  ? ktime_get_ts64+0x84/0x230
[   24.353216]  kunit_try_run_case+0x1b3/0x490
[   24.353881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.354380]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.355178]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.355671]  ? __kthread_parkme+0x82/0x160
[   24.356415]  ? preempt_count_sub+0x50/0x80
[   24.357078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.357607]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.358436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.359173]  kthread+0x257/0x310
[   24.359577]  ? __pfx_kthread+0x10/0x10
[   24.360221]  ret_from_fork+0x41/0x80
[   24.360944]  ? __pfx_kthread+0x10/0x10
[   24.361604]  ret_from_fork_asm+0x1a/0x30
[   24.362091]  </TASK>
[   24.362669] 
[   24.362825] Allocated by task 268:
[   24.363193]  kasan_save_stack+0x3d/0x60
[   24.363997]  kasan_save_track+0x18/0x40
[   24.364365]  kasan_save_alloc_info+0x3b/0x50
[   24.364927]  __kasan_kmalloc+0xb7/0xc0
[   24.365280]  __kmalloc_cache_noprof+0x184/0x410
[   24.366420]  kasan_bitops_generic+0x93/0x1c0
[   24.366982]  kunit_try_run_case+0x1b3/0x490
[   24.367897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.368458]  kthread+0x257/0x310
[   24.369178]  ret_from_fork+0x41/0x80
[   24.369560]  ret_from_fork_asm+0x1a/0x30
[   24.370455] 
[   24.370954] The buggy address belongs to the object at ffff8881028a7080
[   24.370954]  which belongs to the cache kmalloc-16 of size 16
[   24.372092] The buggy address is located 8 bytes inside of
[   24.372092]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   24.373447] 
[   24.373783] The buggy address belongs to the physical page:
[   24.374749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   24.375428] flags: 0x200000000000000(node=0|zone=2)
[   24.376202] page_type: f5(slab)
[   24.376625] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.377547] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.378180] page dumped because: kasan: bad access detected
[   24.379043] 
[   24.379263] Memory state around the buggy address:
[   24.380128]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.380666]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.381538] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.382217]                       ^
[   24.382551]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.383288]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.384051] ==================================================================
[   24.212438] ==================================================================
[   24.213318] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   24.214127] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   24.214757] 
[   24.214959] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.215610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.215877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.216709] Call Trace:
[   24.217021]  <TASK>
[   24.217305]  dump_stack_lvl+0x73/0xb0
[   24.217694]  print_report+0xd1/0x640
[   24.218131]  ? __virt_addr_valid+0x1db/0x2d0
[   24.218553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.218946]  kasan_report+0x102/0x140
[   24.219217]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   24.219662]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   24.220252]  kasan_check_range+0x10c/0x1c0
[   24.220765]  __kasan_check_write+0x18/0x20
[   24.221204]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   24.221863]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.222524]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.223051]  ? trace_hardirqs_on+0x37/0xe0
[   24.223498]  ? kasan_bitops_generic+0x93/0x1c0
[   24.223889]  kasan_bitops_generic+0x122/0x1c0
[   24.224202]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.224745]  ? __pfx_read_tsc+0x10/0x10
[   24.225162]  ? ktime_get_ts64+0x84/0x230
[   24.225713]  kunit_try_run_case+0x1b3/0x490
[   24.226191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.226791]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.227274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.227750]  ? __kthread_parkme+0x82/0x160
[   24.228045]  ? preempt_count_sub+0x50/0x80
[   24.228342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.230196]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.231090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.231961]  kthread+0x257/0x310
[   24.232350]  ? __pfx_kthread+0x10/0x10
[   24.233147]  ret_from_fork+0x41/0x80
[   24.233601]  ? __pfx_kthread+0x10/0x10
[   24.234016]  ret_from_fork_asm+0x1a/0x30
[   24.234531]  </TASK>
[   24.234850] 
[   24.235065] Allocated by task 268:
[   24.235333]  kasan_save_stack+0x3d/0x60
[   24.235810]  kasan_save_track+0x18/0x40
[   24.236233]  kasan_save_alloc_info+0x3b/0x50
[   24.236757]  __kasan_kmalloc+0xb7/0xc0
[   24.237082]  __kmalloc_cache_noprof+0x184/0x410
[   24.237394]  kasan_bitops_generic+0x93/0x1c0
[   24.237891]  kunit_try_run_case+0x1b3/0x490
[   24.238346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.238834]  kthread+0x257/0x310
[   24.239187]  ret_from_fork+0x41/0x80
[   24.239626]  ret_from_fork_asm+0x1a/0x30
[   24.240062] 
[   24.240270] The buggy address belongs to the object at ffff8881028a7080
[   24.240270]  which belongs to the cache kmalloc-16 of size 16
[   24.241027] The buggy address is located 8 bytes inside of
[   24.241027]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   24.241852] 
[   24.242080] The buggy address belongs to the physical page:
[   24.242642] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   24.243069] flags: 0x200000000000000(node=0|zone=2)
[   24.243566] page_type: f5(slab)
[   24.243971] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.244380] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.244840] page dumped because: kasan: bad access detected
[   24.245147] 
[   24.245351] Memory state around the buggy address:
[   24.245881]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.246541]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.247214] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.247897]                       ^
[   24.248253]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.248786]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.249404] ==================================================================
[   24.127817] ==================================================================
[   24.130371] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   24.130920] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   24.131610] 
[   24.131814] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.133662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.134102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.134874] Call Trace:
[   24.135127]  <TASK>
[   24.135378]  dump_stack_lvl+0x73/0xb0
[   24.136742]  print_report+0xd1/0x640
[   24.137389]  ? __virt_addr_valid+0x1db/0x2d0
[   24.137979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.138479]  kasan_report+0x102/0x140
[   24.138924]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   24.139313]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   24.140010]  kasan_check_range+0x10c/0x1c0
[   24.140569]  __kasan_check_write+0x18/0x20
[   24.140998]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   24.141707]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.142266]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.142986]  ? trace_hardirqs_on+0x37/0xe0
[   24.143567]  ? kasan_bitops_generic+0x93/0x1c0
[   24.144026]  kasan_bitops_generic+0x122/0x1c0
[   24.144432]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.144962]  ? __pfx_read_tsc+0x10/0x10
[   24.145369]  ? ktime_get_ts64+0x84/0x230
[   24.145832]  kunit_try_run_case+0x1b3/0x490
[   24.146393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.146923]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.147414]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.148021]  ? __kthread_parkme+0x82/0x160
[   24.148542]  ? preempt_count_sub+0x50/0x80
[   24.148942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.149425]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.150095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.150744]  kthread+0x257/0x310
[   24.151071]  ? __pfx_kthread+0x10/0x10
[   24.151471]  ret_from_fork+0x41/0x80
[   24.151950]  ? __pfx_kthread+0x10/0x10
[   24.152374]  ret_from_fork_asm+0x1a/0x30
[   24.152847]  </TASK>
[   24.153038] 
[   24.153249] Allocated by task 268:
[   24.153716]  kasan_save_stack+0x3d/0x60
[   24.154182]  kasan_save_track+0x18/0x40
[   24.154547]  kasan_save_alloc_info+0x3b/0x50
[   24.154999]  __kasan_kmalloc+0xb7/0xc0
[   24.155423]  __kmalloc_cache_noprof+0x184/0x410
[   24.155969]  kasan_bitops_generic+0x93/0x1c0
[   24.156430]  kunit_try_run_case+0x1b3/0x490
[   24.156947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.157476]  kthread+0x257/0x310
[   24.157942]  ret_from_fork+0x41/0x80
[   24.158355]  ret_from_fork_asm+0x1a/0x30
[   24.158884] 
[   24.159054] The buggy address belongs to the object at ffff8881028a7080
[   24.159054]  which belongs to the cache kmalloc-16 of size 16
[   24.159765] The buggy address is located 8 bytes inside of
[   24.159765]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   24.160814] 
[   24.161045] The buggy address belongs to the physical page:
[   24.161570] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   24.162274] flags: 0x200000000000000(node=0|zone=2)
[   24.162863] page_type: f5(slab)
[   24.163100] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.163878] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.164383] page dumped because: kasan: bad access detected
[   24.165720] 
[   24.165934] Memory state around the buggy address:
[   24.166397]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.167044]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.168358] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.169329]                       ^
[   24.169715]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.170342]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.170967] ==================================================================
[   24.386983] ==================================================================
[   24.387637] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   24.388595] Read of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   24.389444] 
[   24.389748] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.390838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.391144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.391976] Call Trace:
[   24.392327]  <TASK>
[   24.392570]  dump_stack_lvl+0x73/0xb0
[   24.393093]  print_report+0xd1/0x640
[   24.393552]  ? __virt_addr_valid+0x1db/0x2d0
[   24.393867]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.394580]  kasan_report+0x102/0x140
[   24.395003]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   24.395715]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   24.396713]  __asan_report_load8_noabort+0x18/0x20
[   24.397264]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   24.398019]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.398661]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.399104]  ? trace_hardirqs_on+0x37/0xe0
[   24.399521]  ? kasan_bitops_generic+0x93/0x1c0
[   24.400021]  kasan_bitops_generic+0x122/0x1c0
[   24.400460]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.400979]  ? __pfx_read_tsc+0x10/0x10
[   24.401367]  ? ktime_get_ts64+0x84/0x230
[   24.401833]  kunit_try_run_case+0x1b3/0x490
[   24.402302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.402797]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.403114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.403427]  ? __kthread_parkme+0x82/0x160
[   24.403928]  ? preempt_count_sub+0x50/0x80
[   24.404423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.405079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.405751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.406346]  kthread+0x257/0x310
[   24.406841]  ? __pfx_kthread+0x10/0x10
[   24.407170]  ret_from_fork+0x41/0x80
[   24.407695]  ? __pfx_kthread+0x10/0x10
[   24.408090]  ret_from_fork_asm+0x1a/0x30
[   24.408404]  </TASK>
[   24.408662] 
[   24.408819] Allocated by task 268:
[   24.409171]  kasan_save_stack+0x3d/0x60
[   24.409738]  kasan_save_track+0x18/0x40
[   24.410211]  kasan_save_alloc_info+0x3b/0x50
[   24.410794]  __kasan_kmalloc+0xb7/0xc0
[   24.411211]  __kmalloc_cache_noprof+0x184/0x410
[   24.411779]  kasan_bitops_generic+0x93/0x1c0
[   24.412271]  kunit_try_run_case+0x1b3/0x490
[   24.412695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.413191]  kthread+0x257/0x310
[   24.413642]  ret_from_fork+0x41/0x80
[   24.414057]  ret_from_fork_asm+0x1a/0x30
[   24.414502] 
[   24.414730] The buggy address belongs to the object at ffff8881028a7080
[   24.414730]  which belongs to the cache kmalloc-16 of size 16
[   24.415461] The buggy address is located 8 bytes inside of
[   24.415461]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   24.416694] 
[   24.416909] The buggy address belongs to the physical page:
[   24.417211] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   24.417672] flags: 0x200000000000000(node=0|zone=2)
[   24.418001] page_type: f5(slab)
[   24.418412] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.419131] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.420650] page dumped because: kasan: bad access detected
[   24.421185] 
[   24.421410] Memory state around the buggy address:
[   24.422004]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.422718]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.423336] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.423774]                       ^
[   24.424015]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.424477]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.425343] ==================================================================