Hay
Date
Nov. 28, 2024, 2:36 a.m.

Environment
qemu-arm64
qemu-x86_64

[   34.189910] ==================================================================
[   34.190665] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.191473] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.192712] 
[   34.192994] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.194249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.194932] Hardware name: linux,dummy-virt (DT)
[   34.195675] Call trace:
[   34.196283]  show_stack+0x20/0x38 (C)
[   34.196970]  dump_stack_lvl+0x8c/0xd0
[   34.197566]  print_report+0x118/0x5e0
[   34.198109]  kasan_report+0xc8/0x118
[   34.198652]  kasan_check_range+0x100/0x1a8
[   34.199531]  __kasan_check_write+0x20/0x30
[   34.200095]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.200871]  kasan_bitops_generic+0x11c/0x1c8
[   34.201523]  kunit_try_run_case+0x14c/0x3d0
[   34.202081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.202854]  kthread+0x24c/0x2d0
[   34.203347]  ret_from_fork+0x10/0x20
[   34.203950] 
[   34.204312] Allocated by task 249:
[   34.204748]  kasan_save_stack+0x3c/0x68
[   34.205355]  kasan_save_track+0x20/0x40
[   34.205899]  kasan_save_alloc_info+0x40/0x58
[   34.206444]  __kasan_kmalloc+0xd4/0xd8
[   34.207028]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.207557]  kasan_bitops_generic+0xa0/0x1c8
[   34.208187]  kunit_try_run_case+0x14c/0x3d0
[   34.208771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.209451]  kthread+0x24c/0x2d0
[   34.209944]  ret_from_fork+0x10/0x20
[   34.210484] 
[   34.210836] The buggy address belongs to the object at fff00000c4005ea0
[   34.210836]  which belongs to the cache kmalloc-16 of size 16
[   34.211918] The buggy address is located 8 bytes inside of
[   34.211918]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.213108] 
[   34.213478] The buggy address belongs to the physical page:
[   34.214038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.215000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.215654] page_type: f5(slab)
[   34.216212] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.217143] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.217907] page dumped because: kasan: bad access detected
[   34.218558] 
[   34.218875] Memory state around the buggy address:
[   34.219521]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.220260]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.221057] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.222016]                                   ^
[   34.222579]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.223290]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.224063] ==================================================================
[   34.260533] ==================================================================
[   34.261305] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.262163] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.262830] 
[   34.263217] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.264272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.264814] Hardware name: linux,dummy-virt (DT)
[   34.265309] Call trace:
[   34.265737]  show_stack+0x20/0x38 (C)
[   34.266374]  dump_stack_lvl+0x8c/0xd0
[   34.266931]  print_report+0x118/0x5e0
[   34.267488]  kasan_report+0xc8/0x118
[   34.268070]  kasan_check_range+0x100/0x1a8
[   34.268707]  __kasan_check_write+0x20/0x30
[   34.269373]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.270139]  kasan_bitops_generic+0x11c/0x1c8
[   34.270690]  kunit_try_run_case+0x14c/0x3d0
[   34.271354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.272065]  kthread+0x24c/0x2d0
[   34.272660]  ret_from_fork+0x10/0x20
[   34.273257] 
[   34.273567] Allocated by task 249:
[   34.274094]  kasan_save_stack+0x3c/0x68
[   34.274695]  kasan_save_track+0x20/0x40
[   34.275268]  kasan_save_alloc_info+0x40/0x58
[   34.275776]  __kasan_kmalloc+0xd4/0xd8
[   34.276374]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.276941]  kasan_bitops_generic+0xa0/0x1c8
[   34.277500]  kunit_try_run_case+0x14c/0x3d0
[   34.278094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.278816]  kthread+0x24c/0x2d0
[   34.279376]  ret_from_fork+0x10/0x20
[   34.279932] 
[   34.280303] The buggy address belongs to the object at fff00000c4005ea0
[   34.280303]  which belongs to the cache kmalloc-16 of size 16
[   34.281495] The buggy address is located 8 bytes inside of
[   34.281495]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.282589] 
[   34.282947] The buggy address belongs to the physical page:
[   34.283806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.284616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.285610] page_type: f5(slab)
[   34.286095] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.287026] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.287790] page dumped because: kasan: bad access detected
[   34.288507] 
[   34.288847] Memory state around the buggy address:
[   34.289391]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.290229]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.291091] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.291787]                                   ^
[   34.292424]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.293125]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.293929] ==================================================================
[   34.296652] ==================================================================
[   34.297680] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.298528] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.298906] 
[   34.299083] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.299825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.300367] Hardware name: linux,dummy-virt (DT)
[   34.300911] Call trace:
[   34.301416]  show_stack+0x20/0x38 (C)
[   34.302037]  dump_stack_lvl+0x8c/0xd0
[   34.302758]  print_report+0x118/0x5e0
[   34.303423]  kasan_report+0xc8/0x118
[   34.304097]  __asan_report_load8_noabort+0x20/0x30
[   34.304859]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.305703]  kasan_bitops_generic+0x11c/0x1c8
[   34.306008]  kunit_try_run_case+0x14c/0x3d0
[   34.306486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.307278]  kthread+0x24c/0x2d0
[   34.307753]  ret_from_fork+0x10/0x20
[   34.308415] 
[   34.308799] Allocated by task 249:
[   34.309320]  kasan_save_stack+0x3c/0x68
[   34.309958]  kasan_save_track+0x20/0x40
[   34.310555]  kasan_save_alloc_info+0x40/0x58
[   34.311248]  __kasan_kmalloc+0xd4/0xd8
[   34.311831]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.312485]  kasan_bitops_generic+0xa0/0x1c8
[   34.313137]  kunit_try_run_case+0x14c/0x3d0
[   34.313692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.314356]  kthread+0x24c/0x2d0
[   34.314907]  ret_from_fork+0x10/0x20
[   34.315494] 
[   34.315794] The buggy address belongs to the object at fff00000c4005ea0
[   34.315794]  which belongs to the cache kmalloc-16 of size 16
[   34.316945] The buggy address is located 8 bytes inside of
[   34.316945]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.318104] 
[   34.318460] The buggy address belongs to the physical page:
[   34.319159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.320075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.320773] page_type: f5(slab)
[   34.321309] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.322085] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.322985] page dumped because: kasan: bad access detected
[   34.323647] 
[   34.324004] Memory state around the buggy address:
[   34.324654]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.325340]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.326203] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.326822]                                   ^
[   34.327457]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.328229]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.328997] ==================================================================
[   34.473439] ==================================================================
[   34.474588] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   34.475470] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.476481] 
[   34.477385] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.478737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.479319] Hardware name: linux,dummy-virt (DT)
[   34.479882] Call trace:
[   34.480289]  show_stack+0x20/0x38 (C)
[   34.480798]  dump_stack_lvl+0x8c/0xd0
[   34.481424]  print_report+0x118/0x5e0
[   34.481945]  kasan_report+0xc8/0x118
[   34.482544]  __asan_report_load8_noabort+0x20/0x30
[   34.483174]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   34.483828]  kasan_bitops_generic+0x11c/0x1c8
[   34.484498]  kunit_try_run_case+0x14c/0x3d0
[   34.485146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.485991]  kthread+0x24c/0x2d0
[   34.486565]  ret_from_fork+0x10/0x20
[   34.486845] 
[   34.487000] Allocated by task 249:
[   34.487322]  kasan_save_stack+0x3c/0x68
[   34.487917]  kasan_save_track+0x20/0x40
[   34.488441]  kasan_save_alloc_info+0x40/0x58
[   34.489087]  __kasan_kmalloc+0xd4/0xd8
[   34.489689]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.490333]  kasan_bitops_generic+0xa0/0x1c8
[   34.490823]  kunit_try_run_case+0x14c/0x3d0
[   34.491453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.492194]  kthread+0x24c/0x2d0
[   34.492745]  ret_from_fork+0x10/0x20
[   34.493239] 
[   34.493574] The buggy address belongs to the object at fff00000c4005ea0
[   34.493574]  which belongs to the cache kmalloc-16 of size 16
[   34.494750] The buggy address is located 8 bytes inside of
[   34.494750]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.495834] 
[   34.496198] The buggy address belongs to the physical page:
[   34.496865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.497790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.498513] page_type: f5(slab)
[   34.499049] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.499817] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.500698] page dumped because: kasan: bad access detected
[   34.501411] 
[   34.501751] Memory state around the buggy address:
[   34.502257]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.503444]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.504590] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.505389]                                   ^
[   34.505907]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.507130]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.507899] ==================================================================
[   34.366136] ==================================================================
[   34.366944] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.367706] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.368525] 
[   34.368904] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.369927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.370480] Hardware name: linux,dummy-virt (DT)
[   34.371101] Call trace:
[   34.371546]  show_stack+0x20/0x38 (C)
[   34.372149]  dump_stack_lvl+0x8c/0xd0
[   34.372698]  print_report+0x118/0x5e0
[   34.373207]  kasan_report+0xc8/0x118
[   34.373793]  __asan_report_load8_noabort+0x20/0x30
[   34.374449]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.375276]  kasan_bitops_generic+0x11c/0x1c8
[   34.375919]  kunit_try_run_case+0x14c/0x3d0
[   34.376546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.377290]  kthread+0x24c/0x2d0
[   34.377813]  ret_from_fork+0x10/0x20
[   34.378372] 
[   34.378708] Allocated by task 249:
[   34.379139]  kasan_save_stack+0x3c/0x68
[   34.379741]  kasan_save_track+0x20/0x40
[   34.380296]  kasan_save_alloc_info+0x40/0x58
[   34.380852]  __kasan_kmalloc+0xd4/0xd8
[   34.381446]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.381968]  kasan_bitops_generic+0xa0/0x1c8
[   34.382614]  kunit_try_run_case+0x14c/0x3d0
[   34.383229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.383970]  kthread+0x24c/0x2d0
[   34.384528]  ret_from_fork+0x10/0x20
[   34.385041] 
[   34.385373] The buggy address belongs to the object at fff00000c4005ea0
[   34.385373]  which belongs to the cache kmalloc-16 of size 16
[   34.386614] The buggy address is located 8 bytes inside of
[   34.386614]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.387750] 
[   34.388109] The buggy address belongs to the physical page:
[   34.388669] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.389561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.390353] page_type: f5(slab)
[   34.390887] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.391605] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.392565] page dumped because: kasan: bad access detected
[   34.393396] 
[   34.393905] Memory state around the buggy address:
[   34.394485]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.395475]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.396432] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.397359]                                   ^
[   34.398106]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.399053]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.400006] ==================================================================
[   34.225640] ==================================================================
[   34.226414] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.227737] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.228603] 
[   34.228977] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.230231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.230579] Hardware name: linux,dummy-virt (DT)
[   34.230945] Call trace:
[   34.232211]  show_stack+0x20/0x38 (C)
[   34.233026]  dump_stack_lvl+0x8c/0xd0
[   34.233632]  print_report+0x118/0x5e0
[   34.234223]  kasan_report+0xc8/0x118
[   34.234799]  __asan_report_load8_noabort+0x20/0x30
[   34.235442]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.236187]  kasan_bitops_generic+0x11c/0x1c8
[   34.236778]  kunit_try_run_case+0x14c/0x3d0
[   34.237368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.238105]  kthread+0x24c/0x2d0
[   34.238627]  ret_from_fork+0x10/0x20
[   34.239190] 
[   34.239513] Allocated by task 249:
[   34.239995]  kasan_save_stack+0x3c/0x68
[   34.240611]  kasan_save_track+0x20/0x40
[   34.241168]  kasan_save_alloc_info+0x40/0x58
[   34.241808]  __kasan_kmalloc+0xd4/0xd8
[   34.242405]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.243049]  kasan_bitops_generic+0xa0/0x1c8
[   34.243608]  kunit_try_run_case+0x14c/0x3d0
[   34.244234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.244880]  kthread+0x24c/0x2d0
[   34.245444]  ret_from_fork+0x10/0x20
[   34.245897] 
[   34.246257] The buggy address belongs to the object at fff00000c4005ea0
[   34.246257]  which belongs to the cache kmalloc-16 of size 16
[   34.247260] The buggy address is located 8 bytes inside of
[   34.247260]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.248559] 
[   34.248911] The buggy address belongs to the physical page:
[   34.249466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.250390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.251061] page_type: f5(slab)
[   34.251585] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.252427] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.253199] page dumped because: kasan: bad access detected
[   34.253878] 
[   34.254246] Memory state around the buggy address:
[   34.254822]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.255621]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.256363] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.257076]                                   ^
[   34.257681]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.258407]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.259198] ==================================================================
[   34.402042] ==================================================================
[   34.402927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.404368] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.406332] 
[   34.406679] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.407621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.408749] Hardware name: linux,dummy-virt (DT)
[   34.409622] Call trace:
[   34.410183]  show_stack+0x20/0x38 (C)
[   34.410857]  dump_stack_lvl+0x8c/0xd0
[   34.411463]  print_report+0x118/0x5e0
[   34.412062]  kasan_report+0xc8/0x118
[   34.412667]  kasan_check_range+0x100/0x1a8
[   34.413253]  __kasan_check_write+0x20/0x30
[   34.413875]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.414647]  kasan_bitops_generic+0x11c/0x1c8
[   34.415239]  kunit_try_run_case+0x14c/0x3d0
[   34.415796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.416591]  kthread+0x24c/0x2d0
[   34.417162]  ret_from_fork+0x10/0x20
[   34.417836] 
[   34.418236] Allocated by task 249:
[   34.418865]  kasan_save_stack+0x3c/0x68
[   34.419535]  kasan_save_track+0x20/0x40
[   34.420179]  kasan_save_alloc_info+0x40/0x58
[   34.420844]  __kasan_kmalloc+0xd4/0xd8
[   34.421351]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.421712]  kasan_bitops_generic+0xa0/0x1c8
[   34.421980]  kunit_try_run_case+0x14c/0x3d0
[   34.422398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.423194]  kthread+0x24c/0x2d0
[   34.423806]  ret_from_fork+0x10/0x20
[   34.424432] 
[   34.424809] The buggy address belongs to the object at fff00000c4005ea0
[   34.424809]  which belongs to the cache kmalloc-16 of size 16
[   34.426036] The buggy address is located 8 bytes inside of
[   34.426036]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.427274] 
[   34.427607] The buggy address belongs to the physical page:
[   34.428244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.429087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.429780] page_type: f5(slab)
[   34.430224] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.431162] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.432060] page dumped because: kasan: bad access detected
[   34.432763] 
[   34.433077] Memory state around the buggy address:
[   34.433572]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.434423]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.435161] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.435907]                                   ^
[   34.436563]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.437381]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.438227] ==================================================================
[   34.439640] ==================================================================
[   34.440385] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   34.441284] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.442165] 
[   34.442556] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.443615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.444095] Hardware name: linux,dummy-virt (DT)
[   34.444723] Call trace:
[   34.445166]  show_stack+0x20/0x38 (C)
[   34.445755]  dump_stack_lvl+0x8c/0xd0
[   34.446301]  print_report+0x118/0x5e0
[   34.446878]  kasan_report+0xc8/0x118
[   34.447390]  __asan_report_load8_noabort+0x20/0x30
[   34.448059]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   34.448880]  kasan_bitops_generic+0x11c/0x1c8
[   34.449413]  kunit_try_run_case+0x14c/0x3d0
[   34.450062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.450831]  kthread+0x24c/0x2d0
[   34.451344]  ret_from_fork+0x10/0x20
[   34.451935] 
[   34.452311] Allocated by task 249:
[   34.452723]  kasan_save_stack+0x3c/0x68
[   34.453326]  kasan_save_track+0x20/0x40
[   34.453826]  kasan_save_alloc_info+0x40/0x58
[   34.454468]  __kasan_kmalloc+0xd4/0xd8
[   34.454983]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.455660]  kasan_bitops_generic+0xa0/0x1c8
[   34.456294]  kunit_try_run_case+0x14c/0x3d0
[   34.456837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.457549]  kthread+0x24c/0x2d0
[   34.458106]  ret_from_fork+0x10/0x20
[   34.458675] 
[   34.459005] The buggy address belongs to the object at fff00000c4005ea0
[   34.459005]  which belongs to the cache kmalloc-16 of size 16
[   34.460270] The buggy address is located 8 bytes inside of
[   34.460270]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.461245] 
[   34.461594] The buggy address belongs to the physical page:
[   34.462293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.463196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.463974] page_type: f5(slab)
[   34.464517] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.465336] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.466181] page dumped because: kasan: bad access detected
[   34.466715] 
[   34.467066] Memory state around the buggy address:
[   34.467697]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.468434]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.469239] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.469891]                                   ^
[   34.470524]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.471282]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.471999] ==================================================================
[   34.330381] ==================================================================
[   34.331108] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.332482] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.333344] 
[   34.333726] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.334812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.335291] Hardware name: linux,dummy-virt (DT)
[   34.335905] Call trace:
[   34.336327]  show_stack+0x20/0x38 (C)
[   34.336882]  dump_stack_lvl+0x8c/0xd0
[   34.337509]  print_report+0x118/0x5e0
[   34.338129]  kasan_report+0xc8/0x118
[   34.338725]  kasan_check_range+0x100/0x1a8
[   34.339340]  __kasan_check_write+0x20/0x30
[   34.339973]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.340733]  kasan_bitops_generic+0x11c/0x1c8
[   34.341316]  kunit_try_run_case+0x14c/0x3d0
[   34.341966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.342657]  kthread+0x24c/0x2d0
[   34.343212]  ret_from_fork+0x10/0x20
[   34.343706] 
[   34.344061] Allocated by task 249:
[   34.344608]  kasan_save_stack+0x3c/0x68
[   34.345155]  kasan_save_track+0x20/0x40
[   34.345721]  kasan_save_alloc_info+0x40/0x58
[   34.346299]  __kasan_kmalloc+0xd4/0xd8
[   34.346854]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.347519]  kasan_bitops_generic+0xa0/0x1c8
[   34.348155]  kunit_try_run_case+0x14c/0x3d0
[   34.348729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.349347]  kthread+0x24c/0x2d0
[   34.349888]  ret_from_fork+0x10/0x20
[   34.350461] 
[   34.350793] The buggy address belongs to the object at fff00000c4005ea0
[   34.350793]  which belongs to the cache kmalloc-16 of size 16
[   34.351928] The buggy address is located 8 bytes inside of
[   34.351928]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.353194] 
[   34.353535] The buggy address belongs to the physical page:
[   34.354141] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.355014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.355660] page_type: f5(slab)
[   34.356216] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.357108] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.358006] page dumped because: kasan: bad access detected
[   34.358650] 
[   34.358999] Memory state around the buggy address:
[   34.359627]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.360434]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.361213] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.361980]                                   ^
[   34.362620]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.363314]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.364168] ==================================================================

[   25.469983] ==================================================================
[   25.470866] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   25.471762] Read of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   25.472493] 
[   25.472774] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.473838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.474279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.475275] Call Trace:
[   25.475536]  <TASK>
[   25.475890]  dump_stack_lvl+0x73/0xb0
[   25.476407]  print_report+0xd1/0x640
[   25.476775]  ? __virt_addr_valid+0x1db/0x2d0
[   25.477228]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.477953]  kasan_report+0x102/0x140
[   25.478482]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   25.479640]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   25.480602]  kasan_check_range+0x10c/0x1c0
[   25.481177]  __kasan_check_read+0x15/0x20
[   25.481713]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   25.482406]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.483028]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.483523]  ? kasan_bitops_generic+0x93/0x1c0
[   25.483905]  kasan_bitops_generic+0x122/0x1c0
[   25.484435]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.484840]  ? __pfx_read_tsc+0x10/0x10
[   25.485295]  ? ktime_get_ts64+0x84/0x230
[   25.485657]  kunit_try_run_case+0x1b3/0x490
[   25.486221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.486764]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.487243]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.487790]  ? __kthread_parkme+0x82/0x160
[   25.488371]  ? preempt_count_sub+0x50/0x80
[   25.488795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.489428]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.489893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.490445]  kthread+0x257/0x310
[   25.490872]  ? __pfx_kthread+0x10/0x10
[   25.491260]  ret_from_fork+0x41/0x80
[   25.491737]  ? __pfx_kthread+0x10/0x10
[   25.492103]  ret_from_fork_asm+0x1a/0x30
[   25.492463]  </TASK>
[   25.492767] 
[   25.492999] Allocated by task 269:
[   25.493382]  kasan_save_stack+0x3d/0x60
[   25.493705]  kasan_save_track+0x18/0x40
[   25.493981]  kasan_save_alloc_info+0x3b/0x50
[   25.494614]  __kasan_kmalloc+0xb7/0xc0
[   25.494996]  __kmalloc_cache_noprof+0x184/0x410
[   25.495468]  kasan_bitops_generic+0x93/0x1c0
[   25.495813]  kunit_try_run_case+0x1b3/0x490
[   25.496377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.496996]  kthread+0x257/0x310
[   25.497375]  ret_from_fork+0x41/0x80
[   25.497744]  ret_from_fork_asm+0x1a/0x30
[   25.498122] 
[   25.498277] The buggy address belongs to the object at ffff888101094fa0
[   25.498277]  which belongs to the cache kmalloc-16 of size 16
[   25.499435] The buggy address is located 8 bytes inside of
[   25.499435]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   25.500216] 
[   25.500418] The buggy address belongs to the physical page:
[   25.501048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   25.501728] flags: 0x200000000000000(node=0|zone=2)
[   25.502109] page_type: f5(slab)
[   25.502512] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.503314] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.503944] page dumped because: kasan: bad access detected
[   25.504540] 
[   25.504780] Memory state around the buggy address:
[   25.505251]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.505694]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.506546] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.507209]                                   ^
[   25.507698]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.508408]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   25.509017] ==================================================================
[   25.379175] ==================================================================
[   25.381325] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   25.382722] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   25.383458] 
[   25.383724] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.385065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.385836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.386763] Call Trace:
[   25.387129]  <TASK>
[   25.387585]  dump_stack_lvl+0x73/0xb0
[   25.388172]  print_report+0xd1/0x640
[   25.388783]  ? __virt_addr_valid+0x1db/0x2d0
[   25.389462]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.390020]  kasan_report+0x102/0x140
[   25.390834]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   25.391611]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   25.392197]  kasan_check_range+0x10c/0x1c0
[   25.392603]  __kasan_check_write+0x18/0x20
[   25.393096]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   25.393773]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.394479]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.394895]  ? kasan_bitops_generic+0x93/0x1c0
[   25.395754]  kasan_bitops_generic+0x122/0x1c0
[   25.396093]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.396385]  ? __pfx_read_tsc+0x10/0x10
[   25.397008]  ? ktime_get_ts64+0x84/0x230
[   25.397399]  kunit_try_run_case+0x1b3/0x490
[   25.398188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.398772]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.399234]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.399665]  ? __kthread_parkme+0x82/0x160
[   25.400049]  ? preempt_count_sub+0x50/0x80
[   25.400542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.400979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.401566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.402116]  kthread+0x257/0x310
[   25.402468]  ? __pfx_kthread+0x10/0x10
[   25.402837]  ret_from_fork+0x41/0x80
[   25.403364]  ? __pfx_kthread+0x10/0x10
[   25.403814]  ret_from_fork_asm+0x1a/0x30
[   25.404253]  </TASK>
[   25.404566] 
[   25.404802] Allocated by task 269:
[   25.405233]  kasan_save_stack+0x3d/0x60
[   25.405608]  kasan_save_track+0x18/0x40
[   25.406043]  kasan_save_alloc_info+0x3b/0x50
[   25.406587]  __kasan_kmalloc+0xb7/0xc0
[   25.406957]  __kmalloc_cache_noprof+0x184/0x410
[   25.407355]  kasan_bitops_generic+0x93/0x1c0
[   25.407845]  kunit_try_run_case+0x1b3/0x490
[   25.408325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.408737]  kthread+0x257/0x310
[   25.409192]  ret_from_fork+0x41/0x80
[   25.409672]  ret_from_fork_asm+0x1a/0x30
[   25.410061] 
[   25.411132] The buggy address belongs to the object at ffff888101094fa0
[   25.411132]  which belongs to the cache kmalloc-16 of size 16
[   25.411901] The buggy address is located 8 bytes inside of
[   25.411901]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   25.412767] 
[   25.412923] The buggy address belongs to the physical page:
[   25.413397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   25.414054] flags: 0x200000000000000(node=0|zone=2)
[   25.414673] page_type: f5(slab)
[   25.414959] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.415612] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.416310] page dumped because: kasan: bad access detected
[   25.416860] 
[   25.417030] Memory state around the buggy address:
[   25.417427]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.418230]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.419111] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.419804]                                   ^
[   25.420158]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.420876]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   25.421656] ==================================================================
[   25.196735] ==================================================================
[   25.197849] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   25.198682] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   25.199448] 
[   25.199786] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.200693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.201366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.202358] Call Trace:
[   25.202568]  <TASK>
[   25.202912]  dump_stack_lvl+0x73/0xb0
[   25.203531]  print_report+0xd1/0x640
[   25.203855]  ? __virt_addr_valid+0x1db/0x2d0
[   25.204736]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.205295]  kasan_report+0x102/0x140
[   25.205801]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   25.206525]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   25.207357]  kasan_check_range+0x10c/0x1c0
[   25.207904]  __kasan_check_write+0x18/0x20
[   25.208357]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   25.208897]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.209480]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.210048]  ? kasan_bitops_generic+0x93/0x1c0
[   25.210719]  kasan_bitops_generic+0x122/0x1c0
[   25.211284]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.211851]  ? __pfx_read_tsc+0x10/0x10
[   25.212433]  ? ktime_get_ts64+0x84/0x230
[   25.212982]  kunit_try_run_case+0x1b3/0x490
[   25.213541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.214215]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.214715]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.215317]  ? __kthread_parkme+0x82/0x160
[   25.215790]  ? preempt_count_sub+0x50/0x80
[   25.216360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.216927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.217675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.218278]  kthread+0x257/0x310
[   25.218735]  ? __pfx_kthread+0x10/0x10
[   25.219192]  ret_from_fork+0x41/0x80
[   25.219709]  ? __pfx_kthread+0x10/0x10
[   25.220132]  ret_from_fork_asm+0x1a/0x30
[   25.220645]  </TASK>
[   25.220996] 
[   25.221265] Allocated by task 269:
[   25.221697]  kasan_save_stack+0x3d/0x60
[   25.222175]  kasan_save_track+0x18/0x40
[   25.222577]  kasan_save_alloc_info+0x3b/0x50
[   25.223190]  __kasan_kmalloc+0xb7/0xc0
[   25.223645]  __kmalloc_cache_noprof+0x184/0x410
[   25.224364]  kasan_bitops_generic+0x93/0x1c0
[   25.224664]  kunit_try_run_case+0x1b3/0x490
[   25.225284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.225985]  kthread+0x257/0x310
[   25.226370]  ret_from_fork+0x41/0x80
[   25.226754]  ret_from_fork_asm+0x1a/0x30
[   25.227260] 
[   25.227434] The buggy address belongs to the object at ffff888101094fa0
[   25.227434]  which belongs to the cache kmalloc-16 of size 16
[   25.228756] The buggy address is located 8 bytes inside of
[   25.228756]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   25.229688] 
[   25.229905] The buggy address belongs to the physical page:
[   25.230627] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   25.231213] flags: 0x200000000000000(node=0|zone=2)
[   25.231894] page_type: f5(slab)
[   25.232409] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.232999] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.233739] page dumped because: kasan: bad access detected
[   25.234418] 
[   25.234611] Memory state around the buggy address:
[   25.235188]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.236040]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.237226] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.238003]                                   ^
[   25.238523]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.239197]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   25.240073] ==================================================================
[   25.422712] ==================================================================
[   25.423537] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   25.424178] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   25.424918] 
[   25.425254] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.426048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.426480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.427194] Call Trace:
[   25.427528]  <TASK>
[   25.427767]  dump_stack_lvl+0x73/0xb0
[   25.428262]  print_report+0xd1/0x640
[   25.428747]  ? __virt_addr_valid+0x1db/0x2d0
[   25.429212]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.429636]  kasan_report+0x102/0x140
[   25.430188]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   25.430712]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   25.431413]  kasan_check_range+0x10c/0x1c0
[   25.431930]  __kasan_check_write+0x18/0x20
[   25.432365]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   25.432931]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.433542]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.434046]  ? kasan_bitops_generic+0x93/0x1c0
[   25.434543]  kasan_bitops_generic+0x122/0x1c0
[   25.435200]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.435666]  ? __pfx_read_tsc+0x10/0x10
[   25.436152]  ? ktime_get_ts64+0x84/0x230
[   25.436499]  kunit_try_run_case+0x1b3/0x490
[   25.436967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.437504]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.437982]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.438630]  ? __kthread_parkme+0x82/0x160
[   25.439012]  ? preempt_count_sub+0x50/0x80
[   25.439395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.439922]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.441030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.441686]  kthread+0x257/0x310
[   25.441969]  ? __pfx_kthread+0x10/0x10
[   25.442851]  ret_from_fork+0x41/0x80
[   25.443759]  ? __pfx_kthread+0x10/0x10
[   25.444077]  ret_from_fork_asm+0x1a/0x30
[   25.444905]  </TASK>
[   25.445284] 
[   25.445493] Allocated by task 269:
[   25.445841]  kasan_save_stack+0x3d/0x60
[   25.446208]  kasan_save_track+0x18/0x40
[   25.447240]  kasan_save_alloc_info+0x3b/0x50
[   25.447621]  __kasan_kmalloc+0xb7/0xc0
[   25.448121]  __kmalloc_cache_noprof+0x184/0x410
[   25.448780]  kasan_bitops_generic+0x93/0x1c0
[   25.449484]  kunit_try_run_case+0x1b3/0x490
[   25.449985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.450799]  kthread+0x257/0x310
[   25.451446]  ret_from_fork+0x41/0x80
[   25.452040]  ret_from_fork_asm+0x1a/0x30
[   25.452964] 
[   25.453855] The buggy address belongs to the object at ffff888101094fa0
[   25.453855]  which belongs to the cache kmalloc-16 of size 16
[   25.455212] The buggy address is located 8 bytes inside of
[   25.455212]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   25.456642] 
[   25.456907] The buggy address belongs to the physical page:
[   25.457895] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   25.458992] flags: 0x200000000000000(node=0|zone=2)
[   25.459867] page_type: f5(slab)
[   25.460574] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.461407] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.462194] page dumped because: kasan: bad access detected
[   25.462854] 
[   25.463154] Memory state around the buggy address:
[   25.464107]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.464810]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.465872] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.466592]                                   ^
[   25.467212]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.467927]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   25.468855] ==================================================================
[   25.330678] ==================================================================
[   25.331715] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   25.332690] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   25.333324] 
[   25.333643] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.334607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.334999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.335878] Call Trace:
[   25.336237]  <TASK>
[   25.336513]  dump_stack_lvl+0x73/0xb0
[   25.337035]  print_report+0xd1/0x640
[   25.337423]  ? __virt_addr_valid+0x1db/0x2d0
[   25.337911]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.338580]  kasan_report+0x102/0x140
[   25.339048]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   25.339536]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   25.340443]  kasan_check_range+0x10c/0x1c0
[   25.340970]  __kasan_check_write+0x18/0x20
[   25.341840]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   25.342713]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.343765]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.344375]  ? kasan_bitops_generic+0x93/0x1c0
[   25.344820]  kasan_bitops_generic+0x122/0x1c0
[   25.345259]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.345786]  ? __pfx_read_tsc+0x10/0x10
[   25.346146]  ? ktime_get_ts64+0x84/0x230
[   25.347423]  kunit_try_run_case+0x1b3/0x490
[   25.347839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.348193]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.348916]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.349670]  ? __kthread_parkme+0x82/0x160
[   25.350102]  ? preempt_count_sub+0x50/0x80
[   25.350655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.351435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.352087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.352734]  kthread+0x257/0x310
[   25.353094]  ? __pfx_kthread+0x10/0x10
[   25.353854]  ret_from_fork+0x41/0x80
[   25.354694]  ? __pfx_kthread+0x10/0x10
[   25.355568]  ret_from_fork_asm+0x1a/0x30
[   25.355922]  </TASK>
[   25.356198] 
[   25.356384] Allocated by task 269:
[   25.356756]  kasan_save_stack+0x3d/0x60
[   25.357261]  kasan_save_track+0x18/0x40
[   25.357638]  kasan_save_alloc_info+0x3b/0x50
[   25.357970]  __kasan_kmalloc+0xb7/0xc0
[   25.358624]  __kmalloc_cache_noprof+0x184/0x410
[   25.359510]  kasan_bitops_generic+0x93/0x1c0
[   25.359825]  kunit_try_run_case+0x1b3/0x490
[   25.360444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.361328]  kthread+0x257/0x310
[   25.362189]  ret_from_fork+0x41/0x80
[   25.362670]  ret_from_fork_asm+0x1a/0x30
[   25.363301] 
[   25.363558] The buggy address belongs to the object at ffff888101094fa0
[   25.363558]  which belongs to the cache kmalloc-16 of size 16
[   25.364732] The buggy address is located 8 bytes inside of
[   25.364732]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   25.365960] 
[   25.366269] The buggy address belongs to the physical page:
[   25.367047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   25.367836] flags: 0x200000000000000(node=0|zone=2)
[   25.368377] page_type: f5(slab)
[   25.368765] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.370301] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.371312] page dumped because: kasan: bad access detected
[   25.371952] 
[   25.372197] Memory state around the buggy address:
[   25.372783]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.373482]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.373988] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.375235]                                   ^
[   25.375813]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.376628]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   25.377733] ==================================================================
[   25.241389] ==================================================================
[   25.242479] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   25.243556] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   25.244688] 
[   25.244915] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.245856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.246393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.247211] Call Trace:
[   25.247495]  <TASK>
[   25.247859]  dump_stack_lvl+0x73/0xb0
[   25.248443]  print_report+0xd1/0x640
[   25.248747]  ? __virt_addr_valid+0x1db/0x2d0
[   25.249365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.250014]  kasan_report+0x102/0x140
[   25.250350]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   25.251032]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   25.251744]  kasan_check_range+0x10c/0x1c0
[   25.252401]  __kasan_check_write+0x18/0x20
[   25.252942]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   25.253550]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.254369]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.255061]  ? kasan_bitops_generic+0x93/0x1c0
[   25.255505]  kasan_bitops_generic+0x122/0x1c0
[   25.256309]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.256797]  ? __pfx_read_tsc+0x10/0x10
[   25.257288]  ? ktime_get_ts64+0x84/0x230
[   25.257683]  kunit_try_run_case+0x1b3/0x490
[   25.258270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.258833]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.259156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.259789]  ? __kthread_parkme+0x82/0x160
[   25.260383]  ? preempt_count_sub+0x50/0x80
[   25.261145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.261550]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.262297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.262839]  kthread+0x257/0x310
[   25.263095]  ? __pfx_kthread+0x10/0x10
[   25.263638]  ret_from_fork+0x41/0x80
[   25.264118]  ? __pfx_kthread+0x10/0x10
[   25.264535]  ret_from_fork_asm+0x1a/0x30
[   25.265077]  </TASK>
[   25.265419] 
[   25.265659] Allocated by task 269:
[   25.265898]  kasan_save_stack+0x3d/0x60
[   25.266539]  kasan_save_track+0x18/0x40
[   25.267044]  kasan_save_alloc_info+0x3b/0x50
[   25.268253]  __kasan_kmalloc+0xb7/0xc0
[   25.268860]  __kmalloc_cache_noprof+0x184/0x410
[   25.269217]  kasan_bitops_generic+0x93/0x1c0
[   25.269694]  kunit_try_run_case+0x1b3/0x490
[   25.270184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.270778]  kthread+0x257/0x310
[   25.271226]  ret_from_fork+0x41/0x80
[   25.271689]  ret_from_fork_asm+0x1a/0x30
[   25.272246] 
[   25.272566] The buggy address belongs to the object at ffff888101094fa0
[   25.272566]  which belongs to the cache kmalloc-16 of size 16
[   25.273570] The buggy address is located 8 bytes inside of
[   25.273570]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   25.274707] 
[   25.275021] The buggy address belongs to the physical page:
[   25.275442] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   25.276309] flags: 0x200000000000000(node=0|zone=2)
[   25.276661] page_type: f5(slab)
[   25.277208] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.277967] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.278748] page dumped because: kasan: bad access detected
[   25.279378] 
[   25.279627] Memory state around the buggy address:
[   25.280064]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.280759]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.281476] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.282089]                                   ^
[   25.282651]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.283330]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   25.284134] ==================================================================
[   25.510912] ==================================================================
[   25.511644] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   25.512866] Read of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   25.513444] 
[   25.513671] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.514456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.514887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.515629] Call Trace:
[   25.515909]  <TASK>
[   25.516262]  dump_stack_lvl+0x73/0xb0
[   25.516759]  print_report+0xd1/0x640
[   25.517129]  ? __virt_addr_valid+0x1db/0x2d0
[   25.517649]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.518280]  kasan_report+0x102/0x140
[   25.518583]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   25.519277]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   25.519921]  __asan_report_load8_noabort+0x18/0x20
[   25.520486]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   25.521311]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.521969]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.522476]  ? kasan_bitops_generic+0x93/0x1c0
[   25.522992]  kasan_bitops_generic+0x122/0x1c0
[   25.523593]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.524003]  ? __pfx_read_tsc+0x10/0x10
[   25.524452]  ? ktime_get_ts64+0x84/0x230
[   25.524915]  kunit_try_run_case+0x1b3/0x490
[   25.525322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.525830]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.526361]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.526797]  ? __kthread_parkme+0x82/0x160
[   25.527138]  ? preempt_count_sub+0x50/0x80
[   25.527668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.528267]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.528799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.529254]  kthread+0x257/0x310
[   25.529548]  ? __pfx_kthread+0x10/0x10
[   25.530025]  ret_from_fork+0x41/0x80
[   25.530522]  ? __pfx_kthread+0x10/0x10
[   25.530886]  ret_from_fork_asm+0x1a/0x30
[   25.531394]  </TASK>
[   25.531589] 
[   25.531740] Allocated by task 269:
[   25.532117]  kasan_save_stack+0x3d/0x60
[   25.532647]  kasan_save_track+0x18/0x40
[   25.533182]  kasan_save_alloc_info+0x3b/0x50
[   25.533750]  __kasan_kmalloc+0xb7/0xc0
[   25.534062]  __kmalloc_cache_noprof+0x184/0x410
[   25.534697]  kasan_bitops_generic+0x93/0x1c0
[   25.535112]  kunit_try_run_case+0x1b3/0x490
[   25.535598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.535945]  kthread+0x257/0x310
[   25.536421]  ret_from_fork+0x41/0x80
[   25.536896]  ret_from_fork_asm+0x1a/0x30
[   25.537414] 
[   25.537622] The buggy address belongs to the object at ffff888101094fa0
[   25.537622]  which belongs to the cache kmalloc-16 of size 16
[   25.538462] The buggy address is located 8 bytes inside of
[   25.538462]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   25.539488] 
[   25.539713] The buggy address belongs to the physical page:
[   25.540321] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   25.541634] flags: 0x200000000000000(node=0|zone=2)
[   25.541971] page_type: f5(slab)
[   25.542424] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.543116] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.543689] page dumped because: kasan: bad access detected
[   25.544228] 
[   25.544445] Memory state around the buggy address:
[   25.544948]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.545597]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.546212] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.546849]                                   ^
[   25.547292]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.547980]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   25.548470] ==================================================================
[   25.145100] ==================================================================
[   25.145875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   25.147464] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   25.148979] 
[   25.149497] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.150843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.151313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.152543] Call Trace:
[   25.153032]  <TASK>
[   25.153353]  dump_stack_lvl+0x73/0xb0
[   25.153813]  print_report+0xd1/0x640
[   25.154182]  ? __virt_addr_valid+0x1db/0x2d0
[   25.155285]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.155900]  kasan_report+0x102/0x140
[   25.156427]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   25.156993]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   25.157911]  kasan_check_range+0x10c/0x1c0
[   25.158316]  __kasan_check_write+0x18/0x20
[   25.158995]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   25.160302]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.160939]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.161390]  ? kasan_bitops_generic+0x93/0x1c0
[   25.161997]  kasan_bitops_generic+0x122/0x1c0
[   25.162560]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.163218]  ? __pfx_read_tsc+0x10/0x10
[   25.163947]  ? ktime_get_ts64+0x84/0x230
[   25.164578]  kunit_try_run_case+0x1b3/0x490
[   25.164924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.165642]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.165993]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.166682]  ? __kthread_parkme+0x82/0x160
[   25.167125]  ? preempt_count_sub+0x50/0x80
[   25.167643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.168628]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.169024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.169692]  kthread+0x257/0x310
[   25.169978]  ? __pfx_kthread+0x10/0x10
[   25.170536]  ret_from_fork+0x41/0x80
[   25.171491]  ? __pfx_kthread+0x10/0x10
[   25.171982]  ret_from_fork_asm+0x1a/0x30
[   25.172604]  </TASK>
[   25.172918] 
[   25.173212] Allocated by task 269:
[   25.173600]  kasan_save_stack+0x3d/0x60
[   25.174024]  kasan_save_track+0x18/0x40
[   25.174753]  kasan_save_alloc_info+0x3b/0x50
[   25.175314]  __kasan_kmalloc+0xb7/0xc0
[   25.176220]  __kmalloc_cache_noprof+0x184/0x410
[   25.176681]  kasan_bitops_generic+0x93/0x1c0
[   25.176983]  kunit_try_run_case+0x1b3/0x490
[   25.177925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.178746]  kthread+0x257/0x310
[   25.179153]  ret_from_fork+0x41/0x80
[   25.179865]  ret_from_fork_asm+0x1a/0x30
[   25.180258] 
[   25.180514] The buggy address belongs to the object at ffff888101094fa0
[   25.180514]  which belongs to the cache kmalloc-16 of size 16
[   25.182212] The buggy address is located 8 bytes inside of
[   25.182212]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   25.183663] 
[   25.183962] The buggy address belongs to the physical page:
[   25.184459] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   25.185849] flags: 0x200000000000000(node=0|zone=2)
[   25.186528] page_type: f5(slab)
[   25.187124] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.187934] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.188774] page dumped because: kasan: bad access detected
[   25.189440] 
[   25.190096] Memory state around the buggy address:
[   25.190697]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.191496]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.192381] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.193186]                                   ^
[   25.193622]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.194598]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   25.195598] ==================================================================
[   25.285436] ==================================================================
[   25.286277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   25.287526] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   25.288404] 
[   25.289648] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.290702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.291037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.291928] Call Trace:
[   25.292245]  <TASK>
[   25.292634]  dump_stack_lvl+0x73/0xb0
[   25.293074]  print_report+0xd1/0x640
[   25.293490]  ? __virt_addr_valid+0x1db/0x2d0
[   25.294362]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.294902]  kasan_report+0x102/0x140
[   25.295308]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   25.295968]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   25.296656]  kasan_check_range+0x10c/0x1c0
[   25.296997]  __kasan_check_write+0x18/0x20
[   25.297508]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   25.298488]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.299455]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.300129]  ? kasan_bitops_generic+0x93/0x1c0
[   25.300803]  kasan_bitops_generic+0x122/0x1c0
[   25.301273]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.301805]  ? __pfx_read_tsc+0x10/0x10
[   25.302357]  ? ktime_get_ts64+0x84/0x230
[   25.302741]  kunit_try_run_case+0x1b3/0x490
[   25.303187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.303747]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.304069]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.304890]  ? __kthread_parkme+0x82/0x160
[   25.305447]  ? preempt_count_sub+0x50/0x80
[   25.305899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.306758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.307659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.308299]  kthread+0x257/0x310
[   25.308812]  ? __pfx_kthread+0x10/0x10
[   25.309437]  ret_from_fork+0x41/0x80
[   25.309798]  ? __pfx_kthread+0x10/0x10
[   25.310679]  ret_from_fork_asm+0x1a/0x30
[   25.311567]  </TASK>
[   25.311740] 
[   25.312045] Allocated by task 269:
[   25.312633]  kasan_save_stack+0x3d/0x60
[   25.312997]  kasan_save_track+0x18/0x40
[   25.313507]  kasan_save_alloc_info+0x3b/0x50
[   25.313999]  __kasan_kmalloc+0xb7/0xc0
[   25.314467]  __kmalloc_cache_noprof+0x184/0x410
[   25.314881]  kasan_bitops_generic+0x93/0x1c0
[   25.315296]  kunit_try_run_case+0x1b3/0x490
[   25.315723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.316064]  kthread+0x257/0x310
[   25.316581]  ret_from_fork+0x41/0x80
[   25.317155]  ret_from_fork_asm+0x1a/0x30
[   25.317589] 
[   25.317743] The buggy address belongs to the object at ffff888101094fa0
[   25.317743]  which belongs to the cache kmalloc-16 of size 16
[   25.318907] The buggy address is located 8 bytes inside of
[   25.318907]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   25.320012] 
[   25.320327] The buggy address belongs to the physical page:
[   25.320957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   25.321807] flags: 0x200000000000000(node=0|zone=2)
[   25.322216] page_type: f5(slab)
[   25.322660] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.323272] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.324163] page dumped because: kasan: bad access detected
[   25.324673] 
[   25.324859] Memory state around the buggy address:
[   25.325371]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.326206]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.326802] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.327646]                                   ^
[   25.328115]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.328679]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   25.329505] ==================================================================