Hay
Date
Nov. 20, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   39.971611] ==================================================================
[   39.972854] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   39.974607] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   39.975891] 
[   39.976228] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.977368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.977922] Hardware name: linux,dummy-virt (DT)
[   39.978456] Call trace:
[   39.978887]  show_stack+0x20/0x38 (C)
[   39.979865]  dump_stack_lvl+0x8c/0xd0
[   39.980477]  print_report+0x118/0x5e0
[   39.980992]  kasan_report+0xc8/0x118
[   39.981890]  kasan_check_range+0x100/0x1a8
[   39.982486]  __kasan_check_write+0x20/0x30
[   39.983076]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   39.983895]  kasan_bitops_generic+0x110/0x1c8
[   39.984554]  kunit_try_run_case+0x14c/0x3d0
[   39.985123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.986229]  kthread+0x24c/0x2d0
[   39.986708]  ret_from_fork+0x10/0x20
[   39.987296] 
[   39.987655] Allocated by task 250:
[   39.988181]  kasan_save_stack+0x3c/0x68
[   39.988717]  kasan_save_track+0x20/0x40
[   39.989285]  kasan_save_alloc_info+0x40/0x58
[   39.989927]  __kasan_kmalloc+0xd4/0xd8
[   39.990415]  __kmalloc_cache_noprof+0x15c/0x3c8
[   39.991083]  kasan_bitops_generic+0xa0/0x1c8
[   39.992184]  kunit_try_run_case+0x14c/0x3d0
[   39.992781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.994037]  kthread+0x24c/0x2d0
[   39.994471]  ret_from_fork+0x10/0x20
[   39.994982] 
[   39.995307] The buggy address belongs to the object at fff00000c1bb3c00
[   39.995307]  which belongs to the cache kmalloc-16 of size 16
[   39.996202] The buggy address is located 8 bytes inside of
[   39.996202]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   39.997671] 
[   39.998283] The buggy address belongs to the physical page:
[   39.998920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   39.999894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.000689] page_type: f5(slab)
[   40.001243] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.002153] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.003354] page dumped because: kasan: bad access detected
[   40.003990] 
[   40.004318] Memory state around the buggy address:
[   40.004878]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.006228]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.006993] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.007841]                       ^
[   40.008323]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.009123]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.010415] ==================================================================
[   40.012177] ==================================================================
[   40.013000] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   40.014045] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.015805] 
[   40.016120] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.016987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.018130] Hardware name: linux,dummy-virt (DT)
[   40.018790] Call trace:
[   40.019307]  show_stack+0x20/0x38 (C)
[   40.019968]  dump_stack_lvl+0x8c/0xd0
[   40.020767]  print_report+0x118/0x5e0
[   40.021157]  kasan_report+0xc8/0x118
[   40.021879]  __asan_report_load8_noabort+0x20/0x30
[   40.022839]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   40.023637]  kasan_bitops_generic+0x110/0x1c8
[   40.024428]  kunit_try_run_case+0x14c/0x3d0
[   40.024956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.025691]  kthread+0x24c/0x2d0
[   40.026710]  ret_from_fork+0x10/0x20
[   40.027416] 
[   40.027838] Allocated by task 250:
[   40.028358]  kasan_save_stack+0x3c/0x68
[   40.028994]  kasan_save_track+0x20/0x40
[   40.029513]  kasan_save_alloc_info+0x40/0x58
[   40.030391]  __kasan_kmalloc+0xd4/0xd8
[   40.031046]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.031748]  kasan_bitops_generic+0xa0/0x1c8
[   40.032354]  kunit_try_run_case+0x14c/0x3d0
[   40.032993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.034068]  kthread+0x24c/0x2d0
[   40.034540]  ret_from_fork+0x10/0x20
[   40.035071] 
[   40.035431] The buggy address belongs to the object at fff00000c1bb3c00
[   40.035431]  which belongs to the cache kmalloc-16 of size 16
[   40.037703] The buggy address is located 8 bytes inside of
[   40.037703]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.038752] 
[   40.039107] The buggy address belongs to the physical page:
[   40.039714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.040599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.041803] page_type: f5(slab)
[   40.042272] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.043046] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.043938] page dumped because: kasan: bad access detected
[   40.044640] 
[   40.045009] Memory state around the buggy address:
[   40.046019]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.046793]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.047599] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.048458]                       ^
[   40.049014]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.049838]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.050962] ==================================================================
[   40.258306] ==================================================================
[   40.258987] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   40.259803] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.260583] 
[   40.260958] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.262483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.263097] Hardware name: linux,dummy-virt (DT)
[   40.263769] Call trace:
[   40.264254]  show_stack+0x20/0x38 (C)
[   40.264849]  dump_stack_lvl+0x8c/0xd0
[   40.265505]  print_report+0x118/0x5e0
[   40.266150]  kasan_report+0xc8/0x118
[   40.266787]  kasan_check_range+0x100/0x1a8
[   40.267478]  __kasan_check_write+0x20/0x30
[   40.268083]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   40.268824]  kasan_bitops_generic+0x110/0x1c8
[   40.269433]  kunit_try_run_case+0x14c/0x3d0
[   40.270139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.270963]  kthread+0x24c/0x2d0
[   40.271593]  ret_from_fork+0x10/0x20
[   40.272171] 
[   40.272549] Allocated by task 250:
[   40.273154]  kasan_save_stack+0x3c/0x68
[   40.273774]  kasan_save_track+0x20/0x40
[   40.274289]  kasan_save_alloc_info+0x40/0x58
[   40.274908]  __kasan_kmalloc+0xd4/0xd8
[   40.275492]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.276041]  kasan_bitops_generic+0xa0/0x1c8
[   40.276682]  kunit_try_run_case+0x14c/0x3d0
[   40.277297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.277933]  kthread+0x24c/0x2d0
[   40.278497]  ret_from_fork+0x10/0x20
[   40.279054] 
[   40.279402] The buggy address belongs to the object at fff00000c1bb3c00
[   40.279402]  which belongs to the cache kmalloc-16 of size 16
[   40.280606] The buggy address is located 8 bytes inside of
[   40.280606]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.281761] 
[   40.282111] The buggy address belongs to the physical page:
[   40.282837] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.283709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.284402] page_type: f5(slab)
[   40.284843] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.285548] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.286462] page dumped because: kasan: bad access detected
[   40.287163] 
[   40.287513] Memory state around the buggy address:
[   40.288144]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.288991]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.289671] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.290513]                       ^
[   40.291048]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.291920]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.292794] ==================================================================
[   40.222149] ==================================================================
[   40.222918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   40.223812] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.224671] 
[   40.225097] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.226497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.226882] Hardware name: linux,dummy-virt (DT)
[   40.227286] Call trace:
[   40.227751]  show_stack+0x20/0x38 (C)
[   40.228804]  dump_stack_lvl+0x8c/0xd0
[   40.229386]  print_report+0x118/0x5e0
[   40.230109]  kasan_report+0xc8/0x118
[   40.230693]  __asan_report_load8_noabort+0x20/0x30
[   40.231383]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   40.232066]  kasan_bitops_generic+0x110/0x1c8
[   40.232709]  kunit_try_run_case+0x14c/0x3d0
[   40.233399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.234146]  kthread+0x24c/0x2d0
[   40.234617]  ret_from_fork+0x10/0x20
[   40.235308] 
[   40.235623] Allocated by task 250:
[   40.235873]  kasan_save_stack+0x3c/0x68
[   40.236132]  kasan_save_track+0x20/0x40
[   40.236392]  kasan_save_alloc_info+0x40/0x58
[   40.236920]  __kasan_kmalloc+0xd4/0xd8
[   40.237582]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.238297]  kasan_bitops_generic+0xa0/0x1c8
[   40.238977]  kunit_try_run_case+0x14c/0x3d0
[   40.239672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.240379]  kthread+0x24c/0x2d0
[   40.241011]  ret_from_fork+0x10/0x20
[   40.241621] 
[   40.241977] The buggy address belongs to the object at fff00000c1bb3c00
[   40.241977]  which belongs to the cache kmalloc-16 of size 16
[   40.243244] The buggy address is located 8 bytes inside of
[   40.243244]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.244562] 
[   40.244904] The buggy address belongs to the physical page:
[   40.245553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.246553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.247315] page_type: f5(slab)
[   40.247812] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.248807] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.249706] page dumped because: kasan: bad access detected
[   40.250350] 
[   40.250680] Memory state around the buggy address:
[   40.251385]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.252190]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.253022] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.253924]                       ^
[   40.254455]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.255207]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.256023] ==================================================================
[   40.294843] ==================================================================
[   40.295590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   40.296362] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.298050] 
[   40.298526] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.299989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.300651] Hardware name: linux,dummy-virt (DT)
[   40.301196] Call trace:
[   40.301682]  show_stack+0x20/0x38 (C)
[   40.302303]  dump_stack_lvl+0x8c/0xd0
[   40.302786]  print_report+0x118/0x5e0
[   40.303388]  kasan_report+0xc8/0x118
[   40.304008]  kasan_check_range+0x100/0x1a8
[   40.304667]  __kasan_check_write+0x20/0x30
[   40.305301]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   40.306014]  kasan_bitops_generic+0x110/0x1c8
[   40.306703]  kunit_try_run_case+0x14c/0x3d0
[   40.307264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.308039]  kthread+0x24c/0x2d0
[   40.308597]  ret_from_fork+0x10/0x20
[   40.309091] 
[   40.309431] Allocated by task 250:
[   40.309975]  kasan_save_stack+0x3c/0x68
[   40.310583]  kasan_save_track+0x20/0x40
[   40.311093]  kasan_save_alloc_info+0x40/0x58
[   40.311700]  __kasan_kmalloc+0xd4/0xd8
[   40.312175]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.312851]  kasan_bitops_generic+0xa0/0x1c8
[   40.313476]  kunit_try_run_case+0x14c/0x3d0
[   40.313990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.314764]  kthread+0x24c/0x2d0
[   40.315324]  ret_from_fork+0x10/0x20
[   40.315814] 
[   40.316164] The buggy address belongs to the object at fff00000c1bb3c00
[   40.316164]  which belongs to the cache kmalloc-16 of size 16
[   40.317181] The buggy address is located 8 bytes inside of
[   40.317181]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.318657] 
[   40.318876] The buggy address belongs to the physical page:
[   40.319174] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.319687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.320509] page_type: f5(slab)
[   40.321344] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.322389] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.323427] page dumped because: kasan: bad access detected
[   40.324279] 
[   40.324638] Memory state around the buggy address:
[   40.325416]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.326297]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.327151] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.327984]                       ^
[   40.328532]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.329376]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.330181] ==================================================================
[   40.138340] ==================================================================
[   40.139178] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   40.140120] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.140996] 
[   40.141419] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.142972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.143693] Hardware name: linux,dummy-virt (DT)
[   40.144416] Call trace:
[   40.144884]  show_stack+0x20/0x38 (C)
[   40.145696]  dump_stack_lvl+0x8c/0xd0
[   40.146614]  print_report+0x118/0x5e0
[   40.147284]  kasan_report+0xc8/0x118
[   40.147877]  kasan_check_range+0x100/0x1a8
[   40.148560]  __kasan_check_write+0x20/0x30
[   40.149422]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   40.150144]  kasan_bitops_generic+0x110/0x1c8
[   40.150778]  kunit_try_run_case+0x14c/0x3d0
[   40.151399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.152362]  kthread+0x24c/0x2d0
[   40.152933]  ret_from_fork+0x10/0x20
[   40.153891] 
[   40.154237] Allocated by task 250:
[   40.154899]  kasan_save_stack+0x3c/0x68
[   40.155457]  kasan_save_track+0x20/0x40
[   40.156084]  kasan_save_alloc_info+0x40/0x58
[   40.156740]  __kasan_kmalloc+0xd4/0xd8
[   40.157321]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.158267]  kasan_bitops_generic+0xa0/0x1c8
[   40.158890]  kunit_try_run_case+0x14c/0x3d0
[   40.159489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.160205]  kthread+0x24c/0x2d0
[   40.160817]  ret_from_fork+0x10/0x20
[   40.161723] 
[   40.162354] The buggy address belongs to the object at fff00000c1bb3c00
[   40.162354]  which belongs to the cache kmalloc-16 of size 16
[   40.164226] The buggy address is located 8 bytes inside of
[   40.164226]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.166152] 
[   40.166843] The buggy address belongs to the physical page:
[   40.167511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.168378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.169142] page_type: f5(slab)
[   40.169705] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.170380] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.171273] page dumped because: kasan: bad access detected
[   40.172152] 
[   40.172518] Memory state around the buggy address:
[   40.173129]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.174351]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.175255] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.176028]                       ^
[   40.176566]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.177328]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.178517] ==================================================================
[   40.332406] ==================================================================
[   40.333130] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   40.333874] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.335821] 
[   40.336488] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.337553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.338079] Hardware name: linux,dummy-virt (DT)
[   40.338727] Call trace:
[   40.339157]  show_stack+0x20/0x38 (C)
[   40.339728]  dump_stack_lvl+0x8c/0xd0
[   40.340383]  print_report+0x118/0x5e0
[   40.340965]  kasan_report+0xc8/0x118
[   40.341593]  __asan_report_load8_noabort+0x20/0x30
[   40.342207]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   40.342983]  kasan_bitops_generic+0x110/0x1c8
[   40.343698]  kunit_try_run_case+0x14c/0x3d0
[   40.344250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.345069]  kthread+0x24c/0x2d0
[   40.345607]  ret_from_fork+0x10/0x20
[   40.346155] 
[   40.346485] Allocated by task 250:
[   40.346954]  kasan_save_stack+0x3c/0x68
[   40.347576]  kasan_save_track+0x20/0x40
[   40.348174]  kasan_save_alloc_info+0x40/0x58
[   40.348805]  __kasan_kmalloc+0xd4/0xd8
[   40.349393]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.349956]  kasan_bitops_generic+0xa0/0x1c8
[   40.350595]  kunit_try_run_case+0x14c/0x3d0
[   40.351244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.351920]  kthread+0x24c/0x2d0
[   40.352480]  ret_from_fork+0x10/0x20
[   40.353012] 
[   40.353306] The buggy address belongs to the object at fff00000c1bb3c00
[   40.353306]  which belongs to the cache kmalloc-16 of size 16
[   40.354464] The buggy address is located 8 bytes inside of
[   40.354464]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.355595] 
[   40.355951] The buggy address belongs to the physical page:
[   40.356657] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.357543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.358381] page_type: f5(slab)
[   40.358928] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.359689] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.360625] page dumped because: kasan: bad access detected
[   40.361223] 
[   40.361595] Memory state around the buggy address:
[   40.362087]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.362937]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.363685] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.364490]                       ^
[   40.364991]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.365787]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.366507] ==================================================================
[   40.180999] ==================================================================
[   40.181779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   40.182429] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.183739] 
[   40.184126] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.185207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.185828] Hardware name: linux,dummy-virt (DT)
[   40.186639] Call trace:
[   40.187043]  show_stack+0x20/0x38 (C)
[   40.187737]  dump_stack_lvl+0x8c/0xd0
[   40.188372]  print_report+0x118/0x5e0
[   40.188982]  kasan_report+0xc8/0x118
[   40.189945]  kasan_check_range+0x100/0x1a8
[   40.190732]  __kasan_check_write+0x20/0x30
[   40.191356]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   40.192222]  kasan_bitops_generic+0x110/0x1c8
[   40.192885]  kunit_try_run_case+0x14c/0x3d0
[   40.193894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.194670]  kthread+0x24c/0x2d0
[   40.195199]  ret_from_fork+0x10/0x20
[   40.195755] 
[   40.196108] Allocated by task 250:
[   40.196671]  kasan_save_stack+0x3c/0x68
[   40.197218]  kasan_save_track+0x20/0x40
[   40.198111]  kasan_save_alloc_info+0x40/0x58
[   40.198695]  __kasan_kmalloc+0xd4/0xd8
[   40.199217]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.199821]  kasan_bitops_generic+0xa0/0x1c8
[   40.200479]  kunit_try_run_case+0x14c/0x3d0
[   40.201021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.202231]  kthread+0x24c/0x2d0
[   40.203175]  ret_from_fork+0x10/0x20
[   40.203568] 
[   40.203931] The buggy address belongs to the object at fff00000c1bb3c00
[   40.203931]  which belongs to the cache kmalloc-16 of size 16
[   40.205256] The buggy address is located 8 bytes inside of
[   40.205256]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.206420] 
[   40.207162] The buggy address belongs to the physical page:
[   40.208086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.209183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.210342] page_type: f5(slab)
[   40.210811] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.211677] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.212643] page dumped because: kasan: bad access detected
[   40.213393] 
[   40.214278] Memory state around the buggy address:
[   40.214906]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.215836]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.216715] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.217550]                       ^
[   40.218014]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.218776]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.219903] ==================================================================
[   40.096291] ==================================================================
[   40.096924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   40.098829] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.099649] 
[   40.101456] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.102550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.103259] Hardware name: linux,dummy-virt (DT)
[   40.104015] Call trace:
[   40.104645]  show_stack+0x20/0x38 (C)
[   40.105423]  dump_stack_lvl+0x8c/0xd0
[   40.106352]  print_report+0x118/0x5e0
[   40.106884]  kasan_report+0xc8/0x118
[   40.107496]  __asan_report_load8_noabort+0x20/0x30
[   40.108118]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   40.108895]  kasan_bitops_generic+0x110/0x1c8
[   40.109862]  kunit_try_run_case+0x14c/0x3d0
[   40.110482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.111180]  kthread+0x24c/0x2d0
[   40.111718]  ret_from_fork+0x10/0x20
[   40.112252] 
[   40.112618] Allocated by task 250:
[   40.113150]  kasan_save_stack+0x3c/0x68
[   40.114050]  kasan_save_track+0x20/0x40
[   40.114608]  kasan_save_alloc_info+0x40/0x58
[   40.115248]  __kasan_kmalloc+0xd4/0xd8
[   40.115827]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.116422]  kasan_bitops_generic+0xa0/0x1c8
[   40.117004]  kunit_try_run_case+0x14c/0x3d0
[   40.118158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.118727]  kthread+0x24c/0x2d0
[   40.119117]  ret_from_fork+0x10/0x20
[   40.119583] 
[   40.119936] The buggy address belongs to the object at fff00000c1bb3c00
[   40.119936]  which belongs to the cache kmalloc-16 of size 16
[   40.121555] The buggy address is located 8 bytes inside of
[   40.121555]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.123227] 
[   40.123600] The buggy address belongs to the physical page:
[   40.124297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.125102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.125773] page_type: f5(slab)
[   40.127063] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.128016] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.128775] page dumped because: kasan: bad access detected
[   40.129538] 
[   40.129845] Memory state around the buggy address:
[   40.130539]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.131358]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.132565] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.133602]                       ^
[   40.134254]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.135190]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.135988] ==================================================================
[   40.054608] ==================================================================
[   40.055375] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   40.056366] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.057297] 
[   40.058002] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.059158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.059971] Hardware name: linux,dummy-virt (DT)
[   40.060513] Call trace:
[   40.060835]  show_stack+0x20/0x38 (C)
[   40.062001]  dump_stack_lvl+0x8c/0xd0
[   40.062679]  print_report+0x118/0x5e0
[   40.063251]  kasan_report+0xc8/0x118
[   40.063721]  kasan_check_range+0x100/0x1a8
[   40.064453]  __kasan_check_write+0x20/0x30
[   40.065164]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   40.066288]  kasan_bitops_generic+0x110/0x1c8
[   40.066973]  kunit_try_run_case+0x14c/0x3d0
[   40.067630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.068392]  kthread+0x24c/0x2d0
[   40.068908]  ret_from_fork+0x10/0x20
[   40.069993] 
[   40.070367] Allocated by task 250:
[   40.070896]  kasan_save_stack+0x3c/0x68
[   40.071523]  kasan_save_track+0x20/0x40
[   40.072114]  kasan_save_alloc_info+0x40/0x58
[   40.072701]  __kasan_kmalloc+0xd4/0xd8
[   40.073329]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.073991]  kasan_bitops_generic+0xa0/0x1c8
[   40.075036]  kunit_try_run_case+0x14c/0x3d0
[   40.075681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.076392]  kthread+0x24c/0x2d0
[   40.076903]  ret_from_fork+0x10/0x20
[   40.077738] 
[   40.078607] The buggy address belongs to the object at fff00000c1bb3c00
[   40.078607]  which belongs to the cache kmalloc-16 of size 16
[   40.080241] The buggy address is located 8 bytes inside of
[   40.080241]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.081873] 
[   40.082308] The buggy address belongs to the physical page:
[   40.083197] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.084097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.084796] page_type: f5(slab)
[   40.085482] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.086488] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.087304] page dumped because: kasan: bad access detected
[   40.087907] 
[   40.088267] Memory state around the buggy address:
[   40.088933]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.090106]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.091123] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.091939]                       ^
[   40.092414]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.093319]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.094398] ==================================================================

[   31.813126] ==================================================================
[   31.814001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   31.816159] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   31.817459] 
[   31.817776] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   31.819085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.819591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.820545] Call Trace:
[   31.820998]  <TASK>
[   31.821333]  dump_stack_lvl+0x73/0xb0
[   31.821799]  print_report+0xd1/0x640
[   31.823431]  ? __virt_addr_valid+0x1db/0x2d0
[   31.824325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.824966]  kasan_report+0x102/0x140
[   31.825860]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   31.826567]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   31.827139]  kasan_check_range+0x10c/0x1c0
[   31.827564]  __kasan_check_write+0x18/0x20
[   31.828368]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   31.829961]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.830501]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.831253]  ? trace_hardirqs_on+0x37/0xe0
[   31.832349]  ? kasan_bitops_generic+0x93/0x1c0
[   31.833089]  kasan_bitops_generic+0x117/0x1c0
[   31.833655]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.834671]  ? __pfx_read_tsc+0x10/0x10
[   31.835374]  ? ktime_get_ts64+0x84/0x230
[   31.836184]  kunit_try_run_case+0x1b3/0x490
[   31.836463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.837029]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.837467]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.838533]  ? __kthread_parkme+0x82/0x160
[   31.839292]  ? preempt_count_sub+0x50/0x80
[   31.840136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.840885]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.841470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.842110]  kthread+0x257/0x310
[   31.843038]  ? __pfx_kthread+0x10/0x10
[   31.844002]  ret_from_fork+0x41/0x80
[   31.844475]  ? __pfx_kthread+0x10/0x10
[   31.845049]  ret_from_fork_asm+0x1a/0x30
[   31.845729]  </TASK>
[   31.846326] 
[   31.846499] Allocated by task 268:
[   31.847148]  kasan_save_stack+0x3d/0x60
[   31.847840]  kasan_save_track+0x18/0x40
[   31.848357]  kasan_save_alloc_info+0x3b/0x50
[   31.849095]  __kasan_kmalloc+0xb7/0xc0
[   31.849640]  __kmalloc_cache_noprof+0x184/0x410
[   31.850118]  kasan_bitops_generic+0x93/0x1c0
[   31.850485]  kunit_try_run_case+0x1b3/0x490
[   31.851120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.851776]  kthread+0x257/0x310
[   31.852391]  ret_from_fork+0x41/0x80
[   31.853158]  ret_from_fork_asm+0x1a/0x30
[   31.853686] 
[   31.853864] The buggy address belongs to the object at ffff888101a98520
[   31.853864]  which belongs to the cache kmalloc-16 of size 16
[   31.855399] The buggy address is located 8 bytes inside of
[   31.855399]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   31.856267] 
[   31.856661] The buggy address belongs to the physical page:
[   31.857508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   31.858125] flags: 0x200000000000000(node=0|zone=2)
[   31.858749] page_type: f5(slab)
[   31.859541] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.860513] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.861837] page dumped because: kasan: bad access detected
[   31.862443] 
[   31.862633] Memory state around the buggy address:
[   31.863670]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   31.864464]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   31.865235] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   31.866411]                                   ^
[   31.866736]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.868058]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.868902] ==================================================================
[   32.018347] ==================================================================
[   32.019269] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   32.019997] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   32.022267] 
[   32.022681] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.023937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.024373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.025131] Call Trace:
[   32.026075]  <TASK>
[   32.026388]  dump_stack_lvl+0x73/0xb0
[   32.026770]  print_report+0xd1/0x640
[   32.027733]  ? __virt_addr_valid+0x1db/0x2d0
[   32.028503]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.029743]  kasan_report+0x102/0x140
[   32.030042]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   32.030668]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   32.031213]  kasan_check_range+0x10c/0x1c0
[   32.031937]  __kasan_check_write+0x18/0x20
[   32.032483]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   32.033430]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   32.034593]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.035093]  ? trace_hardirqs_on+0x37/0xe0
[   32.035652]  ? kasan_bitops_generic+0x93/0x1c0
[   32.036226]  kasan_bitops_generic+0x117/0x1c0
[   32.036760]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.037530]  ? __pfx_read_tsc+0x10/0x10
[   32.037934]  ? ktime_get_ts64+0x84/0x230
[   32.038779]  kunit_try_run_case+0x1b3/0x490
[   32.039111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.039832]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.040347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.040903]  ? __kthread_parkme+0x82/0x160
[   32.041635]  ? preempt_count_sub+0x50/0x80
[   32.042192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.043136]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.043921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.044532]  kthread+0x257/0x310
[   32.044996]  ? __pfx_kthread+0x10/0x10
[   32.045333]  ret_from_fork+0x41/0x80
[   32.046068]  ? __pfx_kthread+0x10/0x10
[   32.046492]  ret_from_fork_asm+0x1a/0x30
[   32.047072]  </TASK>
[   32.047722] 
[   32.048091] Allocated by task 268:
[   32.048333]  kasan_save_stack+0x3d/0x60
[   32.048951]  kasan_save_track+0x18/0x40
[   32.049352]  kasan_save_alloc_info+0x3b/0x50
[   32.050165]  __kasan_kmalloc+0xb7/0xc0
[   32.050502]  __kmalloc_cache_noprof+0x184/0x410
[   32.050830]  kasan_bitops_generic+0x93/0x1c0
[   32.051448]  kunit_try_run_case+0x1b3/0x490
[   32.052104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.053370]  kthread+0x257/0x310
[   32.053785]  ret_from_fork+0x41/0x80
[   32.054123]  ret_from_fork_asm+0x1a/0x30
[   32.054600] 
[   32.054779] The buggy address belongs to the object at ffff888101a98520
[   32.054779]  which belongs to the cache kmalloc-16 of size 16
[   32.055938] The buggy address is located 8 bytes inside of
[   32.055938]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   32.057034] 
[   32.057189] The buggy address belongs to the physical page:
[   32.057515] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   32.058793] flags: 0x200000000000000(node=0|zone=2)
[   32.059415] page_type: f5(slab)
[   32.060020] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.060844] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.061279] page dumped because: kasan: bad access detected
[   32.061609] 
[   32.062016] Memory state around the buggy address:
[   32.062883]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   32.063522]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   32.064076] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.064681]                                   ^
[   32.065400]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.066232]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.067212] ==================================================================
[   31.644669] ==================================================================
[   31.646266] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   31.647333] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   31.648934] 
[   31.649134] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   31.651591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.652056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.653558] Call Trace:
[   31.653896]  <TASK>
[   31.654134]  dump_stack_lvl+0x73/0xb0
[   31.655038]  print_report+0xd1/0x640
[   31.655858]  ? __virt_addr_valid+0x1db/0x2d0
[   31.656269]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.657646]  kasan_report+0x102/0x140
[   31.658016]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   31.658908]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   31.659449]  kasan_check_range+0x10c/0x1c0
[   31.660733]  __kasan_check_write+0x18/0x20
[   31.661127]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   31.662013]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.662740]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.663170]  ? trace_hardirqs_on+0x37/0xe0
[   31.663552]  ? kasan_bitops_generic+0x93/0x1c0
[   31.664629]  kasan_bitops_generic+0x117/0x1c0
[   31.665572]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.666318]  ? __pfx_read_tsc+0x10/0x10
[   31.666669]  ? ktime_get_ts64+0x84/0x230
[   31.667387]  kunit_try_run_case+0x1b3/0x490
[   31.667976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.668896]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.669919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.670762]  ? __kthread_parkme+0x82/0x160
[   31.671194]  ? preempt_count_sub+0x50/0x80
[   31.671557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.672120]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.673059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.673861]  kthread+0x257/0x310
[   31.674523]  ? __pfx_kthread+0x10/0x10
[   31.674983]  ret_from_fork+0x41/0x80
[   31.675253]  ? __pfx_kthread+0x10/0x10
[   31.675732]  ret_from_fork_asm+0x1a/0x30
[   31.676177]  </TASK>
[   31.676420] 
[   31.676614] Allocated by task 268:
[   31.677849]  kasan_save_stack+0x3d/0x60
[   31.678578]  kasan_save_track+0x18/0x40
[   31.679224]  kasan_save_alloc_info+0x3b/0x50
[   31.680119]  __kasan_kmalloc+0xb7/0xc0
[   31.680990]  __kmalloc_cache_noprof+0x184/0x410
[   31.682327]  kasan_bitops_generic+0x93/0x1c0
[   31.682626]  kunit_try_run_case+0x1b3/0x490
[   31.684894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.685239]  kthread+0x257/0x310
[   31.685459]  ret_from_fork+0x41/0x80
[   31.686542]  ret_from_fork_asm+0x1a/0x30
[   31.686828] 
[   31.686963] The buggy address belongs to the object at ffff888101a98520
[   31.686963]  which belongs to the cache kmalloc-16 of size 16
[   31.690888] The buggy address is located 8 bytes inside of
[   31.690888]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   31.693549] 
[   31.693688] The buggy address belongs to the physical page:
[   31.695576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   31.696668] flags: 0x200000000000000(node=0|zone=2)
[   31.698110] page_type: f5(slab)
[   31.698632] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.700084] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.700909] page dumped because: kasan: bad access detected
[   31.701452] 
[   31.702113] Memory state around the buggy address:
[   31.702520]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   31.703771]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   31.704452] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   31.705107]                                   ^
[   31.705554]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.707122]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.708031] ==================================================================
[   31.970136] ==================================================================
[   31.970838] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   31.972436] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   31.973495] 
[   31.973792] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   31.975006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.975733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.976413] Call Trace:
[   31.976903]  <TASK>
[   31.977116]  dump_stack_lvl+0x73/0xb0
[   31.977476]  print_report+0xd1/0x640
[   31.978393]  ? __virt_addr_valid+0x1db/0x2d0
[   31.978862]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.979409]  kasan_report+0x102/0x140
[   31.979967]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   31.980663]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   31.981554]  kasan_check_range+0x10c/0x1c0
[   31.982203]  __kasan_check_write+0x18/0x20
[   31.982660]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   31.983416]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.983899]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.984461]  ? trace_hardirqs_on+0x37/0xe0
[   31.985664]  ? kasan_bitops_generic+0x93/0x1c0
[   31.986297]  kasan_bitops_generic+0x117/0x1c0
[   31.987074]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.987939]  ? __pfx_read_tsc+0x10/0x10
[   31.988398]  ? ktime_get_ts64+0x84/0x230
[   31.989113]  kunit_try_run_case+0x1b3/0x490
[   31.989883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.990682]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.991347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.991995]  ? __kthread_parkme+0x82/0x160
[   31.992437]  ? preempt_count_sub+0x50/0x80
[   31.992840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.993298]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.994389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.994981]  kthread+0x257/0x310
[   31.995431]  ? __pfx_kthread+0x10/0x10
[   31.995838]  ret_from_fork+0x41/0x80
[   31.996413]  ? __pfx_kthread+0x10/0x10
[   31.996835]  ret_from_fork_asm+0x1a/0x30
[   31.997632]  </TASK>
[   31.998018] 
[   31.998375] Allocated by task 268:
[   31.998825]  kasan_save_stack+0x3d/0x60
[   31.999250]  kasan_save_track+0x18/0x40
[   31.999787]  kasan_save_alloc_info+0x3b/0x50
[   32.000317]  __kasan_kmalloc+0xb7/0xc0
[   32.000827]  __kmalloc_cache_noprof+0x184/0x410
[   32.001301]  kasan_bitops_generic+0x93/0x1c0
[   32.001635]  kunit_try_run_case+0x1b3/0x490
[   32.002186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.002664]  kthread+0x257/0x310
[   32.003495]  ret_from_fork+0x41/0x80
[   32.003947]  ret_from_fork_asm+0x1a/0x30
[   32.004473] 
[   32.004718] The buggy address belongs to the object at ffff888101a98520
[   32.004718]  which belongs to the cache kmalloc-16 of size 16
[   32.005891] The buggy address is located 8 bytes inside of
[   32.005891]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   32.006753] 
[   32.007013] The buggy address belongs to the physical page:
[   32.007562] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   32.008854] flags: 0x200000000000000(node=0|zone=2)
[   32.009536] page_type: f5(slab)
[   32.009884] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.010748] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.011752] page dumped because: kasan: bad access detected
[   32.012497] 
[   32.012807] Memory state around the buggy address:
[   32.013220]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   32.013969]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   32.014729] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.015249]                                   ^
[   32.015758]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.016395]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.017414] ==================================================================
[   31.919655] ==================================================================
[   31.920443] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   31.921750] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   31.922616] 
[   31.922917] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   31.924536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.925871] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.926932] Call Trace:
[   31.927190]  <TASK>
[   31.927441]  dump_stack_lvl+0x73/0xb0
[   31.927904]  print_report+0xd1/0x640
[   31.928187]  ? __virt_addr_valid+0x1db/0x2d0
[   31.928790]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.929527]  kasan_report+0x102/0x140
[   31.930098]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   31.930792]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   31.931218]  kasan_check_range+0x10c/0x1c0
[   31.931642]  __kasan_check_write+0x18/0x20
[   31.932196]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   31.932884]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.933829]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.934225]  ? trace_hardirqs_on+0x37/0xe0
[   31.934835]  ? kasan_bitops_generic+0x93/0x1c0
[   31.935423]  kasan_bitops_generic+0x117/0x1c0
[   31.935760]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.936361]  ? __pfx_read_tsc+0x10/0x10
[   31.936845]  ? ktime_get_ts64+0x84/0x230
[   31.937450]  kunit_try_run_case+0x1b3/0x490
[   31.937913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.938306]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.938627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.939099]  ? __kthread_parkme+0x82/0x160
[   31.939690]  ? preempt_count_sub+0x50/0x80
[   31.940247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.940710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.941227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.941598]  kthread+0x257/0x310
[   31.942443]  ? __pfx_kthread+0x10/0x10
[   31.943008]  ret_from_fork+0x41/0x80
[   31.943284]  ? __pfx_kthread+0x10/0x10
[   31.943560]  ret_from_fork_asm+0x1a/0x30
[   31.944174]  </TASK>
[   31.944538] 
[   31.944788] Allocated by task 268:
[   31.945310]  kasan_save_stack+0x3d/0x60
[   31.946231]  kasan_save_track+0x18/0x40
[   31.946508]  kasan_save_alloc_info+0x3b/0x50
[   31.946951]  __kasan_kmalloc+0xb7/0xc0
[   31.947583]  __kmalloc_cache_noprof+0x184/0x410
[   31.948114]  kasan_bitops_generic+0x93/0x1c0
[   31.948390]  kunit_try_run_case+0x1b3/0x490
[   31.951195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.952286]  kthread+0x257/0x310
[   31.952504]  ret_from_fork+0x41/0x80
[   31.952782]  ret_from_fork_asm+0x1a/0x30
[   31.953023] 
[   31.953154] The buggy address belongs to the object at ffff888101a98520
[   31.953154]  which belongs to the cache kmalloc-16 of size 16
[   31.953991] The buggy address is located 8 bytes inside of
[   31.953991]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   31.954613] 
[   31.954823] The buggy address belongs to the physical page:
[   31.955449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   31.956445] flags: 0x200000000000000(node=0|zone=2)
[   31.959064] page_type: f5(slab)
[   31.959304] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.959683] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.960077] page dumped because: kasan: bad access detected
[   31.960308] 
[   31.960404] Memory state around the buggy address:
[   31.960600]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   31.961887]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   31.963562] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   31.966419]                                   ^
[   31.967315]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.968650]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.969322] ==================================================================
[   31.869945] ==================================================================
[   31.870921] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   31.871572] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   31.872435] 
[   31.872627] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   31.873561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.873901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.875111] Call Trace:
[   31.875654]  <TASK>
[   31.875910]  dump_stack_lvl+0x73/0xb0
[   31.876191]  print_report+0xd1/0x640
[   31.876651]  ? __virt_addr_valid+0x1db/0x2d0
[   31.877292]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.877929]  kasan_report+0x102/0x140
[   31.878340]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   31.879245]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   31.879674]  kasan_check_range+0x10c/0x1c0
[   31.880004]  __kasan_check_write+0x18/0x20
[   31.880934]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   31.881975]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.882676]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.883033]  ? trace_hardirqs_on+0x37/0xe0
[   31.883330]  ? kasan_bitops_generic+0x93/0x1c0
[   31.884024]  kasan_bitops_generic+0x117/0x1c0
[   31.884581]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.885313]  ? __pfx_read_tsc+0x10/0x10
[   31.885600]  ? ktime_get_ts64+0x84/0x230
[   31.886540]  kunit_try_run_case+0x1b3/0x490
[   31.887252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.887737]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.888652]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.889108]  ? __kthread_parkme+0x82/0x160
[   31.889619]  ? preempt_count_sub+0x50/0x80
[   31.890083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.890974]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.891854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.892897]  kthread+0x257/0x310
[   31.893279]  ? __pfx_kthread+0x10/0x10
[   31.893966]  ret_from_fork+0x41/0x80
[   31.894813]  ? __pfx_kthread+0x10/0x10
[   31.895554]  ret_from_fork_asm+0x1a/0x30
[   31.896246]  </TASK>
[   31.897023] 
[   31.897295] Allocated by task 268:
[   31.897515]  kasan_save_stack+0x3d/0x60
[   31.898123]  kasan_save_track+0x18/0x40
[   31.898562]  kasan_save_alloc_info+0x3b/0x50
[   31.898998]  __kasan_kmalloc+0xb7/0xc0
[   31.899373]  __kmalloc_cache_noprof+0x184/0x410
[   31.900665]  kasan_bitops_generic+0x93/0x1c0
[   31.901458]  kunit_try_run_case+0x1b3/0x490
[   31.902169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.902741]  kthread+0x257/0x310
[   31.903501]  ret_from_fork+0x41/0x80
[   31.903898]  ret_from_fork_asm+0x1a/0x30
[   31.904936] 
[   31.905229] The buggy address belongs to the object at ffff888101a98520
[   31.905229]  which belongs to the cache kmalloc-16 of size 16
[   31.906254] The buggy address is located 8 bytes inside of
[   31.906254]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   31.907649] 
[   31.907868] The buggy address belongs to the physical page:
[   31.908190] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   31.909379] flags: 0x200000000000000(node=0|zone=2)
[   31.909861] page_type: f5(slab)
[   31.910368] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.911030] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.912055] page dumped because: kasan: bad access detected
[   31.912742] 
[   31.912959] Memory state around the buggy address:
[   31.913800]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   31.914324]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   31.915347] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   31.916045]                                   ^
[   31.916428]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.917594]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.918280] ==================================================================
[   31.709114] ==================================================================
[   31.710261] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   31.710990] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   31.711879] 
[   31.712717] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   31.713833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.714241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.715361] Call Trace:
[   31.715981]  <TASK>
[   31.716539]  dump_stack_lvl+0x73/0xb0
[   31.717919]  print_report+0xd1/0x640
[   31.718313]  ? __virt_addr_valid+0x1db/0x2d0
[   31.719151]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.720031]  kasan_report+0x102/0x140
[   31.720746]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   31.721314]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   31.722589]  kasan_check_range+0x10c/0x1c0
[   31.723002]  __kasan_check_write+0x18/0x20
[   31.724088]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   31.724888]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.725769]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.726145]  ? trace_hardirqs_on+0x37/0xe0
[   31.727185]  ? kasan_bitops_generic+0x93/0x1c0
[   31.727655]  kasan_bitops_generic+0x117/0x1c0
[   31.728467]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.729123]  ? __pfx_read_tsc+0x10/0x10
[   31.729646]  ? ktime_get_ts64+0x84/0x230
[   31.730109]  kunit_try_run_case+0x1b3/0x490
[   31.731168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.731601]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.732024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.732494]  ? __kthread_parkme+0x82/0x160
[   31.733402]  ? preempt_count_sub+0x50/0x80
[   31.734037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.734729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.735501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.736381]  kthread+0x257/0x310
[   31.736747]  ? __pfx_kthread+0x10/0x10
[   31.737328]  ret_from_fork+0x41/0x80
[   31.737877]  ? __pfx_kthread+0x10/0x10
[   31.738452]  ret_from_fork_asm+0x1a/0x30
[   31.739036]  </TASK>
[   31.739357] 
[   31.739662] Allocated by task 268:
[   31.740126]  kasan_save_stack+0x3d/0x60
[   31.740931]  kasan_save_track+0x18/0x40
[   31.741384]  kasan_save_alloc_info+0x3b/0x50
[   31.742078]  __kasan_kmalloc+0xb7/0xc0
[   31.742575]  __kmalloc_cache_noprof+0x184/0x410
[   31.743083]  kasan_bitops_generic+0x93/0x1c0
[   31.743759]  kunit_try_run_case+0x1b3/0x490
[   31.744622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.745092]  kthread+0x257/0x310
[   31.745656]  ret_from_fork+0x41/0x80
[   31.745999]  ret_from_fork_asm+0x1a/0x30
[   31.746498] 
[   31.746830] The buggy address belongs to the object at ffff888101a98520
[   31.746830]  which belongs to the cache kmalloc-16 of size 16
[   31.748059] The buggy address is located 8 bytes inside of
[   31.748059]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   31.748966] 
[   31.749322] The buggy address belongs to the physical page:
[   31.750013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   31.750616] flags: 0x200000000000000(node=0|zone=2)
[   31.751059] page_type: f5(slab)
[   31.751584] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.752783] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.753605] page dumped because: kasan: bad access detected
[   31.754346] 
[   31.754791] Memory state around the buggy address:
[   31.755644]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   31.756323]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   31.757244] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   31.757957]                                   ^
[   31.758403]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.759423]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.760318] ==================================================================
[   31.761263] ==================================================================
[   31.763029] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   31.763971] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268
[   31.764986] 
[   31.766066] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   31.767923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.768247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.769764] Call Trace:
[   31.770324]  <TASK>
[   31.770581]  dump_stack_lvl+0x73/0xb0
[   31.770984]  print_report+0xd1/0x640
[   31.771442]  ? __virt_addr_valid+0x1db/0x2d0
[   31.772040]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.772842]  kasan_report+0x102/0x140
[   31.773392]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   31.774029]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   31.774984]  kasan_check_range+0x10c/0x1c0
[   31.775477]  __kasan_check_write+0x18/0x20
[   31.776082]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   31.776603]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   31.777381]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.777964]  ? trace_hardirqs_on+0x37/0xe0
[   31.778614]  ? kasan_bitops_generic+0x93/0x1c0
[   31.779379]  kasan_bitops_generic+0x117/0x1c0
[   31.779988]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   31.780461]  ? __pfx_read_tsc+0x10/0x10
[   31.781317]  ? ktime_get_ts64+0x84/0x230
[   31.781833]  kunit_try_run_case+0x1b3/0x490
[   31.782254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.782935]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.783780]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.784291]  ? __kthread_parkme+0x82/0x160
[   31.784972]  ? preempt_count_sub+0x50/0x80
[   31.785426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.786063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.786902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.787561]  kthread+0x257/0x310
[   31.787938]  ? __pfx_kthread+0x10/0x10
[   31.788654]  ret_from_fork+0x41/0x80
[   31.789208]  ? __pfx_kthread+0x10/0x10
[   31.789897]  ret_from_fork_asm+0x1a/0x30
[   31.790393]  </TASK>
[   31.790723] 
[   31.791042] Allocated by task 268:
[   31.791336]  kasan_save_stack+0x3d/0x60
[   31.791987]  kasan_save_track+0x18/0x40
[   31.792550]  kasan_save_alloc_info+0x3b/0x50
[   31.793174]  __kasan_kmalloc+0xb7/0xc0
[   31.793460]  __kmalloc_cache_noprof+0x184/0x410
[   31.793884]  kasan_bitops_generic+0x93/0x1c0
[   31.794474]  kunit_try_run_case+0x1b3/0x490
[   31.794972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.795566]  kthread+0x257/0x310
[   31.796088]  ret_from_fork+0x41/0x80
[   31.796742]  ret_from_fork_asm+0x1a/0x30
[   31.797232] 
[   31.797621] The buggy address belongs to the object at ffff888101a98520
[   31.797621]  which belongs to the cache kmalloc-16 of size 16
[   31.798663] The buggy address is located 8 bytes inside of
[   31.798663]  allocated 9-byte region [ffff888101a98520, ffff888101a98529)
[   31.800051] 
[   31.800206] The buggy address belongs to the physical page:
[   31.800794] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98
[   31.802368] flags: 0x200000000000000(node=0|zone=2)
[   31.802941] page_type: f5(slab)
[   31.803663] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   31.804626] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.805905] page dumped because: kasan: bad access detected
[   31.806551] 
[   31.806821] Memory state around the buggy address:
[   31.807588]  ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc
[   31.808337]  ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   31.809671] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   31.810251]                                   ^
[   31.810711]  ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.811338]  ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.812067] ==================================================================