Hay
Date
Nov. 22, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   37.959697] ==================================================================
[   37.960885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   37.963118] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   37.964151] 
[   37.964469] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   37.965830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.966475] Hardware name: linux,dummy-virt (DT)
[   37.967075] Call trace:
[   37.967802]  show_stack+0x20/0x38 (C)
[   37.968559]  dump_stack_lvl+0x8c/0xd0
[   37.969200]  print_report+0x118/0x5e0
[   37.969993]  kasan_report+0xc8/0x118
[   37.970668]  kasan_check_range+0x100/0x1a8
[   37.971394]  __kasan_check_write+0x20/0x30
[   37.972071]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   37.972937]  kasan_bitops_generic+0x110/0x1c8
[   37.973497]  kunit_try_run_case+0x14c/0x3d0
[   37.974241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.975041]  kthread+0x24c/0x2d0
[   37.975693]  ret_from_fork+0x10/0x20
[   37.976330] 
[   37.976782] Allocated by task 250:
[   37.977273]  kasan_save_stack+0x3c/0x68
[   37.977992]  kasan_save_track+0x20/0x40
[   37.978645]  kasan_save_alloc_info+0x40/0x58
[   37.979330]  __kasan_kmalloc+0xd4/0xd8
[   37.979866]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.980642]  kasan_bitops_generic+0xa0/0x1c8
[   37.981268]  kunit_try_run_case+0x14c/0x3d0
[   37.981810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.982664]  kthread+0x24c/0x2d0
[   37.983240]  ret_from_fork+0x10/0x20
[   37.983802] 
[   37.984255] The buggy address belongs to the object at fff00000c5ce6800
[   37.984255]  which belongs to the cache kmalloc-16 of size 16
[   37.985786] The buggy address is located 8 bytes inside of
[   37.985786]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   37.987205] 
[   37.987541] The buggy address belongs to the physical page:
[   37.988271] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   37.989273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.990065] page_type: f5(slab)
[   37.990744] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   37.991751] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   37.992700] page dumped because: kasan: bad access detected
[   37.993419] 
[   37.993815] Memory state around the buggy address:
[   37.994332]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   37.995403]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   37.996357] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.997308]                       ^
[   37.997841]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.998876]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.999766] ==================================================================
[   37.714481] ==================================================================
[   37.715237] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   37.716129] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   37.716942] 
[   37.718335] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   37.719617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.720293] Hardware name: linux,dummy-virt (DT)
[   37.721180] Call trace:
[   37.721617]  show_stack+0x20/0x38 (C)
[   37.722204]  dump_stack_lvl+0x8c/0xd0
[   37.723255]  print_report+0x118/0x5e0
[   37.724104]  kasan_report+0xc8/0x118
[   37.724794]  __asan_report_load8_noabort+0x20/0x30
[   37.725879]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   37.726608]  kasan_bitops_generic+0x110/0x1c8
[   37.727220]  kunit_try_run_case+0x14c/0x3d0
[   37.727952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.728721]  kthread+0x24c/0x2d0
[   37.729184]  ret_from_fork+0x10/0x20
[   37.730352] 
[   37.730795] Allocated by task 250:
[   37.731410]  kasan_save_stack+0x3c/0x68
[   37.732034]  kasan_save_track+0x20/0x40
[   37.732984]  kasan_save_alloc_info+0x40/0x58
[   37.733597]  __kasan_kmalloc+0xd4/0xd8
[   37.734256]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.735008]  kasan_bitops_generic+0xa0/0x1c8
[   37.735731]  kunit_try_run_case+0x14c/0x3d0
[   37.736391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.738792]  kthread+0x24c/0x2d0
[   37.739563]  ret_from_fork+0x10/0x20
[   37.740115] 
[   37.740810] The buggy address belongs to the object at fff00000c5ce6800
[   37.740810]  which belongs to the cache kmalloc-16 of size 16
[   37.742687] The buggy address is located 8 bytes inside of
[   37.742687]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   37.744083] 
[   37.744420] The buggy address belongs to the physical page:
[   37.745809] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   37.746847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.747660] page_type: f5(slab)
[   37.748193] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   37.749516] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   37.750378] page dumped because: kasan: bad access detected
[   37.751182] 
[   37.751577] Memory state around the buggy address:
[   37.752290]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   37.753530]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   37.754392] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.755493]                       ^
[   37.755985]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.757385]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.758619] ==================================================================
[   37.761039] ==================================================================
[   37.761779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   37.763953] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   37.765549] 
[   37.765895] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   37.767063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.767654] Hardware name: linux,dummy-virt (DT)
[   37.768495] Call trace:
[   37.768857]  show_stack+0x20/0x38 (C)
[   37.769832]  dump_stack_lvl+0x8c/0xd0
[   37.770519]  print_report+0x118/0x5e0
[   37.771112]  kasan_report+0xc8/0x118
[   37.771831]  kasan_check_range+0x100/0x1a8
[   37.773017]  __kasan_check_write+0x20/0x30
[   37.773634]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   37.774458]  kasan_bitops_generic+0x110/0x1c8
[   37.775115]  kunit_try_run_case+0x14c/0x3d0
[   37.775762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.776990]  kthread+0x24c/0x2d0
[   37.777515]  ret_from_fork+0x10/0x20
[   37.778078] 
[   37.778484] Allocated by task 250:
[   37.778969]  kasan_save_stack+0x3c/0x68
[   37.779775]  kasan_save_track+0x20/0x40
[   37.780358]  kasan_save_alloc_info+0x40/0x58
[   37.782387]  __kasan_kmalloc+0xd4/0xd8
[   37.783009]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.783655]  kasan_bitops_generic+0xa0/0x1c8
[   37.784321]  kunit_try_run_case+0x14c/0x3d0
[   37.785194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.786724]  kthread+0x24c/0x2d0
[   37.787256]  ret_from_fork+0x10/0x20
[   37.787787] 
[   37.788208] The buggy address belongs to the object at fff00000c5ce6800
[   37.788208]  which belongs to the cache kmalloc-16 of size 16
[   37.790348] The buggy address is located 8 bytes inside of
[   37.790348]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   37.791802] 
[   37.792293] The buggy address belongs to the physical page:
[   37.793501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   37.794713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.795629] page_type: f5(slab)
[   37.796127] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   37.797745] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   37.798684] page dumped because: kasan: bad access detected
[   37.799546] 
[   37.800038] Memory state around the buggy address:
[   37.801886]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   37.803122]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   37.804254] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.805345]                       ^
[   37.805900]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.807031]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.808389] ==================================================================
[   37.858032] ==================================================================
[   37.859344] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   37.860551] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   37.861651] 
[   37.862025] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   37.863651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.864410] Hardware name: linux,dummy-virt (DT)
[   37.865495] Call trace:
[   37.866009]  show_stack+0x20/0x38 (C)
[   37.866693]  dump_stack_lvl+0x8c/0xd0
[   37.867363]  print_report+0x118/0x5e0
[   37.868109]  kasan_report+0xc8/0x118
[   37.869159]  __asan_report_load8_noabort+0x20/0x30
[   37.870079]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   37.870888]  kasan_bitops_generic+0x110/0x1c8
[   37.871642]  kunit_try_run_case+0x14c/0x3d0
[   37.872389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.873600]  kthread+0x24c/0x2d0
[   37.874564]  ret_from_fork+0x10/0x20
[   37.875093] 
[   37.875470] Allocated by task 250:
[   37.876084]  kasan_save_stack+0x3c/0x68
[   37.877131]  kasan_save_track+0x20/0x40
[   37.877912]  kasan_save_alloc_info+0x40/0x58
[   37.878741]  __kasan_kmalloc+0xd4/0xd8
[   37.879424]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.880115]  kasan_bitops_generic+0xa0/0x1c8
[   37.880832]  kunit_try_run_case+0x14c/0x3d0
[   37.881570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.882372]  kthread+0x24c/0x2d0
[   37.882928]  ret_from_fork+0x10/0x20
[   37.884567] 
[   37.884988] The buggy address belongs to the object at fff00000c5ce6800
[   37.884988]  which belongs to the cache kmalloc-16 of size 16
[   37.886380] The buggy address is located 8 bytes inside of
[   37.886380]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   37.888145] 
[   37.888937] The buggy address belongs to the physical page:
[   37.889754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   37.890581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.891001] page_type: f5(slab)
[   37.891260] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   37.891747] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   37.892177] page dumped because: kasan: bad access detected
[   37.892708] 
[   37.893142] Memory state around the buggy address:
[   37.894593]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   37.896231]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   37.898025] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.898818]                       ^
[   37.899889]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.900540]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.901114] ==================================================================
[   37.557069] ==================================================================
[   37.558491] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   37.559795] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   37.561614] 
[   37.562217] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   37.563905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.564453] Hardware name: linux,dummy-virt (DT)
[   37.565874] Call trace:
[   37.566354]  show_stack+0x20/0x38 (C)
[   37.567104]  dump_stack_lvl+0x8c/0xd0
[   37.567772]  print_report+0x118/0x5e0
[   37.568324]  kasan_report+0xc8/0x118
[   37.569262]  kasan_check_range+0x100/0x1a8
[   37.569866]  __kasan_check_write+0x20/0x30
[   37.570627]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   37.571472]  kasan_bitops_generic+0x110/0x1c8
[   37.572096]  kunit_try_run_case+0x14c/0x3d0
[   37.573343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.574115]  kthread+0x24c/0x2d0
[   37.574792]  ret_from_fork+0x10/0x20
[   37.575337] 
[   37.575898] Allocated by task 250:
[   37.576498]  kasan_save_stack+0x3c/0x68
[   37.577869]  kasan_save_track+0x20/0x40
[   37.578609]  kasan_save_alloc_info+0x40/0x58
[   37.579163]  __kasan_kmalloc+0xd4/0xd8
[   37.580342]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.581406]  kasan_bitops_generic+0xa0/0x1c8
[   37.582012]  kunit_try_run_case+0x14c/0x3d0
[   37.582710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.583425]  kthread+0x24c/0x2d0
[   37.583984]  ret_from_fork+0x10/0x20
[   37.584571] 
[   37.585040] The buggy address belongs to the object at fff00000c5ce6800
[   37.585040]  which belongs to the cache kmalloc-16 of size 16
[   37.586539] The buggy address is located 8 bytes inside of
[   37.586539]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   37.589028] 
[   37.589403] The buggy address belongs to the physical page:
[   37.590179] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   37.591119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.591913] page_type: f5(slab)
[   37.592513] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   37.594162] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   37.595272] page dumped because: kasan: bad access detected
[   37.596124] 
[   37.597405] Memory state around the buggy address:
[   37.597967]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   37.599282]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   37.600399] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.601836]                       ^
[   37.602364]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.603260]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.604085] ==================================================================
[   37.902216] ==================================================================
[   37.902862] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   37.905702] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   37.907046] 
[   37.909583] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   37.913148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.914948] Hardware name: linux,dummy-virt (DT)
[   37.915905] Call trace:
[   37.916919]  show_stack+0x20/0x38 (C)
[   37.919132]  dump_stack_lvl+0x8c/0xd0
[   37.920204]  print_report+0x118/0x5e0
[   37.921727]  kasan_report+0xc8/0x118
[   37.922608]  kasan_check_range+0x100/0x1a8
[   37.923109]  __kasan_check_write+0x20/0x30
[   37.923695]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   37.924923]  kasan_bitops_generic+0x110/0x1c8
[   37.926302]  kunit_try_run_case+0x14c/0x3d0
[   37.927234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.928353]  kthread+0x24c/0x2d0
[   37.929459]  ret_from_fork+0x10/0x20
[   37.930023] 
[   37.930486] Allocated by task 250:
[   37.931136]  kasan_save_stack+0x3c/0x68
[   37.931693]  kasan_save_track+0x20/0x40
[   37.932523]  kasan_save_alloc_info+0x40/0x58
[   37.933566]  __kasan_kmalloc+0xd4/0xd8
[   37.934622]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.935943]  kasan_bitops_generic+0xa0/0x1c8
[   37.936670]  kunit_try_run_case+0x14c/0x3d0
[   37.937243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.938049]  kthread+0x24c/0x2d0
[   37.938743]  ret_from_fork+0x10/0x20
[   37.939264] 
[   37.939731] The buggy address belongs to the object at fff00000c5ce6800
[   37.939731]  which belongs to the cache kmalloc-16 of size 16
[   37.941397] The buggy address is located 8 bytes inside of
[   37.941397]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   37.943199] 
[   37.943603] The buggy address belongs to the physical page:
[   37.944318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   37.946319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.946961] page_type: f5(slab)
[   37.947259] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   37.948512] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   37.949982] page dumped because: kasan: bad access detected
[   37.950663] 
[   37.950987] Memory state around the buggy address:
[   37.951772]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   37.953655]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   37.954896] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.955716]                       ^
[   37.956474]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.957619]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.958060] ==================================================================
[   37.665577] ==================================================================
[   37.667466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   37.669181] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   37.670602] 
[   37.671111] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   37.672369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.673571] Hardware name: linux,dummy-virt (DT)
[   37.674278] Call trace:
[   37.674684]  show_stack+0x20/0x38 (C)
[   37.675267]  dump_stack_lvl+0x8c/0xd0
[   37.675871]  print_report+0x118/0x5e0
[   37.676547]  kasan_report+0xc8/0x118
[   37.677670]  kasan_check_range+0x100/0x1a8
[   37.678398]  __kasan_check_write+0x20/0x30
[   37.679246]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   37.680075]  kasan_bitops_generic+0x110/0x1c8
[   37.680828]  kunit_try_run_case+0x14c/0x3d0
[   37.682009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.682853]  kthread+0x24c/0x2d0
[   37.683486]  ret_from_fork+0x10/0x20
[   37.684086] 
[   37.684527] Allocated by task 250:
[   37.685363]  kasan_save_stack+0x3c/0x68
[   37.686093]  kasan_save_track+0x20/0x40
[   37.686564]  kasan_save_alloc_info+0x40/0x58
[   37.687300]  __kasan_kmalloc+0xd4/0xd8
[   37.687932]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.688853]  kasan_bitops_generic+0xa0/0x1c8
[   37.690121]  kunit_try_run_case+0x14c/0x3d0
[   37.690701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.691450]  kthread+0x24c/0x2d0
[   37.691923]  ret_from_fork+0x10/0x20
[   37.692752] 
[   37.693663] The buggy address belongs to the object at fff00000c5ce6800
[   37.693663]  which belongs to the cache kmalloc-16 of size 16
[   37.695580] The buggy address is located 8 bytes inside of
[   37.695580]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   37.696424] 
[   37.697194] The buggy address belongs to the physical page:
[   37.698075] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   37.699743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.700810] page_type: f5(slab)
[   37.701280] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   37.702251] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   37.703968] page dumped because: kasan: bad access detected
[   37.704326] 
[   37.704701] Memory state around the buggy address:
[   37.705846]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   37.706813]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   37.707764] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.708969]                       ^
[   37.709661]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.711523]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.712616] ==================================================================
[   37.607545] ==================================================================
[   37.608421] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   37.610908] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   37.611967] 
[   37.612401] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   37.613638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.614160] Hardware name: linux,dummy-virt (DT)
[   37.615055] Call trace:
[   37.615471]  show_stack+0x20/0x38 (C)
[   37.616052]  dump_stack_lvl+0x8c/0xd0
[   37.616996]  print_report+0x118/0x5e0
[   37.617757]  kasan_report+0xc8/0x118
[   37.619100]  __asan_report_load8_noabort+0x20/0x30
[   37.620007]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   37.620959]  kasan_bitops_generic+0x110/0x1c8
[   37.621781]  kunit_try_run_case+0x14c/0x3d0
[   37.622524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.623338]  kthread+0x24c/0x2d0
[   37.623941]  ret_from_fork+0x10/0x20
[   37.624717] 
[   37.625016] Allocated by task 250:
[   37.625534]  kasan_save_stack+0x3c/0x68
[   37.625986]  kasan_save_track+0x20/0x40
[   37.627650]  kasan_save_alloc_info+0x40/0x58
[   37.628263]  __kasan_kmalloc+0xd4/0xd8
[   37.628699]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.629144]  kasan_bitops_generic+0xa0/0x1c8
[   37.629601]  kunit_try_run_case+0x14c/0x3d0
[   37.632928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.635123]  kthread+0x24c/0x2d0
[   37.635860]  ret_from_fork+0x10/0x20
[   37.637607] 
[   37.638577] The buggy address belongs to the object at fff00000c5ce6800
[   37.638577]  which belongs to the cache kmalloc-16 of size 16
[   37.642623] The buggy address is located 8 bytes inside of
[   37.642623]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   37.644542] 
[   37.644840] The buggy address belongs to the physical page:
[   37.645340] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   37.648102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.649185] page_type: f5(slab)
[   37.650336] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   37.651626] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   37.652809] page dumped because: kasan: bad access detected
[   37.653314] 
[   37.654586] Memory state around the buggy address:
[   37.655850]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   37.657131]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   37.658202] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.659596]                       ^
[   37.660095]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.661788]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.662723] ==================================================================
[   38.001455] ==================================================================
[   38.003054] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   38.004140] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   38.005168] 
[   38.005596] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   38.006783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.007378] Hardware name: linux,dummy-virt (DT)
[   38.008135] Call trace:
[   38.008520]  show_stack+0x20/0x38 (C)
[   38.009247]  dump_stack_lvl+0x8c/0xd0
[   38.009899]  print_report+0x118/0x5e0
[   38.010600]  kasan_report+0xc8/0x118
[   38.011296]  __asan_report_load8_noabort+0x20/0x30
[   38.011935]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   38.012747]  kasan_bitops_generic+0x110/0x1c8
[   38.013533]  kunit_try_run_case+0x14c/0x3d0
[   38.014186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.015067]  kthread+0x24c/0x2d0
[   38.015589]  ret_from_fork+0x10/0x20
[   38.016254] 
[   38.016572] Allocated by task 250:
[   38.017085]  kasan_save_stack+0x3c/0x68
[   38.017756]  kasan_save_track+0x20/0x40
[   38.018515]  kasan_save_alloc_info+0x40/0x58
[   38.019157]  __kasan_kmalloc+0xd4/0xd8
[   38.019717]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.020483]  kasan_bitops_generic+0xa0/0x1c8
[   38.021089]  kunit_try_run_case+0x14c/0x3d0
[   38.021725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.022477]  kthread+0x24c/0x2d0
[   38.023027]  ret_from_fork+0x10/0x20
[   38.023581] 
[   38.023994] The buggy address belongs to the object at fff00000c5ce6800
[   38.023994]  which belongs to the cache kmalloc-16 of size 16
[   38.025582] The buggy address is located 8 bytes inside of
[   38.025582]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   38.027012] 
[   38.027404] The buggy address belongs to the physical page:
[   38.028213] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   38.029200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.030142] page_type: f5(slab)
[   38.030674] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   38.031792] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   38.032797] page dumped because: kasan: bad access detected
[   38.033489] 
[   38.033872] Memory state around the buggy address:
[   38.034534]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   38.035461]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   38.036397] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.037330]                       ^
[   38.037951]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.038809]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.039752] ==================================================================
[   37.810904] ==================================================================
[   37.811857] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   37.813290] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250
[   37.814662] 
[   37.814971] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   37.816054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.816703] Hardware name: linux,dummy-virt (DT)
[   37.817319] Call trace:
[   37.817905]  show_stack+0x20/0x38 (C)
[   37.818833]  dump_stack_lvl+0x8c/0xd0
[   37.819591]  print_report+0x118/0x5e0
[   37.820305]  kasan_report+0xc8/0x118
[   37.821260]  kasan_check_range+0x100/0x1a8
[   37.821910]  __kasan_check_write+0x20/0x30
[   37.822513]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   37.823376]  kasan_bitops_generic+0x110/0x1c8
[   37.824036]  kunit_try_run_case+0x14c/0x3d0
[   37.824796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.825590]  kthread+0x24c/0x2d0
[   37.826166]  ret_from_fork+0x10/0x20
[   37.827197] 
[   37.827540] Allocated by task 250:
[   37.827972]  kasan_save_stack+0x3c/0x68
[   37.829115]  kasan_save_track+0x20/0x40
[   37.829826]  kasan_save_alloc_info+0x40/0x58
[   37.830646]  __kasan_kmalloc+0xd4/0xd8
[   37.830981]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.831297]  kasan_bitops_generic+0xa0/0x1c8
[   37.831736]  kunit_try_run_case+0x14c/0x3d0
[   37.832523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.833490]  kthread+0x24c/0x2d0
[   37.834102]  ret_from_fork+0x10/0x20
[   37.835410] 
[   37.836684] The buggy address belongs to the object at fff00000c5ce6800
[   37.836684]  which belongs to the cache kmalloc-16 of size 16
[   37.838932] The buggy address is located 8 bytes inside of
[   37.838932]  allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809)
[   37.840410] 
[   37.840991] The buggy address belongs to the physical page:
[   37.842088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   37.843370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.844311] page_type: f5(slab)
[   37.845404] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   37.846704] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   37.847819] page dumped because: kasan: bad access detected
[   37.848986] 
[   37.849315] Memory state around the buggy address:
[   37.850160]  fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   37.851137]  fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   37.852169] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.853234]                       ^
[   37.854099]  fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.855239]  fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.856370] ==================================================================

[   28.712185] ==================================================================
[   28.712545] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   28.714227] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   28.715191] 
[   28.715428] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   28.716876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.717369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.718028] Call Trace:
[   28.718383]  <TASK>
[   28.718672]  dump_stack_lvl+0x73/0xb0
[   28.719097]  print_report+0xd1/0x640
[   28.719668]  ? __virt_addr_valid+0x1db/0x2d0
[   28.720178]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.720925]  kasan_report+0x102/0x140
[   28.721530]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   28.722233]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   28.722985]  kasan_check_range+0x10c/0x1c0
[   28.723487]  __kasan_check_write+0x18/0x20
[   28.723974]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   28.724412]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.725005]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.725474]  ? trace_hardirqs_on+0x37/0xe0
[   28.726000]  ? kasan_bitops_generic+0x93/0x1c0
[   28.726373]  kasan_bitops_generic+0x117/0x1c0
[   28.726990]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.727343]  ? __pfx_read_tsc+0x10/0x10
[   28.727787]  ? ktime_get_ts64+0x84/0x230
[   28.728278]  kunit_try_run_case+0x1b3/0x490
[   28.728801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.729134]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.729665]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.730358]  ? __kthread_parkme+0x82/0x160
[   28.730768]  ? preempt_count_sub+0x50/0x80
[   28.731087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.731773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.732475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.732899]  kthread+0x257/0x310
[   28.733307]  ? __pfx_kthread+0x10/0x10
[   28.733684]  ret_from_fork+0x41/0x80
[   28.733988]  ? __pfx_kthread+0x10/0x10
[   28.734256]  ret_from_fork_asm+0x1a/0x30
[   28.734854]  </TASK>
[   28.735226] 
[   28.735460] Allocated by task 269:
[   28.735840]  kasan_save_stack+0x3d/0x60
[   28.736252]  kasan_save_track+0x18/0x40
[   28.736643]  kasan_save_alloc_info+0x3b/0x50
[   28.737090]  __kasan_kmalloc+0xb7/0xc0
[   28.737458]  __kmalloc_cache_noprof+0x184/0x410
[   28.737946]  kasan_bitops_generic+0x93/0x1c0
[   28.738234]  kunit_try_run_case+0x1b3/0x490
[   28.738791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.739355]  kthread+0x257/0x310
[   28.739797]  ret_from_fork+0x41/0x80
[   28.740154]  ret_from_fork_asm+0x1a/0x30
[   28.740428] 
[   28.740670] The buggy address belongs to the object at ffff888100f9bce0
[   28.740670]  which belongs to the cache kmalloc-16 of size 16
[   28.741992] The buggy address is located 8 bytes inside of
[   28.741992]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   28.742596] 
[   28.742839] The buggy address belongs to the physical page:
[   28.743367] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   28.744034] flags: 0x200000000000000(node=0|zone=2)
[   28.744540] page_type: f5(slab)
[   28.744932] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.745482] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.746194] page dumped because: kasan: bad access detected
[   28.746488] 
[   28.746634] Memory state around the buggy address:
[   28.747016]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.747395]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.747756] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.748394]                                                           ^
[   28.749215]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.749940]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.750524] ==================================================================
[   28.752349] ==================================================================
[   28.753187] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   28.753806] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   28.754531] 
[   28.754866] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   28.755655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.755931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.756860] Call Trace:
[   28.757202]  <TASK>
[   28.757534]  dump_stack_lvl+0x73/0xb0
[   28.757845]  print_report+0xd1/0x640
[   28.758378]  ? __virt_addr_valid+0x1db/0x2d0
[   28.758874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.759401]  kasan_report+0x102/0x140
[   28.759859]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   28.760442]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   28.761076]  kasan_check_range+0x10c/0x1c0
[   28.761738]  __kasan_check_write+0x18/0x20
[   28.762138]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   28.763017]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.763675]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.764188]  ? trace_hardirqs_on+0x37/0xe0
[   28.764652]  ? kasan_bitops_generic+0x93/0x1c0
[   28.764996]  kasan_bitops_generic+0x117/0x1c0
[   28.765486]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.765952]  ? __pfx_read_tsc+0x10/0x10
[   28.766468]  ? ktime_get_ts64+0x84/0x230
[   28.767075]  kunit_try_run_case+0x1b3/0x490
[   28.767647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.768496]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.769063]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.769386]  ? __kthread_parkme+0x82/0x160
[   28.769755]  ? preempt_count_sub+0x50/0x80
[   28.770387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.770985]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.771601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.772214]  kthread+0x257/0x310
[   28.772642]  ? __pfx_kthread+0x10/0x10
[   28.772945]  ret_from_fork+0x41/0x80
[   28.773322]  ? __pfx_kthread+0x10/0x10
[   28.773778]  ret_from_fork_asm+0x1a/0x30
[   28.774270]  </TASK>
[   28.774486] 
[   28.774638] Allocated by task 269:
[   28.774966]  kasan_save_stack+0x3d/0x60
[   28.775430]  kasan_save_track+0x18/0x40
[   28.775858]  kasan_save_alloc_info+0x3b/0x50
[   28.776424]  __kasan_kmalloc+0xb7/0xc0
[   28.776917]  __kmalloc_cache_noprof+0x184/0x410
[   28.777542]  kasan_bitops_generic+0x93/0x1c0
[   28.777943]  kunit_try_run_case+0x1b3/0x490
[   28.778416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.779088]  kthread+0x257/0x310
[   28.779326]  ret_from_fork+0x41/0x80
[   28.779775]  ret_from_fork_asm+0x1a/0x30
[   28.780295] 
[   28.780507] The buggy address belongs to the object at ffff888100f9bce0
[   28.780507]  which belongs to the cache kmalloc-16 of size 16
[   28.781410] The buggy address is located 8 bytes inside of
[   28.781410]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   28.782526] 
[   28.782847] The buggy address belongs to the physical page:
[   28.783223] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   28.783960] flags: 0x200000000000000(node=0|zone=2)
[   28.784427] page_type: f5(slab)
[   28.784790] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.785513] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.786232] page dumped because: kasan: bad access detected
[   28.786741] 
[   28.787026] Memory state around the buggy address:
[   28.787622]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.788127]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.788683] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.789415]                                                           ^
[   28.790036]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.790884]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.791267] ==================================================================
[   28.670892] ==================================================================
[   28.671614] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   28.672168] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   28.672548] 
[   28.672724] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   28.673656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.674133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.674753] Call Trace:
[   28.675174]  <TASK>
[   28.675425]  dump_stack_lvl+0x73/0xb0
[   28.675910]  print_report+0xd1/0x640
[   28.676340]  ? __virt_addr_valid+0x1db/0x2d0
[   28.676713]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.677209]  kasan_report+0x102/0x140
[   28.677483]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   28.677839]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   28.678506]  kasan_check_range+0x10c/0x1c0
[   28.678964]  __kasan_check_write+0x18/0x20
[   28.679508]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   28.680044]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.680734]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.681140]  ? trace_hardirqs_on+0x37/0xe0
[   28.681498]  ? kasan_bitops_generic+0x93/0x1c0
[   28.682165]  kasan_bitops_generic+0x117/0x1c0
[   28.682659]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.683192]  ? __pfx_read_tsc+0x10/0x10
[   28.683620]  ? ktime_get_ts64+0x84/0x230
[   28.684114]  kunit_try_run_case+0x1b3/0x490
[   28.684706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.685151]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.685695]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.686223]  ? __kthread_parkme+0x82/0x160
[   28.686638]  ? preempt_count_sub+0x50/0x80
[   28.687019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.687338]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.688095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.688795]  kthread+0x257/0x310
[   28.689084]  ? __pfx_kthread+0x10/0x10
[   28.689402]  ret_from_fork+0x41/0x80
[   28.689910]  ? __pfx_kthread+0x10/0x10
[   28.690350]  ret_from_fork_asm+0x1a/0x30
[   28.690839]  </TASK>
[   28.691064] 
[   28.691280] Allocated by task 269:
[   28.691698]  kasan_save_stack+0x3d/0x60
[   28.692158]  kasan_save_track+0x18/0x40
[   28.692693]  kasan_save_alloc_info+0x3b/0x50
[   28.693063]  __kasan_kmalloc+0xb7/0xc0
[   28.693325]  __kmalloc_cache_noprof+0x184/0x410
[   28.693600]  kasan_bitops_generic+0x93/0x1c0
[   28.693927]  kunit_try_run_case+0x1b3/0x490
[   28.694427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.695196]  kthread+0x257/0x310
[   28.695610]  ret_from_fork+0x41/0x80
[   28.696078]  ret_from_fork_asm+0x1a/0x30
[   28.696660] 
[   28.696876] The buggy address belongs to the object at ffff888100f9bce0
[   28.696876]  which belongs to the cache kmalloc-16 of size 16
[   28.697762] The buggy address is located 8 bytes inside of
[   28.697762]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   28.699156] 
[   28.699313] The buggy address belongs to the physical page:
[   28.699600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   28.700012] flags: 0x200000000000000(node=0|zone=2)
[   28.700304] page_type: f5(slab)
[   28.700664] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.701413] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.702193] page dumped because: kasan: bad access detected
[   28.702766] 
[   28.703006] Memory state around the buggy address:
[   28.704389]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.705550]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.706219] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.708022]                                                           ^
[   28.708552]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.709003]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.710160] ==================================================================
[   28.474536] ==================================================================
[   28.475488] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   28.476431] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   28.477020] 
[   28.477302] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   28.478618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.479006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.479765] Call Trace:
[   28.480471]  <TASK>
[   28.480750]  dump_stack_lvl+0x73/0xb0
[   28.481481]  print_report+0xd1/0x640
[   28.481807]  ? __virt_addr_valid+0x1db/0x2d0
[   28.482333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.483214]  kasan_report+0x102/0x140
[   28.484677]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   28.485025]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   28.485780]  kasan_check_range+0x10c/0x1c0
[   28.486785]  __kasan_check_write+0x18/0x20
[   28.487396]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   28.487784]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.488296]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.488699]  ? trace_hardirqs_on+0x37/0xe0
[   28.489684]  ? kasan_bitops_generic+0x93/0x1c0
[   28.490568]  kasan_bitops_generic+0x117/0x1c0
[   28.491243]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.492095]  ? __pfx_read_tsc+0x10/0x10
[   28.492558]  ? ktime_get_ts64+0x84/0x230
[   28.493478]  kunit_try_run_case+0x1b3/0x490
[   28.494069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.494725]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.495451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.496014]  ? __kthread_parkme+0x82/0x160
[   28.496656]  ? preempt_count_sub+0x50/0x80
[   28.497576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.498297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.499007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.499678]  kthread+0x257/0x310
[   28.500321]  ? __pfx_kthread+0x10/0x10
[   28.500648]  ret_from_fork+0x41/0x80
[   28.501713]  ? __pfx_kthread+0x10/0x10
[   28.502337]  ret_from_fork_asm+0x1a/0x30
[   28.502767]  </TASK>
[   28.503363] 
[   28.503584] Allocated by task 269:
[   28.504127]  kasan_save_stack+0x3d/0x60
[   28.504671]  kasan_save_track+0x18/0x40
[   28.505721]  kasan_save_alloc_info+0x3b/0x50
[   28.506411]  __kasan_kmalloc+0xb7/0xc0
[   28.506735]  __kmalloc_cache_noprof+0x184/0x410
[   28.507465]  kasan_bitops_generic+0x93/0x1c0
[   28.507771]  kunit_try_run_case+0x1b3/0x490
[   28.508427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.508937]  kthread+0x257/0x310
[   28.509179]  ret_from_fork+0x41/0x80
[   28.509566]  ret_from_fork_asm+0x1a/0x30
[   28.510680] 
[   28.510916] The buggy address belongs to the object at ffff888100f9bce0
[   28.510916]  which belongs to the cache kmalloc-16 of size 16
[   28.511847] The buggy address is located 8 bytes inside of
[   28.511847]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   28.513356] 
[   28.513602] The buggy address belongs to the physical page:
[   28.514722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   28.515461] flags: 0x200000000000000(node=0|zone=2)
[   28.515996] page_type: f5(slab)
[   28.516583] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.517343] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.518147] page dumped because: kasan: bad access detected
[   28.518659] 
[   28.518897] Memory state around the buggy address:
[   28.520165]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.521035]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.521658] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.522531]                                                           ^
[   28.523210]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.523942]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.524987] ==================================================================
[   28.625039] ==================================================================
[   28.625764] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   28.626962] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   28.627847] 
[   28.628024] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   28.629767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.630339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.631285] Call Trace:
[   28.631887]  <TASK>
[   28.632145]  dump_stack_lvl+0x73/0xb0
[   28.632638]  print_report+0xd1/0x640
[   28.632989]  ? __virt_addr_valid+0x1db/0x2d0
[   28.633561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.633992]  kasan_report+0x102/0x140
[   28.634445]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   28.634917]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   28.635474]  kasan_check_range+0x10c/0x1c0
[   28.635999]  __kasan_check_write+0x18/0x20
[   28.636428]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   28.636792]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.637479]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.637967]  ? trace_hardirqs_on+0x37/0xe0
[   28.638488]  ? kasan_bitops_generic+0x93/0x1c0
[   28.638815]  kasan_bitops_generic+0x117/0x1c0
[   28.639244]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.639761]  ? __pfx_read_tsc+0x10/0x10
[   28.640221]  ? ktime_get_ts64+0x84/0x230
[   28.640652]  kunit_try_run_case+0x1b3/0x490
[   28.641131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.641704]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.642158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.642473]  ? __kthread_parkme+0x82/0x160
[   28.642759]  ? preempt_count_sub+0x50/0x80
[   28.643224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.643751]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.644387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.644887]  kthread+0x257/0x310
[   28.645295]  ? __pfx_kthread+0x10/0x10
[   28.645645]  ret_from_fork+0x41/0x80
[   28.646400]  ? __pfx_kthread+0x10/0x10
[   28.647285]  ret_from_fork_asm+0x1a/0x30
[   28.648260]  </TASK>
[   28.649352] 
[   28.649587] Allocated by task 269:
[   28.650409]  kasan_save_stack+0x3d/0x60
[   28.650872]  kasan_save_track+0x18/0x40
[   28.651232]  kasan_save_alloc_info+0x3b/0x50
[   28.652100]  __kasan_kmalloc+0xb7/0xc0
[   28.652529]  __kmalloc_cache_noprof+0x184/0x410
[   28.653040]  kasan_bitops_generic+0x93/0x1c0
[   28.653396]  kunit_try_run_case+0x1b3/0x490
[   28.654098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.654894]  kthread+0x257/0x310
[   28.655207]  ret_from_fork+0x41/0x80
[   28.656126]  ret_from_fork_asm+0x1a/0x30
[   28.656668] 
[   28.656871] The buggy address belongs to the object at ffff888100f9bce0
[   28.656871]  which belongs to the cache kmalloc-16 of size 16
[   28.657710] The buggy address is located 8 bytes inside of
[   28.657710]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   28.658309] 
[   28.658530] The buggy address belongs to the physical page:
[   28.659125] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   28.659897] flags: 0x200000000000000(node=0|zone=2)
[   28.660868] page_type: f5(slab)
[   28.661110] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.661492] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.662449] page dumped because: kasan: bad access detected
[   28.663025] 
[   28.663504] Memory state around the buggy address:
[   28.664104]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.664936]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.665787] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.666579]                                                           ^
[   28.667104]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.667643]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.668277] ==================================================================
[   28.528567] ==================================================================
[   28.529071] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   28.530059] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   28.530710] 
[   28.531337] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   28.532613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.533183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.534029] Call Trace:
[   28.534409]  <TASK>
[   28.534722]  dump_stack_lvl+0x73/0xb0
[   28.535243]  print_report+0xd1/0x640
[   28.535766]  ? __virt_addr_valid+0x1db/0x2d0
[   28.536430]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.537011]  kasan_report+0x102/0x140
[   28.537843]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   28.538535]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   28.538994]  kasan_check_range+0x10c/0x1c0
[   28.539700]  __kasan_check_write+0x18/0x20
[   28.540455]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   28.540859]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.541776]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.542857]  ? trace_hardirqs_on+0x37/0xe0
[   28.543529]  ? kasan_bitops_generic+0x93/0x1c0
[   28.544292]  kasan_bitops_generic+0x117/0x1c0
[   28.544785]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.545810]  ? __pfx_read_tsc+0x10/0x10
[   28.546469]  ? ktime_get_ts64+0x84/0x230
[   28.547211]  kunit_try_run_case+0x1b3/0x490
[   28.547635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.548172]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.548929]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.549726]  ? __kthread_parkme+0x82/0x160
[   28.550185]  ? preempt_count_sub+0x50/0x80
[   28.551282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.551988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.553052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.554025]  kthread+0x257/0x310
[   28.554687]  ? __pfx_kthread+0x10/0x10
[   28.555079]  ret_from_fork+0x41/0x80
[   28.556426]  ? __pfx_kthread+0x10/0x10
[   28.556763]  ret_from_fork_asm+0x1a/0x30
[   28.557667]  </TASK>
[   28.557923] 
[   28.558100] Allocated by task 269:
[   28.559431]  kasan_save_stack+0x3d/0x60
[   28.559757]  kasan_save_track+0x18/0x40
[   28.560225]  kasan_save_alloc_info+0x3b/0x50
[   28.560704]  __kasan_kmalloc+0xb7/0xc0
[   28.561686]  __kmalloc_cache_noprof+0x184/0x410
[   28.562576]  kasan_bitops_generic+0x93/0x1c0
[   28.563697]  kunit_try_run_case+0x1b3/0x490
[   28.564088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.564721]  kthread+0x257/0x310
[   28.565071]  ret_from_fork+0x41/0x80
[   28.565529]  ret_from_fork_asm+0x1a/0x30
[   28.566230] 
[   28.566401] The buggy address belongs to the object at ffff888100f9bce0
[   28.566401]  which belongs to the cache kmalloc-16 of size 16
[   28.568045] The buggy address is located 8 bytes inside of
[   28.568045]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   28.569065] 
[   28.569493] The buggy address belongs to the physical page:
[   28.569969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   28.570374] flags: 0x200000000000000(node=0|zone=2)
[   28.570815] page_type: f5(slab)
[   28.571472] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.572175] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.573352] page dumped because: kasan: bad access detected
[   28.574243] 
[   28.574453] Memory state around the buggy address:
[   28.574728]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.575408]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.576589] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.577272]                                                           ^
[   28.577794]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.578952]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.579745] ==================================================================
[   28.420227] ==================================================================
[   28.421526] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   28.422181] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   28.422729] 
[   28.423608] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   28.424596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.425308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.426271] Call Trace:
[   28.426603]  <TASK>
[   28.427405]  dump_stack_lvl+0x73/0xb0
[   28.427801]  print_report+0xd1/0x640
[   28.428512]  ? __virt_addr_valid+0x1db/0x2d0
[   28.428937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.429649]  kasan_report+0x102/0x140
[   28.430200]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   28.431407]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   28.431920]  kasan_check_range+0x10c/0x1c0
[   28.432602]  __kasan_check_write+0x18/0x20
[   28.433315]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   28.434015]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.434630]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.435529]  ? trace_hardirqs_on+0x37/0xe0
[   28.436066]  ? kasan_bitops_generic+0x93/0x1c0
[   28.436415]  kasan_bitops_generic+0x117/0x1c0
[   28.437135]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.437745]  ? __pfx_read_tsc+0x10/0x10
[   28.438341]  ? ktime_get_ts64+0x84/0x230
[   28.439307]  kunit_try_run_case+0x1b3/0x490
[   28.439804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.440306]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.440695]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.441416]  ? __kthread_parkme+0x82/0x160
[   28.442172]  ? preempt_count_sub+0x50/0x80
[   28.442732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.443681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.444470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.445110]  kthread+0x257/0x310
[   28.445597]  ? __pfx_kthread+0x10/0x10
[   28.446296]  ret_from_fork+0x41/0x80
[   28.446615]  ? __pfx_kthread+0x10/0x10
[   28.447563]  ret_from_fork_asm+0x1a/0x30
[   28.448349]  </TASK>
[   28.448719] 
[   28.449131] Allocated by task 269:
[   28.449577]  kasan_save_stack+0x3d/0x60
[   28.450230]  kasan_save_track+0x18/0x40
[   28.450690]  kasan_save_alloc_info+0x3b/0x50
[   28.451729]  __kasan_kmalloc+0xb7/0xc0
[   28.452393]  __kmalloc_cache_noprof+0x184/0x410
[   28.452707]  kasan_bitops_generic+0x93/0x1c0
[   28.453402]  kunit_try_run_case+0x1b3/0x490
[   28.454167]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.454619]  kthread+0x257/0x310
[   28.455512]  ret_from_fork+0x41/0x80
[   28.456207]  ret_from_fork_asm+0x1a/0x30
[   28.456663] 
[   28.457181] The buggy address belongs to the object at ffff888100f9bce0
[   28.457181]  which belongs to the cache kmalloc-16 of size 16
[   28.458526] The buggy address is located 8 bytes inside of
[   28.458526]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   28.459703] 
[   28.460550] The buggy address belongs to the physical page:
[   28.461293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   28.462150] flags: 0x200000000000000(node=0|zone=2)
[   28.462793] page_type: f5(slab)
[   28.463756] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.464132] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.464805] page dumped because: kasan: bad access detected
[   28.465611] 
[   28.465761] Memory state around the buggy address:
[   28.466552]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.467637]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.468408] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.469216]                                                           ^
[   28.469813]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.470655]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.471669] ==================================================================
[   28.581221] ==================================================================
[   28.582354] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   28.583111] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269
[   28.583739] 
[   28.584000] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   28.585517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.585880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.586379] Call Trace:
[   28.586583]  <TASK>
[   28.586758]  dump_stack_lvl+0x73/0xb0
[   28.587076]  print_report+0xd1/0x640
[   28.587551]  ? __virt_addr_valid+0x1db/0x2d0
[   28.588044]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.588591]  kasan_report+0x102/0x140
[   28.589211]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   28.590025]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   28.590758]  kasan_check_range+0x10c/0x1c0
[   28.591168]  __kasan_check_write+0x18/0x20
[   28.591454]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   28.591788]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.592398]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.592976]  ? trace_hardirqs_on+0x37/0xe0
[   28.593491]  ? kasan_bitops_generic+0x93/0x1c0
[   28.594032]  kasan_bitops_generic+0x117/0x1c0
[   28.594630]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.595023]  ? __pfx_read_tsc+0x10/0x10
[   28.595327]  ? ktime_get_ts64+0x84/0x230
[   28.595770]  kunit_try_run_case+0x1b3/0x490
[   28.596302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.596850]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.597263]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.597839]  ? __kthread_parkme+0x82/0x160
[   28.598192]  ? preempt_count_sub+0x50/0x80
[   28.598696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.599169]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.599926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.600323]  kthread+0x257/0x310
[   28.600581]  ? __pfx_kthread+0x10/0x10
[   28.600878]  ret_from_fork+0x41/0x80
[   28.601280]  ? __pfx_kthread+0x10/0x10
[   28.601761]  ret_from_fork_asm+0x1a/0x30
[   28.602267]  </TASK>
[   28.602542] 
[   28.602755] Allocated by task 269:
[   28.603165]  kasan_save_stack+0x3d/0x60
[   28.603602]  kasan_save_track+0x18/0x40
[   28.603969]  kasan_save_alloc_info+0x3b/0x50
[   28.604250]  __kasan_kmalloc+0xb7/0xc0
[   28.604507]  __kmalloc_cache_noprof+0x184/0x410
[   28.604778]  kasan_bitops_generic+0x93/0x1c0
[   28.605236]  kunit_try_run_case+0x1b3/0x490
[   28.605817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.606439]  kthread+0x257/0x310
[   28.606850]  ret_from_fork+0x41/0x80
[   28.607246]  ret_from_fork_asm+0x1a/0x30
[   28.607725] 
[   28.607966] The buggy address belongs to the object at ffff888100f9bce0
[   28.607966]  which belongs to the cache kmalloc-16 of size 16
[   28.609391] The buggy address is located 8 bytes inside of
[   28.609391]  allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9)
[   28.609980] 
[   28.610137] The buggy address belongs to the physical page:
[   28.610558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b
[   28.611268] flags: 0x200000000000000(node=0|zone=2)
[   28.611790] page_type: f5(slab)
[   28.612197] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.612817] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.613628] page dumped because: kasan: bad access detected
[   28.613968] 
[   28.614115] Memory state around the buggy address:
[   28.614516]  ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.615526]  ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.616606] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.618217]                                                           ^
[   28.619411]  ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.621164]  ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.622016] ==================================================================