Hay
Date
Nov. 26, 2024, 6:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   34.863639] ==================================================================
[   34.864448] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.865704] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   34.867610] 
[   34.868079] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.869203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.869729] Hardware name: linux,dummy-virt (DT)
[   34.870759] Call trace:
[   34.871230]  show_stack+0x20/0x38 (C)
[   34.871802]  dump_stack_lvl+0x8c/0xd0
[   34.872720]  print_report+0x118/0x5e0
[   34.874004]  kasan_report+0xc8/0x118
[   34.874601]  kasan_check_range+0x100/0x1a8
[   34.875295]  __kasan_check_write+0x20/0x30
[   34.875948]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.877024]  kasan_bitops_generic+0x110/0x1c8
[   34.877786]  kunit_try_run_case+0x14c/0x3d0
[   34.878243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.878607]  kthread+0x24c/0x2d0
[   34.878867]  ret_from_fork+0x10/0x20
[   34.879510] 
[   34.880013] Allocated by task 250:
[   34.881010]  kasan_save_stack+0x3c/0x68
[   34.881715]  kasan_save_track+0x20/0x40
[   34.882343]  kasan_save_alloc_info+0x40/0x58
[   34.883027]  __kasan_kmalloc+0xd4/0xd8
[   34.883924]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.885223]  kasan_bitops_generic+0xa0/0x1c8
[   34.885770]  kunit_try_run_case+0x14c/0x3d0
[   34.886524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.887367]  kthread+0x24c/0x2d0
[   34.888048]  ret_from_fork+0x10/0x20
[   34.888993] 
[   34.889467] The buggy address belongs to the object at fff00000c57c32c0
[   34.889467]  which belongs to the cache kmalloc-16 of size 16
[   34.890383] The buggy address is located 8 bytes inside of
[   34.890383]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   34.891796] 
[   34.892198] The buggy address belongs to the physical page:
[   34.893241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   34.894185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.894868] page_type: f5(slab)
[   34.895535] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.896855] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.897503] page dumped because: kasan: bad access detected
[   34.898132] 
[   34.898713] Memory state around the buggy address:
[   34.899493]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   34.900252]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.901502] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.902348]                                               ^
[   34.903149]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.904048]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.904891] ==================================================================
[   34.906027] ==================================================================
[   34.906724] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.909327] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   34.910302] 
[   34.910726] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.913154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.913967] Hardware name: linux,dummy-virt (DT)
[   34.914611] Call trace:
[   34.915094]  show_stack+0x20/0x38 (C)
[   34.915800]  dump_stack_lvl+0x8c/0xd0
[   34.916566]  print_report+0x118/0x5e0
[   34.917067]  kasan_report+0xc8/0x118
[   34.917694]  __asan_report_load8_noabort+0x20/0x30
[   34.918319]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.918926]  kasan_bitops_generic+0x110/0x1c8
[   34.919615]  kunit_try_run_case+0x14c/0x3d0
[   34.920317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.921206]  kthread+0x24c/0x2d0
[   34.921797]  ret_from_fork+0x10/0x20
[   34.922463] 
[   34.922835] Allocated by task 250:
[   34.924193]  kasan_save_stack+0x3c/0x68
[   34.924779]  kasan_save_track+0x20/0x40
[   34.925462]  kasan_save_alloc_info+0x40/0x58
[   34.926471]  __kasan_kmalloc+0xd4/0xd8
[   34.927025]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.927701]  kasan_bitops_generic+0xa0/0x1c8
[   34.928303]  kunit_try_run_case+0x14c/0x3d0
[   34.928937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.929715]  kthread+0x24c/0x2d0
[   34.931174]  ret_from_fork+0x10/0x20
[   34.931708] 
[   34.932097] The buggy address belongs to the object at fff00000c57c32c0
[   34.932097]  which belongs to the cache kmalloc-16 of size 16
[   34.933689] The buggy address is located 8 bytes inside of
[   34.933689]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   34.934924] 
[   34.935293] The buggy address belongs to the physical page:
[   34.935877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   34.937130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.937867] page_type: f5(slab)
[   34.938313] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.940253] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.941474] page dumped because: kasan: bad access detected
[   34.942071] 
[   34.942434] Memory state around the buggy address:
[   34.943049]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   34.943792]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.944823] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.945596]                                               ^
[   34.946268]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.947543]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.948840] ==================================================================
[   35.038201] ==================================================================
[   35.038861] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   35.039550] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   35.040285] 
[   35.040699] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.042369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.042836] Hardware name: linux,dummy-virt (DT)
[   35.043516] Call trace:
[   35.043979]  show_stack+0x20/0x38 (C)
[   35.045355]  dump_stack_lvl+0x8c/0xd0
[   35.046074]  print_report+0x118/0x5e0
[   35.046759]  kasan_report+0xc8/0x118
[   35.047436]  __asan_report_load8_noabort+0x20/0x30
[   35.048219]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   35.049481]  kasan_bitops_generic+0x110/0x1c8
[   35.050093]  kunit_try_run_case+0x14c/0x3d0
[   35.050824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.051565]  kthread+0x24c/0x2d0
[   35.052202]  ret_from_fork+0x10/0x20
[   35.053048] 
[   35.053671] Allocated by task 250:
[   35.054770]  kasan_save_stack+0x3c/0x68
[   35.055385]  kasan_save_track+0x20/0x40
[   35.055884]  kasan_save_alloc_info+0x40/0x58
[   35.056731]  __kasan_kmalloc+0xd4/0xd8
[   35.057351]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.058171]  kasan_bitops_generic+0xa0/0x1c8
[   35.058884]  kunit_try_run_case+0x14c/0x3d0
[   35.059418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.060204]  kthread+0x24c/0x2d0
[   35.061073]  ret_from_fork+0x10/0x20
[   35.062366] 
[   35.062973] The buggy address belongs to the object at fff00000c57c32c0
[   35.062973]  which belongs to the cache kmalloc-16 of size 16
[   35.064204] The buggy address is located 8 bytes inside of
[   35.064204]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   35.066123] 
[   35.066537] The buggy address belongs to the physical page:
[   35.067319] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   35.068462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.069357] page_type: f5(slab)
[   35.069766] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.070561] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.071212] page dumped because: kasan: bad access detected
[   35.071973] 
[   35.072342] Memory state around the buggy address:
[   35.073615]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   35.074334]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.075176] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.076081]                                               ^
[   35.077132]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.078151]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.079481] ==================================================================
[   34.637750] ==================================================================
[   34.638781] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   34.639612] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   34.640445] 
[   34.641120] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.642680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.643309] Hardware name: linux,dummy-virt (DT)
[   34.643785] Call trace:
[   34.644165]  show_stack+0x20/0x38 (C)
[   34.645734]  dump_stack_lvl+0x8c/0xd0
[   34.646560]  print_report+0x118/0x5e0
[   34.647292]  kasan_report+0xc8/0x118
[   34.648052]  kasan_check_range+0x100/0x1a8
[   34.649494]  __kasan_check_write+0x20/0x30
[   34.650170]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   34.650973]  kasan_bitops_generic+0x110/0x1c8
[   34.651631]  kunit_try_run_case+0x14c/0x3d0
[   34.652203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.652814]  kthread+0x24c/0x2d0
[   34.653829]  ret_from_fork+0x10/0x20
[   34.654462] 
[   34.654825] Allocated by task 250:
[   34.655428]  kasan_save_stack+0x3c/0x68
[   34.656073]  kasan_save_track+0x20/0x40
[   34.656762]  kasan_save_alloc_info+0x40/0x58
[   34.657391]  __kasan_kmalloc+0xd4/0xd8
[   34.657877]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.659414]  kasan_bitops_generic+0xa0/0x1c8
[   34.659940]  kunit_try_run_case+0x14c/0x3d0
[   34.660506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.661234]  kthread+0x24c/0x2d0
[   34.661808]  ret_from_fork+0x10/0x20
[   34.662723] 
[   34.663070] The buggy address belongs to the object at fff00000c57c32c0
[   34.663070]  which belongs to the cache kmalloc-16 of size 16
[   34.665205] The buggy address is located 8 bytes inside of
[   34.665205]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   34.666477] 
[   34.666863] The buggy address belongs to the physical page:
[   34.667831] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   34.668836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.669728] page_type: f5(slab)
[   34.670300] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.671250] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.672048] page dumped because: kasan: bad access detected
[   34.673590] 
[   34.673931] Memory state around the buggy address:
[   34.674492]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   34.675342]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.676168] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.677392]                                               ^
[   34.678048]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.678824]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.679615] ==================================================================
[   34.950708] ==================================================================
[   34.951622] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.952391] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   34.953249] 
[   34.953665] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.955281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.956013] Hardware name: linux,dummy-virt (DT)
[   34.956677] Call trace:
[   34.957130]  show_stack+0x20/0x38 (C)
[   34.957790]  dump_stack_lvl+0x8c/0xd0
[   34.959225]  print_report+0x118/0x5e0
[   34.959760]  kasan_report+0xc8/0x118
[   34.960622]  kasan_check_range+0x100/0x1a8
[   34.961307]  __kasan_check_write+0x20/0x30
[   34.962189]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.963044]  kasan_bitops_generic+0x110/0x1c8
[   34.963720]  kunit_try_run_case+0x14c/0x3d0
[   34.965164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.965876]  kthread+0x24c/0x2d0
[   34.966428]  ret_from_fork+0x10/0x20
[   34.967105] 
[   34.967454] Allocated by task 250:
[   34.967919]  kasan_save_stack+0x3c/0x68
[   34.968845]  kasan_save_track+0x20/0x40
[   34.969672]  kasan_save_alloc_info+0x40/0x58
[   34.970243]  __kasan_kmalloc+0xd4/0xd8
[   34.970857]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.971483]  kasan_bitops_generic+0xa0/0x1c8
[   34.972097]  kunit_try_run_case+0x14c/0x3d0
[   34.973162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.973873]  kthread+0x24c/0x2d0
[   34.974483]  ret_from_fork+0x10/0x20
[   34.975250] 
[   34.975877] The buggy address belongs to the object at fff00000c57c32c0
[   34.975877]  which belongs to the cache kmalloc-16 of size 16
[   34.977490] The buggy address is located 8 bytes inside of
[   34.977490]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   34.978487] 
[   34.978670] The buggy address belongs to the physical page:
[   34.979043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   34.979961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.981743] page_type: f5(slab)
[   34.982793] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.983778] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.984888] page dumped because: kasan: bad access detected
[   34.985540] 
[   34.985865] Memory state around the buggy address:
[   34.986488]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   34.987330]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.988111] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.989579]                                               ^
[   34.990297]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.991765]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.993457] ==================================================================
[   34.995190] ==================================================================
[   34.996859] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.997817] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   34.999255] 
[   34.999536] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.000993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.002103] Hardware name: linux,dummy-virt (DT)
[   35.002810] Call trace:
[   35.003293]  show_stack+0x20/0x38 (C)
[   35.003964]  dump_stack_lvl+0x8c/0xd0
[   35.004679]  print_report+0x118/0x5e0
[   35.005660]  kasan_report+0xc8/0x118
[   35.006516]  kasan_check_range+0x100/0x1a8
[   35.007175]  __kasan_check_write+0x20/0x30
[   35.007485]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   35.007810]  kasan_bitops_generic+0x110/0x1c8
[   35.008125]  kunit_try_run_case+0x14c/0x3d0
[   35.008874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.010406]  kthread+0x24c/0x2d0
[   35.011005]  ret_from_fork+0x10/0x20
[   35.011614] 
[   35.012047] Allocated by task 250:
[   35.012864]  kasan_save_stack+0x3c/0x68
[   35.013652]  kasan_save_track+0x20/0x40
[   35.014286]  kasan_save_alloc_info+0x40/0x58
[   35.014888]  __kasan_kmalloc+0xd4/0xd8
[   35.015627]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.016735]  kasan_bitops_generic+0xa0/0x1c8
[   35.017244]  kunit_try_run_case+0x14c/0x3d0
[   35.017714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.018566]  kthread+0x24c/0x2d0
[   35.019140]  ret_from_fork+0x10/0x20
[   35.019632] 
[   35.020042] The buggy address belongs to the object at fff00000c57c32c0
[   35.020042]  which belongs to the cache kmalloc-16 of size 16
[   35.021999] The buggy address is located 8 bytes inside of
[   35.021999]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   35.023349] 
[   35.023726] The buggy address belongs to the physical page:
[   35.024464] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   35.025364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.026352] page_type: f5(slab)
[   35.026952] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.027861] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.029233] page dumped because: kasan: bad access detected
[   35.030140] 
[   35.030505] Memory state around the buggy address:
[   35.031136]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   35.031959]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.033141] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.034111]                                               ^
[   35.034616]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.035632]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.036931] ==================================================================
[   34.773056] ==================================================================
[   34.774260] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   34.775047] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   34.776030] 
[   34.776878] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.778649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.779167] Hardware name: linux,dummy-virt (DT)
[   34.779699] Call trace:
[   34.780867]  show_stack+0x20/0x38 (C)
[   34.781681]  dump_stack_lvl+0x8c/0xd0
[   34.782315]  print_report+0x118/0x5e0
[   34.782947]  kasan_report+0xc8/0x118
[   34.783551]  __asan_report_load8_noabort+0x20/0x30
[   34.784231]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   34.785000]  kasan_bitops_generic+0x110/0x1c8
[   34.786351]  kunit_try_run_case+0x14c/0x3d0
[   34.787033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.787782]  kthread+0x24c/0x2d0
[   34.788439]  ret_from_fork+0x10/0x20
[   34.789214] 
[   34.789594] Allocated by task 250:
[   34.790232]  kasan_save_stack+0x3c/0x68
[   34.790924]  kasan_save_track+0x20/0x40
[   34.791568]  kasan_save_alloc_info+0x40/0x58
[   34.792223]  __kasan_kmalloc+0xd4/0xd8
[   34.792965]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.793683]  kasan_bitops_generic+0xa0/0x1c8
[   34.794407]  kunit_try_run_case+0x14c/0x3d0
[   34.795186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.796057]  kthread+0x24c/0x2d0
[   34.796734]  ret_from_fork+0x10/0x20
[   34.797487] 
[   34.797987] The buggy address belongs to the object at fff00000c57c32c0
[   34.797987]  which belongs to the cache kmalloc-16 of size 16
[   34.799709] The buggy address is located 8 bytes inside of
[   34.799709]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   34.801204] 
[   34.801519] The buggy address belongs to the physical page:
[   34.802188] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   34.802948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.803807] page_type: f5(slab)
[   34.804410] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.806011] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.807074] page dumped because: kasan: bad access detected
[   34.807942] 
[   34.808583] Memory state around the buggy address:
[   34.809670]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   34.810694]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.811703] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.812778]                                               ^
[   34.813327]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.814082]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.815023] ==================================================================
[   34.682172] ==================================================================
[   34.683635] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   34.685032] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   34.686070] 
[   34.686479] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.687703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.688554] Hardware name: linux,dummy-virt (DT)
[   34.689100] Call trace:
[   34.689454]  show_stack+0x20/0x38 (C)
[   34.690063]  dump_stack_lvl+0x8c/0xd0
[   34.690765]  print_report+0x118/0x5e0
[   34.691461]  kasan_report+0xc8/0x118
[   34.692144]  __asan_report_load8_noabort+0x20/0x30
[   34.692938]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   34.694121]  kasan_bitops_generic+0x110/0x1c8
[   34.694771]  kunit_try_run_case+0x14c/0x3d0
[   34.695553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.696336]  kthread+0x24c/0x2d0
[   34.696936]  ret_from_fork+0x10/0x20
[   34.697480] 
[   34.697852] Allocated by task 250:
[   34.699245]  kasan_save_stack+0x3c/0x68
[   34.699857]  kasan_save_track+0x20/0x40
[   34.700724]  kasan_save_alloc_info+0x40/0x58
[   34.701562]  __kasan_kmalloc+0xd4/0xd8
[   34.702169]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.702835]  kasan_bitops_generic+0xa0/0x1c8
[   34.703523]  kunit_try_run_case+0x14c/0x3d0
[   34.704153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.705586]  kthread+0x24c/0x2d0
[   34.705931]  ret_from_fork+0x10/0x20
[   34.706481] 
[   34.706925] The buggy address belongs to the object at fff00000c57c32c0
[   34.706925]  which belongs to the cache kmalloc-16 of size 16
[   34.708575] The buggy address is located 8 bytes inside of
[   34.708575]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   34.710234] 
[   34.710891] The buggy address belongs to the physical page:
[   34.711582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   34.713549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.714516] page_type: f5(slab)
[   34.715274] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.716184] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.717649] page dumped because: kasan: bad access detected
[   34.718533] 
[   34.719068] Memory state around the buggy address:
[   34.719813]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   34.720984]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.722478] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.722847]                                               ^
[   34.723812]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.724978]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.725829] ==================================================================
[   34.817175] ==================================================================
[   34.817859] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   34.818853] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   34.821082] 
[   34.821398] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.823296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.823922] Hardware name: linux,dummy-virt (DT)
[   34.824868] Call trace:
[   34.825373]  show_stack+0x20/0x38 (C)
[   34.826043]  dump_stack_lvl+0x8c/0xd0
[   34.826707]  print_report+0x118/0x5e0
[   34.828039]  kasan_report+0xc8/0x118
[   34.828764]  kasan_check_range+0x100/0x1a8
[   34.829444]  __kasan_check_write+0x20/0x30
[   34.829995]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   34.830627]  kasan_bitops_generic+0x110/0x1c8
[   34.832049]  kunit_try_run_case+0x14c/0x3d0
[   34.833354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.833881]  kthread+0x24c/0x2d0
[   34.834357]  ret_from_fork+0x10/0x20
[   34.835052] 
[   34.835489] Allocated by task 250:
[   34.836144]  kasan_save_stack+0x3c/0x68
[   34.836766]  kasan_save_track+0x20/0x40
[   34.837887]  kasan_save_alloc_info+0x40/0x58
[   34.838719]  __kasan_kmalloc+0xd4/0xd8
[   34.839282]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.839873]  kasan_bitops_generic+0xa0/0x1c8
[   34.841110]  kunit_try_run_case+0x14c/0x3d0
[   34.841683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.842879]  kthread+0x24c/0x2d0
[   34.843365]  ret_from_fork+0x10/0x20
[   34.844117] 
[   34.844752] The buggy address belongs to the object at fff00000c57c32c0
[   34.844752]  which belongs to the cache kmalloc-16 of size 16
[   34.846019] The buggy address is located 8 bytes inside of
[   34.846019]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   34.847553] 
[   34.848144] The buggy address belongs to the physical page:
[   34.849038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   34.849878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.851546] page_type: f5(slab)
[   34.852074] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.853381] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.854224] page dumped because: kasan: bad access detected
[   34.854892] 
[   34.855320] Memory state around the buggy address:
[   34.855978]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   34.857032]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.858583] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.859390]                                               ^
[   34.860062]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.861272]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.862095] ==================================================================
[   34.727236] ==================================================================
[   34.728019] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   34.728916] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250
[   34.729736] 
[   34.731287] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.732579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.733264] Hardware name: linux,dummy-virt (DT)
[   34.733843] Call trace:
[   34.734254]  show_stack+0x20/0x38 (C)
[   34.734865]  dump_stack_lvl+0x8c/0xd0
[   34.735554]  print_report+0x118/0x5e0
[   34.736075]  kasan_report+0xc8/0x118
[   34.737404]  kasan_check_range+0x100/0x1a8
[   34.738005]  __kasan_check_write+0x20/0x30
[   34.738541]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   34.739918]  kasan_bitops_generic+0x110/0x1c8
[   34.740756]  kunit_try_run_case+0x14c/0x3d0
[   34.741630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.742547]  kthread+0x24c/0x2d0
[   34.743295]  ret_from_fork+0x10/0x20
[   34.744101] 
[   34.744733] Allocated by task 250:
[   34.745271]  kasan_save_stack+0x3c/0x68
[   34.746362]  kasan_save_track+0x20/0x40
[   34.747099]  kasan_save_alloc_info+0x40/0x58
[   34.747639]  __kasan_kmalloc+0xd4/0xd8
[   34.748127]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.749517]  kasan_bitops_generic+0xa0/0x1c8
[   34.750173]  kunit_try_run_case+0x14c/0x3d0
[   34.750733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.751785]  kthread+0x24c/0x2d0
[   34.752646]  ret_from_fork+0x10/0x20
[   34.753219] 
[   34.753574] The buggy address belongs to the object at fff00000c57c32c0
[   34.753574]  which belongs to the cache kmalloc-16 of size 16
[   34.754753] The buggy address is located 8 bytes inside of
[   34.754753]  allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9)
[   34.756265] 
[   34.756697] The buggy address belongs to the physical page:
[   34.757980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3
[   34.759038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.760018] page_type: f5(slab)
[   34.760762] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.762092] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.762876] page dumped because: kasan: bad access detected
[   34.764057] 
[   34.764620] Memory state around the buggy address:
[   34.765648]  fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   34.766531]  fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.767531] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.769112]                                               ^
[   34.769803]  fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.770675]  fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.771519] ==================================================================

[   34.750583] ==================================================================
[   34.751343] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   34.752164] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.753041] 
[   34.753450] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.754563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.755108] Hardware name: linux,dummy-virt (DT)
[   34.757245] Call trace:
[   34.757716]  show_stack+0x20/0x38 (C)
[   34.758602]  dump_stack_lvl+0x8c/0xd0
[   34.759180]  print_report+0x118/0x5e0
[   34.759856]  kasan_report+0xc8/0x118
[   34.760496]  kasan_check_range+0x100/0x1a8
[   34.761384]  __kasan_check_write+0x20/0x30
[   34.763031]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   34.763761]  kasan_bitops_generic+0x110/0x1c8
[   34.764610]  kunit_try_run_case+0x14c/0x3d0
[   34.765257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.766024]  kthread+0x24c/0x2d0
[   34.766644]  ret_from_fork+0x10/0x20
[   34.767268] 
[   34.768271] Allocated by task 250:
[   34.768864]  kasan_save_stack+0x3c/0x68
[   34.769435]  kasan_save_track+0x20/0x40
[   34.771081]  kasan_save_alloc_info+0x40/0x58
[   34.771634]  __kasan_kmalloc+0xd4/0xd8
[   34.772267]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.773042]  kasan_bitops_generic+0xa0/0x1c8
[   34.773859]  kunit_try_run_case+0x14c/0x3d0
[   34.774442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.775227]  kthread+0x24c/0x2d0
[   34.775773]  ret_from_fork+0x10/0x20
[   34.776273] 
[   34.777194] The buggy address belongs to the object at fff00000c5e082a0
[   34.777194]  which belongs to the cache kmalloc-16 of size 16
[   34.779069] The buggy address is located 8 bytes inside of
[   34.779069]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.780012] 
[   34.780236] The buggy address belongs to the physical page:
[   34.780594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.781331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.782845] page_type: f5(slab)
[   34.783429] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.784346] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.785274] page dumped because: kasan: bad access detected
[   34.786038] 
[   34.786365] Memory state around the buggy address:
[   34.787916]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.789237]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.790088] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.791016]                                   ^
[   34.791717]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.792712]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.793705] ==================================================================
[   34.795596] ==================================================================
[   34.796306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   34.797309] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.799103] 
[   34.799448] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.800671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.801297] Hardware name: linux,dummy-virt (DT)
[   34.801918] Call trace:
[   34.803111]  show_stack+0x20/0x38 (C)
[   34.803777]  dump_stack_lvl+0x8c/0xd0
[   34.804276]  print_report+0x118/0x5e0
[   34.804805]  kasan_report+0xc8/0x118
[   34.805456]  __asan_report_load8_noabort+0x20/0x30
[   34.806193]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   34.807047]  kasan_bitops_generic+0x110/0x1c8
[   34.807799]  kunit_try_run_case+0x14c/0x3d0
[   34.808565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.809336]  kthread+0x24c/0x2d0
[   34.810188]  ret_from_fork+0x10/0x20
[   34.811732] 
[   34.812546] Allocated by task 250:
[   34.813020]  kasan_save_stack+0x3c/0x68
[   34.813638]  kasan_save_track+0x20/0x40
[   34.814691]  kasan_save_alloc_info+0x40/0x58
[   34.815263]  __kasan_kmalloc+0xd4/0xd8
[   34.815958]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.816651]  kasan_bitops_generic+0xa0/0x1c8
[   34.817268]  kunit_try_run_case+0x14c/0x3d0
[   34.818091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.819026]  kthread+0x24c/0x2d0
[   34.819461]  ret_from_fork+0x10/0x20
[   34.820471] 
[   34.820876] The buggy address belongs to the object at fff00000c5e082a0
[   34.820876]  which belongs to the cache kmalloc-16 of size 16
[   34.822670] The buggy address is located 8 bytes inside of
[   34.822670]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.823980] 
[   34.824409] The buggy address belongs to the physical page:
[   34.825049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.826594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.827204] page_type: f5(slab)
[   34.827787] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.828812] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.829905] page dumped because: kasan: bad access detected
[   34.830728] 
[   34.831112] Memory state around the buggy address:
[   34.831831]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.833322]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.834644] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.835267]                                   ^
[   34.835982]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.837161]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.837952] ==================================================================
[   34.704954] ==================================================================
[   34.705678] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   34.707820] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.708699] 
[   34.709152] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.710825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.711491] Hardware name: linux,dummy-virt (DT)
[   34.712225] Call trace:
[   34.712716]  show_stack+0x20/0x38 (C)
[   34.713304]  dump_stack_lvl+0x8c/0xd0
[   34.714107]  print_report+0x118/0x5e0
[   34.714582]  kasan_report+0xc8/0x118
[   34.715045]  __asan_report_load8_noabort+0x20/0x30
[   34.716457]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   34.717242]  kasan_bitops_generic+0x110/0x1c8
[   34.717971]  kunit_try_run_case+0x14c/0x3d0
[   34.718691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.719591]  kthread+0x24c/0x2d0
[   34.720748]  ret_from_fork+0x10/0x20
[   34.721278] 
[   34.721674] Allocated by task 250:
[   34.722244]  kasan_save_stack+0x3c/0x68
[   34.722921]  kasan_save_track+0x20/0x40
[   34.723467]  kasan_save_alloc_info+0x40/0x58
[   34.724163]  __kasan_kmalloc+0xd4/0xd8
[   34.725746]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.726364]  kasan_bitops_generic+0xa0/0x1c8
[   34.726950]  kunit_try_run_case+0x14c/0x3d0
[   34.728043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.729164]  kthread+0x24c/0x2d0
[   34.730353]  ret_from_fork+0x10/0x20
[   34.730935] 
[   34.731228] The buggy address belongs to the object at fff00000c5e082a0
[   34.731228]  which belongs to the cache kmalloc-16 of size 16
[   34.732736] The buggy address is located 8 bytes inside of
[   34.732736]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.733898] 
[   34.734799] The buggy address belongs to the physical page:
[   34.735616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.736731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.737760] page_type: f5(slab)
[   34.738670] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.739685] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.740944] page dumped because: kasan: bad access detected
[   34.741261] 
[   34.741423] Memory state around the buggy address:
[   34.741872]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.743215]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.744188] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.745215]                                   ^
[   34.746393]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.747922]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.748790] ==================================================================
[   34.890004] ==================================================================
[   34.890867] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.891784] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.893249] 
[   34.894787] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.895870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.896734] Hardware name: linux,dummy-virt (DT)
[   34.897413] Call trace:
[   34.898203]  show_stack+0x20/0x38 (C)
[   34.898844]  dump_stack_lvl+0x8c/0xd0
[   34.899434]  print_report+0x118/0x5e0
[   34.900213]  kasan_report+0xc8/0x118
[   34.900839]  kasan_check_range+0x100/0x1a8
[   34.901483]  __kasan_check_write+0x20/0x30
[   34.902900]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.903889]  kasan_bitops_generic+0x110/0x1c8
[   34.904626]  kunit_try_run_case+0x14c/0x3d0
[   34.905337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.906410]  kthread+0x24c/0x2d0
[   34.907268]  ret_from_fork+0x10/0x20
[   34.907913] 
[   34.908321] Allocated by task 250:
[   34.908858]  kasan_save_stack+0x3c/0x68
[   34.909491]  kasan_save_track+0x20/0x40
[   34.910092]  kasan_save_alloc_info+0x40/0x58
[   34.911777]  __kasan_kmalloc+0xd4/0xd8
[   34.912346]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.913090]  kasan_bitops_generic+0xa0/0x1c8
[   34.914366]  kunit_try_run_case+0x14c/0x3d0
[   34.915284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.916175]  kthread+0x24c/0x2d0
[   34.916843]  ret_from_fork+0x10/0x20
[   34.917497] 
[   34.917948] The buggy address belongs to the object at fff00000c5e082a0
[   34.917948]  which belongs to the cache kmalloc-16 of size 16
[   34.919488] The buggy address is located 8 bytes inside of
[   34.919488]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.921490] 
[   34.921906] The buggy address belongs to the physical page:
[   34.922644] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.923835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.925099] page_type: f5(slab)
[   34.925924] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.927463] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.928558] page dumped because: kasan: bad access detected
[   34.929255] 
[   34.929685] Memory state around the buggy address:
[   34.930337]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.931032]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.932389] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.933225]                                   ^
[   34.934072]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.934908]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.935797] ==================================================================
[   34.937736] ==================================================================
[   34.938663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.940163] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.941216] 
[   34.941919] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.944050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.944718] Hardware name: linux,dummy-virt (DT)
[   34.945264] Call trace:
[   34.945837]  show_stack+0x20/0x38 (C)
[   34.946556]  dump_stack_lvl+0x8c/0xd0
[   34.947617]  print_report+0x118/0x5e0
[   34.948185]  kasan_report+0xc8/0x118
[   34.948894]  __asan_report_load8_noabort+0x20/0x30
[   34.949975]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.951198]  kasan_bitops_generic+0x110/0x1c8
[   34.951910]  kunit_try_run_case+0x14c/0x3d0
[   34.952719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.953768]  kthread+0x24c/0x2d0
[   34.954513]  ret_from_fork+0x10/0x20
[   34.955120] 
[   34.955556] Allocated by task 250:
[   34.956084]  kasan_save_stack+0x3c/0x68
[   34.956794]  kasan_save_track+0x20/0x40
[   34.957450]  kasan_save_alloc_info+0x40/0x58
[   34.958381]  __kasan_kmalloc+0xd4/0xd8
[   34.959096]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.960862]  kasan_bitops_generic+0xa0/0x1c8
[   34.961395]  kunit_try_run_case+0x14c/0x3d0
[   34.962412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.963215]  kthread+0x24c/0x2d0
[   34.963798]  ret_from_fork+0x10/0x20
[   34.964423] 
[   34.964866] The buggy address belongs to the object at fff00000c5e082a0
[   34.964866]  which belongs to the cache kmalloc-16 of size 16
[   34.966325] The buggy address is located 8 bytes inside of
[   34.966325]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.968135] 
[   34.969033] The buggy address belongs to the physical page:
[   34.970111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.971133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.972050] page_type: f5(slab)
[   34.972618] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.973550] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.974347] page dumped because: kasan: bad access detected
[   34.975804] 
[   34.976177] Memory state around the buggy address:
[   34.976903]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.978714]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.979444] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.980295]                                   ^
[   34.981022]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.982039]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.983045] ==================================================================
[   34.984377] ==================================================================
[   34.985304] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.986878] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.987517] 
[   34.987908] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.988842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.989479] Hardware name: linux,dummy-virt (DT)
[   34.990860] Call trace:
[   34.991431]  show_stack+0x20/0x38 (C)
[   34.992234]  dump_stack_lvl+0x8c/0xd0
[   34.993088]  print_report+0x118/0x5e0
[   34.994104]  kasan_report+0xc8/0x118
[   34.995468]  kasan_check_range+0x100/0x1a8
[   34.996336]  __kasan_check_write+0x20/0x30
[   34.997064]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.998309]  kasan_bitops_generic+0x110/0x1c8
[   34.999094]  kunit_try_run_case+0x14c/0x3d0
[   34.999836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.000632]  kthread+0x24c/0x2d0
[   35.001159]  ret_from_fork+0x10/0x20
[   35.002779] 
[   35.003134] Allocated by task 250:
[   35.003547]  kasan_save_stack+0x3c/0x68
[   35.004272]  kasan_save_track+0x20/0x40
[   35.004978]  kasan_save_alloc_info+0x40/0x58
[   35.005553]  __kasan_kmalloc+0xd4/0xd8
[   35.006178]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.007371]  kasan_bitops_generic+0xa0/0x1c8
[   35.008097]  kunit_try_run_case+0x14c/0x3d0
[   35.008710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.009594]  kthread+0x24c/0x2d0
[   35.010241]  ret_from_fork+0x10/0x20
[   35.010884] 
[   35.011663] The buggy address belongs to the object at fff00000c5e082a0
[   35.011663]  which belongs to the cache kmalloc-16 of size 16
[   35.013286] The buggy address is located 8 bytes inside of
[   35.013286]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.014980] 
[   35.015293] The buggy address belongs to the physical page:
[   35.016064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.017134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.018279] page_type: f5(slab)
[   35.018845] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.019750] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.021308] page dumped because: kasan: bad access detected
[   35.022691] 
[   35.023060] Memory state around the buggy address:
[   35.023841]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.024880]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.025853] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.026461]                                   ^
[   35.027030]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.028318]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.029871] ==================================================================
[   35.031608] ==================================================================
[   35.032623] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   35.033712] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.034982] 
[   35.035642] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.036590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.037273] Hardware name: linux,dummy-virt (DT)
[   35.038044] Call trace:
[   35.038517]  show_stack+0x20/0x38 (C)
[   35.039274]  dump_stack_lvl+0x8c/0xd0
[   35.039653]  print_report+0x118/0x5e0
[   35.040039]  kasan_report+0xc8/0x118
[   35.040727]  kasan_check_range+0x100/0x1a8
[   35.041506]  __kasan_check_write+0x20/0x30
[   35.042243]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   35.043792]  kasan_bitops_generic+0x110/0x1c8
[   35.044415]  kunit_try_run_case+0x14c/0x3d0
[   35.045183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.046334]  kthread+0x24c/0x2d0
[   35.046880]  ret_from_fork+0x10/0x20
[   35.047597] 
[   35.047968] Allocated by task 250:
[   35.048491]  kasan_save_stack+0x3c/0x68
[   35.049173]  kasan_save_track+0x20/0x40
[   35.050478]  kasan_save_alloc_info+0x40/0x58
[   35.051089]  __kasan_kmalloc+0xd4/0xd8
[   35.051563]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.052277]  kasan_bitops_generic+0xa0/0x1c8
[   35.053364]  kunit_try_run_case+0x14c/0x3d0
[   35.054547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.055440]  kthread+0x24c/0x2d0
[   35.055949]  ret_from_fork+0x10/0x20
[   35.056471] 
[   35.056929] The buggy address belongs to the object at fff00000c5e082a0
[   35.056929]  which belongs to the cache kmalloc-16 of size 16
[   35.058210] The buggy address is located 8 bytes inside of
[   35.058210]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.060646] 
[   35.061041] The buggy address belongs to the physical page:
[   35.062109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.063209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.064160] page_type: f5(slab)
[   35.064731] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.065680] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.067016] page dumped because: kasan: bad access detected
[   35.067796] 
[   35.068173] Memory state around the buggy address:
[   35.068805]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.069734]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.070564] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.071325]                                   ^
[   35.072104]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.073015]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.073982] ==================================================================
[   35.076094] ==================================================================
[   35.078183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   35.079275] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.080704] 
[   35.081115] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.082890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.083440] Hardware name: linux,dummy-virt (DT)
[   35.084512] Call trace:
[   35.085240]  show_stack+0x20/0x38 (C)
[   35.085866]  dump_stack_lvl+0x8c/0xd0
[   35.086635]  print_report+0x118/0x5e0
[   35.087392]  kasan_report+0xc8/0x118
[   35.088139]  __asan_report_load8_noabort+0x20/0x30
[   35.089083]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   35.089885]  kasan_bitops_generic+0x110/0x1c8
[   35.090632]  kunit_try_run_case+0x14c/0x3d0
[   35.091309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.092050]  kthread+0x24c/0x2d0
[   35.092600]  ret_from_fork+0x10/0x20
[   35.093176] 
[   35.093572] Allocated by task 250:
[   35.094105]  kasan_save_stack+0x3c/0x68
[   35.094757]  kasan_save_track+0x20/0x40
[   35.095393]  kasan_save_alloc_info+0x40/0x58
[   35.096096]  __kasan_kmalloc+0xd4/0xd8
[   35.096695]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.097262]  kasan_bitops_generic+0xa0/0x1c8
[   35.097951]  kunit_try_run_case+0x14c/0x3d0
[   35.098628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.099396]  kthread+0x24c/0x2d0
[   35.099998]  ret_from_fork+0x10/0x20
[   35.100629] 
[   35.101013] The buggy address belongs to the object at fff00000c5e082a0
[   35.101013]  which belongs to the cache kmalloc-16 of size 16
[   35.102233] The buggy address is located 8 bytes inside of
[   35.102233]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.103449] 
[   35.103858] The buggy address belongs to the physical page:
[   35.104633] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.105415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.106335] page_type: f5(slab)
[   35.106868] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.107790] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.108615] page dumped because: kasan: bad access detected
[   35.109354] 
[   35.109758] Memory state around the buggy address:
[   35.110452]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.111159]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.112102] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.112915]                                   ^
[   35.113594]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.114391]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.115315] ==================================================================
[   34.840451] ==================================================================
[   34.841798] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   34.843016] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.843757] 
[   34.844077] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.845267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.846902] Hardware name: linux,dummy-virt (DT)
[   34.847727] Call trace:
[   34.848219]  show_stack+0x20/0x38 (C)
[   34.848943]  dump_stack_lvl+0x8c/0xd0
[   34.849788]  print_report+0x118/0x5e0
[   34.850412]  kasan_report+0xc8/0x118
[   34.851080]  kasan_check_range+0x100/0x1a8
[   34.851772]  __kasan_check_write+0x20/0x30
[   34.852484]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   34.853419]  kasan_bitops_generic+0x110/0x1c8
[   34.854628]  kunit_try_run_case+0x14c/0x3d0
[   34.855157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.855931]  kthread+0x24c/0x2d0
[   34.856463]  ret_from_fork+0x10/0x20
[   34.857091] 
[   34.857412] Allocated by task 250:
[   34.858567]  kasan_save_stack+0x3c/0x68
[   34.859202]  kasan_save_track+0x20/0x40
[   34.859794]  kasan_save_alloc_info+0x40/0x58
[   34.860421]  __kasan_kmalloc+0xd4/0xd8
[   34.861412]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.862457]  kasan_bitops_generic+0xa0/0x1c8
[   34.863450]  kunit_try_run_case+0x14c/0x3d0
[   34.864323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.865356]  kthread+0x24c/0x2d0
[   34.866381]  ret_from_fork+0x10/0x20
[   34.866938] 
[   34.867316] The buggy address belongs to the object at fff00000c5e082a0
[   34.867316]  which belongs to the cache kmalloc-16 of size 16
[   34.868593] The buggy address is located 8 bytes inside of
[   34.868593]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.869862] 
[   34.870671] The buggy address belongs to the physical page:
[   34.871613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.872289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.873025] page_type: f5(slab)
[   34.873624] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.875099] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.876007] page dumped because: kasan: bad access detected
[   34.876694] 
[   34.877057] Memory state around the buggy address:
[   34.877766]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.878704]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.880449] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.881264]                                   ^
[   34.881904]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.882699]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.884158] ==================================================================
[   34.660042] ==================================================================
[   34.661140] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   34.662108] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.662703] 
[   34.663121] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.664446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.665934] Hardware name: linux,dummy-virt (DT)
[   34.666752] Call trace:
[   34.667349]  show_stack+0x20/0x38 (C)
[   34.668085]  dump_stack_lvl+0x8c/0xd0
[   34.668861]  print_report+0x118/0x5e0
[   34.669619]  kasan_report+0xc8/0x118
[   34.670640]  kasan_check_range+0x100/0x1a8
[   34.671486]  __kasan_check_write+0x20/0x30
[   34.672035]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   34.672916]  kasan_bitops_generic+0x110/0x1c8
[   34.673763]  kunit_try_run_case+0x14c/0x3d0
[   34.674950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.675801]  kthread+0x24c/0x2d0
[   34.676177]  ret_from_fork+0x10/0x20
[   34.676752] 
[   34.677137] Allocated by task 250:
[   34.678189]  kasan_save_stack+0x3c/0x68
[   34.678746]  kasan_save_track+0x20/0x40
[   34.679326]  kasan_save_alloc_info+0x40/0x58
[   34.679947]  __kasan_kmalloc+0xd4/0xd8
[   34.680492]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.681141]  kasan_bitops_generic+0xa0/0x1c8
[   34.681708]  kunit_try_run_case+0x14c/0x3d0
[   34.682371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.683292]  kthread+0x24c/0x2d0
[   34.683895]  ret_from_fork+0x10/0x20
[   34.684472] 
[   34.686090] The buggy address belongs to the object at fff00000c5e082a0
[   34.686090]  which belongs to the cache kmalloc-16 of size 16
[   34.687334] The buggy address is located 8 bytes inside of
[   34.687334]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.688681] 
[   34.689135] The buggy address belongs to the physical page:
[   34.690120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.691163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.692323] page_type: f5(slab)
[   34.692971] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.694246] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.695375] page dumped because: kasan: bad access detected
[   34.696012] 
[   34.696429] Memory state around the buggy address:
[   34.697169]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.698854]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.699686] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.700625]                                   ^
[   34.701346]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.702491]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.703339] ==================================================================

[   28.959279] ==================================================================
[   28.959663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   28.959663] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   28.959663] 
[   28.959663] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   28.959663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.959663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.959663] Call Trace:
[   28.959663]  <TASK>
[   28.959663]  dump_stack_lvl+0x73/0xb0
[   28.959663]  print_report+0xd1/0x640
[   28.959663]  ? __virt_addr_valid+0x1db/0x2d0
[   28.959663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.959663]  kasan_report+0x102/0x140
[   28.959663]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   28.959663]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   28.959663]  kasan_check_range+0x10c/0x1c0
[   28.959663]  __kasan_check_write+0x18/0x20
[   28.959663]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   28.959663]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.959663]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.959663]  ? __pfx_read_hpet+0x10/0x10
[   28.959663]  ? kasan_bitops_generic+0x93/0x1c0
[   28.959663]  kasan_bitops_generic+0x117/0x1c0
[   28.959663]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.959663]  ? ktime_get_ts64+0x84/0x230
[   28.959663]  kunit_try_run_case+0x1b3/0x490
[   28.959663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.959663]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.959663]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.959663]  ? __kthread_parkme+0x82/0x160
[   28.959663]  ? preempt_count_sub+0x50/0x80
[   28.959663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.959663]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.959663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.959663]  kthread+0x257/0x310
[   28.959663]  ? __pfx_kthread+0x10/0x10
[   28.959663]  ret_from_fork+0x41/0x80
[   28.959663]  ? __pfx_kthread+0x10/0x10
[   28.959663]  ret_from_fork_asm+0x1a/0x30
[   28.959663]  </TASK>
[   28.959663] 
[   28.959663] Allocated by task 270:
[   28.959663]  kasan_save_stack+0x3d/0x60
[   28.959663]  kasan_save_track+0x18/0x40
[   28.959663]  kasan_save_alloc_info+0x3b/0x50
[   28.959663]  __kasan_kmalloc+0xb7/0xc0
[   28.959663]  __kmalloc_cache_noprof+0x184/0x410
[   28.959663]  kasan_bitops_generic+0x93/0x1c0
[   28.959663]  kunit_try_run_case+0x1b3/0x490
[   28.959663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.959663]  kthread+0x257/0x310
[   28.959663]  ret_from_fork+0x41/0x80
[   28.959663]  ret_from_fork_asm+0x1a/0x30
[   28.959663] 
[   28.959663] The buggy address belongs to the object at ffff888101a46900
[   28.959663]  which belongs to the cache kmalloc-16 of size 16
[   28.959663] The buggy address is located 8 bytes inside of
[   28.959663]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   28.959663] 
[   28.959663] The buggy address belongs to the physical page:
[   28.959663] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   28.959663] flags: 0x200000000000000(node=0|zone=2)
[   28.959663] page_type: f5(slab)
[   28.959663] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.959663] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.959663] page dumped because: kasan: bad access detected
[   28.959663] 
[   28.959663] Memory state around the buggy address:
[   28.959663]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   28.959663]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.959663] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.959663]                       ^
[   28.959663]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.959663]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.959663] ==================================================================
[   28.910155] ==================================================================
[   28.910155] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   28.910155] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   28.910155] 
[   28.910155] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   28.910155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.910155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.910155] Call Trace:
[   28.910155]  <TASK>
[   28.910155]  dump_stack_lvl+0x73/0xb0
[   28.910155]  print_report+0xd1/0x640
[   28.910155]  ? __virt_addr_valid+0x1db/0x2d0
[   28.910155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.910155]  kasan_report+0x102/0x140
[   28.910155]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   28.910155]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   28.910155]  kasan_check_range+0x10c/0x1c0
[   28.910155]  __kasan_check_write+0x18/0x20
[   28.910155]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   28.910155]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.910155]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.910155]  ? __pfx_read_hpet+0x10/0x10
[   28.910155]  ? kasan_bitops_generic+0x93/0x1c0
[   28.910155]  kasan_bitops_generic+0x117/0x1c0
[   28.910155]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.910155]  ? ktime_get_ts64+0x84/0x230
[   28.910155]  kunit_try_run_case+0x1b3/0x490
[   28.910155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.910155]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.910155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.910155]  ? __kthread_parkme+0x82/0x160
[   28.910155]  ? preempt_count_sub+0x50/0x80
[   28.910155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.910155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.910155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.910155]  kthread+0x257/0x310
[   28.910155]  ? __pfx_kthread+0x10/0x10
[   28.910155]  ret_from_fork+0x41/0x80
[   28.910155]  ? __pfx_kthread+0x10/0x10
[   28.910155]  ret_from_fork_asm+0x1a/0x30
[   28.910155]  </TASK>
[   28.910155] 
[   28.910155] Allocated by task 270:
[   28.910155]  kasan_save_stack+0x3d/0x60
[   28.910155]  kasan_save_track+0x18/0x40
[   28.910155]  kasan_save_alloc_info+0x3b/0x50
[   28.910155]  __kasan_kmalloc+0xb7/0xc0
[   28.910155]  __kmalloc_cache_noprof+0x184/0x410
[   28.910155]  kasan_bitops_generic+0x93/0x1c0
[   28.910155]  kunit_try_run_case+0x1b3/0x490
[   28.910155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.910155]  kthread+0x257/0x310
[   28.910155]  ret_from_fork+0x41/0x80
[   28.910155]  ret_from_fork_asm+0x1a/0x30
[   28.910155] 
[   28.910155] The buggy address belongs to the object at ffff888101a46900
[   28.910155]  which belongs to the cache kmalloc-16 of size 16
[   28.910155] The buggy address is located 8 bytes inside of
[   28.910155]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   28.910155] 
[   28.910155] The buggy address belongs to the physical page:
[   28.910155] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   28.910155] flags: 0x200000000000000(node=0|zone=2)
[   28.910155] page_type: f5(slab)
[   28.910155] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.910155] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.910155] page dumped because: kasan: bad access detected
[   28.910155] 
[   28.910155] Memory state around the buggy address:
[   28.910155]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   28.910155]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.910155] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.910155]                       ^
[   28.910155]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.910155]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.910155] ==================================================================
[   29.010290] ==================================================================
[   29.010772] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   29.011084] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.011084] 
[   29.011084] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.011084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.011084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.011084] Call Trace:
[   29.011084]  <TASK>
[   29.011084]  dump_stack_lvl+0x73/0xb0
[   29.011084]  print_report+0xd1/0x640
[   29.011084]  ? __virt_addr_valid+0x1db/0x2d0
[   29.011084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.011084]  kasan_report+0x102/0x140
[   29.011084]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   29.011084]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   29.011084]  kasan_check_range+0x10c/0x1c0
[   29.011084]  __kasan_check_write+0x18/0x20
[   29.011084]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   29.011084]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.011084]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.011084]  ? __pfx_read_hpet+0x10/0x10
[   29.011084]  ? kasan_bitops_generic+0x93/0x1c0
[   29.011084]  kasan_bitops_generic+0x117/0x1c0
[   29.011084]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.011084]  ? ktime_get_ts64+0x84/0x230
[   29.011084]  kunit_try_run_case+0x1b3/0x490
[   29.011084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.011084]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.011084]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.011084]  ? __kthread_parkme+0x82/0x160
[   29.011084]  ? preempt_count_sub+0x50/0x80
[   29.011084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.011084]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.011084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.011084]  kthread+0x257/0x310
[   29.011084]  ? __pfx_kthread+0x10/0x10
[   29.011084]  ret_from_fork+0x41/0x80
[   29.011084]  ? __pfx_kthread+0x10/0x10
[   29.011084]  ret_from_fork_asm+0x1a/0x30
[   29.011084]  </TASK>
[   29.011084] 
[   29.011084] Allocated by task 270:
[   29.011084]  kasan_save_stack+0x3d/0x60
[   29.011084]  kasan_save_track+0x18/0x40
[   29.011084]  kasan_save_alloc_info+0x3b/0x50
[   29.011084]  __kasan_kmalloc+0xb7/0xc0
[   29.011084]  __kmalloc_cache_noprof+0x184/0x410
[   29.011084]  kasan_bitops_generic+0x93/0x1c0
[   29.011084]  kunit_try_run_case+0x1b3/0x490
[   29.011084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.011084]  kthread+0x257/0x310
[   29.011084]  ret_from_fork+0x41/0x80
[   29.011084]  ret_from_fork_asm+0x1a/0x30
[   29.011084] 
[   29.011084] The buggy address belongs to the object at ffff888101a46900
[   29.011084]  which belongs to the cache kmalloc-16 of size 16
[   29.011084] The buggy address is located 8 bytes inside of
[   29.011084]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.011084] 
[   29.011084] The buggy address belongs to the physical page:
[   29.011084] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.011084] flags: 0x200000000000000(node=0|zone=2)
[   29.011084] page_type: f5(slab)
[   29.011084] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.011084] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.011084] page dumped because: kasan: bad access detected
[   29.011084] 
[   29.011084] Memory state around the buggy address:
[   29.011084]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.011084]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.011084] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.011084]                       ^
[   29.011084]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.011084]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.011084] ==================================================================
[   29.062210] ==================================================================
[   29.062210] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   29.062210] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.062210] 
[   29.062210] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.062210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.062210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.062210] Call Trace:
[   29.062210]  <TASK>
[   29.062210]  dump_stack_lvl+0x73/0xb0
[   29.062210]  print_report+0xd1/0x640
[   29.062210]  ? __virt_addr_valid+0x1db/0x2d0
[   29.062210]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.062210]  kasan_report+0x102/0x140
[   29.062210]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   29.062210]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   29.062210]  kasan_check_range+0x10c/0x1c0
[   29.062210]  __kasan_check_write+0x18/0x20
[   29.062210]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   29.062210]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.062210]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.062210]  ? __pfx_read_hpet+0x10/0x10
[   29.062210]  ? kasan_bitops_generic+0x93/0x1c0
[   29.062210]  kasan_bitops_generic+0x117/0x1c0
[   29.062210]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.062210]  ? ktime_get_ts64+0x84/0x230
[   29.062210]  kunit_try_run_case+0x1b3/0x490
[   29.062210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.062210]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.062210]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.062210]  ? __kthread_parkme+0x82/0x160
[   29.062210]  ? preempt_count_sub+0x50/0x80
[   29.062210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.062210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.062210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.062210]  kthread+0x257/0x310
[   29.062210]  ? __pfx_kthread+0x10/0x10
[   29.062210]  ret_from_fork+0x41/0x80
[   29.062210]  ? __pfx_kthread+0x10/0x10
[   29.062210]  ret_from_fork_asm+0x1a/0x30
[   29.062210]  </TASK>
[   29.062210] 
[   29.062210] Allocated by task 270:
[   29.062210]  kasan_save_stack+0x3d/0x60
[   29.062210]  kasan_save_track+0x18/0x40
[   29.062210]  kasan_save_alloc_info+0x3b/0x50
[   29.062210]  __kasan_kmalloc+0xb7/0xc0
[   29.062210]  __kmalloc_cache_noprof+0x184/0x410
[   29.062210]  kasan_bitops_generic+0x93/0x1c0
[   29.062210]  kunit_try_run_case+0x1b3/0x490
[   29.062210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.062210]  kthread+0x257/0x310
[   29.062210]  ret_from_fork+0x41/0x80
[   29.062210]  ret_from_fork_asm+0x1a/0x30
[   29.062210] 
[   29.062210] The buggy address belongs to the object at ffff888101a46900
[   29.062210]  which belongs to the cache kmalloc-16 of size 16
[   29.062210] The buggy address is located 8 bytes inside of
[   29.062210]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.062210] 
[   29.062210] The buggy address belongs to the physical page:
[   29.062210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.062210] flags: 0x200000000000000(node=0|zone=2)
[   29.062210] page_type: f5(slab)
[   29.062210] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.062210] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.062210] page dumped because: kasan: bad access detected
[   29.062210] 
[   29.062210] Memory state around the buggy address:
[   29.062210]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.062210]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.062210] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.062210]                       ^
[   29.062210]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.062210]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.062210] ==================================================================
[   29.159764] ==================================================================
[   29.160481] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   29.160481] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.160481] 
[   29.160481] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.160481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.160481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.160481] Call Trace:
[   29.160481]  <TASK>
[   29.160481]  dump_stack_lvl+0x73/0xb0
[   29.160481]  print_report+0xd1/0x640
[   29.160481]  ? __virt_addr_valid+0x1db/0x2d0
[   29.160481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.160481]  kasan_report+0x102/0x140
[   29.160481]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   29.160481]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   29.160481]  kasan_check_range+0x10c/0x1c0
[   29.160481]  __kasan_check_write+0x18/0x20
[   29.160481]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   29.160481]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.160481]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.160481]  ? __pfx_read_hpet+0x10/0x10
[   29.160481]  ? kasan_bitops_generic+0x93/0x1c0
[   29.160481]  kasan_bitops_generic+0x117/0x1c0
[   29.160481]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.160481]  ? ktime_get_ts64+0x84/0x230
[   29.160481]  kunit_try_run_case+0x1b3/0x490
[   29.160481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.160481]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.160481]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.160481]  ? __kthread_parkme+0x82/0x160
[   29.160481]  ? preempt_count_sub+0x50/0x80
[   29.160481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.160481]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.160481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.160481]  kthread+0x257/0x310
[   29.160481]  ? __pfx_kthread+0x10/0x10
[   29.160481]  ret_from_fork+0x41/0x80
[   29.160481]  ? __pfx_kthread+0x10/0x10
[   29.160481]  ret_from_fork_asm+0x1a/0x30
[   29.160481]  </TASK>
[   29.160481] 
[   29.160481] Allocated by task 270:
[   29.160481]  kasan_save_stack+0x3d/0x60
[   29.160481]  kasan_save_track+0x18/0x40
[   29.160481]  kasan_save_alloc_info+0x3b/0x50
[   29.160481]  __kasan_kmalloc+0xb7/0xc0
[   29.160481]  __kmalloc_cache_noprof+0x184/0x410
[   29.160481]  kasan_bitops_generic+0x93/0x1c0
[   29.160481]  kunit_try_run_case+0x1b3/0x490
[   29.160481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.160481]  kthread+0x257/0x310
[   29.160481]  ret_from_fork+0x41/0x80
[   29.160481]  ret_from_fork_asm+0x1a/0x30
[   29.160481] 
[   29.160481] The buggy address belongs to the object at ffff888101a46900
[   29.160481]  which belongs to the cache kmalloc-16 of size 16
[   29.160481] The buggy address is located 8 bytes inside of
[   29.160481]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.160481] 
[   29.160481] The buggy address belongs to the physical page:
[   29.160481] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.160481] flags: 0x200000000000000(node=0|zone=2)
[   29.160481] page_type: f5(slab)
[   29.160481] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.160481] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.160481] page dumped because: kasan: bad access detected
[   29.160481] 
[   29.160481] Memory state around the buggy address:
[   29.160481]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.160481]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.160481] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.160481]                       ^
[   29.160481]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.160481]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.160481] ==================================================================
[   29.201005] ==================================================================
[   29.201255] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   29.201255] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.201255] 
[   29.201255] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.201255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.201255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.201255] Call Trace:
[   29.201255]  <TASK>
[   29.201255]  dump_stack_lvl+0x73/0xb0
[   29.201255]  print_report+0xd1/0x640
[   29.201255]  ? __virt_addr_valid+0x1db/0x2d0
[   29.201255]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.201255]  kasan_report+0x102/0x140
[   29.201255]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   29.201255]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   29.201255]  kasan_check_range+0x10c/0x1c0
[   29.201255]  __kasan_check_write+0x18/0x20
[   29.201255]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   29.201255]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.201255]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.201255]  ? __pfx_read_hpet+0x10/0x10
[   29.201255]  ? kasan_bitops_generic+0x93/0x1c0
[   29.201255]  kasan_bitops_generic+0x117/0x1c0
[   29.201255]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.201255]  ? ktime_get_ts64+0x84/0x230
[   29.201255]  kunit_try_run_case+0x1b3/0x490
[   29.201255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.201255]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.201255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.201255]  ? __kthread_parkme+0x82/0x160
[   29.201255]  ? preempt_count_sub+0x50/0x80
[   29.201255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.201255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.201255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.201255]  kthread+0x257/0x310
[   29.201255]  ? __pfx_kthread+0x10/0x10
[   29.201255]  ret_from_fork+0x41/0x80
[   29.201255]  ? __pfx_kthread+0x10/0x10
[   29.201255]  ret_from_fork_asm+0x1a/0x30
[   29.201255]  </TASK>
[   29.201255] 
[   29.201255] Allocated by task 270:
[   29.201255]  kasan_save_stack+0x3d/0x60
[   29.201255]  kasan_save_track+0x18/0x40
[   29.201255]  kasan_save_alloc_info+0x3b/0x50
[   29.201255]  __kasan_kmalloc+0xb7/0xc0
[   29.201255]  __kmalloc_cache_noprof+0x184/0x410
[   29.201255]  kasan_bitops_generic+0x93/0x1c0
[   29.201255]  kunit_try_run_case+0x1b3/0x490
[   29.201255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.201255]  kthread+0x257/0x310
[   29.201255]  ret_from_fork+0x41/0x80
[   29.201255]  ret_from_fork_asm+0x1a/0x30
[   29.201255] 
[   29.201255] The buggy address belongs to the object at ffff888101a46900
[   29.201255]  which belongs to the cache kmalloc-16 of size 16
[   29.201255] The buggy address is located 8 bytes inside of
[   29.201255]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.201255] 
[   29.201255] The buggy address belongs to the physical page:
[   29.201255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.201255] flags: 0x200000000000000(node=0|zone=2)
[   29.201255] page_type: f5(slab)
[   29.201255] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.201255] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.201255] page dumped because: kasan: bad access detected
[   29.201255] 
[   29.201255] Memory state around the buggy address:
[   29.201255]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.201255]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.201255] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.201255]                       ^
[   29.201255]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.201255]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.201255] ==================================================================
[   28.857750] ==================================================================
[   28.858196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   28.858196] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   28.858196] 
[   28.858196] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   28.858196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.858196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.858196] Call Trace:
[   28.858196]  <TASK>
[   28.858196]  dump_stack_lvl+0x73/0xb0
[   28.858196]  print_report+0xd1/0x640
[   28.858196]  ? __virt_addr_valid+0x1db/0x2d0
[   28.858196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.858196]  kasan_report+0x102/0x140
[   28.858196]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   28.858196]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   28.858196]  kasan_check_range+0x10c/0x1c0
[   28.858196]  __kasan_check_write+0x18/0x20
[   28.858196]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   28.858196]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.858196]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.858196]  ? __pfx_read_hpet+0x10/0x10
[   28.858196]  ? kasan_bitops_generic+0x93/0x1c0
[   28.858196]  kasan_bitops_generic+0x117/0x1c0
[   28.858196]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.858196]  ? ktime_get_ts64+0x84/0x230
[   28.858196]  kunit_try_run_case+0x1b3/0x490
[   28.858196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.858196]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.858196]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.858196]  ? __kthread_parkme+0x82/0x160
[   28.858196]  ? preempt_count_sub+0x50/0x80
[   28.858196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.858196]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.858196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.858196]  kthread+0x257/0x310
[   28.858196]  ? __pfx_kthread+0x10/0x10
[   28.858196]  ret_from_fork+0x41/0x80
[   28.858196]  ? __pfx_kthread+0x10/0x10
[   28.858196]  ret_from_fork_asm+0x1a/0x30
[   28.858196]  </TASK>
[   28.858196] 
[   28.858196] Allocated by task 270:
[   28.858196]  kasan_save_stack+0x3d/0x60
[   28.858196]  kasan_save_track+0x18/0x40
[   28.858196]  kasan_save_alloc_info+0x3b/0x50
[   28.858196]  __kasan_kmalloc+0xb7/0xc0
[   28.858196]  __kmalloc_cache_noprof+0x184/0x410
[   28.858196]  kasan_bitops_generic+0x93/0x1c0
[   28.858196]  kunit_try_run_case+0x1b3/0x490
[   28.858196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.858196]  kthread+0x257/0x310
[   28.858196]  ret_from_fork+0x41/0x80
[   28.858196]  ret_from_fork_asm+0x1a/0x30
[   28.858196] 
[   28.858196] The buggy address belongs to the object at ffff888101a46900
[   28.858196]  which belongs to the cache kmalloc-16 of size 16
[   28.858196] The buggy address is located 8 bytes inside of
[   28.858196]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   28.858196] 
[   28.858196] The buggy address belongs to the physical page:
[   28.858196] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   28.858196] flags: 0x200000000000000(node=0|zone=2)
[   28.858196] page_type: f5(slab)
[   28.858196] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.858196] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.858196] page dumped because: kasan: bad access detected
[   28.858196] 
[   28.858196] Memory state around the buggy address:
[   28.858196]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   28.858196]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.858196] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.858196]                       ^
[   28.858196]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.858196]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.858196] ==================================================================
[   29.114179] ==================================================================
[   29.114179] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   29.114179] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270
[   29.114179] 
[   29.114179] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.114179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.114179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.114179] Call Trace:
[   29.114179]  <TASK>
[   29.114179]  dump_stack_lvl+0x73/0xb0
[   29.114179]  print_report+0xd1/0x640
[   29.114179]  ? __virt_addr_valid+0x1db/0x2d0
[   29.114179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.114179]  kasan_report+0x102/0x140
[   29.114179]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   29.114179]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   29.114179]  kasan_check_range+0x10c/0x1c0
[   29.114179]  __kasan_check_write+0x18/0x20
[   29.114179]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   29.114179]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.114179]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.114179]  ? __pfx_read_hpet+0x10/0x10
[   29.114179]  ? kasan_bitops_generic+0x93/0x1c0
[   29.114179]  kasan_bitops_generic+0x117/0x1c0
[   29.114179]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.114179]  ? ktime_get_ts64+0x84/0x230
[   29.114179]  kunit_try_run_case+0x1b3/0x490
[   29.114179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.114179]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.114179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.114179]  ? __kthread_parkme+0x82/0x160
[   29.114179]  ? preempt_count_sub+0x50/0x80
[   29.114179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.114179]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.114179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.114179]  kthread+0x257/0x310
[   29.114179]  ? __pfx_kthread+0x10/0x10
[   29.114179]  ret_from_fork+0x41/0x80
[   29.114179]  ? __pfx_kthread+0x10/0x10
[   29.114179]  ret_from_fork_asm+0x1a/0x30
[   29.114179]  </TASK>
[   29.114179] 
[   29.114179] Allocated by task 270:
[   29.114179]  kasan_save_stack+0x3d/0x60
[   29.114179]  kasan_save_track+0x18/0x40
[   29.114179]  kasan_save_alloc_info+0x3b/0x50
[   29.114179]  __kasan_kmalloc+0xb7/0xc0
[   29.114179]  __kmalloc_cache_noprof+0x184/0x410
[   29.114179]  kasan_bitops_generic+0x93/0x1c0
[   29.114179]  kunit_try_run_case+0x1b3/0x490
[   29.114179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.114179]  kthread+0x257/0x310
[   29.114179]  ret_from_fork+0x41/0x80
[   29.114179]  ret_from_fork_asm+0x1a/0x30
[   29.114179] 
[   29.114179] The buggy address belongs to the object at ffff888101a46900
[   29.114179]  which belongs to the cache kmalloc-16 of size 16
[   29.114179] The buggy address is located 8 bytes inside of
[   29.114179]  allocated 9-byte region [ffff888101a46900, ffff888101a46909)
[   29.114179] 
[   29.114179] The buggy address belongs to the physical page:
[   29.114179] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46
[   29.114179] flags: 0x200000000000000(node=0|zone=2)
[   29.114179] page_type: f5(slab)
[   29.114179] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.114179] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.114179] page dumped because: kasan: bad access detected
[   29.114179] 
[   29.114179] Memory state around the buggy address:
[   29.114179]  ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.114179]  ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.114179] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.114179]                       ^
[   29.114179]  ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.114179]  ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.114179] ==================================================================

[   23.870079] ==================================================================
[   23.871611] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   23.872233] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   23.872662] 
[   23.873272] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   23.874543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.874917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.875930] Call Trace:
[   23.876411]  <TASK>
[   23.876929]  dump_stack_lvl+0x73/0xb0
[   23.877456]  print_report+0xd1/0x640
[   23.878101]  ? __virt_addr_valid+0x1db/0x2d0
[   23.878737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.879433]  kasan_report+0x102/0x140
[   23.880061]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   23.880591]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   23.881420]  kasan_check_range+0x10c/0x1c0
[   23.882105]  __kasan_check_write+0x18/0x20
[   23.882718]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   23.883221]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.884176]  ? __kmalloc_cache_noprof+0x184/0x410
[   23.884846]  ? trace_hardirqs_on+0x37/0xe0
[   23.885426]  ? kasan_bitops_generic+0x93/0x1c0
[   23.886175]  kasan_bitops_generic+0x117/0x1c0
[   23.886706]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.887303]  ? __pfx_read_tsc+0x10/0x10
[   23.887732]  ? ktime_get_ts64+0x84/0x230
[   23.888110]  kunit_try_run_case+0x1b3/0x490
[   23.889281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.889712]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.890417]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.890939]  ? __kthread_parkme+0x82/0x160
[   23.891331]  ? preempt_count_sub+0x50/0x80
[   23.891847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.892266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.892785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.893332]  kthread+0x257/0x310
[   23.893782]  ? __pfx_kthread+0x10/0x10
[   23.894199]  ret_from_fork+0x41/0x80
[   23.894475]  ? __pfx_kthread+0x10/0x10
[   23.894963]  ret_from_fork_asm+0x1a/0x30
[   23.895520]  </TASK>
[   23.895857] 
[   23.896039] Allocated by task 268:
[   23.896270]  kasan_save_stack+0x3d/0x60
[   23.896668]  kasan_save_track+0x18/0x40
[   23.897193]  kasan_save_alloc_info+0x3b/0x50
[   23.897674]  __kasan_kmalloc+0xb7/0xc0
[   23.897945]  __kmalloc_cache_noprof+0x184/0x410
[   23.898238]  kasan_bitops_generic+0x93/0x1c0
[   23.898741]  kunit_try_run_case+0x1b3/0x490
[   23.899347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.899997]  kthread+0x257/0x310
[   23.900342]  ret_from_fork+0x41/0x80
[   23.900764]  ret_from_fork_asm+0x1a/0x30
[   23.901042] 
[   23.901199] The buggy address belongs to the object at ffff8881028a7080
[   23.901199]  which belongs to the cache kmalloc-16 of size 16
[   23.902059] The buggy address is located 8 bytes inside of
[   23.902059]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   23.903057] 
[   23.903223] The buggy address belongs to the physical page:
[   23.903533] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   23.904257] flags: 0x200000000000000(node=0|zone=2)
[   23.904817] page_type: f5(slab)
[   23.905222] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.905921] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   23.906321] page dumped because: kasan: bad access detected
[   23.906867] 
[   23.907149] Memory state around the buggy address:
[   23.907591]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.908139]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.908535] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.909186]                       ^
[   23.909631]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.910357]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.910892] ==================================================================
[   23.696676] ==================================================================
[   23.697849] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   23.698537] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   23.699971] 
[   23.700248] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   23.701316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.701751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.702840] Call Trace:
[   23.703176]  <TASK>
[   23.703766]  dump_stack_lvl+0x73/0xb0
[   23.704077]  print_report+0xd1/0x640
[   23.704872]  ? __virt_addr_valid+0x1db/0x2d0
[   23.705285]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.706211]  kasan_report+0x102/0x140
[   23.707030]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   23.707509]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   23.708035]  kasan_check_range+0x10c/0x1c0
[   23.708776]  __kasan_check_write+0x18/0x20
[   23.709234]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   23.710084]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.710843]  ? __kmalloc_cache_noprof+0x184/0x410
[   23.711259]  ? trace_hardirqs_on+0x37/0xe0
[   23.712016]  ? kasan_bitops_generic+0x93/0x1c0
[   23.713045]  kasan_bitops_generic+0x117/0x1c0
[   23.713461]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.714215]  ? __pfx_read_tsc+0x10/0x10
[   23.714599]  ? ktime_get_ts64+0x84/0x230
[   23.715518]  kunit_try_run_case+0x1b3/0x490
[   23.715941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.716560]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.716936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.717348]  ? __kthread_parkme+0x82/0x160
[   23.718285]  ? preempt_count_sub+0x50/0x80
[   23.718662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.719469]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.720231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.721238]  kthread+0x257/0x310
[   23.721585]  ? __pfx_kthread+0x10/0x10
[   23.722134]  ret_from_fork+0x41/0x80
[   23.722570]  ? __pfx_kthread+0x10/0x10
[   23.722874]  ret_from_fork_asm+0x1a/0x30
[   23.723280]  </TASK>
[   23.724149] 
[   23.724311] Allocated by task 268:
[   23.724917]  kasan_save_stack+0x3d/0x60
[   23.725437]  kasan_save_track+0x18/0x40
[   23.725967]  kasan_save_alloc_info+0x3b/0x50
[   23.726466]  __kasan_kmalloc+0xb7/0xc0
[   23.726983]  __kmalloc_cache_noprof+0x184/0x410
[   23.727503]  kasan_bitops_generic+0x93/0x1c0
[   23.727979]  kunit_try_run_case+0x1b3/0x490
[   23.728438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.728852]  kthread+0x257/0x310
[   23.729199]  ret_from_fork+0x41/0x80
[   23.729632]  ret_from_fork_asm+0x1a/0x30
[   23.729958] 
[   23.730174] The buggy address belongs to the object at ffff8881028a7080
[   23.730174]  which belongs to the cache kmalloc-16 of size 16
[   23.731125] The buggy address is located 8 bytes inside of
[   23.731125]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   23.731896] 
[   23.732131] The buggy address belongs to the physical page:
[   23.732711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   23.733235] flags: 0x200000000000000(node=0|zone=2)
[   23.733621] page_type: f5(slab)
[   23.733983] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.734658] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   23.735147] page dumped because: kasan: bad access detected
[   23.735749] 
[   23.735911] Memory state around the buggy address:
[   23.736194]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.736661]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.737287] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.737957]                       ^
[   23.738346]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.739027]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.739453] ==================================================================
[   23.826899] ==================================================================
[   23.827674] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   23.828537] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   23.829304] 
[   23.829694] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   23.831122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.831603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.832698] Call Trace:
[   23.832982]  <TASK>
[   23.833239]  dump_stack_lvl+0x73/0xb0
[   23.833804]  print_report+0xd1/0x640
[   23.834051]  ? __virt_addr_valid+0x1db/0x2d0
[   23.834233]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.834419]  kasan_report+0x102/0x140
[   23.834857]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   23.835386]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   23.836196]  kasan_check_range+0x10c/0x1c0
[   23.836531]  __kasan_check_write+0x18/0x20
[   23.836974]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   23.837553]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.838480]  ? __kmalloc_cache_noprof+0x184/0x410
[   23.839507]  ? trace_hardirqs_on+0x37/0xe0
[   23.840045]  ? kasan_bitops_generic+0x93/0x1c0
[   23.840445]  kasan_bitops_generic+0x117/0x1c0
[   23.840830]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.841209]  ? __pfx_read_tsc+0x10/0x10
[   23.841521]  ? ktime_get_ts64+0x84/0x230
[   23.841965]  kunit_try_run_case+0x1b3/0x490
[   23.842444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.842985]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.843327]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.843897]  ? __kthread_parkme+0x82/0x160
[   23.844567]  ? preempt_count_sub+0x50/0x80
[   23.845085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.845445]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.846122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.846639]  kthread+0x257/0x310
[   23.847028]  ? __pfx_kthread+0x10/0x10
[   23.847427]  ret_from_fork+0x41/0x80
[   23.848145]  ? __pfx_kthread+0x10/0x10
[   23.848626]  ret_from_fork_asm+0x1a/0x30
[   23.849249]  </TASK>
[   23.849687] 
[   23.849931] Allocated by task 268:
[   23.850392]  kasan_save_stack+0x3d/0x60
[   23.851004]  kasan_save_track+0x18/0x40
[   23.851559]  kasan_save_alloc_info+0x3b/0x50
[   23.852131]  __kasan_kmalloc+0xb7/0xc0
[   23.852546]  __kmalloc_cache_noprof+0x184/0x410
[   23.853254]  kasan_bitops_generic+0x93/0x1c0
[   23.853802]  kunit_try_run_case+0x1b3/0x490
[   23.854652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.855118]  kthread+0x257/0x310
[   23.855445]  ret_from_fork+0x41/0x80
[   23.856330]  ret_from_fork_asm+0x1a/0x30
[   23.856661] 
[   23.857105] The buggy address belongs to the object at ffff8881028a7080
[   23.857105]  which belongs to the cache kmalloc-16 of size 16
[   23.858247] The buggy address is located 8 bytes inside of
[   23.858247]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   23.859097] 
[   23.859334] The buggy address belongs to the physical page:
[   23.859885] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   23.860294] flags: 0x200000000000000(node=0|zone=2)
[   23.860835] page_type: f5(slab)
[   23.861274] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.862017] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   23.862804] page dumped because: kasan: bad access detected
[   23.863362] 
[   23.863733] Memory state around the buggy address:
[   23.864328]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.865152]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.865998] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.866829]                       ^
[   23.867127]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.867852]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.868415] ==================================================================
[   23.781540] ==================================================================
[   23.782941] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   23.783707] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   23.784189] 
[   23.784378] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   23.785321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.785868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.786538] Call Trace:
[   23.786941]  <TASK>
[   23.787228]  dump_stack_lvl+0x73/0xb0
[   23.787709]  print_report+0xd1/0x640
[   23.788167]  ? __virt_addr_valid+0x1db/0x2d0
[   23.788641]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.788991]  kasan_report+0x102/0x140
[   23.789275]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   23.789793]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   23.790408]  kasan_check_range+0x10c/0x1c0
[   23.790949]  __kasan_check_write+0x18/0x20
[   23.791404]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   23.792048]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.792558]  ? __kmalloc_cache_noprof+0x184/0x410
[   23.792981]  ? trace_hardirqs_on+0x37/0xe0
[   23.793477]  ? kasan_bitops_generic+0x93/0x1c0
[   23.793913]  kasan_bitops_generic+0x117/0x1c0
[   23.794452]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.794914]  ? __pfx_read_tsc+0x10/0x10
[   23.795467]  ? ktime_get_ts64+0x84/0x230
[   23.795855]  kunit_try_run_case+0x1b3/0x490
[   23.796160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.797546]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.798931]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.800182]  ? __kthread_parkme+0x82/0x160
[   23.800694]  ? preempt_count_sub+0x50/0x80
[   23.801004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.801510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.802353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.803348]  kthread+0x257/0x310
[   23.803812]  ? __pfx_kthread+0x10/0x10
[   23.804662]  ret_from_fork+0x41/0x80
[   23.805271]  ? __pfx_kthread+0x10/0x10
[   23.806186]  ret_from_fork_asm+0x1a/0x30
[   23.806676]  </TASK>
[   23.806920] 
[   23.807092] Allocated by task 268:
[   23.807405]  kasan_save_stack+0x3d/0x60
[   23.807795]  kasan_save_track+0x18/0x40
[   23.808162]  kasan_save_alloc_info+0x3b/0x50
[   23.809718]  __kasan_kmalloc+0xb7/0xc0
[   23.810271]  __kmalloc_cache_noprof+0x184/0x410
[   23.810797]  kasan_bitops_generic+0x93/0x1c0
[   23.811149]  kunit_try_run_case+0x1b3/0x490
[   23.811799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.812153]  kthread+0x257/0x310
[   23.812593]  ret_from_fork+0x41/0x80
[   23.812932]  ret_from_fork_asm+0x1a/0x30
[   23.813377] 
[   23.813793] The buggy address belongs to the object at ffff8881028a7080
[   23.813793]  which belongs to the cache kmalloc-16 of size 16
[   23.814733] The buggy address is located 8 bytes inside of
[   23.814733]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   23.815443] 
[   23.815984] The buggy address belongs to the physical page:
[   23.816508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   23.818328] flags: 0x200000000000000(node=0|zone=2)
[   23.818831] page_type: f5(slab)
[   23.819284] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.820020] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   23.820754] page dumped because: kasan: bad access detected
[   23.821369] 
[   23.821613] Memory state around the buggy address:
[   23.822297]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.823386]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.823810] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.824035]                       ^
[   23.824167]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.824376]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.824684] ==================================================================
[   23.741701] ==================================================================
[   23.742397] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   23.743715] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   23.744267] 
[   23.744455] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   23.745374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.745746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.747366] Call Trace:
[   23.747714]  <TASK>
[   23.747922]  dump_stack_lvl+0x73/0xb0
[   23.748215]  print_report+0xd1/0x640
[   23.748521]  ? __virt_addr_valid+0x1db/0x2d0
[   23.749040]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.749659]  kasan_report+0x102/0x140
[   23.750110]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   23.750733]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   23.751295]  kasan_check_range+0x10c/0x1c0
[   23.751824]  __kasan_check_write+0x18/0x20
[   23.752247]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   23.752745]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.753321]  ? __kmalloc_cache_noprof+0x184/0x410
[   23.753766]  ? trace_hardirqs_on+0x37/0xe0
[   23.754076]  ? kasan_bitops_generic+0x93/0x1c0
[   23.754399]  kasan_bitops_generic+0x117/0x1c0
[   23.754783]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.755350]  ? __pfx_read_tsc+0x10/0x10
[   23.755850]  ? ktime_get_ts64+0x84/0x230
[   23.756303]  kunit_try_run_case+0x1b3/0x490
[   23.756826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.757315]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.757872]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.758387]  ? __kthread_parkme+0x82/0x160
[   23.758895]  ? preempt_count_sub+0x50/0x80
[   23.759312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.759694]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.760284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.760890]  kthread+0x257/0x310
[   23.761285]  ? __pfx_kthread+0x10/0x10
[   23.761761]  ret_from_fork+0x41/0x80
[   23.762070]  ? __pfx_kthread+0x10/0x10
[   23.762468]  ret_from_fork_asm+0x1a/0x30
[   23.762846]  </TASK>
[   23.763132] 
[   23.763342] Allocated by task 268:
[   23.763765]  kasan_save_stack+0x3d/0x60
[   23.764180]  kasan_save_track+0x18/0x40
[   23.764616]  kasan_save_alloc_info+0x3b/0x50
[   23.764941]  __kasan_kmalloc+0xb7/0xc0
[   23.765256]  __kmalloc_cache_noprof+0x184/0x410
[   23.765654]  kasan_bitops_generic+0x93/0x1c0
[   23.766108]  kunit_try_run_case+0x1b3/0x490
[   23.766608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.767143]  kthread+0x257/0x310
[   23.767431]  ret_from_fork+0x41/0x80
[   23.767771]  ret_from_fork_asm+0x1a/0x30
[   23.768043] 
[   23.768265] The buggy address belongs to the object at ffff8881028a7080
[   23.768265]  which belongs to the cache kmalloc-16 of size 16
[   23.769325] The buggy address is located 8 bytes inside of
[   23.769325]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   23.770287] 
[   23.770478] The buggy address belongs to the physical page:
[   23.771053] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   23.771531] flags: 0x200000000000000(node=0|zone=2)
[   23.772009] page_type: f5(slab)
[   23.772372] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.773106] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   23.773542] page dumped because: kasan: bad access detected
[   23.774105] 
[   23.774325] Memory state around the buggy address:
[   23.774729]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.775106]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.775833] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.776446]                       ^
[   23.776888]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.777462]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.780147] ==================================================================
[   23.949474] ==================================================================
[   23.951865] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   23.952641] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   23.954621] 
[   23.954898] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   23.955460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.955978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.958285] Call Trace:
[   23.958630]  <TASK>
[   23.958915]  dump_stack_lvl+0x73/0xb0
[   23.959345]  print_report+0xd1/0x640
[   23.960980]  ? __virt_addr_valid+0x1db/0x2d0
[   23.962790]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.963109]  kasan_report+0x102/0x140
[   23.963365]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   23.964869]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   23.965542]  kasan_check_range+0x10c/0x1c0
[   23.966425]  __kasan_check_write+0x18/0x20
[   23.966900]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   23.967470]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.968150]  ? __kmalloc_cache_noprof+0x184/0x410
[   23.968506]  ? trace_hardirqs_on+0x37/0xe0
[   23.969039]  ? kasan_bitops_generic+0x93/0x1c0
[   23.969551]  kasan_bitops_generic+0x117/0x1c0
[   23.970179]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.970935]  ? __pfx_read_tsc+0x10/0x10
[   23.971316]  ? ktime_get_ts64+0x84/0x230
[   23.971817]  kunit_try_run_case+0x1b3/0x490
[   23.972263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.972789]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.973107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.973426]  ? __kthread_parkme+0x82/0x160
[   23.973799]  ? preempt_count_sub+0x50/0x80
[   23.974276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.975168]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.975902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.976545]  kthread+0x257/0x310
[   23.976917]  ? __pfx_kthread+0x10/0x10
[   23.977275]  ret_from_fork+0x41/0x80
[   23.977651]  ? __pfx_kthread+0x10/0x10
[   23.978066]  ret_from_fork_asm+0x1a/0x30
[   23.978633]  </TASK>
[   23.978862] 
[   23.979018] Allocated by task 268:
[   23.979241]  kasan_save_stack+0x3d/0x60
[   23.979755]  kasan_save_track+0x18/0x40
[   23.980200]  kasan_save_alloc_info+0x3b/0x50
[   23.980723]  __kasan_kmalloc+0xb7/0xc0
[   23.981180]  __kmalloc_cache_noprof+0x184/0x410
[   23.981512]  kasan_bitops_generic+0x93/0x1c0
[   23.982062]  kunit_try_run_case+0x1b3/0x490
[   23.982559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.983018]  kthread+0x257/0x310
[   23.983399]  ret_from_fork+0x41/0x80
[   23.983830]  ret_from_fork_asm+0x1a/0x30
[   23.984297] 
[   23.984534] The buggy address belongs to the object at ffff8881028a7080
[   23.984534]  which belongs to the cache kmalloc-16 of size 16
[   23.985364] The buggy address is located 8 bytes inside of
[   23.985364]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   23.986263] 
[   23.986431] The buggy address belongs to the physical page:
[   23.986797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   23.987450] flags: 0x200000000000000(node=0|zone=2)
[   23.988011] page_type: f5(slab)
[   23.988408] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.989156] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   23.989845] page dumped because: kasan: bad access detected
[   23.990164] 
[   23.990318] Memory state around the buggy address:
[   23.990725]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.991364]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.992126] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.992827]                       ^
[   23.993207]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.994161]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.995375] ==================================================================
[   23.913030] ==================================================================
[   23.913850] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   23.914693] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   23.915175] 
[   23.915364] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   23.916307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.916784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.917620] Call Trace:
[   23.917916]  <TASK>
[   23.918129]  dump_stack_lvl+0x73/0xb0
[   23.918419]  print_report+0xd1/0x640
[   23.918880]  ? __virt_addr_valid+0x1db/0x2d0
[   23.919505]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.920093]  kasan_report+0x102/0x140
[   23.920577]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   23.921198]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   23.921648]  kasan_check_range+0x10c/0x1c0
[   23.922153]  __kasan_check_write+0x18/0x20
[   23.922593]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   23.923107]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.923466]  ? __kmalloc_cache_noprof+0x184/0x410
[   23.923978]  ? trace_hardirqs_on+0x37/0xe0
[   23.924610]  ? kasan_bitops_generic+0x93/0x1c0
[   23.925111]  kasan_bitops_generic+0x117/0x1c0
[   23.925503]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.926050]  ? __pfx_read_tsc+0x10/0x10
[   23.926441]  ? ktime_get_ts64+0x84/0x230
[   23.927011]  kunit_try_run_case+0x1b3/0x490
[   23.927354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.927939]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.928308]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.928883]  ? __kthread_parkme+0x82/0x160
[   23.929272]  ? preempt_count_sub+0x50/0x80
[   23.929595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.929902]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.930281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.930751]  kthread+0x257/0x310
[   23.931144]  ? __pfx_kthread+0x10/0x10
[   23.931588]  ret_from_fork+0x41/0x80
[   23.932121]  ? __pfx_kthread+0x10/0x10
[   23.932582]  ret_from_fork_asm+0x1a/0x30
[   23.933072]  </TASK>
[   23.933346] 
[   23.933621] Allocated by task 268:
[   23.933984]  kasan_save_stack+0x3d/0x60
[   23.934415]  kasan_save_track+0x18/0x40
[   23.934987]  kasan_save_alloc_info+0x3b/0x50
[   23.935386]  __kasan_kmalloc+0xb7/0xc0
[   23.935782]  __kmalloc_cache_noprof+0x184/0x410
[   23.936276]  kasan_bitops_generic+0x93/0x1c0
[   23.936603]  kunit_try_run_case+0x1b3/0x490
[   23.937090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.937447]  kthread+0x257/0x310
[   23.937903]  ret_from_fork+0x41/0x80
[   23.938339]  ret_from_fork_asm+0x1a/0x30
[   23.938851] 
[   23.939049] The buggy address belongs to the object at ffff8881028a7080
[   23.939049]  which belongs to the cache kmalloc-16 of size 16
[   23.939638] The buggy address is located 8 bytes inside of
[   23.939638]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   23.940705] 
[   23.940966] The buggy address belongs to the physical page:
[   23.941659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   23.942172] flags: 0x200000000000000(node=0|zone=2)
[   23.942503] page_type: f5(slab)
[   23.942727] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.943073] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   23.943411] page dumped because: kasan: bad access detected
[   23.943702] 
[   23.943840] Memory state around the buggy address:
[   23.944083]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.944422]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.944814] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.945306]                       ^
[   23.945706]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.946388]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.947131] ==================================================================
[   23.997453] ==================================================================
[   23.999276] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   24.000690] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268
[   24.001310] 
[   24.001536] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.002053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.002443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.003330] Call Trace:
[   24.004403]  <TASK>
[   24.004661]  dump_stack_lvl+0x73/0xb0
[   24.004949]  print_report+0xd1/0x640
[   24.005226]  ? __virt_addr_valid+0x1db/0x2d0
[   24.005727]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.006236]  kasan_report+0x102/0x140
[   24.007725]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   24.008278]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   24.009023]  kasan_check_range+0x10c/0x1c0
[   24.009427]  __kasan_check_write+0x18/0x20
[   24.010095]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   24.010785]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   24.011439]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.011824]  ? trace_hardirqs_on+0x37/0xe0
[   24.012257]  ? kasan_bitops_generic+0x93/0x1c0
[   24.012805]  kasan_bitops_generic+0x117/0x1c0
[   24.013431]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.014117]  ? __pfx_read_tsc+0x10/0x10
[   24.014655]  ? ktime_get_ts64+0x84/0x230
[   24.015253]  kunit_try_run_case+0x1b3/0x490
[   24.015901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.016455]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.016894]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.017321]  ? __kthread_parkme+0x82/0x160
[   24.017810]  ? preempt_count_sub+0x50/0x80
[   24.018202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.018732]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.019293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.019825]  kthread+0x257/0x310
[   24.020327]  ? __pfx_kthread+0x10/0x10
[   24.020901]  ret_from_fork+0x41/0x80
[   24.021403]  ? __pfx_kthread+0x10/0x10
[   24.021867]  ret_from_fork_asm+0x1a/0x30
[   24.022425]  </TASK>
[   24.022758] 
[   24.022917] Allocated by task 268:
[   24.023191]  kasan_save_stack+0x3d/0x60
[   24.023797]  kasan_save_track+0x18/0x40
[   24.024256]  kasan_save_alloc_info+0x3b/0x50
[   24.024844]  __kasan_kmalloc+0xb7/0xc0
[   24.025296]  __kmalloc_cache_noprof+0x184/0x410
[   24.025907]  kasan_bitops_generic+0x93/0x1c0
[   24.026306]  kunit_try_run_case+0x1b3/0x490
[   24.026843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.027409]  kthread+0x257/0x310
[   24.027858]  ret_from_fork+0x41/0x80
[   24.028347]  ret_from_fork_asm+0x1a/0x30
[   24.028815] 
[   24.029071] The buggy address belongs to the object at ffff8881028a7080
[   24.029071]  which belongs to the cache kmalloc-16 of size 16
[   24.029832] The buggy address is located 8 bytes inside of
[   24.029832]  allocated 9-byte region [ffff8881028a7080, ffff8881028a7089)
[   24.030870] 
[   24.031177] The buggy address belongs to the physical page:
[   24.031733] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7
[   24.032399] flags: 0x200000000000000(node=0|zone=2)
[   24.032925] page_type: f5(slab)
[   24.033273] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.034008] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.034846] page dumped because: kasan: bad access detected
[   24.035390] 
[   24.035751] Memory state around the buggy address:
[   24.036073]  ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.036446]  ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.037229] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.037922]                       ^
[   24.038313]  ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.038973]  ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.040665] ==================================================================