Hay
Date
Nov. 27, 2024, 3:37 a.m.

Environment
qemu-arm64
qemu-x86_64

[   51.346870] ==================================================================
[   51.347783] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   51.348693] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.349646] 
[   51.349972] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.351239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.351891] Hardware name: linux,dummy-virt (DT)
[   51.352428] Call trace:
[   51.352963]  show_stack+0x20/0x38 (C)
[   51.353506]  dump_stack_lvl+0x8c/0xd0
[   51.354167]  print_report+0x118/0x5e0
[   51.354781]  kasan_report+0xc8/0x118
[   51.355472]  __asan_report_load8_noabort+0x20/0x30
[   51.356503]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   51.357691]  kasan_bitops_generic+0x110/0x1c8
[   51.358481]  kunit_try_run_case+0x14c/0x3d0
[   51.359029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.359936]  kthread+0x24c/0x2d0
[   51.360612]  ret_from_fork+0x10/0x20
[   51.361135] 
[   51.361461] Allocated by task 250:
[   51.361900]  kasan_save_stack+0x3c/0x68
[   51.362592]  kasan_save_track+0x20/0x40
[   51.363137]  kasan_save_alloc_info+0x40/0x58
[   51.363810]  __kasan_kmalloc+0xd4/0xd8
[   51.364271]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.365015]  kasan_bitops_generic+0xa0/0x1c8
[   51.365673]  kunit_try_run_case+0x14c/0x3d0
[   51.366352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.367028]  kthread+0x24c/0x2d0
[   51.367656]  ret_from_fork+0x10/0x20
[   51.368126] 
[   51.368524] The buggy address belongs to the object at fff00000c5f55320
[   51.368524]  which belongs to the cache kmalloc-16 of size 16
[   51.369915] The buggy address is located 8 bytes inside of
[   51.369915]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.371307] 
[   51.371638] The buggy address belongs to the physical page:
[   51.372311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.373358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.374134] page_type: f5(slab)
[   51.374640] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.375495] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.376484] page dumped because: kasan: bad access detected
[   51.377111] 
[   51.377449] Memory state around the buggy address:
[   51.377990]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.378947]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.379753] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.380613]                                   ^
[   51.381151]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.382048]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.382943] ==================================================================
[   51.232184] ==================================================================
[   51.233400] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   51.234274] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.235188] 
[   51.235630] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.236790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.237349] Hardware name: linux,dummy-virt (DT)
[   51.238146] Call trace:
[   51.238694]  show_stack+0x20/0x38 (C)
[   51.239241]  dump_stack_lvl+0x8c/0xd0
[   51.239854]  print_report+0x118/0x5e0
[   51.240526]  kasan_report+0xc8/0x118
[   51.241085]  kasan_check_range+0x100/0x1a8
[   51.241764]  __kasan_check_write+0x20/0x30
[   51.242353]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   51.243195]  kasan_bitops_generic+0x110/0x1c8
[   51.243901]  kunit_try_run_case+0x14c/0x3d0
[   51.244499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.245272]  kthread+0x24c/0x2d0
[   51.245895]  ret_from_fork+0x10/0x20
[   51.246581] 
[   51.246904] Allocated by task 250:
[   51.247586]  kasan_save_stack+0x3c/0x68
[   51.248100]  kasan_save_track+0x20/0x40
[   51.248876]  kasan_save_alloc_info+0x40/0x58
[   51.249445]  __kasan_kmalloc+0xd4/0xd8
[   51.250064]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.250722]  kasan_bitops_generic+0xa0/0x1c8
[   51.251287]  kunit_try_run_case+0x14c/0x3d0
[   51.251953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.252619]  kthread+0x24c/0x2d0
[   51.253160]  ret_from_fork+0x10/0x20
[   51.253625] 
[   51.254004] The buggy address belongs to the object at fff00000c5f55320
[   51.254004]  which belongs to the cache kmalloc-16 of size 16
[   51.255512] The buggy address is located 8 bytes inside of
[   51.255512]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.256945] 
[   51.257243] The buggy address belongs to the physical page:
[   51.258030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.258941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.259821] page_type: f5(slab)
[   51.260416] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.261370] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.262364] page dumped because: kasan: bad access detected
[   51.263057] 
[   51.263361] Memory state around the buggy address:
[   51.263970]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.264864]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.265698] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.266611]                                   ^
[   51.267216]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.268109]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.268982] ==================================================================
[   51.462428] ==================================================================
[   51.463187] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   51.464262] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.466340] 
[   51.466747] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.467983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.468564] Hardware name: linux,dummy-virt (DT)
[   51.469132] Call trace:
[   51.469601]  show_stack+0x20/0x38 (C)
[   51.470214]  dump_stack_lvl+0x8c/0xd0
[   51.470831]  print_report+0x118/0x5e0
[   51.471412]  kasan_report+0xc8/0x118
[   51.471967]  __asan_report_load8_noabort+0x20/0x30
[   51.472618]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   51.473329]  kasan_bitops_generic+0x110/0x1c8
[   51.474005]  kunit_try_run_case+0x14c/0x3d0
[   51.474680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.475370]  kthread+0x24c/0x2d0
[   51.475983]  ret_from_fork+0x10/0x20
[   51.476547] 
[   51.476926] Allocated by task 250:
[   51.477511]  kasan_save_stack+0x3c/0x68
[   51.478130]  kasan_save_track+0x20/0x40
[   51.478755]  kasan_save_alloc_info+0x40/0x58
[   51.479265]  __kasan_kmalloc+0xd4/0xd8
[   51.479905]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.480543]  kasan_bitops_generic+0xa0/0x1c8
[   51.481234]  kunit_try_run_case+0x14c/0x3d0
[   51.481855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.482680]  kthread+0x24c/0x2d0
[   51.483236]  ret_from_fork+0x10/0x20
[   51.483850] 
[   51.484161] The buggy address belongs to the object at fff00000c5f55320
[   51.484161]  which belongs to the cache kmalloc-16 of size 16
[   51.485485] The buggy address is located 8 bytes inside of
[   51.485485]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.486831] 
[   51.487151] The buggy address belongs to the physical page:
[   51.487740] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.488857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.489758] page_type: f5(slab)
[   51.490330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.491213] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.492191] page dumped because: kasan: bad access detected
[   51.492833] 
[   51.493175] Memory state around the buggy address:
[   51.493755]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.494632]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.495475] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.496398]                                   ^
[   51.496968]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.497887]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.498765] ==================================================================
[   51.584032] ==================================================================
[   51.585445] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   51.586376] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.587222] 
[   51.588655] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.590127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.590883] Hardware name: linux,dummy-virt (DT)
[   51.591514] Call trace:
[   51.591904]  show_stack+0x20/0x38 (C)
[   51.592611]  dump_stack_lvl+0x8c/0xd0
[   51.593228]  print_report+0x118/0x5e0
[   51.593863]  kasan_report+0xc8/0x118
[   51.594471]  __asan_report_load8_noabort+0x20/0x30
[   51.595115]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   51.595898]  kasan_bitops_generic+0x110/0x1c8
[   51.596595]  kunit_try_run_case+0x14c/0x3d0
[   51.597272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.598055]  kthread+0x24c/0x2d0
[   51.598679]  ret_from_fork+0x10/0x20
[   51.599735] 
[   51.599998] Allocated by task 250:
[   51.600851]  kasan_save_stack+0x3c/0x68
[   51.601503]  kasan_save_track+0x20/0x40
[   51.602043]  kasan_save_alloc_info+0x40/0x58
[   51.602490]  __kasan_kmalloc+0xd4/0xd8
[   51.603010]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.603597]  kasan_bitops_generic+0xa0/0x1c8
[   51.604098]  kunit_try_run_case+0x14c/0x3d0
[   51.604885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.605595]  kthread+0x24c/0x2d0
[   51.606113]  ret_from_fork+0x10/0x20
[   51.606723] 
[   51.607055] The buggy address belongs to the object at fff00000c5f55320
[   51.607055]  which belongs to the cache kmalloc-16 of size 16
[   51.608539] The buggy address is located 8 bytes inside of
[   51.608539]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.609843] 
[   51.610133] The buggy address belongs to the physical page:
[   51.610929] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.611859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.612630] page_type: f5(slab)
[   51.613177] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.614118] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.614890] page dumped because: kasan: bad access detected
[   51.615549] 
[   51.615896] Memory state around the buggy address:
[   51.616527]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.617461]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.618388] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.619212]                                   ^
[   51.619893]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.620711]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.621670] ==================================================================
[   51.270566] ==================================================================
[   51.272236] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   51.273122] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.274015] 
[   51.274387] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.275542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.276008] Hardware name: linux,dummy-virt (DT)
[   51.276682] Call trace:
[   51.277030]  show_stack+0x20/0x38 (C)
[   51.277649]  dump_stack_lvl+0x8c/0xd0
[   51.278319]  print_report+0x118/0x5e0
[   51.278860]  kasan_report+0xc8/0x118
[   51.279393]  __asan_report_load8_noabort+0x20/0x30
[   51.280157]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   51.280866]  kasan_bitops_generic+0x110/0x1c8
[   51.281452]  kunit_try_run_case+0x14c/0x3d0
[   51.282023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.282876]  kthread+0x24c/0x2d0
[   51.283374]  ret_from_fork+0x10/0x20
[   51.283992] 
[   51.284319] Allocated by task 250:
[   51.284824]  kasan_save_stack+0x3c/0x68
[   51.285523]  kasan_save_track+0x20/0x40
[   51.286160]  kasan_save_alloc_info+0x40/0x58
[   51.286795]  __kasan_kmalloc+0xd4/0xd8
[   51.287388]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.287889]  kasan_bitops_generic+0xa0/0x1c8
[   51.288594]  kunit_try_run_case+0x14c/0x3d0
[   51.289078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.289901]  kthread+0x24c/0x2d0
[   51.290469]  ret_from_fork+0x10/0x20
[   51.291081] 
[   51.291470] The buggy address belongs to the object at fff00000c5f55320
[   51.291470]  which belongs to the cache kmalloc-16 of size 16
[   51.292770] The buggy address is located 8 bytes inside of
[   51.292770]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.294047] 
[   51.294397] The buggy address belongs to the physical page:
[   51.295080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.295971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.296847] page_type: f5(slab)
[   51.297379] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.298236] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.299230] page dumped because: kasan: bad access detected
[   51.299950] 
[   51.300253] Memory state around the buggy address:
[   51.300862]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.301685]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.302584] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.303479]                                   ^
[   51.304064]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.304938]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.305821] ==================================================================
[   51.422659] ==================================================================
[   51.423605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   51.425283] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.427066] 
[   51.427390] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.428702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.429544] Hardware name: linux,dummy-virt (DT)
[   51.430392] Call trace:
[   51.431232]  show_stack+0x20/0x38 (C)
[   51.431822]  dump_stack_lvl+0x8c/0xd0
[   51.432541]  print_report+0x118/0x5e0
[   51.433119]  kasan_report+0xc8/0x118
[   51.433877]  kasan_check_range+0x100/0x1a8
[   51.434565]  __kasan_check_write+0x20/0x30
[   51.435154]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   51.435876]  kasan_bitops_generic+0x110/0x1c8
[   51.436503]  kunit_try_run_case+0x14c/0x3d0
[   51.437080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.437832]  kthread+0x24c/0x2d0
[   51.438404]  ret_from_fork+0x10/0x20
[   51.439050] 
[   51.439389] Allocated by task 250:
[   51.439868]  kasan_save_stack+0x3c/0x68
[   51.440423]  kasan_save_track+0x20/0x40
[   51.441039]  kasan_save_alloc_info+0x40/0x58
[   51.441660]  __kasan_kmalloc+0xd4/0xd8
[   51.442245]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.442875]  kasan_bitops_generic+0xa0/0x1c8
[   51.443504]  kunit_try_run_case+0x14c/0x3d0
[   51.444094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.444820]  kthread+0x24c/0x2d0
[   51.445433]  ret_from_fork+0x10/0x20
[   51.445974] 
[   51.446255] The buggy address belongs to the object at fff00000c5f55320
[   51.446255]  which belongs to the cache kmalloc-16 of size 16
[   51.447766] The buggy address is located 8 bytes inside of
[   51.447766]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.449092] 
[   51.449407] The buggy address belongs to the physical page:
[   51.450051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.451060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.451852] page_type: f5(slab)
[   51.452352] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.453332] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.454226] page dumped because: kasan: bad access detected
[   51.454903] 
[   51.455243] Memory state around the buggy address:
[   51.455832]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.456725]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.457582] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.458519]                                   ^
[   51.459075]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.459989]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.460877] ==================================================================
[   51.542818] ==================================================================
[   51.543578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   51.544570] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.545404] 
[   51.545967] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.547453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.548020] Hardware name: linux,dummy-virt (DT)
[   51.548673] Call trace:
[   51.549215]  show_stack+0x20/0x38 (C)
[   51.549953]  dump_stack_lvl+0x8c/0xd0
[   51.550604]  print_report+0x118/0x5e0
[   51.551235]  kasan_report+0xc8/0x118
[   51.551872]  kasan_check_range+0x100/0x1a8
[   51.552549]  __kasan_check_write+0x20/0x30
[   51.553214]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   51.553996]  kasan_bitops_generic+0x110/0x1c8
[   51.554710]  kunit_try_run_case+0x14c/0x3d0
[   51.555408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.556187]  kthread+0x24c/0x2d0
[   51.556827]  ret_from_fork+0x10/0x20
[   51.557513] 
[   51.557908] Allocated by task 250:
[   51.558478]  kasan_save_stack+0x3c/0x68
[   51.559188]  kasan_save_track+0x20/0x40
[   51.559831]  kasan_save_alloc_info+0x40/0x58
[   51.560564]  __kasan_kmalloc+0xd4/0xd8
[   51.561187]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.561925]  kasan_bitops_generic+0xa0/0x1c8
[   51.562697]  kunit_try_run_case+0x14c/0x3d0
[   51.563374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.564228]  kthread+0x24c/0x2d0
[   51.564932]  ret_from_fork+0x10/0x20
[   51.565561] 
[   51.565905] The buggy address belongs to the object at fff00000c5f55320
[   51.565905]  which belongs to the cache kmalloc-16 of size 16
[   51.567381] The buggy address is located 8 bytes inside of
[   51.567381]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.568885] 
[   51.569352] The buggy address belongs to the physical page:
[   51.570093] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.571163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.571992] page_type: f5(slab)
[   51.572536] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.573539] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.574568] page dumped because: kasan: bad access detected
[   51.575285] 
[   51.575652] Memory state around the buggy address:
[   51.576379]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.577407]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.578521] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.579575]                                   ^
[   51.580091]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.580997]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.581794] ==================================================================
[   51.307538] ==================================================================
[   51.308145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   51.310059] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.310767] 
[   51.311094] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.312375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.313212] Hardware name: linux,dummy-virt (DT)
[   51.313776] Call trace:
[   51.314220]  show_stack+0x20/0x38 (C)
[   51.314797]  dump_stack_lvl+0x8c/0xd0
[   51.315330]  print_report+0x118/0x5e0
[   51.315970]  kasan_report+0xc8/0x118
[   51.316567]  kasan_check_range+0x100/0x1a8
[   51.317093]  __kasan_check_write+0x20/0x30
[   51.317792]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   51.318473]  kasan_bitops_generic+0x110/0x1c8
[   51.319218]  kunit_try_run_case+0x14c/0x3d0
[   51.319829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.320608]  kthread+0x24c/0x2d0
[   51.321144]  ret_from_fork+0x10/0x20
[   51.321785] 
[   51.322080] Allocated by task 250:
[   51.322698]  kasan_save_stack+0x3c/0x68
[   51.323287]  kasan_save_track+0x20/0x40
[   51.323890]  kasan_save_alloc_info+0x40/0x58
[   51.324518]  __kasan_kmalloc+0xd4/0xd8
[   51.325078]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.325663]  kasan_bitops_generic+0xa0/0x1c8
[   51.326313]  kunit_try_run_case+0x14c/0x3d0
[   51.326888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.327631]  kthread+0x24c/0x2d0
[   51.328158]  ret_from_fork+0x10/0x20
[   51.328683] 
[   51.329027] The buggy address belongs to the object at fff00000c5f55320
[   51.329027]  which belongs to the cache kmalloc-16 of size 16
[   51.330514] The buggy address is located 8 bytes inside of
[   51.330514]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.331834] 
[   51.332157] The buggy address belongs to the physical page:
[   51.332786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.333758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.334611] page_type: f5(slab)
[   51.335189] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.336208] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.337120] page dumped because: kasan: bad access detected
[   51.337744] 
[   51.338031] Memory state around the buggy address:
[   51.338779]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.339686]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.340526] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.341355]                                   ^
[   51.341965]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.342805]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.343671] ==================================================================
[   51.500423] ==================================================================
[   51.502243] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   51.503686] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.504605] 
[   51.504911] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.506218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.507002] Hardware name: linux,dummy-virt (DT)
[   51.507733] Call trace:
[   51.508250]  show_stack+0x20/0x38 (C)
[   51.508939]  dump_stack_lvl+0x8c/0xd0
[   51.509593]  print_report+0x118/0x5e0
[   51.510158]  kasan_report+0xc8/0x118
[   51.510905]  kasan_check_range+0x100/0x1a8
[   51.511635]  __kasan_check_write+0x20/0x30
[   51.512282]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   51.513124]  kasan_bitops_generic+0x110/0x1c8
[   51.513890]  kunit_try_run_case+0x14c/0x3d0
[   51.514680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.515468]  kthread+0x24c/0x2d0
[   51.516071]  ret_from_fork+0x10/0x20
[   51.516682] 
[   51.517030] Allocated by task 250:
[   51.517710]  kasan_save_stack+0x3c/0x68
[   51.518325]  kasan_save_track+0x20/0x40
[   51.518985]  kasan_save_alloc_info+0x40/0x58
[   51.519692]  __kasan_kmalloc+0xd4/0xd8
[   51.520399]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.521066]  kasan_bitops_generic+0xa0/0x1c8
[   51.521732]  kunit_try_run_case+0x14c/0x3d0
[   51.522412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.523138]  kthread+0x24c/0x2d0
[   51.523691]  ret_from_fork+0x10/0x20
[   51.524362] 
[   51.524775] The buggy address belongs to the object at fff00000c5f55320
[   51.524775]  which belongs to the cache kmalloc-16 of size 16
[   51.526263] The buggy address is located 8 bytes inside of
[   51.526263]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.527810] 
[   51.528150] The buggy address belongs to the physical page:
[   51.528960] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.529995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.530873] page_type: f5(slab)
[   51.531422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.532428] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.533410] page dumped because: kasan: bad access detected
[   51.534158] 
[   51.534632] Memory state around the buggy address:
[   51.535250]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.536271]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.537143] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.538030]                                   ^
[   51.538761]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.539674]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.540640] ==================================================================
[   51.385004] ==================================================================
[   51.385711] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   51.387047] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.388123] 
[   51.388450] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.389822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.390268] Hardware name: linux,dummy-virt (DT)
[   51.390963] Call trace:
[   51.391383]  show_stack+0x20/0x38 (C)
[   51.392093]  dump_stack_lvl+0x8c/0xd0
[   51.392872]  print_report+0x118/0x5e0
[   51.393430]  kasan_report+0xc8/0x118
[   51.394056]  kasan_check_range+0x100/0x1a8
[   51.394849]  __kasan_check_write+0x20/0x30
[   51.395418]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   51.396146]  kasan_bitops_generic+0x110/0x1c8
[   51.396799]  kunit_try_run_case+0x14c/0x3d0
[   51.397389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.398140]  kthread+0x24c/0x2d0
[   51.398751]  ret_from_fork+0x10/0x20
[   51.399314] 
[   51.399612] Allocated by task 250:
[   51.400146]  kasan_save_stack+0x3c/0x68
[   51.400787]  kasan_save_track+0x20/0x40
[   51.401417]  kasan_save_alloc_info+0x40/0x58
[   51.402016]  __kasan_kmalloc+0xd4/0xd8
[   51.402610]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.403175]  kasan_bitops_generic+0xa0/0x1c8
[   51.403856]  kunit_try_run_case+0x14c/0x3d0
[   51.404473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.405094]  kthread+0x24c/0x2d0
[   51.405710]  ret_from_fork+0x10/0x20
[   51.406251] 
[   51.406662] The buggy address belongs to the object at fff00000c5f55320
[   51.406662]  which belongs to the cache kmalloc-16 of size 16
[   51.407956] The buggy address is located 8 bytes inside of
[   51.407956]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.409278] 
[   51.409633] The buggy address belongs to the physical page:
[   51.410396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.411233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.412095] page_type: f5(slab)
[   51.412701] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.413636] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.414593] page dumped because: kasan: bad access detected
[   51.415255] 
[   51.415559] Memory state around the buggy address:
[   51.416130]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.417040]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.417802] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.418698]                                   ^
[   51.419307]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.420185]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.421106] ==================================================================

[   28.903550] ==================================================================
[   28.904841] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   28.906030] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269
[   28.907713] 
[   28.908425] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   28.910193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.911485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.912257] Call Trace:
[   28.912568]  <TASK>
[   28.912782]  dump_stack_lvl+0x73/0xb0
[   28.913220]  print_report+0xd1/0x640
[   28.914381]  ? __virt_addr_valid+0x1db/0x2d0
[   28.914622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.914856]  kasan_report+0x102/0x140
[   28.915266]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   28.916620]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   28.917693]  kasan_check_range+0x10c/0x1c0
[   28.918601]  __kasan_check_write+0x18/0x20
[   28.919404]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   28.919891]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.920853]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.921475]  ? kasan_bitops_generic+0x93/0x1c0
[   28.922530]  kasan_bitops_generic+0x117/0x1c0
[   28.922980]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.923734]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.924447]  kunit_try_run_case+0x1b3/0x490
[   28.924882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.925611]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.926505]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.927152]  ? __kthread_parkme+0x82/0x160
[   28.927889]  ? preempt_count_sub+0x50/0x80
[   28.928833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.929710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.931012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.931684]  kthread+0x257/0x310
[   28.932266]  ? __pfx_kthread+0x10/0x10
[   28.932647]  ret_from_fork+0x41/0x80
[   28.933074]  ? __pfx_kthread+0x10/0x10
[   28.933670]  ret_from_fork_asm+0x1a/0x30
[   28.934529]  </TASK>
[   28.934846] 
[   28.935236] Allocated by task 269:
[   28.935644]  kasan_save_stack+0x3d/0x60
[   28.936403]  kasan_save_track+0x18/0x40
[   28.936865]  kasan_save_alloc_info+0x3b/0x50
[   28.937491]  __kasan_kmalloc+0xb7/0xc0
[   28.938379]  __kmalloc_cache_noprof+0x184/0x410
[   28.938708]  kasan_bitops_generic+0x93/0x1c0
[   28.939415]  kunit_try_run_case+0x1b3/0x490
[   28.940002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.940606]  kthread+0x257/0x310
[   28.941048]  ret_from_fork+0x41/0x80
[   28.941346]  ret_from_fork_asm+0x1a/0x30
[   28.941924] 
[   28.942264] The buggy address belongs to the object at ffff888102699d80
[   28.942264]  which belongs to the cache kmalloc-16 of size 16
[   28.943783] The buggy address is located 8 bytes inside of
[   28.943783]  allocated 9-byte region [ffff888102699d80, ffff888102699d89)
[   28.944928] 
[   28.946142] The buggy address belongs to the physical page:
[   28.946641] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699
[   28.947347] flags: 0x200000000000000(node=0|zone=2)
[   28.947777] page_type: f5(slab)
[   28.948430] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.949501] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.950293] page dumped because: kasan: bad access detected
[   28.951132] 
[   28.951577] Memory state around the buggy address:
[   28.951882]  ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc
[   28.953087]  ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.954369] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.955201]                       ^
[   28.955763]  ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.956898]  ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.957699] ==================================================================
[   28.794637] ==================================================================
[   28.795563] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   28.797222] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269
[   28.798096] 
[   28.799200] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   28.799959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.800810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.801768] Call Trace:
[   28.802454]  <TASK>
[   28.802683]  dump_stack_lvl+0x73/0xb0
[   28.803494]  print_report+0xd1/0x640
[   28.803868]  ? __virt_addr_valid+0x1db/0x2d0
[   28.804485]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.805085]  kasan_report+0x102/0x140
[   28.805695]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   28.806406]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   28.807158]  kasan_check_range+0x10c/0x1c0
[   28.807690]  __kasan_check_write+0x18/0x20
[   28.808161]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   28.809105]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.809672]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.810309]  ? kasan_bitops_generic+0x93/0x1c0
[   28.810889]  kasan_bitops_generic+0x117/0x1c0
[   28.811486]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.812372]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.812902]  kunit_try_run_case+0x1b3/0x490
[   28.813481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.813881]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.814566]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.815187]  ? __kthread_parkme+0x82/0x160
[   28.815627]  ? preempt_count_sub+0x50/0x80
[   28.816395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.816819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.817263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.818225]  kthread+0x257/0x310
[   28.818527]  ? __pfx_kthread+0x10/0x10
[   28.819030]  ret_from_fork+0x41/0x80
[   28.819757]  ? __pfx_kthread+0x10/0x10
[   28.820351]  ret_from_fork_asm+0x1a/0x30
[   28.820904]  </TASK>
[   28.821230] 
[   28.821475] Allocated by task 269:
[   28.821873]  kasan_save_stack+0x3d/0x60
[   28.823383]  kasan_save_track+0x18/0x40
[   28.824309]  kasan_save_alloc_info+0x3b/0x50
[   28.824783]  __kasan_kmalloc+0xb7/0xc0
[   28.825714]  __kmalloc_cache_noprof+0x184/0x410
[   28.826458]  kasan_bitops_generic+0x93/0x1c0
[   28.827258]  kunit_try_run_case+0x1b3/0x490
[   28.827645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.827881]  kthread+0x257/0x310
[   28.828758]  ret_from_fork+0x41/0x80
[   28.829346]  ret_from_fork_asm+0x1a/0x30
[   28.830278] 
[   28.830650] The buggy address belongs to the object at ffff888102699d80
[   28.830650]  which belongs to the cache kmalloc-16 of size 16
[   28.831612] The buggy address is located 8 bytes inside of
[   28.831612]  allocated 9-byte region [ffff888102699d80, ffff888102699d89)
[   28.832614] 
[   28.832811] The buggy address belongs to the physical page:
[   28.834250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699
[   28.834574] flags: 0x200000000000000(node=0|zone=2)
[   28.834778] page_type: f5(slab)
[   28.834930] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.836102] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.837359] page dumped because: kasan: bad access detected
[   28.837690] 
[   28.837946] Memory state around the buggy address:
[   28.839003]  ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc
[   28.839809]  ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.841309] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.841957]                       ^
[   28.842501]  ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.843419]  ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.844331] ==================================================================
[   28.845841] ==================================================================
[   28.847011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   28.848860] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269
[   28.850183] 
[   28.850472] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   28.851655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.852328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.853597] Call Trace:
[   28.854296]  <TASK>
[   28.854765]  dump_stack_lvl+0x73/0xb0
[   28.855147]  print_report+0xd1/0x640
[   28.855417]  ? __virt_addr_valid+0x1db/0x2d0
[   28.855627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.855861]  kasan_report+0x102/0x140
[   28.856208]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   28.856606]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   28.857843]  kasan_check_range+0x10c/0x1c0
[   28.858701]  __kasan_check_write+0x18/0x20
[   28.859734]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   28.860904]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.862182]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.862633]  ? kasan_bitops_generic+0x93/0x1c0
[   28.863632]  kasan_bitops_generic+0x117/0x1c0
[   28.864761]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.865562]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.866589]  kunit_try_run_case+0x1b3/0x490
[   28.867052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.868124]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.868829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.869637]  ? __kthread_parkme+0x82/0x160
[   28.870781]  ? preempt_count_sub+0x50/0x80
[   28.871515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.872617]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.873535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.874015]  kthread+0x257/0x310
[   28.874730]  ? __pfx_kthread+0x10/0x10
[   28.875369]  ret_from_fork+0x41/0x80
[   28.876253]  ? __pfx_kthread+0x10/0x10
[   28.876673]  ret_from_fork_asm+0x1a/0x30
[   28.877610]  </TASK>
[   28.877835] 
[   28.878493] Allocated by task 269:
[   28.879028]  kasan_save_stack+0x3d/0x60
[   28.879517]  kasan_save_track+0x18/0x40
[   28.879871]  kasan_save_alloc_info+0x3b/0x50
[   28.880785]  __kasan_kmalloc+0xb7/0xc0
[   28.881083]  __kmalloc_cache_noprof+0x184/0x410
[   28.882413]  kasan_bitops_generic+0x93/0x1c0
[   28.882841]  kunit_try_run_case+0x1b3/0x490
[   28.883593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.884353]  kthread+0x257/0x310
[   28.884748]  ret_from_fork+0x41/0x80
[   28.885581]  ret_from_fork_asm+0x1a/0x30
[   28.886583] 
[   28.886728] The buggy address belongs to the object at ffff888102699d80
[   28.886728]  which belongs to the cache kmalloc-16 of size 16
[   28.888716] The buggy address is located 8 bytes inside of
[   28.888716]  allocated 9-byte region [ffff888102699d80, ffff888102699d89)
[   28.890612] 
[   28.890715] The buggy address belongs to the physical page:
[   28.891038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699
[   28.892425] flags: 0x200000000000000(node=0|zone=2)
[   28.893033] page_type: f5(slab)
[   28.893479] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.894533] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.895315] page dumped because: kasan: bad access detected
[   28.896057] 
[   28.896224] Memory state around the buggy address:
[   28.897143]  ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc
[   28.897882]  ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.898755] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.899718]                       ^
[   28.900034]  ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.900622]  ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.902300] ==================================================================
[   29.009445] ==================================================================
[   29.009975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   29.011293] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269
[   29.011873] 
[   29.012104] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   29.013080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.013906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.014631] Call Trace:
[   29.015158]  <TASK>
[   29.015721]  dump_stack_lvl+0x73/0xb0
[   29.016471]  print_report+0xd1/0x640
[   29.016835]  ? __virt_addr_valid+0x1db/0x2d0
[   29.017512]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.018405]  kasan_report+0x102/0x140
[   29.019455]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   29.020285]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   29.020879]  kasan_check_range+0x10c/0x1c0
[   29.021673]  __kasan_check_write+0x18/0x20
[   29.022409]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   29.023261]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.023865]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.024502]  ? kasan_bitops_generic+0x93/0x1c0
[   29.025280]  kasan_bitops_generic+0x117/0x1c0
[   29.025791]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.026206]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.027084]  kunit_try_run_case+0x1b3/0x490
[   29.027525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.028230]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.028626]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.029906]  ? __kthread_parkme+0x82/0x160
[   29.030535]  ? preempt_count_sub+0x50/0x80
[   29.031330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.032210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.032798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.033800]  kthread+0x257/0x310
[   29.034158]  ? __pfx_kthread+0x10/0x10
[   29.034703]  ret_from_fork+0x41/0x80
[   29.035350]  ? __pfx_kthread+0x10/0x10
[   29.035773]  ret_from_fork_asm+0x1a/0x30
[   29.036814]  </TASK>
[   29.037530] 
[   29.037785] Allocated by task 269:
[   29.038681]  kasan_save_stack+0x3d/0x60
[   29.039219]  kasan_save_track+0x18/0x40
[   29.039772]  kasan_save_alloc_info+0x3b/0x50
[   29.040387]  __kasan_kmalloc+0xb7/0xc0
[   29.040749]  __kmalloc_cache_noprof+0x184/0x410
[   29.041485]  kasan_bitops_generic+0x93/0x1c0
[   29.042104]  kunit_try_run_case+0x1b3/0x490
[   29.043186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.043730]  kthread+0x257/0x310
[   29.044530]  ret_from_fork+0x41/0x80
[   29.044821]  ret_from_fork_asm+0x1a/0x30
[   29.045426] 
[   29.046211] The buggy address belongs to the object at ffff888102699d80
[   29.046211]  which belongs to the cache kmalloc-16 of size 16
[   29.046696] The buggy address is located 8 bytes inside of
[   29.046696]  allocated 9-byte region [ffff888102699d80, ffff888102699d89)
[   29.047766] 
[   29.048066] The buggy address belongs to the physical page:
[   29.048715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699
[   29.049783] flags: 0x200000000000000(node=0|zone=2)
[   29.051021] page_type: f5(slab)
[   29.051960] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.053629] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.054517] page dumped because: kasan: bad access detected
[   29.054877] 
[   29.055169] Memory state around the buggy address:
[   29.055736]  ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc
[   29.057298]  ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.058031] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.059045]                       ^
[   29.059584]  ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.060593]  ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.061154] ==================================================================
[   28.639340] ==================================================================
[   28.640510] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   28.641420] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269
[   28.642330] 
[   28.642625] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   28.644159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.644685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.646535] Call Trace:
[   28.646873]  <TASK>
[   28.647681]  dump_stack_lvl+0x73/0xb0
[   28.648066]  print_report+0xd1/0x640
[   28.648877]  ? __virt_addr_valid+0x1db/0x2d0
[   28.649664]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.651266]  kasan_report+0x102/0x140
[   28.651793]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   28.652407]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   28.653591]  kasan_check_range+0x10c/0x1c0
[   28.654023]  __kasan_check_write+0x18/0x20
[   28.654775]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   28.655639]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.655900]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.657262]  ? kasan_bitops_generic+0x93/0x1c0
[   28.658335]  kasan_bitops_generic+0x117/0x1c0
[   28.658803]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.659643]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.660511]  kunit_try_run_case+0x1b3/0x490
[   28.661668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.662205]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.662682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.663241]  ? __kthread_parkme+0x82/0x160
[   28.664395]  ? preempt_count_sub+0x50/0x80
[   28.664790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.666069]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.666763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.667634]  kthread+0x257/0x310
[   28.668429]  ? __pfx_kthread+0x10/0x10
[   28.668719]  ret_from_fork+0x41/0x80
[   28.669570]  ? __pfx_kthread+0x10/0x10
[   28.669953]  ret_from_fork_asm+0x1a/0x30
[   28.670753]  </TASK>
[   28.671069] 
[   28.671710] Allocated by task 269:
[   28.672214]  kasan_save_stack+0x3d/0x60
[   28.672877]  kasan_save_track+0x18/0x40
[   28.673710]  kasan_save_alloc_info+0x3b/0x50
[   28.674816]  __kasan_kmalloc+0xb7/0xc0
[   28.675432]  __kmalloc_cache_noprof+0x184/0x410
[   28.676643]  kasan_bitops_generic+0x93/0x1c0
[   28.677033]  kunit_try_run_case+0x1b3/0x490
[   28.677529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.677947]  kthread+0x257/0x310
[   28.678787]  ret_from_fork+0x41/0x80
[   28.679704]  ret_from_fork_asm+0x1a/0x30
[   28.680334] 
[   28.680484] The buggy address belongs to the object at ffff888102699d80
[   28.680484]  which belongs to the cache kmalloc-16 of size 16
[   28.681899] The buggy address is located 8 bytes inside of
[   28.681899]  allocated 9-byte region [ffff888102699d80, ffff888102699d89)
[   28.683177] 
[   28.683494] The buggy address belongs to the physical page:
[   28.683939] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699
[   28.684802] flags: 0x200000000000000(node=0|zone=2)
[   28.685668] page_type: f5(slab)
[   28.685951] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.686965] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.687944] page dumped because: kasan: bad access detected
[   28.688540] 
[   28.688739] Memory state around the buggy address:
[   28.689506]  ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc
[   28.690447]  ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.691078] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.692003]                       ^
[   28.692550]  ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.693203]  ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.694092] ==================================================================
[   28.744787] ==================================================================
[   28.745501] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   28.746024] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269
[   28.746900] 
[   28.747091] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   28.748137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.748712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.749810] Call Trace:
[   28.750427]  <TASK>
[   28.750832]  dump_stack_lvl+0x73/0xb0
[   28.751174]  print_report+0xd1/0x640
[   28.752170]  ? __virt_addr_valid+0x1db/0x2d0
[   28.752579]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.753169]  kasan_report+0x102/0x140
[   28.753455]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   28.754273]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   28.755232]  kasan_check_range+0x10c/0x1c0
[   28.755664]  __kasan_check_write+0x18/0x20
[   28.756630]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   28.757220]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.758089]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.758585]  ? kasan_bitops_generic+0x93/0x1c0
[   28.759243]  kasan_bitops_generic+0x117/0x1c0
[   28.759619]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.760270]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.760876]  kunit_try_run_case+0x1b3/0x490
[   28.762440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.762916]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.763508]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.763954]  ? __kthread_parkme+0x82/0x160
[   28.764640]  ? preempt_count_sub+0x50/0x80
[   28.765093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.766095]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.766610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.767468]  kthread+0x257/0x310
[   28.768121]  ? __pfx_kthread+0x10/0x10
[   28.768675]  ret_from_fork+0x41/0x80
[   28.769247]  ? __pfx_kthread+0x10/0x10
[   28.769856]  ret_from_fork_asm+0x1a/0x30
[   28.770565]  </TASK>
[   28.770906] 
[   28.771173] Allocated by task 269:
[   28.771741]  kasan_save_stack+0x3d/0x60
[   28.772287]  kasan_save_track+0x18/0x40
[   28.773273]  kasan_save_alloc_info+0x3b/0x50
[   28.773683]  __kasan_kmalloc+0xb7/0xc0
[   28.774028]  __kmalloc_cache_noprof+0x184/0x410
[   28.774691]  kasan_bitops_generic+0x93/0x1c0
[   28.775330]  kunit_try_run_case+0x1b3/0x490
[   28.775871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.776657]  kthread+0x257/0x310
[   28.777111]  ret_from_fork+0x41/0x80
[   28.777786]  ret_from_fork_asm+0x1a/0x30
[   28.778300] 
[   28.778684] The buggy address belongs to the object at ffff888102699d80
[   28.778684]  which belongs to the cache kmalloc-16 of size 16
[   28.779661] The buggy address is located 8 bytes inside of
[   28.779661]  allocated 9-byte region [ffff888102699d80, ffff888102699d89)
[   28.781673] 
[   28.781832] The buggy address belongs to the physical page:
[   28.782410] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699
[   28.783455] flags: 0x200000000000000(node=0|zone=2)
[   28.783854] page_type: f5(slab)
[   28.784364] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.785399] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.786159] page dumped because: kasan: bad access detected
[   28.786676] 
[   28.786893] Memory state around the buggy address:
[   28.787551]  ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc
[   28.788348]  ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.789131] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.790288]                       ^
[   28.790666]  ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.792573]  ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.793473] ==================================================================
[   28.958734] ==================================================================
[   28.959500] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   28.961449] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269
[   28.962458] 
[   28.962653] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   28.963643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.964004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.964703] Call Trace:
[   28.964942]  <TASK>
[   28.966057]  dump_stack_lvl+0x73/0xb0
[   28.966457]  print_report+0xd1/0x640
[   28.966733]  ? __virt_addr_valid+0x1db/0x2d0
[   28.967460]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.968527]  kasan_report+0x102/0x140
[   28.968920]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   28.970080]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   28.970899]  kasan_check_range+0x10c/0x1c0
[   28.972128]  __kasan_check_write+0x18/0x20
[   28.973209]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   28.973463]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.973716]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.973924]  ? kasan_bitops_generic+0x93/0x1c0
[   28.974955]  kasan_bitops_generic+0x117/0x1c0
[   28.975974]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.976862]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.977735]  kunit_try_run_case+0x1b3/0x490
[   28.978506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.979205]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.979671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.980274]  ? __kthread_parkme+0x82/0x160
[   28.980682]  ? preempt_count_sub+0x50/0x80
[   28.981128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.982087]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.982752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.983289]  kthread+0x257/0x310
[   28.983632]  ? __pfx_kthread+0x10/0x10
[   28.984343]  ret_from_fork+0x41/0x80
[   28.984789]  ? __pfx_kthread+0x10/0x10
[   28.985378]  ret_from_fork_asm+0x1a/0x30
[   28.985939]  </TASK>
[   28.986904] 
[   28.987362] Allocated by task 269:
[   28.987605]  kasan_save_stack+0x3d/0x60
[   28.988184]  kasan_save_track+0x18/0x40
[   28.988748]  kasan_save_alloc_info+0x3b/0x50
[   28.989261]  __kasan_kmalloc+0xb7/0xc0
[   28.989551]  __kmalloc_cache_noprof+0x184/0x410
[   28.990307]  kasan_bitops_generic+0x93/0x1c0
[   28.990722]  kunit_try_run_case+0x1b3/0x490
[   28.991054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.992073]  kthread+0x257/0x310
[   28.992655]  ret_from_fork+0x41/0x80
[   28.993023]  ret_from_fork_asm+0x1a/0x30
[   28.993655] 
[   28.993829] The buggy address belongs to the object at ffff888102699d80
[   28.993829]  which belongs to the cache kmalloc-16 of size 16
[   28.995260] The buggy address is located 8 bytes inside of
[   28.995260]  allocated 9-byte region [ffff888102699d80, ffff888102699d89)
[   28.996617] 
[   28.996831] The buggy address belongs to the physical page:
[   28.997182] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699
[   28.998249] flags: 0x200000000000000(node=0|zone=2)
[   28.999088] page_type: f5(slab)
[   28.999532] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.000798] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.001533] page dumped because: kasan: bad access detected
[   29.002014] 
[   29.002174] Memory state around the buggy address:
[   29.002944]  ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc
[   29.003823]  ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.004978] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.006488]                       ^
[   29.006651]  ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.006916]  ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.008084] ==================================================================
[   28.695601] ==================================================================
[   28.696332] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   28.697188] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269
[   28.697898] 
[   28.698929] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   28.700426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.700912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.701708] Call Trace:
[   28.702344]  <TASK>
[   28.702604]  dump_stack_lvl+0x73/0xb0
[   28.703150]  print_report+0xd1/0x640
[   28.703763]  ? __virt_addr_valid+0x1db/0x2d0
[   28.704197]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.705093]  kasan_report+0x102/0x140
[   28.705498]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   28.706102]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   28.706756]  kasan_check_range+0x10c/0x1c0
[   28.707622]  __kasan_check_write+0x18/0x20
[   28.707952]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   28.708753]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.709451]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.710078]  ? kasan_bitops_generic+0x93/0x1c0
[   28.710862]  kasan_bitops_generic+0x117/0x1c0
[   28.711297]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.711805]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.712700]  kunit_try_run_case+0x1b3/0x490
[   28.713218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.713930]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.714586]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.715756]  ? __kthread_parkme+0x82/0x160
[   28.716182]  ? preempt_count_sub+0x50/0x80
[   28.716881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.717444]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.718004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.718805]  kthread+0x257/0x310
[   28.719209]  ? __pfx_kthread+0x10/0x10
[   28.719753]  ret_from_fork+0x41/0x80
[   28.720699]  ? __pfx_kthread+0x10/0x10
[   28.721087]  ret_from_fork_asm+0x1a/0x30
[   28.721571]  </TASK>
[   28.722040] 
[   28.722519] Allocated by task 269:
[   28.722842]  kasan_save_stack+0x3d/0x60
[   28.723247]  kasan_save_track+0x18/0x40
[   28.724094]  kasan_save_alloc_info+0x3b/0x50
[   28.724469]  __kasan_kmalloc+0xb7/0xc0
[   28.725041]  __kmalloc_cache_noprof+0x184/0x410
[   28.725450]  kasan_bitops_generic+0x93/0x1c0
[   28.726186]  kunit_try_run_case+0x1b3/0x490
[   28.726587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.727136]  kthread+0x257/0x310
[   28.727803]  ret_from_fork+0x41/0x80
[   28.728498]  ret_from_fork_asm+0x1a/0x30
[   28.729024] 
[   28.729194] The buggy address belongs to the object at ffff888102699d80
[   28.729194]  which belongs to the cache kmalloc-16 of size 16
[   28.730389] The buggy address is located 8 bytes inside of
[   28.730389]  allocated 9-byte region [ffff888102699d80, ffff888102699d89)
[   28.731942] 
[   28.732354] The buggy address belongs to the physical page:
[   28.732802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699
[   28.733789] flags: 0x200000000000000(node=0|zone=2)
[   28.734433] page_type: f5(slab)
[   28.734683] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.735946] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.737648] page dumped because: kasan: bad access detected
[   28.738089] 
[   28.738344] Memory state around the buggy address:
[   28.738953]  ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc
[   28.739716]  ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.740738] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.741367]                       ^
[   28.742048]  ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.742536]  ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.743532] ==================================================================