Hay
Date
Nov. 28, 2024, 2:36 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.995981] ==================================================================
[   33.996747] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   33.997608] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   33.998463] 
[   33.998856] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.999975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.000537] Hardware name: linux,dummy-virt (DT)
[   34.001157] Call trace:
[   34.001616]  show_stack+0x20/0x38 (C)
[   34.002272]  dump_stack_lvl+0x8c/0xd0
[   34.002835]  print_report+0x118/0x5e0
[   34.003342]  kasan_report+0xc8/0x118
[   34.003826]  kasan_check_range+0x100/0x1a8
[   34.004390]  __kasan_check_write+0x20/0x30
[   34.004930]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.005759]  kasan_bitops_generic+0x110/0x1c8
[   34.006470]  kunit_try_run_case+0x14c/0x3d0
[   34.007173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.007927]  kthread+0x24c/0x2d0
[   34.008544]  ret_from_fork+0x10/0x20
[   34.009106] 
[   34.009502] Allocated by task 249:
[   34.010008]  kasan_save_stack+0x3c/0x68
[   34.010641]  kasan_save_track+0x20/0x40
[   34.011174]  kasan_save_alloc_info+0x40/0x58
[   34.011837]  __kasan_kmalloc+0xd4/0xd8
[   34.012482]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.013331]  kasan_bitops_generic+0xa0/0x1c8
[   34.014071]  kunit_try_run_case+0x14c/0x3d0
[   34.014687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.015581]  kthread+0x24c/0x2d0
[   34.016267]  ret_from_fork+0x10/0x20
[   34.016809] 
[   34.017467] The buggy address belongs to the object at fff00000c4005ea0
[   34.017467]  which belongs to the cache kmalloc-16 of size 16
[   34.018573] The buggy address is located 8 bytes inside of
[   34.018573]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.019474] 
[   34.019834] The buggy address belongs to the physical page:
[   34.020548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.021551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.022340] page_type: f5(slab)
[   34.022915] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.023781] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.024643] page dumped because: kasan: bad access detected
[   34.025324] 
[   34.025659] Memory state around the buggy address:
[   34.026329]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.027133]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.027989] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.028780]                                   ^
[   34.029357]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030197]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030989] ==================================================================
[   33.804395] ==================================================================
[   33.805618] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.806587] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   33.807490] 
[   33.807830] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.808718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.809330] Hardware name: linux,dummy-virt (DT)
[   33.810082] Call trace:
[   33.810661]  show_stack+0x20/0x38 (C)
[   33.811354]  dump_stack_lvl+0x8c/0xd0
[   33.812052]  print_report+0x118/0x5e0
[   33.812755]  kasan_report+0xc8/0x118
[   33.813413]  kasan_check_range+0x100/0x1a8
[   33.814092]  __kasan_check_write+0x20/0x30
[   33.814789]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.815546]  kasan_bitops_generic+0x110/0x1c8
[   33.816248]  kunit_try_run_case+0x14c/0x3d0
[   33.816940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.817746]  kthread+0x24c/0x2d0
[   33.818263]  ret_from_fork+0x10/0x20
[   33.818830] 
[   33.819228] Allocated by task 249:
[   33.819779]  kasan_save_stack+0x3c/0x68
[   33.820422]  kasan_save_track+0x20/0x40
[   33.820981]  kasan_save_alloc_info+0x40/0x58
[   33.821606]  __kasan_kmalloc+0xd4/0xd8
[   33.822158]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.822841]  kasan_bitops_generic+0xa0/0x1c8
[   33.823453]  kunit_try_run_case+0x14c/0x3d0
[   33.824100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.824840]  kthread+0x24c/0x2d0
[   33.825420]  ret_from_fork+0x10/0x20
[   33.826015] 
[   33.826360] The buggy address belongs to the object at fff00000c4005ea0
[   33.826360]  which belongs to the cache kmalloc-16 of size 16
[   33.827649] The buggy address is located 8 bytes inside of
[   33.827649]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   33.828867] 
[   33.829353] The buggy address belongs to the physical page:
[   33.830303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   33.831361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.832320] page_type: f5(slab)
[   33.833003] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.834017] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.834973] page dumped because: kasan: bad access detected
[   33.835550] 
[   33.835785] Memory state around the buggy address:
[   33.836302]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   33.837008]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.837782] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.838703]                                   ^
[   33.839385]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.840269]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.840963] ==================================================================
[   33.842915] ==================================================================
[   33.843897] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.844528] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   33.845210] 
[   33.846848] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.848078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.848787] Hardware name: linux,dummy-virt (DT)
[   33.849543] Call trace:
[   33.850123]  show_stack+0x20/0x38 (C)
[   33.850821]  dump_stack_lvl+0x8c/0xd0
[   33.851546]  print_report+0x118/0x5e0
[   33.852264]  kasan_report+0xc8/0x118
[   33.852819]  __asan_report_load8_noabort+0x20/0x30
[   33.853720]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.854564]  kasan_bitops_generic+0x110/0x1c8
[   33.855334]  kunit_try_run_case+0x14c/0x3d0
[   33.855936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.856590]  kthread+0x24c/0x2d0
[   33.857058]  ret_from_fork+0x10/0x20
[   33.858007] 
[   33.858467] Allocated by task 249:
[   33.858935]  kasan_save_stack+0x3c/0x68
[   33.859443]  kasan_save_track+0x20/0x40
[   33.859945]  kasan_save_alloc_info+0x40/0x58
[   33.860510]  __kasan_kmalloc+0xd4/0xd8
[   33.861015]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.861619]  kasan_bitops_generic+0xa0/0x1c8
[   33.862536]  kunit_try_run_case+0x14c/0x3d0
[   33.863166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.863815]  kthread+0x24c/0x2d0
[   33.864326]  ret_from_fork+0x10/0x20
[   33.864822] 
[   33.865199] The buggy address belongs to the object at fff00000c4005ea0
[   33.865199]  which belongs to the cache kmalloc-16 of size 16
[   33.866346] The buggy address is located 8 bytes inside of
[   33.866346]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   33.867488] 
[   33.867839] The buggy address belongs to the physical page:
[   33.868485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   33.869324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.870089] page_type: f5(slab)
[   33.870648] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.871561] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.872436] page dumped because: kasan: bad access detected
[   33.873015] 
[   33.873377] Memory state around the buggy address:
[   33.873986]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   33.874767]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.875460] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.876304]                                   ^
[   33.876867]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.877601]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.878396] ==================================================================
[   33.882576] ==================================================================
[   33.883324] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.884079] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   33.885024] 
[   33.885414] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.886441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.886951] Hardware name: linux,dummy-virt (DT)
[   33.887570] Call trace:
[   33.888101]  show_stack+0x20/0x38 (C)
[   33.888722]  dump_stack_lvl+0x8c/0xd0
[   33.889316]  print_report+0x118/0x5e0
[   33.889948]  kasan_report+0xc8/0x118
[   33.890526]  kasan_check_range+0x100/0x1a8
[   33.891191]  __kasan_check_write+0x20/0x30
[   33.891821]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.892537]  kasan_bitops_generic+0x110/0x1c8
[   33.893154]  kunit_try_run_case+0x14c/0x3d0
[   33.893757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.894493]  kthread+0x24c/0x2d0
[   33.895070]  ret_from_fork+0x10/0x20
[   33.895650] 
[   33.896035] Allocated by task 249:
[   33.896559]  kasan_save_stack+0x3c/0x68
[   33.897208]  kasan_save_track+0x20/0x40
[   33.897778]  kasan_save_alloc_info+0x40/0x58
[   33.898457]  __kasan_kmalloc+0xd4/0xd8
[   33.899012]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.899701]  kasan_bitops_generic+0xa0/0x1c8
[   33.900251]  kunit_try_run_case+0x14c/0x3d0
[   33.900918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.901610]  kthread+0x24c/0x2d0
[   33.902185]  ret_from_fork+0x10/0x20
[   33.902769] 
[   33.903136] The buggy address belongs to the object at fff00000c4005ea0
[   33.903136]  which belongs to the cache kmalloc-16 of size 16
[   33.904389] The buggy address is located 8 bytes inside of
[   33.904389]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   33.905604] 
[   33.906013] The buggy address belongs to the physical page:
[   33.906604] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   33.907601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.908353] page_type: f5(slab)
[   33.908903] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.909779] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.910622] page dumped because: kasan: bad access detected
[   33.911304] 
[   33.911640] Memory state around the buggy address:
[   33.912327]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   33.913066]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.913920] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.914739]                                   ^
[   33.915484]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.916221]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.917067] ==================================================================
[   34.032728] ==================================================================
[   34.033418] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.034401] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.035258] 
[   34.035622] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.036788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.037344] Hardware name: linux,dummy-virt (DT)
[   34.037960] Call trace:
[   34.038449]  show_stack+0x20/0x38 (C)
[   34.039008]  dump_stack_lvl+0x8c/0xd0
[   34.039665]  print_report+0x118/0x5e0
[   34.040214]  kasan_report+0xc8/0x118
[   34.040848]  __asan_report_load8_noabort+0x20/0x30
[   34.041599]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.042346]  kasan_bitops_generic+0x110/0x1c8
[   34.043004]  kunit_try_run_case+0x14c/0x3d0
[   34.043637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.044404]  kthread+0x24c/0x2d0
[   34.044953]  ret_from_fork+0x10/0x20
[   34.045522] 
[   34.045910] Allocated by task 249:
[   34.046451]  kasan_save_stack+0x3c/0x68
[   34.047084]  kasan_save_track+0x20/0x40
[   34.047684]  kasan_save_alloc_info+0x40/0x58
[   34.048448]  __kasan_kmalloc+0xd4/0xd8
[   34.049204]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.049944]  kasan_bitops_generic+0xa0/0x1c8
[   34.050656]  kunit_try_run_case+0x14c/0x3d0
[   34.051377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.052050]  kthread+0x24c/0x2d0
[   34.052546]  ret_from_fork+0x10/0x20
[   34.053025] 
[   34.053614] The buggy address belongs to the object at fff00000c4005ea0
[   34.053614]  which belongs to the cache kmalloc-16 of size 16
[   34.054685] The buggy address is located 8 bytes inside of
[   34.054685]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.055678] 
[   34.056028] The buggy address belongs to the physical page:
[   34.056712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.057605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.058360] page_type: f5(slab)
[   34.058901] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.059755] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.060546] page dumped because: kasan: bad access detected
[   34.061255] 
[   34.061549] Memory state around the buggy address:
[   34.062164]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.062992]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.063771] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.064500]                                   ^
[   34.065069]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.065817]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.066540] ==================================================================
[   34.068292] ==================================================================
[   34.069181] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.070242] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.071142] 
[   34.071642] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.072887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.073748] Hardware name: linux,dummy-virt (DT)
[   34.074372] Call trace:
[   34.074824]  show_stack+0x20/0x38 (C)
[   34.075529]  dump_stack_lvl+0x8c/0xd0
[   34.076576]  print_report+0x118/0x5e0
[   34.077273]  kasan_report+0xc8/0x118
[   34.077982]  kasan_check_range+0x100/0x1a8
[   34.078717]  __kasan_check_write+0x20/0x30
[   34.079289]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.079962]  kasan_bitops_generic+0x110/0x1c8
[   34.080563]  kunit_try_run_case+0x14c/0x3d0
[   34.081649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.082272]  kthread+0x24c/0x2d0
[   34.082972]  ret_from_fork+0x10/0x20
[   34.083699] 
[   34.084180] Allocated by task 249:
[   34.084808]  kasan_save_stack+0x3c/0x68
[   34.085545]  kasan_save_track+0x20/0x40
[   34.086261]  kasan_save_alloc_info+0x40/0x58
[   34.086985]  __kasan_kmalloc+0xd4/0xd8
[   34.087669]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.088431]  kasan_bitops_generic+0xa0/0x1c8
[   34.089197]  kunit_try_run_case+0x14c/0x3d0
[   34.089900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.090558]  kthread+0x24c/0x2d0
[   34.091012]  ret_from_fork+0x10/0x20
[   34.091504] 
[   34.091814] The buggy address belongs to the object at fff00000c4005ea0
[   34.091814]  which belongs to the cache kmalloc-16 of size 16
[   34.093374] The buggy address is located 8 bytes inside of
[   34.093374]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.094847] 
[   34.095360] The buggy address belongs to the physical page:
[   34.096100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.097150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.098044] page_type: f5(slab)
[   34.098731] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.099749] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.100728] page dumped because: kasan: bad access detected
[   34.101549] 
[   34.101867] Memory state around the buggy address:
[   34.102447]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.103546]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.104447] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.105234]                                   ^
[   34.105855]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.106632]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.107343] ==================================================================
[   34.146822] ==================================================================
[   34.147576] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.149151] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.149928] 
[   34.150286] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.151511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.152159] Hardware name: linux,dummy-virt (DT)
[   34.152898] Call trace:
[   34.153471]  show_stack+0x20/0x38 (C)
[   34.154193]  dump_stack_lvl+0x8c/0xd0
[   34.154893]  print_report+0x118/0x5e0
[   34.155575]  kasan_report+0xc8/0x118
[   34.156085]  __asan_report_load8_noabort+0x20/0x30
[   34.156735]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.157405]  kasan_bitops_generic+0x110/0x1c8
[   34.157972]  kunit_try_run_case+0x14c/0x3d0
[   34.159220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.160049]  kthread+0x24c/0x2d0
[   34.160729]  ret_from_fork+0x10/0x20
[   34.161446] 
[   34.161911] Allocated by task 249:
[   34.162383]  kasan_save_stack+0x3c/0x68
[   34.163172]  kasan_save_track+0x20/0x40
[   34.163881]  kasan_save_alloc_info+0x40/0x58
[   34.164645]  __kasan_kmalloc+0xd4/0xd8
[   34.165345]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.166073]  kasan_bitops_generic+0xa0/0x1c8
[   34.166814]  kunit_try_run_case+0x14c/0x3d0
[   34.167607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.168463]  kthread+0x24c/0x2d0
[   34.168922]  ret_from_fork+0x10/0x20
[   34.169688] 
[   34.170190] The buggy address belongs to the object at fff00000c4005ea0
[   34.170190]  which belongs to the cache kmalloc-16 of size 16
[   34.171450] The buggy address is located 8 bytes inside of
[   34.171450]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.172620] 
[   34.172934] The buggy address belongs to the physical page:
[   34.174013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.175035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.175942] page_type: f5(slab)
[   34.176623] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.177602] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.178587] page dumped because: kasan: bad access detected
[   34.179391] 
[   34.179877] Memory state around the buggy address:
[   34.180416]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.181454]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.182363] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.183313]                                   ^
[   34.184048]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.184826]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.185795] ==================================================================
[   34.108706] ==================================================================
[   34.109650] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.111211] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.112163] 
[   34.112575] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.113755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.114463] Hardware name: linux,dummy-virt (DT)
[   34.115054] Call trace:
[   34.115425]  show_stack+0x20/0x38 (C)
[   34.116017]  dump_stack_lvl+0x8c/0xd0
[   34.116697]  print_report+0x118/0x5e0
[   34.117349]  kasan_report+0xc8/0x118
[   34.117939]  kasan_check_range+0x100/0x1a8
[   34.118566]  __kasan_check_write+0x20/0x30
[   34.119249]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.119972]  kasan_bitops_generic+0x110/0x1c8
[   34.120610]  kunit_try_run_case+0x14c/0x3d0
[   34.121296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.122029]  kthread+0x24c/0x2d0
[   34.122607]  ret_from_fork+0x10/0x20
[   34.123198] 
[   34.123537] Allocated by task 249:
[   34.124108]  kasan_save_stack+0x3c/0x68
[   34.124735]  kasan_save_track+0x20/0x40
[   34.125266]  kasan_save_alloc_info+0x40/0x58
[   34.125930]  __kasan_kmalloc+0xd4/0xd8
[   34.126546]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.127251]  kasan_bitops_generic+0xa0/0x1c8
[   34.127849]  kunit_try_run_case+0x14c/0x3d0
[   34.128521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.129175]  kthread+0x24c/0x2d0
[   34.129748]  ret_from_fork+0x10/0x20
[   34.130315] 
[   34.130701] The buggy address belongs to the object at fff00000c4005ea0
[   34.130701]  which belongs to the cache kmalloc-16 of size 16
[   34.131892] The buggy address is located 8 bytes inside of
[   34.131892]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.133109] 
[   34.133477] The buggy address belongs to the physical page:
[   34.134057] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.135040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.135797] page_type: f5(slab)
[   34.136342] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.137238] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.138065] page dumped because: kasan: bad access detected
[   34.138722] 
[   34.139064] Memory state around the buggy address:
[   34.139750]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.140537]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.141408] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.142227]                                   ^
[   34.142815]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.143679]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.144677] ==================================================================
[   33.919537] ==================================================================
[   33.920528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.921446] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   33.922739] 
[   33.923189] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.924427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.924974] Hardware name: linux,dummy-virt (DT)
[   33.925556] Call trace:
[   33.925986]  show_stack+0x20/0x38 (C)
[   33.926619]  dump_stack_lvl+0x8c/0xd0
[   33.927232]  print_report+0x118/0x5e0
[   33.927812]  kasan_report+0xc8/0x118
[   33.928417]  __asan_report_load8_noabort+0x20/0x30
[   33.929140]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.929856]  kasan_bitops_generic+0x110/0x1c8
[   33.930528]  kunit_try_run_case+0x14c/0x3d0
[   33.931167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.931914]  kthread+0x24c/0x2d0
[   33.932490]  ret_from_fork+0x10/0x20
[   33.933073] 
[   33.933428] Allocated by task 249:
[   33.933991]  kasan_save_stack+0x3c/0x68
[   33.934513]  kasan_save_track+0x20/0x40
[   33.935156]  kasan_save_alloc_info+0x40/0x58
[   33.935788]  __kasan_kmalloc+0xd4/0xd8
[   33.936397]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.937047]  kasan_bitops_generic+0xa0/0x1c8
[   33.937656]  kunit_try_run_case+0x14c/0x3d0
[   33.938304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.939022]  kthread+0x24c/0x2d0
[   33.939527]  ret_from_fork+0x10/0x20
[   33.940066] 
[   33.940468] The buggy address belongs to the object at fff00000c4005ea0
[   33.940468]  which belongs to the cache kmalloc-16 of size 16
[   33.941672] The buggy address is located 8 bytes inside of
[   33.941672]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   33.942909] 
[   33.943287] The buggy address belongs to the physical page:
[   33.943965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   33.944933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.945718] page_type: f5(slab)
[   33.946226] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.947100] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.947905] page dumped because: kasan: bad access detected
[   33.948568] 
[   33.948952] Memory state around the buggy address:
[   33.949575]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   33.950442]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.951275] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.952065]                                   ^
[   33.952667]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.953513]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.954309] ==================================================================
[   33.957312] ==================================================================
[   33.958039] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   33.959420] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   33.960069] 
[   33.960507] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.961957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.962681] Hardware name: linux,dummy-virt (DT)
[   33.963422] Call trace:
[   33.963801]  show_stack+0x20/0x38 (C)
[   33.964384]  dump_stack_lvl+0x8c/0xd0
[   33.964937]  print_report+0x118/0x5e0
[   33.965848]  kasan_report+0xc8/0x118
[   33.966553]  kasan_check_range+0x100/0x1a8
[   33.967310]  __kasan_check_write+0x20/0x30
[   33.968050]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   33.968892]  kasan_bitops_generic+0x110/0x1c8
[   33.969629]  kunit_try_run_case+0x14c/0x3d0
[   33.970387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.971238]  kthread+0x24c/0x2d0
[   33.971914]  ret_from_fork+0x10/0x20
[   33.972589] 
[   33.972928] Allocated by task 249:
[   33.973412]  kasan_save_stack+0x3c/0x68
[   33.973919]  kasan_save_track+0x20/0x40
[   33.975040]  kasan_save_alloc_info+0x40/0x58
[   33.975598]  __kasan_kmalloc+0xd4/0xd8
[   33.976188]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.976788]  kasan_bitops_generic+0xa0/0x1c8
[   33.977418]  kunit_try_run_case+0x14c/0x3d0
[   33.977988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.978622]  kthread+0x24c/0x2d0
[   33.979153]  ret_from_fork+0x10/0x20
[   33.979612] 
[   33.979967] The buggy address belongs to the object at fff00000c4005ea0
[   33.979967]  which belongs to the cache kmalloc-16 of size 16
[   33.981189] The buggy address is located 8 bytes inside of
[   33.981189]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   33.982385] 
[   33.982779] The buggy address belongs to the physical page:
[   33.983474] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   33.984419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.985093] page_type: f5(slab)
[   33.985646] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.986620] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.987489] page dumped because: kasan: bad access detected
[   33.988184] 
[   33.988567] Memory state around the buggy address:
[   33.989094]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   33.990002]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.990784] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.991592]                                   ^
[   33.992215]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.993039]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.993835] ==================================================================

[   24.989168] ==================================================================
[   24.989743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   24.990635] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   24.991551] 
[   24.991843] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   24.993442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.993756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.994901] Call Trace:
[   24.995482]  <TASK>
[   24.995996]  dump_stack_lvl+0x73/0xb0
[   24.996810]  print_report+0xd1/0x640
[   24.997369]  ? __virt_addr_valid+0x1db/0x2d0
[   24.997865]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.998730]  kasan_report+0x102/0x140
[   24.999295]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   24.999918]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   25.000923]  kasan_check_range+0x10c/0x1c0
[   25.001743]  __kasan_check_write+0x18/0x20
[   25.002418]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   25.002910]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.004272]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.004839]  ? kasan_bitops_generic+0x93/0x1c0
[   25.005463]  kasan_bitops_generic+0x117/0x1c0
[   25.006156]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.007228]  ? __pfx_read_tsc+0x10/0x10
[   25.008002]  ? ktime_get_ts64+0x84/0x230
[   25.008804]  kunit_try_run_case+0x1b3/0x490
[   25.009644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.010207]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.010839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.011815]  ? __kthread_parkme+0x82/0x160
[   25.012914]  ? preempt_count_sub+0x50/0x80
[   25.013450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.014091]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.014713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.015678]  kthread+0x257/0x310
[   25.016084]  ? __pfx_kthread+0x10/0x10
[   25.016426]  ret_from_fork+0x41/0x80
[   25.016961]  ? __pfx_kthread+0x10/0x10
[   25.017458]  ret_from_fork_asm+0x1a/0x30
[   25.018002]  </TASK>
[   25.018369] 
[   25.018816] Allocated by task 269:
[   25.019130]  kasan_save_stack+0x3d/0x60
[   25.019638]  kasan_save_track+0x18/0x40
[   25.020146]  kasan_save_alloc_info+0x3b/0x50
[   25.021437]  __kasan_kmalloc+0xb7/0xc0
[   25.021724]  __kmalloc_cache_noprof+0x184/0x410
[   25.022016]  kasan_bitops_generic+0x93/0x1c0
[   25.022722]  kunit_try_run_case+0x1b3/0x490
[   25.023070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.024076]  kthread+0x257/0x310
[   25.024503]  ret_from_fork+0x41/0x80
[   25.024876]  ret_from_fork_asm+0x1a/0x30
[   25.025255] 
[   25.025686] The buggy address belongs to the object at ffff888101094fa0
[   25.025686]  which belongs to the cache kmalloc-16 of size 16
[   25.026898] The buggy address is located 8 bytes inside of
[   25.026898]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   25.028322] 
[   25.028533] The buggy address belongs to the physical page:
[   25.029472] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   25.030015] flags: 0x200000000000000(node=0|zone=2)
[   25.031066] page_type: f5(slab)
[   25.031742] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.032399] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.033659] page dumped because: kasan: bad access detected
[   25.034363] 
[   25.034583] Memory state around the buggy address:
[   25.035562]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.036561]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.037138] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.038098]                                   ^
[   25.038639]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.039794]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   25.040379] ==================================================================
[   24.942377] ==================================================================
[   24.942995] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   24.944403] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   24.944953] 
[   24.945420] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   24.946385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.946816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.947869] Call Trace:
[   24.948215]  <TASK>
[   24.948627]  dump_stack_lvl+0x73/0xb0
[   24.949036]  print_report+0xd1/0x640
[   24.949512]  ? __virt_addr_valid+0x1db/0x2d0
[   24.949877]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.950491]  kasan_report+0x102/0x140
[   24.950852]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   24.951801]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   24.952598]  kasan_check_range+0x10c/0x1c0
[   24.953143]  __kasan_check_write+0x18/0x20
[   24.953668]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   24.954484]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   24.954922]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.955777]  ? kasan_bitops_generic+0x93/0x1c0
[   24.956264]  kasan_bitops_generic+0x117/0x1c0
[   24.956782]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.957300]  ? __pfx_read_tsc+0x10/0x10
[   24.957682]  ? ktime_get_ts64+0x84/0x230
[   24.958062]  kunit_try_run_case+0x1b3/0x490
[   24.958575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.958999]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.959770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.960510]  ? __kthread_parkme+0x82/0x160
[   24.960869]  ? preempt_count_sub+0x50/0x80
[   24.961410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.961995]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.962762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.963593]  kthread+0x257/0x310
[   24.963996]  ? __pfx_kthread+0x10/0x10
[   24.964625]  ret_from_fork+0x41/0x80
[   24.965321]  ? __pfx_kthread+0x10/0x10
[   24.965759]  ret_from_fork_asm+0x1a/0x30
[   24.966308]  </TASK>
[   24.966634] 
[   24.966827] Allocated by task 269:
[   24.967157]  kasan_save_stack+0x3d/0x60
[   24.967890]  kasan_save_track+0x18/0x40
[   24.968431]  kasan_save_alloc_info+0x3b/0x50
[   24.968990]  __kasan_kmalloc+0xb7/0xc0
[   24.969460]  __kmalloc_cache_noprof+0x184/0x410
[   24.970027]  kasan_bitops_generic+0x93/0x1c0
[   24.970751]  kunit_try_run_case+0x1b3/0x490
[   24.971635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.972244]  kthread+0x257/0x310
[   24.972816]  ret_from_fork+0x41/0x80
[   24.973111]  ret_from_fork_asm+0x1a/0x30
[   24.973847] 
[   24.974099] The buggy address belongs to the object at ffff888101094fa0
[   24.974099]  which belongs to the cache kmalloc-16 of size 16
[   24.975641] The buggy address is located 8 bytes inside of
[   24.975641]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   24.976936] 
[   24.977356] The buggy address belongs to the physical page:
[   24.977898] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   24.978934] flags: 0x200000000000000(node=0|zone=2)
[   24.979773] page_type: f5(slab)
[   24.980161] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.981007] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.981845] page dumped because: kasan: bad access detected
[   24.982423] 
[   24.982606] Memory state around the buggy address:
[   24.983157]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.984149]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.984907] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.985757]                                   ^
[   24.986461]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.987545]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   24.988150] ==================================================================
[   24.738567] ==================================================================
[   24.739724] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   24.741852] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   24.743541] 
[   24.743819] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   24.745565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.746877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.748243] Call Trace:
[   24.748473]  <TASK>
[   24.749095]  dump_stack_lvl+0x73/0xb0
[   24.749549]  print_report+0xd1/0x640
[   24.749963]  ? __virt_addr_valid+0x1db/0x2d0
[   24.750368]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.750850]  kasan_report+0x102/0x140
[   24.751213]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   24.752905]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   24.753371]  kasan_check_range+0x10c/0x1c0
[   24.753841]  __kasan_check_write+0x18/0x20
[   24.754154]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   24.755089]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   24.755758]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.756323]  ? kasan_bitops_generic+0x93/0x1c0
[   24.756731]  kasan_bitops_generic+0x117/0x1c0
[   24.757174]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.759210]  ? __pfx_read_tsc+0x10/0x10
[   24.759515]  ? ktime_get_ts64+0x84/0x230
[   24.760414]  kunit_try_run_case+0x1b3/0x490
[   24.760987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.761607]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.762120]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.762706]  ? __kthread_parkme+0x82/0x160
[   24.763207]  ? preempt_count_sub+0x50/0x80
[   24.763621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.763998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.765129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.766154]  kthread+0x257/0x310
[   24.766390]  ? __pfx_kthread+0x10/0x10
[   24.766575]  ret_from_fork+0x41/0x80
[   24.766755]  ? __pfx_kthread+0x10/0x10
[   24.766930]  ret_from_fork_asm+0x1a/0x30
[   24.767128]  </TASK>
[   24.767243] 
[   24.767356] Allocated by task 269:
[   24.767724]  kasan_save_stack+0x3d/0x60
[   24.768138]  kasan_save_track+0x18/0x40
[   24.768614]  kasan_save_alloc_info+0x3b/0x50
[   24.769476]  __kasan_kmalloc+0xb7/0xc0
[   24.770176]  __kmalloc_cache_noprof+0x184/0x410
[   24.770501]  kasan_bitops_generic+0x93/0x1c0
[   24.771327]  kunit_try_run_case+0x1b3/0x490
[   24.772119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.773730]  kthread+0x257/0x310
[   24.774078]  ret_from_fork+0x41/0x80
[   24.774483]  ret_from_fork_asm+0x1a/0x30
[   24.774894] 
[   24.775091] The buggy address belongs to the object at ffff888101094fa0
[   24.775091]  which belongs to the cache kmalloc-16 of size 16
[   24.776804] The buggy address is located 8 bytes inside of
[   24.776804]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   24.779313] 
[   24.779493] The buggy address belongs to the physical page:
[   24.780041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   24.781576] flags: 0x200000000000000(node=0|zone=2)
[   24.782706] page_type: f5(slab)
[   24.783054] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.783835] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.784556] page dumped because: kasan: bad access detected
[   24.785118] 
[   24.785751] Memory state around the buggy address:
[   24.786100]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.786840]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.787484] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.788303]                                   ^
[   24.788687]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.789835]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   24.790858] ==================================================================
[   24.895086] ==================================================================
[   24.895571] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   24.896236] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   24.896948] 
[   24.897365] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   24.898749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.899721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.900796] Call Trace:
[   24.901022]  <TASK>
[   24.901572]  dump_stack_lvl+0x73/0xb0
[   24.902006]  print_report+0xd1/0x640
[   24.902974]  ? __virt_addr_valid+0x1db/0x2d0
[   24.903603]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.904140]  kasan_report+0x102/0x140
[   24.904747]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   24.905395]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   24.906134]  kasan_check_range+0x10c/0x1c0
[   24.906923]  __kasan_check_write+0x18/0x20
[   24.907318]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   24.908036]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   24.908630]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.909095]  ? kasan_bitops_generic+0x93/0x1c0
[   24.909653]  kasan_bitops_generic+0x117/0x1c0
[   24.910036]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.910803]  ? __pfx_read_tsc+0x10/0x10
[   24.911125]  ? ktime_get_ts64+0x84/0x230
[   24.911828]  kunit_try_run_case+0x1b3/0x490
[   24.912595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.912988]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.913603]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.914127]  ? __kthread_parkme+0x82/0x160
[   24.914827]  ? preempt_count_sub+0x50/0x80
[   24.915373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.915745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.916327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.916823]  kthread+0x257/0x310
[   24.917225]  ? __pfx_kthread+0x10/0x10
[   24.917668]  ret_from_fork+0x41/0x80
[   24.918049]  ? __pfx_kthread+0x10/0x10
[   24.918778]  ret_from_fork_asm+0x1a/0x30
[   24.919219]  </TASK>
[   24.919553] 
[   24.919705] Allocated by task 269:
[   24.920115]  kasan_save_stack+0x3d/0x60
[   24.920905]  kasan_save_track+0x18/0x40
[   24.921265]  kasan_save_alloc_info+0x3b/0x50
[   24.922655]  __kasan_kmalloc+0xb7/0xc0
[   24.923143]  __kmalloc_cache_noprof+0x184/0x410
[   24.923620]  kasan_bitops_generic+0x93/0x1c0
[   24.923996]  kunit_try_run_case+0x1b3/0x490
[   24.924574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.925434]  kthread+0x257/0x310
[   24.925878]  ret_from_fork+0x41/0x80
[   24.926791]  ret_from_fork_asm+0x1a/0x30
[   24.927411] 
[   24.927662] The buggy address belongs to the object at ffff888101094fa0
[   24.927662]  which belongs to the cache kmalloc-16 of size 16
[   24.928985] The buggy address is located 8 bytes inside of
[   24.928985]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   24.930107] 
[   24.930737] The buggy address belongs to the physical page:
[   24.931291] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   24.932148] flags: 0x200000000000000(node=0|zone=2)
[   24.932621] page_type: f5(slab)
[   24.933002] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.933693] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.934591] page dumped because: kasan: bad access detected
[   24.935611] 
[   24.935836] Memory state around the buggy address:
[   24.936607]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.937323]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.938201] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.939137]                                   ^
[   24.939893]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.940859]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   24.941612] ==================================================================
[   25.092592] ==================================================================
[   25.093138] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   25.094139] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   25.094716] 
[   25.094889] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.096168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.097132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.098881] Call Trace:
[   25.099157]  <TASK>
[   25.099551]  dump_stack_lvl+0x73/0xb0
[   25.099925]  print_report+0xd1/0x640
[   25.100223]  ? __virt_addr_valid+0x1db/0x2d0
[   25.100559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.101203]  kasan_report+0x102/0x140
[   25.101690]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   25.102383]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   25.103619]  kasan_check_range+0x10c/0x1c0
[   25.103954]  __kasan_check_write+0x18/0x20
[   25.104811]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   25.105658]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.106808]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.107596]  ? kasan_bitops_generic+0x93/0x1c0
[   25.108175]  kasan_bitops_generic+0x117/0x1c0
[   25.108851]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.109385]  ? __pfx_read_tsc+0x10/0x10
[   25.109797]  ? ktime_get_ts64+0x84/0x230
[   25.110169]  kunit_try_run_case+0x1b3/0x490
[   25.111182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.111864]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.112938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.113403]  ? __kthread_parkme+0x82/0x160
[   25.114169]  ? preempt_count_sub+0x50/0x80
[   25.115018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.115846]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.116463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.117437]  kthread+0x257/0x310
[   25.118253]  ? __pfx_kthread+0x10/0x10
[   25.118782]  ret_from_fork+0x41/0x80
[   25.119315]  ? __pfx_kthread+0x10/0x10
[   25.119856]  ret_from_fork_asm+0x1a/0x30
[   25.120411]  </TASK>
[   25.120965] 
[   25.121621] Allocated by task 269:
[   25.121893]  kasan_save_stack+0x3d/0x60
[   25.122731]  kasan_save_track+0x18/0x40
[   25.123076]  kasan_save_alloc_info+0x3b/0x50
[   25.123702]  __kasan_kmalloc+0xb7/0xc0
[   25.124112]  __kmalloc_cache_noprof+0x184/0x410
[   25.124612]  kasan_bitops_generic+0x93/0x1c0
[   25.124991]  kunit_try_run_case+0x1b3/0x490
[   25.125755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.126148]  kthread+0x257/0x310
[   25.126417]  ret_from_fork+0x41/0x80
[   25.127458]  ret_from_fork_asm+0x1a/0x30
[   25.127960] 
[   25.128966] The buggy address belongs to the object at ffff888101094fa0
[   25.128966]  which belongs to the cache kmalloc-16 of size 16
[   25.130269] The buggy address is located 8 bytes inside of
[   25.130269]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   25.131530] 
[   25.131759] The buggy address belongs to the physical page:
[   25.133413] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   25.134085] flags: 0x200000000000000(node=0|zone=2)
[   25.134747] page_type: f5(slab)
[   25.135296] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.135996] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.136666] page dumped because: kasan: bad access detected
[   25.137246] 
[   25.137558] Memory state around the buggy address:
[   25.138457]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.139389]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.140369] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.141623]                                   ^
[   25.142112]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.142852]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   25.143477] ==================================================================
[   25.042539] ==================================================================
[   25.043040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   25.043979] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   25.045431] 
[   25.045879] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.047289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.047833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.048749] Call Trace:
[   25.049582]  <TASK>
[   25.049939]  dump_stack_lvl+0x73/0xb0
[   25.050400]  print_report+0xd1/0x640
[   25.051060]  ? __virt_addr_valid+0x1db/0x2d0
[   25.051853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.052182]  kasan_report+0x102/0x140
[   25.052994]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   25.054414]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   25.055146]  kasan_check_range+0x10c/0x1c0
[   25.055864]  __kasan_check_write+0x18/0x20
[   25.056481]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   25.056984]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.057434]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.058033]  ? kasan_bitops_generic+0x93/0x1c0
[   25.058624]  kasan_bitops_generic+0x117/0x1c0
[   25.059152]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.060160]  ? __pfx_read_tsc+0x10/0x10
[   25.060629]  ? ktime_get_ts64+0x84/0x230
[   25.060996]  kunit_try_run_case+0x1b3/0x490
[   25.061853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.062366]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.062952]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.063724]  ? __kthread_parkme+0x82/0x160
[   25.064261]  ? preempt_count_sub+0x50/0x80
[   25.064778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.065462]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.066044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.066837]  kthread+0x257/0x310
[   25.067817]  ? __pfx_kthread+0x10/0x10
[   25.068615]  ret_from_fork+0x41/0x80
[   25.068912]  ? __pfx_kthread+0x10/0x10
[   25.069268]  ret_from_fork_asm+0x1a/0x30
[   25.070006]  </TASK>
[   25.070415] 
[   25.070635] Allocated by task 269:
[   25.070869]  kasan_save_stack+0x3d/0x60
[   25.071427]  kasan_save_track+0x18/0x40
[   25.071794]  kasan_save_alloc_info+0x3b/0x50
[   25.072664]  __kasan_kmalloc+0xb7/0xc0
[   25.073177]  __kmalloc_cache_noprof+0x184/0x410
[   25.073816]  kasan_bitops_generic+0x93/0x1c0
[   25.074454]  kunit_try_run_case+0x1b3/0x490
[   25.074818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.075719]  kthread+0x257/0x310
[   25.076092]  ret_from_fork+0x41/0x80
[   25.076439]  ret_from_fork_asm+0x1a/0x30
[   25.077014] 
[   25.077496] The buggy address belongs to the object at ffff888101094fa0
[   25.077496]  which belongs to the cache kmalloc-16 of size 16
[   25.078781] The buggy address is located 8 bytes inside of
[   25.078781]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   25.080154] 
[   25.080328] The buggy address belongs to the physical page:
[   25.081186] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   25.081926] flags: 0x200000000000000(node=0|zone=2)
[   25.082948] page_type: f5(slab)
[   25.083619] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.084067] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   25.085369] page dumped because: kasan: bad access detected
[   25.085898] 
[   25.086052] Memory state around the buggy address:
[   25.086360]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.087372]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.088233] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.088963]                                   ^
[   25.089656]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.090498]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   25.090977] ==================================================================
[   24.793767] ==================================================================
[   24.794307] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   24.795033] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   24.796241] 
[   24.796527] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   24.798508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.798856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.799637] Call Trace:
[   24.800012]  <TASK>
[   24.800357]  dump_stack_lvl+0x73/0xb0
[   24.800810]  print_report+0xd1/0x640
[   24.801160]  ? __virt_addr_valid+0x1db/0x2d0
[   24.801690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.802071]  kasan_report+0x102/0x140
[   24.802491]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   24.803013]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   24.803761]  kasan_check_range+0x10c/0x1c0
[   24.804451]  __kasan_check_write+0x18/0x20
[   24.804858]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   24.805217]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   24.805874]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.806427]  ? kasan_bitops_generic+0x93/0x1c0
[   24.806962]  kasan_bitops_generic+0x117/0x1c0
[   24.807827]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.808173]  ? __pfx_read_tsc+0x10/0x10
[   24.808944]  ? ktime_get_ts64+0x84/0x230
[   24.809257]  kunit_try_run_case+0x1b3/0x490
[   24.809912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.810770]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.811111]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.811793]  ? __kthread_parkme+0x82/0x160
[   24.812703]  ? preempt_count_sub+0x50/0x80
[   24.813064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.813518]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.814133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.814744]  kthread+0x257/0x310
[   24.815019]  ? __pfx_kthread+0x10/0x10
[   24.815581]  ret_from_fork+0x41/0x80
[   24.815917]  ? __pfx_kthread+0x10/0x10
[   24.816577]  ret_from_fork_asm+0x1a/0x30
[   24.817417]  </TASK>
[   24.817637] 
[   24.817832] Allocated by task 269:
[   24.818273]  kasan_save_stack+0x3d/0x60
[   24.818597]  kasan_save_track+0x18/0x40
[   24.819029]  kasan_save_alloc_info+0x3b/0x50
[   24.819736]  __kasan_kmalloc+0xb7/0xc0
[   24.820026]  __kmalloc_cache_noprof+0x184/0x410
[   24.820330]  kasan_bitops_generic+0x93/0x1c0
[   24.820646]  kunit_try_run_case+0x1b3/0x490
[   24.821700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.822603]  kthread+0x257/0x310
[   24.823028]  ret_from_fork+0x41/0x80
[   24.823574]  ret_from_fork_asm+0x1a/0x30
[   24.823858] 
[   24.824009] The buggy address belongs to the object at ffff888101094fa0
[   24.824009]  which belongs to the cache kmalloc-16 of size 16
[   24.825997] The buggy address is located 8 bytes inside of
[   24.825997]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   24.827475] 
[   24.827656] The buggy address belongs to the physical page:
[   24.828085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   24.829573] flags: 0x200000000000000(node=0|zone=2)
[   24.830149] page_type: f5(slab)
[   24.830638] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.832122] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.833112] page dumped because: kasan: bad access detected
[   24.833978] 
[   24.834119] Memory state around the buggy address:
[   24.834687]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.835578]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.836522] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.837452]                                   ^
[   24.838206]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.839678]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   24.840555] ==================================================================
[   24.842593] ==================================================================
[   24.844060] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   24.845766] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269
[   24.846628] 
[   24.847127] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   24.849293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.849566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.849897] Call Trace:
[   24.850582]  <TASK>
[   24.850777]  dump_stack_lvl+0x73/0xb0
[   24.851102]  print_report+0xd1/0x640
[   24.851669]  ? __virt_addr_valid+0x1db/0x2d0
[   24.852029]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.852872]  kasan_report+0x102/0x140
[   24.853473]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   24.854117]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   24.854620]  kasan_check_range+0x10c/0x1c0
[   24.855236]  __kasan_check_write+0x18/0x20
[   24.855651]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   24.856027]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   24.857036]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.857434]  ? kasan_bitops_generic+0x93/0x1c0
[   24.858067]  kasan_bitops_generic+0x117/0x1c0
[   24.858609]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.859077]  ? __pfx_read_tsc+0x10/0x10
[   24.859476]  ? ktime_get_ts64+0x84/0x230
[   24.859789]  kunit_try_run_case+0x1b3/0x490
[   24.860227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.862147]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.863167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.864375]  ? __kthread_parkme+0x82/0x160
[   24.864986]  ? preempt_count_sub+0x50/0x80
[   24.865467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.866178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.866949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.867915]  kthread+0x257/0x310
[   24.868797]  ? __pfx_kthread+0x10/0x10
[   24.869263]  ret_from_fork+0x41/0x80
[   24.869975]  ? __pfx_kthread+0x10/0x10
[   24.870695]  ret_from_fork_asm+0x1a/0x30
[   24.871693]  </TASK>
[   24.872014] 
[   24.872264] Allocated by task 269:
[   24.873079]  kasan_save_stack+0x3d/0x60
[   24.874062]  kasan_save_track+0x18/0x40
[   24.874445]  kasan_save_alloc_info+0x3b/0x50
[   24.875593]  __kasan_kmalloc+0xb7/0xc0
[   24.876001]  __kmalloc_cache_noprof+0x184/0x410
[   24.876721]  kasan_bitops_generic+0x93/0x1c0
[   24.877119]  kunit_try_run_case+0x1b3/0x490
[   24.877507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.878107]  kthread+0x257/0x310
[   24.878785]  ret_from_fork+0x41/0x80
[   24.879056]  ret_from_fork_asm+0x1a/0x30
[   24.879987] 
[   24.880451] The buggy address belongs to the object at ffff888101094fa0
[   24.880451]  which belongs to the cache kmalloc-16 of size 16
[   24.881743] The buggy address is located 8 bytes inside of
[   24.881743]  allocated 9-byte region [ffff888101094fa0, ffff888101094fa9)
[   24.883209] 
[   24.883464] The buggy address belongs to the physical page:
[   24.884012] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   24.884882] flags: 0x200000000000000(node=0|zone=2)
[   24.885559] page_type: f5(slab)
[   24.885934] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   24.887000] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.887781] page dumped because: kasan: bad access detected
[   24.888457] 
[   24.888709] Memory state around the buggy address:
[   24.889356]  ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.890045]  ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.891257] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.891876]                                   ^
[   24.892496]  ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.893046]  ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   24.893872] ==================================================================