Hay
Date
June 2, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   22.502949] ==================================================================
[   22.503674] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   22.504120] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.504935] 
[   22.505286] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.505534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.505615] Hardware name: linux,dummy-virt (DT)
[   22.505697] Call trace:
[   22.505761]  dump_backtrace+0x9c/0x128
[   22.505886]  show_stack+0x20/0x38
[   22.505994]  dump_stack_lvl+0x8c/0xd0
[   22.506107]  print_report+0x118/0x5f0
[   22.506218]  kasan_report+0xdc/0x128
[   22.506320]  __asan_report_load8_noabort+0x20/0x30
[   22.506377]  kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   22.506434]  kasan_bitops_generic+0x114/0x1d0
[   22.506486]  kunit_try_run_case+0x170/0x3f0
[   22.506537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.506591]  kthread+0x24c/0x2d0
[   22.506639]  ret_from_fork+0x10/0x20
[   22.506690] 
[   22.512098] Allocated by task 248:
[   22.513882]  kasan_save_stack+0x3c/0x68
[   22.514308]  kasan_save_track+0x20/0x40
[   22.514735]  kasan_save_alloc_info+0x40/0x58
[   22.515142]  __kasan_kmalloc+0xd4/0xd8
[   22.515570]  __kmalloc_cache_noprof+0x154/0x320
[   22.516105]  kasan_bitops_generic+0xa0/0x1d0
[   22.516669]  kunit_try_run_case+0x170/0x3f0
[   22.516963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.517573]  kthread+0x24c/0x2d0
[   22.518026]  ret_from_fork+0x10/0x20
[   22.518447] 
[   22.518729] The buggy address belongs to the object at fff00000c5bb22a0
[   22.518729]  which belongs to the cache kmalloc-16 of size 16
[   22.519576] The buggy address is located 8 bytes inside of
[   22.519576]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.520632] 
[   22.520935] The buggy address belongs to the physical page:
[   22.521548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.522170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.522779] page_type: f5(slab)
[   22.523143] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.523869] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.524416] page dumped because: kasan: bad access detected
[   22.524946] 
[   22.525230] Memory state around the buggy address:
[   22.525684]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.526224]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.526867] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.527443]                                   ^
[   22.527847]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.528462]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.529103] ==================================================================
[   22.530991] ==================================================================
[   22.531739] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xbf8
[   22.532930] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.533344] 
[   22.533612] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.533830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.533911] Hardware name: linux,dummy-virt (DT)
[   22.533997] Call trace:
[   22.534059]  dump_backtrace+0x9c/0x128
[   22.534190]  show_stack+0x20/0x38
[   22.534299]  dump_stack_lvl+0x8c/0xd0
[   22.534368]  print_report+0x118/0x5f0
[   22.534417]  kasan_report+0xdc/0x128
[   22.534463]  kasan_check_range+0x100/0x1a8
[   22.534512]  __kasan_check_write+0x20/0x30
[   22.534560]  kasan_bitops_modify.constprop.0+0x358/0xbf8
[   22.534615]  kasan_bitops_generic+0x114/0x1d0
[   22.534665]  kunit_try_run_case+0x170/0x3f0
[   22.534714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.534765]  kthread+0x24c/0x2d0
[   22.534811]  ret_from_fork+0x10/0x20
[   22.534862] 
[   22.539889] Allocated by task 248:
[   22.540375]  kasan_save_stack+0x3c/0x68
[   22.540894]  kasan_save_track+0x20/0x40
[   22.541336]  kasan_save_alloc_info+0x40/0x58
[   22.541859]  __kasan_kmalloc+0xd4/0xd8
[   22.542314]  __kmalloc_cache_noprof+0x154/0x320
[   22.542811]  kasan_bitops_generic+0xa0/0x1d0
[   22.543261]  kunit_try_run_case+0x170/0x3f0
[   22.543669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.544258]  kthread+0x24c/0x2d0
[   22.544716]  ret_from_fork+0x10/0x20
[   22.545197] 
[   22.545441] The buggy address belongs to the object at fff00000c5bb22a0
[   22.545441]  which belongs to the cache kmalloc-16 of size 16
[   22.546343] The buggy address is located 8 bytes inside of
[   22.546343]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.547282] 
[   22.547583] The buggy address belongs to the physical page:
[   22.548106] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.549092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.549735] page_type: f5(slab)
[   22.550057] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.550836] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.551532] page dumped because: kasan: bad access detected
[   22.552034] 
[   22.552315] Memory state around the buggy address:
[   22.552847]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.553486]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.554134] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.554711]                                   ^
[   22.555175]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.555775]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.556355] ==================================================================
[   22.359259] ==================================================================
[   22.359927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   22.361176] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.361856] 
[   22.362197] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.362444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.362549] Hardware name: linux,dummy-virt (DT)
[   22.362644] Call trace:
[   22.362722]  dump_backtrace+0x9c/0x128
[   22.362837]  show_stack+0x20/0x38
[   22.362937]  dump_stack_lvl+0x8c/0xd0
[   22.363030]  print_report+0x118/0x5f0
[   22.363084]  kasan_report+0xdc/0x128
[   22.363129]  __asan_report_load8_noabort+0x20/0x30
[   22.363182]  kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   22.363254]  kasan_bitops_generic+0x114/0x1d0
[   22.363318]  kunit_try_run_case+0x170/0x3f0
[   22.363370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.363422]  kthread+0x24c/0x2d0
[   22.363470]  ret_from_fork+0x10/0x20
[   22.363521] 
[   22.368586] Allocated by task 248:
[   22.368758]  kasan_save_stack+0x3c/0x68
[   22.368943]  kasan_save_track+0x20/0x40
[   22.369105]  kasan_save_alloc_info+0x40/0x58
[   22.369361]  __kasan_kmalloc+0xd4/0xd8
[   22.369932]  __kmalloc_cache_noprof+0x154/0x320
[   22.370528]  kasan_bitops_generic+0xa0/0x1d0
[   22.371115]  kunit_try_run_case+0x170/0x3f0
[   22.371669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.372279]  kthread+0x24c/0x2d0
[   22.372732]  ret_from_fork+0x10/0x20
[   22.373162] 
[   22.373464] The buggy address belongs to the object at fff00000c5bb22a0
[   22.373464]  which belongs to the cache kmalloc-16 of size 16
[   22.374461] The buggy address is located 8 bytes inside of
[   22.374461]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.375427] 
[   22.375738] The buggy address belongs to the physical page:
[   22.376170] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.376933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.377570] page_type: f5(slab)
[   22.377949] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.378628] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.379282] page dumped because: kasan: bad access detected
[   22.379795] 
[   22.380065] Memory state around the buggy address:
[   22.380556]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.381181]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.381830] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.382409]                                   ^
[   22.382866]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.383589]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.384095] ==================================================================
[   22.387053] ==================================================================
[   22.387656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   22.388326] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.388899] 
[   22.389215] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.389463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.389546] Hardware name: linux,dummy-virt (DT)
[   22.389632] Call trace:
[   22.389691]  dump_backtrace+0x9c/0x128
[   22.389836]  show_stack+0x20/0x38
[   22.389934]  dump_stack_lvl+0x8c/0xd0
[   22.390019]  print_report+0x118/0x5f0
[   22.390070]  kasan_report+0xdc/0x128
[   22.390113]  kasan_check_range+0x100/0x1a8
[   22.390283]  __kasan_check_write+0x20/0x30
[   22.390378]  kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   22.390476]  kasan_bitops_generic+0x114/0x1d0
[   22.390584]  kunit_try_run_case+0x170/0x3f0
[   22.390644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.390699]  kthread+0x24c/0x2d0
[   22.390745]  ret_from_fork+0x10/0x20
[   22.390798] 
[   22.394550] Allocated by task 248:
[   22.395023]  kasan_save_stack+0x3c/0x68
[   22.395668]  kasan_save_track+0x20/0x40
[   22.396586]  kasan_save_alloc_info+0x40/0x58
[   22.397534]  __kasan_kmalloc+0xd4/0xd8
[   22.398062]  __kmalloc_cache_noprof+0x154/0x320
[   22.398655]  kasan_bitops_generic+0xa0/0x1d0
[   22.399066]  kunit_try_run_case+0x170/0x3f0
[   22.399485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.400089]  kthread+0x24c/0x2d0
[   22.400542]  ret_from_fork+0x10/0x20
[   22.401003] 
[   22.401308] The buggy address belongs to the object at fff00000c5bb22a0
[   22.401308]  which belongs to the cache kmalloc-16 of size 16
[   22.402171] The buggy address is located 8 bytes inside of
[   22.402171]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.403120] 
[   22.403365] The buggy address belongs to the physical page:
[   22.403834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.404494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.405059] page_type: f5(slab)
[   22.405536] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.406176] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.406860] page dumped because: kasan: bad access detected
[   22.407356] 
[   22.407618] Memory state around the buggy address:
[   22.408024]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.408643]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.409185] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.409852]                                   ^
[   22.410383]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.410935]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.411540] ==================================================================
[   22.560001] ==================================================================
[   22.560826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   22.561431] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.561975] 
[   22.562320] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.562538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.562612] Hardware name: linux,dummy-virt (DT)
[   22.562688] Call trace:
[   22.562753]  dump_backtrace+0x9c/0x128
[   22.562873]  show_stack+0x20/0x38
[   22.562976]  dump_stack_lvl+0x8c/0xd0
[   22.563064]  print_report+0x118/0x5f0
[   22.563163]  kasan_report+0xdc/0x128
[   22.563271]  kasan_check_range+0x100/0x1a8
[   22.563325]  __kasan_check_write+0x20/0x30
[   22.563375]  kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   22.563431]  kasan_bitops_generic+0x114/0x1d0
[   22.563485]  kunit_try_run_case+0x170/0x3f0
[   22.563532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.563586]  kthread+0x24c/0x2d0
[   22.563633]  ret_from_fork+0x10/0x20
[   22.563683] 
[   22.569132] Allocated by task 248:
[   22.569575]  kasan_save_stack+0x3c/0x68
[   22.570125]  kasan_save_track+0x20/0x40
[   22.570547]  kasan_save_alloc_info+0x40/0x58
[   22.571082]  __kasan_kmalloc+0xd4/0xd8
[   22.571552]  __kmalloc_cache_noprof+0x154/0x320
[   22.572062]  kasan_bitops_generic+0xa0/0x1d0
[   22.572611]  kunit_try_run_case+0x170/0x3f0
[   22.573129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.573765]  kthread+0x24c/0x2d0
[   22.574246]  ret_from_fork+0x10/0x20
[   22.574635] 
[   22.574941] The buggy address belongs to the object at fff00000c5bb22a0
[   22.574941]  which belongs to the cache kmalloc-16 of size 16
[   22.575864] The buggy address is located 8 bytes inside of
[   22.575864]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.576856] 
[   22.577160] The buggy address belongs to the physical page:
[   22.577750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.578436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.578953] page_type: f5(slab)
[   22.579401] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.580029] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.580671] page dumped because: kasan: bad access detected
[   22.581120] 
[   22.581396] Memory state around the buggy address:
[   22.581822]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.582551]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.583077] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.583687]                                   ^
[   22.584148]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.584768]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.585322] ==================================================================
[   22.470391] ==================================================================
[   22.470852] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x334/0xbf8
[   22.471739] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.472515] 
[   22.472880] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.473125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.473206] Hardware name: linux,dummy-virt (DT)
[   22.473341] Call trace:
[   22.473410]  dump_backtrace+0x9c/0x128
[   22.473547]  show_stack+0x20/0x38
[   22.473654]  dump_stack_lvl+0x8c/0xd0
[   22.473747]  print_report+0x118/0x5f0
[   22.473802]  kasan_report+0xdc/0x128
[   22.473847]  kasan_check_range+0x100/0x1a8
[   22.473897]  __kasan_check_write+0x20/0x30
[   22.473946]  kasan_bitops_modify.constprop.0+0x334/0xbf8
[   22.474002]  kasan_bitops_generic+0x114/0x1d0
[   22.474052]  kunit_try_run_case+0x170/0x3f0
[   22.474102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.474156]  kthread+0x24c/0x2d0
[   22.474202]  ret_from_fork+0x10/0x20
[   22.474277] 
[   22.480382] Allocated by task 248:
[   22.480688]  kasan_save_stack+0x3c/0x68
[   22.481065]  kasan_save_track+0x20/0x40
[   22.481596]  kasan_save_alloc_info+0x40/0x58
[   22.482151]  __kasan_kmalloc+0xd4/0xd8
[   22.484746]  __kmalloc_cache_noprof+0x154/0x320
[   22.485692]  kasan_bitops_generic+0xa0/0x1d0
[   22.486544]  kunit_try_run_case+0x170/0x3f0
[   22.487442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.487849]  kthread+0x24c/0x2d0
[   22.488141]  ret_from_fork+0x10/0x20
[   22.488566] 
[   22.488804] The buggy address belongs to the object at fff00000c5bb22a0
[   22.488804]  which belongs to the cache kmalloc-16 of size 16
[   22.489526] The buggy address is located 8 bytes inside of
[   22.489526]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.490670] 
[   22.490962] The buggy address belongs to the physical page:
[   22.493033] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.493649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.494346] page_type: f5(slab)
[   22.494668] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.495466] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.496135] page dumped because: kasan: bad access detected
[   22.496594] 
[   22.496878] Memory state around the buggy address:
[   22.497449]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.498196]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.498830] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.499381]                                   ^
[   22.499809]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.500415]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.501001] ==================================================================
[   22.440669] ==================================================================
[   22.441167] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   22.442184] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.442650] 
[   22.442887] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.443456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.443566] Hardware name: linux,dummy-virt (DT)
[   22.443664] Call trace:
[   22.443719]  dump_backtrace+0x9c/0x128
[   22.443835]  show_stack+0x20/0x38
[   22.443958]  dump_stack_lvl+0x8c/0xd0
[   22.444084]  print_report+0x118/0x5f0
[   22.444179]  kasan_report+0xdc/0x128
[   22.444293]  kasan_check_range+0x100/0x1a8
[   22.444398]  __kasan_check_write+0x20/0x30
[   22.444456]  kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   22.444511]  kasan_bitops_generic+0x114/0x1d0
[   22.444562]  kunit_try_run_case+0x170/0x3f0
[   22.444611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.444664]  kthread+0x24c/0x2d0
[   22.444711]  ret_from_fork+0x10/0x20
[   22.444763] 
[   22.450229] Allocated by task 248:
[   22.451466]  kasan_save_stack+0x3c/0x68
[   22.452558]  kasan_save_track+0x20/0x40
[   22.453285]  kasan_save_alloc_info+0x40/0x58
[   22.453733]  __kasan_kmalloc+0xd4/0xd8
[   22.454115]  __kmalloc_cache_noprof+0x154/0x320
[   22.454688]  kasan_bitops_generic+0xa0/0x1d0
[   22.455131]  kunit_try_run_case+0x170/0x3f0
[   22.455623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.456183]  kthread+0x24c/0x2d0
[   22.456623]  ret_from_fork+0x10/0x20
[   22.457054] 
[   22.457338] The buggy address belongs to the object at fff00000c5bb22a0
[   22.457338]  which belongs to the cache kmalloc-16 of size 16
[   22.458224] The buggy address is located 8 bytes inside of
[   22.458224]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.459167] 
[   22.459501] The buggy address belongs to the physical page:
[   22.460042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.460733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.461356] page_type: f5(slab)
[   22.461752] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.462459] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.463107] page dumped because: kasan: bad access detected
[   22.463623] 
[   22.463881] Memory state around the buggy address:
[   22.464381]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.465131]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.465775] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.466395]                                   ^
[   22.466877]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.467498]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.468114] ==================================================================
[   22.587180] ==================================================================
[   22.587859] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   22.588554] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.589330] 
[   22.589670] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.589869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.589910] Hardware name: linux,dummy-virt (DT)
[   22.589967] Call trace:
[   22.590024]  dump_backtrace+0x9c/0x128
[   22.590130]  show_stack+0x20/0x38
[   22.590218]  dump_stack_lvl+0x8c/0xd0
[   22.590343]  print_report+0x118/0x5f0
[   22.590450]  kasan_report+0xdc/0x128
[   22.590554]  __asan_report_load8_noabort+0x20/0x30
[   22.590669]  kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   22.590755]  kasan_bitops_generic+0x114/0x1d0
[   22.590810]  kunit_try_run_case+0x170/0x3f0
[   22.590863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.590918]  kthread+0x24c/0x2d0
[   22.590966]  ret_from_fork+0x10/0x20
[   22.591018] 
[   22.595773] Allocated by task 248:
[   22.596226]  kasan_save_stack+0x3c/0x68
[   22.596612]  kasan_save_track+0x20/0x40
[   22.596946]  kasan_save_alloc_info+0x40/0x58
[   22.597473]  __kasan_kmalloc+0xd4/0xd8
[   22.597964]  __kmalloc_cache_noprof+0x154/0x320
[   22.598514]  kasan_bitops_generic+0xa0/0x1d0
[   22.598939]  kunit_try_run_case+0x170/0x3f0
[   22.599315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.599913]  kthread+0x24c/0x2d0
[   22.600348]  ret_from_fork+0x10/0x20
[   22.600782] 
[   22.601069] The buggy address belongs to the object at fff00000c5bb22a0
[   22.601069]  which belongs to the cache kmalloc-16 of size 16
[   22.601830] The buggy address is located 8 bytes inside of
[   22.601830]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.602809] 
[   22.603110] The buggy address belongs to the physical page:
[   22.603582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.604190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.604878] page_type: f5(slab)
[   22.605339] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.606024] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.606601] page dumped because: kasan: bad access detected
[   22.607148] 
[   22.607414] Memory state around the buggy address:
[   22.607921]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.608507]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.609087] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.610091]                                   ^
[   22.610684]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.611396]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.612077] ==================================================================
[   22.413277] ==================================================================
[   22.413993] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   22.414519] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.415277] 
[   22.415650] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.415883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.415965] Hardware name: linux,dummy-virt (DT)
[   22.416070] Call trace:
[   22.416154]  dump_backtrace+0x9c/0x128
[   22.416296]  show_stack+0x20/0x38
[   22.416407]  dump_stack_lvl+0x8c/0xd0
[   22.416505]  print_report+0x118/0x5f0
[   22.416600]  kasan_report+0xdc/0x128
[   22.416653]  __asan_report_load8_noabort+0x20/0x30
[   22.416705]  kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   22.416760]  kasan_bitops_generic+0x114/0x1d0
[   22.416811]  kunit_try_run_case+0x170/0x3f0
[   22.416859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.416914]  kthread+0x24c/0x2d0
[   22.416960]  ret_from_fork+0x10/0x20
[   22.417010] 
[   22.422203] Allocated by task 248:
[   22.422719]  kasan_save_stack+0x3c/0x68
[   22.423184]  kasan_save_track+0x20/0x40
[   22.423657]  kasan_save_alloc_info+0x40/0x58
[   22.424194]  __kasan_kmalloc+0xd4/0xd8
[   22.424601]  __kmalloc_cache_noprof+0x154/0x320
[   22.425161]  kasan_bitops_generic+0xa0/0x1d0
[   22.425624]  kunit_try_run_case+0x170/0x3f0
[   22.426161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.426679]  kthread+0x24c/0x2d0
[   22.427074]  ret_from_fork+0x10/0x20
[   22.427500] 
[   22.427791] The buggy address belongs to the object at fff00000c5bb22a0
[   22.427791]  which belongs to the cache kmalloc-16 of size 16
[   22.428727] The buggy address is located 8 bytes inside of
[   22.428727]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.429699] 
[   22.430040] The buggy address belongs to the physical page:
[   22.430571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.431273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.431873] page_type: f5(slab)
[   22.432290] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.432952] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.433594] page dumped because: kasan: bad access detected
[   22.434097] 
[   22.434373] Memory state around the buggy address:
[   22.434825]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.435430]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.435951] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.436692]                                   ^
[   22.437089]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.437760]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.438332] ==================================================================
[   22.330925] ==================================================================
[   22.332074] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x104/0xbf8
[   22.333202] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.333790] 
[   22.334170] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.334434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.334509] Hardware name: linux,dummy-virt (DT)
[   22.334592] Call trace:
[   22.334652]  dump_backtrace+0x9c/0x128
[   22.334781]  show_stack+0x20/0x38
[   22.334881]  dump_stack_lvl+0x8c/0xd0
[   22.334963]  print_report+0x118/0x5f0
[   22.335012]  kasan_report+0xdc/0x128
[   22.335056]  kasan_check_range+0x100/0x1a8
[   22.335104]  __kasan_check_write+0x20/0x30
[   22.335151]  kasan_bitops_modify.constprop.0+0x104/0xbf8
[   22.335207]  kasan_bitops_generic+0x114/0x1d0
[   22.335286]  kunit_try_run_case+0x170/0x3f0
[   22.335339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.335394]  kthread+0x24c/0x2d0
[   22.335441]  ret_from_fork+0x10/0x20
[   22.335490] 
[   22.340752] Allocated by task 248:
[   22.341254]  kasan_save_stack+0x3c/0x68
[   22.341737]  kasan_save_track+0x20/0x40
[   22.342265]  kasan_save_alloc_info+0x40/0x58
[   22.342758]  __kasan_kmalloc+0xd4/0xd8
[   22.343261]  __kmalloc_cache_noprof+0x154/0x320
[   22.343835]  kasan_bitops_generic+0xa0/0x1d0
[   22.344267]  kunit_try_run_case+0x170/0x3f0
[   22.344807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.345382]  kthread+0x24c/0x2d0
[   22.345800]  ret_from_fork+0x10/0x20
[   22.346232] 
[   22.346532] The buggy address belongs to the object at fff00000c5bb22a0
[   22.346532]  which belongs to the cache kmalloc-16 of size 16
[   22.347330] The buggy address is located 8 bytes inside of
[   22.347330]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.348219] 
[   22.348525] The buggy address belongs to the physical page:
[   22.348981] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.349827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.350436] page_type: f5(slab)
[   22.350915] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.351611] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.351986] page dumped because: kasan: bad access detected
[   22.352290] 
[   22.352507] Memory state around the buggy address:
[   22.352995]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.353584]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.354328] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.354920]                                   ^
[   22.355465]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.356053]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.356633] ==================================================================

[   14.174919] ==================================================================
[   14.175116] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.175302] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.175699] 
[   14.175831] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.175876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.175888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.175908] Call Trace:
[   14.175922]  <TASK>
[   14.175937]  dump_stack_lvl+0x73/0xb0
[   14.175961]  print_report+0xd1/0x640
[   14.175984]  ? __virt_addr_valid+0x1db/0x2d0
[   14.176007]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.176028]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.176050]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.176093]  kasan_report+0x140/0x180
[   14.176117]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.176144]  kasan_check_range+0x10c/0x1c0
[   14.176164]  __kasan_check_write+0x18/0x20
[   14.176183]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   14.176205]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.176229]  ? ret_from_fork_asm+0x1a/0x30
[   14.176248]  ? ret_from_fork+0x41/0x80
[   14.176267]  ? kthread+0x257/0x310
[   14.176289]  kasan_bitops_generic+0x117/0x1c0
[   14.176309]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.176331]  ? __pfx_read_tsc+0x10/0x10
[   14.176349]  ? ktime_get_ts64+0x84/0x230
[   14.176374]  kunit_try_run_case+0x1a6/0x480
[   14.176395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.176414]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.176434]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.176457]  ? __kthread_parkme+0x82/0x160
[   14.176475]  ? preempt_count_sub+0x50/0x80
[   14.176496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.176515]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.176539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.176563]  kthread+0x257/0x310
[   14.176580]  ? __pfx_kthread+0x10/0x10
[   14.176597]  ret_from_fork+0x41/0x80
[   14.176616]  ? __pfx_kthread+0x10/0x10
[   14.176634]  ret_from_fork_asm+0x1a/0x30
[   14.176669]  </TASK>
[   14.176683] 
[   14.183828] Allocated by task 266:
[   14.184018]  kasan_save_stack+0x45/0x70
[   14.184145]  kasan_save_track+0x18/0x40
[   14.184339]  kasan_save_alloc_info+0x3b/0x50
[   14.184433]  __kasan_kmalloc+0xb7/0xc0
[   14.184516]  __kmalloc_cache_noprof+0x168/0x350
[   14.184609]  kasan_bitops_generic+0x93/0x1c0
[   14.184708]  kunit_try_run_case+0x1a6/0x480
[   14.184800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.184905]  kthread+0x257/0x310
[   14.184980]  ret_from_fork+0x41/0x80
[   14.185078]  ret_from_fork_asm+0x1a/0x30
[   14.185168] 
[   14.185286] The buggy address belongs to the object at ffff8881024e41c0
[   14.185286]  which belongs to the cache kmalloc-16 of size 16
[   14.185948] The buggy address is located 8 bytes inside of
[   14.185948]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.186631] 
[   14.186757] The buggy address belongs to the physical page:
[   14.187089] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.187519] flags: 0x200000000000000(node=0|zone=2)
[   14.187614] page_type: f5(slab)
[   14.187700] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.187828] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.188031] page dumped because: kasan: bad access detected
[   14.188335] 
[   14.188428] Memory state around the buggy address:
[   14.188717]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.188964]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.189182] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.189464]                                               ^
[   14.189682]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.189890]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.190137] ==================================================================
[   14.146797] ==================================================================
[   14.147041] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.147223] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.147533] 
[   14.147659] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.147710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.147722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.147744] Call Trace:
[   14.147757]  <TASK>
[   14.147772]  dump_stack_lvl+0x73/0xb0
[   14.147797]  print_report+0xd1/0x640
[   14.147819]  ? __virt_addr_valid+0x1db/0x2d0
[   14.147842]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.147863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.147886]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.147907]  kasan_report+0x140/0x180
[   14.147930]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.147956]  kasan_check_range+0x10c/0x1c0
[   14.147976]  __kasan_check_write+0x18/0x20
[   14.147996]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   14.148017]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.148040]  ? ret_from_fork_asm+0x1a/0x30
[   14.148077]  ? ret_from_fork+0x41/0x80
[   14.148097]  ? kthread+0x257/0x310
[   14.148120]  kasan_bitops_generic+0x117/0x1c0
[   14.148140]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.148160]  ? __pfx_read_tsc+0x10/0x10
[   14.148178]  ? ktime_get_ts64+0x84/0x230
[   14.148202]  kunit_try_run_case+0x1a6/0x480
[   14.148224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.148243]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.148263]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.148286]  ? __kthread_parkme+0x82/0x160
[   14.148303]  ? preempt_count_sub+0x50/0x80
[   14.148324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.148343]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.148367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.148391]  kthread+0x257/0x310
[   14.148407]  ? __pfx_kthread+0x10/0x10
[   14.148425]  ret_from_fork+0x41/0x80
[   14.148444]  ? __pfx_kthread+0x10/0x10
[   14.148461]  ret_from_fork_asm+0x1a/0x30
[   14.148489]  </TASK>
[   14.148500] 
[   14.153623] Allocated by task 266:
[   14.153807]  kasan_save_stack+0x45/0x70
[   14.154090]  kasan_save_track+0x18/0x40
[   14.154209]  kasan_save_alloc_info+0x3b/0x50
[   14.154304]  __kasan_kmalloc+0xb7/0xc0
[   14.154388]  __kmalloc_cache_noprof+0x168/0x350
[   14.154606]  kasan_bitops_generic+0x93/0x1c0
[   14.154845]  kunit_try_run_case+0x1a6/0x480
[   14.155103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.155366]  kthread+0x257/0x310
[   14.155466]  ret_from_fork+0x41/0x80
[   14.155644]  ret_from_fork_asm+0x1a/0x30
[   14.155753] 
[   14.155858] The buggy address belongs to the object at ffff8881024e41c0
[   14.155858]  which belongs to the cache kmalloc-16 of size 16
[   14.156160] The buggy address is located 8 bytes inside of
[   14.156160]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.156500] 
[   14.156600] The buggy address belongs to the physical page:
[   14.156731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.156901] flags: 0x200000000000000(node=0|zone=2)
[   14.157179] page_type: f5(slab)
[   14.157347] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.157476] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.157601] page dumped because: kasan: bad access detected
[   14.157707] 
[   14.157757] Memory state around the buggy address:
[   14.157848]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.157983]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.158130] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.158253]                                               ^
[   14.158570]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.158989]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.159425] ==================================================================
[   14.225402] ==================================================================
[   14.225971] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.226316] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.226561] 
[   14.226626] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.226679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.226694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.226715] Call Trace:
[   14.226739]  <TASK>
[   14.226758]  dump_stack_lvl+0x73/0xb0
[   14.226783]  print_report+0xd1/0x640
[   14.226818]  ? __virt_addr_valid+0x1db/0x2d0
[   14.226843]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.226865]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.226888]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.226911]  kasan_report+0x140/0x180
[   14.226935]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.226962]  kasan_check_range+0x10c/0x1c0
[   14.226996]  __kasan_check_write+0x18/0x20
[   14.227018]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   14.227052]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.227079]  ? ret_from_fork_asm+0x1a/0x30
[   14.227101]  ? ret_from_fork+0x41/0x80
[   14.227157]  ? kthread+0x257/0x310
[   14.227181]  kasan_bitops_generic+0x117/0x1c0
[   14.227215]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.227237]  ? __pfx_read_tsc+0x10/0x10
[   14.227256]  ? ktime_get_ts64+0x84/0x230
[   14.227281]  kunit_try_run_case+0x1a6/0x480
[   14.227318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.227340]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.227360]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.227384]  ? __kthread_parkme+0x82/0x160
[   14.227403]  ? preempt_count_sub+0x50/0x80
[   14.227424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.227444]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.227469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.227494]  kthread+0x257/0x310
[   14.227513]  ? __pfx_kthread+0x10/0x10
[   14.227532]  ret_from_fork+0x41/0x80
[   14.227551]  ? __pfx_kthread+0x10/0x10
[   14.227569]  ret_from_fork_asm+0x1a/0x30
[   14.227599]  </TASK>
[   14.227610] 
[   14.233013] Allocated by task 266:
[   14.233221]  kasan_save_stack+0x45/0x70
[   14.233451]  kasan_save_track+0x18/0x40
[   14.233571]  kasan_save_alloc_info+0x3b/0x50
[   14.233804]  __kasan_kmalloc+0xb7/0xc0
[   14.233892]  __kmalloc_cache_noprof+0x168/0x350
[   14.234003]  kasan_bitops_generic+0x93/0x1c0
[   14.234183]  kunit_try_run_case+0x1a6/0x480
[   14.234395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.234712]  kthread+0x257/0x310
[   14.234914]  ret_from_fork+0x41/0x80
[   14.235094]  ret_from_fork_asm+0x1a/0x30
[   14.235219] 
[   14.235308] The buggy address belongs to the object at ffff8881024e41c0
[   14.235308]  which belongs to the cache kmalloc-16 of size 16
[   14.235656] The buggy address is located 8 bytes inside of
[   14.235656]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.236013] 
[   14.236113] The buggy address belongs to the physical page:
[   14.236215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.236443] flags: 0x200000000000000(node=0|zone=2)
[   14.236702] page_type: f5(slab)
[   14.236848] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.237138] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.237415] page dumped because: kasan: bad access detected
[   14.237651] 
[   14.237762] Memory state around the buggy address:
[   14.237873]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.238014]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.238165] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.238285]                                               ^
[   14.238386]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.238505]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.238622] ==================================================================
[   14.190642] ==================================================================
[   14.191167] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.191325] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.191560] 
[   14.191823] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.191926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.191950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.192010] Call Trace:
[   14.192027]  <TASK>
[   14.192106]  dump_stack_lvl+0x73/0xb0
[   14.192188]  print_report+0xd1/0x640
[   14.192234]  ? __virt_addr_valid+0x1db/0x2d0
[   14.192258]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.192281]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.192303]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.192325]  kasan_report+0x140/0x180
[   14.192348]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.192375]  kasan_check_range+0x10c/0x1c0
[   14.192395]  __kasan_check_write+0x18/0x20
[   14.192415]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   14.192437]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.192460]  ? ret_from_fork_asm+0x1a/0x30
[   14.192480]  ? ret_from_fork+0x41/0x80
[   14.192500]  ? kthread+0x257/0x310
[   14.192523]  kasan_bitops_generic+0x117/0x1c0
[   14.192545]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.192568]  ? __pfx_read_tsc+0x10/0x10
[   14.192586]  ? ktime_get_ts64+0x84/0x230
[   14.192611]  kunit_try_run_case+0x1a6/0x480
[   14.192632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.192652]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.192683]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.192709]  ? __kthread_parkme+0x82/0x160
[   14.192728]  ? preempt_count_sub+0x50/0x80
[   14.192750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.192770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.192795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.192821]  kthread+0x257/0x310
[   14.192839]  ? __pfx_kthread+0x10/0x10
[   14.192857]  ret_from_fork+0x41/0x80
[   14.192877]  ? __pfx_kthread+0x10/0x10
[   14.192894]  ret_from_fork_asm+0x1a/0x30
[   14.192922]  </TASK>
[   14.192932] 
[   14.198867] Allocated by task 266:
[   14.199048]  kasan_save_stack+0x45/0x70
[   14.199161]  kasan_save_track+0x18/0x40
[   14.199250]  kasan_save_alloc_info+0x3b/0x50
[   14.199339]  __kasan_kmalloc+0xb7/0xc0
[   14.199423]  __kmalloc_cache_noprof+0x168/0x350
[   14.199515]  kasan_bitops_generic+0x93/0x1c0
[   14.199600]  kunit_try_run_case+0x1a6/0x480
[   14.199718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.200034]  kthread+0x257/0x310
[   14.200256]  ret_from_fork+0x41/0x80
[   14.200484]  ret_from_fork_asm+0x1a/0x30
[   14.200724] 
[   14.200846] The buggy address belongs to the object at ffff8881024e41c0
[   14.200846]  which belongs to the cache kmalloc-16 of size 16
[   14.201433] The buggy address is located 8 bytes inside of
[   14.201433]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.201926] 
[   14.202037] The buggy address belongs to the physical page:
[   14.202306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.202490] flags: 0x200000000000000(node=0|zone=2)
[   14.202590] page_type: f5(slab)
[   14.202677] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.202812] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.202937] page dumped because: kasan: bad access detected
[   14.203035] 
[   14.203099] Memory state around the buggy address:
[   14.203192]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.203590]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.203974] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.204363]                                               ^
[   14.204688]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.205103]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.205502] ==================================================================
[   14.160213] ==================================================================
[   14.161202] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.161707] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.161928] 
[   14.162039] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.162102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.162115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.162135] Call Trace:
[   14.162151]  <TASK>
[   14.162167]  dump_stack_lvl+0x73/0xb0
[   14.162192]  print_report+0xd1/0x640
[   14.162215]  ? __virt_addr_valid+0x1db/0x2d0
[   14.162237]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.162259]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.162282]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.162304]  kasan_report+0x140/0x180
[   14.162327]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.162353]  kasan_check_range+0x10c/0x1c0
[   14.162374]  __kasan_check_write+0x18/0x20
[   14.162394]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   14.162416]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.162440]  ? ret_from_fork_asm+0x1a/0x30
[   14.162460]  ? ret_from_fork+0x41/0x80
[   14.162479]  ? kthread+0x257/0x310
[   14.162502]  kasan_bitops_generic+0x117/0x1c0
[   14.162522]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.162544]  ? __pfx_read_tsc+0x10/0x10
[   14.162562]  ? ktime_get_ts64+0x84/0x230
[   14.162588]  kunit_try_run_case+0x1a6/0x480
[   14.162609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.162628]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.162648]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.162682]  ? __kthread_parkme+0x82/0x160
[   14.162702]  ? preempt_count_sub+0x50/0x80
[   14.162725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.162744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.162769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.162794]  kthread+0x257/0x310
[   14.162812]  ? __pfx_kthread+0x10/0x10
[   14.162831]  ret_from_fork+0x41/0x80
[   14.162850]  ? __pfx_kthread+0x10/0x10
[   14.162869]  ret_from_fork_asm+0x1a/0x30
[   14.162898]  </TASK>
[   14.162910] 
[   14.168269] Allocated by task 266:
[   14.168351]  kasan_save_stack+0x45/0x70
[   14.168444]  kasan_save_track+0x18/0x40
[   14.168529]  kasan_save_alloc_info+0x3b/0x50
[   14.168615]  __kasan_kmalloc+0xb7/0xc0
[   14.168705]  __kmalloc_cache_noprof+0x168/0x350
[   14.168800]  kasan_bitops_generic+0x93/0x1c0
[   14.168906]  kunit_try_run_case+0x1a6/0x480
[   14.169163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.169456]  kthread+0x257/0x310
[   14.169627]  ret_from_fork+0x41/0x80
[   14.169856]  ret_from_fork_asm+0x1a/0x30
[   14.170075] 
[   14.170200] The buggy address belongs to the object at ffff8881024e41c0
[   14.170200]  which belongs to the cache kmalloc-16 of size 16
[   14.170657] The buggy address is located 8 bytes inside of
[   14.170657]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.171076] 
[   14.171185] The buggy address belongs to the physical page:
[   14.171315] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.171563] flags: 0x200000000000000(node=0|zone=2)
[   14.171756] page_type: f5(slab)
[   14.171846] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.171974] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.172380] page dumped because: kasan: bad access detected
[   14.172516] 
[   14.172567] Memory state around the buggy address:
[   14.172797]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.173089]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.173235] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.173473]                                               ^
[   14.173689]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.173886]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.174245] ==================================================================
[   14.131309] ==================================================================
[   14.131849] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.132177] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.132390] 
[   14.132518] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.132561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.132573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.132594] Call Trace:
[   14.132608]  <TASK>
[   14.132625]  dump_stack_lvl+0x73/0xb0
[   14.132649]  print_report+0xd1/0x640
[   14.132680]  ? __virt_addr_valid+0x1db/0x2d0
[   14.132704]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.132724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.132745]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.132766]  kasan_report+0x140/0x180
[   14.132787]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.132812]  kasan_check_range+0x10c/0x1c0
[   14.132832]  __kasan_check_write+0x18/0x20
[   14.132851]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   14.132871]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.132893]  ? ret_from_fork_asm+0x1a/0x30
[   14.132911]  ? ret_from_fork+0x41/0x80
[   14.132929]  ? kthread+0x257/0x310
[   14.132949]  kasan_bitops_generic+0x117/0x1c0
[   14.132968]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.132988]  ? __pfx_read_tsc+0x10/0x10
[   14.133004]  ? ktime_get_ts64+0x84/0x230
[   14.133028]  kunit_try_run_case+0x1a6/0x480
[   14.133049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.133068]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.133086]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.133109]  ? __kthread_parkme+0x82/0x160
[   14.133125]  ? preempt_count_sub+0x50/0x80
[   14.133146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.133164]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.133188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.133212]  kthread+0x257/0x310
[   14.133228]  ? __pfx_kthread+0x10/0x10
[   14.133277]  ret_from_fork+0x41/0x80
[   14.133300]  ? __pfx_kthread+0x10/0x10
[   14.133333]  ret_from_fork_asm+0x1a/0x30
[   14.133365]  </TASK>
[   14.133376] 
[   14.140025] Allocated by task 266:
[   14.140311]  kasan_save_stack+0x45/0x70
[   14.140500]  kasan_save_track+0x18/0x40
[   14.140780]  kasan_save_alloc_info+0x3b/0x50
[   14.140942]  __kasan_kmalloc+0xb7/0xc0
[   14.141107]  __kmalloc_cache_noprof+0x168/0x350
[   14.141387]  kasan_bitops_generic+0x93/0x1c0
[   14.141590]  kunit_try_run_case+0x1a6/0x480
[   14.141757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.141908]  kthread+0x257/0x310
[   14.141988]  ret_from_fork+0x41/0x80
[   14.142141]  ret_from_fork_asm+0x1a/0x30
[   14.142262] 
[   14.142325] The buggy address belongs to the object at ffff8881024e41c0
[   14.142325]  which belongs to the cache kmalloc-16 of size 16
[   14.142620] The buggy address is located 8 bytes inside of
[   14.142620]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.142926] 
[   14.142989] The buggy address belongs to the physical page:
[   14.143100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.143396] flags: 0x200000000000000(node=0|zone=2)
[   14.143623] page_type: f5(slab)
[   14.143794] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.144039] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.144191] page dumped because: kasan: bad access detected
[   14.144288] 
[   14.144336] Memory state around the buggy address:
[   14.144590]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.144962]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.145185] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.145308]                                               ^
[   14.145512]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.145826]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.146030] ==================================================================
[   14.239421] ==================================================================
[   14.239798] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.240659] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.241086] 
[   14.241200] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.241245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.241257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.241277] Call Trace:
[   14.241293]  <TASK>
[   14.241311]  dump_stack_lvl+0x73/0xb0
[   14.241340]  print_report+0xd1/0x640
[   14.241364]  ? __virt_addr_valid+0x1db/0x2d0
[   14.241387]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.241409]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.241515]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.241541]  kasan_report+0x140/0x180
[   14.241565]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.241592]  kasan_check_range+0x10c/0x1c0
[   14.241613]  __kasan_check_write+0x18/0x20
[   14.241633]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   14.241654]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.241692]  ? ret_from_fork_asm+0x1a/0x30
[   14.241713]  ? ret_from_fork+0x41/0x80
[   14.241732]  ? kthread+0x257/0x310
[   14.241754]  kasan_bitops_generic+0x117/0x1c0
[   14.241775]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.241796]  ? __pfx_read_tsc+0x10/0x10
[   14.241814]  ? ktime_get_ts64+0x84/0x230
[   14.241839]  kunit_try_run_case+0x1a6/0x480
[   14.241860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.241880]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.241908]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.241934]  ? __kthread_parkme+0x82/0x160
[   14.241954]  ? preempt_count_sub+0x50/0x80
[   14.241978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.241999]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.242027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.242070]  kthread+0x257/0x310
[   14.242093]  ? __pfx_kthread+0x10/0x10
[   14.242112]  ret_from_fork+0x41/0x80
[   14.242132]  ? __pfx_kthread+0x10/0x10
[   14.242150]  ret_from_fork_asm+0x1a/0x30
[   14.242179]  </TASK>
[   14.242191] 
[   14.247162] Allocated by task 266:
[   14.247246]  kasan_save_stack+0x45/0x70
[   14.247338]  kasan_save_track+0x18/0x40
[   14.247424]  kasan_save_alloc_info+0x3b/0x50
[   14.247511]  __kasan_kmalloc+0xb7/0xc0
[   14.247594]  __kmalloc_cache_noprof+0x168/0x350
[   14.247797]  kasan_bitops_generic+0x93/0x1c0
[   14.248011]  kunit_try_run_case+0x1a6/0x480
[   14.248278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.248512]  kthread+0x257/0x310
[   14.248680]  ret_from_fork+0x41/0x80
[   14.248885]  ret_from_fork_asm+0x1a/0x30
[   14.249146] 
[   14.249253] The buggy address belongs to the object at ffff8881024e41c0
[   14.249253]  which belongs to the cache kmalloc-16 of size 16
[   14.249582] The buggy address is located 8 bytes inside of
[   14.249582]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.249789] 
[   14.249844] The buggy address belongs to the physical page:
[   14.250031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.250256] flags: 0x200000000000000(node=0|zone=2)
[   14.250523] page_type: f5(slab)
[   14.250658] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.250877] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.251065] page dumped because: kasan: bad access detected
[   14.251255] 
[   14.251366] Memory state around the buggy address:
[   14.251526]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.251784]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.252034] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.252248]                                               ^
[   14.252459]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.252674]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.252803] ==================================================================
[   14.206453] ==================================================================
[   14.206939] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.207494] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.208110] 
[   14.208243] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.208288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.208300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.208320] Call Trace:
[   14.208336]  <TASK>
[   14.208351]  dump_stack_lvl+0x73/0xb0
[   14.208380]  print_report+0xd1/0x640
[   14.208402]  ? __virt_addr_valid+0x1db/0x2d0
[   14.208522]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.208574]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.208601]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.208709]  kasan_report+0x140/0x180
[   14.208825]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.208859]  kasan_check_range+0x10c/0x1c0
[   14.208890]  __kasan_check_write+0x18/0x20
[   14.208913]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   14.208936]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.208960]  ? ret_from_fork_asm+0x1a/0x30
[   14.208981]  ? ret_from_fork+0x41/0x80
[   14.209000]  ? kthread+0x257/0x310
[   14.209024]  kasan_bitops_generic+0x117/0x1c0
[   14.209045]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.209067]  ? __pfx_read_tsc+0x10/0x10
[   14.209252]  ? ktime_get_ts64+0x84/0x230
[   14.209280]  kunit_try_run_case+0x1a6/0x480
[   14.209303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.209323]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.209344]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.209368]  ? __kthread_parkme+0x82/0x160
[   14.209386]  ? preempt_count_sub+0x50/0x80
[   14.209409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.209428]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.209453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.209477]  kthread+0x257/0x310
[   14.209495]  ? __pfx_kthread+0x10/0x10
[   14.209513]  ret_from_fork+0x41/0x80
[   14.209533]  ? __pfx_kthread+0x10/0x10
[   14.209551]  ret_from_fork_asm+0x1a/0x30
[   14.209580]  </TASK>
[   14.209592] 
[   14.216462] Allocated by task 266:
[   14.216731]  kasan_save_stack+0x45/0x70
[   14.216975]  kasan_save_track+0x18/0x40
[   14.217338]  kasan_save_alloc_info+0x3b/0x50
[   14.217585]  __kasan_kmalloc+0xb7/0xc0
[   14.217695]  __kmalloc_cache_noprof+0x168/0x350
[   14.218128]  kasan_bitops_generic+0x93/0x1c0
[   14.218649]  kunit_try_run_case+0x1a6/0x480
[   14.218892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.219052]  kthread+0x257/0x310
[   14.219232]  ret_from_fork+0x41/0x80
[   14.219514]  ret_from_fork_asm+0x1a/0x30
[   14.219680] 
[   14.219736] The buggy address belongs to the object at ffff8881024e41c0
[   14.219736]  which belongs to the cache kmalloc-16 of size 16
[   14.220382] The buggy address is located 8 bytes inside of
[   14.220382]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.220753] 
[   14.220806] The buggy address belongs to the physical page:
[   14.221107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.221243] flags: 0x200000000000000(node=0|zone=2)
[   14.221552] page_type: f5(slab)
[   14.221751] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.221980] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.222217] page dumped because: kasan: bad access detected
[   14.222418] 
[   14.222563] Memory state around the buggy address:
[   14.222762]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.223051]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.223415] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.223650]                                               ^
[   14.223877]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.224075]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.224226] ==================================================================