Hay
Date
June 2, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   22.614037] ==================================================================
[   22.615018] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   22.616114] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.616663] 
[   22.616885] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.617055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.617111] Hardware name: linux,dummy-virt (DT)
[   22.617189] Call trace:
[   22.617258]  dump_backtrace+0x9c/0x128
[   22.617374]  show_stack+0x20/0x38
[   22.617503]  dump_stack_lvl+0x8c/0xd0
[   22.617639]  print_report+0x118/0x5f0
[   22.618053]  kasan_report+0xdc/0x128
[   22.618160]  kasan_check_range+0x100/0x1a8
[   22.618283]  __kasan_check_write+0x20/0x30
[   22.618341]  kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   22.618405]  kasan_bitops_generic+0x120/0x1d0
[   22.618457]  kunit_try_run_case+0x170/0x3f0
[   22.618510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.618564]  kthread+0x24c/0x2d0
[   22.618612]  ret_from_fork+0x10/0x20
[   22.618665] 
[   22.622189] Allocated by task 248:
[   22.622631]  kasan_save_stack+0x3c/0x68
[   22.623269]  kasan_save_track+0x20/0x40
[   22.623844]  kasan_save_alloc_info+0x40/0x58
[   22.625740]  __kasan_kmalloc+0xd4/0xd8
[   22.626337]  __kmalloc_cache_noprof+0x154/0x320
[   22.626932]  kasan_bitops_generic+0xa0/0x1d0
[   22.627431]  kunit_try_run_case+0x170/0x3f0
[   22.627968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.628381]  kthread+0x24c/0x2d0
[   22.628753]  ret_from_fork+0x10/0x20
[   22.629175] 
[   22.629490] The buggy address belongs to the object at fff00000c5bb22a0
[   22.629490]  which belongs to the cache kmalloc-16 of size 16
[   22.630346] The buggy address is located 8 bytes inside of
[   22.630346]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.631232] 
[   22.631535] The buggy address belongs to the physical page:
[   22.631987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.632703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.633226] page_type: f5(slab)
[   22.633684] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.634335] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.634985] page dumped because: kasan: bad access detected
[   22.635432] 
[   22.635699] Memory state around the buggy address:
[   22.636102]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.636785]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.637361] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.637887]                                   ^
[   22.638338]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.638972]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.639499] ==================================================================
[   22.667778] ==================================================================
[   22.668434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   22.669129] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.670947] 
[   22.671224] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.671494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.671562] Hardware name: linux,dummy-virt (DT)
[   22.671612] Call trace:
[   22.671644]  dump_backtrace+0x9c/0x128
[   22.671743]  show_stack+0x20/0x38
[   22.671793]  dump_stack_lvl+0x8c/0xd0
[   22.671842]  print_report+0x118/0x5f0
[   22.671890]  kasan_report+0xdc/0x128
[   22.671934]  kasan_check_range+0x100/0x1a8
[   22.671982]  __kasan_check_write+0x20/0x30
[   22.672030]  kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   22.672087]  kasan_bitops_generic+0x120/0x1d0
[   22.672138]  kunit_try_run_case+0x170/0x3f0
[   22.672188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.672267]  kthread+0x24c/0x2d0
[   22.672348]  ret_from_fork+0x10/0x20
[   22.672446] 
[   22.677583] Allocated by task 248:
[   22.677995]  kasan_save_stack+0x3c/0x68
[   22.678493]  kasan_save_track+0x20/0x40
[   22.678870]  kasan_save_alloc_info+0x40/0x58
[   22.679273]  __kasan_kmalloc+0xd4/0xd8
[   22.679719]  __kmalloc_cache_noprof+0x154/0x320
[   22.680176]  kasan_bitops_generic+0xa0/0x1d0
[   22.680700]  kunit_try_run_case+0x170/0x3f0
[   22.681126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.681717]  kthread+0x24c/0x2d0
[   22.682163]  ret_from_fork+0x10/0x20
[   22.682644] 
[   22.682925] The buggy address belongs to the object at fff00000c5bb22a0
[   22.682925]  which belongs to the cache kmalloc-16 of size 16
[   22.683730] The buggy address is located 8 bytes inside of
[   22.683730]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.684702] 
[   22.685007] The buggy address belongs to the physical page:
[   22.685437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.686212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.686906] page_type: f5(slab)
[   22.687340] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.687931] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.688486] page dumped because: kasan: bad access detected
[   22.688976] 
[   22.689212] Memory state around the buggy address:
[   22.689661]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.690317]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.690859] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.691457]                                   ^
[   22.691876]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.692521]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.693059] ==================================================================
[   22.721347] ==================================================================
[   22.722409] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   22.722992] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.724086] 
[   22.724421] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.724708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.724756] Hardware name: linux,dummy-virt (DT)
[   22.724802] Call trace:
[   22.724835]  dump_backtrace+0x9c/0x128
[   22.724902]  show_stack+0x20/0x38
[   22.724947]  dump_stack_lvl+0x8c/0xd0
[   22.724997]  print_report+0x118/0x5f0
[   22.725045]  kasan_report+0xdc/0x128
[   22.725088]  kasan_check_range+0x100/0x1a8
[   22.725135]  __kasan_check_write+0x20/0x30
[   22.725183]  kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   22.725265]  kasan_bitops_generic+0x120/0x1d0
[   22.725322]  kunit_try_run_case+0x170/0x3f0
[   22.725373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.725430]  kthread+0x24c/0x2d0
[   22.725483]  ret_from_fork+0x10/0x20
[   22.725547] 
[   22.731280] Allocated by task 248:
[   22.731776]  kasan_save_stack+0x3c/0x68
[   22.732193]  kasan_save_track+0x20/0x40
[   22.732735]  kasan_save_alloc_info+0x40/0x58
[   22.733102]  __kasan_kmalloc+0xd4/0xd8
[   22.733608]  __kmalloc_cache_noprof+0x154/0x320
[   22.734033]  kasan_bitops_generic+0xa0/0x1d0
[   22.734456]  kunit_try_run_case+0x170/0x3f0
[   22.735010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.735563]  kthread+0x24c/0x2d0
[   22.736062]  ret_from_fork+0x10/0x20
[   22.736586] 
[   22.736908] The buggy address belongs to the object at fff00000c5bb22a0
[   22.736908]  which belongs to the cache kmalloc-16 of size 16
[   22.737881] The buggy address is located 8 bytes inside of
[   22.737881]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.738916] 
[   22.739284] The buggy address belongs to the physical page:
[   22.740175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.740869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.741403] page_type: f5(slab)
[   22.741747] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.742508] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.743583] page dumped because: kasan: bad access detected
[   22.743958] 
[   22.744432] Memory state around the buggy address:
[   22.744822]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.745258]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.745665] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.746038]                                   ^
[   22.747197]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.747912]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.748415] ==================================================================
[   22.695495] ==================================================================
[   22.696263] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   22.696581] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.696814] 
[   22.696944] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.697050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.697086] Hardware name: linux,dummy-virt (DT)
[   22.697128] Call trace:
[   22.697157]  dump_backtrace+0x9c/0x128
[   22.697211]  show_stack+0x20/0x38
[   22.697284]  dump_stack_lvl+0x8c/0xd0
[   22.697375]  print_report+0x118/0x5f0
[   22.697457]  kasan_report+0xdc/0x128
[   22.697547]  __asan_report_load8_noabort+0x20/0x30
[   22.697643]  kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   22.697760]  kasan_bitops_generic+0x120/0x1d0
[   22.697866]  kunit_try_run_case+0x170/0x3f0
[   22.697976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.698082]  kthread+0x24c/0x2d0
[   22.698180]  ret_from_fork+0x10/0x20
[   22.698304] 
[   22.703602] Allocated by task 248:
[   22.703941]  kasan_save_stack+0x3c/0x68
[   22.704471]  kasan_save_track+0x20/0x40
[   22.704823]  kasan_save_alloc_info+0x40/0x58
[   22.705310]  __kasan_kmalloc+0xd4/0xd8
[   22.705779]  __kmalloc_cache_noprof+0x154/0x320
[   22.706332]  kasan_bitops_generic+0xa0/0x1d0
[   22.706779]  kunit_try_run_case+0x170/0x3f0
[   22.707170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.707720]  kthread+0x24c/0x2d0
[   22.708133]  ret_from_fork+0x10/0x20
[   22.708534] 
[   22.708815] The buggy address belongs to the object at fff00000c5bb22a0
[   22.708815]  which belongs to the cache kmalloc-16 of size 16
[   22.709817] The buggy address is located 8 bytes inside of
[   22.709817]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.710651] 
[   22.710934] The buggy address belongs to the physical page:
[   22.711501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.712213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.712932] page_type: f5(slab)
[   22.713369] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.713994] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.714606] page dumped because: kasan: bad access detected
[   22.715007] 
[   22.715284] Memory state around the buggy address:
[   22.715750]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.716341]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.716933] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.717577]                                   ^
[   22.718073]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.718693]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.719235] ==================================================================
[   22.751895] ==================================================================
[   22.753088] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   22.755161] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.757290] 
[   22.757630] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.757877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.757961] Hardware name: linux,dummy-virt (DT)
[   22.758019] Call trace:
[   22.758053]  dump_backtrace+0x9c/0x128
[   22.758145]  show_stack+0x20/0x38
[   22.758207]  dump_stack_lvl+0x8c/0xd0
[   22.758283]  print_report+0x118/0x5f0
[   22.758336]  kasan_report+0xdc/0x128
[   22.758380]  __asan_report_load8_noabort+0x20/0x30
[   22.758431]  kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   22.758489]  kasan_bitops_generic+0x120/0x1d0
[   22.758539]  kunit_try_run_case+0x170/0x3f0
[   22.758589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.758643]  kthread+0x24c/0x2d0
[   22.758689]  ret_from_fork+0x10/0x20
[   22.758738] 
[   22.763700] Allocated by task 248:
[   22.764079]  kasan_save_stack+0x3c/0x68
[   22.764486]  kasan_save_track+0x20/0x40
[   22.764933]  kasan_save_alloc_info+0x40/0x58
[   22.765449]  __kasan_kmalloc+0xd4/0xd8
[   22.765947]  __kmalloc_cache_noprof+0x154/0x320
[   22.766442]  kasan_bitops_generic+0xa0/0x1d0
[   22.766928]  kunit_try_run_case+0x170/0x3f0
[   22.767469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.768087]  kthread+0x24c/0x2d0
[   22.768555]  ret_from_fork+0x10/0x20
[   22.768961] 
[   22.769261] The buggy address belongs to the object at fff00000c5bb22a0
[   22.769261]  which belongs to the cache kmalloc-16 of size 16
[   22.770135] The buggy address is located 8 bytes inside of
[   22.770135]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.771018] 
[   22.771340] The buggy address belongs to the physical page:
[   22.771826] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.772522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.773048] page_type: f5(slab)
[   22.773516] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.774181] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.774813] page dumped because: kasan: bad access detected
[   22.775286] 
[   22.775557] Memory state around the buggy address:
[   22.776015]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.776615]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.777231] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.777827]                                   ^
[   22.778285]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.778902]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.779499] ==================================================================
[   22.832889] ==================================================================
[   22.833602] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   22.834313] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.834926] 
[   22.836415] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.836548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.836586] Hardware name: linux,dummy-virt (DT)
[   22.836631] Call trace:
[   22.836661]  dump_backtrace+0x9c/0x128
[   22.836731]  show_stack+0x20/0x38
[   22.836776]  dump_stack_lvl+0x8c/0xd0
[   22.836825]  print_report+0x118/0x5f0
[   22.836870]  kasan_report+0xdc/0x128
[   22.836915]  __asan_report_load8_noabort+0x20/0x30
[   22.836965]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   22.837023]  kasan_bitops_generic+0x120/0x1d0
[   22.837075]  kunit_try_run_case+0x170/0x3f0
[   22.837125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.837178]  kthread+0x24c/0x2d0
[   22.837224]  ret_from_fork+0x10/0x20
[   22.837291] 
[   22.842085] Allocated by task 248:
[   22.842562]  kasan_save_stack+0x3c/0x68
[   22.843055]  kasan_save_track+0x20/0x40
[   22.843536]  kasan_save_alloc_info+0x40/0x58
[   22.843897]  __kasan_kmalloc+0xd4/0xd8
[   22.844396]  __kmalloc_cache_noprof+0x154/0x320
[   22.844937]  kasan_bitops_generic+0xa0/0x1d0
[   22.845348]  kunit_try_run_case+0x170/0x3f0
[   22.845777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.846205]  kthread+0x24c/0x2d0
[   22.846674]  ret_from_fork+0x10/0x20
[   22.847052] 
[   22.847350] The buggy address belongs to the object at fff00000c5bb22a0
[   22.847350]  which belongs to the cache kmalloc-16 of size 16
[   22.848034] The buggy address is located 8 bytes inside of
[   22.848034]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.849060] 
[   22.849353] The buggy address belongs to the physical page:
[   22.849801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.850499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.851077] page_type: f5(slab)
[   22.851538] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.852266] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.853000] page dumped because: kasan: bad access detected
[   22.853407] 
[   22.853697] Memory state around the buggy address:
[   22.854211]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.854798]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.855485] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.856043]                                   ^
[   22.856437]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.857068]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.857538] ==================================================================
[   22.641810] ==================================================================
[   22.642337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   22.643229] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.643962] 
[   22.644300] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.644512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.644595] Hardware name: linux,dummy-virt (DT)
[   22.644672] Call trace:
[   22.644725]  dump_backtrace+0x9c/0x128
[   22.644854]  show_stack+0x20/0x38
[   22.644957]  dump_stack_lvl+0x8c/0xd0
[   22.645071]  print_report+0x118/0x5f0
[   22.645167]  kasan_report+0xdc/0x128
[   22.645230]  __asan_report_load8_noabort+0x20/0x30
[   22.645314]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   22.645375]  kasan_bitops_generic+0x120/0x1d0
[   22.645426]  kunit_try_run_case+0x170/0x3f0
[   22.645485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.645546]  kthread+0x24c/0x2d0
[   22.645592]  ret_from_fork+0x10/0x20
[   22.645646] 
[   22.650361] Allocated by task 248:
[   22.650788]  kasan_save_stack+0x3c/0x68
[   22.651300]  kasan_save_track+0x20/0x40
[   22.651786]  kasan_save_alloc_info+0x40/0x58
[   22.652209]  __kasan_kmalloc+0xd4/0xd8
[   22.652671]  __kmalloc_cache_noprof+0x154/0x320
[   22.653197]  kasan_bitops_generic+0xa0/0x1d0
[   22.653729]  kunit_try_run_case+0x170/0x3f0
[   22.654086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.654662]  kthread+0x24c/0x2d0
[   22.655024]  ret_from_fork+0x10/0x20
[   22.655485] 
[   22.655771] The buggy address belongs to the object at fff00000c5bb22a0
[   22.655771]  which belongs to the cache kmalloc-16 of size 16
[   22.656615] The buggy address is located 8 bytes inside of
[   22.656615]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.657500] 
[   22.657814] The buggy address belongs to the physical page:
[   22.658234] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.659053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.659744] page_type: f5(slab)
[   22.660120] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.660710] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.661330] page dumped because: kasan: bad access detected
[   22.661880] 
[   22.662167] Memory state around the buggy address:
[   22.662639]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.663202]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.663777] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.664253]                                   ^
[   22.664762]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.665347]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.665911] ==================================================================
[   22.807527] ==================================================================
[   22.808254] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   22.808948] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.809491] 
[   22.809802] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.810006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.810083] Hardware name: linux,dummy-virt (DT)
[   22.810173] Call trace:
[   22.810248]  dump_backtrace+0x9c/0x128
[   22.810372]  show_stack+0x20/0x38
[   22.810463]  dump_stack_lvl+0x8c/0xd0
[   22.810570]  print_report+0x118/0x5f0
[   22.810665]  kasan_report+0xdc/0x128
[   22.810730]  __asan_report_load8_noabort+0x20/0x30
[   22.810786]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   22.810844]  kasan_bitops_generic+0x120/0x1d0
[   22.810894]  kunit_try_run_case+0x170/0x3f0
[   22.810945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.810999]  kthread+0x24c/0x2d0
[   22.811046]  ret_from_fork+0x10/0x20
[   22.811163] 
[   22.816082] Allocated by task 248:
[   22.816511]  kasan_save_stack+0x3c/0x68
[   22.816868]  kasan_save_track+0x20/0x40
[   22.817356]  kasan_save_alloc_info+0x40/0x58
[   22.817779]  __kasan_kmalloc+0xd4/0xd8
[   22.818196]  __kmalloc_cache_noprof+0x154/0x320
[   22.818590]  kasan_bitops_generic+0xa0/0x1d0
[   22.819100]  kunit_try_run_case+0x170/0x3f0
[   22.819480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.819993]  kthread+0x24c/0x2d0
[   22.820366]  ret_from_fork+0x10/0x20
[   22.820713] 
[   22.821007] The buggy address belongs to the object at fff00000c5bb22a0
[   22.821007]  which belongs to the cache kmalloc-16 of size 16
[   22.821959] The buggy address is located 8 bytes inside of
[   22.821959]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.822840] 
[   22.823133] The buggy address belongs to the physical page:
[   22.823660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.824363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.825006] page_type: f5(slab)
[   22.825434] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.826156] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.826793] page dumped because: kasan: bad access detected
[   22.827083] 
[   22.827226] Memory state around the buggy address:
[   22.827943]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.828544]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.828908] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.829594]                                   ^
[   22.829934]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.830665]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.831180] ==================================================================
[   22.781042] ==================================================================
[   22.781524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   22.782098] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.782603] 
[   22.782958] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.783194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.783520] Hardware name: linux,dummy-virt (DT)
[   22.783597] Call trace:
[   22.783634]  dump_backtrace+0x9c/0x128
[   22.783703]  show_stack+0x20/0x38
[   22.783749]  dump_stack_lvl+0x8c/0xd0
[   22.783799]  print_report+0x118/0x5f0
[   22.783847]  kasan_report+0xdc/0x128
[   22.783892]  kasan_check_range+0x100/0x1a8
[   22.783940]  __kasan_check_write+0x20/0x30
[   22.783987]  kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   22.784047]  kasan_bitops_generic+0x120/0x1d0
[   22.784097]  kunit_try_run_case+0x170/0x3f0
[   22.784148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.784203]  kthread+0x24c/0x2d0
[   22.784278]  ret_from_fork+0x10/0x20
[   22.784336] 
[   22.790208] Allocated by task 248:
[   22.790632]  kasan_save_stack+0x3c/0x68
[   22.790995]  kasan_save_track+0x20/0x40
[   22.791480]  kasan_save_alloc_info+0x40/0x58
[   22.791836]  __kasan_kmalloc+0xd4/0xd8
[   22.792307]  __kmalloc_cache_noprof+0x154/0x320
[   22.792686]  kasan_bitops_generic+0xa0/0x1d0
[   22.793190]  kunit_try_run_case+0x170/0x3f0
[   22.793561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.794161]  kthread+0x24c/0x2d0
[   22.794490]  ret_from_fork+0x10/0x20
[   22.794948] 
[   22.795214] The buggy address belongs to the object at fff00000c5bb22a0
[   22.795214]  which belongs to the cache kmalloc-16 of size 16
[   22.796432] The buggy address is located 8 bytes inside of
[   22.796432]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.797424] 
[   22.797727] The buggy address belongs to the physical page:
[   22.798278] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.798973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.799489] page_type: f5(slab)
[   22.799928] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.800605] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.801138] page dumped because: kasan: bad access detected
[   22.801688] 
[   22.801959] Memory state around the buggy address:
[   22.802456]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.802999]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.803657] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.804308]                                   ^
[   22.804844]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.805431]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.806042] ==================================================================

[   14.383441] ==================================================================
[   14.383831] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   14.384188] Read of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.384451] 
[   14.384574] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.384615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.384627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.384667] Call Trace:
[   14.384685]  <TASK>
[   14.384699]  dump_stack_lvl+0x73/0xb0
[   14.384723]  print_report+0xd1/0x640
[   14.384745]  ? __virt_addr_valid+0x1db/0x2d0
[   14.384767]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   14.384805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.384830]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   14.384862]  kasan_report+0x140/0x180
[   14.384893]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   14.384928]  __asan_report_load8_noabort+0x18/0x20
[   14.384948]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   14.384980]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.385013]  ? ret_from_fork_asm+0x1a/0x30
[   14.385032]  ? ret_from_fork+0x41/0x80
[   14.385067]  ? kthread+0x257/0x310
[   14.385092]  kasan_bitops_generic+0x122/0x1c0
[   14.385113]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.385134]  ? __pfx_read_tsc+0x10/0x10
[   14.385151]  ? ktime_get_ts64+0x84/0x230
[   14.385176]  kunit_try_run_case+0x1a6/0x480
[   14.385197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.385216]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.385235]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.385259]  ? __kthread_parkme+0x82/0x160
[   14.385277]  ? preempt_count_sub+0x50/0x80
[   14.385298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.385318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.385342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.385368]  kthread+0x257/0x310
[   14.385385]  ? __pfx_kthread+0x10/0x10
[   14.385404]  ret_from_fork+0x41/0x80
[   14.385440]  ? __pfx_kthread+0x10/0x10
[   14.385461]  ret_from_fork_asm+0x1a/0x30
[   14.385489]  </TASK>
[   14.385500] 
[   14.391214] Allocated by task 266:
[   14.391357]  kasan_save_stack+0x45/0x70
[   14.391495]  kasan_save_track+0x18/0x40
[   14.391712]  kasan_save_alloc_info+0x3b/0x50
[   14.391860]  __kasan_kmalloc+0xb7/0xc0
[   14.391992]  __kmalloc_cache_noprof+0x168/0x350
[   14.392177]  kasan_bitops_generic+0x93/0x1c0
[   14.392270]  kunit_try_run_case+0x1a6/0x480
[   14.392490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.392761]  kthread+0x257/0x310
[   14.392874]  ret_from_fork+0x41/0x80
[   14.393029]  ret_from_fork_asm+0x1a/0x30
[   14.393229] 
[   14.393298] The buggy address belongs to the object at ffff8881024e41c0
[   14.393298]  which belongs to the cache kmalloc-16 of size 16
[   14.393679] The buggy address is located 8 bytes inside of
[   14.393679]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.393902] 
[   14.393971] The buggy address belongs to the physical page:
[   14.394125] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.394309] flags: 0x200000000000000(node=0|zone=2)
[   14.394433] page_type: f5(slab)
[   14.394528] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.394704] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.394877] page dumped because: kasan: bad access detected
[   14.395001] 
[   14.395086] Memory state around the buggy address:
[   14.395309]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.395680]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.396026] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.396409]                                               ^
[   14.396709]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.397097]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.397461] ==================================================================
[   14.338071] ==================================================================
[   14.338495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   14.338881] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.339275] 
[   14.339393] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.339451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.339464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.339484] Call Trace:
[   14.339499]  <TASK>
[   14.339515]  dump_stack_lvl+0x73/0xb0
[   14.339553]  print_report+0xd1/0x640
[   14.339580]  ? __virt_addr_valid+0x1db/0x2d0
[   14.339604]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   14.339627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.339649]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   14.339682]  kasan_report+0x140/0x180
[   14.339707]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   14.339750]  kasan_check_range+0x10c/0x1c0
[   14.339774]  __kasan_check_write+0x18/0x20
[   14.339795]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   14.339819]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.339845]  ? ret_from_fork_asm+0x1a/0x30
[   14.339864]  ? ret_from_fork+0x41/0x80
[   14.339884]  ? kthread+0x257/0x310
[   14.339905]  kasan_bitops_generic+0x122/0x1c0
[   14.339925]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.339946]  ? __pfx_read_tsc+0x10/0x10
[   14.339965]  ? ktime_get_ts64+0x84/0x230
[   14.339989]  kunit_try_run_case+0x1a6/0x480
[   14.340010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.340030]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.340070]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.340099]  ? __kthread_parkme+0x82/0x160
[   14.340119]  ? preempt_count_sub+0x50/0x80
[   14.340141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.340162]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.340187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.340213]  kthread+0x257/0x310
[   14.340232]  ? __pfx_kthread+0x10/0x10
[   14.340251]  ret_from_fork+0x41/0x80
[   14.340272]  ? __pfx_kthread+0x10/0x10
[   14.340290]  ret_from_fork_asm+0x1a/0x30
[   14.340320]  </TASK>
[   14.340332] 
[   14.345590] Allocated by task 266:
[   14.345681]  kasan_save_stack+0x45/0x70
[   14.345775]  kasan_save_track+0x18/0x40
[   14.345862]  kasan_save_alloc_info+0x3b/0x50
[   14.345957]  __kasan_kmalloc+0xb7/0xc0
[   14.346168]  __kmalloc_cache_noprof+0x168/0x350
[   14.346377]  kasan_bitops_generic+0x93/0x1c0
[   14.346619]  kunit_try_run_case+0x1a6/0x480
[   14.346855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.347148]  kthread+0x257/0x310
[   14.347339]  ret_from_fork+0x41/0x80
[   14.347541]  ret_from_fork_asm+0x1a/0x30
[   14.347668] 
[   14.347755] The buggy address belongs to the object at ffff8881024e41c0
[   14.347755]  which belongs to the cache kmalloc-16 of size 16
[   14.348072] The buggy address is located 8 bytes inside of
[   14.348072]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.348375] 
[   14.348492] The buggy address belongs to the physical page:
[   14.348592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.348734] flags: 0x200000000000000(node=0|zone=2)
[   14.348833] page_type: f5(slab)
[   14.348911] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.349039] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.349408] page dumped because: kasan: bad access detected
[   14.349693] 
[   14.349794] Memory state around the buggy address:
[   14.350024]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.350318]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.350641] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.350876]                                               ^
[   14.351032]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.351240]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.351360] ==================================================================
[   14.272403] ==================================================================
[   14.272630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.272846] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.272985] 
[   14.273119] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.273165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.273178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.273199] Call Trace:
[   14.273216]  <TASK>
[   14.273232]  dump_stack_lvl+0x73/0xb0
[   14.273257]  print_report+0xd1/0x640
[   14.273279]  ? __virt_addr_valid+0x1db/0x2d0
[   14.273302]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.273325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.273347]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.273371]  kasan_report+0x140/0x180
[   14.273394]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.273423]  kasan_check_range+0x10c/0x1c0
[   14.273445]  __kasan_check_write+0x18/0x20
[   14.274231]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   14.274263]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.274291]  ? ret_from_fork_asm+0x1a/0x30
[   14.274311]  ? ret_from_fork+0x41/0x80
[   14.274333]  ? kthread+0x257/0x310
[   14.274358]  kasan_bitops_generic+0x122/0x1c0
[   14.274379]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.274401]  ? __pfx_read_tsc+0x10/0x10
[   14.274420]  ? ktime_get_ts64+0x84/0x230
[   14.274445]  kunit_try_run_case+0x1a6/0x480
[   14.274578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.274742]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.274788]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.275144]  ? __kthread_parkme+0x82/0x160
[   14.275166]  ? preempt_count_sub+0x50/0x80
[   14.275192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.275213]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.275240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.275266]  kthread+0x257/0x310
[   14.275284]  ? __pfx_kthread+0x10/0x10
[   14.275303]  ret_from_fork+0x41/0x80
[   14.275322]  ? __pfx_kthread+0x10/0x10
[   14.275341]  ret_from_fork_asm+0x1a/0x30
[   14.275370]  </TASK>
[   14.275382] 
[   14.282821] Allocated by task 266:
[   14.283013]  kasan_save_stack+0x45/0x70
[   14.283321]  kasan_save_track+0x18/0x40
[   14.283595]  kasan_save_alloc_info+0x3b/0x50
[   14.283779]  __kasan_kmalloc+0xb7/0xc0
[   14.283918]  __kmalloc_cache_noprof+0x168/0x350
[   14.284169]  kasan_bitops_generic+0x93/0x1c0
[   14.284338]  kunit_try_run_case+0x1a6/0x480
[   14.284434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.284761]  kthread+0x257/0x310
[   14.284983]  ret_from_fork+0x41/0x80
[   14.285206]  ret_from_fork_asm+0x1a/0x30
[   14.285308] 
[   14.285360] The buggy address belongs to the object at ffff8881024e41c0
[   14.285360]  which belongs to the cache kmalloc-16 of size 16
[   14.285557] The buggy address is located 8 bytes inside of
[   14.285557]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.286267] 
[   14.286390] The buggy address belongs to the physical page:
[   14.286547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.286862] flags: 0x200000000000000(node=0|zone=2)
[   14.286983] page_type: f5(slab)
[   14.287084] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.287215] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.287614] page dumped because: kasan: bad access detected
[   14.287942] 
[   14.288070] Memory state around the buggy address:
[   14.288269]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.288486]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.288612] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.288911]                                               ^
[   14.289262]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.289580]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.289733] ==================================================================
[   14.322409] ==================================================================
[   14.322889] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   14.323300] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.323438] 
[   14.323506] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.323569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.323583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.323604] Call Trace:
[   14.323620]  <TASK>
[   14.323638]  dump_stack_lvl+0x73/0xb0
[   14.323672]  print_report+0xd1/0x640
[   14.323717]  ? __virt_addr_valid+0x1db/0x2d0
[   14.323742]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   14.323766]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.323790]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   14.323815]  kasan_report+0x140/0x180
[   14.323860]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   14.323890]  kasan_check_range+0x10c/0x1c0
[   14.323913]  __kasan_check_write+0x18/0x20
[   14.323934]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   14.323960]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.324006]  ? ret_from_fork_asm+0x1a/0x30
[   14.324028]  ? ret_from_fork+0x41/0x80
[   14.324049]  ? kthread+0x257/0x310
[   14.324093]  kasan_bitops_generic+0x122/0x1c0
[   14.324115]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.324153]  ? __pfx_read_tsc+0x10/0x10
[   14.324177]  ? ktime_get_ts64+0x84/0x230
[   14.324205]  kunit_try_run_case+0x1a6/0x480
[   14.324228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.324249]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.324272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.324316]  ? __kthread_parkme+0x82/0x160
[   14.324339]  ? preempt_count_sub+0x50/0x80
[   14.324362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.324382]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.324407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.324449]  kthread+0x257/0x310
[   14.324470]  ? __pfx_kthread+0x10/0x10
[   14.324491]  ret_from_fork+0x41/0x80
[   14.324512]  ? __pfx_kthread+0x10/0x10
[   14.324530]  ret_from_fork_asm+0x1a/0x30
[   14.324559]  </TASK>
[   14.324571] 
[   14.330473] Allocated by task 266:
[   14.330641]  kasan_save_stack+0x45/0x70
[   14.330871]  kasan_save_track+0x18/0x40
[   14.331022]  kasan_save_alloc_info+0x3b/0x50
[   14.331175]  __kasan_kmalloc+0xb7/0xc0
[   14.331365]  __kmalloc_cache_noprof+0x168/0x350
[   14.331569]  kasan_bitops_generic+0x93/0x1c0
[   14.331756]  kunit_try_run_case+0x1a6/0x480
[   14.331938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.332182]  kthread+0x257/0x310
[   14.332387]  ret_from_fork+0x41/0x80
[   14.332516]  ret_from_fork_asm+0x1a/0x30
[   14.332714] 
[   14.332831] The buggy address belongs to the object at ffff8881024e41c0
[   14.332831]  which belongs to the cache kmalloc-16 of size 16
[   14.333176] The buggy address is located 8 bytes inside of
[   14.333176]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.333413] 
[   14.333475] The buggy address belongs to the physical page:
[   14.333585] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.333764] flags: 0x200000000000000(node=0|zone=2)
[   14.333890] page_type: f5(slab)
[   14.334018] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.334218] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.334396] page dumped because: kasan: bad access detected
[   14.334523] 
[   14.334581] Memory state around the buggy address:
[   14.334723]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.335038]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.335413] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.335768]                                               ^
[   14.336069]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.336459]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.336854] ==================================================================
[   14.253632] ==================================================================
[   14.254081] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.254488] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.254894] 
[   14.255019] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.255081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.255095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.255117] Call Trace:
[   14.255133]  <TASK>
[   14.255150]  dump_stack_lvl+0x73/0xb0
[   14.255176]  print_report+0xd1/0x640
[   14.255198]  ? __virt_addr_valid+0x1db/0x2d0
[   14.255222]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.255246]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.255268]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.255293]  kasan_report+0x140/0x180
[   14.255316]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.255345]  kasan_check_range+0x10c/0x1c0
[   14.255366]  __kasan_check_write+0x18/0x20
[   14.255387]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   14.255413]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.255439]  ? ret_from_fork_asm+0x1a/0x30
[   14.255459]  ? ret_from_fork+0x41/0x80
[   14.255479]  ? kthread+0x257/0x310
[   14.255501]  kasan_bitops_generic+0x122/0x1c0
[   14.255522]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.255544]  ? __pfx_read_tsc+0x10/0x10
[   14.255562]  ? ktime_get_ts64+0x84/0x230
[   14.255588]  kunit_try_run_case+0x1a6/0x480
[   14.255609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.255630]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.255651]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.255685]  ? __kthread_parkme+0x82/0x160
[   14.255706]  ? preempt_count_sub+0x50/0x80
[   14.255729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.255749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.255776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.255801]  kthread+0x257/0x310
[   14.255820]  ? __pfx_kthread+0x10/0x10
[   14.255839]  ret_from_fork+0x41/0x80
[   14.255858]  ? __pfx_kthread+0x10/0x10
[   14.255877]  ret_from_fork_asm+0x1a/0x30
[   14.255907]  </TASK>
[   14.255919] 
[   14.261875] Allocated by task 266:
[   14.262064]  kasan_save_stack+0x45/0x70
[   14.262172]  kasan_save_track+0x18/0x40
[   14.262265]  kasan_save_alloc_info+0x3b/0x50
[   14.262358]  __kasan_kmalloc+0xb7/0xc0
[   14.262443]  __kmalloc_cache_noprof+0x168/0x350
[   14.262538]  kasan_bitops_generic+0x93/0x1c0
[   14.262630]  kunit_try_run_case+0x1a6/0x480
[   14.262728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.262840]  kthread+0x257/0x310
[   14.263000]  ret_from_fork+0x41/0x80
[   14.263238]  ret_from_fork_asm+0x1a/0x30
[   14.263489] 
[   14.263613] The buggy address belongs to the object at ffff8881024e41c0
[   14.263613]  which belongs to the cache kmalloc-16 of size 16
[   14.264301] The buggy address is located 8 bytes inside of
[   14.264301]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.264784] 
[   14.264839] The buggy address belongs to the physical page:
[   14.264938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.265091] flags: 0x200000000000000(node=0|zone=2)
[   14.265346] page_type: f5(slab)
[   14.265534] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.265851] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.266114] page dumped because: kasan: bad access detected
[   14.266214] 
[   14.266262] Memory state around the buggy address:
[   14.266355]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.266606]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.266823] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.267040]                                               ^
[   14.269444]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.269772]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.269971] ==================================================================
[   14.290230] ==================================================================
[   14.290626] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.291092] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.291332] 
[   14.291402] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.291447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.291459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.291482] Call Trace:
[   14.291500]  <TASK>
[   14.291520]  dump_stack_lvl+0x73/0xb0
[   14.291548]  print_report+0xd1/0x640
[   14.291571]  ? __virt_addr_valid+0x1db/0x2d0
[   14.291594]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.291618]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.291641]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.291674]  kasan_report+0x140/0x180
[   14.291966]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.292025]  kasan_check_range+0x10c/0x1c0
[   14.292048]  __kasan_check_write+0x18/0x20
[   14.292068]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   14.292105]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.292132]  ? ret_from_fork_asm+0x1a/0x30
[   14.292151]  ? ret_from_fork+0x41/0x80
[   14.292171]  ? kthread+0x257/0x310
[   14.292192]  kasan_bitops_generic+0x122/0x1c0
[   14.292212]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.292233]  ? __pfx_read_tsc+0x10/0x10
[   14.292251]  ? ktime_get_ts64+0x84/0x230
[   14.292275]  kunit_try_run_case+0x1a6/0x480
[   14.292297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.292317]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.292339]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.292364]  ? __kthread_parkme+0x82/0x160
[   14.292382]  ? preempt_count_sub+0x50/0x80
[   14.292404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.292424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.292449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.292474]  kthread+0x257/0x310
[   14.292491]  ? __pfx_kthread+0x10/0x10
[   14.292510]  ret_from_fork+0x41/0x80
[   14.292529]  ? __pfx_kthread+0x10/0x10
[   14.292547]  ret_from_fork_asm+0x1a/0x30
[   14.292576]  </TASK>
[   14.292587] 
[   14.298209] Allocated by task 266:
[   14.298350]  kasan_save_stack+0x45/0x70
[   14.298567]  kasan_save_track+0x18/0x40
[   14.298817]  kasan_save_alloc_info+0x3b/0x50
[   14.298913]  __kasan_kmalloc+0xb7/0xc0
[   14.298999]  __kmalloc_cache_noprof+0x168/0x350
[   14.299113]  kasan_bitops_generic+0x93/0x1c0
[   14.299204]  kunit_try_run_case+0x1a6/0x480
[   14.299291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.299393]  kthread+0x257/0x310
[   14.299465]  ret_from_fork+0x41/0x80
[   14.299544]  ret_from_fork_asm+0x1a/0x30
[   14.299626] 
[   14.299683] The buggy address belongs to the object at ffff8881024e41c0
[   14.299683]  which belongs to the cache kmalloc-16 of size 16
[   14.299880] The buggy address is located 8 bytes inside of
[   14.299880]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.300453] 
[   14.300573] The buggy address belongs to the physical page:
[   14.300842] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.301236] flags: 0x200000000000000(node=0|zone=2)
[   14.301470] page_type: f5(slab)
[   14.301670] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.302031] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.302376] page dumped because: kasan: bad access detected
[   14.302546] 
[   14.302657] Memory state around the buggy address:
[   14.302801]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.302963]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.303138] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.303518]                                               ^
[   14.303823]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.304219]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.304338] ==================================================================
[   14.367856] ==================================================================
[   14.368407] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   14.368794] Read of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.368959] 
[   14.369113] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.369167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.369180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.369199] Call Trace:
[   14.369217]  <TASK>
[   14.369232]  dump_stack_lvl+0x73/0xb0
[   14.369256]  print_report+0xd1/0x640
[   14.369279]  ? __virt_addr_valid+0x1db/0x2d0
[   14.369301]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   14.369323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.369346]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   14.369370]  kasan_report+0x140/0x180
[   14.369411]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   14.369441]  kasan_check_range+0x10c/0x1c0
[   14.369477]  __kasan_check_read+0x15/0x20
[   14.369499]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   14.369524]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.369548]  ? ret_from_fork_asm+0x1a/0x30
[   14.369568]  ? ret_from_fork+0x41/0x80
[   14.369588]  ? kthread+0x257/0x310
[   14.369609]  kasan_bitops_generic+0x122/0x1c0
[   14.369629]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.369650]  ? __pfx_read_tsc+0x10/0x10
[   14.369678]  ? ktime_get_ts64+0x84/0x230
[   14.369705]  kunit_try_run_case+0x1a6/0x480
[   14.369727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.369747]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.369767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.369792]  ? __kthread_parkme+0x82/0x160
[   14.369811]  ? preempt_count_sub+0x50/0x80
[   14.369832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.369852]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.369876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.369910]  kthread+0x257/0x310
[   14.369932]  ? __pfx_kthread+0x10/0x10
[   14.369953]  ret_from_fork+0x41/0x80
[   14.369974]  ? __pfx_kthread+0x10/0x10
[   14.369993]  ret_from_fork_asm+0x1a/0x30
[   14.370024]  </TASK>
[   14.370035] 
[   14.375831] Allocated by task 266:
[   14.375937]  kasan_save_stack+0x45/0x70
[   14.376079]  kasan_save_track+0x18/0x40
[   14.376200]  kasan_save_alloc_info+0x3b/0x50
[   14.376320]  __kasan_kmalloc+0xb7/0xc0
[   14.376509]  __kmalloc_cache_noprof+0x168/0x350
[   14.376780]  kasan_bitops_generic+0x93/0x1c0
[   14.377022]  kunit_try_run_case+0x1a6/0x480
[   14.377283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.377590]  kthread+0x257/0x310
[   14.377800]  ret_from_fork+0x41/0x80
[   14.378048]  ret_from_fork_asm+0x1a/0x30
[   14.378324] 
[   14.378383] The buggy address belongs to the object at ffff8881024e41c0
[   14.378383]  which belongs to the cache kmalloc-16 of size 16
[   14.378597] The buggy address is located 8 bytes inside of
[   14.378597]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.379272] 
[   14.379380] The buggy address belongs to the physical page:
[   14.379548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.379796] flags: 0x200000000000000(node=0|zone=2)
[   14.379960] page_type: f5(slab)
[   14.380086] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.380260] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.380423] page dumped because: kasan: bad access detected
[   14.380549] 
[   14.380615] Memory state around the buggy address:
[   14.380731]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.380908]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.381275] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.381651]                                               ^
[   14.382020]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.382414]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.382787] ==================================================================
[   14.305237] ==================================================================
[   14.305684] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.306407] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.306697] 
[   14.306835] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.306892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.306905] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.306926] Call Trace:
[   14.306943]  <TASK>
[   14.306960]  dump_stack_lvl+0x73/0xb0
[   14.306991]  print_report+0xd1/0x640
[   14.307014]  ? __virt_addr_valid+0x1db/0x2d0
[   14.307037]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.307083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.307109]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.307133]  kasan_report+0x140/0x180
[   14.307156]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.307185]  kasan_check_range+0x10c/0x1c0
[   14.307206]  __kasan_check_write+0x18/0x20
[   14.307226]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   14.307251]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.307276]  ? ret_from_fork_asm+0x1a/0x30
[   14.307296]  ? ret_from_fork+0x41/0x80
[   14.307316]  ? kthread+0x257/0x310
[   14.307339]  kasan_bitops_generic+0x122/0x1c0
[   14.307359]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.307380]  ? __pfx_read_tsc+0x10/0x10
[   14.307399]  ? ktime_get_ts64+0x84/0x230
[   14.307423]  kunit_try_run_case+0x1a6/0x480
[   14.307445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.307465]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.307486]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.307510]  ? __kthread_parkme+0x82/0x160
[   14.307529]  ? preempt_count_sub+0x50/0x80
[   14.307551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.307571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.307596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.307633]  kthread+0x257/0x310
[   14.307659]  ? __pfx_kthread+0x10/0x10
[   14.307689]  ret_from_fork+0x41/0x80
[   14.307719]  ? __pfx_kthread+0x10/0x10
[   14.307738]  ret_from_fork_asm+0x1a/0x30
[   14.307767]  </TASK>
[   14.307779] 
[   14.313885] Allocated by task 266:
[   14.314133]  kasan_save_stack+0x45/0x70
[   14.314333]  kasan_save_track+0x18/0x40
[   14.314504]  kasan_save_alloc_info+0x3b/0x50
[   14.314761]  __kasan_kmalloc+0xb7/0xc0
[   14.314914]  __kmalloc_cache_noprof+0x168/0x350
[   14.315137]  kasan_bitops_generic+0x93/0x1c0
[   14.315385]  kunit_try_run_case+0x1a6/0x480
[   14.315605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.315871]  kthread+0x257/0x310
[   14.316030]  ret_from_fork+0x41/0x80
[   14.316245]  ret_from_fork_asm+0x1a/0x30
[   14.316448] 
[   14.316564] The buggy address belongs to the object at ffff8881024e41c0
[   14.316564]  which belongs to the cache kmalloc-16 of size 16
[   14.316924] The buggy address is located 8 bytes inside of
[   14.316924]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.317374] 
[   14.317472] The buggy address belongs to the physical page:
[   14.317701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.317987] flags: 0x200000000000000(node=0|zone=2)
[   14.318174] page_type: f5(slab)
[   14.318369] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.318612] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.319040] page dumped because: kasan: bad access detected
[   14.319218] 
[   14.319285] Memory state around the buggy address:
[   14.319398]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.319534]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.319673] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.320106]                                               ^
[   14.320397]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.320802]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.321213] ==================================================================
[   14.351794] ==================================================================
[   14.352214] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   14.352630] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266
[   14.353000] 
[   14.353128] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.353168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.353180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.353201] Call Trace:
[   14.353216]  <TASK>
[   14.353231]  dump_stack_lvl+0x73/0xb0
[   14.353254]  print_report+0xd1/0x640
[   14.353276]  ? __virt_addr_valid+0x1db/0x2d0
[   14.353298]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   14.353321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.353343]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   14.353366]  kasan_report+0x140/0x180
[   14.353388]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   14.353415]  kasan_check_range+0x10c/0x1c0
[   14.353435]  __kasan_check_write+0x18/0x20
[   14.353454]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   14.353477]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.353502]  ? ret_from_fork_asm+0x1a/0x30
[   14.353520]  ? ret_from_fork+0x41/0x80
[   14.353540]  ? kthread+0x257/0x310
[   14.353561]  kasan_bitops_generic+0x122/0x1c0
[   14.353580]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.353601]  ? __pfx_read_tsc+0x10/0x10
[   14.353619]  ? ktime_get_ts64+0x84/0x230
[   14.353643]  kunit_try_run_case+0x1a6/0x480
[   14.353672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.353695]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.353716]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.353740]  ? __kthread_parkme+0x82/0x160
[   14.353758]  ? preempt_count_sub+0x50/0x80
[   14.353779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.353799]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.353823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.353848]  kthread+0x257/0x310
[   14.353865]  ? __pfx_kthread+0x10/0x10
[   14.353883]  ret_from_fork+0x41/0x80
[   14.353912]  ? __pfx_kthread+0x10/0x10
[   14.353934]  ret_from_fork_asm+0x1a/0x30
[   14.353964]  </TASK>
[   14.353976] 
[   14.358617] Allocated by task 266:
[   14.358708]  kasan_save_stack+0x45/0x70
[   14.358801]  kasan_save_track+0x18/0x40
[   14.358886]  kasan_save_alloc_info+0x3b/0x50
[   14.358976]  __kasan_kmalloc+0xb7/0xc0
[   14.359190]  __kmalloc_cache_noprof+0x168/0x350
[   14.359384]  kasan_bitops_generic+0x93/0x1c0
[   14.359618]  kunit_try_run_case+0x1a6/0x480
[   14.359866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.360268]  kthread+0x257/0x310
[   14.360453]  ret_from_fork+0x41/0x80
[   14.360921]  ret_from_fork_asm+0x1a/0x30
[   14.361644] 
[   14.361780] The buggy address belongs to the object at ffff8881024e41c0
[   14.361780]  which belongs to the cache kmalloc-16 of size 16
[   14.362694] The buggy address is located 8 bytes inside of
[   14.362694]  allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9)
[   14.364276] 
[   14.364404] The buggy address belongs to the physical page:
[   14.364716] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   14.364852] flags: 0x200000000000000(node=0|zone=2)
[   14.364951] page_type: f5(slab)
[   14.365028] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.365153] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   14.365272] page dumped because: kasan: bad access detected
[   14.365568] 
[   14.365704] Memory state around the buggy address:
[   14.365965]  ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc
[   14.366323]  ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.366552] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.366744]                                               ^
[   14.366850]  ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.366971]  ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.367174] ==================================================================