Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   24.407630] ==================================================================
[   24.408793] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   24.409497] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.410233] 
[   24.411487] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.411699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.411782] Hardware name: linux,dummy-virt (DT)
[   24.411866] Call trace:
[   24.411936]  dump_backtrace+0x9c/0x128
[   24.412066]  show_stack+0x20/0x38
[   24.412146]  dump_stack_lvl+0x8c/0xd0
[   24.412199]  print_report+0x118/0x5f0
[   24.412245]  kasan_report+0xdc/0x128
[   24.412289]  kasan_check_range+0x100/0x1a8
[   24.412339]  __kasan_check_write+0x20/0x30
[   24.412386]  kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   24.412445]  kasan_bitops_generic+0x114/0x1d0
[   24.412498]  kunit_try_run_case+0x170/0x3f0
[   24.412544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.412601]  kthread+0x24c/0x2d0
[   24.412645]  ret_from_fork+0x10/0x20
[   24.412693] 
[   24.421275] Allocated by task 249:
[   24.421933]  kasan_save_stack+0x3c/0x68
[   24.422664]  kasan_save_track+0x20/0x40
[   24.423219]  kasan_save_alloc_info+0x40/0x58
[   24.424140]  __kasan_kmalloc+0xd4/0xd8
[   24.424781]  __kmalloc_cache_noprof+0x154/0x320
[   24.425404]  kasan_bitops_generic+0xa0/0x1d0
[   24.426076]  kunit_try_run_case+0x170/0x3f0
[   24.426683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.427230]  kthread+0x24c/0x2d0
[   24.428088]  ret_from_fork+0x10/0x20
[   24.428616] 
[   24.429133] The buggy address belongs to the object at fff00000c662ada0
[   24.429133]  which belongs to the cache kmalloc-16 of size 16
[   24.430444] The buggy address is located 8 bytes inside of
[   24.430444]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.431570] 
[   24.431867] The buggy address belongs to the physical page:
[   24.432582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.433537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.434239] page_type: f5(slab)
[   24.434813] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.435664] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.436644] page dumped because: kasan: bad access detected
[   24.437461] 
[   24.437852] Memory state around the buggy address:
[   24.438364]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.439262]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.440148] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.440945]                                   ^
[   24.441607]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.443007]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.443989] ==================================================================
[   24.290286] ==================================================================
[   24.291061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   24.292009] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.292920] 
[   24.293345] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.293554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.293701] Hardware name: linux,dummy-virt (DT)
[   24.293786] Call trace:
[   24.293863]  dump_backtrace+0x9c/0x128
[   24.294002]  show_stack+0x20/0x38
[   24.294156]  dump_stack_lvl+0x8c/0xd0
[   24.294279]  print_report+0x118/0x5f0
[   24.294397]  kasan_report+0xdc/0x128
[   24.294513]  __asan_report_load8_noabort+0x20/0x30
[   24.294674]  kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   24.294819]  kasan_bitops_generic+0x114/0x1d0
[   24.294926]  kunit_try_run_case+0x170/0x3f0
[   24.295004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.295068]  kthread+0x24c/0x2d0
[   24.295116]  ret_from_fork+0x10/0x20
[   24.295168] 
[   24.302099] Allocated by task 249:
[   24.302496]  kasan_save_stack+0x3c/0x68
[   24.303071]  kasan_save_track+0x20/0x40
[   24.304050]  kasan_save_alloc_info+0x40/0x58
[   24.304642]  __kasan_kmalloc+0xd4/0xd8
[   24.305204]  __kmalloc_cache_noprof+0x154/0x320
[   24.305822]  kasan_bitops_generic+0xa0/0x1d0
[   24.307208]  kunit_try_run_case+0x170/0x3f0
[   24.308353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.309141]  kthread+0x24c/0x2d0
[   24.309681]  ret_from_fork+0x10/0x20
[   24.310165] 
[   24.310453] The buggy address belongs to the object at fff00000c662ada0
[   24.310453]  which belongs to the cache kmalloc-16 of size 16
[   24.311757] The buggy address is located 8 bytes inside of
[   24.311757]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.313479] 
[   24.313881] The buggy address belongs to the physical page:
[   24.314544] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.315544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.316398] page_type: f5(slab)
[   24.316609] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.316994] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.318222] page dumped because: kasan: bad access detected
[   24.318945] 
[   24.319253] Memory state around the buggy address:
[   24.319810]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.320497]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.321885] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.322611]                                   ^
[   24.323153]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.324314]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.325012] ==================================================================
[   24.251155] ==================================================================
[   24.252916] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x104/0xbf8
[   24.254147] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.255270] 
[   24.255600] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.255851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.255931] Hardware name: linux,dummy-virt (DT)
[   24.256036] Call trace:
[   24.256097]  dump_backtrace+0x9c/0x128
[   24.256205]  show_stack+0x20/0x38
[   24.256307]  dump_stack_lvl+0x8c/0xd0
[   24.256405]  print_report+0x118/0x5f0
[   24.256510]  kasan_report+0xdc/0x128
[   24.256625]  kasan_check_range+0x100/0x1a8
[   24.256743]  __kasan_check_write+0x20/0x30
[   24.256855]  kasan_bitops_modify.constprop.0+0x104/0xbf8
[   24.256918]  kasan_bitops_generic+0x114/0x1d0
[   24.257019]  kunit_try_run_case+0x170/0x3f0
[   24.257082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.257137]  kthread+0x24c/0x2d0
[   24.257183]  ret_from_fork+0x10/0x20
[   24.257234] 
[   24.266936] Allocated by task 249:
[   24.267316]  kasan_save_stack+0x3c/0x68
[   24.268419]  kasan_save_track+0x20/0x40
[   24.268909]  kasan_save_alloc_info+0x40/0x58
[   24.269403]  __kasan_kmalloc+0xd4/0xd8
[   24.269854]  __kmalloc_cache_noprof+0x154/0x320
[   24.270375]  kasan_bitops_generic+0xa0/0x1d0
[   24.270938]  kunit_try_run_case+0x170/0x3f0
[   24.271482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.272372]  kthread+0x24c/0x2d0
[   24.272812]  ret_from_fork+0x10/0x20
[   24.273221] 
[   24.273437] The buggy address belongs to the object at fff00000c662ada0
[   24.273437]  which belongs to the cache kmalloc-16 of size 16
[   24.274351] The buggy address is located 8 bytes inside of
[   24.274351]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.276700] 
[   24.277181] The buggy address belongs to the physical page:
[   24.277980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.278894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.279650] page_type: f5(slab)
[   24.280101] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.280811] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.281694] page dumped because: kasan: bad access detected
[   24.282320] 
[   24.282653] Memory state around the buggy address:
[   24.283797]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.284592]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.285353] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.286334]                                   ^
[   24.286894]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.287670]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.288630] ==================================================================
[   24.365688] ==================================================================
[   24.367157] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   24.369372] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.370516] 
[   24.370955] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.371289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.371372] Hardware name: linux,dummy-virt (DT)
[   24.371461] Call trace:
[   24.371524]  dump_backtrace+0x9c/0x128
[   24.371633]  show_stack+0x20/0x38
[   24.371729]  dump_stack_lvl+0x8c/0xd0
[   24.373289]  print_report+0x118/0x5f0
[   24.373386]  kasan_report+0xdc/0x128
[   24.373480]  __asan_report_load8_noabort+0x20/0x30
[   24.373582]  kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   24.373708]  kasan_bitops_generic+0x114/0x1d0
[   24.373835]  kunit_try_run_case+0x170/0x3f0
[   24.373994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.374092]  kthread+0x24c/0x2d0
[   24.374143]  ret_from_fork+0x10/0x20
[   24.374193] 
[   24.383342] Allocated by task 249:
[   24.384026]  kasan_save_stack+0x3c/0x68
[   24.384588]  kasan_save_track+0x20/0x40
[   24.385260]  kasan_save_alloc_info+0x40/0x58
[   24.386052]  __kasan_kmalloc+0xd4/0xd8
[   24.386616]  __kmalloc_cache_noprof+0x154/0x320
[   24.387292]  kasan_bitops_generic+0xa0/0x1d0
[   24.388020]  kunit_try_run_case+0x170/0x3f0
[   24.388665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.389528]  kthread+0x24c/0x2d0
[   24.390059]  ret_from_fork+0x10/0x20
[   24.390706] 
[   24.391192] The buggy address belongs to the object at fff00000c662ada0
[   24.391192]  which belongs to the cache kmalloc-16 of size 16
[   24.392650] The buggy address is located 8 bytes inside of
[   24.392650]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.393824] 
[   24.394165] The buggy address belongs to the physical page:
[   24.394828] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.395860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.396565] page_type: f5(slab)
[   24.397064] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.397806] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.398780] page dumped because: kasan: bad access detected
[   24.399587] 
[   24.400012] Memory state around the buggy address:
[   24.400613]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.401486]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.402298] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.403078]                                   ^
[   24.403771]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.404735]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.405783] ==================================================================
[   24.559742] ==================================================================
[   24.560507] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   24.562205] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.563026] 
[   24.563369] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.563878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.563984] Hardware name: linux,dummy-virt (DT)
[   24.564085] Call trace:
[   24.564156]  dump_backtrace+0x9c/0x128
[   24.564281]  show_stack+0x20/0x38
[   24.564402]  dump_stack_lvl+0x8c/0xd0
[   24.564522]  print_report+0x118/0x5f0
[   24.564600]  kasan_report+0xdc/0x128
[   24.564649]  kasan_check_range+0x100/0x1a8
[   24.564699]  __kasan_check_write+0x20/0x30
[   24.564746]  kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   24.564816]  kasan_bitops_generic+0x114/0x1d0
[   24.564869]  kunit_try_run_case+0x170/0x3f0
[   24.564916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.565000]  kthread+0x24c/0x2d0
[   24.565052]  ret_from_fork+0x10/0x20
[   24.565102] 
[   24.572729] Allocated by task 249:
[   24.573586]  kasan_save_stack+0x3c/0x68
[   24.574184]  kasan_save_track+0x20/0x40
[   24.574641]  kasan_save_alloc_info+0x40/0x58
[   24.575237]  __kasan_kmalloc+0xd4/0xd8
[   24.576653]  __kmalloc_cache_noprof+0x154/0x320
[   24.577270]  kasan_bitops_generic+0xa0/0x1d0
[   24.577798]  kunit_try_run_case+0x170/0x3f0
[   24.578354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.578976]  kthread+0x24c/0x2d0
[   24.579781]  ret_from_fork+0x10/0x20
[   24.580329] 
[   24.580659] The buggy address belongs to the object at fff00000c662ada0
[   24.580659]  which belongs to the cache kmalloc-16 of size 16
[   24.581787] The buggy address is located 8 bytes inside of
[   24.581787]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.583009] 
[   24.583312] The buggy address belongs to the physical page:
[   24.584014] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.584878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.586545] page_type: f5(slab)
[   24.586998] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.587952] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.588761] page dumped because: kasan: bad access detected
[   24.589400] 
[   24.589724] Memory state around the buggy address:
[   24.590933]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.591874]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.592731] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.593609]                                   ^
[   24.594176]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.595113]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.596135] ==================================================================
[   24.326397] ==================================================================
[   24.327354] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   24.328496] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.329384] 
[   24.329731] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.329937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.330031] Hardware name: linux,dummy-virt (DT)
[   24.330119] Call trace:
[   24.330179]  dump_backtrace+0x9c/0x128
[   24.330283]  show_stack+0x20/0x38
[   24.330378]  dump_stack_lvl+0x8c/0xd0
[   24.330492]  print_report+0x118/0x5f0
[   24.330607]  kasan_report+0xdc/0x128
[   24.330719]  kasan_check_range+0x100/0x1a8
[   24.330777]  __kasan_check_write+0x20/0x30
[   24.330829]  kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   24.330889]  kasan_bitops_generic+0x114/0x1d0
[   24.330946]  kunit_try_run_case+0x170/0x3f0
[   24.331150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.331283]  kthread+0x24c/0x2d0
[   24.331415]  ret_from_fork+0x10/0x20
[   24.331539] 
[   24.340187] Allocated by task 249:
[   24.340802]  kasan_save_stack+0x3c/0x68
[   24.341256]  kasan_save_track+0x20/0x40
[   24.341800]  kasan_save_alloc_info+0x40/0x58
[   24.342516]  __kasan_kmalloc+0xd4/0xd8
[   24.343282]  __kmalloc_cache_noprof+0x154/0x320
[   24.344103]  kasan_bitops_generic+0xa0/0x1d0
[   24.344709]  kunit_try_run_case+0x170/0x3f0
[   24.345475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.346323]  kthread+0x24c/0x2d0
[   24.346877]  ret_from_fork+0x10/0x20
[   24.347557] 
[   24.347922] The buggy address belongs to the object at fff00000c662ada0
[   24.347922]  which belongs to the cache kmalloc-16 of size 16
[   24.349998] The buggy address is located 8 bytes inside of
[   24.349998]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.351544] 
[   24.351896] The buggy address belongs to the physical page:
[   24.352747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.354163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.355296] page_type: f5(slab)
[   24.355813] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.356431] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.357014] page dumped because: kasan: bad access detected
[   24.357629] 
[   24.358000] Memory state around the buggy address:
[   24.358680]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.359532]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.360717] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.361914]                                   ^
[   24.362242]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.362563]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.362871] ==================================================================
[   24.483082] ==================================================================
[   24.483716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   24.484955] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.485540] 
[   24.485799] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.486038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.486196] Hardware name: linux,dummy-virt (DT)
[   24.486451] Call trace:
[   24.486693]  dump_backtrace+0x9c/0x128
[   24.486820]  show_stack+0x20/0x38
[   24.486935]  dump_stack_lvl+0x8c/0xd0
[   24.487075]  print_report+0x118/0x5f0
[   24.487189]  kasan_report+0xdc/0x128
[   24.487286]  __asan_report_load8_noabort+0x20/0x30
[   24.487345]  kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   24.487467]  kasan_bitops_generic+0x114/0x1d0
[   24.487587]  kunit_try_run_case+0x170/0x3f0
[   24.487701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.487823]  kthread+0x24c/0x2d0
[   24.487926]  ret_from_fork+0x10/0x20
[   24.488048] 
[   24.496697] Allocated by task 249:
[   24.497738]  kasan_save_stack+0x3c/0x68
[   24.498273]  kasan_save_track+0x20/0x40
[   24.498851]  kasan_save_alloc_info+0x40/0x58
[   24.499493]  __kasan_kmalloc+0xd4/0xd8
[   24.500404]  __kmalloc_cache_noprof+0x154/0x320
[   24.501024]  kasan_bitops_generic+0xa0/0x1d0
[   24.501649]  kunit_try_run_case+0x170/0x3f0
[   24.502221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.502887]  kthread+0x24c/0x2d0
[   24.503555]  ret_from_fork+0x10/0x20
[   24.504051] 
[   24.505146] The buggy address belongs to the object at fff00000c662ada0
[   24.505146]  which belongs to the cache kmalloc-16 of size 16
[   24.506141] The buggy address is located 8 bytes inside of
[   24.506141]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.507638] 
[   24.508008] The buggy address belongs to the physical page:
[   24.508887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.509693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.510448] page_type: f5(slab)
[   24.510973] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.512358] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.513210] page dumped because: kasan: bad access detected
[   24.513828] 
[   24.514162] Memory state around the buggy address:
[   24.514804]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.515942]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.516694] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.517431]                                   ^
[   24.518052]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.518888]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.520578] ==================================================================
[   24.446653] ==================================================================
[   24.447238] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x334/0xbf8
[   24.448360] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.449496] 
[   24.449764] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.449978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.450064] Hardware name: linux,dummy-virt (DT)
[   24.450157] Call trace:
[   24.450229]  dump_backtrace+0x9c/0x128
[   24.450353]  show_stack+0x20/0x38
[   24.450467]  dump_stack_lvl+0x8c/0xd0
[   24.450589]  print_report+0x118/0x5f0
[   24.450652]  kasan_report+0xdc/0x128
[   24.450699]  kasan_check_range+0x100/0x1a8
[   24.450747]  __kasan_check_write+0x20/0x30
[   24.450798]  kasan_bitops_modify.constprop.0+0x334/0xbf8
[   24.450858]  kasan_bitops_generic+0x114/0x1d0
[   24.450911]  kunit_try_run_case+0x170/0x3f0
[   24.450986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.451050]  kthread+0x24c/0x2d0
[   24.451101]  ret_from_fork+0x10/0x20
[   24.451153] 
[   24.459234] Allocated by task 249:
[   24.459894]  kasan_save_stack+0x3c/0x68
[   24.460561]  kasan_save_track+0x20/0x40
[   24.461207]  kasan_save_alloc_info+0x40/0x58
[   24.461756]  __kasan_kmalloc+0xd4/0xd8
[   24.462336]  __kmalloc_cache_noprof+0x154/0x320
[   24.462918]  kasan_bitops_generic+0xa0/0x1d0
[   24.464383]  kunit_try_run_case+0x170/0x3f0
[   24.464809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.465498]  kthread+0x24c/0x2d0
[   24.466025]  ret_from_fork+0x10/0x20
[   24.466589] 
[   24.466972] The buggy address belongs to the object at fff00000c662ada0
[   24.466972]  which belongs to the cache kmalloc-16 of size 16
[   24.467917] The buggy address is located 8 bytes inside of
[   24.467917]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.469539] 
[   24.469872] The buggy address belongs to the physical page:
[   24.470545] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.471520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.472298] page_type: f5(slab)
[   24.472865] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.473802] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.474578] page dumped because: kasan: bad access detected
[   24.475171] 
[   24.475820] Memory state around the buggy address:
[   24.476455]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.477198]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.477900] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.478724]                                   ^
[   24.479300]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.480281]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.481023] ==================================================================
[   24.521781] ==================================================================
[   24.522495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xbf8
[   24.523359] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.524519] 
[   24.524851] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.525079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.525163] Hardware name: linux,dummy-virt (DT)
[   24.525256] Call trace:
[   24.525329]  dump_backtrace+0x9c/0x128
[   24.525453]  show_stack+0x20/0x38
[   24.525565]  dump_stack_lvl+0x8c/0xd0
[   24.525692]  print_report+0x118/0x5f0
[   24.525806]  kasan_report+0xdc/0x128
[   24.525925]  kasan_check_range+0x100/0x1a8
[   24.526066]  __kasan_check_write+0x20/0x30
[   24.526194]  kasan_bitops_modify.constprop.0+0x358/0xbf8
[   24.526330]  kasan_bitops_generic+0x114/0x1d0
[   24.526424]  kunit_try_run_case+0x170/0x3f0
[   24.526476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.526530]  kthread+0x24c/0x2d0
[   24.526576]  ret_from_fork+0x10/0x20
[   24.526626] 
[   24.535049] Allocated by task 249:
[   24.535784]  kasan_save_stack+0x3c/0x68
[   24.536668]  kasan_save_track+0x20/0x40
[   24.537710]  kasan_save_alloc_info+0x40/0x58
[   24.538441]  __kasan_kmalloc+0xd4/0xd8
[   24.539029]  __kmalloc_cache_noprof+0x154/0x320
[   24.539956]  kasan_bitops_generic+0xa0/0x1d0
[   24.540458]  kunit_try_run_case+0x170/0x3f0
[   24.541089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.541904]  kthread+0x24c/0x2d0
[   24.542403]  ret_from_fork+0x10/0x20
[   24.542912] 
[   24.543225] The buggy address belongs to the object at fff00000c662ada0
[   24.543225]  which belongs to the cache kmalloc-16 of size 16
[   24.544704] The buggy address is located 8 bytes inside of
[   24.544704]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.546296] 
[   24.546612] The buggy address belongs to the physical page:
[   24.547558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.548751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.549586] page_type: f5(slab)
[   24.550006] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.550742] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.551466] page dumped because: kasan: bad access detected
[   24.551984] 
[   24.552915] Memory state around the buggy address:
[   24.553628]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.554371]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.555051] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.556424]                                   ^
[   24.556824]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.557900]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.558618] ==================================================================
[   24.598144] ==================================================================
[   24.598767] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   24.600165] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.601000] 
[   24.601522] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.601745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.601884] Hardware name: linux,dummy-virt (DT)
[   24.602022] Call trace:
[   24.602095]  dump_backtrace+0x9c/0x128
[   24.602155]  show_stack+0x20/0x38
[   24.602199]  dump_stack_lvl+0x8c/0xd0
[   24.602253]  print_report+0x118/0x5f0
[   24.602302]  kasan_report+0xdc/0x128
[   24.602350]  __asan_report_load8_noabort+0x20/0x30
[   24.602404]  kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   24.602462]  kasan_bitops_generic+0x114/0x1d0
[   24.602515]  kunit_try_run_case+0x170/0x3f0
[   24.602565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.602622]  kthread+0x24c/0x2d0
[   24.602669]  ret_from_fork+0x10/0x20
[   24.602719] 
[   24.610865] Allocated by task 249:
[   24.611294]  kasan_save_stack+0x3c/0x68
[   24.611995]  kasan_save_track+0x20/0x40
[   24.613325]  kasan_save_alloc_info+0x40/0x58
[   24.613931]  __kasan_kmalloc+0xd4/0xd8
[   24.614572]  __kmalloc_cache_noprof+0x154/0x320
[   24.615288]  kasan_bitops_generic+0xa0/0x1d0
[   24.616259]  kunit_try_run_case+0x170/0x3f0
[   24.616969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.617672]  kthread+0x24c/0x2d0
[   24.618219]  ret_from_fork+0x10/0x20
[   24.618852] 
[   24.619085] The buggy address belongs to the object at fff00000c662ada0
[   24.619085]  which belongs to the cache kmalloc-16 of size 16
[   24.621123] The buggy address is located 8 bytes inside of
[   24.621123]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.622464] 
[   24.622858] The buggy address belongs to the physical page:
[   24.623887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.624556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.625189] page_type: f5(slab)
[   24.625588] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.627067] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.627646] page dumped because: kasan: bad access detected
[   24.629168] 
[   24.630056] Memory state around the buggy address:
[   24.631366]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.633668]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.636459] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.637896]                                   ^
[   24.639784]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.640929]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.642180] ==================================================================

[   21.219423] ==================================================================
[   21.220960] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   21.221806] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.222481] 
[   21.222855] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.222974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.223013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.223075] Call Trace:
[   21.223127]  <TASK>
[   21.223177]  dump_stack_lvl+0x73/0xb0
[   21.223286]  print_report+0xd1/0x640
[   21.223329]  ? __virt_addr_valid+0x1db/0x2d0
[   21.223367]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   21.223399]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.223469]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   21.223510]  kasan_report+0x140/0x180
[   21.223546]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   21.223584]  kasan_check_range+0x10c/0x1c0
[   21.223613]  __kasan_check_write+0x18/0x20
[   21.223643]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   21.223675]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.223708]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.223745]  kasan_bitops_generic+0x117/0x1c0
[   21.223774]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.223803]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.224298]  kunit_try_run_case+0x1a6/0x480
[   21.224427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.224558]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.224596]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.224632]  ? __kthread_parkme+0x82/0x160
[   21.224662]  ? preempt_count_sub+0x50/0x80
[   21.224692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.224720]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.224756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.224793]  kthread+0x257/0x310
[   21.224824]  ? __pfx_kthread+0x10/0x10
[   21.224882]  ret_from_fork+0x41/0x80
[   21.224914]  ? __pfx_kthread+0x10/0x10
[   21.224941]  ret_from_fork_asm+0x1a/0x30
[   21.224981]  </TASK>
[   21.224995] 
[   21.244333] Allocated by task 266:
[   21.245245]  kasan_save_stack+0x45/0x70
[   21.245927]  kasan_save_track+0x18/0x40
[   21.246343]  kasan_save_alloc_info+0x3b/0x50
[   21.246672]  __kasan_kmalloc+0xb7/0xc0
[   21.247154]  __kmalloc_cache_noprof+0x168/0x350
[   21.247969]  kasan_bitops_generic+0x93/0x1c0
[   21.248403]  kunit_try_run_case+0x1a6/0x480
[   21.248769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.249285]  kthread+0x257/0x310
[   21.249629]  ret_from_fork+0x41/0x80
[   21.250693]  ret_from_fork_asm+0x1a/0x30
[   21.251334] 
[   21.251714] The buggy address belongs to the object at ffff888101f80200
[   21.251714]  which belongs to the cache kmalloc-16 of size 16
[   21.252647] The buggy address is located 8 bytes inside of
[   21.252647]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.254204] 
[   21.254457] The buggy address belongs to the physical page:
[   21.255152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.256163] flags: 0x200000000000000(node=0|zone=2)
[   21.256631] page_type: f5(slab)
[   21.257240] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.258422] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.259239] page dumped because: kasan: bad access detected
[   21.259856] 
[   21.260237] Memory state around the buggy address:
[   21.261020]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.262115]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.262608] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.263758]                       ^
[   21.264148]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.264985]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.266087] ==================================================================
[   21.313205] ==================================================================
[   21.314193] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   21.315315] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.316329] 
[   21.316581] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.316696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.316822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.316889] Call Trace:
[   21.317000]  <TASK>
[   21.317104]  dump_stack_lvl+0x73/0xb0
[   21.317182]  print_report+0xd1/0x640
[   21.317311]  ? __virt_addr_valid+0x1db/0x2d0
[   21.317469]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   21.317544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.317619]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   21.317691]  kasan_report+0x140/0x180
[   21.317770]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   21.317856]  kasan_check_range+0x10c/0x1c0
[   21.318151]  __kasan_check_write+0x18/0x20
[   21.318185]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   21.318238]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.318284]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.318325]  kasan_bitops_generic+0x117/0x1c0
[   21.318356]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.318384]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.318419]  kunit_try_run_case+0x1a6/0x480
[   21.318470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.318541]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.318601]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.318638]  ? __kthread_parkme+0x82/0x160
[   21.318665]  ? preempt_count_sub+0x50/0x80
[   21.318696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.318723]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.318759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.318797]  kthread+0x257/0x310
[   21.318840]  ? __pfx_kthread+0x10/0x10
[   21.318878]  ret_from_fork+0x41/0x80
[   21.318909]  ? __pfx_kthread+0x10/0x10
[   21.318935]  ret_from_fork_asm+0x1a/0x30
[   21.318977]  </TASK>
[   21.318990] 
[   21.337745] Allocated by task 266:
[   21.338198]  kasan_save_stack+0x45/0x70
[   21.338615]  kasan_save_track+0x18/0x40
[   21.339770]  kasan_save_alloc_info+0x3b/0x50
[   21.340216]  __kasan_kmalloc+0xb7/0xc0
[   21.340548]  __kmalloc_cache_noprof+0x168/0x350
[   21.341533]  kasan_bitops_generic+0x93/0x1c0
[   21.342168]  kunit_try_run_case+0x1a6/0x480
[   21.342627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.345196]  kthread+0x257/0x310
[   21.345477]  ret_from_fork+0x41/0x80
[   21.345722]  ret_from_fork_asm+0x1a/0x30
[   21.345972] 
[   21.346115] The buggy address belongs to the object at ffff888101f80200
[   21.346115]  which belongs to the cache kmalloc-16 of size 16
[   21.352282] The buggy address is located 8 bytes inside of
[   21.352282]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.355750] 
[   21.356005] The buggy address belongs to the physical page:
[   21.356402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.357346] flags: 0x200000000000000(node=0|zone=2)
[   21.357950] page_type: f5(slab)
[   21.358317] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.359147] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.359794] page dumped because: kasan: bad access detected
[   21.360685] 
[   21.361143] Memory state around the buggy address:
[   21.361718]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.362354]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.363112] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.363660]                       ^
[   21.364020]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.365203]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.365978] ==================================================================
[   21.004044] ==================================================================
[   21.004950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   21.006823] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.007415] 
[   21.008148] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.008381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.008424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.008488] Call Trace:
[   21.008540]  <TASK>
[   21.008592]  dump_stack_lvl+0x73/0xb0
[   21.008688]  print_report+0xd1/0x640
[   21.008758]  ? __virt_addr_valid+0x1db/0x2d0
[   21.008797]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   21.008855]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.008894]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   21.008926]  kasan_report+0x140/0x180
[   21.008960]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   21.008997]  kasan_check_range+0x10c/0x1c0
[   21.009027]  __kasan_check_write+0x18/0x20
[   21.009054]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   21.009087]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.009122]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.009161]  kasan_bitops_generic+0x117/0x1c0
[   21.009189]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.009245]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.009287]  kunit_try_run_case+0x1a6/0x480
[   21.009325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.009353]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.009384]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.009420]  ? __kthread_parkme+0x82/0x160
[   21.009463]  ? preempt_count_sub+0x50/0x80
[   21.009595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.009626]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.009663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.009701]  kthread+0x257/0x310
[   21.009728]  ? __pfx_kthread+0x10/0x10
[   21.009754]  ret_from_fork+0x41/0x80
[   21.009785]  ? __pfx_kthread+0x10/0x10
[   21.009811]  ret_from_fork_asm+0x1a/0x30
[   21.009891]  </TASK>
[   21.009907] 
[   21.033452] Allocated by task 266:
[   21.034345]  kasan_save_stack+0x45/0x70
[   21.034780]  kasan_save_track+0x18/0x40
[   21.035322]  kasan_save_alloc_info+0x3b/0x50
[   21.036448]  __kasan_kmalloc+0xb7/0xc0
[   21.037103]  __kmalloc_cache_noprof+0x168/0x350
[   21.037660]  kasan_bitops_generic+0x93/0x1c0
[   21.038277]  kunit_try_run_case+0x1a6/0x480
[   21.038774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.039745]  kthread+0x257/0x310
[   21.040157]  ret_from_fork+0x41/0x80
[   21.040541]  ret_from_fork_asm+0x1a/0x30
[   21.041370] 
[   21.041685] The buggy address belongs to the object at ffff888101f80200
[   21.041685]  which belongs to the cache kmalloc-16 of size 16
[   21.043195] The buggy address is located 8 bytes inside of
[   21.043195]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.044792] 
[   21.045397] The buggy address belongs to the physical page:
[   21.045969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.046584] flags: 0x200000000000000(node=0|zone=2)
[   21.047778] page_type: f5(slab)
[   21.048373] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.049171] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.050074] page dumped because: kasan: bad access detected
[   21.050567] 
[   21.050880] Memory state around the buggy address:
[   21.051311]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.052120]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.053059] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.054278]                       ^
[   21.055018]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.056023]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.056802] ==================================================================
[   21.118108] ==================================================================
[   21.119296] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   21.120888] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.121817] 
[   21.122279] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.122363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.122398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.122436] Call Trace:
[   21.122454]  <TASK>
[   21.122474]  dump_stack_lvl+0x73/0xb0
[   21.122541]  print_report+0xd1/0x640
[   21.122623]  ? __virt_addr_valid+0x1db/0x2d0
[   21.122691]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   21.122725]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.122757]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   21.122789]  kasan_report+0x140/0x180
[   21.122837]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   21.123081]  kasan_check_range+0x10c/0x1c0
[   21.123115]  __kasan_check_write+0x18/0x20
[   21.123146]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   21.123181]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.123216]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.123292]  kasan_bitops_generic+0x117/0x1c0
[   21.123325]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.123355]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.123390]  kunit_try_run_case+0x1a6/0x480
[   21.123424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.123467]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.123580]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.123623]  ? __kthread_parkme+0x82/0x160
[   21.123653]  ? preempt_count_sub+0x50/0x80
[   21.123683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.123713]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.123753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.123792]  kthread+0x257/0x310
[   21.123826]  ? __pfx_kthread+0x10/0x10
[   21.123887]  ret_from_fork+0x41/0x80
[   21.123920]  ? __pfx_kthread+0x10/0x10
[   21.123946]  ret_from_fork_asm+0x1a/0x30
[   21.123986]  </TASK>
[   21.124000] 
[   21.144650] Allocated by task 266:
[   21.145296]  kasan_save_stack+0x45/0x70
[   21.146167]  kasan_save_track+0x18/0x40
[   21.146819]  kasan_save_alloc_info+0x3b/0x50
[   21.147173]  __kasan_kmalloc+0xb7/0xc0
[   21.147651]  __kmalloc_cache_noprof+0x168/0x350
[   21.149010]  kasan_bitops_generic+0x93/0x1c0
[   21.149428]  kunit_try_run_case+0x1a6/0x480
[   21.149796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.150252]  kthread+0x257/0x310
[   21.150573]  ret_from_fork+0x41/0x80
[   21.150982]  ret_from_fork_asm+0x1a/0x30
[   21.152444] 
[   21.152622] The buggy address belongs to the object at ffff888101f80200
[   21.152622]  which belongs to the cache kmalloc-16 of size 16
[   21.154135] The buggy address is located 8 bytes inside of
[   21.154135]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.156074] 
[   21.156292] The buggy address belongs to the physical page:
[   21.157429] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.158417] flags: 0x200000000000000(node=0|zone=2)
[   21.159387] page_type: f5(slab)
[   21.160148] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.160768] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.161976] page dumped because: kasan: bad access detected
[   21.162382] 
[   21.162639] Memory state around the buggy address:
[   21.163116]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.163702]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.164856] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.165923]                       ^
[   21.166271]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.167267]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.168685] ==================================================================
[   21.170331] ==================================================================
[   21.171394] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   21.172455] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.173517] 
[   21.174425] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.174753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.174774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.174819] Call Trace:
[   21.174974]  <TASK>
[   21.174999]  dump_stack_lvl+0x73/0xb0
[   21.175042]  print_report+0xd1/0x640
[   21.175076]  ? __virt_addr_valid+0x1db/0x2d0
[   21.175111]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   21.175141]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.175174]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   21.175204]  kasan_report+0x140/0x180
[   21.175275]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   21.175318]  kasan_check_range+0x10c/0x1c0
[   21.175348]  __kasan_check_write+0x18/0x20
[   21.175377]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   21.175410]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.175451]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.175595]  kasan_bitops_generic+0x117/0x1c0
[   21.175657]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.175689]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.175725]  kunit_try_run_case+0x1a6/0x480
[   21.175759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.175786]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.175821]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.175893]  ? __kthread_parkme+0x82/0x160
[   21.175923]  ? preempt_count_sub+0x50/0x80
[   21.175954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.175981]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.176017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.176055]  kthread+0x257/0x310
[   21.176081]  ? __pfx_kthread+0x10/0x10
[   21.176107]  ret_from_fork+0x41/0x80
[   21.176137]  ? __pfx_kthread+0x10/0x10
[   21.176162]  ret_from_fork_asm+0x1a/0x30
[   21.176202]  </TASK>
[   21.176216] 
[   21.196334] Allocated by task 266:
[   21.196988]  kasan_save_stack+0x45/0x70
[   21.197656]  kasan_save_track+0x18/0x40
[   21.198118]  kasan_save_alloc_info+0x3b/0x50
[   21.198965]  __kasan_kmalloc+0xb7/0xc0
[   21.199787]  __kmalloc_cache_noprof+0x168/0x350
[   21.200237]  kasan_bitops_generic+0x93/0x1c0
[   21.200671]  kunit_try_run_case+0x1a6/0x480
[   21.201290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.202272]  kthread+0x257/0x310
[   21.202889]  ret_from_fork+0x41/0x80
[   21.203392]  ret_from_fork_asm+0x1a/0x30
[   21.203701] 
[   21.204327] The buggy address belongs to the object at ffff888101f80200
[   21.204327]  which belongs to the cache kmalloc-16 of size 16
[   21.205425] The buggy address is located 8 bytes inside of
[   21.205425]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.206781] 
[   21.207133] The buggy address belongs to the physical page:
[   21.207557] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.208659] flags: 0x200000000000000(node=0|zone=2)
[   21.209203] page_type: f5(slab)
[   21.209728] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.211270] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.212114] page dumped because: kasan: bad access detected
[   21.212545] 
[   21.212862] Memory state around the buggy address:
[   21.213306]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.214234]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.215343] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.216239]                       ^
[   21.216564]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.217351]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.218082] ==================================================================
[   21.267055] ==================================================================
[   21.267564] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   21.268656] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.269382] 
[   21.270175] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.270394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.270429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.270487] Call Trace:
[   21.270535]  <TASK>
[   21.270581]  dump_stack_lvl+0x73/0xb0
[   21.270663]  print_report+0xd1/0x640
[   21.270737]  ? __virt_addr_valid+0x1db/0x2d0
[   21.270813]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   21.270884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.270955]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   21.271031]  kasan_report+0x140/0x180
[   21.271105]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   21.271193]  kasan_check_range+0x10c/0x1c0
[   21.271297]  __kasan_check_write+0x18/0x20
[   21.271386]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   21.271466]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.271547]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.271594]  kasan_bitops_generic+0x117/0x1c0
[   21.271623]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.271652]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.271687]  kunit_try_run_case+0x1a6/0x480
[   21.271719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.271747]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.271775]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.271808]  ? __kthread_parkme+0x82/0x160
[   21.271865]  ? preempt_count_sub+0x50/0x80
[   21.271900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.271928]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.271964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.271999]  kthread+0x257/0x310
[   21.272024]  ? __pfx_kthread+0x10/0x10
[   21.272049]  ret_from_fork+0x41/0x80
[   21.272079]  ? __pfx_kthread+0x10/0x10
[   21.272103]  ret_from_fork_asm+0x1a/0x30
[   21.272144]  </TASK>
[   21.272159] 
[   21.290738] Allocated by task 266:
[   21.291286]  kasan_save_stack+0x45/0x70
[   21.291922]  kasan_save_track+0x18/0x40
[   21.292428]  kasan_save_alloc_info+0x3b/0x50
[   21.293252]  __kasan_kmalloc+0xb7/0xc0
[   21.293799]  __kmalloc_cache_noprof+0x168/0x350
[   21.294312]  kasan_bitops_generic+0x93/0x1c0
[   21.295132]  kunit_try_run_case+0x1a6/0x480
[   21.295758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.296408]  kthread+0x257/0x310
[   21.296736]  ret_from_fork+0x41/0x80
[   21.297041]  ret_from_fork_asm+0x1a/0x30
[   21.297880] 
[   21.298209] The buggy address belongs to the object at ffff888101f80200
[   21.298209]  which belongs to the cache kmalloc-16 of size 16
[   21.299147] The buggy address is located 8 bytes inside of
[   21.299147]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.300582] 
[   21.302015] The buggy address belongs to the physical page:
[   21.302522] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.303189] flags: 0x200000000000000(node=0|zone=2)
[   21.303610] page_type: f5(slab)
[   21.303978] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.305102] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.305848] page dumped because: kasan: bad access detected
[   21.306714] 
[   21.306983] Memory state around the buggy address:
[   21.307650]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.308300]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.309386] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.309994]                       ^
[   21.310387]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.311205]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.312121] ==================================================================
[   21.367014] ==================================================================
[   21.367706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   21.368823] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.369634] 
[   21.369895] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.370049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.370086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.370145] Call Trace:
[   21.370197]  <TASK>
[   21.370267]  dump_stack_lvl+0x73/0xb0
[   21.370354]  print_report+0xd1/0x640
[   21.370434]  ? __virt_addr_valid+0x1db/0x2d0
[   21.370670]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   21.370747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.370830]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   21.370941]  kasan_report+0x140/0x180
[   21.371030]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   21.371124]  kasan_check_range+0x10c/0x1c0
[   21.371209]  __kasan_check_write+0x18/0x20
[   21.371313]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   21.371396]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.371671]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.371729]  kasan_bitops_generic+0x117/0x1c0
[   21.371761]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.371790]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.371826]  kunit_try_run_case+0x1a6/0x480
[   21.371861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.371891]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.371920]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.371955]  ? __kthread_parkme+0x82/0x160
[   21.371982]  ? preempt_count_sub+0x50/0x80
[   21.372012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.372040]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.372076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.372112]  kthread+0x257/0x310
[   21.372136]  ? __pfx_kthread+0x10/0x10
[   21.372162]  ret_from_fork+0x41/0x80
[   21.372193]  ? __pfx_kthread+0x10/0x10
[   21.372239]  ret_from_fork_asm+0x1a/0x30
[   21.372314]  </TASK>
[   21.372328] 
[   21.392317] Allocated by task 266:
[   21.392975]  kasan_save_stack+0x45/0x70
[   21.393632]  kasan_save_track+0x18/0x40
[   21.394152]  kasan_save_alloc_info+0x3b/0x50
[   21.394795]  __kasan_kmalloc+0xb7/0xc0
[   21.395500]  __kmalloc_cache_noprof+0x168/0x350
[   21.396155]  kasan_bitops_generic+0x93/0x1c0
[   21.396882]  kunit_try_run_case+0x1a6/0x480
[   21.397300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.398045]  kthread+0x257/0x310
[   21.398419]  ret_from_fork+0x41/0x80
[   21.399132]  ret_from_fork_asm+0x1a/0x30
[   21.399606] 
[   21.399828] The buggy address belongs to the object at ffff888101f80200
[   21.399828]  which belongs to the cache kmalloc-16 of size 16
[   21.401203] The buggy address is located 8 bytes inside of
[   21.401203]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.402954] 
[   21.403175] The buggy address belongs to the physical page:
[   21.403928] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.404701] flags: 0x200000000000000(node=0|zone=2)
[   21.405327] page_type: f5(slab)
[   21.405948] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.406589] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.407599] page dumped because: kasan: bad access detected
[   21.408069] 
[   21.408316] Memory state around the buggy address:
[   21.409093]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.410375]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.411076] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.412523]                       ^
[   21.412814]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.413345]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.414584] ==================================================================
[   21.058324] ==================================================================
[   21.059473] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   21.060779] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.061903] 
[   21.062276] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.062674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.062705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.062738] Call Trace:
[   21.062762]  <TASK>
[   21.062784]  dump_stack_lvl+0x73/0xb0
[   21.062842]  print_report+0xd1/0x640
[   21.062885]  ? __virt_addr_valid+0x1db/0x2d0
[   21.062921]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   21.062951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.062982]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   21.063013]  kasan_report+0x140/0x180
[   21.063046]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   21.063084]  kasan_check_range+0x10c/0x1c0
[   21.063114]  __kasan_check_write+0x18/0x20
[   21.063144]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   21.063174]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.063209]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.063288]  kasan_bitops_generic+0x117/0x1c0
[   21.063320]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.063349]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.063384]  kunit_try_run_case+0x1a6/0x480
[   21.063416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.063452]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.063529]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.063615]  ? __kthread_parkme+0x82/0x160
[   21.063686]  ? preempt_count_sub+0x50/0x80
[   21.063756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.063786]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.063841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.063892]  kthread+0x257/0x310
[   21.063918]  ? __pfx_kthread+0x10/0x10
[   21.063944]  ret_from_fork+0x41/0x80
[   21.063973]  ? __pfx_kthread+0x10/0x10
[   21.063998]  ret_from_fork_asm+0x1a/0x30
[   21.064038]  </TASK>
[   21.064051] 
[   21.092402] Allocated by task 266:
[   21.093210]  kasan_save_stack+0x45/0x70
[   21.093841]  kasan_save_track+0x18/0x40
[   21.094123]  kasan_save_alloc_info+0x3b/0x50
[   21.094908]  __kasan_kmalloc+0xb7/0xc0
[   21.095406]  __kmalloc_cache_noprof+0x168/0x350
[   21.095854]  kasan_bitops_generic+0x93/0x1c0
[   21.096779]  kunit_try_run_case+0x1a6/0x480
[   21.097335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.098137]  kthread+0x257/0x310
[   21.099107]  ret_from_fork+0x41/0x80
[   21.099458]  ret_from_fork_asm+0x1a/0x30
[   21.099796] 
[   21.100642] The buggy address belongs to the object at ffff888101f80200
[   21.100642]  which belongs to the cache kmalloc-16 of size 16
[   21.101684] The buggy address is located 8 bytes inside of
[   21.101684]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.103673] 
[   21.104191] The buggy address belongs to the physical page:
[   21.105164] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.105934] flags: 0x200000000000000(node=0|zone=2)
[   21.106385] page_type: f5(slab)
[   21.107612] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.108268] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.109112] page dumped because: kasan: bad access detected
[   21.109832] 
[   21.110245] Memory state around the buggy address:
[   21.111110]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.111997]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.112734] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.113529]                       ^
[   21.114115]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.115147]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.116008] ==================================================================