Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   24.719945] ==================================================================
[   24.721111] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   24.721849] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.722787] 
[   24.723193] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.723415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.723495] Hardware name: linux,dummy-virt (DT)
[   24.724009] Call trace:
[   24.724087]  dump_backtrace+0x9c/0x128
[   24.724248]  show_stack+0x20/0x38
[   24.724366]  dump_stack_lvl+0x8c/0xd0
[   24.724475]  print_report+0x118/0x5f0
[   24.724529]  kasan_report+0xdc/0x128
[   24.724577]  kasan_check_range+0x100/0x1a8
[   24.724627]  __kasan_check_write+0x20/0x30
[   24.724677]  kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   24.724742]  kasan_bitops_generic+0x120/0x1d0
[   24.724808]  kunit_try_run_case+0x170/0x3f0
[   24.724861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.724920]  kthread+0x24c/0x2d0
[   24.724996]  ret_from_fork+0x10/0x20
[   24.725055] 
[   24.732343] Allocated by task 249:
[   24.733197]  kasan_save_stack+0x3c/0x68
[   24.734510]  kasan_save_track+0x20/0x40
[   24.735115]  kasan_save_alloc_info+0x40/0x58
[   24.736452]  __kasan_kmalloc+0xd4/0xd8
[   24.737123]  __kmalloc_cache_noprof+0x154/0x320
[   24.737831]  kasan_bitops_generic+0xa0/0x1d0
[   24.738405]  kunit_try_run_case+0x170/0x3f0
[   24.739038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.740160]  kthread+0x24c/0x2d0
[   24.740557]  ret_from_fork+0x10/0x20
[   24.740985] 
[   24.741557] The buggy address belongs to the object at fff00000c662ada0
[   24.741557]  which belongs to the cache kmalloc-16 of size 16
[   24.743156] The buggy address is located 8 bytes inside of
[   24.743156]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.744861] 
[   24.745323] The buggy address belongs to the physical page:
[   24.745850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.746873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.748068] page_type: f5(slab)
[   24.748552] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.749286] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.749923] page dumped because: kasan: bad access detected
[   24.750598] 
[   24.750881] Memory state around the buggy address:
[   24.751932]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.752709]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.753662] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.754508]                                   ^
[   24.755209]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.756203]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.756841] ==================================================================
[   24.643452] ==================================================================
[   24.644523] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   24.645372] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.646276] 
[   24.646703] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.646979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.647065] Hardware name: linux,dummy-virt (DT)
[   24.647164] Call trace:
[   24.647239]  dump_backtrace+0x9c/0x128
[   24.647460]  show_stack+0x20/0x38
[   24.647578]  dump_stack_lvl+0x8c/0xd0
[   24.647694]  print_report+0x118/0x5f0
[   24.647801]  kasan_report+0xdc/0x128
[   24.647906]  kasan_check_range+0x100/0x1a8
[   24.648038]  __kasan_check_write+0x20/0x30
[   24.648153]  kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   24.648298]  kasan_bitops_generic+0x120/0x1d0
[   24.648421]  kunit_try_run_case+0x170/0x3f0
[   24.648549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.648684]  kthread+0x24c/0x2d0
[   24.648811]  ret_from_fork+0x10/0x20
[   24.648914] 
[   24.657162] Allocated by task 249:
[   24.657623]  kasan_save_stack+0x3c/0x68
[   24.658218]  kasan_save_track+0x20/0x40
[   24.658803]  kasan_save_alloc_info+0x40/0x58
[   24.659524]  __kasan_kmalloc+0xd4/0xd8
[   24.659974]  __kmalloc_cache_noprof+0x154/0x320
[   24.660710]  kasan_bitops_generic+0xa0/0x1d0
[   24.661989]  kunit_try_run_case+0x170/0x3f0
[   24.662866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.664030]  kthread+0x24c/0x2d0
[   24.664504]  ret_from_fork+0x10/0x20
[   24.665064] 
[   24.665401] The buggy address belongs to the object at fff00000c662ada0
[   24.665401]  which belongs to the cache kmalloc-16 of size 16
[   24.666571] The buggy address is located 8 bytes inside of
[   24.666571]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.667889] 
[   24.668377] The buggy address belongs to the physical page:
[   24.668982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.669912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.670533] page_type: f5(slab)
[   24.671059] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.671923] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.673065] page dumped because: kasan: bad access detected
[   24.673722] 
[   24.674208] Memory state around the buggy address:
[   24.675153]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.676060]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.677293] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.678005]                                   ^
[   24.678559]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.679398]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.680633] ==================================================================
[   24.866075] ==================================================================
[   24.866770] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   24.867795] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.868553] 
[   24.868889] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.869128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.869215] Hardware name: linux,dummy-virt (DT)
[   24.869313] Call trace:
[   24.869392]  dump_backtrace+0x9c/0x128
[   24.869521]  show_stack+0x20/0x38
[   24.869641]  dump_stack_lvl+0x8c/0xd0
[   24.869764]  print_report+0x118/0x5f0
[   24.869888]  kasan_report+0xdc/0x128
[   24.870027]  kasan_check_range+0x100/0x1a8
[   24.870151]  __kasan_check_write+0x20/0x30
[   24.870280]  kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   24.870426]  kasan_bitops_generic+0x120/0x1d0
[   24.870496]  kunit_try_run_case+0x170/0x3f0
[   24.870548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.870605]  kthread+0x24c/0x2d0
[   24.870652]  ret_from_fork+0x10/0x20
[   24.870706] 
[   24.877504] Allocated by task 249:
[   24.877902]  kasan_save_stack+0x3c/0x68
[   24.878569]  kasan_save_track+0x20/0x40
[   24.879222]  kasan_save_alloc_info+0x40/0x58
[   24.879684]  __kasan_kmalloc+0xd4/0xd8
[   24.880196]  __kmalloc_cache_noprof+0x154/0x320
[   24.880911]  kasan_bitops_generic+0xa0/0x1d0
[   24.881634]  kunit_try_run_case+0x170/0x3f0
[   24.882163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.882832]  kthread+0x24c/0x2d0
[   24.883263]  ret_from_fork+0x10/0x20
[   24.883850] 
[   24.884166] The buggy address belongs to the object at fff00000c662ada0
[   24.884166]  which belongs to the cache kmalloc-16 of size 16
[   24.885326] The buggy address is located 8 bytes inside of
[   24.885326]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.886411] 
[   24.886742] The buggy address belongs to the physical page:
[   24.887301] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.888232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.888973] page_type: f5(slab)
[   24.889404] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.890772] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.892509] page dumped because: kasan: bad access detected
[   24.892987] 
[   24.893224] Memory state around the buggy address:
[   24.893613]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.896196]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.898474] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.900356]                                   ^
[   24.901662]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.902562]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.903423] ==================================================================
[   24.832928] ==================================================================
[   24.833764] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   24.835173] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.836045] 
[   24.836390] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.836637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.836728] Hardware name: linux,dummy-virt (DT)
[   24.836872] Call trace:
[   24.836946]  dump_backtrace+0x9c/0x128
[   24.837088]  show_stack+0x20/0x38
[   24.837256]  dump_stack_lvl+0x8c/0xd0
[   24.837426]  print_report+0x118/0x5f0
[   24.837545]  kasan_report+0xdc/0x128
[   24.837645]  __asan_report_load8_noabort+0x20/0x30
[   24.837703]  kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   24.837766]  kasan_bitops_generic+0x120/0x1d0
[   24.837820]  kunit_try_run_case+0x170/0x3f0
[   24.837869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.837924]  kthread+0x24c/0x2d0
[   24.837997]  ret_from_fork+0x10/0x20
[   24.838055] 
[   24.845000] Allocated by task 249:
[   24.845435]  kasan_save_stack+0x3c/0x68
[   24.846041]  kasan_save_track+0x20/0x40
[   24.846671]  kasan_save_alloc_info+0x40/0x58
[   24.847273]  __kasan_kmalloc+0xd4/0xd8
[   24.847850]  __kmalloc_cache_noprof+0x154/0x320
[   24.848562]  kasan_bitops_generic+0xa0/0x1d0
[   24.849140]  kunit_try_run_case+0x170/0x3f0
[   24.849727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.850448]  kthread+0x24c/0x2d0
[   24.851021]  ret_from_fork+0x10/0x20
[   24.851540] 
[   24.851862] The buggy address belongs to the object at fff00000c662ada0
[   24.851862]  which belongs to the cache kmalloc-16 of size 16
[   24.853140] The buggy address is located 8 bytes inside of
[   24.853140]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.854354] 
[   24.854726] The buggy address belongs to the physical page:
[   24.855282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.856231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.857088] page_type: f5(slab)
[   24.857549] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.858334] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.859163] page dumped because: kasan: bad access detected
[   24.859782] 
[   24.860120] Memory state around the buggy address:
[   24.860652]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.861415]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.862133] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.862836]                                   ^
[   24.863443]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.864129]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.864912] ==================================================================
[   24.682181] ==================================================================
[   24.682908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   24.685051] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.686325] 
[   24.686697] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.686899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.686941] Hardware name: linux,dummy-virt (DT)
[   24.687085] Call trace:
[   24.687159]  dump_backtrace+0x9c/0x128
[   24.687281]  show_stack+0x20/0x38
[   24.687414]  dump_stack_lvl+0x8c/0xd0
[   24.687543]  print_report+0x118/0x5f0
[   24.687656]  kasan_report+0xdc/0x128
[   24.687734]  __asan_report_load8_noabort+0x20/0x30
[   24.687790]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   24.687853]  kasan_bitops_generic+0x120/0x1d0
[   24.687906]  kunit_try_run_case+0x170/0x3f0
[   24.687956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.688045]  kthread+0x24c/0x2d0
[   24.688093]  ret_from_fork+0x10/0x20
[   24.688143] 
[   24.695501] Allocated by task 249:
[   24.696236]  kasan_save_stack+0x3c/0x68
[   24.696848]  kasan_save_track+0x20/0x40
[   24.697490]  kasan_save_alloc_info+0x40/0x58
[   24.698132]  __kasan_kmalloc+0xd4/0xd8
[   24.698692]  __kmalloc_cache_noprof+0x154/0x320
[   24.699342]  kasan_bitops_generic+0xa0/0x1d0
[   24.699923]  kunit_try_run_case+0x170/0x3f0
[   24.700809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.701432]  kthread+0x24c/0x2d0
[   24.701779]  ret_from_fork+0x10/0x20
[   24.702451] 
[   24.702780] The buggy address belongs to the object at fff00000c662ada0
[   24.702780]  which belongs to the cache kmalloc-16 of size 16
[   24.705025] The buggy address is located 8 bytes inside of
[   24.705025]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.706270] 
[   24.706646] The buggy address belongs to the physical page:
[   24.707233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.708357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.709491] page_type: f5(slab)
[   24.710007] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.710886] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.712025] page dumped because: kasan: bad access detected
[   24.713024] 
[   24.713385] Memory state around the buggy address:
[   24.713979]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.714693]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.715415] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.716666]                                   ^
[   24.717337]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.718091]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.718795] ==================================================================
[   24.905932] ==================================================================
[   24.906985] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   24.908320] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.909039] 
[   24.909266] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.909368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.909404] Hardware name: linux,dummy-virt (DT)
[   24.909444] Call trace:
[   24.909474]  dump_backtrace+0x9c/0x128
[   24.909527]  show_stack+0x20/0x38
[   24.909573]  dump_stack_lvl+0x8c/0xd0
[   24.909625]  print_report+0x118/0x5f0
[   24.909672]  kasan_report+0xdc/0x128
[   24.909717]  __asan_report_load8_noabort+0x20/0x30
[   24.909770]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   24.909831]  kasan_bitops_generic+0x120/0x1d0
[   24.909886]  kunit_try_run_case+0x170/0x3f0
[   24.909935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.910401]  kthread+0x24c/0x2d0
[   24.910595]  ret_from_fork+0x10/0x20
[   24.910715] 
[   24.917919] Allocated by task 249:
[   24.918370]  kasan_save_stack+0x3c/0x68
[   24.918912]  kasan_save_track+0x20/0x40
[   24.919517]  kasan_save_alloc_info+0x40/0x58
[   24.920159]  __kasan_kmalloc+0xd4/0xd8
[   24.920780]  __kmalloc_cache_noprof+0x154/0x320
[   24.921392]  kasan_bitops_generic+0xa0/0x1d0
[   24.921928]  kunit_try_run_case+0x170/0x3f0
[   24.922481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.923128]  kthread+0x24c/0x2d0
[   24.923589]  ret_from_fork+0x10/0x20
[   24.924126] 
[   24.924451] The buggy address belongs to the object at fff00000c662ada0
[   24.924451]  which belongs to the cache kmalloc-16 of size 16
[   24.925700] The buggy address is located 8 bytes inside of
[   24.925700]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.926747] 
[   24.927091] The buggy address belongs to the physical page:
[   24.927689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.928484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.929274] page_type: f5(slab)
[   24.929758] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.930576] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.931031] page dumped because: kasan: bad access detected
[   24.931467] 
[   24.932049] Memory state around the buggy address:
[   24.932827]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.933545]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.934292] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.935109]                                   ^
[   24.935694]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.936467]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.937240] ==================================================================
[   24.797572] ==================================================================
[   24.798296] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   24.799053] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.800063] 
[   24.800360] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.800583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.800671] Hardware name: linux,dummy-virt (DT)
[   24.800777] Call trace:
[   24.800866]  dump_backtrace+0x9c/0x128
[   24.801021]  show_stack+0x20/0x38
[   24.801166]  dump_stack_lvl+0x8c/0xd0
[   24.801294]  print_report+0x118/0x5f0
[   24.801412]  kasan_report+0xdc/0x128
[   24.801526]  kasan_check_range+0x100/0x1a8
[   24.801635]  __kasan_check_write+0x20/0x30
[   24.801734]  kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   24.801861]  kasan_bitops_generic+0x120/0x1d0
[   24.802029]  kunit_try_run_case+0x170/0x3f0
[   24.802187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.802340]  kthread+0x24c/0x2d0
[   24.802483]  ret_from_fork+0x10/0x20
[   24.802587] 
[   24.810682] Allocated by task 249:
[   24.811250]  kasan_save_stack+0x3c/0x68
[   24.811709]  kasan_save_track+0x20/0x40
[   24.812223]  kasan_save_alloc_info+0x40/0x58
[   24.813003]  __kasan_kmalloc+0xd4/0xd8
[   24.813840]  __kmalloc_cache_noprof+0x154/0x320
[   24.814426]  kasan_bitops_generic+0xa0/0x1d0
[   24.814891]  kunit_try_run_case+0x170/0x3f0
[   24.815551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.816355]  kthread+0x24c/0x2d0
[   24.816952]  ret_from_fork+0x10/0x20
[   24.817561] 
[   24.817931] The buggy address belongs to the object at fff00000c662ada0
[   24.817931]  which belongs to the cache kmalloc-16 of size 16
[   24.819173] The buggy address is located 8 bytes inside of
[   24.819173]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.820474] 
[   24.820851] The buggy address belongs to the physical page:
[   24.821528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.822388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.823203] page_type: f5(slab)
[   24.823708] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.824560] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.825317] page dumped because: kasan: bad access detected
[   24.826024] 
[   24.826401] Memory state around the buggy address:
[   24.827013]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.827805]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.828617] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.829420]                                   ^
[   24.830015]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.830800]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.831528] ==================================================================
[   24.938759] ==================================================================
[   24.939389] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   24.940356] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.942042] 
[   24.942599] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.942846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.942931] Hardware name: linux,dummy-virt (DT)
[   24.943011] Call trace:
[   24.943043]  dump_backtrace+0x9c/0x128
[   24.943100]  show_stack+0x20/0x38
[   24.943146]  dump_stack_lvl+0x8c/0xd0
[   24.943198]  print_report+0x118/0x5f0
[   24.943246]  kasan_report+0xdc/0x128
[   24.943291]  __asan_report_load8_noabort+0x20/0x30
[   24.943344]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   24.943407]  kasan_bitops_generic+0x120/0x1d0
[   24.943461]  kunit_try_run_case+0x170/0x3f0
[   24.943510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.943567]  kthread+0x24c/0x2d0
[   24.943613]  ret_from_fork+0x10/0x20
[   24.943664] 
[   24.951219] Allocated by task 249:
[   24.951873]  kasan_save_stack+0x3c/0x68
[   24.952449]  kasan_save_track+0x20/0x40
[   24.953155]  kasan_save_alloc_info+0x40/0x58
[   24.953747]  __kasan_kmalloc+0xd4/0xd8
[   24.954518]  __kmalloc_cache_noprof+0x154/0x320
[   24.955153]  kasan_bitops_generic+0xa0/0x1d0
[   24.955890]  kunit_try_run_case+0x170/0x3f0
[   24.956482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.957165]  kthread+0x24c/0x2d0
[   24.957657]  ret_from_fork+0x10/0x20
[   24.958208] 
[   24.958538] The buggy address belongs to the object at fff00000c662ada0
[   24.958538]  which belongs to the cache kmalloc-16 of size 16
[   24.959812] The buggy address is located 8 bytes inside of
[   24.959812]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.961106] 
[   24.961389] The buggy address belongs to the physical page:
[   24.962011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.962793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.963491] page_type: f5(slab)
[   24.963907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.964846] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.965717] page dumped because: kasan: bad access detected
[   24.966358] 
[   24.966681] Memory state around the buggy address:
[   24.967301]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.968065]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.968826] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.969627]                                   ^
[   24.970188]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.970942]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.971690] ==================================================================
[   24.758223] ==================================================================
[   24.758820] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   24.759922] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.760749] 
[   24.761358] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.761570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.761649] Hardware name: linux,dummy-virt (DT)
[   24.761740] Call trace:
[   24.761845]  dump_backtrace+0x9c/0x128
[   24.761982]  show_stack+0x20/0x38
[   24.762098]  dump_stack_lvl+0x8c/0xd0
[   24.762292]  print_report+0x118/0x5f0
[   24.762411]  kasan_report+0xdc/0x128
[   24.762526]  __asan_report_load8_noabort+0x20/0x30
[   24.762653]  kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   24.762750]  kasan_bitops_generic+0x120/0x1d0
[   24.762805]  kunit_try_run_case+0x170/0x3f0
[   24.762854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.762910]  kthread+0x24c/0x2d0
[   24.762955]  ret_from_fork+0x10/0x20
[   24.763038] 
[   24.772788] Allocated by task 249:
[   24.773548]  kasan_save_stack+0x3c/0x68
[   24.774026]  kasan_save_track+0x20/0x40
[   24.774435]  kasan_save_alloc_info+0x40/0x58
[   24.775158]  __kasan_kmalloc+0xd4/0xd8
[   24.776221]  __kmalloc_cache_noprof+0x154/0x320
[   24.776779]  kasan_bitops_generic+0xa0/0x1d0
[   24.777429]  kunit_try_run_case+0x170/0x3f0
[   24.778063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.778770]  kthread+0x24c/0x2d0
[   24.779319]  ret_from_fork+0x10/0x20
[   24.780010] 
[   24.780524] The buggy address belongs to the object at fff00000c662ada0
[   24.780524]  which belongs to the cache kmalloc-16 of size 16
[   24.782067] The buggy address is located 8 bytes inside of
[   24.782067]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.783950] 
[   24.784472] The buggy address belongs to the physical page:
[   24.785663] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.786624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.787433] page_type: f5(slab)
[   24.787941] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.788839] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.789592] page dumped because: kasan: bad access detected
[   24.790183] 
[   24.790521] Memory state around the buggy address:
[   24.791091]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.791954]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.792859] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.793667]                                   ^
[   24.794315]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.795110]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.795979] ==================================================================

[   21.416502] ==================================================================
[   21.417106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   21.418263] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.419065] 
[   21.419349] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.419472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.419509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.419567] Call Trace:
[   21.419619]  <TASK>
[   21.419671]  dump_stack_lvl+0x73/0xb0
[   21.419753]  print_report+0xd1/0x640
[   21.419831]  ? __virt_addr_valid+0x1db/0x2d0
[   21.419974]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   21.420054]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.420129]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   21.420204]  kasan_report+0x140/0x180
[   21.420302]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   21.420391]  kasan_check_range+0x10c/0x1c0
[   21.420449]  __kasan_check_write+0x18/0x20
[   21.420481]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   21.420537]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.420580]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.420638]  kasan_bitops_generic+0x122/0x1c0
[   21.420670]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.420721]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.420759]  kunit_try_run_case+0x1a6/0x480
[   21.420814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.421194]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.421259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.421300]  ? __kthread_parkme+0x82/0x160
[   21.421329]  ? preempt_count_sub+0x50/0x80
[   21.421360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.421389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.421426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.421539]  kthread+0x257/0x310
[   21.421592]  ? __pfx_kthread+0x10/0x10
[   21.421618]  ret_from_fork+0x41/0x80
[   21.421647]  ? __pfx_kthread+0x10/0x10
[   21.421672]  ret_from_fork_asm+0x1a/0x30
[   21.421712]  </TASK>
[   21.421726] 
[   21.440723] Allocated by task 266:
[   21.441584]  kasan_save_stack+0x45/0x70
[   21.442428]  kasan_save_track+0x18/0x40
[   21.443327]  kasan_save_alloc_info+0x3b/0x50
[   21.443907]  __kasan_kmalloc+0xb7/0xc0
[   21.444313]  __kmalloc_cache_noprof+0x168/0x350
[   21.445261]  kasan_bitops_generic+0x93/0x1c0
[   21.445841]  kunit_try_run_case+0x1a6/0x480
[   21.446313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.447036]  kthread+0x257/0x310
[   21.447861]  ret_from_fork+0x41/0x80
[   21.448207]  ret_from_fork_asm+0x1a/0x30
[   21.449245] 
[   21.449482] The buggy address belongs to the object at ffff888101f80200
[   21.449482]  which belongs to the cache kmalloc-16 of size 16
[   21.450695] The buggy address is located 8 bytes inside of
[   21.450695]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.451656] 
[   21.452047] The buggy address belongs to the physical page:
[   21.452957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.453612] flags: 0x200000000000000(node=0|zone=2)
[   21.454152] page_type: f5(slab)
[   21.454818] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.455466] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.456310] page dumped because: kasan: bad access detected
[   21.457307] 
[   21.457694] Memory state around the buggy address:
[   21.458064]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.459049]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.459606] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.460334]                       ^
[   21.461276]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.461884]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.462750] ==================================================================
[   21.820754] ==================================================================
[   21.822361] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   21.823351] Read of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.824137] 
[   21.824420] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.824548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.824584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.824644] Call Trace:
[   21.824698]  <TASK>
[   21.824747]  dump_stack_lvl+0x73/0xb0
[   21.825304]  print_report+0xd1/0x640
[   21.825381]  ? __virt_addr_valid+0x1db/0x2d0
[   21.825422]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   21.825482]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.825527]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   21.825563]  kasan_report+0x140/0x180
[   21.825597]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   21.825639]  __asan_report_load8_noabort+0x18/0x20
[   21.825669]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   21.825706]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.825743]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.825782]  kasan_bitops_generic+0x122/0x1c0
[   21.825817]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.825932]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.825978]  kunit_try_run_case+0x1a6/0x480
[   21.826013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.826041]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.826071]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.826106]  ? __kthread_parkme+0x82/0x160
[   21.826133]  ? preempt_count_sub+0x50/0x80
[   21.826164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.826192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.826257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.826329]  kthread+0x257/0x310
[   21.826356]  ? __pfx_kthread+0x10/0x10
[   21.826382]  ret_from_fork+0x41/0x80
[   21.826411]  ? __pfx_kthread+0x10/0x10
[   21.826436]  ret_from_fork_asm+0x1a/0x30
[   21.826611]  </TASK>
[   21.826628] 
[   21.847409] Allocated by task 266:
[   21.848047]  kasan_save_stack+0x45/0x70
[   21.849038]  kasan_save_track+0x18/0x40
[   21.849556]  kasan_save_alloc_info+0x3b/0x50
[   21.850073]  __kasan_kmalloc+0xb7/0xc0
[   21.850654]  __kmalloc_cache_noprof+0x168/0x350
[   21.851194]  kasan_bitops_generic+0x93/0x1c0
[   21.851888]  kunit_try_run_case+0x1a6/0x480
[   21.852338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.853980]  kthread+0x257/0x310
[   21.854294]  ret_from_fork+0x41/0x80
[   21.854821]  ret_from_fork_asm+0x1a/0x30
[   21.855250] 
[   21.855480] The buggy address belongs to the object at ffff888101f80200
[   21.855480]  which belongs to the cache kmalloc-16 of size 16
[   21.857292] The buggy address is located 8 bytes inside of
[   21.857292]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.859319] 
[   21.859908] The buggy address belongs to the physical page:
[   21.860907] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.861716] flags: 0x200000000000000(node=0|zone=2)
[   21.862210] page_type: f5(slab)
[   21.863014] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.863543] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.864330] page dumped because: kasan: bad access detected
[   21.864822] 
[   21.865849] Memory state around the buggy address:
[   21.866306]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.866990]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.867578] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.868354]                       ^
[   21.868790]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.870829]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.871664] ==================================================================
[   21.562398] ==================================================================
[   21.563417] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   21.564481] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.565791] 
[   21.566120] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.566291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.566317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.566361] Call Trace:
[   21.566402]  <TASK>
[   21.566434]  dump_stack_lvl+0x73/0xb0
[   21.566745]  print_report+0xd1/0x640
[   21.566786]  ? __virt_addr_valid+0x1db/0x2d0
[   21.566829]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   21.566901]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.566940]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   21.566975]  kasan_report+0x140/0x180
[   21.567011]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   21.567052]  kasan_check_range+0x10c/0x1c0
[   21.567081]  __kasan_check_write+0x18/0x20
[   21.567110]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   21.567146]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.567182]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.567242]  kasan_bitops_generic+0x122/0x1c0
[   21.567293]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.567326]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.567361]  kunit_try_run_case+0x1a6/0x480
[   21.567394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.567422]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.567469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.567565]  ? __kthread_parkme+0x82/0x160
[   21.567641]  ? preempt_count_sub+0x50/0x80
[   21.567677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.567706]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.567743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.567780]  kthread+0x257/0x310
[   21.567806]  ? __pfx_kthread+0x10/0x10
[   21.567858]  ret_from_fork+0x41/0x80
[   21.567895]  ? __pfx_kthread+0x10/0x10
[   21.567922]  ret_from_fork_asm+0x1a/0x30
[   21.567963]  </TASK>
[   21.567977] 
[   21.589963] Allocated by task 266:
[   21.590454]  kasan_save_stack+0x45/0x70
[   21.591295]  kasan_save_track+0x18/0x40
[   21.591980]  kasan_save_alloc_info+0x3b/0x50
[   21.592440]  __kasan_kmalloc+0xb7/0xc0
[   21.593108]  __kmalloc_cache_noprof+0x168/0x350
[   21.594212]  kasan_bitops_generic+0x93/0x1c0
[   21.594561]  kunit_try_run_case+0x1a6/0x480
[   21.595133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.596081]  kthread+0x257/0x310
[   21.596723]  ret_from_fork+0x41/0x80
[   21.597257]  ret_from_fork_asm+0x1a/0x30
[   21.597931] 
[   21.598941] The buggy address belongs to the object at ffff888101f80200
[   21.598941]  which belongs to the cache kmalloc-16 of size 16
[   21.600455] The buggy address is located 8 bytes inside of
[   21.600455]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.602154] 
[   21.602336] The buggy address belongs to the physical page:
[   21.603498] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.604299] flags: 0x200000000000000(node=0|zone=2)
[   21.605345] page_type: f5(slab)
[   21.606368] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.607656] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.608093] page dumped because: kasan: bad access detected
[   21.608420] 
[   21.608565] Memory state around the buggy address:
[   21.608858]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.609992]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.611483] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.612789]                       ^
[   21.615074]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.615953]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.616576] ==================================================================
[   21.765815] ==================================================================
[   21.766403] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   21.768257] Read of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.768885] 
[   21.769336] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.769461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.769502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.769562] Call Trace:
[   21.769613]  <TASK>
[   21.769661]  dump_stack_lvl+0x73/0xb0
[   21.769743]  print_report+0xd1/0x640
[   21.769818]  ? __virt_addr_valid+0x1db/0x2d0
[   21.769897]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   21.769973]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.770048]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   21.770128]  kasan_report+0x140/0x180
[   21.770215]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   21.770429]  kasan_check_range+0x10c/0x1c0
[   21.770803]  __kasan_check_read+0x15/0x20
[   21.770875]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   21.770917]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.770954]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.770991]  kasan_bitops_generic+0x122/0x1c0
[   21.771020]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.771049]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.771085]  kunit_try_run_case+0x1a6/0x480
[   21.771119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.771148]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.771178]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.771213]  ? __kthread_parkme+0x82/0x160
[   21.771282]  ? preempt_count_sub+0x50/0x80
[   21.771315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.771342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.771379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.771416]  kthread+0x257/0x310
[   21.771449]  ? __pfx_kthread+0x10/0x10
[   21.771564]  ret_from_fork+0x41/0x80
[   21.771606]  ? __pfx_kthread+0x10/0x10
[   21.771632]  ret_from_fork_asm+0x1a/0x30
[   21.771673]  </TASK>
[   21.771686] 
[   21.795239] Allocated by task 266:
[   21.796092]  kasan_save_stack+0x45/0x70
[   21.796466]  kasan_save_track+0x18/0x40
[   21.797174]  kasan_save_alloc_info+0x3b/0x50
[   21.798116]  __kasan_kmalloc+0xb7/0xc0
[   21.798664]  __kmalloc_cache_noprof+0x168/0x350
[   21.799448]  kasan_bitops_generic+0x93/0x1c0
[   21.799835]  kunit_try_run_case+0x1a6/0x480
[   21.800996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.801681]  kthread+0x257/0x310
[   21.802028]  ret_from_fork+0x41/0x80
[   21.802648]  ret_from_fork_asm+0x1a/0x30
[   21.803415] 
[   21.803743] The buggy address belongs to the object at ffff888101f80200
[   21.803743]  which belongs to the cache kmalloc-16 of size 16
[   21.805371] The buggy address is located 8 bytes inside of
[   21.805371]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.807023] 
[   21.807193] The buggy address belongs to the physical page:
[   21.808038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.809263] flags: 0x200000000000000(node=0|zone=2)
[   21.809644] page_type: f5(slab)
[   21.810132] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.811315] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.812243] page dumped because: kasan: bad access detected
[   21.813253] 
[   21.813604] Memory state around the buggy address:
[   21.814370]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.815282]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.816075] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.816580]                       ^
[   21.817642]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.818366]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.819266] ==================================================================
[   21.510776] ==================================================================
[   21.511606] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   21.512326] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.512901] 
[   21.513162] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.513849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.513960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.514037] Call Trace:
[   21.514088]  <TASK>
[   21.514135]  dump_stack_lvl+0x73/0xb0
[   21.514275]  print_report+0xd1/0x640
[   21.514366]  ? __virt_addr_valid+0x1db/0x2d0
[   21.514452]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   21.514555]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.514640]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   21.514684]  kasan_report+0x140/0x180
[   21.514719]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   21.514760]  kasan_check_range+0x10c/0x1c0
[   21.514789]  __kasan_check_write+0x18/0x20
[   21.514830]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   21.514898]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.514936]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.514974]  kasan_bitops_generic+0x122/0x1c0
[   21.515002]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.515031]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.515066]  kunit_try_run_case+0x1a6/0x480
[   21.515099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.515127]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.515157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.515192]  ? __kthread_parkme+0x82/0x160
[   21.515239]  ? preempt_count_sub+0x50/0x80
[   21.515300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.515329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.515367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.515404]  kthread+0x257/0x310
[   21.515430]  ? __pfx_kthread+0x10/0x10
[   21.515486]  ret_from_fork+0x41/0x80
[   21.515562]  ? __pfx_kthread+0x10/0x10
[   21.515599]  ret_from_fork_asm+0x1a/0x30
[   21.515642]  </TASK>
[   21.515656] 
[   21.537322] Allocated by task 266:
[   21.538675]  kasan_save_stack+0x45/0x70
[   21.539083]  kasan_save_track+0x18/0x40
[   21.540000]  kasan_save_alloc_info+0x3b/0x50
[   21.540350]  __kasan_kmalloc+0xb7/0xc0
[   21.541214]  __kmalloc_cache_noprof+0x168/0x350
[   21.541647]  kasan_bitops_generic+0x93/0x1c0
[   21.542331]  kunit_try_run_case+0x1a6/0x480
[   21.543303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.543815]  kthread+0x257/0x310
[   21.544301]  ret_from_fork+0x41/0x80
[   21.545300]  ret_from_fork_asm+0x1a/0x30
[   21.545677] 
[   21.546243] The buggy address belongs to the object at ffff888101f80200
[   21.546243]  which belongs to the cache kmalloc-16 of size 16
[   21.547838] The buggy address is located 8 bytes inside of
[   21.547838]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.549123] 
[   21.549309] The buggy address belongs to the physical page:
[   21.550182] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.550853] flags: 0x200000000000000(node=0|zone=2)
[   21.551347] page_type: f5(slab)
[   21.551706] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.552689] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.554289] page dumped because: kasan: bad access detected
[   21.554679] 
[   21.554907] Memory state around the buggy address:
[   21.555338]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.555848]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.557195] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.557976]                       ^
[   21.558960]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.559465]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.560278] ==================================================================
[   21.463904] ==================================================================
[   21.464441] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   21.465308] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.466016] 
[   21.466317] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.466722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.466793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.466884] Call Trace:
[   21.466934]  <TASK>
[   21.466980]  dump_stack_lvl+0x73/0xb0
[   21.467065]  print_report+0xd1/0x640
[   21.467145]  ? __virt_addr_valid+0x1db/0x2d0
[   21.467237]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   21.467330]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.467404]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   21.467483]  kasan_report+0x140/0x180
[   21.467559]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   21.467653]  kasan_check_range+0x10c/0x1c0
[   21.467726]  __kasan_check_write+0x18/0x20
[   21.467801]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   21.467900]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.468031]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.468134]  kasan_bitops_generic+0x122/0x1c0
[   21.468258]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.468340]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.468425]  kunit_try_run_case+0x1a6/0x480
[   21.468532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.468601]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.468678]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.468759]  ? __kthread_parkme+0x82/0x160
[   21.468790]  ? preempt_count_sub+0x50/0x80
[   21.468831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.468894]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.468934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.468976]  kthread+0x257/0x310
[   21.469002]  ? __pfx_kthread+0x10/0x10
[   21.469029]  ret_from_fork+0x41/0x80
[   21.469057]  ? __pfx_kthread+0x10/0x10
[   21.469082]  ret_from_fork_asm+0x1a/0x30
[   21.469122]  </TASK>
[   21.469136] 
[   21.488180] Allocated by task 266:
[   21.488749]  kasan_save_stack+0x45/0x70
[   21.489398]  kasan_save_track+0x18/0x40
[   21.489815]  kasan_save_alloc_info+0x3b/0x50
[   21.490830]  __kasan_kmalloc+0xb7/0xc0
[   21.491150]  __kmalloc_cache_noprof+0x168/0x350
[   21.491758]  kasan_bitops_generic+0x93/0x1c0
[   21.492420]  kunit_try_run_case+0x1a6/0x480
[   21.492942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.493642]  kthread+0x257/0x310
[   21.494020]  ret_from_fork+0x41/0x80
[   21.494332]  ret_from_fork_asm+0x1a/0x30
[   21.494724] 
[   21.495740] The buggy address belongs to the object at ffff888101f80200
[   21.495740]  which belongs to the cache kmalloc-16 of size 16
[   21.497012] The buggy address is located 8 bytes inside of
[   21.497012]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.498272] 
[   21.498528] The buggy address belongs to the physical page:
[   21.499035] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.500126] flags: 0x200000000000000(node=0|zone=2)
[   21.500664] page_type: f5(slab)
[   21.501215] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.502087] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.503169] page dumped because: kasan: bad access detected
[   21.503751] 
[   21.504093] Memory state around the buggy address:
[   21.504635]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.505440]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.506094] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.506986]                       ^
[   21.507657]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.508205]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.508716] ==================================================================
[   21.718006] ==================================================================
[   21.718839] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   21.720085] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.721019] 
[   21.721304] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.721461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.721499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.721961] Call Trace:
[   21.722016]  <TASK>
[   21.722099]  dump_stack_lvl+0x73/0xb0
[   21.722178]  print_report+0xd1/0x640
[   21.722275]  ? __virt_addr_valid+0x1db/0x2d0
[   21.722351]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   21.722427]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.722510]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   21.722591]  kasan_report+0x140/0x180
[   21.722713]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   21.722832]  kasan_check_range+0x10c/0x1c0
[   21.722909]  __kasan_check_write+0x18/0x20
[   21.722981]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   21.723062]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.723145]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.723198]  kasan_bitops_generic+0x122/0x1c0
[   21.723269]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.723344]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.723420]  kunit_try_run_case+0x1a6/0x480
[   21.723477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.723549]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.723621]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.723663]  ? __kthread_parkme+0x82/0x160
[   21.723692]  ? preempt_count_sub+0x50/0x80
[   21.723723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.723752]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.723789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.723844]  kthread+0x257/0x310
[   21.723882]  ? __pfx_kthread+0x10/0x10
[   21.723910]  ret_from_fork+0x41/0x80
[   21.723940]  ? __pfx_kthread+0x10/0x10
[   21.723965]  ret_from_fork_asm+0x1a/0x30
[   21.724006]  </TASK>
[   21.724019] 
[   21.742663] Allocated by task 266:
[   21.743945]  kasan_save_stack+0x45/0x70
[   21.744261]  kasan_save_track+0x18/0x40
[   21.744728]  kasan_save_alloc_info+0x3b/0x50
[   21.745539]  __kasan_kmalloc+0xb7/0xc0
[   21.745860]  __kmalloc_cache_noprof+0x168/0x350
[   21.746124]  kasan_bitops_generic+0x93/0x1c0
[   21.746388]  kunit_try_run_case+0x1a6/0x480
[   21.746744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.747367]  kthread+0x257/0x310
[   21.748093]  ret_from_fork+0x41/0x80
[   21.748988]  ret_from_fork_asm+0x1a/0x30
[   21.749924] 
[   21.750354] The buggy address belongs to the object at ffff888101f80200
[   21.750354]  which belongs to the cache kmalloc-16 of size 16
[   21.751747] The buggy address is located 8 bytes inside of
[   21.751747]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.752573] 
[   21.752732] The buggy address belongs to the physical page:
[   21.753131] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.755088] flags: 0x200000000000000(node=0|zone=2)
[   21.755808] page_type: f5(slab)
[   21.756539] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.757159] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.758255] page dumped because: kasan: bad access detected
[   21.759092] 
[   21.759295] Memory state around the buggy address:
[   21.760108]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.761211]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.761930] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.762517]                       ^
[   21.763382]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.764042]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.764679] ==================================================================
[   21.618741] ==================================================================
[   21.619131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   21.619617] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.619999] 
[   21.620183] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.620378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.620408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.620460] Call Trace:
[   21.620505]  <TASK>
[   21.620543]  dump_stack_lvl+0x73/0xb0
[   21.620601]  print_report+0xd1/0x640
[   21.620655]  ? __virt_addr_valid+0x1db/0x2d0
[   21.620708]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   21.620780]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.620887]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   21.620952]  kasan_report+0x140/0x180
[   21.621011]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   21.621080]  kasan_check_range+0x10c/0x1c0
[   21.621130]  __kasan_check_write+0x18/0x20
[   21.621178]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   21.621259]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.621325]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.621393]  kasan_bitops_generic+0x122/0x1c0
[   21.621473]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.621544]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.621622]  kunit_try_run_case+0x1a6/0x480
[   21.621697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.621756]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.621861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.622012]  ? __kthread_parkme+0x82/0x160
[   21.622073]  ? preempt_count_sub+0x50/0x80
[   21.622126]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.622170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.622258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.622324]  kthread+0x257/0x310
[   21.622371]  ? __pfx_kthread+0x10/0x10
[   21.622420]  ret_from_fork+0x41/0x80
[   21.622520]  ? __pfx_kthread+0x10/0x10
[   21.622569]  ret_from_fork_asm+0x1a/0x30
[   21.622640]  </TASK>
[   21.622664] 
[   21.643130] Allocated by task 266:
[   21.643751]  kasan_save_stack+0x45/0x70
[   21.644841]  kasan_save_track+0x18/0x40
[   21.645284]  kasan_save_alloc_info+0x3b/0x50
[   21.646076]  __kasan_kmalloc+0xb7/0xc0
[   21.646576]  __kmalloc_cache_noprof+0x168/0x350
[   21.647209]  kasan_bitops_generic+0x93/0x1c0
[   21.648089]  kunit_try_run_case+0x1a6/0x480
[   21.650122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.650704]  kthread+0x257/0x310
[   21.651034]  ret_from_fork+0x41/0x80
[   21.651760]  ret_from_fork_asm+0x1a/0x30
[   21.652145] 
[   21.652448] The buggy address belongs to the object at ffff888101f80200
[   21.652448]  which belongs to the cache kmalloc-16 of size 16
[   21.653781] The buggy address is located 8 bytes inside of
[   21.653781]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.655368] 
[   21.655531] The buggy address belongs to the physical page:
[   21.655942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.656741] flags: 0x200000000000000(node=0|zone=2)
[   21.658216] page_type: f5(slab)
[   21.658543] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.659128] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.659714] page dumped because: kasan: bad access detected
[   21.660170] 
[   21.660452] Memory state around the buggy address:
[   21.661218]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.662194]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.663765] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.664932]                       ^
[   21.665286]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.666385]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.667180] ==================================================================
[   21.668322] ==================================================================
[   21.669156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   21.670510] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266
[   21.671414] 
[   21.671908] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.672054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.672090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.672194] Call Trace:
[   21.672280]  <TASK>
[   21.672332]  dump_stack_lvl+0x73/0xb0
[   21.672411]  print_report+0xd1/0x640
[   21.672483]  ? __virt_addr_valid+0x1db/0x2d0
[   21.672564]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   21.672641]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.672721]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   21.672799]  kasan_report+0x140/0x180
[   21.672881]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   21.672936]  kasan_check_range+0x10c/0x1c0
[   21.672967]  __kasan_check_write+0x18/0x20
[   21.672997]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   21.673033]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.673071]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.673109]  kasan_bitops_generic+0x122/0x1c0
[   21.673140]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.673169]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.673204]  kunit_try_run_case+0x1a6/0x480
[   21.673263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.673294]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.673324]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.673363]  ? __kthread_parkme+0x82/0x160
[   21.673391]  ? preempt_count_sub+0x50/0x80
[   21.673421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.673467]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.673553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.673604]  kthread+0x257/0x310
[   21.673630]  ? __pfx_kthread+0x10/0x10
[   21.673655]  ret_from_fork+0x41/0x80
[   21.673684]  ? __pfx_kthread+0x10/0x10
[   21.673709]  ret_from_fork_asm+0x1a/0x30
[   21.673750]  </TASK>
[   21.673764] 
[   21.695317] Allocated by task 266:
[   21.695794]  kasan_save_stack+0x45/0x70
[   21.696191]  kasan_save_track+0x18/0x40
[   21.696589]  kasan_save_alloc_info+0x3b/0x50
[   21.697235]  __kasan_kmalloc+0xb7/0xc0
[   21.697716]  __kmalloc_cache_noprof+0x168/0x350
[   21.698451]  kasan_bitops_generic+0x93/0x1c0
[   21.698813]  kunit_try_run_case+0x1a6/0x480
[   21.699660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.700139]  kthread+0x257/0x310
[   21.700602]  ret_from_fork+0x41/0x80
[   21.701008]  ret_from_fork_asm+0x1a/0x30
[   21.701507] 
[   21.701713] The buggy address belongs to the object at ffff888101f80200
[   21.701713]  which belongs to the cache kmalloc-16 of size 16
[   21.703394] The buggy address is located 8 bytes inside of
[   21.703394]  allocated 9-byte region [ffff888101f80200, ffff888101f80209)
[   21.705433] 
[   21.706045] The buggy address belongs to the physical page:
[   21.706665] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80
[   21.707794] flags: 0x200000000000000(node=0|zone=2)
[   21.708158] page_type: f5(slab)
[   21.708746] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.709621] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.710718] page dumped because: kasan: bad access detected
[   21.711295] 
[   21.711506] Memory state around the buggy address:
[   21.712156]  ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.712860]  ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.713661] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.714778]                       ^
[   21.715247]  ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.716059]  ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.716565] ==================================================================