Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64

[   77.133585] ==================================================================
[   77.134168] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xb8c
[   77.134906] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.135524] 
[   77.135750] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.136545] Hardware name: linux,dummy-virt (DT)
[   77.137223] Call trace:
[   77.137495]  dump_backtrace+0xf8/0x118
[   77.138001]  show_stack+0x18/0x24
[   77.138493]  __dump_stack+0x28/0x38
[   77.138923]  dump_stack_lvl+0x54/0x6c
[   77.139375]  print_address_description+0x7c/0x1ec
[   77.139925]  print_report+0x50/0x68
[   77.140368]  kasan_report+0xac/0x100
[   77.140868]  kasan_check_range+0x260/0x2a0
[   77.141357]  __kasan_check_write+0x2c/0x3c
[   77.141807]  kasan_bitops_generic+0x1f0/0xb8c
[   77.142271]  kunit_try_run_case+0x80/0x184
[   77.142725]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.143458]  kthread+0x16c/0x21c
[   77.143876]  ret_from_fork+0x10/0x20
[   77.144331] 
[   77.144522] Allocated by task 165:
[   77.144913]  kasan_set_track+0x4c/0x80
[   77.145535]  kasan_save_alloc_info+0x28/0x34
[   77.146028]  __kasan_kmalloc+0x88/0xa0
[   77.146469]  kmalloc_trace+0x54/0x68
[   77.146933]  kasan_bitops_generic+0x4c/0xb8c
[   77.147394]  kunit_try_run_case+0x80/0x184
[   77.147873]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.148447]  kthread+0x16c/0x21c
[   77.149014]  ret_from_fork+0x10/0x20
[   77.149468] 
[   77.149659] The buggy address belongs to the object at ffff0000c5a87c00
[   77.149659]  which belongs to the cache kmalloc-128 of size 128
[   77.150611] The buggy address is located 8 bytes inside of
[   77.150611]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.151503] 
[   77.151724] The buggy address belongs to the physical page:
[   77.152187] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.153137] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.153844] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.154527] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.155155] page dumped because: kasan: bad access detected
[   77.155635] 
[   77.155851] Memory state around the buggy address:
[   77.156319]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.157615]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.158233] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.158846]                       ^
[   77.159199]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.159838]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.160431] ==================================================================
[   77.328315] ==================================================================
[   77.329131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3a0/0xb8c
[   77.329836] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.330428] 
[   77.330674] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.331422] Hardware name: linux,dummy-virt (DT)
[   77.331877] Call trace:
[   77.332156]  dump_backtrace+0xf8/0x118
[   77.332629]  show_stack+0x18/0x24
[   77.333098]  __dump_stack+0x28/0x38
[   77.333531]  dump_stack_lvl+0x54/0x6c
[   77.333966]  print_address_description+0x7c/0x1ec
[   77.334506]  print_report+0x50/0x68
[   77.335149]  kasan_report+0xac/0x100
[   77.335606]  __asan_load8+0xa8/0xac
[   77.336017]  kasan_bitops_generic+0x3a0/0xb8c
[   77.336534]  kunit_try_run_case+0x80/0x184
[   77.337175]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.337747]  kthread+0x16c/0x21c
[   77.338175]  ret_from_fork+0x10/0x20
[   77.338628] 
[   77.338882] Allocated by task 165:
[   77.339236]  kasan_set_track+0x4c/0x80
[   77.339735]  kasan_save_alloc_info+0x28/0x34
[   77.340203]  __kasan_kmalloc+0x88/0xa0
[   77.340843]  kmalloc_trace+0x54/0x68
[   77.341267]  kasan_bitops_generic+0x4c/0xb8c
[   77.341733]  kunit_try_run_case+0x80/0x184
[   77.342195]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.342781]  kthread+0x16c/0x21c
[   77.343186]  ret_from_fork+0x10/0x20
[   77.343615] 
[   77.343828] The buggy address belongs to the object at ffff0000c5a87c00
[   77.343828]  which belongs to the cache kmalloc-128 of size 128
[   77.344732] The buggy address is located 8 bytes inside of
[   77.344732]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.345640] 
[   77.345866] The buggy address belongs to the physical page:
[   77.346321] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.347257] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.347963] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.349185] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.349810] page dumped because: kasan: bad access detected
[   77.350289] 
[   77.350481] Memory state around the buggy address:
[   77.350955]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.351567]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.352243] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.353030]                       ^
[   77.353406]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.354034]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.354634] ==================================================================
[   77.529113] ==================================================================
[   77.529847] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x59c/0xb8c
[   77.530531] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.531160] 
[   77.531378] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.532147] Hardware name: linux,dummy-virt (DT)
[   77.532561] Call trace:
[   77.532877]  dump_backtrace+0xf8/0x118
[   77.533357]  show_stack+0x18/0x24
[   77.533801]  __dump_stack+0x28/0x38
[   77.534213]  dump_stack_lvl+0x54/0x6c
[   77.534691]  print_address_description+0x7c/0x1ec
[   77.535247]  print_report+0x50/0x68
[   77.535705]  kasan_report+0xac/0x100
[   77.536159]  __asan_load8+0xa8/0xac
[   77.536558]  kasan_bitops_generic+0x59c/0xb8c
[   77.537065]  kunit_try_run_case+0x80/0x184
[   77.537536]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.538108]  kthread+0x16c/0x21c
[   77.538542]  ret_from_fork+0x10/0x20
[   77.538971] 
[   77.539166] Allocated by task 165:
[   77.539514]  kasan_set_track+0x4c/0x80
[   77.539987]  kasan_save_alloc_info+0x28/0x34
[   77.540450]  __kasan_kmalloc+0x88/0xa0
[   77.540931]  kmalloc_trace+0x54/0x68
[   77.541342]  kasan_bitops_generic+0x4c/0xb8c
[   77.541804]  kunit_try_run_case+0x80/0x184
[   77.542288]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.542861]  kthread+0x16c/0x21c
[   77.543273]  ret_from_fork+0x10/0x20
[   77.543713] 
[   77.543945] The buggy address belongs to the object at ffff0000c5a87c00
[   77.543945]  which belongs to the cache kmalloc-128 of size 128
[   77.544858] The buggy address is located 8 bytes inside of
[   77.544858]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.545802] 
[   77.546026] The buggy address belongs to the physical page:
[   77.546491] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.547281] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.547993] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.548683] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.549333] page dumped because: kasan: bad access detected
[   77.549814] 
[   77.550033] Memory state around the buggy address:
[   77.550475]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.551117]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.551749] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.552319]                       ^
[   77.552697]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.553324]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.553946] ==================================================================
[   77.355424] ==================================================================
[   77.355968] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3f4/0xb8c
[   77.356965] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.357607] 
[   77.357876] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.358631] Hardware name: linux,dummy-virt (DT)
[   77.359060] Call trace:
[   77.359355]  dump_backtrace+0xf8/0x118
[   77.359851]  show_stack+0x18/0x24
[   77.360276]  __dump_stack+0x28/0x38
[   77.360878]  dump_stack_lvl+0x54/0x6c
[   77.361331]  print_address_description+0x7c/0x1ec
[   77.361975]  print_report+0x50/0x68
[   77.362408]  kasan_report+0xac/0x100
[   77.362877]  kasan_check_range+0x260/0x2a0
[   77.363436]  __kasan_check_write+0x2c/0x3c
[   77.363929]  kasan_bitops_generic+0x3f4/0xb8c
[   77.364404]  kunit_try_run_case+0x80/0x184
[   77.364884]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.365531]  kthread+0x16c/0x21c
[   77.365959]  ret_from_fork+0x10/0x20
[   77.366405] 
[   77.366635] Allocated by task 165:
[   77.367228]  kasan_set_track+0x4c/0x80
[   77.367685]  kasan_save_alloc_info+0x28/0x34
[   77.368143]  __kasan_kmalloc+0x88/0xa0
[   77.368728]  kmalloc_trace+0x54/0x68
[   77.369155]  kasan_bitops_generic+0x4c/0xb8c
[   77.369706]  kunit_try_run_case+0x80/0x184
[   77.370220]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.371822]  kthread+0x16c/0x21c
[   77.372471]  ret_from_fork+0x10/0x20
[   77.372878] 
[   77.373061] The buggy address belongs to the object at ffff0000c5a87c00
[   77.373061]  which belongs to the cache kmalloc-128 of size 128
[   77.374474] The buggy address is located 8 bytes inside of
[   77.374474]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.376540] 
[   77.377274] The buggy address belongs to the physical page:
[   77.378459] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.379463] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.380389] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.381700] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.382342] page dumped because: kasan: bad access detected
[   77.382875] 
[   77.383076] Memory state around the buggy address:
[   77.383472]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.384115]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.384830] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.385385]                       ^
[   77.385725]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.386388]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.387009] ==================================================================
[   77.554786] ==================================================================
[   77.555326] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x5f4/0xb8c
[   77.556054] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.556734] 
[   77.556981] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.557727] Hardware name: linux,dummy-virt (DT)
[   77.558168] Call trace:
[   77.558473]  dump_backtrace+0xf8/0x118
[   77.558963]  show_stack+0x18/0x24
[   77.559432]  __dump_stack+0x28/0x38
[   77.559882]  dump_stack_lvl+0x54/0x6c
[   77.560315]  print_address_description+0x7c/0x1ec
[   77.560867]  print_report+0x50/0x68
[   77.561328]  kasan_report+0xac/0x100
[   77.561783]  kasan_check_range+0x260/0x2a0
[   77.562288]  __kasan_check_write+0x2c/0x3c
[   77.562730]  kasan_bitops_generic+0x5f4/0xb8c
[   77.563226]  kunit_try_run_case+0x80/0x184
[   77.563693]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.564303]  kthread+0x16c/0x21c
[   77.564713]  ret_from_fork+0x10/0x20
[   77.565166] 
[   77.565354] Allocated by task 165:
[   77.565701]  kasan_set_track+0x4c/0x80
[   77.566164]  kasan_save_alloc_info+0x28/0x34
[   77.566647]  __kasan_kmalloc+0x88/0xa0
[   77.567153]  kmalloc_trace+0x54/0x68
[   77.567578]  kasan_bitops_generic+0x4c/0xb8c
[   77.568060]  kunit_try_run_case+0x80/0x184
[   77.568568]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.569143]  kthread+0x16c/0x21c
[   77.569546]  ret_from_fork+0x10/0x20
[   77.569997] 
[   77.570190] The buggy address belongs to the object at ffff0000c5a87c00
[   77.570190]  which belongs to the cache kmalloc-128 of size 128
[   77.571146] The buggy address is located 8 bytes inside of
[   77.571146]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.572032] 
[   77.572265] The buggy address belongs to the physical page:
[   77.572727] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.573536] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.574229] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.574913] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.575543] page dumped because: kasan: bad access detected
[   77.576015] 
[   77.576229] Memory state around the buggy address:
[   77.576640]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.577297]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.577915] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.578522]                       ^
[   77.578899]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.579539]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.580091] ==================================================================
[   77.051122] ==================================================================
[   77.051648] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xf8/0xb8c
[   77.052343] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.053031] 
[   77.053273] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.054021] Hardware name: linux,dummy-virt (DT)
[   77.054472] Call trace:
[   77.054751]  dump_backtrace+0xf8/0x118
[   77.055713]  show_stack+0x18/0x24
[   77.056159]  __dump_stack+0x28/0x38
[   77.056743]  dump_stack_lvl+0x54/0x6c
[   77.057199]  print_address_description+0x7c/0x1ec
[   77.057791]  print_report+0x50/0x68
[   77.058261]  kasan_report+0xac/0x100
[   77.058705]  __asan_load8+0xa8/0xac
[   77.059144]  kasan_bitops_generic+0xf8/0xb8c
[   77.059609]  kunit_try_run_case+0x80/0x184
[   77.060089]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.060837]  kthread+0x16c/0x21c
[   77.061265]  ret_from_fork+0x10/0x20
[   77.061712] 
[   77.061911] Allocated by task 165:
[   77.062288]  kasan_set_track+0x4c/0x80
[   77.062754]  kasan_save_alloc_info+0x28/0x34
[   77.063257]  __kasan_kmalloc+0x88/0xa0
[   77.063787]  kmalloc_trace+0x54/0x68
[   77.064210]  kasan_bitops_generic+0x4c/0xb8c
[   77.064872]  kunit_try_run_case+0x80/0x184
[   77.065357]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.065949]  kthread+0x16c/0x21c
[   77.066363]  ret_from_fork+0x10/0x20
[   77.066804] 
[   77.067001] The buggy address belongs to the object at ffff0000c5a87c00
[   77.067001]  which belongs to the cache kmalloc-128 of size 128
[   77.067945] The buggy address is located 8 bytes inside of
[   77.067945]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.069039] 
[   77.069271] The buggy address belongs to the physical page:
[   77.069733] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.070524] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.071210] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.071910] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.072516] page dumped because: kasan: bad access detected
[   77.073000] 
[   77.073207] Memory state around the buggy address:
[   77.073655]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.074273]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.075401] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.076020]                       ^
[   77.076398]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.077160]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.077768] ==================================================================
[   77.299899] ==================================================================
[   77.300401] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x350/0xb8c
[   77.300999] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.301503] 
[   77.301697] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.303215] Hardware name: linux,dummy-virt (DT)
[   77.303622] Call trace:
[   77.303896]  dump_backtrace+0xf8/0x118
[   77.304374]  show_stack+0x18/0x24
[   77.304971]  __dump_stack+0x28/0x38
[   77.305397]  dump_stack_lvl+0x54/0x6c
[   77.305855]  print_address_description+0x7c/0x1ec
[   77.306376]  print_report+0x50/0x68
[   77.307140]  kasan_report+0xac/0x100
[   77.307636]  kasan_check_range+0x260/0x2a0
[   77.308126]  __kasan_check_write+0x2c/0x3c
[   77.308589]  kasan_bitops_generic+0x350/0xb8c
[   77.309249]  kunit_try_run_case+0x80/0x184
[   77.309767]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.310362]  kthread+0x16c/0x21c
[   77.310814]  ret_from_fork+0x10/0x20
[   77.311260] 
[   77.311447] Allocated by task 165:
[   77.311828]  kasan_set_track+0x4c/0x80
[   77.312294]  kasan_save_alloc_info+0x28/0x34
[   77.312980]  __kasan_kmalloc+0x88/0xa0
[   77.313493]  kmalloc_trace+0x54/0x68
[   77.313946]  kasan_bitops_generic+0x4c/0xb8c
[   77.314427]  kunit_try_run_case+0x80/0x184
[   77.314911]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.315496]  kthread+0x16c/0x21c
[   77.315936]  ret_from_fork+0x10/0x20
[   77.316378] 
[   77.316577] The buggy address belongs to the object at ffff0000c5a87c00
[   77.316577]  which belongs to the cache kmalloc-128 of size 128
[   77.317614] The buggy address is located 8 bytes inside of
[   77.317614]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.318537] 
[   77.318764] The buggy address belongs to the physical page:
[   77.319218] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.319993] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.321222] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.321892] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.322488] page dumped because: kasan: bad access detected
[   77.322973] 
[   77.323166] Memory state around the buggy address:
[   77.323586]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.324249]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.325061] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.325674]                       ^
[   77.326057]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.326690]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.327305] ==================================================================
[   77.447241] ==================================================================
[   77.447881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4a8/0xb8c
[   77.448571] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.449317] 
[   77.449568] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.450305] Hardware name: linux,dummy-virt (DT)
[   77.450742] Call trace:
[   77.451315]  dump_backtrace+0xf8/0x118
[   77.451802]  show_stack+0x18/0x24
[   77.452230]  __dump_stack+0x28/0x38
[   77.452658]  dump_stack_lvl+0x54/0x6c
[   77.453131]  print_address_description+0x7c/0x1ec
[   77.453666]  print_report+0x50/0x68
[   77.454355]  kasan_report+0xac/0x100
[   77.454852]  __asan_load8+0xa8/0xac
[   77.455249]  kasan_bitops_generic+0x4a8/0xb8c
[   77.455741]  kunit_try_run_case+0x80/0x184
[   77.456259]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.456848]  kthread+0x16c/0x21c
[   77.457300]  ret_from_fork+0x10/0x20
[   77.457717] 
[   77.457921] Allocated by task 165:
[   77.458285]  kasan_set_track+0x4c/0x80
[   77.458767]  kasan_save_alloc_info+0x28/0x34
[   77.459226]  __kasan_kmalloc+0x88/0xa0
[   77.459734]  kmalloc_trace+0x54/0x68
[   77.460154]  kasan_bitops_generic+0x4c/0xb8c
[   77.460646]  kunit_try_run_case+0x80/0x184
[   77.461118]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.461710]  kthread+0x16c/0x21c
[   77.462133]  ret_from_fork+0x10/0x20
[   77.462585] 
[   77.462810] The buggy address belongs to the object at ffff0000c5a87c00
[   77.462810]  which belongs to the cache kmalloc-128 of size 128
[   77.463748] The buggy address is located 8 bytes inside of
[   77.463748]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.464643] 
[   77.464878] The buggy address belongs to the physical page:
[   77.465364] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.466188] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.466862] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.467518] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.468150] page dumped because: kasan: bad access detected
[   77.468666] 
[   77.468889] Memory state around the buggy address:
[   77.469337]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.469983]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.470632] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.471235]                       ^
[   77.471630]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.472284]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.472885] ==================================================================
[   77.502968] ==================================================================
[   77.503478] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x54c/0xb8c
[   77.504260] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.504870] 
[   77.505135] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.505896] Hardware name: linux,dummy-virt (DT)
[   77.506336] Call trace:
[   77.506608]  dump_backtrace+0xf8/0x118
[   77.507105]  show_stack+0x18/0x24
[   77.507533]  __dump_stack+0x28/0x38
[   77.507954]  dump_stack_lvl+0x54/0x6c
[   77.508416]  print_address_description+0x7c/0x1ec
[   77.508962]  print_report+0x50/0x68
[   77.509441]  kasan_report+0xac/0x100
[   77.509903]  __asan_load8+0xa8/0xac
[   77.510323]  kasan_bitops_generic+0x54c/0xb8c
[   77.510812]  kunit_try_run_case+0x80/0x184
[   77.511324]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.511901]  kthread+0x16c/0x21c
[   77.512321]  ret_from_fork+0x10/0x20
[   77.512785] 
[   77.512992] Allocated by task 165:
[   77.513336]  kasan_set_track+0x4c/0x80
[   77.513810]  kasan_save_alloc_info+0x28/0x34
[   77.514293]  __kasan_kmalloc+0x88/0xa0
[   77.514791]  kmalloc_trace+0x54/0x68
[   77.515239]  kasan_bitops_generic+0x4c/0xb8c
[   77.515706]  kunit_try_run_case+0x80/0x184
[   77.516190]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.516768]  kthread+0x16c/0x21c
[   77.517215]  ret_from_fork+0x10/0x20
[   77.517659] 
[   77.517877] The buggy address belongs to the object at ffff0000c5a87c00
[   77.517877]  which belongs to the cache kmalloc-128 of size 128
[   77.518811] The buggy address is located 8 bytes inside of
[   77.518811]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.519688] 
[   77.519923] The buggy address belongs to the physical page:
[   77.520390] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.521217] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.521896] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.522553] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.523147] page dumped because: kasan: bad access detected
[   77.523625] 
[   77.523857] Memory state around the buggy address:
[   77.524315]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.524942]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.525579] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.526178]                       ^
[   77.526554]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.527206]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.527818] ==================================================================
[   77.022844] ==================================================================
[   77.023726] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xa8/0xb8c
[   77.024415] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.025160] 
[   77.025657] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.026431] Hardware name: linux,dummy-virt (DT)
[   77.026850] Call trace:
[   77.027114]  dump_backtrace+0xf8/0x118
[   77.027651]  show_stack+0x18/0x24
[   77.028125]  __dump_stack+0x28/0x38
[   77.028601]  dump_stack_lvl+0x54/0x6c
[   77.029074]  print_address_description+0x7c/0x1ec
[   77.029642]  print_report+0x50/0x68
[   77.030141]  kasan_report+0xac/0x100
[   77.030584]  kasan_check_range+0x260/0x2a0
[   77.031068]  __kasan_check_write+0x2c/0x3c
[   77.031542]  kasan_bitops_generic+0xa8/0xb8c
[   77.032025]  kunit_try_run_case+0x80/0x184
[   77.032497]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.033071]  kthread+0x16c/0x21c
[   77.033483]  ret_from_fork+0x10/0x20
[   77.033938] 
[   77.034121] Allocated by task 165:
[   77.034467]  kasan_set_track+0x4c/0x80
[   77.035154]  kasan_save_alloc_info+0x28/0x34
[   77.035629]  __kasan_kmalloc+0x88/0xa0
[   77.036096]  kmalloc_trace+0x54/0x68
[   77.036519]  kasan_bitops_generic+0x4c/0xb8c
[   77.037145]  kunit_try_run_case+0x80/0x184
[   77.037613]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.038193]  kthread+0x16c/0x21c
[   77.038599]  ret_from_fork+0x10/0x20
[   77.039051] 
[   77.039243] The buggy address belongs to the object at ffff0000c5a87c00
[   77.039243]  which belongs to the cache kmalloc-128 of size 128
[   77.040214] The buggy address is located 8 bytes inside of
[   77.040214]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.041690] 
[   77.041934] The buggy address belongs to the physical page:
[   77.042387] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.043173] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.043846] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.044508] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.045265] page dumped because: kasan: bad access detected
[   77.045738] 
[   77.045950] Memory state around the buggy address:
[   77.046420]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.047061]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.047682] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.048338]                       ^
[   77.048888]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.049497]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.050103] ==================================================================
[   77.078629] ==================================================================
[   77.079206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x14c/0xb8c
[   77.079947] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.080559] 
[   77.081080] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.081812] Hardware name: linux,dummy-virt (DT)
[   77.082244] Call trace:
[   77.082515]  dump_backtrace+0xf8/0x118
[   77.082987]  show_stack+0x18/0x24
[   77.083408]  __dump_stack+0x28/0x38
[   77.083845]  dump_stack_lvl+0x54/0x6c
[   77.084272]  print_address_description+0x7c/0x1ec
[   77.084971]  print_report+0x50/0x68
[   77.085418]  kasan_report+0xac/0x100
[   77.085875]  kasan_check_range+0x260/0x2a0
[   77.086351]  __kasan_check_write+0x2c/0x3c
[   77.086807]  kasan_bitops_generic+0x14c/0xb8c
[   77.087278]  kunit_try_run_case+0x80/0x184
[   77.087729]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.088316]  kthread+0x16c/0x21c
[   77.088827]  ret_from_fork+0x10/0x20
[   77.089277] 
[   77.089472] Allocated by task 165:
[   77.089848]  kasan_set_track+0x4c/0x80
[   77.090335]  kasan_save_alloc_info+0x28/0x34
[   77.090944]  __kasan_kmalloc+0x88/0xa0
[   77.091411]  kmalloc_trace+0x54/0x68
[   77.091834]  kasan_bitops_generic+0x4c/0xb8c
[   77.092317]  kunit_try_run_case+0x80/0x184
[   77.092944]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.093518]  kthread+0x16c/0x21c
[   77.093941]  ret_from_fork+0x10/0x20
[   77.094384] 
[   77.094572] The buggy address belongs to the object at ffff0000c5a87c00
[   77.094572]  which belongs to the cache kmalloc-128 of size 128
[   77.095493] The buggy address is located 8 bytes inside of
[   77.095493]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.096403] 
[   77.096624] The buggy address belongs to the physical page:
[   77.097088] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.097867] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.098554] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.099425] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.100043] page dumped because: kasan: bad access detected
[   77.100529] 
[   77.101252] Memory state around the buggy address:
[   77.101695]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.102367]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.102987] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.103561]                       ^
[   77.103931]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.104563]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.105286] ==================================================================
[   77.473981] ==================================================================
[   77.474512] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4fc/0xb8c
[   77.475252] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.475868] 
[   77.476100] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.476964] Hardware name: linux,dummy-virt (DT)
[   77.477410] Call trace:
[   77.477670]  dump_backtrace+0xf8/0x118
[   77.478134]  show_stack+0x18/0x24
[   77.478572]  __dump_stack+0x28/0x38
[   77.479038]  dump_stack_lvl+0x54/0x6c
[   77.479514]  print_address_description+0x7c/0x1ec
[   77.480065]  print_report+0x50/0x68
[   77.480522]  kasan_report+0xac/0x100
[   77.481018]  kasan_check_range+0x260/0x2a0
[   77.481495]  __kasan_check_write+0x2c/0x3c
[   77.481942]  kasan_bitops_generic+0x4fc/0xb8c
[   77.482448]  kunit_try_run_case+0x80/0x184
[   77.482947]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.483507]  kthread+0x16c/0x21c
[   77.483937]  ret_from_fork+0x10/0x20
[   77.484354] 
[   77.484554] Allocated by task 165:
[   77.484942]  kasan_set_track+0x4c/0x80
[   77.485432]  kasan_save_alloc_info+0x28/0x34
[   77.485902]  __kasan_kmalloc+0x88/0xa0
[   77.486356]  kmalloc_trace+0x54/0x68
[   77.486818]  kasan_bitops_generic+0x4c/0xb8c
[   77.487288]  kunit_try_run_case+0x80/0x184
[   77.487740]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.488321]  kthread+0x16c/0x21c
[   77.488737]  ret_from_fork+0x10/0x20
[   77.489173] 
[   77.489393] The buggy address belongs to the object at ffff0000c5a87c00
[   77.489393]  which belongs to the cache kmalloc-128 of size 128
[   77.490314] The buggy address is located 8 bytes inside of
[   77.490314]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.491219] 
[   77.491414] The buggy address belongs to the physical page:
[   77.491884] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.492659] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.493349] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.494006] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.494603] page dumped because: kasan: bad access detected
[   77.495084] 
[   77.495278] Memory state around the buggy address:
[   77.495699]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.496343]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.497030] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.497600]                       ^
[   77.497967]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.498587]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.499194] ==================================================================
[   77.216777] ==================================================================
[   77.217329] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x260/0xb8c
[   77.218332] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.218998] 
[   77.219243] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.219990] Hardware name: linux,dummy-virt (DT)
[   77.220431] Call trace:
[   77.220876]  dump_backtrace+0xf8/0x118
[   77.221344]  show_stack+0x18/0x24
[   77.221783]  __dump_stack+0x28/0x38
[   77.222203]  dump_stack_lvl+0x54/0x6c
[   77.222633]  print_address_description+0x7c/0x1ec
[   77.223173]  print_report+0x50/0x68
[   77.223609]  kasan_report+0xac/0x100
[   77.224070]  kasan_check_range+0x260/0x2a0
[   77.224603]  __kasan_check_write+0x2c/0x3c
[   77.225213]  kasan_bitops_generic+0x260/0xb8c
[   77.225726]  kunit_try_run_case+0x80/0x184
[   77.226195]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.226789]  kthread+0x16c/0x21c
[   77.227237]  ret_from_fork+0x10/0x20
[   77.227645] 
[   77.227848] Allocated by task 165:
[   77.228217]  kasan_set_track+0x4c/0x80
[   77.228906]  kasan_save_alloc_info+0x28/0x34
[   77.229366]  __kasan_kmalloc+0x88/0xa0
[   77.229886]  kmalloc_trace+0x54/0x68
[   77.230292]  kasan_bitops_generic+0x4c/0xb8c
[   77.230797]  kunit_try_run_case+0x80/0x184
[   77.231262]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.231874]  kthread+0x16c/0x21c
[   77.232289]  ret_from_fork+0x10/0x20
[   77.232860] 
[   77.233088] The buggy address belongs to the object at ffff0000c5a87c00
[   77.233088]  which belongs to the cache kmalloc-128 of size 128
[   77.234051] The buggy address is located 8 bytes inside of
[   77.234051]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.234975] 
[   77.235215] The buggy address belongs to the physical page:
[   77.235678] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.236451] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.237657] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.238324] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.238920] page dumped because: kasan: bad access detected
[   77.239396] 
[   77.239597] Memory state around the buggy address:
[   77.240022]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.240798]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.241397] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.241987]                       ^
[   77.242364]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.243008]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.243603] ==================================================================
[   77.244485] ==================================================================
[   77.245384] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2ac/0xb8c
[   77.246116] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.246743] 
[   77.246962] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.247724] Hardware name: linux,dummy-virt (DT)
[   77.248149] Call trace:
[   77.248428]  dump_backtrace+0xf8/0x118
[   77.249050]  show_stack+0x18/0x24
[   77.249502]  __dump_stack+0x28/0x38
[   77.249929]  dump_stack_lvl+0x54/0x6c
[   77.250389]  print_address_description+0x7c/0x1ec
[   77.250939]  print_report+0x50/0x68
[   77.251400]  kasan_report+0xac/0x100
[   77.251851]  kasan_check_range+0x260/0x2a0
[   77.252342]  __kasan_check_write+0x2c/0x3c
[   77.253039]  kasan_bitops_generic+0x2ac/0xb8c
[   77.253573]  kunit_try_run_case+0x80/0x184
[   77.254050]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.254638]  kthread+0x16c/0x21c
[   77.255052]  ret_from_fork+0x10/0x20
[   77.255490] 
[   77.255679] Allocated by task 165:
[   77.256052]  kasan_set_track+0x4c/0x80
[   77.256568]  kasan_save_alloc_info+0x28/0x34
[   77.257094]  __kasan_kmalloc+0x88/0xa0
[   77.257544]  kmalloc_trace+0x54/0x68
[   77.258006]  kasan_bitops_generic+0x4c/0xb8c
[   77.258466]  kunit_try_run_case+0x80/0x184
[   77.258940]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.259501]  kthread+0x16c/0x21c
[   77.259949]  ret_from_fork+0x10/0x20
[   77.260358] 
[   77.260575] The buggy address belongs to the object at ffff0000c5a87c00
[   77.260575]  which belongs to the cache kmalloc-128 of size 128
[   77.261665] The buggy address is located 8 bytes inside of
[   77.261665]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.262542] 
[   77.262765] The buggy address belongs to the physical page:
[   77.263196] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.264044] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.264882] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.265557] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.266200] page dumped because: kasan: bad access detected
[   77.266678] 
[   77.266874] Memory state around the buggy address:
[   77.267340]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.267988]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.268630] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.269239]                       ^
[   77.269605]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.270227]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.271352] ==================================================================
[   77.387870] ==================================================================
[   77.388406] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3fc/0xb8c
[   77.389226] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.389839] 
[   77.390078] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.390951] Hardware name: linux,dummy-virt (DT)
[   77.391365] Call trace:
[   77.391649]  dump_backtrace+0xf8/0x118
[   77.392141]  show_stack+0x18/0x24
[   77.392567]  __dump_stack+0x28/0x38
[   77.393131]  dump_stack_lvl+0x54/0x6c
[   77.393542]  print_address_description+0x7c/0x1ec
[   77.394091]  print_report+0x50/0x68
[   77.394568]  kasan_report+0xac/0x100
[   77.395010]  __asan_load8+0xa8/0xac
[   77.395431]  kasan_bitops_generic+0x3fc/0xb8c
[   77.395928]  kunit_try_run_case+0x80/0x184
[   77.396388]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.397107]  kthread+0x16c/0x21c
[   77.397549]  ret_from_fork+0x10/0x20
[   77.397978] 
[   77.398184] Allocated by task 165:
[   77.398521]  kasan_set_track+0x4c/0x80
[   77.398969]  kasan_save_alloc_info+0x28/0x34
[   77.399426]  __kasan_kmalloc+0x88/0xa0
[   77.399894]  kmalloc_trace+0x54/0x68
[   77.400338]  kasan_bitops_generic+0x4c/0xb8c
[   77.401035]  kunit_try_run_case+0x80/0x184
[   77.401501]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.402089]  kthread+0x16c/0x21c
[   77.402557]  ret_from_fork+0x10/0x20
[   77.403135] 
[   77.403411] The buggy address belongs to the object at ffff0000c5a87c00
[   77.403411]  which belongs to the cache kmalloc-128 of size 128
[   77.404261] The buggy address is located 8 bytes inside of
[   77.404261]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.405617] 
[   77.405910] The buggy address belongs to the physical page:
[   77.406577] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.407694] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.408634] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.410022] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.410813] page dumped because: kasan: bad access detected
[   77.411183] 
[   77.411366] Memory state around the buggy address:
[   77.411715]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.412321]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.413160] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.413921]                       ^
[   77.414279]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.414924]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.415507] ==================================================================
[   77.189507] ==================================================================
[   77.190106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x24c/0xb8c
[   77.190879] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.191499] 
[   77.191720] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.192460] Hardware name: linux,dummy-virt (DT)
[   77.193197] Call trace:
[   77.193474]  dump_backtrace+0xf8/0x118
[   77.193962]  show_stack+0x18/0x24
[   77.194392]  __dump_stack+0x28/0x38
[   77.194812]  dump_stack_lvl+0x54/0x6c
[   77.195231]  print_address_description+0x7c/0x1ec
[   77.195772]  print_report+0x50/0x68
[   77.196216]  kasan_report+0xac/0x100
[   77.196832]  __asan_load8+0xa8/0xac
[   77.197237]  kasan_bitops_generic+0x24c/0xb8c
[   77.197707]  kunit_try_run_case+0x80/0x184
[   77.198176]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.198742]  kthread+0x16c/0x21c
[   77.199229]  ret_from_fork+0x10/0x20
[   77.199673] 
[   77.199897] Allocated by task 165:
[   77.200246]  kasan_set_track+0x4c/0x80
[   77.200949]  kasan_save_alloc_info+0x28/0x34
[   77.201451]  __kasan_kmalloc+0x88/0xa0
[   77.201908]  kmalloc_trace+0x54/0x68
[   77.202321]  kasan_bitops_generic+0x4c/0xb8c
[   77.202813]  kunit_try_run_case+0x80/0x184
[   77.203290]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.203884]  kthread+0x16c/0x21c
[   77.204294]  ret_from_fork+0x10/0x20
[   77.204875] 
[   77.205073] The buggy address belongs to the object at ffff0000c5a87c00
[   77.205073]  which belongs to the cache kmalloc-128 of size 128
[   77.206023] The buggy address is located 8 bytes inside of
[   77.206023]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.206922] 
[   77.207154] The buggy address belongs to the physical page:
[   77.207614] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.208414] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.209376] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.210063] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.210686] page dumped because: kasan: bad access detected
[   77.211163] 
[   77.211358] Memory state around the buggy address:
[   77.211828]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.212477]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.213774] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.214352]                       ^
[   77.214728]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.215376]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.216007] ==================================================================
[   77.416309] ==================================================================
[   77.417005] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x458/0xb8c
[   77.417713] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.418321] 
[   77.418558] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.419467] Hardware name: linux,dummy-virt (DT)
[   77.419895] Call trace:
[   77.420159]  dump_backtrace+0xf8/0x118
[   77.420831]  show_stack+0x18/0x24
[   77.421302]  __dump_stack+0x28/0x38
[   77.421739]  dump_stack_lvl+0x54/0x6c
[   77.422180]  print_address_description+0x7c/0x1ec
[   77.422714]  print_report+0x50/0x68
[   77.423156]  kasan_report+0xac/0x100
[   77.423627]  kasan_check_range+0x260/0x2a0
[   77.424107]  __kasan_check_write+0x2c/0x3c
[   77.424554]  kasan_bitops_generic+0x458/0xb8c
[   77.425074]  kunit_try_run_case+0x80/0x184
[   77.425527]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.426150]  kthread+0x16c/0x21c
[   77.426565]  ret_from_fork+0x10/0x20
[   77.427022] 
[   77.427215] Allocated by task 165:
[   77.427549]  kasan_set_track+0x4c/0x80
[   77.428152]  kasan_save_alloc_info+0x28/0x34
[   77.428645]  __kasan_kmalloc+0x88/0xa0
[   77.429290]  kmalloc_trace+0x54/0x68
[   77.429726]  kasan_bitops_generic+0x4c/0xb8c
[   77.430220]  kunit_try_run_case+0x80/0x184
[   77.430671]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.431258]  kthread+0x16c/0x21c
[   77.431664]  ret_from_fork+0x10/0x20
[   77.432108] 
[   77.432316] The buggy address belongs to the object at ffff0000c5a87c00
[   77.432316]  which belongs to the cache kmalloc-128 of size 128
[   77.433413] The buggy address is located 8 bytes inside of
[   77.433413]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.434335] 
[   77.434560] The buggy address belongs to the physical page:
[   77.435042] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.435804] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.436481] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.437196] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.437822] page dumped because: kasan: bad access detected
[   77.438291] 
[   77.438486] Memory state around the buggy address:
[   77.439445]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.440092]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.440775] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.441479]                       ^
[   77.441868]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.442494]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.443136] ==================================================================
[   77.161489] ==================================================================
[   77.162034] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x244/0xb8c
[   77.163119] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.163784] 
[   77.163999] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.165137] Hardware name: linux,dummy-virt (DT)
[   77.165544] Call trace:
[   77.165812]  dump_backtrace+0xf8/0x118
[   77.166346]  show_stack+0x18/0x24
[   77.166791]  __dump_stack+0x28/0x38
[   77.167202]  dump_stack_lvl+0x54/0x6c
[   77.167622]  print_address_description+0x7c/0x1ec
[   77.168166]  print_report+0x50/0x68
[   77.168781]  kasan_report+0xac/0x100
[   77.169239]  kasan_check_range+0x260/0x2a0
[   77.169739]  __kasan_check_write+0x2c/0x3c
[   77.170185]  kasan_bitops_generic+0x244/0xb8c
[   77.170666]  kunit_try_run_case+0x80/0x184
[   77.171149]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.171718]  kthread+0x16c/0x21c
[   77.172132]  ret_from_fork+0x10/0x20
[   77.172566] 
[   77.172792] Allocated by task 165:
[   77.173140]  kasan_set_track+0x4c/0x80
[   77.173629]  kasan_save_alloc_info+0x28/0x34
[   77.174168]  __kasan_kmalloc+0x88/0xa0
[   77.174610]  kmalloc_trace+0x54/0x68
[   77.175225]  kasan_bitops_generic+0x4c/0xb8c
[   77.175691]  kunit_try_run_case+0x80/0x184
[   77.176170]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.176934]  kthread+0x16c/0x21c
[   77.177354]  ret_from_fork+0x10/0x20
[   77.177809] 
[   77.178034] The buggy address belongs to the object at ffff0000c5a87c00
[   77.178034]  which belongs to the cache kmalloc-128 of size 128
[   77.179004] The buggy address is located 8 bytes inside of
[   77.179004]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.179877] 
[   77.180111] The buggy address belongs to the physical page:
[   77.180569] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.181367] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.182062] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.182738] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.183497] page dumped because: kasan: bad access detected
[   77.183989] 
[   77.184180] Memory state around the buggy address:
[   77.184615]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.185737]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.186377] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.186980]                       ^
[   77.187353]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.187980]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.188691] ==================================================================
[   77.106406] ==================================================================
[   77.107224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19c/0xb8c
[   77.107916] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.108499] 
[   77.108959] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.109741] Hardware name: linux,dummy-virt (DT)
[   77.110166] Call trace:
[   77.110438]  dump_backtrace+0xf8/0x118
[   77.110917]  show_stack+0x18/0x24
[   77.111342]  __dump_stack+0x28/0x38
[   77.111801]  dump_stack_lvl+0x54/0x6c
[   77.112220]  print_address_description+0x7c/0x1ec
[   77.112942]  print_report+0x50/0x68
[   77.113437]  kasan_report+0xac/0x100
[   77.113933]  __asan_load8+0xa8/0xac
[   77.114358]  kasan_bitops_generic+0x19c/0xb8c
[   77.114836]  kunit_try_run_case+0x80/0x184
[   77.115306]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.115881]  kthread+0x16c/0x21c
[   77.116307]  ret_from_fork+0x10/0x20
[   77.116931] 
[   77.117138] Allocated by task 165:
[   77.117463]  kasan_set_track+0x4c/0x80
[   77.117930]  kasan_save_alloc_info+0x28/0x34
[   77.118374]  __kasan_kmalloc+0x88/0xa0
[   77.118887]  kmalloc_trace+0x54/0x68
[   77.119304]  kasan_bitops_generic+0x4c/0xb8c
[   77.119767]  kunit_try_run_case+0x80/0x184
[   77.120238]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.120952]  kthread+0x16c/0x21c
[   77.121374]  ret_from_fork+0x10/0x20
[   77.121824] 
[   77.122060] The buggy address belongs to the object at ffff0000c5a87c00
[   77.122060]  which belongs to the cache kmalloc-128 of size 128
[   77.122988] The buggy address is located 8 bytes inside of
[   77.122988]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.123915] 
[   77.124135] The buggy address belongs to the physical page:
[   77.124597] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.125376] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.126054] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.126725] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.127494] page dumped because: kasan: bad access detected
[   77.127989] 
[   77.128203] Memory state around the buggy address:
[   77.128638]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.129785]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.130419] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.131034]                       ^
[   77.131409]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.132034]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.132802] ==================================================================
[   77.272130] ==================================================================
[   77.272675] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2fc/0xb8c
[   77.273589] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.274213] 
[   77.274438] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.275174] Hardware name: linux,dummy-virt (DT)
[   77.275608] Call trace:
[   77.275898]  dump_backtrace+0xf8/0x118
[   77.276394]  show_stack+0x18/0x24
[   77.276980]  __dump_stack+0x28/0x38
[   77.277407]  dump_stack_lvl+0x54/0x6c
[   77.277841]  print_address_description+0x7c/0x1ec
[   77.278375]  print_report+0x50/0x68
[   77.278818]  kasan_report+0xac/0x100
[   77.279256]  __asan_load8+0xa8/0xac
[   77.279676]  kasan_bitops_generic+0x2fc/0xb8c
[   77.280159]  kunit_try_run_case+0x80/0x184
[   77.280779]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.281381]  kthread+0x16c/0x21c
[   77.281795]  ret_from_fork+0x10/0x20
[   77.282234] 
[   77.282430] Allocated by task 165:
[   77.282796]  kasan_set_track+0x4c/0x80
[   77.283286]  kasan_save_alloc_info+0x28/0x34
[   77.283731]  __kasan_kmalloc+0x88/0xa0
[   77.284229]  kmalloc_trace+0x54/0x68
[   77.284825]  kasan_bitops_generic+0x4c/0xb8c
[   77.285302]  kunit_try_run_case+0x80/0x184
[   77.285773]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.286343]  kthread+0x16c/0x21c
[   77.286753]  ret_from_fork+0x10/0x20
[   77.287203] 
[   77.287407] The buggy address belongs to the object at ffff0000c5a87c00
[   77.287407]  which belongs to the cache kmalloc-128 of size 128
[   77.288379] The buggy address is located 8 bytes inside of
[   77.288379]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.289952] 
[   77.290191] The buggy address belongs to the physical page:
[   77.290630] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.291460] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.292127] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.293050] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.293644] page dumped because: kasan: bad access detected
[   77.294097] 
[   77.294291] Memory state around the buggy address:
[   77.294717]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.295368]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.296003] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.296601]                       ^
[   77.296955]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.297588]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.298203] ==================================================================

[   76.226381] ==================================================================
[   76.226950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x14c/0xb68
[   76.227648] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.229982] 
[   76.230215] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.231035] Hardware name: linux,dummy-virt (DT)
[   76.231500] Call trace:
[   76.231966]  dump_backtrace+0xf4/0x114
[   76.233723]  show_stack+0x18/0x24
[   76.234159]  __dump_stack+0x28/0x38
[   76.234640]  dump_stack_lvl+0x50/0x68
[   76.235132]  print_address_description+0x7c/0x1ec
[   76.236033]  print_report+0x50/0x68
[   76.236662]  kasan_report+0xac/0xfc
[   76.237836]  kasan_check_range+0x258/0x290
[   76.239275]  __kasan_check_write+0x2c/0x3c
[   76.240297]  kasan_bitops_generic+0x14c/0xb68
[   76.241015]  kunit_try_run_case+0x80/0x184
[   76.241685]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.242514]  kthread+0x16c/0x21c
[   76.243120]  ret_from_fork+0x10/0x20
[   76.243715] 
[   76.244304] Allocated by task 165:
[   76.244830]  kasan_set_track+0x4c/0x80
[   76.245435]  kasan_save_alloc_info+0x28/0x34
[   76.245973]  __kasan_kmalloc+0x88/0xa0
[   76.246606]  kmalloc_trace+0x54/0x68
[   76.247209]  kasan_bitops_generic+0x4c/0xb68
[   76.248377]  kunit_try_run_case+0x80/0x184
[   76.249068]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.249731]  kthread+0x16c/0x21c
[   76.250128]  ret_from_fork+0x10/0x20
[   76.250500] 
[   76.250684] The buggy address belongs to the object at ffff0000c58a7700
[   76.250684]  which belongs to the cache kmalloc-128 of size 128
[   76.251431] The buggy address is located 8 bytes inside of
[   76.251431]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.253102] 
[   76.253404] The buggy address belongs to the physical page:
[   76.254087] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.255220] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.256661] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.257665] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.258590] page dumped because: kasan: bad access detected
[   76.259277] 
[   76.259547] Memory state around the buggy address:
[   76.260479]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.261403]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.262294] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.263157]                       ^
[   76.264144]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.265072]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.265942] ==================================================================
[   76.599169] ==================================================================
[   76.599811] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x458/0xb68
[   76.600523] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.601092] 
[   76.601345] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.602084] Hardware name: linux,dummy-virt (DT)
[   76.602527] Call trace:
[   76.602815]  dump_backtrace+0xf4/0x114
[   76.603319]  show_stack+0x18/0x24
[   76.603784]  __dump_stack+0x28/0x38
[   76.604189]  dump_stack_lvl+0x50/0x68
[   76.604639]  print_address_description+0x7c/0x1ec
[   76.605204]  print_report+0x50/0x68
[   76.605647]  kasan_report+0xac/0xfc
[   76.606093]  kasan_check_range+0x258/0x290
[   76.606575]  __kasan_check_write+0x2c/0x3c
[   76.607022]  kasan_bitops_generic+0x458/0xb68
[   76.607509]  kunit_try_run_case+0x80/0x184
[   76.607984]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.608570]  kthread+0x16c/0x21c
[   76.608986]  ret_from_fork+0x10/0x20
[   76.609445] 
[   76.609639] Allocated by task 165:
[   76.609990]  kasan_set_track+0x4c/0x80
[   76.610475]  kasan_save_alloc_info+0x28/0x34
[   76.610962]  __kasan_kmalloc+0x88/0xa0
[   76.611410]  kmalloc_trace+0x54/0x68
[   76.611832]  kasan_bitops_generic+0x4c/0xb68
[   76.612315]  kunit_try_run_case+0x80/0x184
[   76.612783]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.613394]  kthread+0x16c/0x21c
[   76.613854]  ret_from_fork+0x10/0x20
[   76.614251] 
[   76.614467] The buggy address belongs to the object at ffff0000c58a7700
[   76.614467]  which belongs to the cache kmalloc-128 of size 128
[   76.615423] The buggy address is located 8 bytes inside of
[   76.615423]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.616342] 
[   76.616570] The buggy address belongs to the physical page:
[   76.617066] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.617835] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.618525] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.619243] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.619848] page dumped because: kasan: bad access detected
[   76.620324] 
[   76.620520] Memory state around the buggy address:
[   76.620954]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.621582]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.622217] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.623021]                       ^
[   76.623437]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.624101]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.624745] ==================================================================
[   76.300665] ==================================================================
[   76.301584] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xb68
[   76.302625] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.303624] 
[   76.304011] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.305372] Hardware name: linux,dummy-virt (DT)
[   76.306122] Call trace:
[   76.306551]  dump_backtrace+0xf4/0x114
[   76.307138]  show_stack+0x18/0x24
[   76.307534]  __dump_stack+0x28/0x38
[   76.308238]  dump_stack_lvl+0x50/0x68
[   76.308914]  print_address_description+0x7c/0x1ec
[   76.309720]  print_report+0x50/0x68
[   76.310387]  kasan_report+0xac/0xfc
[   76.311029]  kasan_check_range+0x258/0x290
[   76.311808]  __kasan_check_write+0x2c/0x3c
[   76.312551]  kasan_bitops_generic+0x1f0/0xb68
[   76.313272]  kunit_try_run_case+0x80/0x184
[   76.313962]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.314499]  kthread+0x16c/0x21c
[   76.314895]  ret_from_fork+0x10/0x20
[   76.315276] 
[   76.315457] Allocated by task 165:
[   76.315784]  kasan_set_track+0x4c/0x80
[   76.316216]  kasan_save_alloc_info+0x28/0x34
[   76.316991]  __kasan_kmalloc+0x88/0xa0
[   76.317670]  kmalloc_trace+0x54/0x68
[   76.318275]  kasan_bitops_generic+0x4c/0xb68
[   76.318950]  kunit_try_run_case+0x80/0x184
[   76.319609]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.320571]  kthread+0x16c/0x21c
[   76.321163]  ret_from_fork+0x10/0x20
[   76.321763] 
[   76.322042] The buggy address belongs to the object at ffff0000c58a7700
[   76.322042]  which belongs to the cache kmalloc-128 of size 128
[   76.323151] The buggy address is located 8 bytes inside of
[   76.323151]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.324522] 
[   76.324978] The buggy address belongs to the physical page:
[   76.325594] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.326237] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.326826] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.327810] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.328939] page dumped because: kasan: bad access detected
[   76.329789] 
[   76.330079] Memory state around the buggy address:
[   76.330857]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.331769]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.332824] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.333684]                       ^
[   76.334208]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.335103]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.335772] ==================================================================
[   76.198020] ==================================================================
[   76.198547] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xf8/0xb68
[   76.199288] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.200354] 
[   76.200589] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.201357] Hardware name: linux,dummy-virt (DT)
[   76.201793] Call trace:
[   76.202054]  dump_backtrace+0xf4/0x114
[   76.202509]  show_stack+0x18/0x24
[   76.202938]  __dump_stack+0x28/0x38
[   76.203377]  dump_stack_lvl+0x50/0x68
[   76.204095]  print_address_description+0x7c/0x1ec
[   76.204633]  print_report+0x50/0x68
[   76.205085]  kasan_report+0xac/0xfc
[   76.205559]  __asan_load8+0xa8/0xac
[   76.205993]  kasan_bitops_generic+0xf8/0xb68
[   76.206503]  kunit_try_run_case+0x80/0x184
[   76.207023]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.207598]  kthread+0x16c/0x21c
[   76.208074]  ret_from_fork+0x10/0x20
[   76.208513] 
[   76.208727] Allocated by task 165:
[   76.209081]  kasan_set_track+0x4c/0x80
[   76.209593]  kasan_save_alloc_info+0x28/0x34
[   76.210532]  __kasan_kmalloc+0x88/0xa0
[   76.211009]  kmalloc_trace+0x54/0x68
[   76.211463]  kasan_bitops_generic+0x4c/0xb68
[   76.212199]  kunit_try_run_case+0x80/0x184
[   76.212685]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.213264]  kthread+0x16c/0x21c
[   76.213687]  ret_from_fork+0x10/0x20
[   76.214155] 
[   76.214347] The buggy address belongs to the object at ffff0000c58a7700
[   76.214347]  which belongs to the cache kmalloc-128 of size 128
[   76.215329] The buggy address is located 8 bytes inside of
[   76.215329]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.216734] 
[   76.216971] The buggy address belongs to the physical page:
[   76.217461] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.218259] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.218939] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.219601] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.220235] page dumped because: kasan: bad access detected
[   76.220706] 
[   76.221175] Memory state around the buggy address:
[   76.221629]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.222260]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.222871] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.223474]                       ^
[   76.224359]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.224980]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.225595] ==================================================================
[   76.168971] ==================================================================
[   76.169844] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xa8/0xb68
[   76.170520] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.171157] 
[   76.171364] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.172253] Hardware name: linux,dummy-virt (DT)
[   76.172751] Call trace:
[   76.173057]  dump_backtrace+0xf4/0x114
[   76.173634]  show_stack+0x18/0x24
[   76.174129]  __dump_stack+0x28/0x38
[   76.174569]  dump_stack_lvl+0x50/0x68
[   76.175030]  print_address_description+0x7c/0x1ec
[   76.175590]  print_report+0x50/0x68
[   76.176083]  kasan_report+0xac/0xfc
[   76.176804]  kasan_check_range+0x258/0x290
[   76.177335]  __kasan_check_write+0x2c/0x3c
[   76.177831]  kasan_bitops_generic+0xa8/0xb68
[   76.178341]  kunit_try_run_case+0x80/0x184
[   76.178829]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.179396]  kthread+0x16c/0x21c
[   76.179821]  ret_from_fork+0x10/0x20
[   76.180272] 
[   76.180520] Allocated by task 165:
[   76.180909]  kasan_set_track+0x4c/0x80
[   76.181372]  kasan_save_alloc_info+0x28/0x34
[   76.181903]  __kasan_kmalloc+0x88/0xa0
[   76.182362]  kmalloc_trace+0x54/0x68
[   76.182778]  kasan_bitops_generic+0x4c/0xb68
[   76.183291]  kunit_try_run_case+0x80/0x184
[   76.184255]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.184868]  kthread+0x16c/0x21c
[   76.185292]  ret_from_fork+0x10/0x20
[   76.185757] 
[   76.185950] The buggy address belongs to the object at ffff0000c58a7700
[   76.185950]  which belongs to the cache kmalloc-128 of size 128
[   76.186924] The buggy address is located 8 bytes inside of
[   76.186924]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.187887] 
[   76.188081] The buggy address belongs to the physical page:
[   76.188558] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.189359] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.190351] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.191040] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.191675] page dumped because: kasan: bad access detected
[   76.192619] 
[   76.192860] Memory state around the buggy address:
[   76.193277]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.193964]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.194589] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.195196]                       ^
[   76.195554]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.196430]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.197033] ==================================================================
[   76.518665] ==================================================================
[   76.519235] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3a0/0xb68
[   76.520542] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.521184] 
[   76.521409] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.522183] Hardware name: linux,dummy-virt (DT)
[   76.522611] Call trace:
[   76.522891]  dump_backtrace+0xf4/0x114
[   76.523388]  show_stack+0x18/0x24
[   76.523848]  __dump_stack+0x28/0x38
[   76.524297]  dump_stack_lvl+0x50/0x68
[   76.524721]  print_address_description+0x7c/0x1ec
[   76.525314]  print_report+0x50/0x68
[   76.525773]  kasan_report+0xac/0xfc
[   76.526228]  __asan_load8+0xa8/0xac
[   76.526640]  kasan_bitops_generic+0x3a0/0xb68
[   76.527158]  kunit_try_run_case+0x80/0x184
[   76.527677]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.528271]  kthread+0x16c/0x21c
[   76.528683]  ret_from_fork+0x10/0x20
[   76.529141] 
[   76.529346] Allocated by task 165:
[   76.529677]  kasan_set_track+0x4c/0x80
[   76.530709]  kasan_save_alloc_info+0x28/0x34
[   76.531181]  __kasan_kmalloc+0x88/0xa0
[   76.531628]  kmalloc_trace+0x54/0x68
[   76.532070]  kasan_bitops_generic+0x4c/0xb68
[   76.532584]  kunit_try_run_case+0x80/0x184
[   76.533051]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.533624]  kthread+0x16c/0x21c
[   76.534063]  ret_from_fork+0x10/0x20
[   76.534508] 
[   76.534713] The buggy address belongs to the object at ffff0000c58a7700
[   76.534713]  which belongs to the cache kmalloc-128 of size 128
[   76.535644] The buggy address is located 8 bytes inside of
[   76.535644]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.537121] 
[   76.537382] The buggy address belongs to the physical page:
[   76.537896] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.538712] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.539413] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.540137] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.540763] page dumped because: kasan: bad access detected
[   76.541251] 
[   76.541441] Memory state around the buggy address:
[   76.541883]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.542533]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.543159] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.544325]                       ^
[   76.544713]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.545342]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.545949] ==================================================================
[   76.737504] ==================================================================
[   76.738068] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x5f4/0xb68
[   76.738761] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.739388] 
[   76.739632] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.740472] Hardware name: linux,dummy-virt (DT)
[   76.740930] Call trace:
[   76.741200]  dump_backtrace+0xf4/0x114
[   76.741690]  show_stack+0x18/0x24
[   76.742155]  __dump_stack+0x28/0x38
[   76.742609]  dump_stack_lvl+0x50/0x68
[   76.743079]  print_address_description+0x7c/0x1ec
[   76.743625]  print_report+0x50/0x68
[   76.744083]  kasan_report+0xac/0xfc
[   76.744526]  kasan_check_range+0x258/0x290
[   76.745026]  __kasan_check_write+0x2c/0x3c
[   76.745486]  kasan_bitops_generic+0x5f4/0xb68
[   76.746019]  kunit_try_run_case+0x80/0x184
[   76.746498]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.747086]  kthread+0x16c/0x21c
[   76.747507]  ret_from_fork+0x10/0x20
[   76.747961] 
[   76.748163] Allocated by task 165:
[   76.749979]  kasan_set_track+0x4c/0x80
[   76.750445]  kasan_save_alloc_info+0x28/0x34
[   76.751021]  __kasan_kmalloc+0x88/0xa0
[   76.751575]  kmalloc_trace+0x54/0x68
[   76.752535]  kasan_bitops_generic+0x4c/0xb68
[   76.753428]  kunit_try_run_case+0x80/0x184
[   76.754142]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.755113]  kthread+0x16c/0x21c
[   76.755853]  ret_from_fork+0x10/0x20
[   76.756612] 
[   76.757055] The buggy address belongs to the object at ffff0000c58a7700
[   76.757055]  which belongs to the cache kmalloc-128 of size 128
[   76.758620] The buggy address is located 8 bytes inside of
[   76.758620]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.760370] 
[   76.760764] The buggy address belongs to the physical page:
[   76.761347] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.762449] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.763556] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.764704] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.765659] page dumped because: kasan: bad access detected
[   76.766556] 
[   76.766958] Memory state around the buggy address:
[   76.767609]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.768679]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.769757] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.770388]                       ^
[   76.770723]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.771248]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.771717] ==================================================================
[   76.625792] ==================================================================
[   76.626370] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4a8/0xb68
[   76.627081] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.627674] 
[   76.627887] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.628664] Hardware name: linux,dummy-virt (DT)
[   76.629133] Call trace:
[   76.629424]  dump_backtrace+0xf4/0x114
[   76.629929]  show_stack+0x18/0x24
[   76.630393]  __dump_stack+0x28/0x38
[   76.630832]  dump_stack_lvl+0x50/0x68
[   76.631264]  print_address_description+0x7c/0x1ec
[   76.631853]  print_report+0x50/0x68
[   76.632295]  kasan_report+0xac/0xfc
[   76.632752]  __asan_load8+0xa8/0xac
[   76.633183]  kasan_bitops_generic+0x4a8/0xb68
[   76.633692]  kunit_try_run_case+0x80/0x184
[   76.634189]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.634766]  kthread+0x16c/0x21c
[   76.635184]  ret_from_fork+0x10/0x20
[   76.635623] 
[   76.635844] Allocated by task 165:
[   76.636212]  kasan_set_track+0x4c/0x80
[   76.636731]  kasan_save_alloc_info+0x28/0x34
[   76.637207]  __kasan_kmalloc+0x88/0xa0
[   76.637666]  kmalloc_trace+0x54/0x68
[   76.638098]  kasan_bitops_generic+0x4c/0xb68
[   76.638576]  kunit_try_run_case+0x80/0x184
[   76.639065]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.639644]  kthread+0x16c/0x21c
[   76.640099]  ret_from_fork+0x10/0x20
[   76.640503] 
[   76.640724] The buggy address belongs to the object at ffff0000c58a7700
[   76.640724]  which belongs to the cache kmalloc-128 of size 128
[   76.641649] The buggy address is located 8 bytes inside of
[   76.641649]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.642559] 
[   76.642774] The buggy address belongs to the physical page:
[   76.643254] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.644016] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.644720] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.645447] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.646058] page dumped because: kasan: bad access detected
[   76.646543] 
[   76.646783] Memory state around the buggy address:
[   76.647234]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.647895]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.648531] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.649140]                       ^
[   76.649548]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.650185]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.650805] ==================================================================
[   76.337148] ==================================================================
[   76.337633] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x244/0xb68
[   76.338237] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.338774] 
[   76.339066] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.340174] Hardware name: linux,dummy-virt (DT)
[   76.340858] Call trace:
[   76.341363]  dump_backtrace+0xf4/0x114
[   76.342029]  show_stack+0x18/0x24
[   76.342616]  __dump_stack+0x28/0x38
[   76.343211]  dump_stack_lvl+0x50/0x68
[   76.343821]  print_address_description+0x7c/0x1ec
[   76.344585]  print_report+0x50/0x68
[   76.345207]  kasan_report+0xac/0xfc
[   76.345830]  kasan_check_range+0x258/0x290
[   76.346509]  __kasan_check_write+0x2c/0x3c
[   76.347151]  kasan_bitops_generic+0x244/0xb68
[   76.347842]  kunit_try_run_case+0x80/0x184
[   76.348508]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.349312]  kthread+0x16c/0x21c
[   76.349901]  ret_from_fork+0x10/0x20
[   76.350475] 
[   76.350758] Allocated by task 165:
[   76.351249]  kasan_set_track+0x4c/0x80
[   76.351888]  kasan_save_alloc_info+0x28/0x34
[   76.352544]  __kasan_kmalloc+0x88/0xa0
[   76.353182]  kmalloc_trace+0x54/0x68
[   76.353795]  kasan_bitops_generic+0x4c/0xb68
[   76.354463]  kunit_try_run_case+0x80/0x184
[   76.355129]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.355951]  kthread+0x16c/0x21c
[   76.356525]  ret_from_fork+0x10/0x20
[   76.357038] 
[   76.357223] The buggy address belongs to the object at ffff0000c58a7700
[   76.357223]  which belongs to the cache kmalloc-128 of size 128
[   76.357982] The buggy address is located 8 bytes inside of
[   76.357982]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.358951] 
[   76.359141] The buggy address belongs to the physical page:
[   76.359646] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.360435] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.361139] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.361800] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.362390] page dumped because: kasan: bad access detected
[   76.362863] 
[   76.363052] Memory state around the buggy address:
[   76.363502]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.364161]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.364832] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.365428]                       ^
[   76.365810]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.366449]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.367018] ==================================================================
[   76.368319] ==================================================================
[   76.368856] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x24c/0xb68
[   76.369558] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.370157] 
[   76.370374] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.371122] Hardware name: linux,dummy-virt (DT)
[   76.371589] Call trace:
[   76.371872]  dump_backtrace+0xf4/0x114
[   76.372383]  show_stack+0x18/0x24
[   76.372826]  __dump_stack+0x28/0x38
[   76.373236]  dump_stack_lvl+0x50/0x68
[   76.373692]  print_address_description+0x7c/0x1ec
[   76.374232]  print_report+0x50/0x68
[   76.374705]  kasan_report+0xac/0xfc
[   76.375195]  __asan_load8+0xa8/0xac
[   76.375611]  kasan_bitops_generic+0x24c/0xb68
[   76.376164]  kunit_try_run_case+0x80/0x184
[   76.376614]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.377182]  kthread+0x16c/0x21c
[   76.377599]  ret_from_fork+0x10/0x20
[   76.378050] 
[   76.378247] Allocated by task 165:
[   76.378578]  kasan_set_track+0x4c/0x80
[   76.379113]  kasan_save_alloc_info+0x28/0x34
[   76.379573]  __kasan_kmalloc+0x88/0xa0
[   76.380023]  kmalloc_trace+0x54/0x68
[   76.380429]  kasan_bitops_generic+0x4c/0xb68
[   76.380942]  kunit_try_run_case+0x80/0x184
[   76.381422]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.382002]  kthread+0x16c/0x21c
[   76.382422]  ret_from_fork+0x10/0x20
[   76.382859] 
[   76.383057] The buggy address belongs to the object at ffff0000c58a7700
[   76.383057]  which belongs to the cache kmalloc-128 of size 128
[   76.383990] The buggy address is located 8 bytes inside of
[   76.383990]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.384899] 
[   76.385115] The buggy address belongs to the physical page:
[   76.385565] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.386372] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.387081] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.387730] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.388328] page dumped because: kasan: bad access detected
[   76.388798] 
[   76.389014] Memory state around the buggy address:
[   76.389432]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.390082]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.390712] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.391306]                       ^
[   76.391687]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.392335]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.392937] ==================================================================
[   76.711007] ==================================================================
[   76.711548] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x59c/0xb68
[   76.712435] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.713069] 
[   76.713313] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.714064] Hardware name: linux,dummy-virt (DT)
[   76.714514] Call trace:
[   76.714805]  dump_backtrace+0xf4/0x114
[   76.715312]  show_stack+0x18/0x24
[   76.715824]  __dump_stack+0x28/0x38
[   76.716250]  dump_stack_lvl+0x50/0x68
[   76.716680]  print_address_description+0x7c/0x1ec
[   76.717241]  print_report+0x50/0x68
[   76.717697]  kasan_report+0xac/0xfc
[   76.718167]  __asan_load8+0xa8/0xac
[   76.718590]  kasan_bitops_generic+0x59c/0xb68
[   76.719075]  kunit_try_run_case+0x80/0x184
[   76.719593]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.720182]  kthread+0x16c/0x21c
[   76.720627]  ret_from_fork+0x10/0x20
[   76.721122] 
[   76.721314] Allocated by task 165:
[   76.721688]  kasan_set_track+0x4c/0x80
[   76.722158]  kasan_save_alloc_info+0x28/0x34
[   76.722638]  __kasan_kmalloc+0x88/0xa0
[   76.723105]  kmalloc_trace+0x54/0x68
[   76.723536]  kasan_bitops_generic+0x4c/0xb68
[   76.724073]  kunit_try_run_case+0x80/0x184
[   76.724617]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.725204]  kthread+0x16c/0x21c
[   76.725664]  ret_from_fork+0x10/0x20
[   76.726092] 
[   76.726314] The buggy address belongs to the object at ffff0000c58a7700
[   76.726314]  which belongs to the cache kmalloc-128 of size 128
[   76.727237] The buggy address is located 8 bytes inside of
[   76.727237]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.728151] 
[   76.728382] The buggy address belongs to the physical page:
[   76.728866] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.729661] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.730330] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.731017] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.731638] page dumped because: kasan: bad access detected
[   76.732136] 
[   76.732344] Memory state around the buggy address:
[   76.732791]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.733426]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.734069] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.734671]                       ^
[   76.735047]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.735691]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.736320] ==================================================================
[   76.449509] ==================================================================
[   76.450141] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2fc/0xb68
[   76.450916] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.451505] 
[   76.452456] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.453140] Hardware name: linux,dummy-virt (DT)
[   76.453507] Call trace:
[   76.453760]  dump_backtrace+0xf4/0x114
[   76.454381]  show_stack+0x18/0x24
[   76.454900]  __dump_stack+0x28/0x38
[   76.455349]  dump_stack_lvl+0x50/0x68
[   76.455847]  print_address_description+0x7c/0x1ec
[   76.456485]  print_report+0x50/0x68
[   76.456984]  kasan_report+0xac/0xfc
[   76.457536]  __asan_load8+0xa8/0xac
[   76.457997]  kasan_bitops_generic+0x2fc/0xb68
[   76.458513]  kunit_try_run_case+0x80/0x184
[   76.459073]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.459654]  kthread+0x16c/0x21c
[   76.460099]  ret_from_fork+0x10/0x20
[   76.460525] 
[   76.460756] Allocated by task 165:
[   76.461132]  kasan_set_track+0x4c/0x80
[   76.461615]  kasan_save_alloc_info+0x28/0x34
[   76.462127]  __kasan_kmalloc+0x88/0xa0
[   76.462596]  kmalloc_trace+0x54/0x68
[   76.463045]  kasan_bitops_generic+0x4c/0xb68
[   76.463507]  kunit_try_run_case+0x80/0x184
[   76.464547]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.465191]  kthread+0x16c/0x21c
[   76.465602]  ret_from_fork+0x10/0x20
[   76.466079] 
[   76.466273] The buggy address belongs to the object at ffff0000c58a7700
[   76.466273]  which belongs to the cache kmalloc-128 of size 128
[   76.467222] The buggy address is located 8 bytes inside of
[   76.467222]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.468128] 
[   76.468359] The buggy address belongs to the physical page:
[   76.468875] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.469673] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.470371] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.471013] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.471505] page dumped because: kasan: bad access detected
[   76.472840] 
[   76.473125] Memory state around the buggy address:
[   76.473772]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.474667]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.475568] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.476478]                       ^
[   76.476998]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.477914]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.478778] ==================================================================
[   76.267061] ==================================================================
[   76.268249] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19c/0xb68
[   76.268945] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.269855] 
[   76.270122] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.270716] Hardware name: linux,dummy-virt (DT)
[   76.271137] Call trace:
[   76.271416]  dump_backtrace+0xf4/0x114
[   76.272109]  show_stack+0x18/0x24
[   76.272530]  __dump_stack+0x28/0x38
[   76.273055]  dump_stack_lvl+0x50/0x68
[   76.273548]  print_address_description+0x7c/0x1ec
[   76.274120]  print_report+0x50/0x68
[   76.274569]  kasan_report+0xac/0xfc
[   76.275054]  __asan_load8+0xa8/0xac
[   76.275415]  kasan_bitops_generic+0x19c/0xb68
[   76.276125]  kunit_try_run_case+0x80/0x184
[   76.276817]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.277438]  kthread+0x16c/0x21c
[   76.277844]  ret_from_fork+0x10/0x20
[   76.278224] 
[   76.278407] Allocated by task 165:
[   76.278699]  kasan_set_track+0x4c/0x80
[   76.279348]  kasan_save_alloc_info+0x28/0x34
[   76.280081]  __kasan_kmalloc+0x88/0xa0
[   76.280872]  kmalloc_trace+0x54/0x68
[   76.281499]  kasan_bitops_generic+0x4c/0xb68
[   76.282180]  kunit_try_run_case+0x80/0x184
[   76.282852]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.283678]  kthread+0x16c/0x21c
[   76.284431]  ret_from_fork+0x10/0x20
[   76.285056] 
[   76.285343] The buggy address belongs to the object at ffff0000c58a7700
[   76.285343]  which belongs to the cache kmalloc-128 of size 128
[   76.286770] The buggy address is located 8 bytes inside of
[   76.286770]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.288207] 
[   76.288542] The buggy address belongs to the physical page:
[   76.289296] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.290458] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.291442] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.292514] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.293370] page dumped because: kasan: bad access detected
[   76.293762] 
[   76.293946] Memory state around the buggy address:
[   76.294302]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.294801]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.295687] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.296987]                       ^
[   76.297638]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.298566]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.299455] ==================================================================
[   76.678180] ==================================================================
[   76.678775] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x54c/0xb68
[   76.679439] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.680143] 
[   76.680451] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.681549] Hardware name: linux,dummy-virt (DT)
[   76.682180] Call trace:
[   76.682566]  dump_backtrace+0xf4/0x114
[   76.683227]  show_stack+0x18/0x24
[   76.683839]  __dump_stack+0x28/0x38
[   76.684427]  dump_stack_lvl+0x50/0x68
[   76.685092]  print_address_description+0x7c/0x1ec
[   76.685872]  print_report+0x50/0x68
[   76.686494]  kasan_report+0xac/0xfc
[   76.687125]  __asan_load8+0xa8/0xac
[   76.687687]  kasan_bitops_generic+0x54c/0xb68
[   76.688378]  kunit_try_run_case+0x80/0x184
[   76.689060]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.689893]  kthread+0x16c/0x21c
[   76.690474]  ret_from_fork+0x10/0x20
[   76.690978] 
[   76.691170] Allocated by task 165:
[   76.691475]  kasan_set_track+0x4c/0x80
[   76.691918]  kasan_save_alloc_info+0x28/0x34
[   76.692331]  __kasan_kmalloc+0x88/0xa0
[   76.692779]  kmalloc_trace+0x54/0x68
[   76.693376]  kasan_bitops_generic+0x4c/0xb68
[   76.694075]  kunit_try_run_case+0x80/0x184
[   76.694736]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.695557]  kthread+0x16c/0x21c
[   76.696188]  ret_from_fork+0x10/0x20
[   76.696787] 
[   76.697066] The buggy address belongs to the object at ffff0000c58a7700
[   76.697066]  which belongs to the cache kmalloc-128 of size 128
[   76.698484] The buggy address is located 8 bytes inside of
[   76.698484]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.699840] 
[   76.700125] The buggy address belongs to the physical page:
[   76.700807] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.701949] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.702916] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.703906] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.704840] page dumped because: kasan: bad access detected
[   76.705537] 
[   76.705833] Memory state around the buggy address:
[   76.706473]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.707385]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.708099] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.708574]                       ^
[   76.708918]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.709541]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.710162] ==================================================================
[   76.421500] ==================================================================
[   76.422039] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2ac/0xb68
[   76.422833] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.423484] 
[   76.423688] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.425005] Hardware name: linux,dummy-virt (DT)
[   76.425454] Call trace:
[   76.425770]  dump_backtrace+0xf4/0x114
[   76.426233]  show_stack+0x18/0x24
[   76.426670]  __dump_stack+0x28/0x38
[   76.427123]  dump_stack_lvl+0x50/0x68
[   76.427543]  print_address_description+0x7c/0x1ec
[   76.428083]  print_report+0x50/0x68
[   76.428545]  kasan_report+0xac/0xfc
[   76.428991]  kasan_check_range+0x258/0x290
[   76.429483]  __kasan_check_write+0x2c/0x3c
[   76.429969]  kasan_bitops_generic+0x2ac/0xb68
[   76.430442]  kunit_try_run_case+0x80/0x184
[   76.430911]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.431484]  kthread+0x16c/0x21c
[   76.432456]  ret_from_fork+0x10/0x20
[   76.432906] 
[   76.433096] Allocated by task 165:
[   76.433465]  kasan_set_track+0x4c/0x80
[   76.433968]  kasan_save_alloc_info+0x28/0x34
[   76.434430]  __kasan_kmalloc+0x88/0xa0
[   76.434894]  kmalloc_trace+0x54/0x68
[   76.435307]  kasan_bitops_generic+0x4c/0xb68
[   76.435779]  kunit_try_run_case+0x80/0x184
[   76.436270]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.436849]  kthread+0x16c/0x21c
[   76.437258]  ret_from_fork+0x10/0x20
[   76.437658] 
[   76.437878] The buggy address belongs to the object at ffff0000c58a7700
[   76.437878]  which belongs to the cache kmalloc-128 of size 128
[   76.438831] The buggy address is located 8 bytes inside of
[   76.438831]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.440298] 
[   76.440507] The buggy address belongs to the physical page:
[   76.440969] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.441829] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.442520] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.443185] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.443951] page dumped because: kasan: bad access detected
[   76.444440] 
[   76.444630] Memory state around the buggy address:
[   76.445088]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.445728]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.446359] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.446974]                       ^
[   76.447334]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.448100]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.448707] ==================================================================
[   76.573513] ==================================================================
[   76.574098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3fc/0xb68
[   76.574789] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.575398] 
[   76.575626] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.576569] Hardware name: linux,dummy-virt (DT)
[   76.576987] Call trace:
[   76.577249]  dump_backtrace+0xf4/0x114
[   76.577751]  show_stack+0x18/0x24
[   76.578192]  __dump_stack+0x28/0x38
[   76.578594]  dump_stack_lvl+0x50/0x68
[   76.579051]  print_address_description+0x7c/0x1ec
[   76.579578]  print_report+0x50/0x68
[   76.580051]  kasan_report+0xac/0xfc
[   76.580494]  __asan_load8+0xa8/0xac
[   76.580918]  kasan_bitops_generic+0x3fc/0xb68
[   76.581439]  kunit_try_run_case+0x80/0x184
[   76.581908]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.582496]  kthread+0x16c/0x21c
[   76.582908]  ret_from_fork+0x10/0x20
[   76.583319] 
[   76.583519] Allocated by task 165:
[   76.583880]  kasan_set_track+0x4c/0x80
[   76.584362]  kasan_save_alloc_info+0x28/0x34
[   76.584839]  __kasan_kmalloc+0x88/0xa0
[   76.585352]  kmalloc_trace+0x54/0x68
[   76.585774]  kasan_bitops_generic+0x4c/0xb68
[   76.586261]  kunit_try_run_case+0x80/0x184
[   76.586720]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.587317]  kthread+0x16c/0x21c
[   76.587753]  ret_from_fork+0x10/0x20
[   76.588193] 
[   76.588381] The buggy address belongs to the object at ffff0000c58a7700
[   76.588381]  which belongs to the cache kmalloc-128 of size 128
[   76.589203] The buggy address is located 8 bytes inside of
[   76.589203]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.590143] 
[   76.590371] The buggy address belongs to the physical page:
[   76.590827] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.591616] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.592318] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.592985] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.593620] page dumped because: kasan: bad access detected
[   76.594104] 
[   76.594304] Memory state around the buggy address:
[   76.594765]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.595359]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.595986] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.596548]                       ^
[   76.596938]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.597577]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.598206] ==================================================================
[   76.546834] ==================================================================
[   76.547396] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3f4/0xb68
[   76.548461] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.549109] 
[   76.549380] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.550126] Hardware name: linux,dummy-virt (DT)
[   76.550549] Call trace:
[   76.550806]  dump_backtrace+0xf4/0x114
[   76.551318]  show_stack+0x18/0x24
[   76.551807]  __dump_stack+0x28/0x38
[   76.552304]  dump_stack_lvl+0x50/0x68
[   76.552730]  print_address_description+0x7c/0x1ec
[   76.553263]  print_report+0x50/0x68
[   76.553707]  kasan_report+0xac/0xfc
[   76.554183]  kasan_check_range+0x258/0x290
[   76.554673]  __kasan_check_write+0x2c/0x3c
[   76.555129]  kasan_bitops_generic+0x3f4/0xb68
[   76.555604]  kunit_try_run_case+0x80/0x184
[   76.556086]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.556673]  kthread+0x16c/0x21c
[   76.557127]  ret_from_fork+0x10/0x20
[   76.557540] 
[   76.557755] Allocated by task 165:
[   76.558095]  kasan_set_track+0x4c/0x80
[   76.558576]  kasan_save_alloc_info+0x28/0x34
[   76.559036]  __kasan_kmalloc+0x88/0xa0
[   76.559490]  kmalloc_trace+0x54/0x68
[   76.559936]  kasan_bitops_generic+0x4c/0xb68
[   76.560446]  kunit_try_run_case+0x80/0x184
[   76.560952]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.561535]  kthread+0x16c/0x21c
[   76.561981]  ret_from_fork+0x10/0x20
[   76.562391] 
[   76.562588] The buggy address belongs to the object at ffff0000c58a7700
[   76.562588]  which belongs to the cache kmalloc-128 of size 128
[   76.563561] The buggy address is located 8 bytes inside of
[   76.563561]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.564477] 
[   76.564715] The buggy address belongs to the physical page:
[   76.565195] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.565965] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.566657] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.567321] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.567957] page dumped because: kasan: bad access detected
[   76.568432] 
[   76.568620] Memory state around the buggy address:
[   76.569091]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.569728]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.570335] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.570923]                       ^
[   76.571297]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.571932]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.572539] ==================================================================
[   76.479537] ==================================================================
[   76.481011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x350/0xb68
[   76.482014] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.482938] 
[   76.483233] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.484300] Hardware name: linux,dummy-virt (DT)
[   76.484847] Call trace:
[   76.485092]  dump_backtrace+0xf4/0x114
[   76.485535]  show_stack+0x18/0x24
[   76.485952]  __dump_stack+0x28/0x38
[   76.486413]  dump_stack_lvl+0x50/0x68
[   76.486926]  print_address_description+0x7c/0x1ec
[   76.487490]  print_report+0x50/0x68
[   76.487992]  kasan_report+0xac/0xfc
[   76.489001]  kasan_check_range+0x258/0x290
[   76.489478]  __kasan_check_write+0x2c/0x3c
[   76.491158]  kasan_bitops_generic+0x350/0xb68
[   76.491606]  kunit_try_run_case+0x80/0x184
[   76.492057]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.492558]  kthread+0x16c/0x21c
[   76.494044]  ret_from_fork+0x10/0x20
[   76.494656] 
[   76.495022] Allocated by task 165:
[   76.496454]  kasan_set_track+0x4c/0x80
[   76.497311]  kasan_save_alloc_info+0x28/0x34
[   76.498263]  __kasan_kmalloc+0x88/0xa0
[   76.499091]  kmalloc_trace+0x54/0x68
[   76.499854]  kasan_bitops_generic+0x4c/0xb68
[   76.500687]  kunit_try_run_case+0x80/0x184
[   76.501520]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.502501]  kthread+0x16c/0x21c
[   76.503147]  ret_from_fork+0x10/0x20
[   76.503835] 
[   76.504178] The buggy address belongs to the object at ffff0000c58a7700
[   76.504178]  which belongs to the cache kmalloc-128 of size 128
[   76.505962] The buggy address is located 8 bytes inside of
[   76.505962]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.506871] 
[   76.507066] The buggy address belongs to the physical page:
[   76.507439] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.508446] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.509418] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.510424] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.511341] page dumped because: kasan: bad access detected
[   76.512102] 
[   76.512968] Memory state around the buggy address:
[   76.513624]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.514561]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.515455] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.516328]                       ^
[   76.516808]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.517303]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.517806] ==================================================================
[   76.651644] ==================================================================
[   76.652253] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4fc/0xb68
[   76.652983] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.653590] 
[   76.653831] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.654577] Hardware name: linux,dummy-virt (DT)
[   76.655050] Call trace:
[   76.655335]  dump_backtrace+0xf4/0x114
[   76.655820]  show_stack+0x18/0x24
[   76.656267]  __dump_stack+0x28/0x38
[   76.656717]  dump_stack_lvl+0x50/0x68
[   76.657199]  print_address_description+0x7c/0x1ec
[   76.657746]  print_report+0x50/0x68
[   76.658205]  kasan_report+0xac/0xfc
[   76.658662]  kasan_check_range+0x258/0x290
[   76.659159]  __kasan_check_write+0x2c/0x3c
[   76.659648]  kasan_bitops_generic+0x4fc/0xb68
[   76.660176]  kunit_try_run_case+0x80/0x184
[   76.660664]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.661253]  kthread+0x16c/0x21c
[   76.661679]  ret_from_fork+0x10/0x20
[   76.662142] 
[   76.662350] Allocated by task 165:
[   76.662706]  kasan_set_track+0x4c/0x80
[   76.663174]  kasan_save_alloc_info+0x28/0x34
[   76.663619]  __kasan_kmalloc+0x88/0xa0
[   76.664129]  kmalloc_trace+0x54/0x68
[   76.664546]  kasan_bitops_generic+0x4c/0xb68
[   76.665022]  kunit_try_run_case+0x80/0x184
[   76.665489]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.666072]  kthread+0x16c/0x21c
[   76.666480]  ret_from_fork+0x10/0x20
[   76.666903] 
[   76.667125] The buggy address belongs to the object at ffff0000c58a7700
[   76.667125]  which belongs to the cache kmalloc-128 of size 128
[   76.668052] The buggy address is located 8 bytes inside of
[   76.668052]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.668926] 
[   76.669151] The buggy address belongs to the physical page:
[   76.669623] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.670413] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.671127] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.671849] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.672442] page dumped because: kasan: bad access detected
[   76.672936] 
[   76.673136] Memory state around the buggy address:
[   76.673591]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.674243]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.674850] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.675438]                       ^
[   76.675814]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.676422]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.677036] ==================================================================
[   76.393959] ==================================================================
[   76.394613] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x260/0xb68
[   76.395385] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.396174] 
[   76.396433] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.397195] Hardware name: linux,dummy-virt (DT)
[   76.397551] Call trace:
[   76.397888]  dump_backtrace+0xf4/0x114
[   76.398449]  show_stack+0x18/0x24
[   76.398899]  __dump_stack+0x28/0x38
[   76.399313]  dump_stack_lvl+0x50/0x68
[   76.399812]  print_address_description+0x7c/0x1ec
[   76.400349]  print_report+0x50/0x68
[   76.400890]  kasan_report+0xac/0xfc
[   76.401417]  kasan_check_range+0x258/0x290
[   76.401950]  __kasan_check_write+0x2c/0x3c
[   76.402399]  kasan_bitops_generic+0x260/0xb68
[   76.402932]  kunit_try_run_case+0x80/0x184
[   76.403409]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.404017]  kthread+0x16c/0x21c
[   76.404423]  ret_from_fork+0x10/0x20
[   76.404863] 
[   76.405052] Allocated by task 165:
[   76.405414]  kasan_set_track+0x4c/0x80
[   76.405948]  kasan_save_alloc_info+0x28/0x34
[   76.406399]  __kasan_kmalloc+0x88/0xa0
[   76.406906]  kmalloc_trace+0x54/0x68
[   76.407331]  kasan_bitops_generic+0x4c/0xb68
[   76.407889]  kunit_try_run_case+0x80/0x184
[   76.408395]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.408977]  kthread+0x16c/0x21c
[   76.409460]  ret_from_fork+0x10/0x20
[   76.409960] 
[   76.410194] The buggy address belongs to the object at ffff0000c58a7700
[   76.410194]  which belongs to the cache kmalloc-128 of size 128
[   76.411123] The buggy address is located 8 bytes inside of
[   76.411123]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.412033] 
[   76.412252] The buggy address belongs to the physical page:
[   76.412706] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.413502] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.414186] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.414869] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.415484] page dumped because: kasan: bad access detected
[   76.415970] 
[   76.416170] Memory state around the buggy address:
[   76.416748]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.417341]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.417981] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.418580]                       ^
[   76.419281]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.419939]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.420546] ==================================================================