Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  107.496387] ==================================================================
[  107.497905] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x180/0x68c
[  107.498521] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.499028] 
[  107.499225] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.499837] Hardware name: linux,dummy-virt (DT)
[  107.500390] Call trace:
[  107.500773]  dump_backtrace+0xe0/0x134
[  107.501422]  show_stack+0x20/0x2c
[  107.501890]  dump_stack_lvl+0x88/0xb4
[  107.502397]  print_report+0x158/0x44c
[  107.502863]  kasan_report+0xc8/0x180
[  107.503310]  kasan_check_range+0xe4/0x190
[  107.503801]  __kasan_check_write+0x28/0x3c
[  107.504307]  kasan_bitops_modify.constprop.0+0x180/0x68c
[  107.504945]  kasan_bitops_generic+0xb4/0x140
[  107.505495]  kunit_try_run_case+0x8c/0x124
[  107.506012]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.506587]  kthread+0x15c/0x170
[  107.507004]  ret_from_fork+0x10/0x20
[  107.507456] 
[  107.507672] Allocated by task 249:
[  107.508093]  kasan_save_stack+0x3c/0x70
[  107.508622]  kasan_set_track+0x2c/0x40
[  107.509061]  kasan_save_alloc_info+0x24/0x34
[  107.509554]  __kasan_kmalloc+0xd4/0xe0
[  107.510020]  kmalloc_trace+0x8c/0x150
[  107.510448]  kasan_bitops_generic+0x98/0x140
[  107.510922]  kunit_try_run_case+0x8c/0x124
[  107.511400]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.511985]  kthread+0x15c/0x170
[  107.512400]  ret_from_fork+0x10/0x20
[  107.512873] 
[  107.513109] The buggy address belongs to the object at ffff0000c66ab600
[  107.513109]  which belongs to the cache kmalloc-128 of size 128
[  107.514049] The buggy address is located 8 bytes inside of
[  107.514049]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.514979] 
[  107.515231] The buggy address belongs to the physical page:
[  107.515741] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.516506] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.517190] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.517835] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.518453] page dumped because: kasan: bad access detected
[  107.518906] 
[  107.519125] Memory state around the buggy address:
[  107.519603]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.520241]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.520894] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.521516]                       ^
[  107.521903]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.522538]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.523149] ==================================================================
[  107.413780] ==================================================================
[  107.414335] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xf8/0x68c
[  107.414969] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.415695] 
[  107.415911] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.416590] Hardware name: linux,dummy-virt (DT)
[  107.417039] Call trace:
[  107.417342]  dump_backtrace+0xe0/0x134
[  107.417810]  show_stack+0x20/0x2c
[  107.418213]  dump_stack_lvl+0x88/0xb4
[  107.418766]  print_report+0x158/0x44c
[  107.419218]  kasan_report+0xc8/0x180
[  107.419721]  kasan_check_range+0xe4/0x190
[  107.420414]  __kasan_check_write+0x28/0x3c
[  107.421157]  kasan_bitops_modify.constprop.0+0xf8/0x68c
[  107.421788]  kasan_bitops_generic+0xb4/0x140
[  107.422315]  kunit_try_run_case+0x8c/0x124
[  107.422879]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.423535]  kthread+0x15c/0x170
[  107.423946]  ret_from_fork+0x10/0x20
[  107.424376] 
[  107.424632] Allocated by task 249:
[  107.424967]  kasan_save_stack+0x3c/0x70
[  107.425452]  kasan_set_track+0x2c/0x40
[  107.425913]  kasan_save_alloc_info+0x24/0x34
[  107.426398]  __kasan_kmalloc+0xd4/0xe0
[  107.426812]  kmalloc_trace+0x8c/0x150
[  107.427305]  kasan_bitops_generic+0x98/0x140
[  107.427808]  kunit_try_run_case+0x8c/0x124
[  107.428274]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.428889]  kthread+0x15c/0x170
[  107.429313]  ret_from_fork+0x10/0x20
[  107.429754] 
[  107.429981] The buggy address belongs to the object at ffff0000c66ab600
[  107.429981]  which belongs to the cache kmalloc-128 of size 128
[  107.430934] The buggy address is located 8 bytes inside of
[  107.430934]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.431814] 
[  107.432041] The buggy address belongs to the physical page:
[  107.432518] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.433434] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.434093] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.434828] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.435459] page dumped because: kasan: bad access detected
[  107.435900] 
[  107.436114] Memory state around the buggy address:
[  107.436640]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.437292]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.437949] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.438552]                       ^
[  107.438934]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.439535]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.440143] ==================================================================
[  107.346887] ==================================================================
[  107.348208] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4/0x68c
[  107.349339] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.350297] 
[  107.350606] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.351649] Hardware name: linux,dummy-virt (DT)
[  107.352276] Call trace:
[  107.352559]  dump_backtrace+0xe0/0x134
[  107.352944]  show_stack+0x20/0x2c
[  107.353283]  dump_stack_lvl+0x88/0xb4
[  107.353952]  print_report+0x158/0x44c
[  107.354534]  kasan_report+0xc8/0x180
[  107.355142]  kasan_check_range+0xe4/0x190
[  107.355799]  __kasan_check_write+0x28/0x3c
[  107.356469]  kasan_bitops_modify.constprop.0+0xa4/0x68c
[  107.357237]  kasan_bitops_generic+0xb4/0x140
[  107.357903]  kunit_try_run_case+0x8c/0x124
[  107.358560]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.359373]  kthread+0x15c/0x170
[  107.359959]  ret_from_fork+0x10/0x20
[  107.360616] 
[  107.360945] Allocated by task 249:
[  107.361518]  kasan_save_stack+0x3c/0x70
[  107.362154]  kasan_set_track+0x2c/0x40
[  107.362841]  kasan_save_alloc_info+0x24/0x34
[  107.363434]  __kasan_kmalloc+0xd4/0xe0
[  107.363866]  kmalloc_trace+0x8c/0x150
[  107.364462]  kasan_bitops_generic+0x98/0x140
[  107.365113]  kunit_try_run_case+0x8c/0x124
[  107.365774]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.366572]  kthread+0x15c/0x170
[  107.367137]  ret_from_fork+0x10/0x20
[  107.367724] 
[  107.368034] The buggy address belongs to the object at ffff0000c66ab600
[  107.368034]  which belongs to the cache kmalloc-128 of size 128
[  107.369449] The buggy address is located 8 bytes inside of
[  107.369449]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.370467] 
[  107.370754] The buggy address belongs to the physical page:
[  107.371516] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.372636] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.373347] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.373992] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.374916] page dumped because: kasan: bad access detected
[  107.375610] 
[  107.375909] Memory state around the buggy address:
[  107.376563]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.377579]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.378561] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.379396]                       ^
[  107.379707]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.380208]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.380673] ==================================================================
[  107.554862] ==================================================================
[  107.555427] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x198/0x68c
[  107.556506] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.558024] 
[  107.558250] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.558966] Hardware name: linux,dummy-virt (DT)
[  107.559419] Call trace:
[  107.559691]  dump_backtrace+0xe0/0x134
[  107.560152]  show_stack+0x20/0x2c
[  107.560542]  dump_stack_lvl+0x88/0xb4
[  107.561033]  print_report+0x158/0x44c
[  107.561442]  kasan_report+0xc8/0x180
[  107.561892]  kasan_check_range+0xe4/0x190
[  107.562422]  __kasan_check_write+0x28/0x3c
[  107.562924]  kasan_bitops_modify.constprop.0+0x198/0x68c
[  107.563455]  kasan_bitops_generic+0xb4/0x140
[  107.563948]  kunit_try_run_case+0x8c/0x124
[  107.564428]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.565094]  kthread+0x15c/0x170
[  107.565548]  ret_from_fork+0x10/0x20
[  107.566008] 
[  107.566262] Allocated by task 249:
[  107.566617]  kasan_save_stack+0x3c/0x70
[  107.567105]  kasan_set_track+0x2c/0x40
[  107.567568]  kasan_save_alloc_info+0x24/0x34
[  107.568123]  __kasan_kmalloc+0xd4/0xe0
[  107.568594]  kmalloc_trace+0x8c/0x150
[  107.569039]  kasan_bitops_generic+0x98/0x140
[  107.569516]  kunit_try_run_case+0x8c/0x124
[  107.570001]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.570582]  kthread+0x15c/0x170
[  107.571007]  ret_from_fork+0x10/0x20
[  107.571371] 
[  107.571550] The buggy address belongs to the object at ffff0000c66ab600
[  107.571550]  which belongs to the cache kmalloc-128 of size 128
[  107.572279] The buggy address is located 8 bytes inside of
[  107.572279]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.573861] 
[  107.574189] The buggy address belongs to the physical page:
[  107.574919] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.576144] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.577126] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.578096] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.579018] page dumped because: kasan: bad access detected
[  107.579735] 
[  107.580034] Memory state around the buggy address:
[  107.580766]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.581768]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.582718] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.583595]                       ^
[  107.584124]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.585040]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.585614] ==================================================================
[  107.586491] ==================================================================
[  107.587057] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1c4/0x68c
[  107.587802] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.588501] 
[  107.588768] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.589536] Hardware name: linux,dummy-virt (DT)
[  107.590142] Call trace:
[  107.590405]  dump_backtrace+0xe0/0x134
[  107.590866]  show_stack+0x20/0x2c
[  107.591324]  dump_stack_lvl+0x88/0xb4
[  107.591817]  print_report+0x158/0x44c
[  107.592309]  kasan_report+0xc8/0x180
[  107.592828]  kasan_check_range+0xe4/0x190
[  107.593391]  __kasan_check_write+0x28/0x3c
[  107.593954]  kasan_bitops_modify.constprop.0+0x1c4/0x68c
[  107.594486]  kasan_bitops_generic+0xb4/0x140
[  107.595020]  kunit_try_run_case+0x8c/0x124
[  107.595559]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.596139]  kthread+0x15c/0x170
[  107.596645]  ret_from_fork+0x10/0x20
[  107.597188] 
[  107.597420] Allocated by task 249:
[  107.597823]  kasan_save_stack+0x3c/0x70
[  107.598282]  kasan_set_track+0x2c/0x40
[  107.598825]  kasan_save_alloc_info+0x24/0x34
[  107.599358]  __kasan_kmalloc+0xd4/0xe0
[  107.599800]  kmalloc_trace+0x8c/0x150
[  107.600391]  kasan_bitops_generic+0x98/0x140
[  107.600914]  kunit_try_run_case+0x8c/0x124
[  107.601396]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.601980]  kthread+0x15c/0x170
[  107.602377]  ret_from_fork+0x10/0x20
[  107.602831] 
[  107.603060] The buggy address belongs to the object at ffff0000c66ab600
[  107.603060]  which belongs to the cache kmalloc-128 of size 128
[  107.604055] The buggy address is located 8 bytes inside of
[  107.604055]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.605028] 
[  107.605286] The buggy address belongs to the physical page:
[  107.605797] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.606562] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.607362] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.608082] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.608842] page dumped because: kasan: bad access detected
[  107.609397] 
[  107.609658] Memory state around the buggy address:
[  107.610139]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.610792]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.611403] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.612023]                       ^
[  107.612443]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.613221]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.613855] ==================================================================
[  107.441226] ==================================================================
[  107.441822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x124/0x68c
[  107.442604] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.443250] 
[  107.443471] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.444124] Hardware name: linux,dummy-virt (DT)
[  107.444619] Call trace:
[  107.444910]  dump_backtrace+0xe0/0x134
[  107.445342]  show_stack+0x20/0x2c
[  107.445753]  dump_stack_lvl+0x88/0xb4
[  107.446215]  print_report+0x158/0x44c
[  107.446646]  kasan_report+0xc8/0x180
[  107.447073]  __asan_load8+0x80/0xac
[  107.447530]  kasan_bitops_modify.constprop.0+0x124/0x68c
[  107.448055]  kasan_bitops_generic+0xb4/0x140
[  107.448511]  kunit_try_run_case+0x8c/0x124
[  107.449005]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.449674]  kthread+0x15c/0x170
[  107.450148]  ret_from_fork+0x10/0x20
[  107.450553] 
[  107.450809] Allocated by task 249:
[  107.451146]  kasan_save_stack+0x3c/0x70
[  107.451589]  kasan_set_track+0x2c/0x40
[  107.452068]  kasan_save_alloc_info+0x24/0x34
[  107.452586]  __kasan_kmalloc+0xd4/0xe0
[  107.453172]  kmalloc_trace+0x8c/0x150
[  107.453638]  kasan_bitops_generic+0x98/0x140
[  107.454178]  kunit_try_run_case+0x8c/0x124
[  107.454643]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.455207]  kthread+0x15c/0x170
[  107.455635]  ret_from_fork+0x10/0x20
[  107.456066] 
[  107.456287] The buggy address belongs to the object at ffff0000c66ab600
[  107.456287]  which belongs to the cache kmalloc-128 of size 128
[  107.457342] The buggy address is located 8 bytes inside of
[  107.457342]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.458285] 
[  107.458518] The buggy address belongs to the physical page:
[  107.458939] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.459678] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.460419] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.461228] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.461891] page dumped because: kasan: bad access detected
[  107.462428] 
[  107.462644] Memory state around the buggy address:
[  107.463127]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.463739]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.464352] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.465067]                       ^
[  107.465416]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.466187]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.466701] ==================================================================
[  107.614791] ==================================================================
[  107.615407] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1f0/0x68c
[  107.616233] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.618162] 
[  107.618381] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.618963] Hardware name: linux,dummy-virt (DT)
[  107.619304] Call trace:
[  107.619539]  dump_backtrace+0xe0/0x134
[  107.620443]  show_stack+0x20/0x2c
[  107.620891]  dump_stack_lvl+0x88/0xb4
[  107.621630]  print_report+0x158/0x44c
[  107.622130]  kasan_report+0xc8/0x180
[  107.622675]  __asan_load8+0x80/0xac
[  107.623126]  kasan_bitops_modify.constprop.0+0x1f0/0x68c
[  107.623701]  kasan_bitops_generic+0xb4/0x140
[  107.624195]  kunit_try_run_case+0x8c/0x124
[  107.624677]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.625256]  kthread+0x15c/0x170
[  107.625704]  ret_from_fork+0x10/0x20
[  107.626178] 
[  107.626414] Allocated by task 249:
[  107.626787]  kasan_save_stack+0x3c/0x70
[  107.627277]  kasan_set_track+0x2c/0x40
[  107.627710]  kasan_save_alloc_info+0x24/0x34
[  107.628188]  __kasan_kmalloc+0xd4/0xe0
[  107.629376]  kmalloc_trace+0x8c/0x150
[  107.629906]  kasan_bitops_generic+0x98/0x140
[  107.630308]  kunit_try_run_case+0x8c/0x124
[  107.630712]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.631214]  kthread+0x15c/0x170
[  107.631567]  ret_from_fork+0x10/0x20
[  107.632130] 
[  107.632406] The buggy address belongs to the object at ffff0000c66ab600
[  107.632406]  which belongs to the cache kmalloc-128 of size 128
[  107.633789] The buggy address is located 8 bytes inside of
[  107.633789]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.635099] 
[  107.635383] The buggy address belongs to the physical page:
[  107.636055] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.637245] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.638315] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.639388] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.640443] page dumped because: kasan: bad access detected
[  107.641148] 
[  107.641453] Memory state around the buggy address:
[  107.642096]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.643006]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.643906] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.644818]                       ^
[  107.645431]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.646454]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.647371] ==================================================================
[  107.382258] ==================================================================
[  107.383141] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xcc/0x68c
[  107.384205] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.385237] 
[  107.385531] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.386673] Hardware name: linux,dummy-virt (DT)
[  107.387285] Call trace:
[  107.387689]  dump_backtrace+0xe0/0x134
[  107.388575]  show_stack+0x20/0x2c
[  107.389114]  dump_stack_lvl+0x88/0xb4
[  107.389720]  print_report+0x158/0x44c
[  107.390285]  kasan_report+0xc8/0x180
[  107.390864]  __asan_load8+0x80/0xac
[  107.391424]  kasan_bitops_modify.constprop.0+0xcc/0x68c
[  107.392167]  kasan_bitops_generic+0xb4/0x140
[  107.392894]  kunit_try_run_case+0x8c/0x124
[  107.393643]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.394346]  kthread+0x15c/0x170
[  107.394707]  ret_from_fork+0x10/0x20
[  107.395153] 
[  107.395350] Allocated by task 249:
[  107.395662]  kasan_save_stack+0x3c/0x70
[  107.396116]  kasan_set_track+0x2c/0x40
[  107.396584]  kasan_save_alloc_info+0x24/0x34
[  107.397053]  __kasan_kmalloc+0xd4/0xe0
[  107.397481]  kmalloc_trace+0x8c/0x150
[  107.397906]  kasan_bitops_generic+0x98/0x140
[  107.398365]  kunit_try_run_case+0x8c/0x124
[  107.398848]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.399428]  kthread+0x15c/0x170
[  107.399852]  ret_from_fork+0x10/0x20
[  107.400287] 
[  107.400489] The buggy address belongs to the object at ffff0000c66ab600
[  107.400489]  which belongs to the cache kmalloc-128 of size 128
[  107.402615] The buggy address is located 8 bytes inside of
[  107.402615]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.403339] 
[  107.403528] The buggy address belongs to the physical page:
[  107.403914] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.404512] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.405684] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.406233] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.406705] page dumped because: kasan: bad access detected
[  107.407081] 
[  107.407263] Memory state around the buggy address:
[  107.407617]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.408855]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.410205] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.410919]                       ^
[  107.411371]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.412093]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.412788] ==================================================================
[  107.467606] ==================================================================
[  107.468262] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x150/0x68c
[  107.469124] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.469824] 
[  107.470105] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.470800] Hardware name: linux,dummy-virt (DT)
[  107.471245] Call trace:
[  107.471525]  dump_backtrace+0xe0/0x134
[  107.472370]  show_stack+0x20/0x2c
[  107.472969]  dump_stack_lvl+0x88/0xb4
[  107.473570]  print_report+0x158/0x44c
[  107.474058]  kasan_report+0xc8/0x180
[  107.474583]  kasan_check_range+0xe4/0x190
[  107.475145]  __kasan_check_write+0x28/0x3c
[  107.475670]  kasan_bitops_modify.constprop.0+0x150/0x68c
[  107.476214]  kasan_bitops_generic+0xb4/0x140
[  107.476696]  kunit_try_run_case+0x8c/0x124
[  107.477142]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.477691]  kthread+0x15c/0x170
[  107.478091]  ret_from_fork+0x10/0x20
[  107.478531] 
[  107.478762] Allocated by task 249:
[  107.479096]  kasan_save_stack+0x3c/0x70
[  107.479555]  kasan_set_track+0x2c/0x40
[  107.480010]  kasan_save_alloc_info+0x24/0x34
[  107.480471]  __kasan_kmalloc+0xd4/0xe0
[  107.480904]  kmalloc_trace+0x8c/0x150
[  107.481337]  kasan_bitops_generic+0x98/0x140
[  107.481862]  kunit_try_run_case+0x8c/0x124
[  107.482388]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.483134]  kthread+0x15c/0x170
[  107.483555]  ret_from_fork+0x10/0x20
[  107.484067] 
[  107.484585] The buggy address belongs to the object at ffff0000c66ab600
[  107.484585]  which belongs to the cache kmalloc-128 of size 128
[  107.485731] The buggy address is located 8 bytes inside of
[  107.485731]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.486544] 
[  107.486789] The buggy address belongs to the physical page:
[  107.487299] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.488061] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.488829] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.489567] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.490358] page dumped because: kasan: bad access detected
[  107.490732] 
[  107.491028] Memory state around the buggy address:
[  107.491683]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.492359]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.493089] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.493700]                       ^
[  107.494080]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.494707]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.495314] ==================================================================
[  107.525597] ==================================================================
[  107.526564] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x188/0x68c
[  107.527673] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.528555] 
[  107.528768] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.529330] Hardware name: linux,dummy-virt (DT)
[  107.529670] Call trace:
[  107.529909]  dump_backtrace+0xe0/0x134
[  107.530278]  show_stack+0x20/0x2c
[  107.530614]  dump_stack_lvl+0x88/0xb4
[  107.531037]  print_report+0x158/0x44c
[  107.531546]  kasan_report+0xc8/0x180
[  107.532035]  __asan_load8+0x80/0xac
[  107.532548]  kasan_bitops_modify.constprop.0+0x188/0x68c
[  107.533183]  kasan_bitops_generic+0xb4/0x140
[  107.533573]  kunit_try_run_case+0x8c/0x124
[  107.534046]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.534740]  kthread+0x15c/0x170
[  107.535298]  ret_from_fork+0x10/0x20
[  107.535785] 
[  107.536300] Allocated by task 249:
[  107.536661]  kasan_save_stack+0x3c/0x70
[  107.537096]  kasan_set_track+0x2c/0x40
[  107.537536]  kasan_save_alloc_info+0x24/0x34
[  107.538020]  __kasan_kmalloc+0xd4/0xe0
[  107.538490]  kmalloc_trace+0x8c/0x150
[  107.538935]  kasan_bitops_generic+0x98/0x140
[  107.539359]  kunit_try_run_case+0x8c/0x124
[  107.539839]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.540585]  kthread+0x15c/0x170
[  107.541003]  ret_from_fork+0x10/0x20
[  107.541434] 
[  107.541629] The buggy address belongs to the object at ffff0000c66ab600
[  107.541629]  which belongs to the cache kmalloc-128 of size 128
[  107.542583] The buggy address is located 8 bytes inside of
[  107.542583]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.544248] 
[  107.544458] The buggy address belongs to the physical page:
[  107.544857] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.546001] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.546777] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.547439] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.548077] page dumped because: kasan: bad access detected
[  107.548596] 
[  107.548799] Memory state around the buggy address:
[  107.549210]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.549840]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.550618] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.551316]                       ^
[  107.551978]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.552661]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.553789] ==================================================================

[   74.882452] ==================================================================
[   74.882994] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x148/0x684
[   74.884043] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.884604] 
[   74.884859] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.885620] Hardware name: linux,dummy-virt (DT)
[   74.886246] Call trace:
[   74.886630]  dump_backtrace.part.0+0xdc/0xf0
[   74.887519]  show_stack+0x18/0x30
[   74.887945]  dump_stack_lvl+0x64/0x80
[   74.888355]  print_report+0x158/0x438
[   74.888823]  kasan_report+0xb4/0xf4
[   74.889197]  kasan_check_range+0xe4/0x190
[   74.889674]  __kasan_check_write+0x28/0x3c
[   74.890161]  kasan_bitops_modify.constprop.0+0x148/0x684
[   74.891351]  kasan_bitops_generic+0xac/0x13c
[   74.891863]  kunit_try_run_case+0x84/0x120
[   74.892364]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.892952]  kthread+0x180/0x190
[   74.893339]  ret_from_fork+0x10/0x20
[   74.893737] 
[   74.893978] Allocated by task 165:
[   74.894656]  kasan_save_stack+0x3c/0x70
[   74.895099]  kasan_set_track+0x2c/0x40
[   74.895510]  kasan_save_alloc_info+0x24/0x34
[   74.896033]  __kasan_kmalloc+0xb8/0xc0
[   74.896423]  kmalloc_trace+0x58/0x6c
[   74.896868]  kasan_bitops_generic+0x90/0x13c
[   74.897359]  kunit_try_run_case+0x84/0x120
[   74.897992]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.898572]  kthread+0x180/0x190
[   74.899403]  ret_from_fork+0x10/0x20
[   74.899842] 
[   74.900044] The buggy address belongs to the object at ffff0000c5840b00
[   74.900044]  which belongs to the cache kmalloc-128 of size 128
[   74.901000] The buggy address is located 8 bytes inside of
[   74.901000]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.902152] 
[   74.902368] The buggy address belongs to the physical page:
[   74.902953] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.903738] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.904423] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.905105] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.905733] page dumped because: kasan: bad access detected
[   74.906762] 
[   74.906976] Memory state around the buggy address:
[   74.907421]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.908060]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.908660] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.909256]                       ^
[   74.909641]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.910272]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.911169] ==================================================================
[   74.851621] ==================================================================
[   74.852081] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x11c/0x684
[   74.852873] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.853500] 
[   74.853692] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.854739] Hardware name: linux,dummy-virt (DT)
[   74.855326] Call trace:
[   74.855727]  dump_backtrace.part.0+0xdc/0xf0
[   74.856417]  show_stack+0x18/0x30
[   74.857032]  dump_stack_lvl+0x64/0x80
[   74.857447]  print_report+0x158/0x438
[   74.857900]  kasan_report+0xb4/0xf4
[   74.858365]  __asan_load8+0x80/0xac
[   74.858852]  kasan_bitops_modify.constprop.0+0x11c/0x684
[   74.859454]  kasan_bitops_generic+0xac/0x13c
[   74.860048]  kunit_try_run_case+0x84/0x120
[   74.860606]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.861299]  kthread+0x180/0x190
[   74.861947]  ret_from_fork+0x10/0x20
[   74.862623] 
[   74.862919] Allocated by task 165:
[   74.863405]  kasan_save_stack+0x3c/0x70
[   74.863879]  kasan_set_track+0x2c/0x40
[   74.864212]  kasan_save_alloc_info+0x24/0x34
[   74.864882]  __kasan_kmalloc+0xb8/0xc0
[   74.865466]  kmalloc_trace+0x58/0x6c
[   74.866228]  kasan_bitops_generic+0x90/0x13c
[   74.867332]  kunit_try_run_case+0x84/0x120
[   74.867983]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.868773]  kthread+0x180/0x190
[   74.869287]  ret_from_fork+0x10/0x20
[   74.869725] 
[   74.870057] The buggy address belongs to the object at ffff0000c5840b00
[   74.870057]  which belongs to the cache kmalloc-128 of size 128
[   74.871074] The buggy address is located 8 bytes inside of
[   74.871074]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.872017] 
[   74.872255] The buggy address belongs to the physical page:
[   74.872738] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.873527] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.874352] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.874991] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.875592] page dumped because: kasan: bad access detected
[   74.876055] 
[   74.876265] Memory state around the buggy address:
[   74.877159]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.877808]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.878737] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.879293]                       ^
[   74.879685]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.880353]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.880967] ==================================================================
[   74.912145] ==================================================================
[   74.912935] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x178/0x684
[   74.913903] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.915053] 
[   74.915287] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.916010] Hardware name: linux,dummy-virt (DT)
[   74.916445] Call trace:
[   74.916756]  dump_backtrace.part.0+0xdc/0xf0
[   74.917311]  show_stack+0x18/0x30
[   74.917764]  dump_stack_lvl+0x64/0x80
[   74.918211]  print_report+0x158/0x438
[   74.918955]  kasan_report+0xb4/0xf4
[   74.919366]  kasan_check_range+0xe4/0x190
[   74.919842]  __kasan_check_write+0x28/0x3c
[   74.920330]  kasan_bitops_modify.constprop.0+0x178/0x684
[   74.920912]  kasan_bitops_generic+0xac/0x13c
[   74.921434]  kunit_try_run_case+0x84/0x120
[   74.922139]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.922708]  kthread+0x180/0x190
[   74.923579]  ret_from_fork+0x10/0x20
[   74.924015] 
[   74.924236] Allocated by task 165:
[   74.924555]  kasan_save_stack+0x3c/0x70
[   74.924992]  kasan_set_track+0x2c/0x40
[   74.925417]  kasan_save_alloc_info+0x24/0x34
[   74.926059]  __kasan_kmalloc+0xb8/0xc0
[   74.926762]  kmalloc_trace+0x58/0x6c
[   74.927224]  kasan_bitops_generic+0x90/0x13c
[   74.927739]  kunit_try_run_case+0x84/0x120
[   74.928259]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.928812]  kthread+0x180/0x190
[   74.929200]  ret_from_fork+0x10/0x20
[   74.929595] 
[   74.930361] The buggy address belongs to the object at ffff0000c5840b00
[   74.930361]  which belongs to the cache kmalloc-128 of size 128
[   74.931317] The buggy address is located 8 bytes inside of
[   74.931317]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.932219] 
[   74.932425] The buggy address belongs to the physical page:
[   74.932907] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.933672] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.934350] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.935026] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.935653] page dumped because: kasan: bad access detected
[   74.936123] 
[   74.936299] Memory state around the buggy address:
[   74.936758]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.937347]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.938661] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.939239]                       ^
[   74.939621]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.940197]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.940802] ==================================================================
[   74.746964] ==================================================================
[   74.747776] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x684
[   74.748602] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.749187] 
[   74.749415] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.750191] Hardware name: linux,dummy-virt (DT)
[   74.750648] Call trace:
[   74.751089]  dump_backtrace.part.0+0xdc/0xf0
[   74.751579]  show_stack+0x18/0x30
[   74.752140]  dump_stack_lvl+0x64/0x80
[   74.752508]  print_report+0x158/0x438
[   74.752884]  kasan_report+0xb4/0xf4
[   74.753209]  kasan_check_range+0xe4/0x190
[   74.753587]  __kasan_check_write+0x28/0x3c
[   74.753964]  kasan_bitops_modify.constprop.0+0x9c/0x684
[   74.754748]  kasan_bitops_generic+0xac/0x13c
[   74.755699]  kunit_try_run_case+0x84/0x120
[   74.756596]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.757565]  kthread+0x180/0x190
[   74.758339]  ret_from_fork+0x10/0x20
[   74.759094] 
[   74.759497] Allocated by task 165:
[   74.760137]  kasan_save_stack+0x3c/0x70
[   74.760963]  kasan_set_track+0x2c/0x40
[   74.761610]  kasan_save_alloc_info+0x24/0x34
[   74.762573]  __kasan_kmalloc+0xb8/0xc0
[   74.763484]  kmalloc_trace+0x58/0x6c
[   74.764151]  kasan_bitops_generic+0x90/0x13c
[   74.764990]  kunit_try_run_case+0x84/0x120
[   74.765864]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.766861]  kthread+0x180/0x190
[   74.767582]  ret_from_fork+0x10/0x20
[   74.768378] 
[   74.768711] The buggy address belongs to the object at ffff0000c5840b00
[   74.768711]  which belongs to the cache kmalloc-128 of size 128
[   74.770521] The buggy address is located 8 bytes inside of
[   74.770521]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.772341] 
[   74.772789] The buggy address belongs to the physical page:
[   74.773663] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.775218] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.776316] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.777501] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.778765] page dumped because: kasan: bad access detected
[   74.779718] 
[   74.780123] Memory state around the buggy address:
[   74.780794]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.781286]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.781925] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.782478]                       ^
[   74.782829]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.783430]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.784015] ==================================================================
[   74.784867] ==================================================================
[   74.785383] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xc4/0x684
[   74.786355] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.786968] 
[   74.787186] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.787890] Hardware name: linux,dummy-virt (DT)
[   74.788308] Call trace:
[   74.788968]  dump_backtrace.part.0+0xdc/0xf0
[   74.789500]  show_stack+0x18/0x30
[   74.790199]  dump_stack_lvl+0x64/0x80
[   74.790654]  print_report+0x158/0x438
[   74.791068]  kasan_report+0xb4/0xf4
[   74.791460]  __asan_load8+0x80/0xac
[   74.791872]  kasan_bitops_modify.constprop.0+0xc4/0x684
[   74.792459]  kasan_bitops_generic+0xac/0x13c
[   74.792910]  kunit_try_run_case+0x84/0x120
[   74.793356]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.794408]  kthread+0x180/0x190
[   74.794784]  ret_from_fork+0x10/0x20
[   74.795243] 
[   74.795460] Allocated by task 165:
[   74.795799]  kasan_save_stack+0x3c/0x70
[   74.796225]  kasan_set_track+0x2c/0x40
[   74.796662]  kasan_save_alloc_info+0x24/0x34
[   74.797128]  __kasan_kmalloc+0xb8/0xc0
[   74.797550]  kmalloc_trace+0x58/0x6c
[   74.798219]  kasan_bitops_generic+0x90/0x13c
[   74.798755]  kunit_try_run_case+0x84/0x120
[   74.799212]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.799777]  kthread+0x180/0x190
[   74.800129]  ret_from_fork+0x10/0x20
[   74.800560] 
[   74.800761] The buggy address belongs to the object at ffff0000c5840b00
[   74.800761]  which belongs to the cache kmalloc-128 of size 128
[   74.801682] The buggy address is located 8 bytes inside of
[   74.801682]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.803111] 
[   74.803290] The buggy address belongs to the physical page:
[   74.803761] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.804516] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.805149] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.806119] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.806723] page dumped because: kasan: bad access detected
[   74.807182] 
[   74.807363] Memory state around the buggy address:
[   74.807831]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.808421]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.809021] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.809587]                       ^
[   74.810480]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.811017]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.811476] ==================================================================
[   74.968739] ==================================================================
[   74.969352] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x190/0x684
[   74.970715] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.971332] 
[   74.971552] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.972280] Hardware name: linux,dummy-virt (DT)
[   74.972695] Call trace:
[   74.972963]  dump_backtrace.part.0+0xdc/0xf0
[   74.973480]  show_stack+0x18/0x30
[   74.974185]  dump_stack_lvl+0x64/0x80
[   74.974635]  print_report+0x158/0x438
[   74.975079]  kasan_report+0xb4/0xf4
[   74.975463]  kasan_check_range+0xe4/0x190
[   74.975922]  __kasan_check_write+0x28/0x3c
[   74.976370]  kasan_bitops_modify.constprop.0+0x190/0x684
[   74.976925]  kasan_bitops_generic+0xac/0x13c
[   74.977360]  kunit_try_run_case+0x84/0x120
[   74.978305]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.978866]  kthread+0x180/0x190
[   74.979241]  ret_from_fork+0x10/0x20
[   74.979695] 
[   74.979874] Allocated by task 165:
[   74.980245]  kasan_save_stack+0x3c/0x70
[   74.980664]  kasan_set_track+0x2c/0x40
[   74.981077]  kasan_save_alloc_info+0x24/0x34
[   74.981562]  __kasan_kmalloc+0xb8/0xc0
[   74.982030]  kmalloc_trace+0x58/0x6c
[   74.982466]  kasan_bitops_generic+0x90/0x13c
[   74.982914]  kunit_try_run_case+0x84/0x120
[   74.983376]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.983898]  kthread+0x180/0x190
[   74.984273]  ret_from_fork+0x10/0x20
[   74.985324] 
[   74.985537] The buggy address belongs to the object at ffff0000c5840b00
[   74.985537]  which belongs to the cache kmalloc-128 of size 128
[   74.986903] The buggy address is located 8 bytes inside of
[   74.986903]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.987786] 
[   74.987977] The buggy address belongs to the physical page:
[   74.988442] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.989166] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.989824] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.990649] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.991248] page dumped because: kasan: bad access detected
[   74.991729] 
[   74.991905] Memory state around the buggy address:
[   74.992499]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.993086]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.993676] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.994842]                       ^
[   74.995191]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.995830]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.996386] ==================================================================
[   75.026704] ==================================================================
[   75.027281] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e8/0x684
[   75.028038] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.028582] 
[   75.028824] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.029515] Hardware name: linux,dummy-virt (DT)
[   75.030231] Call trace:
[   75.030484]  dump_backtrace.part.0+0xdc/0xf0
[   75.030995]  show_stack+0x18/0x30
[   75.031454]  dump_stack_lvl+0x64/0x80
[   75.031876]  print_report+0x158/0x438
[   75.032277]  kasan_report+0xb4/0xf4
[   75.032676]  __asan_load8+0x80/0xac
[   75.033087]  kasan_bitops_modify.constprop.0+0x1e8/0x684
[   75.033668]  kasan_bitops_generic+0xac/0x13c
[   75.034165]  kunit_try_run_case+0x84/0x120
[   75.035116]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.035680]  kthread+0x180/0x190
[   75.036057]  ret_from_fork+0x10/0x20
[   75.036492] 
[   75.036682] Allocated by task 165:
[   75.037010]  kasan_save_stack+0x3c/0x70
[   75.037420]  kasan_set_track+0x2c/0x40
[   75.038090]  kasan_save_alloc_info+0x24/0x34
[   75.038553]  __kasan_kmalloc+0xb8/0xc0
[   75.038966]  kmalloc_trace+0x58/0x6c
[   75.039345]  kasan_bitops_generic+0x90/0x13c
[   75.039849]  kunit_try_run_case+0x84/0x120
[   75.040305]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.040903]  kthread+0x180/0x190
[   75.041290]  ret_from_fork+0x10/0x20
[   75.041711] 
[   75.042414] The buggy address belongs to the object at ffff0000c5840b00
[   75.042414]  which belongs to the cache kmalloc-128 of size 128
[   75.043300] The buggy address is located 8 bytes inside of
[   75.043300]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.044179] 
[   75.044364] The buggy address belongs to the physical page:
[   75.044820] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.045583] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.046505] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.047160] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.047788] page dumped because: kasan: bad access detected
[   75.048242] 
[   75.048437] Memory state around the buggy address:
[   75.048858]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.049455]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.050280] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.050840]                       ^
[   75.051172]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.051785]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.052349] ==================================================================
[   74.812696] ==================================================================
[   74.813156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xf0/0x684
[   74.813897] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.815447] 
[   74.815665] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.816211] Hardware name: linux,dummy-virt (DT)
[   74.816544] Call trace:
[   74.816771]  dump_backtrace.part.0+0xdc/0xf0
[   74.817212]  show_stack+0x18/0x30
[   74.818888]  dump_stack_lvl+0x64/0x80
[   74.819446]  print_report+0x158/0x438
[   74.819887]  kasan_report+0xb4/0xf4
[   74.820267]  kasan_check_range+0xe4/0x190
[   74.820992]  __kasan_check_write+0x28/0x3c
[   74.821598]  kasan_bitops_modify.constprop.0+0xf0/0x684
[   74.822864]  kasan_bitops_generic+0xac/0x13c
[   74.823617]  kunit_try_run_case+0x84/0x120
[   74.824024]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.824584]  kthread+0x180/0x190
[   74.825382]  ret_from_fork+0x10/0x20
[   74.826683] 
[   74.827197] Allocated by task 165:
[   74.828073]  kasan_save_stack+0x3c/0x70
[   74.828932]  kasan_set_track+0x2c/0x40
[   74.829530]  kasan_save_alloc_info+0x24/0x34
[   74.830367]  __kasan_kmalloc+0xb8/0xc0
[   74.830962]  kmalloc_trace+0x58/0x6c
[   74.831804]  kasan_bitops_generic+0x90/0x13c
[   74.832564]  kunit_try_run_case+0x84/0x120
[   74.832971]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.833475]  kthread+0x180/0x190
[   74.834031]  ret_from_fork+0x10/0x20
[   74.834683] 
[   74.835111] The buggy address belongs to the object at ffff0000c5840b00
[   74.835111]  which belongs to the cache kmalloc-128 of size 128
[   74.836811] The buggy address is located 8 bytes inside of
[   74.836811]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.838206] 
[   74.838489] The buggy address belongs to the physical page:
[   74.839258] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.840322] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.840867] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.841373] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.842586] page dumped because: kasan: bad access detected
[   74.843616] 
[   74.843883] Memory state around the buggy address:
[   74.844749]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.845633]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.846815] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.847677]                       ^
[   74.848190]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.849060]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.850487] ==================================================================
[   74.941566] ==================================================================
[   74.942154] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x180/0x684
[   74.942957] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.943555] 
[   74.943774] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.944758] Hardware name: linux,dummy-virt (DT)
[   74.945145] Call trace:
[   74.945420]  dump_backtrace.part.0+0xdc/0xf0
[   74.946390]  show_stack+0x18/0x30
[   74.946852]  dump_stack_lvl+0x64/0x80
[   74.947270]  print_report+0x158/0x438
[   74.947716]  kasan_report+0xb4/0xf4
[   74.948111]  __asan_load8+0x80/0xac
[   74.948523]  kasan_bitops_modify.constprop.0+0x180/0x684
[   74.949069]  kasan_bitops_generic+0xac/0x13c
[   74.949532]  kunit_try_run_case+0x84/0x120
[   74.950064]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.950606]  kthread+0x180/0x190
[   74.950987]  ret_from_fork+0x10/0x20
[   74.951405] 
[   74.951590] Allocated by task 165:
[   74.951912]  kasan_save_stack+0x3c/0x70
[   74.952338]  kasan_set_track+0x2c/0x40
[   74.953028]  kasan_save_alloc_info+0x24/0x34
[   74.953468]  __kasan_kmalloc+0xb8/0xc0
[   74.954390]  kmalloc_trace+0x58/0x6c
[   74.954819]  kasan_bitops_generic+0x90/0x13c
[   74.955292]  kunit_try_run_case+0x84/0x120
[   74.955760]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.956268]  kthread+0x180/0x190
[   74.956650]  ret_from_fork+0x10/0x20
[   74.957062] 
[   74.957244] The buggy address belongs to the object at ffff0000c5840b00
[   74.957244]  which belongs to the cache kmalloc-128 of size 128
[   74.958536] The buggy address is located 8 bytes inside of
[   74.958536]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.959346] 
[   74.959565] The buggy address belongs to the physical page:
[   74.960001] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.960783] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.961439] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.962566] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.963173] page dumped because: kasan: bad access detected
[   74.963642] 
[   74.963847] Memory state around the buggy address:
[   74.964257]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.964848]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.965444] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.966181]                       ^
[   74.966548]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.967171]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.967747] ==================================================================
[   74.997195] ==================================================================
[   74.997743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1bc/0x684
[   74.998875] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.999509] 
[   74.999722] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.000403] Hardware name: linux,dummy-virt (DT)
[   75.000817] Call trace:
[   75.001110]  dump_backtrace.part.0+0xdc/0xf0
[   75.001615]  show_stack+0x18/0x30
[   75.002627]  dump_stack_lvl+0x64/0x80
[   75.003036]  print_report+0x158/0x438
[   75.003456]  kasan_report+0xb4/0xf4
[   75.003857]  kasan_check_range+0xe4/0x190
[   75.004305]  __kasan_check_write+0x28/0x3c
[   75.004756]  kasan_bitops_modify.constprop.0+0x1bc/0x684
[   75.005331]  kasan_bitops_generic+0xac/0x13c
[   75.006108]  kunit_try_run_case+0x84/0x120
[   75.006575]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.007094]  kthread+0x180/0x190
[   75.007478]  ret_from_fork+0x10/0x20
[   75.007892] 
[   75.008070] Allocated by task 165:
[   75.008405]  kasan_save_stack+0x3c/0x70
[   75.008863]  kasan_set_track+0x2c/0x40
[   75.009268]  kasan_save_alloc_info+0x24/0x34
[   75.009732]  __kasan_kmalloc+0xb8/0xc0
[   75.010133]  kmalloc_trace+0x58/0x6c
[   75.011067]  kasan_bitops_generic+0x90/0x13c
[   75.011600]  kunit_try_run_case+0x84/0x120
[   75.012058]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.012594]  kthread+0x180/0x190
[   75.012965]  ret_from_fork+0x10/0x20
[   75.013369] 
[   75.013564] The buggy address belongs to the object at ffff0000c5840b00
[   75.013564]  which belongs to the cache kmalloc-128 of size 128
[   75.014941] The buggy address is located 8 bytes inside of
[   75.014941]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.015813] 
[   75.016017] The buggy address belongs to the physical page:
[   75.016495] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.017246] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.018066] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.018731] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.019344] page dumped because: kasan: bad access detected
[   75.019806] 
[   75.019983] Memory state around the buggy address:
[   75.020859]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.021444]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.022366] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.022934]                       ^
[   75.023281]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.023889]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.024487] ==================================================================

[   66.177015] ==================================================================
[   66.177703] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0xe4/0x6a8
[   66.178416] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.178961] 
[   66.179152] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.179795] Hardware name: linux,dummy-virt (DT)
[   66.180178] Call trace:
[   66.180430]  dump_backtrace+0x110/0x120
[   66.180847]  show_stack+0x18/0x28
[   66.181236]  dump_stack_lvl+0x68/0x84
[   66.181690]  print_report+0x158/0x484
[   66.182218]  kasan_report+0x98/0xe0
[   66.182597]  __asan_load8+0x88/0xb0
[   66.182940]  kasan_bitops_modify.constprop.5+0xe4/0x6a8
[   66.183506]  kasan_bitops_generic+0xac/0x128
[   66.183952]  kunit_try_run_case+0x7c/0x120
[   66.184379]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.184855]  kthread+0x1a4/0x1b8
[   66.185219]  ret_from_fork+0x10/0x20
[   66.185799] 
[   66.186000] Allocated by task 163:
[   66.186295]  kasan_save_stack+0x2c/0x58
[   66.186693]  kasan_set_track+0x2c/0x40
[   66.187054]  kasan_save_alloc_info+0x24/0x38
[   66.187487]  __kasan_kmalloc+0xa0/0xb8
[   66.187838]  kmalloc_trace+0x50/0x68
[   66.188208]  kasan_bitops_generic+0x90/0x128
[   66.188686]  kunit_try_run_case+0x7c/0x120
[   66.189091]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.189821]  kthread+0x1a4/0x1b8
[   66.190157]  ret_from_fork+0x10/0x20
[   66.190515] 
[   66.190708] The buggy address belongs to the object at ffff0000c586c700
[   66.190708]  which belongs to the cache kmalloc-128 of size 128
[   66.191554] The buggy address is located 8 bytes inside of
[   66.191554]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.192334] 
[   66.192549] The buggy address belongs to the physical page:
[   66.192986] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.193733] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.194947] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.195550] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.196134] page dumped because: kasan: bad access detected
[   66.196548] 
[   66.196732] Memory state around the buggy address:
[   66.197113]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.197896]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.198452] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.198988]                       ^
[   66.199324]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.199892]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.200438] ==================================================================
[   66.150508] ==================================================================
[   66.151273] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0xb4/0x6a8
[   66.151975] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.152591] 
[   66.152805] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.153536] Hardware name: linux,dummy-virt (DT)
[   66.154068] Call trace:
[   66.154511]  dump_backtrace+0x110/0x120
[   66.154976]  show_stack+0x18/0x28
[   66.155367]  dump_stack_lvl+0x68/0x84
[   66.155797]  print_report+0x158/0x484
[   66.156166]  kasan_report+0x98/0xe0
[   66.156511]  kasan_check_range+0x160/0x1d8
[   66.156853]  __kasan_check_write+0x28/0x38
[   66.157197]  kasan_bitops_modify.constprop.5+0xb4/0x6a8
[   66.157637]  kasan_bitops_generic+0xac/0x128
[   66.158258]  kunit_try_run_case+0x7c/0x120
[   66.158778]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.159325]  kthread+0x1a4/0x1b8
[   66.159716]  ret_from_fork+0x10/0x20
[   66.160083] 
[   66.160297] Allocated by task 163:
[   66.160615]  kasan_save_stack+0x2c/0x58
[   66.161012]  kasan_set_track+0x2c/0x40
[   66.161447]  kasan_save_alloc_info+0x24/0x38
[   66.161995]  __kasan_kmalloc+0xa0/0xb8
[   66.162435]  kmalloc_trace+0x50/0x68
[   66.162822]  kasan_bitops_generic+0x90/0x128
[   66.163294]  kunit_try_run_case+0x7c/0x120
[   66.163729]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.164253]  kthread+0x1a4/0x1b8
[   66.164609]  ret_from_fork+0x10/0x20
[   66.164984] 
[   66.165205] The buggy address belongs to the object at ffff0000c586c700
[   66.165205]  which belongs to the cache kmalloc-128 of size 128
[   66.166494] The buggy address is located 8 bytes inside of
[   66.166494]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.167490] 
[   66.167821] The buggy address belongs to the physical page:
[   66.168280] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.169049] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.170101] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.170720] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.171292] page dumped because: kasan: bad access detected
[   66.171734] 
[   66.171926] Memory state around the buggy address:
[   66.172307]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.172850]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.174081] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.174769]                       ^
[   66.175107]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.175672]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.176225] ==================================================================
[   66.201213] ==================================================================
[   66.201774] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x118/0x6a8
[   66.202553] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.203096] 
[   66.203301] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.203969] Hardware name: linux,dummy-virt (DT)
[   66.204601] Call trace:
[   66.204839]  dump_backtrace+0x110/0x120
[   66.205283]  show_stack+0x18/0x28
[   66.205791]  dump_stack_lvl+0x68/0x84
[   66.206196]  print_report+0x158/0x484
[   66.206582]  kasan_report+0x98/0xe0
[   66.206925]  kasan_check_range+0x160/0x1d8
[   66.207353]  __kasan_check_write+0x28/0x38
[   66.207755]  kasan_bitops_modify.constprop.5+0x118/0x6a8
[   66.208242]  kasan_bitops_generic+0xac/0x128
[   66.208690]  kunit_try_run_case+0x7c/0x120
[   66.209111]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.209889]  kthread+0x1a4/0x1b8
[   66.210258]  ret_from_fork+0x10/0x20
[   66.210627] 
[   66.210822] Allocated by task 163:
[   66.211101]  kasan_save_stack+0x2c/0x58
[   66.211528]  kasan_set_track+0x2c/0x40
[   66.211854]  kasan_save_alloc_info+0x24/0x38
[   66.212307]  __kasan_kmalloc+0xa0/0xb8
[   66.212673]  kmalloc_trace+0x50/0x68
[   66.213056]  kasan_bitops_generic+0x90/0x128
[   66.213559]  kunit_try_run_case+0x7c/0x120
[   66.213979]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.214648]  kthread+0x1a4/0x1b8
[   66.215004]  ret_from_fork+0x10/0x20
[   66.215385] 
[   66.215554] The buggy address belongs to the object at ffff0000c586c700
[   66.215554]  which belongs to the cache kmalloc-128 of size 128
[   66.216391] The buggy address is located 8 bytes inside of
[   66.216391]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.217195] 
[   66.217392] The buggy address belongs to the physical page:
[   66.218083] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.218798] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.219400] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.219972] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.220541] page dumped because: kasan: bad access detected
[   66.220965] 
[   66.221152] Memory state around the buggy address:
[   66.222196]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.222750]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.223316] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.223849]                       ^
[   66.224155]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.224711]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.225250] ==================================================================
[   66.302065] ==================================================================
[   66.302585] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x1c0/0x6a8
[   66.303278] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.303814] 
[   66.304032] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.304696] Hardware name: linux,dummy-virt (DT)
[   66.305066] Call trace:
[   66.305318]  dump_backtrace+0x110/0x120
[   66.306019]  show_stack+0x18/0x28
[   66.306437]  dump_stack_lvl+0x68/0x84
[   66.306829]  print_report+0x158/0x484
[   66.307195]  kasan_report+0x98/0xe0
[   66.307568]  __asan_load8+0x88/0xb0
[   66.307934]  kasan_bitops_modify.constprop.5+0x1c0/0x6a8
[   66.308450]  kasan_bitops_generic+0xac/0x128
[   66.308890]  kunit_try_run_case+0x7c/0x120
[   66.309314]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.309949]  kthread+0x1a4/0x1b8
[   66.310325]  ret_from_fork+0x10/0x20
[   66.310712] 
[   66.310885] Allocated by task 163:
[   66.311184]  kasan_save_stack+0x2c/0x58
[   66.311592]  kasan_set_track+0x2c/0x40
[   66.311959]  kasan_save_alloc_info+0x24/0x38
[   66.312391]  __kasan_kmalloc+0xa0/0xb8
[   66.312727]  kmalloc_trace+0x50/0x68
[   66.313087]  kasan_bitops_generic+0x90/0x128
[   66.313706]  kunit_try_run_case+0x7c/0x120
[   66.314121]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.314653]  kthread+0x1a4/0x1b8
[   66.314994]  ret_from_fork+0x10/0x20
[   66.315374] 
[   66.315572] The buggy address belongs to the object at ffff0000c586c700
[   66.315572]  which belongs to the cache kmalloc-128 of size 128
[   66.316404] The buggy address is located 8 bytes inside of
[   66.316404]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.317208] 
[   66.317404] The buggy address belongs to the physical page:
[   66.317863] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.318550] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.319157] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.319880] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.320455] page dumped because: kasan: bad access detected
[   66.320899] 
[   66.321090] Memory state around the buggy address:
[   66.321603]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.322186]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.322747] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.323288]                       ^
[   66.323594]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.324151]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.324713] ==================================================================
[   66.326063] ==================================================================
[   66.326601] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x1d0/0x6a8
[   66.327265] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.327824] 
[   66.328015] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.328634] Hardware name: linux,dummy-virt (DT)
[   66.329020] Call trace:
[   66.329250]  dump_backtrace+0x110/0x120
[   66.329966]  show_stack+0x18/0x28
[   66.330373]  dump_stack_lvl+0x68/0x84
[   66.330762]  print_report+0x158/0x484
[   66.331134]  kasan_report+0x98/0xe0
[   66.331511]  kasan_check_range+0x160/0x1d8
[   66.331916]  __kasan_check_write+0x28/0x38
[   66.332339]  kasan_bitops_modify.constprop.5+0x1d0/0x6a8
[   66.332818]  kasan_bitops_generic+0xac/0x128
[   66.333291]  kunit_try_run_case+0x7c/0x120
[   66.333713]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.334382]  kthread+0x1a4/0x1b8
[   66.334726]  ret_from_fork+0x10/0x20
[   66.335091] 
[   66.335284] Allocated by task 163:
[   66.335591]  kasan_save_stack+0x2c/0x58
[   66.335960]  kasan_set_track+0x2c/0x40
[   66.336326]  kasan_save_alloc_info+0x24/0x38
[   66.336764]  __kasan_kmalloc+0xa0/0xb8
[   66.337119]  kmalloc_trace+0x50/0x68
[   66.337660]  kasan_bitops_generic+0x90/0x128
[   66.338090]  kunit_try_run_case+0x7c/0x120
[   66.338533]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.339075]  kthread+0x1a4/0x1b8
[   66.339413]  ret_from_fork+0x10/0x20
[   66.339787] 
[   66.339961] The buggy address belongs to the object at ffff0000c586c700
[   66.339961]  which belongs to the cache kmalloc-128 of size 128
[   66.340763] The buggy address is located 8 bytes inside of
[   66.340763]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.341733] 
[   66.341915] The buggy address belongs to the physical page:
[   66.342354] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.343030] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.343643] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.344253] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.344803] page dumped because: kasan: bad access detected
[   66.345243] 
[   66.345434] Memory state around the buggy address:
[   66.345875]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.346422]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.346972] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.347523]                       ^
[   66.347827]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.348550]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.349086] ==================================================================
[   66.250309] ==================================================================
[   66.250845] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x180/0x6a8
[   66.251490] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.252128] 
[   66.252309] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.252964] Hardware name: linux,dummy-virt (DT)
[   66.253367] Call trace:
[   66.253638]  dump_backtrace+0x110/0x120
[   66.254071]  show_stack+0x18/0x28
[   66.254518]  dump_stack_lvl+0x68/0x84
[   66.254905]  print_report+0x158/0x484
[   66.255285]  kasan_report+0x98/0xe0
[   66.255750]  kasan_check_range+0x160/0x1d8
[   66.256158]  __kasan_check_write+0x28/0x38
[   66.256584]  kasan_bitops_modify.constprop.5+0x180/0x6a8
[   66.257080]  kasan_bitops_generic+0xac/0x128
[   66.257704]  kunit_try_run_case+0x7c/0x120
[   66.258114]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.258638]  kthread+0x1a4/0x1b8
[   66.259011]  ret_from_fork+0x10/0x20
[   66.259424] 
[   66.259607] Allocated by task 163:
[   66.259932]  kasan_save_stack+0x2c/0x58
[   66.260322]  kasan_set_track+0x2c/0x40
[   66.260691]  kasan_save_alloc_info+0x24/0x38
[   66.261106]  __kasan_kmalloc+0xa0/0xb8
[   66.261628]  kmalloc_trace+0x50/0x68
[   66.261992]  kasan_bitops_generic+0x90/0x128
[   66.262454]  kunit_try_run_case+0x7c/0x120
[   66.262907]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.263446]  kthread+0x1a4/0x1b8
[   66.263783]  ret_from_fork+0x10/0x20
[   66.264152] 
[   66.264329] The buggy address belongs to the object at ffff0000c586c700
[   66.264329]  which belongs to the cache kmalloc-128 of size 128
[   66.265172] The buggy address is located 8 bytes inside of
[   66.265172]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.266172] 
[   66.266412] The buggy address belongs to the physical page:
[   66.266822] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.267543] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.268171] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.268788] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.269349] page dumped because: kasan: bad access detected
[   66.270301] 
[   66.270488] Memory state around the buggy address:
[   66.270915]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.271486]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.272003] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.272537]                       ^
[   66.272859]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.273407]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.273966] ==================================================================
[   66.375093] ==================================================================
[   66.375601] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x238/0x6a8
[   66.376373] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.376961] 
[   66.377187] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.378399] Hardware name: linux,dummy-virt (DT)
[   66.378784] Call trace:
[   66.379006]  dump_backtrace+0x110/0x120
[   66.379515]  show_stack+0x18/0x28
[   66.379887]  dump_stack_lvl+0x68/0x84
[   66.380337]  print_report+0x158/0x484
[   66.380704]  kasan_report+0x98/0xe0
[   66.381064]  __asan_load8+0x88/0xb0
[   66.381465]  kasan_bitops_modify.constprop.5+0x238/0x6a8
[   66.382011]  kasan_bitops_generic+0xac/0x128
[   66.382465]  kunit_try_run_case+0x7c/0x120
[   66.382928]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.383471]  kthread+0x1a4/0x1b8
[   66.383808]  ret_from_fork+0x10/0x20
[   66.384199] 
[   66.384410] Allocated by task 163:
[   66.384723]  kasan_save_stack+0x2c/0x58
[   66.385079]  kasan_set_track+0x2c/0x40
[   66.385555]  kasan_save_alloc_info+0x24/0x38
[   66.385988]  __kasan_kmalloc+0xa0/0xb8
[   66.386358]  kmalloc_trace+0x50/0x68
[   66.386718]  kasan_bitops_generic+0x90/0x128
[   66.387162]  kunit_try_run_case+0x7c/0x120
[   66.387744]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.388299]  kthread+0x1a4/0x1b8
[   66.388645]  ret_from_fork+0x10/0x20
[   66.389007] 
[   66.389186] The buggy address belongs to the object at ffff0000c586c700
[   66.389186]  which belongs to the cache kmalloc-128 of size 128
[   66.390223] The buggy address is located 8 bytes inside of
[   66.390223]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.391086] 
[   66.391261] The buggy address belongs to the physical page:
[   66.391738] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.392415] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.393012] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.393825] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.394410] page dumped because: kasan: bad access detected
[   66.394828] 
[   66.395007] Memory state around the buggy address:
[   66.395402]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.395931]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.396522] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.397040]                       ^
[   66.397344]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.397926]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.399103] ==================================================================
[   66.226244] ==================================================================
[   66.226752] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x14c/0x6a8
[   66.227485] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.228045] 
[   66.228252] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.228928] Hardware name: linux,dummy-virt (DT)
[   66.229338] Call trace:
[   66.229611]  dump_backtrace+0x110/0x120
[   66.230223]  show_stack+0x18/0x28
[   66.230616]  dump_stack_lvl+0x68/0x84
[   66.230986]  print_report+0x158/0x484
[   66.231342]  kasan_report+0x98/0xe0
[   66.231692]  __asan_load8+0x88/0xb0
[   66.232045]  kasan_bitops_modify.constprop.5+0x14c/0x6a8
[   66.232651]  kasan_bitops_generic+0xac/0x128
[   66.233098]  kunit_try_run_case+0x7c/0x120
[   66.233699]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.234194]  kthread+0x1a4/0x1b8
[   66.234552]  ret_from_fork+0x10/0x20
[   66.234935] 
[   66.235101] Allocated by task 163:
[   66.235447]  kasan_save_stack+0x2c/0x58
[   66.235826]  kasan_set_track+0x2c/0x40
[   66.236190]  kasan_save_alloc_info+0x24/0x38
[   66.236624]  __kasan_kmalloc+0xa0/0xb8
[   66.236983]  kmalloc_trace+0x50/0x68
[   66.237368]  kasan_bitops_generic+0x90/0x128
[   66.237810]  kunit_try_run_case+0x7c/0x120
[   66.238224]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.238716]  kthread+0x1a4/0x1b8
[   66.239045]  ret_from_fork+0x10/0x20
[   66.239565] 
[   66.239758] The buggy address belongs to the object at ffff0000c586c700
[   66.239758]  which belongs to the cache kmalloc-128 of size 128
[   66.240597] The buggy address is located 8 bytes inside of
[   66.240597]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.241399] 
[   66.241568] The buggy address belongs to the physical page:
[   66.242139] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.242868] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.243474] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.244074] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.244634] page dumped because: kasan: bad access detected
[   66.245039] 
[   66.245224] Memory state around the buggy address:
[   66.245832]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.246432]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.246985] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.247508]                       ^
[   66.247841]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.248413]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.248945] ==================================================================
[   66.350431] ==================================================================
[   66.350944] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x204/0x6a8
[   66.351668] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.352223] 
[   66.352446] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.353039] Hardware name: linux,dummy-virt (DT)
[   66.353455] Call trace:
[   66.353692]  dump_backtrace+0x110/0x120
[   66.354173]  show_stack+0x18/0x28
[   66.354587]  dump_stack_lvl+0x68/0x84
[   66.354993]  print_report+0x158/0x484
[   66.355503]  kasan_report+0x98/0xe0
[   66.355863]  kasan_check_range+0x160/0x1d8
[   66.356276]  __kasan_check_write+0x28/0x38
[   66.356699]  kasan_bitops_modify.constprop.5+0x204/0x6a8
[   66.357218]  kasan_bitops_generic+0xac/0x128
[   66.357911]  kunit_try_run_case+0x7c/0x120
[   66.358360]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.358869]  kthread+0x1a4/0x1b8
[   66.359209]  ret_from_fork+0x10/0x20
[   66.359577] 
[   66.359740] Allocated by task 163:
[   66.360078]  kasan_save_stack+0x2c/0x58
[   66.360453]  kasan_set_track+0x2c/0x40
[   66.360816]  kasan_save_alloc_info+0x24/0x38
[   66.361245]  __kasan_kmalloc+0xa0/0xb8
[   66.361753]  kmalloc_trace+0x50/0x68
[   66.362116]  kasan_bitops_generic+0x90/0x128
[   66.362529]  kunit_try_run_case+0x7c/0x120
[   66.362952]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.363487]  kthread+0x1a4/0x1b8
[   66.363841]  ret_from_fork+0x10/0x20
[   66.364211] 
[   66.364410] The buggy address belongs to the object at ffff0000c586c700
[   66.364410]  which belongs to the cache kmalloc-128 of size 128
[   66.365253] The buggy address is located 8 bytes inside of
[   66.365253]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.366205] 
[   66.366397] The buggy address belongs to the physical page:
[   66.366848] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.367546] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.368144] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.368780] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.369358] page dumped because: kasan: bad access detected
[   66.370341] 
[   66.370534] Memory state around the buggy address:
[   66.370938]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.371513]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.372059] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.372588]                       ^
[   66.372892]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.373634]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.374176] ==================================================================
[   66.276390] ==================================================================
[   66.276846] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x1b8/0x6a8
[   66.277632] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.278210] 
[   66.278406] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.279423] Hardware name: linux,dummy-virt (DT)
[   66.279922] Call trace:
[   66.280290]  dump_backtrace+0x110/0x120
[   66.280804]  show_stack+0x18/0x28
[   66.281302]  dump_stack_lvl+0x68/0x84
[   66.281846]  print_report+0x158/0x484
[   66.282331]  kasan_report+0x98/0xe0
[   66.282750]  kasan_check_range+0x160/0x1d8
[   66.283278]  __kasan_check_write+0x28/0x38
[   66.283661]  kasan_bitops_modify.constprop.5+0x1b8/0x6a8
[   66.284173]  kasan_bitops_generic+0xac/0x128
[   66.284628]  kunit_try_run_case+0x7c/0x120
[   66.285070]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.285603]  kthread+0x1a4/0x1b8
[   66.286009]  ret_from_fork+0x10/0x20
[   66.286426] 
[   66.286585] Allocated by task 163:
[   66.286915]  kasan_save_stack+0x2c/0x58
[   66.287368]  kasan_set_track+0x2c/0x40
[   66.287753]  kasan_save_alloc_info+0x24/0x38
[   66.288165]  __kasan_kmalloc+0xa0/0xb8
[   66.288539]  kmalloc_trace+0x50/0x68
[   66.288910]  kasan_bitops_generic+0x90/0x128
[   66.289369]  kunit_try_run_case+0x7c/0x120
[   66.289894]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.290431]  kthread+0x1a4/0x1b8
[   66.290762]  ret_from_fork+0x10/0x20
[   66.291128] 
[   66.291325] The buggy address belongs to the object at ffff0000c586c700
[   66.291325]  which belongs to the cache kmalloc-128 of size 128
[   66.292159] The buggy address is located 8 bytes inside of
[   66.292159]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.292948] 
[   66.293156] The buggy address belongs to the physical page:
[   66.293788] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.294474] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.295123] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.295713] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.296293] page dumped because: kasan: bad access detected
[   66.296744] 
[   66.296933] Memory state around the buggy address:
[   66.297310]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.298575]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.299121] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.299681]                       ^
[   66.299988]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.300569]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.301089] ==================================================================

[   32.313841] ==================================================================
[   32.314127] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x180/0x5a0
[   32.314655] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.315032] 
[   32.315155] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.315846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.316271] Call Trace:
[   32.316513]  <TASK>
[   32.316645]  dump_stack_lvl+0x49/0x62
[   32.316850]  print_report+0x189/0x492
[   32.317073]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.317452]  ? kasan_bitops_modify.constprop.0+0x180/0x5a0
[   32.317792]  kasan_report+0x10c/0x190
[   32.318036]  ? kasan_bitops_modify.constprop.0+0x180/0x5a0
[   32.318412]  kasan_check_range+0x10b/0x1c0
[   32.318621]  __kasan_check_write+0x14/0x20
[   32.318864]  kasan_bitops_modify.constprop.0+0x180/0x5a0
[   32.319094]  ? kasan_test_exit+0xe0/0xe0
[   32.319335]  ? kasan_set_track+0x25/0x40
[   32.319620]  ? kasan_save_alloc_info+0x1e/0x30
[   32.319826]  ? __kasan_kmalloc+0xb6/0xc0
[   32.320084]  kasan_bitops_generic+0xa1/0x120
[   32.320343]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.320846]  ? kasan_test_init+0x13e/0x1b0
[   32.321133]  kunit_try_run_case+0x8f/0xd0
[   32.321413]  ? kunit_catch_run_case+0x80/0x80
[   32.321716]  ? kunit_try_catch_throw+0x40/0x40
[   32.322072]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.322482]  kthread+0x17b/0x1b0
[   32.322691]  ? kthread_complete_and_exit+0x30/0x30
[   32.322968]  ret_from_fork+0x22/0x30
[   32.323216]  </TASK>
[   32.323371] 
[   32.323553] Allocated by task 269:
[   32.323760]  kasan_save_stack+0x41/0x70
[   32.323974]  kasan_set_track+0x25/0x40
[   32.324231]  kasan_save_alloc_info+0x1e/0x30
[   32.324434]  __kasan_kmalloc+0xb6/0xc0
[   32.324685]  kmalloc_trace+0x48/0xb0
[   32.324891]  kasan_bitops_generic+0x86/0x120
[   32.325096]  kunit_try_run_case+0x8f/0xd0
[   32.325417]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.325702]  kthread+0x17b/0x1b0
[   32.325869]  ret_from_fork+0x22/0x30
[   32.326079] 
[   32.326414] The buggy address belongs to the object at ffff888102f54b60
[   32.326414]  which belongs to the cache kmalloc-16 of size 16
[   32.327202] The buggy address is located 8 bytes inside of
[   32.327202]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.327934] 
[   32.328059] The buggy address belongs to the physical page:
[   32.328363] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.328722] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.329130] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.329533] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.330115] page dumped because: kasan: bad access detected
[   32.330355] 
[   32.330466] Memory state around the buggy address:
[   32.330732]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.331196]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.331585] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.331921]                                                           ^
[   32.332209]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.332581]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.333064] ==================================================================
[   32.274579] ==================================================================
[   32.274953] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x10e/0x5a0
[   32.275426] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.275712] 
[   32.275806] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.276184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.276635] Call Trace:
[   32.276754]  <TASK>
[   32.276860]  dump_stack_lvl+0x49/0x62
[   32.277051]  print_report+0x189/0x492
[   32.277502]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.277797]  ? kasan_bitops_modify.constprop.0+0x10e/0x5a0
[   32.278108]  kasan_report+0x10c/0x190
[   32.278444]  ? kasan_bitops_modify.constprop.0+0x10e/0x5a0
[   32.278742]  kasan_check_range+0x10b/0x1c0
[   32.278935]  __kasan_check_write+0x14/0x20
[   32.279115]  kasan_bitops_modify.constprop.0+0x10e/0x5a0
[   32.279341]  ? kasan_test_exit+0xe0/0xe0
[   32.279555]  ? kasan_set_track+0x25/0x40
[   32.279817]  ? kasan_save_alloc_info+0x1e/0x30
[   32.280100]  ? __kasan_kmalloc+0xb6/0xc0
[   32.280446]  kasan_bitops_generic+0xa1/0x120
[   32.280643]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.280904]  ? kasan_test_init+0x13e/0x1b0
[   32.281278]  kunit_try_run_case+0x8f/0xd0
[   32.281525]  ? kunit_catch_run_case+0x80/0x80
[   32.281984]  ? kunit_try_catch_throw+0x40/0x40
[   32.282258]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.282623]  kthread+0x17b/0x1b0
[   32.282841]  ? kthread_complete_and_exit+0x30/0x30
[   32.283098]  ret_from_fork+0x22/0x30
[   32.283356]  </TASK>
[   32.283501] 
[   32.283595] Allocated by task 269:
[   32.283739]  kasan_save_stack+0x41/0x70
[   32.283921]  kasan_set_track+0x25/0x40
[   32.284100]  kasan_save_alloc_info+0x1e/0x30
[   32.284435]  __kasan_kmalloc+0xb6/0xc0
[   32.284750]  kmalloc_trace+0x48/0xb0
[   32.285094]  kasan_bitops_generic+0x86/0x120
[   32.285354]  kunit_try_run_case+0x8f/0xd0
[   32.285535]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.285944]  kthread+0x17b/0x1b0
[   32.286151]  ret_from_fork+0x22/0x30
[   32.286364] 
[   32.286479] The buggy address belongs to the object at ffff888102f54b60
[   32.286479]  which belongs to the cache kmalloc-16 of size 16
[   32.286925] The buggy address is located 8 bytes inside of
[   32.286925]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.287782] 
[   32.287892] The buggy address belongs to the physical page:
[   32.288141] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.288588] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.288811] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.289076] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.289745] page dumped because: kasan: bad access detected
[   32.290264] 
[   32.290386] Memory state around the buggy address:
[   32.290606]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.290858]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.291294] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.291985]                                                           ^
[   32.292332]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.292607]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.293047] ==================================================================
[   32.353125] ==================================================================
[   32.353557] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1f2/0x5a0
[   32.353928] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.354349] 
[   32.354458] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.355071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.355608] Call Trace:
[   32.355775]  <TASK>
[   32.355902]  dump_stack_lvl+0x49/0x62
[   32.356141]  print_report+0x189/0x492
[   32.356429]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.356794]  ? kasan_bitops_modify.constprop.0+0x1f2/0x5a0
[   32.357078]  kasan_report+0x10c/0x190
[   32.357365]  ? kasan_bitops_modify.constprop.0+0x1f2/0x5a0
[   32.357646]  kasan_check_range+0x10b/0x1c0
[   32.357867]  __kasan_check_write+0x14/0x20
[   32.358115]  kasan_bitops_modify.constprop.0+0x1f2/0x5a0
[   32.358365]  ? kasan_test_exit+0xe0/0xe0
[   32.358632]  ? kasan_set_track+0x25/0x40
[   32.359142]  ? kasan_save_alloc_info+0x1e/0x30
[   32.359575]  ? __kasan_kmalloc+0xb6/0xc0
[   32.359847]  kasan_bitops_generic+0xa1/0x120
[   32.360054]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.360396]  ? kasan_test_init+0x13e/0x1b0
[   32.360746]  kunit_try_run_case+0x8f/0xd0
[   32.361016]  ? kunit_catch_run_case+0x80/0x80
[   32.361338]  ? kunit_try_catch_throw+0x40/0x40
[   32.361857]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.362150]  kthread+0x17b/0x1b0
[   32.362621]  ? kthread_complete_and_exit+0x30/0x30
[   32.362874]  ret_from_fork+0x22/0x30
[   32.363125]  </TASK>
[   32.363327] 
[   32.363525] Allocated by task 269:
[   32.363680]  kasan_save_stack+0x41/0x70
[   32.363928]  kasan_set_track+0x25/0x40
[   32.364170]  kasan_save_alloc_info+0x1e/0x30
[   32.364510]  __kasan_kmalloc+0xb6/0xc0
[   32.364742]  kmalloc_trace+0x48/0xb0
[   32.364965]  kasan_bitops_generic+0x86/0x120
[   32.365216]  kunit_try_run_case+0x8f/0xd0
[   32.365550]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.365789]  kthread+0x17b/0x1b0
[   32.365997]  ret_from_fork+0x22/0x30
[   32.366232] 
[   32.366591] The buggy address belongs to the object at ffff888102f54b60
[   32.366591]  which belongs to the cache kmalloc-16 of size 16
[   32.367093] The buggy address is located 8 bytes inside of
[   32.367093]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.367682] 
[   32.367775] The buggy address belongs to the physical page:
[   32.368012] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.368479] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.368846] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.369239] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.369713] page dumped because: kasan: bad access detected
[   32.369994] 
[   32.370083] Memory state around the buggy address:
[   32.370321]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.370897]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.371272] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.371754]                                                           ^
[   32.372059]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.372388]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.372767] ==================================================================
[   32.333462] ==================================================================
[   32.333838] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1b7/0x5a0
[   32.334251] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.334819] 
[   32.334954] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.335502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.335836] Call Trace:
[   32.336002]  <TASK>
[   32.336152]  dump_stack_lvl+0x49/0x62
[   32.336557]  print_report+0x189/0x492
[   32.336801]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.337063]  ? kasan_bitops_modify.constprop.0+0x1b7/0x5a0
[   32.337370]  kasan_report+0x10c/0x190
[   32.337706]  ? kasan_bitops_modify.constprop.0+0x1b7/0x5a0
[   32.338005]  kasan_check_range+0x10b/0x1c0
[   32.338276]  __kasan_check_write+0x14/0x20
[   32.338478]  kasan_bitops_modify.constprop.0+0x1b7/0x5a0
[   32.339035]  ? kasan_test_exit+0xe0/0xe0
[   32.339264]  ? kasan_set_track+0x25/0x40
[   32.339691]  ? kasan_save_alloc_info+0x1e/0x30
[   32.339955]  ? __kasan_kmalloc+0xb6/0xc0
[   32.340222]  kasan_bitops_generic+0xa1/0x120
[   32.340577]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.340902]  ? kasan_test_init+0x13e/0x1b0
[   32.341115]  kunit_try_run_case+0x8f/0xd0
[   32.341455]  ? kunit_catch_run_case+0x80/0x80
[   32.341683]  ? kunit_try_catch_throw+0x40/0x40
[   32.341939]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.342197]  kthread+0x17b/0x1b0
[   32.342655]  ? kthread_complete_and_exit+0x30/0x30
[   32.342911]  ret_from_fork+0x22/0x30
[   32.343151]  </TASK>
[   32.343322] 
[   32.343423] Allocated by task 269:
[   32.343669]  kasan_save_stack+0x41/0x70
[   32.343880]  kasan_set_track+0x25/0x40
[   32.344117]  kasan_save_alloc_info+0x1e/0x30
[   32.344406]  __kasan_kmalloc+0xb6/0xc0
[   32.344582]  kmalloc_trace+0x48/0xb0
[   32.344817]  kasan_bitops_generic+0x86/0x120
[   32.345073]  kunit_try_run_case+0x8f/0xd0
[   32.345312]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.345536]  kthread+0x17b/0x1b0
[   32.345738]  ret_from_fork+0x22/0x30
[   32.346178] 
[   32.346299] The buggy address belongs to the object at ffff888102f54b60
[   32.346299]  which belongs to the cache kmalloc-16 of size 16
[   32.347052] The buggy address is located 8 bytes inside of
[   32.347052]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.347702] 
[   32.347819] The buggy address belongs to the physical page:
[   32.348031] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.348514] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.348817] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.349187] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.349692] page dumped because: kasan: bad access detected
[   32.349949] 
[   32.350059] Memory state around the buggy address:
[   32.350346]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.350921]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.351241] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.351660]                                                           ^
[   32.351967]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.352377]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.352686] ==================================================================
[   32.373526] ==================================================================
[   32.373833] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x229/0x5a0
[   32.374286] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.374650] 
[   32.374773] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.375102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.375594] Call Trace:
[   32.375742]  <TASK>
[   32.375856]  dump_stack_lvl+0x49/0x62
[   32.376127]  print_report+0x189/0x492
[   32.376704]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.377009]  ? kasan_bitops_modify.constprop.0+0x229/0x5a0
[   32.377439]  kasan_report+0x10c/0x190
[   32.377670]  ? kasan_bitops_modify.constprop.0+0x229/0x5a0
[   32.377945]  kasan_check_range+0x10b/0x1c0
[   32.378214]  __kasan_check_write+0x14/0x20
[   32.378540]  kasan_bitops_modify.constprop.0+0x229/0x5a0
[   32.378784]  ? kasan_test_exit+0xe0/0xe0
[   32.379032]  ? kasan_set_track+0x25/0x40
[   32.379316]  ? kasan_save_alloc_info+0x1e/0x30
[   32.379549]  ? __kasan_kmalloc+0xb6/0xc0
[   32.379785]  kasan_bitops_generic+0xa1/0x120
[   32.380011]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.380345]  ? kasan_test_init+0x13e/0x1b0
[   32.380960]  kunit_try_run_case+0x8f/0xd0
[   32.381240]  ? kunit_catch_run_case+0x80/0x80
[   32.381595]  ? kunit_try_catch_throw+0x40/0x40
[   32.381865]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.382194]  kthread+0x17b/0x1b0
[   32.382482]  ? kthread_complete_and_exit+0x30/0x30
[   32.382721]  ret_from_fork+0x22/0x30
[   32.382962]  </TASK>
[   32.383102] 
[   32.383204] Allocated by task 269:
[   32.383379]  kasan_save_stack+0x41/0x70
[   32.383663]  kasan_set_track+0x25/0x40
[   32.383860]  kasan_save_alloc_info+0x1e/0x30
[   32.384109]  __kasan_kmalloc+0xb6/0xc0
[   32.384363]  kmalloc_trace+0x48/0xb0
[   32.384542]  kasan_bitops_generic+0x86/0x120
[   32.384777]  kunit_try_run_case+0x8f/0xd0
[   32.385006]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.385263]  kthread+0x17b/0x1b0
[   32.385463]  ret_from_fork+0x22/0x30
[   32.385765] 
[   32.385857] The buggy address belongs to the object at ffff888102f54b60
[   32.385857]  which belongs to the cache kmalloc-16 of size 16
[   32.386736] The buggy address is located 8 bytes inside of
[   32.386736]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.387256] 
[   32.387455] The buggy address belongs to the physical page:
[   32.387675] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.388068] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.388396] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.388975] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.389383] page dumped because: kasan: bad access detected
[   32.389694] 
[   32.389805] Memory state around the buggy address:
[   32.390038]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.390610]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.390923] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.391310]                                                           ^
[   32.391700]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.392029]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.392599] ==================================================================
[   32.255953] ==================================================================
[   32.256326] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xd3/0x5a0
[   32.256814] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.257175] 
[   32.257340] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.257697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.258103] Call Trace:
[   32.258248]  <TASK>
[   32.258436]  dump_stack_lvl+0x49/0x62
[   32.258675]  print_report+0x189/0x492
[   32.258921]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.259223]  ? kasan_bitops_modify.constprop.0+0xd3/0x5a0
[   32.259655]  kasan_report+0x10c/0x190
[   32.259875]  ? kasan_bitops_modify.constprop.0+0xd3/0x5a0
[   32.260188]  kasan_check_range+0x10b/0x1c0
[   32.260407]  __kasan_check_write+0x14/0x20
[   32.260701]  kasan_bitops_modify.constprop.0+0xd3/0x5a0
[   32.261024]  ? kasan_test_exit+0xe0/0xe0
[   32.261307]  ? kasan_set_track+0x25/0x40
[   32.261642]  ? kasan_save_alloc_info+0x1e/0x30
[   32.261860]  ? __kasan_kmalloc+0xb6/0xc0
[   32.262125]  kasan_bitops_generic+0xa1/0x120
[   32.262369]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.262652]  ? kasan_test_init+0x13e/0x1b0
[   32.262920]  kunit_try_run_case+0x8f/0xd0
[   32.263127]  ? kunit_catch_run_case+0x80/0x80
[   32.263555]  ? kunit_try_catch_throw+0x40/0x40
[   32.263810]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.264121]  kthread+0x17b/0x1b0
[   32.264289]  ? kthread_complete_and_exit+0x30/0x30
[   32.264604]  ret_from_fork+0x22/0x30
[   32.264965]  </TASK>
[   32.265082] 
[   32.265199] Allocated by task 269:
[   32.265556]  kasan_save_stack+0x41/0x70
[   32.265791]  kasan_set_track+0x25/0x40
[   32.266027]  kasan_save_alloc_info+0x1e/0x30
[   32.266256]  __kasan_kmalloc+0xb6/0xc0
[   32.266532]  kmalloc_trace+0x48/0xb0
[   32.266708]  kasan_bitops_generic+0x86/0x120
[   32.266915]  kunit_try_run_case+0x8f/0xd0
[   32.267151]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.267464]  kthread+0x17b/0x1b0
[   32.267616]  ret_from_fork+0x22/0x30
[   32.267781] 
[   32.267888] The buggy address belongs to the object at ffff888102f54b60
[   32.267888]  which belongs to the cache kmalloc-16 of size 16
[   32.268473] The buggy address is located 8 bytes inside of
[   32.268473]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.269241] 
[   32.269367] The buggy address belongs to the physical page:
[   32.269620] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.270103] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.270496] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.270861] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.271125] page dumped because: kasan: bad access detected
[   32.271451] 
[   32.271557] Memory state around the buggy address:
[   32.271775]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.272157]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.272630] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.272981]                                                           ^
[   32.273304]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.273581]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.274008] ==================================================================
[   32.294032] ==================================================================
[   32.294353] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x145/0x5a0
[   32.294840] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.295178] 
[   32.295361] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.295839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.296182] Call Trace:
[   32.296313]  <TASK>
[   32.296427]  dump_stack_lvl+0x49/0x62
[   32.296751]  print_report+0x189/0x492
[   32.297008]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.297328]  ? kasan_bitops_modify.constprop.0+0x145/0x5a0
[   32.297807]  kasan_report+0x10c/0x190
[   32.298065]  ? kasan_bitops_modify.constprop.0+0x145/0x5a0
[   32.298440]  kasan_check_range+0x10b/0x1c0
[   32.298647]  __kasan_check_write+0x14/0x20
[   32.298834]  kasan_bitops_modify.constprop.0+0x145/0x5a0
[   32.299130]  ? kasan_test_exit+0xe0/0xe0
[   32.299382]  ? kasan_set_track+0x25/0x40
[   32.299736]  ? kasan_save_alloc_info+0x1e/0x30
[   32.300328]  ? __kasan_kmalloc+0xb6/0xc0
[   32.300639]  kasan_bitops_generic+0xa1/0x120
[   32.300908]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.301229]  ? kasan_test_init+0x13e/0x1b0
[   32.301553]  kunit_try_run_case+0x8f/0xd0
[   32.301755]  ? kunit_catch_run_case+0x80/0x80
[   32.301975]  ? kunit_try_catch_throw+0x40/0x40
[   32.302247]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.302661]  kthread+0x17b/0x1b0
[   32.302872]  ? kthread_complete_and_exit+0x30/0x30
[   32.303140]  ret_from_fork+0x22/0x30
[   32.303341]  </TASK>
[   32.303727] 
[   32.303855] Allocated by task 269:
[   32.304051]  kasan_save_stack+0x41/0x70
[   32.304333]  kasan_set_track+0x25/0x40
[   32.304676]  kasan_save_alloc_info+0x1e/0x30
[   32.304921]  __kasan_kmalloc+0xb6/0xc0
[   32.305103]  kmalloc_trace+0x48/0xb0
[   32.305282]  kasan_bitops_generic+0x86/0x120
[   32.305531]  kunit_try_run_case+0x8f/0xd0
[   32.305767]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.306333]  kthread+0x17b/0x1b0
[   32.306566]  ret_from_fork+0x22/0x30
[   32.306742] 
[   32.306853] The buggy address belongs to the object at ffff888102f54b60
[   32.306853]  which belongs to the cache kmalloc-16 of size 16
[   32.307776] The buggy address is located 8 bytes inside of
[   32.307776]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.308267] 
[   32.308506] The buggy address belongs to the physical page:
[   32.308736] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.309173] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.309411] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.309943] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.310264] page dumped because: kasan: bad access detected
[   32.310622] 
[   32.310787] Memory state around the buggy address:
[   32.311005]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.311602]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.311929] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.312223]                                                           ^
[   32.312598]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.312939]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.313311] ==================================================================
[   32.227592] ==================================================================
[   32.230201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x5a0
[   32.230964] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.232506] 
[   32.233105] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.234538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.234940] Call Trace:
[   32.235108]  <TASK>
[   32.235249]  dump_stack_lvl+0x49/0x62
[   32.235824]  print_report+0x189/0x492
[   32.236031]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.236567]  ? kasan_bitops_modify.constprop.0+0x9c/0x5a0
[   32.236856]  kasan_report+0x10c/0x190
[   32.237125]  ? kasan_bitops_modify.constprop.0+0x9c/0x5a0
[   32.237576]  kasan_check_range+0x10b/0x1c0
[   32.237816]  __kasan_check_write+0x14/0x20
[   32.238048]  kasan_bitops_modify.constprop.0+0x9c/0x5a0
[   32.238357]  ? kasan_test_exit+0xe0/0xe0
[   32.238587]  ? kasan_set_track+0x25/0x40
[   32.238924]  ? kasan_save_alloc_info+0x1e/0x30
[   32.239185]  ? __kasan_kmalloc+0xb6/0xc0
[   32.239771]  kasan_bitops_generic+0xa1/0x120
[   32.240140]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.240636]  ? kasan_test_init+0x13e/0x1b0
[   32.241122]  kunit_try_run_case+0x8f/0xd0
[   32.241489]  ? kunit_catch_run_case+0x80/0x80
[   32.241716]  ? kunit_try_catch_throw+0x40/0x40
[   32.242254]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.242654]  kthread+0x17b/0x1b0
[   32.243070]  ? kthread_complete_and_exit+0x30/0x30
[   32.243757]  ret_from_fork+0x22/0x30
[   32.244218]  </TASK>
[   32.244612] 
[   32.244712] Allocated by task 269:
[   32.244858]  kasan_save_stack+0x41/0x70
[   32.245053]  kasan_set_track+0x25/0x40
[   32.245257]  kasan_save_alloc_info+0x1e/0x30
[   32.245522]  __kasan_kmalloc+0xb6/0xc0
[   32.245829]  kmalloc_trace+0x48/0xb0
[   32.245997]  kasan_bitops_generic+0x86/0x120
[   32.246254]  kunit_try_run_case+0x8f/0xd0
[   32.246932]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.247364]  kthread+0x17b/0x1b0
[   32.247686]  ret_from_fork+0x22/0x30
[   32.248013] 
[   32.248114] The buggy address belongs to the object at ffff888102f54b60
[   32.248114]  which belongs to the cache kmalloc-16 of size 16
[   32.249031] The buggy address is located 8 bytes inside of
[   32.249031]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.249803] 
[   32.249903] The buggy address belongs to the physical page:
[   32.250356] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.250875] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.251336] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.251817] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.252276] page dumped because: kasan: bad access detected
[   32.252685] 
[   32.252800] Memory state around the buggy address:
[   32.253072]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.253366]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.253794] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.254198]                                                           ^
[   32.254496]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.254869]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.255186] ==================================================================