Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  107.866979] ==================================================================
[  107.867550] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0x770
[  107.868419] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.869112] 
[  107.869331] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.870085] Hardware name: linux,dummy-virt (DT)
[  107.870481] Call trace:
[  107.870785]  dump_backtrace+0xe0/0x134
[  107.871200]  show_stack+0x20/0x2c
[  107.871590]  dump_stack_lvl+0x88/0xb4
[  107.872071]  print_report+0x158/0x44c
[  107.872477]  kasan_report+0xc8/0x180
[  107.872907]  __asan_load8+0x80/0xac
[  107.873310]  kasan_bitops_test_and_modify.constprop.0+0x1e4/0x770
[  107.873927]  kasan_bitops_generic+0xc0/0x140
[  107.874370]  kunit_try_run_case+0x8c/0x124
[  107.874881]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.875435]  kthread+0x15c/0x170
[  107.875842]  ret_from_fork+0x10/0x20
[  107.876290] 
[  107.876492] Allocated by task 249:
[  107.876840]  kasan_save_stack+0x3c/0x70
[  107.877328]  kasan_set_track+0x2c/0x40
[  107.877729]  kasan_save_alloc_info+0x24/0x34
[  107.878218]  __kasan_kmalloc+0xd4/0xe0
[  107.878619]  kmalloc_trace+0x8c/0x150
[  107.879057]  kasan_bitops_generic+0x98/0x140
[  107.879522]  kunit_try_run_case+0x8c/0x124
[  107.880008]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.880579]  kthread+0x15c/0x170
[  107.881016]  ret_from_fork+0x10/0x20
[  107.881450] 
[  107.881686] The buggy address belongs to the object at ffff0000c66ab600
[  107.881686]  which belongs to the cache kmalloc-128 of size 128
[  107.882635] The buggy address is located 8 bytes inside of
[  107.882635]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.883550] 
[  107.883787] The buggy address belongs to the physical page:
[  107.884265] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.885056] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.885736] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.886396] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.887035] page dumped because: kasan: bad access detected
[  107.887512] 
[  107.887715] Memory state around the buggy address:
[  107.888146]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.888803]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.889413] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.890010]                       ^
[  107.890375]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.890999]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.891601] ==================================================================
[  107.812051] ==================================================================
[  107.812918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x190/0x770
[  107.813711] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.814305] 
[  107.814513] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.815192] Hardware name: linux,dummy-virt (DT)
[  107.815619] Call trace:
[  107.815897]  dump_backtrace+0xe0/0x134
[  107.816357]  show_stack+0x20/0x2c
[  107.816795]  dump_stack_lvl+0x88/0xb4
[  107.817231]  print_report+0x158/0x44c
[  107.817641]  kasan_report+0xc8/0x180
[  107.818089]  kasan_check_range+0xe4/0x190
[  107.818522]  __kasan_check_write+0x28/0x3c
[  107.819034]  kasan_bitops_test_and_modify.constprop.0+0x190/0x770
[  107.819605]  kasan_bitops_generic+0xc0/0x140
[  107.820066]  kunit_try_run_case+0x8c/0x124
[  107.821226]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.821765]  kthread+0x15c/0x170
[  107.822386]  ret_from_fork+0x10/0x20
[  107.822853] 
[  107.823054] Allocated by task 249:
[  107.823372]  kasan_save_stack+0x3c/0x70
[  107.823862]  kasan_set_track+0x2c/0x40
[  107.824350]  kasan_save_alloc_info+0x24/0x34
[  107.824897]  __kasan_kmalloc+0xd4/0xe0
[  107.825378]  kmalloc_trace+0x8c/0x150
[  107.825805]  kasan_bitops_generic+0x98/0x140
[  107.826282]  kunit_try_run_case+0x8c/0x124
[  107.826758]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.827330]  kthread+0x15c/0x170
[  107.827820]  ret_from_fork+0x10/0x20
[  107.828233] 
[  107.828469] The buggy address belongs to the object at ffff0000c66ab600
[  107.828469]  which belongs to the cache kmalloc-128 of size 128
[  107.829546] The buggy address is located 8 bytes inside of
[  107.829546]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.830606] 
[  107.830922] The buggy address belongs to the physical page:
[  107.831495] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.832379] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.833235] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.833983] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.834585] page dumped because: kasan: bad access detected
[  107.835158] 
[  107.835355] Memory state around the buggy address:
[  107.836004]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.836606]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.837309] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.837996]                       ^
[  107.838447]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.839150]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.839817] ==================================================================
[  107.683027] ==================================================================
[  107.683543] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xcc/0x770
[  107.684482] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.685111] 
[  107.685361] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.686047] Hardware name: linux,dummy-virt (DT)
[  107.686516] Call trace:
[  107.686799]  dump_backtrace+0xe0/0x134
[  107.687213]  show_stack+0x20/0x2c
[  107.687607]  dump_stack_lvl+0x88/0xb4
[  107.688115]  print_report+0x158/0x44c
[  107.688527]  kasan_report+0xc8/0x180
[  107.688968]  __asan_load8+0x80/0xac
[  107.689382]  kasan_bitops_test_and_modify.constprop.0+0xcc/0x770
[  107.689997]  kasan_bitops_generic+0xc0/0x140
[  107.690454]  kunit_try_run_case+0x8c/0x124
[  107.690905]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.691499]  kthread+0x15c/0x170
[  107.691912]  ret_from_fork+0x10/0x20
[  107.692313] 
[  107.692515] Allocated by task 249:
[  107.692851]  kasan_save_stack+0x3c/0x70
[  107.693277]  kasan_set_track+0x2c/0x40
[  107.693714]  kasan_save_alloc_info+0x24/0x34
[  107.694194]  __kasan_kmalloc+0xd4/0xe0
[  107.694635]  kmalloc_trace+0x8c/0x150
[  107.695080]  kasan_bitops_generic+0x98/0x140
[  107.695536]  kunit_try_run_case+0x8c/0x124
[  107.695993]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.696583]  kthread+0x15c/0x170
[  107.697026]  ret_from_fork+0x10/0x20
[  107.697415] 
[  107.697614] The buggy address belongs to the object at ffff0000c66ab600
[  107.697614]  which belongs to the cache kmalloc-128 of size 128
[  107.698541] The buggy address is located 8 bytes inside of
[  107.698541]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.699425] 
[  107.699651] The buggy address belongs to the physical page:
[  107.700133] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.700894] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.701580] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.702222] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.702820] page dumped because: kasan: bad access detected
[  107.703289] 
[  107.703503] Memory state around the buggy address:
[  107.703916]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.704552]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.705178] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.705774]                       ^
[  107.706132]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.706762]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.707342] ==================================================================
[  107.708564] ==================================================================
[  107.709170] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xf8/0x770
[  107.710042] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.710637] 
[  107.710860] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.711588] Hardware name: linux,dummy-virt (DT)
[  107.712023] Call trace:
[  107.712288]  dump_backtrace+0xe0/0x134
[  107.712718]  show_stack+0x20/0x2c
[  107.713123]  dump_stack_lvl+0x88/0xb4
[  107.713584]  print_report+0x158/0x44c
[  107.714019]  kasan_report+0xc8/0x180
[  107.714456]  kasan_check_range+0xe4/0x190
[  107.714911]  __kasan_check_write+0x28/0x3c
[  107.715386]  kasan_bitops_test_and_modify.constprop.0+0xf8/0x770
[  107.715987]  kasan_bitops_generic+0xc0/0x140
[  107.716474]  kunit_try_run_case+0x8c/0x124
[  107.716978]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.717715]  kthread+0x15c/0x170
[  107.718175]  ret_from_fork+0x10/0x20
[  107.718621] 
[  107.718818] Allocated by task 249:
[  107.719453]  kasan_save_stack+0x3c/0x70
[  107.720015]  kasan_set_track+0x2c/0x40
[  107.720561]  kasan_save_alloc_info+0x24/0x34
[  107.721176]  __kasan_kmalloc+0xd4/0xe0
[  107.721721]  kmalloc_trace+0x8c/0x150
[  107.722261]  kasan_bitops_generic+0x98/0x140
[  107.722833]  kunit_try_run_case+0x8c/0x124
[  107.723449]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.724125]  kthread+0x15c/0x170
[  107.724637]  ret_from_fork+0x10/0x20
[  107.725096] 
[  107.725301] The buggy address belongs to the object at ffff0000c66ab600
[  107.725301]  which belongs to the cache kmalloc-128 of size 128
[  107.726225] The buggy address is located 8 bytes inside of
[  107.726225]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.727136] 
[  107.727339] The buggy address belongs to the physical page:
[  107.727811] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.728568] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.729209] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.729877] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.730484] page dumped because: kasan: bad access detected
[  107.730970] 
[  107.731166] Memory state around the buggy address:
[  107.731634]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.732267]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.732892] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.733478]                       ^
[  107.733842]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.734463]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.735058] ==================================================================
[  107.892590] ==================================================================
[  107.893142] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x210/0x770
[  107.893963] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.894590] 
[  107.894817] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.895513] Hardware name: linux,dummy-virt (DT)
[  107.895931] Call trace:
[  107.896209]  dump_backtrace+0xe0/0x134
[  107.896695]  show_stack+0x20/0x2c
[  107.897142]  dump_stack_lvl+0x88/0xb4
[  107.897621]  print_report+0x158/0x44c
[  107.898054]  kasan_report+0xc8/0x180
[  107.898488]  kasan_check_range+0xe4/0x190
[  107.898945]  __kasan_check_write+0x28/0x3c
[  107.899425]  kasan_bitops_test_and_modify.constprop.0+0x210/0x770
[  107.900011]  kasan_bitops_generic+0xc0/0x140
[  107.900452]  kunit_try_run_case+0x8c/0x124
[  107.900910]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.901484]  kthread+0x15c/0x170
[  107.901943]  ret_from_fork+0x10/0x20
[  107.902346] 
[  107.902558] Allocated by task 249:
[  107.902897]  kasan_save_stack+0x3c/0x70
[  107.903346]  kasan_set_track+0x2c/0x40
[  107.903806]  kasan_save_alloc_info+0x24/0x34
[  107.904281]  __kasan_kmalloc+0xd4/0xe0
[  107.904726]  kmalloc_trace+0x8c/0x150
[  107.905157]  kasan_bitops_generic+0x98/0x140
[  107.905630]  kunit_try_run_case+0x8c/0x124
[  107.906133]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.906757]  kthread+0x15c/0x170
[  107.907153]  ret_from_fork+0x10/0x20
[  107.907579] 
[  107.907798] The buggy address belongs to the object at ffff0000c66ab600
[  107.907798]  which belongs to the cache kmalloc-128 of size 128
[  107.908753] The buggy address is located 8 bytes inside of
[  107.908753]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.909671] 
[  107.909917] The buggy address belongs to the physical page:
[  107.910392] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.911169] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.911831] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.912510] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.913158] page dumped because: kasan: bad access detected
[  107.913641] 
[  107.913862] Memory state around the buggy address:
[  107.914308]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.914934]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.915581] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.916182]                       ^
[  107.916561]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.917210]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.917812] ==================================================================
[  107.761057] ==================================================================
[  107.761660] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x138/0x770
[  107.762481] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.763080] 
[  107.763316] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.764043] Hardware name: linux,dummy-virt (DT)
[  107.764509] Call trace:
[  107.764789]  dump_backtrace+0xe0/0x134
[  107.765216]  show_stack+0x20/0x2c
[  107.765653]  dump_stack_lvl+0x88/0xb4
[  107.766158]  print_report+0x158/0x44c
[  107.766573]  kasan_report+0xc8/0x180
[  107.766998]  kasan_check_range+0xe4/0x190
[  107.767442]  __kasan_check_write+0x28/0x3c
[  107.767909]  kasan_bitops_test_and_modify.constprop.0+0x138/0x770
[  107.768481]  kasan_bitops_generic+0xc0/0x140
[  107.768946]  kunit_try_run_case+0x8c/0x124
[  107.769398]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.769994]  kthread+0x15c/0x170
[  107.770382]  ret_from_fork+0x10/0x20
[  107.770810] 
[  107.771011] Allocated by task 249:
[  107.771341]  kasan_save_stack+0x3c/0x70
[  107.771813]  kasan_set_track+0x2c/0x40
[  107.772244]  kasan_save_alloc_info+0x24/0x34
[  107.772736]  __kasan_kmalloc+0xd4/0xe0
[  107.773180]  kmalloc_trace+0x8c/0x150
[  107.773605]  kasan_bitops_generic+0x98/0x140
[  107.774031]  kunit_try_run_case+0x8c/0x124
[  107.774487]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.775053]  kthread+0x15c/0x170
[  107.775445]  ret_from_fork+0x10/0x20
[  107.775879] 
[  107.776077] The buggy address belongs to the object at ffff0000c66ab600
[  107.776077]  which belongs to the cache kmalloc-128 of size 128
[  107.777019] The buggy address is located 8 bytes inside of
[  107.777019]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.777907] 
[  107.778135] The buggy address belongs to the physical page:
[  107.778598] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.779358] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.780012] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.780659] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.781276] page dumped because: kasan: bad access detected
[  107.781759] 
[  107.781948] Memory state around the buggy address:
[  107.782414]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.783036]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.783635] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.784214]                       ^
[  107.784572]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.785204]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.785800] ==================================================================
[  107.786854] ==================================================================
[  107.787452] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x164/0x770
[  107.788324] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.788988] 
[  107.789232] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.789938] Hardware name: linux,dummy-virt (DT)
[  107.790327] Call trace:
[  107.790596]  dump_backtrace+0xe0/0x134
[  107.791074]  show_stack+0x20/0x2c
[  107.791459]  dump_stack_lvl+0x88/0xb4
[  107.791908]  print_report+0x158/0x44c
[  107.792332]  kasan_report+0xc8/0x180
[  107.792777]  __asan_load8+0x80/0xac
[  107.793178]  kasan_bitops_test_and_modify.constprop.0+0x164/0x770
[  107.793757]  kasan_bitops_generic+0xc0/0x140
[  107.794227]  kunit_try_run_case+0x8c/0x124
[  107.794665]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.795223]  kthread+0x15c/0x170
[  107.795610]  ret_from_fork+0x10/0x20
[  107.796045] 
[  107.796270] Allocated by task 249:
[  107.796619]  kasan_save_stack+0x3c/0x70
[  107.797100]  kasan_set_track+0x2c/0x40
[  107.797524]  kasan_save_alloc_info+0x24/0x34
[  107.797988]  __kasan_kmalloc+0xd4/0xe0
[  107.798436]  kmalloc_trace+0x8c/0x150
[  107.798876]  kasan_bitops_generic+0x98/0x140
[  107.799345]  kunit_try_run_case+0x8c/0x124
[  107.799832]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.800380]  kthread+0x15c/0x170
[  107.800825]  ret_from_fork+0x10/0x20
[  107.801250] 
[  107.801457] The buggy address belongs to the object at ffff0000c66ab600
[  107.801457]  which belongs to the cache kmalloc-128 of size 128
[  107.802413] The buggy address is located 8 bytes inside of
[  107.802413]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.803266] 
[  107.803497] The buggy address belongs to the physical page:
[  107.803974] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.804758] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.805394] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.806028] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.806649] page dumped because: kasan: bad access detected
[  107.807125] 
[  107.807313] Memory state around the buggy address:
[  107.807753]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.808387]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.809004] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.809576]                       ^
[  107.809943]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.810568]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.811144] ==================================================================
[  107.841132] ==================================================================
[  107.841692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1bc/0x770
[  107.842589] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.843353] 
[  107.843565] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.844350] Hardware name: linux,dummy-virt (DT)
[  107.844831] Call trace:
[  107.845101]  dump_backtrace+0xe0/0x134
[  107.845539]  show_stack+0x20/0x2c
[  107.845942]  dump_stack_lvl+0x88/0xb4
[  107.846381]  print_report+0x158/0x44c
[  107.846801]  kasan_report+0xc8/0x180
[  107.847191]  __asan_load8+0x80/0xac
[  107.847594]  kasan_bitops_test_and_modify.constprop.0+0x1bc/0x770
[  107.848193]  kasan_bitops_generic+0xc0/0x140
[  107.848657]  kunit_try_run_case+0x8c/0x124
[  107.849154]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.849718]  kthread+0x15c/0x170
[  107.850135]  ret_from_fork+0x10/0x20
[  107.850573] 
[  107.850788] Allocated by task 249:
[  107.851113]  kasan_save_stack+0x3c/0x70
[  107.851572]  kasan_set_track+0x2c/0x40
[  107.851981]  kasan_save_alloc_info+0x24/0x34
[  107.852474]  __kasan_kmalloc+0xd4/0xe0
[  107.852922]  kmalloc_trace+0x8c/0x150
[  107.853349]  kasan_bitops_generic+0x98/0x140
[  107.853818]  kunit_try_run_case+0x8c/0x124
[  107.854326]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.854877]  kthread+0x15c/0x170
[  107.855234]  ret_from_fork+0x10/0x20
[  107.855594] 
[  107.855930] The buggy address belongs to the object at ffff0000c66ab600
[  107.855930]  which belongs to the cache kmalloc-128 of size 128
[  107.856899] The buggy address is located 8 bytes inside of
[  107.856899]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.857820] 
[  107.858070] The buggy address belongs to the physical page:
[  107.858554] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.859334] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.860006] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.860668] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.861307] page dumped because: kasan: bad access detected
[  107.861787] 
[  107.861985] Memory state around the buggy address:
[  107.862424]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.863068]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.863682] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.864286]                       ^
[  107.864645]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.865297]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.865897] ==================================================================
[  107.735898] ==================================================================
[  107.736455] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x100/0x770
[  107.737262] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.737930] 
[  107.738154] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.738801] Hardware name: linux,dummy-virt (DT)
[  107.739238] Call trace:
[  107.739518]  dump_backtrace+0xe0/0x134
[  107.739986]  show_stack+0x20/0x2c
[  107.740386]  dump_stack_lvl+0x88/0xb4
[  107.740884]  print_report+0x158/0x44c
[  107.741327]  kasan_report+0xc8/0x180
[  107.741733]  __asan_load8+0x80/0xac
[  107.742162]  kasan_bitops_test_and_modify.constprop.0+0x100/0x770
[  107.742737]  kasan_bitops_generic+0xc0/0x140
[  107.743214]  kunit_try_run_case+0x8c/0x124
[  107.743664]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.744223]  kthread+0x15c/0x170
[  107.744606]  ret_from_fork+0x10/0x20
[  107.745013] 
[  107.745227] Allocated by task 249:
[  107.745571]  kasan_save_stack+0x3c/0x70
[  107.746053]  kasan_set_track+0x2c/0x40
[  107.746462]  kasan_save_alloc_info+0x24/0x34
[  107.746969]  __kasan_kmalloc+0xd4/0xe0
[  107.747403]  kmalloc_trace+0x8c/0x150
[  107.747848]  kasan_bitops_generic+0x98/0x140
[  107.748313]  kunit_try_run_case+0x8c/0x124
[  107.748759]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.749300]  kthread+0x15c/0x170
[  107.749713]  ret_from_fork+0x10/0x20
[  107.750133] 
[  107.750328] The buggy address belongs to the object at ffff0000c66ab600
[  107.750328]  which belongs to the cache kmalloc-128 of size 128
[  107.751255] The buggy address is located 8 bytes inside of
[  107.751255]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.752143] 
[  107.752348] The buggy address belongs to the physical page:
[  107.752823] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.753588] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.754264] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.754925] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.755547] page dumped because: kasan: bad access detected
[  107.756025] 
[  107.756251] Memory state around the buggy address:
[  107.756714]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.757317]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.757965] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.758555]                       ^
[  107.758915]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.759535]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.760135] ==================================================================
[  107.648637] ==================================================================
[  107.649534] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa4/0x770
[  107.650626] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249
[  107.651134] 
[  107.651332] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.652045] Hardware name: linux,dummy-virt (DT)
[  107.652681] Call trace:
[  107.653072]  dump_backtrace+0xe0/0x134
[  107.653700]  show_stack+0x20/0x2c
[  107.654249]  dump_stack_lvl+0x88/0xb4
[  107.655058]  print_report+0x158/0x44c
[  107.655647]  kasan_report+0xc8/0x180
[  107.656252]  kasan_check_range+0xe4/0x190
[  107.656887]  __kasan_check_write+0x28/0x3c
[  107.657538]  kasan_bitops_test_and_modify.constprop.0+0xa4/0x770
[  107.658356]  kasan_bitops_generic+0xc0/0x140
[  107.658986]  kunit_try_run_case+0x8c/0x124
[  107.659622]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.660434]  kthread+0x15c/0x170
[  107.661036]  ret_from_fork+0x10/0x20
[  107.661629] 
[  107.661959] Allocated by task 249:
[  107.662453]  kasan_save_stack+0x3c/0x70
[  107.663099]  kasan_set_track+0x2c/0x40
[  107.663530]  kasan_save_alloc_info+0x24/0x34
[  107.663958]  __kasan_kmalloc+0xd4/0xe0
[  107.664337]  kmalloc_trace+0x8c/0x150
[  107.664700]  kasan_bitops_generic+0x98/0x140
[  107.665324]  kunit_try_run_case+0x8c/0x124
[  107.665958]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.666726]  kthread+0x15c/0x170
[  107.667281]  ret_from_fork+0x10/0x20
[  107.667877] 
[  107.668151] The buggy address belongs to the object at ffff0000c66ab600
[  107.668151]  which belongs to the cache kmalloc-128 of size 128
[  107.669759] The buggy address is located 8 bytes inside of
[  107.669759]  128-byte region [ffff0000c66ab600, ffff0000c66ab680)
[  107.671236] 
[  107.671524] The buggy address belongs to the physical page:
[  107.672288] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.673401] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.674348] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.675316] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.676235] page dumped because: kasan: bad access detected
[  107.677001] 
[  107.677205] Memory state around the buggy address:
[  107.677859]  ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.678814]  ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.679781] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.680622]                       ^
[  107.680944]  ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.681432]  ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.681946] ==================================================================

[   75.168600] ==================================================================
[   75.169128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x130/0x760
[   75.170032] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.171317] 
[   75.171563] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.172257] Hardware name: linux,dummy-virt (DT)
[   75.172670] Call trace:
[   75.172925]  dump_backtrace.part.0+0xdc/0xf0
[   75.173418]  show_stack+0x18/0x30
[   75.173826]  dump_stack_lvl+0x64/0x80
[   75.174218]  print_report+0x158/0x438
[   75.174679]  kasan_report+0xb4/0xf4
[   75.175060]  kasan_check_range+0xe4/0x190
[   75.175512]  __kasan_check_write+0x28/0x3c
[   75.175967]  kasan_bitops_test_and_modify.constprop.0+0x130/0x760
[   75.176561]  kasan_bitops_generic+0xb8/0x13c
[   75.177037]  kunit_try_run_case+0x84/0x120
[   75.177497]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.178011]  kthread+0x180/0x190
[   75.178379]  ret_from_fork+0x10/0x20
[   75.178792] 
[   75.178993] Allocated by task 165:
[   75.179323]  kasan_save_stack+0x3c/0x70
[   75.179760]  kasan_set_track+0x2c/0x40
[   75.180180]  kasan_save_alloc_info+0x24/0x34
[   75.180665]  __kasan_kmalloc+0xb8/0xc0
[   75.181055]  kmalloc_trace+0x58/0x6c
[   75.181474]  kasan_bitops_generic+0x90/0x13c
[   75.181914]  kunit_try_run_case+0x84/0x120
[   75.182354]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.182901]  kthread+0x180/0x190
[   75.183251]  ret_from_fork+0x10/0x20
[   75.183704] 
[   75.183881] The buggy address belongs to the object at ffff0000c5840b00
[   75.183881]  which belongs to the cache kmalloc-128 of size 128
[   75.184796] The buggy address is located 8 bytes inside of
[   75.184796]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.185666] 
[   75.185854] The buggy address belongs to the physical page:
[   75.186310] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.187084] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.187744] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.188378] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.188982] page dumped because: kasan: bad access detected
[   75.189430] 
[   75.189618] Memory state around the buggy address:
[   75.190015]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.190633]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.191219] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.191809]                       ^
[   75.192158]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.192775]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.193344] ==================================================================
[   75.219513] ==================================================================
[   75.220040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x188/0x760
[   75.220882] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.221502] 
[   75.221714] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.222450] Hardware name: linux,dummy-virt (DT)
[   75.222880] Call trace:
[   75.223100]  dump_backtrace.part.0+0xdc/0xf0
[   75.223648]  show_stack+0x18/0x30
[   75.224062]  dump_stack_lvl+0x64/0x80
[   75.224519]  print_report+0x158/0x438
[   75.224984]  kasan_report+0xb4/0xf4
[   75.225401]  kasan_check_range+0xe4/0x190
[   75.225886]  __kasan_check_write+0x28/0x3c
[   75.226332]  kasan_bitops_test_and_modify.constprop.0+0x188/0x760
[   75.226948]  kasan_bitops_generic+0xb8/0x13c
[   75.227435]  kunit_try_run_case+0x84/0x120
[   75.227910]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.228472]  kthread+0x180/0x190
[   75.228847]  ret_from_fork+0x10/0x20
[   75.229262] 
[   75.229477] Allocated by task 165:
[   75.229772]  kasan_save_stack+0x3c/0x70
[   75.230216]  kasan_set_track+0x2c/0x40
[   75.230642]  kasan_save_alloc_info+0x24/0x34
[   75.231101]  __kasan_kmalloc+0xb8/0xc0
[   75.231515]  kmalloc_trace+0x58/0x6c
[   75.231929]  kasan_bitops_generic+0x90/0x13c
[   75.232381]  kunit_try_run_case+0x84/0x120
[   75.232843]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.233389]  kthread+0x180/0x190
[   75.233769]  ret_from_fork+0x10/0x20
[   75.234176] 
[   75.234358] The buggy address belongs to the object at ffff0000c5840b00
[   75.234358]  which belongs to the cache kmalloc-128 of size 128
[   75.235284] The buggy address is located 8 bytes inside of
[   75.235284]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.236152] 
[   75.236338] The buggy address belongs to the physical page:
[   75.236820] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.237588] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.238232] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.238870] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.239483] page dumped because: kasan: bad access detected
[   75.239946] 
[   75.240138] Memory state around the buggy address:
[   75.240567]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.241154]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.241745] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.242317]                       ^
[   75.242653]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.243265]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.243882] ==================================================================
[   75.245017] ==================================================================
[   75.245597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1b4/0x760
[   75.246451] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.246989] 
[   75.247224] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.247928] Hardware name: linux,dummy-virt (DT)
[   75.248341] Call trace:
[   75.248599]  dump_backtrace.part.0+0xdc/0xf0
[   75.249154]  show_stack+0x18/0x30
[   75.249582]  dump_stack_lvl+0x64/0x80
[   75.249963]  print_report+0x158/0x438
[   75.250401]  kasan_report+0xb4/0xf4
[   75.250794]  __asan_load8+0x80/0xac
[   75.251184]  kasan_bitops_test_and_modify.constprop.0+0x1b4/0x760
[   75.251771]  kasan_bitops_generic+0xb8/0x13c
[   75.252224]  kunit_try_run_case+0x84/0x120
[   75.252692]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.253218]  kthread+0x180/0x190
[   75.253611]  ret_from_fork+0x10/0x20
[   75.254017] 
[   75.254190] Allocated by task 165:
[   75.254553]  kasan_save_stack+0x3c/0x70
[   75.254973]  kasan_set_track+0x2c/0x40
[   75.255361]  kasan_save_alloc_info+0x24/0x34
[   75.255826]  __kasan_kmalloc+0xb8/0xc0
[   75.256210]  kmalloc_trace+0x58/0x6c
[   75.256626]  kasan_bitops_generic+0x90/0x13c
[   75.257107]  kunit_try_run_case+0x84/0x120
[   75.257550]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.258064]  kthread+0x180/0x190
[   75.258438]  ret_from_fork+0x10/0x20
[   75.258837] 
[   75.259022] The buggy address belongs to the object at ffff0000c5840b00
[   75.259022]  which belongs to the cache kmalloc-128 of size 128
[   75.259915] The buggy address is located 8 bytes inside of
[   75.259915]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.260767] 
[   75.260962] The buggy address belongs to the physical page:
[   75.261402] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.262122] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.262771] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.263374] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.263987] page dumped because: kasan: bad access detected
[   75.264439] 
[   75.264624] Memory state around the buggy address:
[   75.265034]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.265637]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.266189] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.266786]                       ^
[   75.267127]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.267759]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.268333] ==================================================================
[   75.293915] ==================================================================
[   75.294496] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x208/0x760
[   75.295271] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.295889] 
[   75.296080] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.296751] Hardware name: linux,dummy-virt (DT)
[   75.297169] Call trace:
[   75.297450]  dump_backtrace.part.0+0xdc/0xf0
[   75.297991]  show_stack+0x18/0x30
[   75.298440]  dump_stack_lvl+0x64/0x80
[   75.298867]  print_report+0x158/0x438
[   75.299283]  kasan_report+0xb4/0xf4
[   75.299681]  kasan_check_range+0xe4/0x190
[   75.300116]  __kasan_check_write+0x28/0x3c
[   75.300566]  kasan_bitops_test_and_modify.constprop.0+0x208/0x760
[   75.301162]  kasan_bitops_generic+0xb8/0x13c
[   75.301656]  kunit_try_run_case+0x84/0x120
[   75.302080]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.302626]  kthread+0x180/0x190
[   75.302999]  ret_from_fork+0x10/0x20
[   75.303405] 
[   75.303598] Allocated by task 165:
[   75.303937]  kasan_save_stack+0x3c/0x70
[   75.304354]  kasan_set_track+0x2c/0x40
[   75.304771]  kasan_save_alloc_info+0x24/0x34
[   75.305227]  __kasan_kmalloc+0xb8/0xc0
[   75.305643]  kmalloc_trace+0x58/0x6c
[   75.306044]  kasan_bitops_generic+0x90/0x13c
[   75.306505]  kunit_try_run_case+0x84/0x120
[   75.306948]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.307471]  kthread+0x180/0x190
[   75.307852]  ret_from_fork+0x10/0x20
[   75.308258] 
[   75.308468] The buggy address belongs to the object at ffff0000c5840b00
[   75.308468]  which belongs to the cache kmalloc-128 of size 128
[   75.309361] The buggy address is located 8 bytes inside of
[   75.309361]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.310228] 
[   75.310462] The buggy address belongs to the physical page:
[   75.310890] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.311658] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.312311] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.312963] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.313580] page dumped because: kasan: bad access detected
[   75.314034] 
[   75.314229] Memory state around the buggy address:
[   75.314675]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.315235]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.315862] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.316444]                       ^
[   75.316796]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.317412]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.317976] ==================================================================
[   75.140836] ==================================================================
[   75.141361] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xf8/0x760
[   75.142266] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.142955] 
[   75.143185] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.143935] Hardware name: linux,dummy-virt (DT)
[   75.144344] Call trace:
[   75.144607]  dump_backtrace.part.0+0xdc/0xf0
[   75.145117]  show_stack+0x18/0x30
[   75.145588]  dump_stack_lvl+0x64/0x80
[   75.146797]  print_report+0x158/0x438
[   75.147219]  kasan_report+0xb4/0xf4
[   75.147644]  __asan_load8+0x80/0xac
[   75.148042]  kasan_bitops_test_and_modify.constprop.0+0xf8/0x760
[   75.148694]  kasan_bitops_generic+0xb8/0x13c
[   75.149170]  kunit_try_run_case+0x84/0x120
[   75.149634]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.150359]  kthread+0x180/0x190
[   75.150756]  ret_from_fork+0x10/0x20
[   75.151147] 
[   75.151317] Allocated by task 165:
[   75.151674]  kasan_save_stack+0x3c/0x70
[   75.152076]  kasan_set_track+0x2c/0x40
[   75.152609]  kasan_save_alloc_info+0x24/0x34
[   75.153090]  __kasan_kmalloc+0xb8/0xc0
[   75.153501]  kmalloc_trace+0x58/0x6c
[   75.154457]  kasan_bitops_generic+0x90/0x13c
[   75.154960]  kunit_try_run_case+0x84/0x120
[   75.155421]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.155948]  kthread+0x180/0x190
[   75.156327]  ret_from_fork+0x10/0x20
[   75.156732] 
[   75.156927] The buggy address belongs to the object at ffff0000c5840b00
[   75.156927]  which belongs to the cache kmalloc-128 of size 128
[   75.158154] The buggy address is located 8 bytes inside of
[   75.158154]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.159040] 
[   75.159245] The buggy address belongs to the physical page:
[   75.159688] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.160451] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.161116] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.162371] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.162973] page dumped because: kasan: bad access detected
[   75.163470] 
[   75.163663] Memory state around the buggy address:
[   75.164060]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.164657]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.165269] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.166156]                       ^
[   75.166517]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.167080]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.167696] ==================================================================
[   75.053567] ==================================================================
[   75.054173] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x760
[   75.055269] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.055839] 
[   75.056072] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.056749] Hardware name: linux,dummy-virt (DT)
[   75.057134] Call trace:
[   75.057388]  dump_backtrace.part.0+0xdc/0xf0
[   75.058469]  show_stack+0x18/0x30
[   75.058906]  dump_stack_lvl+0x64/0x80
[   75.059289]  print_report+0x158/0x438
[   75.059743]  kasan_report+0xb4/0xf4
[   75.060141]  kasan_check_range+0xe4/0x190
[   75.060605]  __kasan_check_write+0x28/0x3c
[   75.061063]  kasan_bitops_test_and_modify.constprop.0+0x9c/0x760
[   75.061652]  kasan_bitops_generic+0xb8/0x13c
[   75.062146]  kunit_try_run_case+0x84/0x120
[   75.062591]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.063155]  kthread+0x180/0x190
[   75.063890]  ret_from_fork+0x10/0x20
[   75.064297] 
[   75.064512] Allocated by task 165:
[   75.064869]  kasan_save_stack+0x3c/0x70
[   75.065279]  kasan_set_track+0x2c/0x40
[   75.065685]  kasan_save_alloc_info+0x24/0x34
[   75.066416]  __kasan_kmalloc+0xb8/0xc0
[   75.066841]  kmalloc_trace+0x58/0x6c
[   75.067261]  kasan_bitops_generic+0x90/0x13c
[   75.067693]  kunit_try_run_case+0x84/0x120
[   75.068190]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.068815]  kthread+0x180/0x190
[   75.069176]  ret_from_fork+0x10/0x20
[   75.069605] 
[   75.069823] The buggy address belongs to the object at ffff0000c5840b00
[   75.069823]  which belongs to the cache kmalloc-128 of size 128
[   75.071154] The buggy address is located 8 bytes inside of
[   75.071154]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.072115] 
[   75.072335] The buggy address belongs to the physical page:
[   75.072805] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.073558] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.074901] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.075560] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.076218] page dumped because: kasan: bad access detected
[   75.076688] 
[   75.076859] Memory state around the buggy address:
[   75.077290]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.078305]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.078911] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.079348]                       ^
[   75.079998]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.081204]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.081666] ==================================================================
[   75.194690] ==================================================================
[   75.195264] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x15c/0x760
[   75.196085] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.196619] 
[   75.196847] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.197563] Hardware name: linux,dummy-virt (DT)
[   75.197961] Call trace:
[   75.198223]  dump_backtrace.part.0+0xdc/0xf0
[   75.198765]  show_stack+0x18/0x30
[   75.199174]  dump_stack_lvl+0x64/0x80
[   75.199608]  print_report+0x158/0x438
[   75.200037]  kasan_report+0xb4/0xf4
[   75.200468]  __asan_load8+0x80/0xac
[   75.200872]  kasan_bitops_test_and_modify.constprop.0+0x15c/0x760
[   75.201475]  kasan_bitops_generic+0xb8/0x13c
[   75.201953]  kunit_try_run_case+0x84/0x120
[   75.202415]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.202977]  kthread+0x180/0x190
[   75.203356]  ret_from_fork+0x10/0x20
[   75.203778] 
[   75.203958] Allocated by task 165:
[   75.204281]  kasan_save_stack+0x3c/0x70
[   75.204698]  kasan_set_track+0x2c/0x40
[   75.205100]  kasan_save_alloc_info+0x24/0x34
[   75.205587]  __kasan_kmalloc+0xb8/0xc0
[   75.205991]  kmalloc_trace+0x58/0x6c
[   75.206422]  kasan_bitops_generic+0x90/0x13c
[   75.207035]  kunit_try_run_case+0x84/0x120
[   75.207482]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.208050]  kthread+0x180/0x190
[   75.208447]  ret_from_fork+0x10/0x20
[   75.208871] 
[   75.209096] The buggy address belongs to the object at ffff0000c5840b00
[   75.209096]  which belongs to the cache kmalloc-128 of size 128
[   75.210009] The buggy address is located 8 bytes inside of
[   75.210009]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.210900] 
[   75.211084] The buggy address belongs to the physical page:
[   75.211566] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.212304] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.212958] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.213621] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.214224] page dumped because: kasan: bad access detected
[   75.214695] 
[   75.214890] Memory state around the buggy address:
[   75.215305]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.215920]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.216514] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.217114]                       ^
[   75.217463]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.218078]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.218646] ==================================================================
[   75.269352] ==================================================================
[   75.269881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1dc/0x760
[   75.270698] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.271240] 
[   75.271494] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.272209] Hardware name: linux,dummy-virt (DT)
[   75.272644] Call trace:
[   75.272900]  dump_backtrace.part.0+0xdc/0xf0
[   75.273410]  show_stack+0x18/0x30
[   75.273830]  dump_stack_lvl+0x64/0x80
[   75.274240]  print_report+0x158/0x438
[   75.274653]  kasan_report+0xb4/0xf4
[   75.275044]  __asan_load8+0x80/0xac
[   75.275445]  kasan_bitops_test_and_modify.constprop.0+0x1dc/0x760
[   75.276029]  kasan_bitops_generic+0xb8/0x13c
[   75.276489]  kunit_try_run_case+0x84/0x120
[   75.276958]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.277480]  kthread+0x180/0x190
[   75.277845]  ret_from_fork+0x10/0x20
[   75.278243] 
[   75.278433] Allocated by task 165:
[   75.278768]  kasan_save_stack+0x3c/0x70
[   75.279192]  kasan_set_track+0x2c/0x40
[   75.279616]  kasan_save_alloc_info+0x24/0x34
[   75.280069]  __kasan_kmalloc+0xb8/0xc0
[   75.280465]  kmalloc_trace+0x58/0x6c
[   75.280878]  kasan_bitops_generic+0x90/0x13c
[   75.281357]  kunit_try_run_case+0x84/0x120
[   75.281819]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.282329]  kthread+0x180/0x190
[   75.282719]  ret_from_fork+0x10/0x20
[   75.283125] 
[   75.283301] The buggy address belongs to the object at ffff0000c5840b00
[   75.283301]  which belongs to the cache kmalloc-128 of size 128
[   75.284233] The buggy address is located 8 bytes inside of
[   75.284233]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.285090] 
[   75.285293] The buggy address belongs to the physical page:
[   75.285744] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.286486] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.287132] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.287782] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.288374] page dumped because: kasan: bad access detected
[   75.288820] 
[   75.289013] Memory state around the buggy address:
[   75.289454]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.290043]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.290626] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.291180]                       ^
[   75.291512]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.292116]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.292681] ==================================================================
[   75.082331] ==================================================================
[   75.082925] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xc4/0x760
[   75.083614] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.086014] 
[   75.086293] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.086860] Hardware name: linux,dummy-virt (DT)
[   75.087182] Call trace:
[   75.087410]  dump_backtrace.part.0+0xdc/0xf0
[   75.088017]  show_stack+0x18/0x30
[   75.088577]  dump_stack_lvl+0x64/0x80
[   75.089046]  print_report+0x158/0x438
[   75.089706]  kasan_report+0xb4/0xf4
[   75.090280]  __asan_load8+0x80/0xac
[   75.090830]  kasan_bitops_test_and_modify.constprop.0+0xc4/0x760
[   75.091565]  kasan_bitops_generic+0xb8/0x13c
[   75.092137]  kunit_try_run_case+0x84/0x120
[   75.092597]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.093140]  kthread+0x180/0x190
[   75.093545]  ret_from_fork+0x10/0x20
[   75.094204] 
[   75.094442] Allocated by task 165:
[   75.094898]  kasan_save_stack+0x3c/0x70
[   75.095340]  kasan_set_track+0x2c/0x40
[   75.095796]  kasan_save_alloc_info+0x24/0x34
[   75.096292]  __kasan_kmalloc+0xb8/0xc0
[   75.096729]  kmalloc_trace+0x58/0x6c
[   75.097166]  kasan_bitops_generic+0x90/0x13c
[   75.097629]  kunit_try_run_case+0x84/0x120
[   75.098637]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.099185]  kthread+0x180/0x190
[   75.099613]  ret_from_fork+0x10/0x20
[   75.100024] 
[   75.100246] The buggy address belongs to the object at ffff0000c5840b00
[   75.100246]  which belongs to the cache kmalloc-128 of size 128
[   75.101245] The buggy address is located 8 bytes inside of
[   75.101245]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.102465] 
[   75.102714] The buggy address belongs to the physical page:
[   75.103203] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.104032] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.104725] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.105237] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.106429] page dumped because: kasan: bad access detected
[   75.106935] 
[   75.107148] Memory state around the buggy address:
[   75.107609]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.108218]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.108861] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.109474]                       ^
[   75.110208]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.110851]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.111458] ==================================================================
[   75.112420] ==================================================================
[   75.112956] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xf0/0x760
[   75.113705] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.114857] 
[   75.115052] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.115791] Hardware name: linux,dummy-virt (DT)
[   75.116187] Call trace:
[   75.116441]  dump_backtrace.part.0+0xdc/0xf0
[   75.116963]  show_stack+0x18/0x30
[   75.117348]  dump_stack_lvl+0x64/0x80
[   75.117827]  print_report+0x158/0x438
[   75.118256]  kasan_report+0xb4/0xf4
[   75.119030]  kasan_check_range+0xe4/0x190
[   75.119490]  __kasan_check_write+0x28/0x3c
[   75.119960]  kasan_bitops_test_and_modify.constprop.0+0xf0/0x760
[   75.120550]  kasan_bitops_generic+0xb8/0x13c
[   75.121006]  kunit_try_run_case+0x84/0x120
[   75.121472]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.122650]  kthread+0x180/0x190
[   75.123052]  ret_from_fork+0x10/0x20
[   75.123494] 
[   75.123685] Allocated by task 165:
[   75.124043]  kasan_save_stack+0x3c/0x70
[   75.124478]  kasan_set_track+0x2c/0x40
[   75.124882]  kasan_save_alloc_info+0x24/0x34
[   75.125326]  __kasan_kmalloc+0xb8/0xc0
[   75.125932]  kmalloc_trace+0x58/0x6c
[   75.126335]  kasan_bitops_generic+0x90/0x13c
[   75.126828]  kunit_try_run_case+0x84/0x120
[   75.127282]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.127857]  kthread+0x180/0x190
[   75.128422]  ret_from_fork+0x10/0x20
[   75.128842] 
[   75.129021] The buggy address belongs to the object at ffff0000c5840b00
[   75.129021]  which belongs to the cache kmalloc-128 of size 128
[   75.130494] The buggy address is located 8 bytes inside of
[   75.130494]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.131372] 
[   75.131575] The buggy address belongs to the physical page:
[   75.131992] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.132788] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.133430] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.134344] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.134995] page dumped because: kasan: bad access detected
[   75.135472] 
[   75.135675] Memory state around the buggy address:
[   75.136083]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.136705]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.137294] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.138473]                       ^
[   75.138842]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.139405]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.140004] ==================================================================

[   66.475318] ==================================================================
[   66.475841] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x11c/0x780
[   66.476585] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.477103] 
[   66.477321] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.478221] Hardware name: linux,dummy-virt (DT)
[   66.478622] Call trace:
[   66.478844]  dump_backtrace+0x110/0x120
[   66.479312]  show_stack+0x18/0x28
[   66.479722]  dump_stack_lvl+0x68/0x84
[   66.480091]  print_report+0x158/0x484
[   66.480483]  kasan_report+0x98/0xe0
[   66.480847]  __asan_load8+0x88/0xb0
[   66.481204]  kasan_bitops_test_and_modify.constprop.4+0x11c/0x780
[   66.481913]  kasan_bitops_generic+0xb8/0x128
[   66.482372]  kunit_try_run_case+0x7c/0x120
[   66.482802]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.483312]  kthread+0x1a4/0x1b8
[   66.483667]  ret_from_fork+0x10/0x20
[   66.484036] 
[   66.484199] Allocated by task 163:
[   66.484532]  kasan_save_stack+0x2c/0x58
[   66.484921]  kasan_set_track+0x2c/0x40
[   66.485322]  kasan_save_alloc_info+0x24/0x38
[   66.485738]  __kasan_kmalloc+0xa0/0xb8
[   66.486103]  kmalloc_trace+0x50/0x68
[   66.486502]  kasan_bitops_generic+0x90/0x128
[   66.486959]  kunit_try_run_case+0x7c/0x120
[   66.487537]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.488044]  kthread+0x1a4/0x1b8
[   66.488409]  ret_from_fork+0x10/0x20
[   66.488766] 
[   66.488936] The buggy address belongs to the object at ffff0000c586c700
[   66.488936]  which belongs to the cache kmalloc-128 of size 128
[   66.490022] The buggy address is located 8 bytes inside of
[   66.490022]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.490844] 
[   66.491015] The buggy address belongs to the physical page:
[   66.491445] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.492146] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.492662] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.493328] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.493947] page dumped because: kasan: bad access detected
[   66.494560] 
[   66.494762] Memory state around the buggy address:
[   66.495172]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.495748]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.496337] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.496883]                       ^
[   66.497193]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.498394]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.498939] ==================================================================
[   66.399977] ==================================================================
[   66.400493] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0xb0/0x780
[   66.401305] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.402034] 
[   66.402261] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.402870] Hardware name: linux,dummy-virt (DT)
[   66.403273] Call trace:
[   66.403492]  dump_backtrace+0x110/0x120
[   66.403920]  show_stack+0x18/0x28
[   66.404340]  dump_stack_lvl+0x68/0x84
[   66.404763]  print_report+0x158/0x484
[   66.405131]  kasan_report+0x98/0xe0
[   66.405650]  kasan_check_range+0x160/0x1d8
[   66.406051]  __kasan_check_write+0x28/0x38
[   66.406480]  kasan_bitops_test_and_modify.constprop.4+0xb0/0x780
[   66.407008]  kasan_bitops_generic+0xb8/0x128
[   66.407450]  kunit_try_run_case+0x7c/0x120
[   66.407863]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.408382]  kthread+0x1a4/0x1b8
[   66.408721]  ret_from_fork+0x10/0x20
[   66.409086] 
[   66.409290] Allocated by task 163:
[   66.409734]  kasan_save_stack+0x2c/0x58
[   66.410145]  kasan_set_track+0x2c/0x40
[   66.410529]  kasan_save_alloc_info+0x24/0x38
[   66.410955]  __kasan_kmalloc+0xa0/0xb8
[   66.411319]  kmalloc_trace+0x50/0x68
[   66.411699]  kasan_bitops_generic+0x90/0x128
[   66.412138]  kunit_try_run_case+0x7c/0x120
[   66.412563]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.413083]  kthread+0x1a4/0x1b8
[   66.413568]  ret_from_fork+0x10/0x20
[   66.413943] 
[   66.414125] The buggy address belongs to the object at ffff0000c586c700
[   66.414125]  which belongs to the cache kmalloc-128 of size 128
[   66.414980] The buggy address is located 8 bytes inside of
[   66.414980]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.415805] 
[   66.415979] The buggy address belongs to the physical page:
[   66.416394] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.417096] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.418353] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.418864] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.419323] page dumped because: kasan: bad access detected
[   66.419880] 
[   66.420146] Memory state around the buggy address:
[   66.420551]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.421154]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.421732] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.422428]                       ^
[   66.422706]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.423134]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.423655] ==================================================================
[   66.450616] ==================================================================
[   66.451112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x114/0x780
[   66.451869] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.452460] 
[   66.452642] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.453220] Hardware name: linux,dummy-virt (DT)
[   66.453813] Call trace:
[   66.454072]  dump_backtrace+0x110/0x120
[   66.454501]  show_stack+0x18/0x28
[   66.454910]  dump_stack_lvl+0x68/0x84
[   66.455319]  print_report+0x158/0x484
[   66.455697]  kasan_report+0x98/0xe0
[   66.456048]  kasan_check_range+0x160/0x1d8
[   66.456487]  __kasan_check_write+0x28/0x38
[   66.456933]  kasan_bitops_test_and_modify.constprop.4+0x114/0x780
[   66.457547]  kasan_bitops_generic+0xb8/0x128
[   66.457998]  kunit_try_run_case+0x7c/0x120
[   66.458577]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.459093]  kthread+0x1a4/0x1b8
[   66.459481]  ret_from_fork+0x10/0x20
[   66.459849] 
[   66.460040] Allocated by task 163:
[   66.460337]  kasan_save_stack+0x2c/0x58
[   66.460694]  kasan_set_track+0x2c/0x40
[   66.461078]  kasan_save_alloc_info+0x24/0x38
[   66.461678]  __kasan_kmalloc+0xa0/0xb8
[   66.462039]  kmalloc_trace+0x50/0x68
[   66.462431]  kasan_bitops_generic+0x90/0x128
[   66.462866]  kunit_try_run_case+0x7c/0x120
[   66.463276]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.463807]  kthread+0x1a4/0x1b8
[   66.464147]  ret_from_fork+0x10/0x20
[   66.464512] 
[   66.464694] The buggy address belongs to the object at ffff0000c586c700
[   66.464694]  which belongs to the cache kmalloc-128 of size 128
[   66.465526] The buggy address is located 8 bytes inside of
[   66.465526]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.466314] 
[   66.466505] The buggy address belongs to the physical page:
[   66.466967] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.467808] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.468434] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.469017] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.470257] page dumped because: kasan: bad access detected
[   66.470669] 
[   66.470851] Memory state around the buggy address:
[   66.471219]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.471814]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.472371] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.472881]                       ^
[   66.473198]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.474020]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.474573] ==================================================================
[   66.524923] ==================================================================
[   66.525495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x190/0x780
[   66.526480] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.527050] 
[   66.527244] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.527912] Hardware name: linux,dummy-virt (DT)
[   66.528278] Call trace:
[   66.528550]  dump_backtrace+0x110/0x120
[   66.528985]  show_stack+0x18/0x28
[   66.529411]  dump_stack_lvl+0x68/0x84
[   66.529832]  print_report+0x158/0x484
[   66.530189]  kasan_report+0x98/0xe0
[   66.530718]  __asan_load8+0x88/0xb0
[   66.531076]  kasan_bitops_test_and_modify.constprop.4+0x190/0x780
[   66.531619]  kasan_bitops_generic+0xb8/0x128
[   66.532071]  kunit_try_run_case+0x7c/0x120
[   66.532507]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.533019]  kthread+0x1a4/0x1b8
[   66.533378]  ret_from_fork+0x10/0x20
[   66.533894] 
[   66.534083] Allocated by task 163:
[   66.534395]  kasan_save_stack+0x2c/0x58
[   66.534788]  kasan_set_track+0x2c/0x40
[   66.535152]  kasan_save_alloc_info+0x24/0x38
[   66.535597]  __kasan_kmalloc+0xa0/0xb8
[   66.535969]  kmalloc_trace+0x50/0x68
[   66.536333]  kasan_bitops_generic+0x90/0x128
[   66.536785]  kunit_try_run_case+0x7c/0x120
[   66.537198]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.537867]  kthread+0x1a4/0x1b8
[   66.538243]  ret_from_fork+0x10/0x20
[   66.538621] 
[   66.538794] The buggy address belongs to the object at ffff0000c586c700
[   66.538794]  which belongs to the cache kmalloc-128 of size 128
[   66.539664] The buggy address is located 8 bytes inside of
[   66.539664]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.540479] 
[   66.540668] The buggy address belongs to the physical page:
[   66.541124] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.542003] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.542622] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.543381] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.543930] page dumped because: kasan: bad access detected
[   66.544366] 
[   66.544556] Memory state around the buggy address:
[   66.544926]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.546118]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.546671] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.547215]                       ^
[   66.547544]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.548108]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.548624] ==================================================================
[   66.575100] ==================================================================
[   66.575789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x1f8/0x780
[   66.576962] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.577734] 
[   66.578050] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.579005] Hardware name: linux,dummy-virt (DT)
[   66.579462] Call trace:
[   66.579691]  dump_backtrace+0x110/0x120
[   66.580182]  show_stack+0x18/0x28
[   66.580575]  dump_stack_lvl+0x68/0x84
[   66.581004]  print_report+0x158/0x484
[   66.581396]  kasan_report+0x98/0xe0
[   66.581769]  __asan_load8+0x88/0xb0
[   66.582138]  kasan_bitops_test_and_modify.constprop.4+0x1f8/0x780
[   66.582694]  kasan_bitops_generic+0xb8/0x128
[   66.583165]  kunit_try_run_case+0x7c/0x120
[   66.583582]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.584070]  kthread+0x1a4/0x1b8
[   66.584441]  ret_from_fork+0x10/0x20
[   66.584825] 
[   66.585006] Allocated by task 163:
[   66.585344]  kasan_save_stack+0x2c/0x58
[   66.585728]  kasan_set_track+0x2c/0x40
[   66.586091]  kasan_save_alloc_info+0x24/0x38
[   66.586516]  __kasan_kmalloc+0xa0/0xb8
[   66.586894]  kmalloc_trace+0x50/0x68
[   66.587264]  kasan_bitops_generic+0x90/0x128
[   66.587709]  kunit_try_run_case+0x7c/0x120
[   66.588126]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.588654]  kthread+0x1a4/0x1b8
[   66.588992]  ret_from_fork+0x10/0x20
[   66.589360] 
[   66.589529] The buggy address belongs to the object at ffff0000c586c700
[   66.589529]  which belongs to the cache kmalloc-128 of size 128
[   66.590413] The buggy address is located 8 bytes inside of
[   66.590413]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.591205] 
[   66.591392] The buggy address belongs to the physical page:
[   66.591816] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.592520] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.593135] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.593711] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.594285] page dumped because: kasan: bad access detected
[   66.594715] 
[   66.594900] Memory state around the buggy address:
[   66.595310]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.595879]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.596424] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.596951]                       ^
[   66.597277]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.597832]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.598379] ==================================================================
[   66.499737] ==================================================================
[   66.500276] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x15c/0x780
[   66.501052] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.501847] 
[   66.502060] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.502809] Hardware name: linux,dummy-virt (DT)
[   66.503158] Call trace:
[   66.503429]  dump_backtrace+0x110/0x120
[   66.503876]  show_stack+0x18/0x28
[   66.504279]  dump_stack_lvl+0x68/0x84
[   66.504675]  print_report+0x158/0x484
[   66.505051]  kasan_report+0x98/0xe0
[   66.505592]  kasan_check_range+0x160/0x1d8
[   66.505987]  __kasan_check_write+0x28/0x38
[   66.506426]  kasan_bitops_test_and_modify.constprop.4+0x15c/0x780
[   66.506966]  kasan_bitops_generic+0xb8/0x128
[   66.507418]  kunit_try_run_case+0x7c/0x120
[   66.507817]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.508328]  kthread+0x1a4/0x1b8
[   66.508659]  ret_from_fork+0x10/0x20
[   66.509039] 
[   66.509203] Allocated by task 163:
[   66.509721]  kasan_save_stack+0x2c/0x58
[   66.510129]  kasan_set_track+0x2c/0x40
[   66.510502]  kasan_save_alloc_info+0x24/0x38
[   66.510923]  __kasan_kmalloc+0xa0/0xb8
[   66.511286]  kmalloc_trace+0x50/0x68
[   66.511656]  kasan_bitops_generic+0x90/0x128
[   66.512099]  kunit_try_run_case+0x7c/0x120
[   66.512520]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.513031]  kthread+0x1a4/0x1b8
[   66.513378]  ret_from_fork+0x10/0x20
[   66.513738] 
[   66.513930] The buggy address belongs to the object at ffff0000c586c700
[   66.513930]  which belongs to the cache kmalloc-128 of size 128
[   66.514765] The buggy address is located 8 bytes inside of
[   66.514765]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.515793] 
[   66.515976] The buggy address belongs to the physical page:
[   66.516416] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.517124] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.518408] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.519020] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.519680] page dumped because: kasan: bad access detected
[   66.520144] 
[   66.520367] Memory state around the buggy address:
[   66.520741]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.521350]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.521917] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.522606]                       ^
[   66.522953]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.523532]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.524058] ==================================================================
[   66.425361] ==================================================================
[   66.425969] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0xe0/0x780
[   66.426592] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.427031] 
[   66.427200] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.427721] Hardware name: linux,dummy-virt (DT)
[   66.428021] Call trace:
[   66.428224]  dump_backtrace+0x110/0x120
[   66.428946]  show_stack+0x18/0x28
[   66.429446]  dump_stack_lvl+0x68/0x84
[   66.429902]  print_report+0x158/0x484
[   66.430505]  kasan_report+0x98/0xe0
[   66.430922]  __asan_load8+0x88/0xb0
[   66.431355]  kasan_bitops_test_and_modify.constprop.4+0xe0/0x780
[   66.431990]  kasan_bitops_generic+0xb8/0x128
[   66.432514]  kunit_try_run_case+0x7c/0x120
[   66.432970]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.433730]  kthread+0x1a4/0x1b8
[   66.434135]  ret_from_fork+0x10/0x20
[   66.434561] 
[   66.434767] Allocated by task 163:
[   66.435139]  kasan_save_stack+0x2c/0x58
[   66.435533]  kasan_set_track+0x2c/0x40
[   66.435953]  kasan_save_alloc_info+0x24/0x38
[   66.436389]  __kasan_kmalloc+0xa0/0xb8
[   66.436795]  kmalloc_trace+0x50/0x68
[   66.437164]  kasan_bitops_generic+0x90/0x128
[   66.437754]  kunit_try_run_case+0x7c/0x120
[   66.438215]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.438759]  kthread+0x1a4/0x1b8
[   66.439100]  ret_from_fork+0x10/0x20
[   66.439486] 
[   66.439668] The buggy address belongs to the object at ffff0000c586c700
[   66.439668]  which belongs to the cache kmalloc-128 of size 128
[   66.440496] The buggy address is located 8 bytes inside of
[   66.440496]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.441329] 
[   66.441550] The buggy address belongs to the physical page:
[   66.442124] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.442814] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.443458] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.444056] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.444630] page dumped because: kasan: bad access detected
[   66.445048] 
[   66.445399] Memory state around the buggy address:
[   66.446388]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.446955]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.447515] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.448036]                       ^
[   66.448364]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.448916]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.449436] ==================================================================
[   66.622488] ==================================================================
[   66.622974] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x25c/0x780
[   66.623788] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.624362] 
[   66.624557] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.625186] Hardware name: linux,dummy-virt (DT)
[   66.625619] Call trace:
[   66.625884]  dump_backtrace+0x110/0x120
[   66.626347]  show_stack+0x18/0x28
[   66.626744]  dump_stack_lvl+0x68/0x84
[   66.627147]  print_report+0x158/0x484
[   66.627543]  kasan_report+0x98/0xe0
[   66.627903]  kasan_check_range+0x160/0x1d8
[   66.628336]  __kasan_check_write+0x28/0x38
[   66.628751]  kasan_bitops_test_and_modify.constprop.4+0x25c/0x780
[   66.629317]  kasan_bitops_generic+0xb8/0x128
[   66.629739]  kunit_try_run_case+0x7c/0x120
[   66.630163]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.630663]  kthread+0x1a4/0x1b8
[   66.631002]  ret_from_fork+0x10/0x20
[   66.631392] 
[   66.631575] Allocated by task 163:
[   66.631901]  kasan_save_stack+0x2c/0x58
[   66.632271]  kasan_set_track+0x2c/0x40
[   66.632634]  kasan_save_alloc_info+0x24/0x38
[   66.633071]  __kasan_kmalloc+0xa0/0xb8
[   66.633471]  kmalloc_trace+0x50/0x68
[   66.633857]  kasan_bitops_generic+0x90/0x128
[   66.634342]  kunit_try_run_case+0x7c/0x120
[   66.634763]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.635286]  kthread+0x1a4/0x1b8
[   66.635635]  ret_from_fork+0x10/0x20
[   66.636006] 
[   66.636182] The buggy address belongs to the object at ffff0000c586c700
[   66.636182]  which belongs to the cache kmalloc-128 of size 128
[   66.637050] The buggy address is located 8 bytes inside of
[   66.637050]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.637826] 
[   66.638027] The buggy address belongs to the physical page:
[   66.638456] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.639156] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.639767] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.640362] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.640920] page dumped because: kasan: bad access detected
[   66.641367] 
[   66.641558] Memory state around the buggy address:
[   66.641955]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.642497]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.643060] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.643622]                       ^
[   66.643948]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.644510]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.645027] ==================================================================
[   66.549382] ==================================================================
[   66.550194] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x1c4/0x780
[   66.550995] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.551562] 
[   66.551780] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.552436] Hardware name: linux,dummy-virt (DT)
[   66.552801] Call trace:
[   66.553011]  dump_backtrace+0x110/0x120
[   66.553666]  show_stack+0x18/0x28
[   66.554067]  dump_stack_lvl+0x68/0x84
[   66.554494]  print_report+0x158/0x484
[   66.554878]  kasan_report+0x98/0xe0
[   66.555225]  kasan_check_range+0x160/0x1d8
[   66.555643]  __kasan_check_write+0x28/0x38
[   66.556044]  kasan_bitops_test_and_modify.constprop.4+0x1c4/0x780
[   66.556604]  kasan_bitops_generic+0xb8/0x128
[   66.557052]  kunit_try_run_case+0x7c/0x120
[   66.557523]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.558050]  kthread+0x1a4/0x1b8
[   66.558411]  ret_from_fork+0x10/0x20
[   66.558793] 
[   66.558991] Allocated by task 163:
[   66.559455]  kasan_save_stack+0x2c/0x58
[   66.559855]  kasan_set_track+0x2c/0x40
[   66.560237]  kasan_save_alloc_info+0x24/0x38
[   66.560658]  __kasan_kmalloc+0xa0/0xb8
[   66.561018]  kmalloc_trace+0x50/0x68
[   66.561409]  kasan_bitops_generic+0x90/0x128
[   66.561990]  kunit_try_run_case+0x7c/0x120
[   66.562438]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.562916]  kthread+0x1a4/0x1b8
[   66.563283]  ret_from_fork+0x10/0x20
[   66.563658] 
[   66.563832] The buggy address belongs to the object at ffff0000c586c700
[   66.563832]  which belongs to the cache kmalloc-128 of size 128
[   66.564739] The buggy address is located 8 bytes inside of
[   66.564739]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.566142] 
[   66.566367] The buggy address belongs to the physical page:
[   66.566774] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.567490] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.568101] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.568736] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.569331] page dumped because: kasan: bad access detected
[   66.569961] 
[   66.570160] Memory state around the buggy address:
[   66.570571]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.571127]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.571767] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.572324]                       ^
[   66.572625]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.573245]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.574011] ==================================================================
[   66.599327] ==================================================================
[   66.599836] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x228/0x780
[   66.600607] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163
[   66.601166] 
[   66.601570] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.602329] Hardware name: linux,dummy-virt (DT)
[   66.602710] Call trace:
[   66.602960]  dump_backtrace+0x110/0x120
[   66.603429]  show_stack+0x18/0x28
[   66.603810]  dump_stack_lvl+0x68/0x84
[   66.604256]  print_report+0x158/0x484
[   66.604614]  kasan_report+0x98/0xe0
[   66.604982]  __asan_load8+0x88/0xb0
[   66.605372]  kasan_bitops_test_and_modify.constprop.4+0x228/0x780
[   66.605906]  kasan_bitops_generic+0xb8/0x128
[   66.606372]  kunit_try_run_case+0x7c/0x120
[   66.606794]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.607281]  kthread+0x1a4/0x1b8
[   66.607631]  ret_from_fork+0x10/0x20
[   66.608005] 
[   66.608170] Allocated by task 163:
[   66.608506]  kasan_save_stack+0x2c/0x58
[   66.608900]  kasan_set_track+0x2c/0x40
[   66.609301]  kasan_save_alloc_info+0x24/0x38
[   66.609719]  __kasan_kmalloc+0xa0/0xb8
[   66.610090]  kmalloc_trace+0x50/0x68
[   66.610457]  kasan_bitops_generic+0x90/0x128
[   66.610906]  kunit_try_run_case+0x7c/0x120
[   66.611328]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.611811]  kthread+0x1a4/0x1b8
[   66.612159]  ret_from_fork+0x10/0x20
[   66.612537] 
[   66.612722] The buggy address belongs to the object at ffff0000c586c700
[   66.612722]  which belongs to the cache kmalloc-128 of size 128
[   66.613582] The buggy address is located 8 bytes inside of
[   66.613582]  128-byte region [ffff0000c586c700, ffff0000c586c780)
[   66.614380] 
[   66.614553] The buggy address belongs to the physical page:
[   66.614982] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   66.615671] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.616269] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.616904] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.617481] page dumped because: kasan: bad access detected
[   66.617908] 
[   66.618094] Memory state around the buggy address:
[   66.618515]  ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.619065]  ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.619673] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.620213]                       ^
[   66.620545]  ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.621106]  ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.621663] ==================================================================

[   32.549101] ==================================================================
[   32.549719] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23d/0x670
[   32.550146] Read of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.550500] 
[   32.550618] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.551002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.551680] Call Trace:
[   32.551853]  <TASK>
[   32.552003]  dump_stack_lvl+0x49/0x62
[   32.552307]  print_report+0x189/0x492
[   32.552650]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.552946]  ? kasan_bitops_test_and_modify.constprop.0+0x23d/0x670
[   32.553570]  kasan_report+0x10c/0x190
[   32.553885]  ? kasan_bitops_test_and_modify.constprop.0+0x23d/0x670
[   32.554269]  kasan_check_range+0x10b/0x1c0
[   32.554605]  __kasan_check_read+0x11/0x20
[   32.554854]  kasan_bitops_test_and_modify.constprop.0+0x23d/0x670
[   32.555193]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   32.555616]  ? kasan_set_track+0x25/0x40
[   32.555871]  ? kasan_save_alloc_info+0x1e/0x30
[   32.556146]  ? __kasan_kmalloc+0xb6/0xc0
[   32.556540]  kasan_bitops_generic+0xac/0x120
[   32.556796]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.557153]  ? kasan_test_init+0x13e/0x1b0
[   32.557676]  kunit_try_run_case+0x8f/0xd0
[   32.557902]  ? kunit_catch_run_case+0x80/0x80
[   32.558194]  ? kunit_try_catch_throw+0x40/0x40
[   32.558617]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.558952]  kthread+0x17b/0x1b0
[   32.559190]  ? kthread_complete_and_exit+0x30/0x30
[   32.559608]  ret_from_fork+0x22/0x30
[   32.559891]  </TASK>
[   32.560010] 
[   32.560121] Allocated by task 269:
[   32.560443]  kasan_save_stack+0x41/0x70
[   32.560696]  kasan_set_track+0x25/0x40
[   32.560920]  kasan_save_alloc_info+0x1e/0x30
[   32.561190]  __kasan_kmalloc+0xb6/0xc0
[   32.561736]  kmalloc_trace+0x48/0xb0
[   32.562008]  kasan_bitops_generic+0x86/0x120
[   32.562307]  kunit_try_run_case+0x8f/0xd0
[   32.562669]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.563016]  kthread+0x17b/0x1b0
[   32.563230]  ret_from_fork+0x22/0x30
[   32.563550] 
[   32.563665] The buggy address belongs to the object at ffff888102f54b60
[   32.563665]  which belongs to the cache kmalloc-16 of size 16
[   32.564238] The buggy address is located 8 bytes inside of
[   32.564238]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.564890] 
[   32.565024] The buggy address belongs to the physical page:
[   32.565323] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.566068] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.566522] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.566891] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.567259] page dumped because: kasan: bad access detected
[   32.567649] 
[   32.567776] Memory state around the buggy address:
[   32.568022]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.568514]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.568877] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.569239]                                                           ^
[   32.569991]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.570401]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.570781] ==================================================================
[   32.592845] ==================================================================
[   32.593220] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x288/0x670
[   32.593807] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.594196] 
[   32.594552] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.594982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.595595] Call Trace:
[   32.595788]  <TASK>
[   32.595949]  dump_stack_lvl+0x49/0x62
[   32.596186]  print_report+0x189/0x492
[   32.596557]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.596846]  ? kasan_bitops_test_and_modify.constprop.0+0x288/0x670
[   32.597246]  kasan_report+0x10c/0x190
[   32.597601]  ? kasan_bitops_test_and_modify.constprop.0+0x288/0x670
[   32.597963]  kasan_check_range+0x10b/0x1c0
[   32.598236]  __kasan_check_write+0x14/0x20
[   32.598701]  kasan_bitops_test_and_modify.constprop.0+0x288/0x670
[   32.599058]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   32.599544]  ? kasan_set_track+0x25/0x40
[   32.599794]  ? kasan_save_alloc_info+0x1e/0x30
[   32.600072]  ? __kasan_kmalloc+0xb6/0xc0
[   32.600411]  kasan_bitops_generic+0xac/0x120
[   32.600691]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.601053]  ? kasan_test_init+0x13e/0x1b0
[   32.601486]  kunit_try_run_case+0x8f/0xd0
[   32.601736]  ? kunit_catch_run_case+0x80/0x80
[   32.602006]  ? kunit_try_catch_throw+0x40/0x40
[   32.602324]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.602792]  kthread+0x17b/0x1b0
[   32.603126]  ? kthread_complete_and_exit+0x30/0x30
[   32.603601]  ret_from_fork+0x22/0x30
[   32.603861]  </TASK>
[   32.603990] 
[   32.604109] Allocated by task 269:
[   32.604419]  kasan_save_stack+0x41/0x70
[   32.604670]  kasan_set_track+0x25/0x40
[   32.604906]  kasan_save_alloc_info+0x1e/0x30
[   32.605168]  __kasan_kmalloc+0xb6/0xc0
[   32.605416]  kmalloc_trace+0x48/0xb0
[   32.605743]  kasan_bitops_generic+0x86/0x120
[   32.606008]  kunit_try_run_case+0x8f/0xd0
[   32.606276]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.606829]  kthread+0x17b/0x1b0
[   32.607080]  ret_from_fork+0x22/0x30
[   32.607322] 
[   32.607598] The buggy address belongs to the object at ffff888102f54b60
[   32.607598]  which belongs to the cache kmalloc-16 of size 16
[   32.608135] The buggy address is located 8 bytes inside of
[   32.608135]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.608789] 
[   32.608942] The buggy address belongs to the physical page:
[   32.609244] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.609789] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.610105] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.610714] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.611094] page dumped because: kasan: bad access detected
[   32.611523] 
[   32.611622] Memory state around the buggy address:
[   32.611901]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.612303]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.612754] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.613092]                                                           ^
[   32.613569]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.613945]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.614323] ==================================================================
[   32.571299] ==================================================================
[   32.571706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x245/0x670
[   32.572197] Read of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.572651] 
[   32.572804] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.573189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.573846] Call Trace:
[   32.574129]  <TASK>
[   32.574285]  dump_stack_lvl+0x49/0x62
[   32.574513]  print_report+0x189/0x492
[   32.574751]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.575178]  ? kasan_bitops_test_and_modify.constprop.0+0x245/0x670
[   32.575637]  kasan_report+0x10c/0x190
[   32.575910]  ? kasan_bitops_test_and_modify.constprop.0+0x245/0x670
[   32.576452]  __asan_load8+0x7e/0xb0
[   32.576690]  kasan_bitops_test_and_modify.constprop.0+0x245/0x670
[   32.577044]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   32.577392]  ? kasan_set_track+0x25/0x40
[   32.577926]  ? kasan_save_alloc_info+0x1e/0x30
[   32.578252]  ? __kasan_kmalloc+0xb6/0xc0
[   32.578534]  kasan_bitops_generic+0xac/0x120
[   32.578869]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.579258]  ? kasan_test_init+0x13e/0x1b0
[   32.579607]  kunit_try_run_case+0x8f/0xd0
[   32.579878]  ? kunit_catch_run_case+0x80/0x80
[   32.580130]  ? kunit_try_catch_throw+0x40/0x40
[   32.580467]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.580770]  kthread+0x17b/0x1b0
[   32.580955]  ? kthread_complete_and_exit+0x30/0x30
[   32.581209]  ret_from_fork+0x22/0x30
[   32.581458]  </TASK>
[   32.581596] 
[   32.581696] Allocated by task 269:
[   32.581895]  kasan_save_stack+0x41/0x70
[   32.582106]  kasan_set_track+0x25/0x40
[   32.582851]  kasan_save_alloc_info+0x1e/0x30
[   32.583094]  __kasan_kmalloc+0xb6/0xc0
[   32.583523]  kmalloc_trace+0x48/0xb0
[   32.583722]  kasan_bitops_generic+0x86/0x120
[   32.583963]  kunit_try_run_case+0x8f/0xd0
[   32.584239]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.584657]  kthread+0x17b/0x1b0
[   32.584870]  ret_from_fork+0x22/0x30
[   32.585095] 
[   32.585234] The buggy address belongs to the object at ffff888102f54b60
[   32.585234]  which belongs to the cache kmalloc-16 of size 16
[   32.585926] The buggy address is located 8 bytes inside of
[   32.585926]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.586722] 
[   32.586853] The buggy address belongs to the physical page:
[   32.587125] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.587729] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.588047] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.588572] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.588954] page dumped because: kasan: bad access detected
[   32.589244] 
[   32.589437] Memory state around the buggy address:
[   32.589718]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.590081]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.590655] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.591007]                                                           ^
[   32.591372]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.591865]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.592235] ==================================================================
[   32.501282] ==================================================================
[   32.502274] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1c6/0x670
[   32.503035] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.503665] 
[   32.503874] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.504761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.505710] Call Trace:
[   32.505848]  <TASK>
[   32.505961]  dump_stack_lvl+0x49/0x62
[   32.506154]  print_report+0x189/0x492
[   32.506413]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.506811]  ? kasan_bitops_test_and_modify.constprop.0+0x1c6/0x670
[   32.507133]  kasan_report+0x10c/0x190
[   32.507518]  ? kasan_bitops_test_and_modify.constprop.0+0x1c6/0x670
[   32.507902]  kasan_check_range+0x10b/0x1c0
[   32.508150]  __kasan_check_write+0x14/0x20
[   32.508418]  kasan_bitops_test_and_modify.constprop.0+0x1c6/0x670
[   32.508854]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   32.509185]  ? kasan_set_track+0x25/0x40
[   32.509711]  ? kasan_save_alloc_info+0x1e/0x30
[   32.509969]  ? __kasan_kmalloc+0xb6/0xc0
[   32.510288]  kasan_bitops_generic+0xac/0x120
[   32.510646]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.511001]  ? kasan_test_init+0x13e/0x1b0
[   32.511284]  kunit_try_run_case+0x8f/0xd0
[   32.511633]  ? kunit_catch_run_case+0x80/0x80
[   32.511893]  ? kunit_try_catch_throw+0x40/0x40
[   32.512155]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.512602]  kthread+0x17b/0x1b0
[   32.512815]  ? kthread_complete_and_exit+0x30/0x30
[   32.513083]  ret_from_fork+0x22/0x30
[   32.513586]  </TASK>
[   32.513768] 
[   32.513873] Allocated by task 269:
[   32.514018]  kasan_save_stack+0x41/0x70
[   32.514327]  kasan_set_track+0x25/0x40
[   32.514664]  kasan_save_alloc_info+0x1e/0x30
[   32.514919]  __kasan_kmalloc+0xb6/0xc0
[   32.515146]  kmalloc_trace+0x48/0xb0
[   32.515530]  kasan_bitops_generic+0x86/0x120
[   32.515788]  kunit_try_run_case+0x8f/0xd0
[   32.516050]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.516482]  kthread+0x17b/0x1b0
[   32.516677]  ret_from_fork+0x22/0x30
[   32.516919] 
[   32.517020] The buggy address belongs to the object at ffff888102f54b60
[   32.517020]  which belongs to the cache kmalloc-16 of size 16
[   32.517851] The buggy address is located 8 bytes inside of
[   32.517851]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.518355] 
[   32.518470] The buggy address belongs to the physical page:
[   32.518700] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.519143] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.519732] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.520145] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.520671] page dumped because: kasan: bad access detected
[   32.520881] 
[   32.520978] Memory state around the buggy address:
[   32.521179]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.522147]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.522936] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.523701]                                                           ^
[   32.524433]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.525098]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.526011] ==================================================================
[   32.413279] ==================================================================
[   32.413726] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd8/0x670
[   32.414185] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.414624] 
[   32.414755] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.415101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.415466] Call Trace:
[   32.415647]  <TASK>
[   32.415796]  dump_stack_lvl+0x49/0x62
[   32.416041]  print_report+0x189/0x492
[   32.416578]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.416869]  ? kasan_bitops_test_and_modify.constprop.0+0xd8/0x670
[   32.417187]  kasan_report+0x10c/0x190
[   32.417594]  ? kasan_bitops_test_and_modify.constprop.0+0xd8/0x670
[   32.417916]  kasan_check_range+0x10b/0x1c0
[   32.418148]  __kasan_check_write+0x14/0x20
[   32.418396]  kasan_bitops_test_and_modify.constprop.0+0xd8/0x670
[   32.418925]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   32.419195]  ? kasan_set_track+0x25/0x40
[   32.419500]  ? kasan_save_alloc_info+0x1e/0x30
[   32.419727]  ? __kasan_kmalloc+0xb6/0xc0
[   32.419978]  kasan_bitops_generic+0xac/0x120
[   32.420216]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.420624]  ? kasan_test_init+0x13e/0x1b0
[   32.420862]  kunit_try_run_case+0x8f/0xd0
[   32.421073]  ? kunit_catch_run_case+0x80/0x80
[   32.421637]  ? kunit_try_catch_throw+0x40/0x40
[   32.421881]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.422206]  kthread+0x17b/0x1b0
[   32.422528]  ? kthread_complete_and_exit+0x30/0x30
[   32.422774]  ret_from_fork+0x22/0x30
[   32.423016]  </TASK>
[   32.423132] 
[   32.423234] Allocated by task 269:
[   32.423429]  kasan_save_stack+0x41/0x70
[   32.423734]  kasan_set_track+0x25/0x40
[   32.423963]  kasan_save_alloc_info+0x1e/0x30
[   32.424205]  __kasan_kmalloc+0xb6/0xc0
[   32.424439]  kmalloc_trace+0x48/0xb0
[   32.424641]  kasan_bitops_generic+0x86/0x120
[   32.424892]  kunit_try_run_case+0x8f/0xd0
[   32.425127]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.425715]  kthread+0x17b/0x1b0
[   32.425928]  ret_from_fork+0x22/0x30
[   32.426110] 
[   32.426235] The buggy address belongs to the object at ffff888102f54b60
[   32.426235]  which belongs to the cache kmalloc-16 of size 16
[   32.426902] The buggy address is located 8 bytes inside of
[   32.426902]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.427417] 
[   32.427567] The buggy address belongs to the physical page:
[   32.427859] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.428290] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.428680] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.429068] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.429386] page dumped because: kasan: bad access detected
[   32.429659] 
[   32.429768] Memory state around the buggy address:
[   32.430001]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.430641]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.430937] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.431422]                                                           ^
[   32.431743]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.432043]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.432537] ==================================================================
[   32.393095] ==================================================================
[   32.393479] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x670
[   32.393988] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.394362] 
[   32.394745] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.395120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.395484] Call Trace:
[   32.395614]  <TASK>
[   32.395841]  dump_stack_lvl+0x49/0x62
[   32.396101]  print_report+0x189/0x492
[   32.396472]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.396777]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x670
[   32.397124]  kasan_report+0x10c/0x190
[   32.397418]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x670
[   32.397758]  kasan_check_range+0x10b/0x1c0
[   32.398001]  __kasan_check_write+0x14/0x20
[   32.398218]  kasan_bitops_test_and_modify.constprop.0+0x9c/0x670
[   32.398832]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   32.399089]  ? kasan_set_track+0x25/0x40
[   32.399455]  ? kasan_save_alloc_info+0x1e/0x30
[   32.399734]  ? __kasan_kmalloc+0xb6/0xc0
[   32.399945]  kasan_bitops_generic+0xac/0x120
[   32.400219]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.400638]  ? kasan_test_init+0x13e/0x1b0
[   32.400897]  kunit_try_run_case+0x8f/0xd0
[   32.401142]  ? kunit_catch_run_case+0x80/0x80
[   32.401442]  ? kunit_try_catch_throw+0x40/0x40
[   32.401661]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.401986]  kthread+0x17b/0x1b0
[   32.402200]  ? kthread_complete_and_exit+0x30/0x30
[   32.402456]  ret_from_fork+0x22/0x30
[   32.402776]  </TASK>
[   32.402896] 
[   32.402986] Allocated by task 269:
[   32.403192]  kasan_save_stack+0x41/0x70
[   32.403440]  kasan_set_track+0x25/0x40
[   32.403648]  kasan_save_alloc_info+0x1e/0x30
[   32.403885]  __kasan_kmalloc+0xb6/0xc0
[   32.404063]  kmalloc_trace+0x48/0xb0
[   32.404712]  kasan_bitops_generic+0x86/0x120
[   32.404977]  kunit_try_run_case+0x8f/0xd0
[   32.405196]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.405634]  kthread+0x17b/0x1b0
[   32.405819]  ret_from_fork+0x22/0x30
[   32.406008] 
[   32.406115] The buggy address belongs to the object at ffff888102f54b60
[   32.406115]  which belongs to the cache kmalloc-16 of size 16
[   32.406787] The buggy address is located 8 bytes inside of
[   32.406787]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.407236] 
[   32.407351] The buggy address belongs to the physical page:
[   32.407868] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.408346] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.408778] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.409130] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.409489] page dumped because: kasan: bad access detected
[   32.410001] 
[   32.410115] Memory state around the buggy address:
[   32.410376]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.410757]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.411105] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.411410]                                                           ^
[   32.412007]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.412492]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.412827] ==================================================================
[   32.453380] ==================================================================
[   32.453733] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x14f/0x670
[   32.454122] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.454579] 
[   32.454909] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.455345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.455926] Call Trace:
[   32.456068]  <TASK>
[   32.456229]  dump_stack_lvl+0x49/0x62
[   32.456441]  print_report+0x189/0x492
[   32.456775]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.457178]  ? kasan_bitops_test_and_modify.constprop.0+0x14f/0x670
[   32.457462]  kasan_report+0x10c/0x190
[   32.457773]  ? kasan_bitops_test_and_modify.constprop.0+0x14f/0x670
[   32.458111]  kasan_check_range+0x10b/0x1c0
[   32.458536]  __kasan_check_write+0x14/0x20
[   32.458769]  kasan_bitops_test_and_modify.constprop.0+0x14f/0x670
[   32.459114]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   32.459631]  ? kasan_set_track+0x25/0x40
[   32.459861]  ? kasan_save_alloc_info+0x1e/0x30
[   32.460123]  ? __kasan_kmalloc+0xb6/0xc0
[   32.460383]  kasan_bitops_generic+0xac/0x120
[   32.460733]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.461079]  ? kasan_test_init+0x13e/0x1b0
[   32.461431]  kunit_try_run_case+0x8f/0xd0
[   32.461681]  ? kunit_catch_run_case+0x80/0x80
[   32.461916]  ? kunit_try_catch_throw+0x40/0x40
[   32.462173]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.462533]  kthread+0x17b/0x1b0
[   32.462993]  ? kthread_complete_and_exit+0x30/0x30
[   32.463300]  ret_from_fork+0x22/0x30
[   32.463528]  </TASK>
[   32.463695] 
[   32.463784] Allocated by task 269:
[   32.463982]  kasan_save_stack+0x41/0x70
[   32.464241]  kasan_set_track+0x25/0x40
[   32.464443]  kasan_save_alloc_info+0x1e/0x30
[   32.464684]  __kasan_kmalloc+0xb6/0xc0
[   32.464884]  kmalloc_trace+0x48/0xb0
[   32.465100]  kasan_bitops_generic+0x86/0x120
[   32.465708]  kunit_try_run_case+0x8f/0xd0
[   32.465944]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.466287]  kthread+0x17b/0x1b0
[   32.466500]  ret_from_fork+0x22/0x30
[   32.466721] 
[   32.466833] The buggy address belongs to the object at ffff888102f54b60
[   32.466833]  which belongs to the cache kmalloc-16 of size 16
[   32.467690] The buggy address is located 8 bytes inside of
[   32.467690]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.468205] 
[   32.468323] The buggy address belongs to the physical page:
[   32.468541] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.469144] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.469491] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.469954] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.470322] page dumped because: kasan: bad access detected
[   32.470584] 
[   32.470696] Memory state around the buggy address:
[   32.470925]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.471585]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.471880] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.472249]                                                           ^
[   32.472631]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.472957]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.473332] ==================================================================
[   32.526830] ==================================================================
[   32.527195] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x202/0x670
[   32.528177] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.528703] 
[   32.528810] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.529122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.529860] Call Trace:
[   32.530046]  <TASK>
[   32.530199]  dump_stack_lvl+0x49/0x62
[   32.530460]  print_report+0x189/0x492
[   32.530801]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.531125]  ? kasan_bitops_test_and_modify.constprop.0+0x202/0x670
[   32.531587]  kasan_report+0x10c/0x190
[   32.531901]  ? kasan_bitops_test_and_modify.constprop.0+0x202/0x670
[   32.532281]  kasan_check_range+0x10b/0x1c0
[   32.532621]  __kasan_check_write+0x14/0x20
[   32.532882]  kasan_bitops_test_and_modify.constprop.0+0x202/0x670
[   32.533242]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   32.533801]  ? kasan_set_track+0x25/0x40
[   32.534043]  ? kasan_save_alloc_info+0x1e/0x30
[   32.534414]  ? __kasan_kmalloc+0xb6/0xc0
[   32.534686]  kasan_bitops_generic+0xac/0x120
[   32.534921]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.535406]  ? kasan_test_init+0x13e/0x1b0
[   32.535691]  kunit_try_run_case+0x8f/0xd0
[   32.535949]  ? kunit_catch_run_case+0x80/0x80
[   32.536243]  ? kunit_try_catch_throw+0x40/0x40
[   32.536642]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.536975]  kthread+0x17b/0x1b0
[   32.537190]  ? kthread_complete_and_exit+0x30/0x30
[   32.537760]  ret_from_fork+0x22/0x30
[   32.538026]  </TASK>
[   32.538190] 
[   32.538439] Allocated by task 269:
[   32.538646]  kasan_save_stack+0x41/0x70
[   32.538917]  kasan_set_track+0x25/0x40
[   32.539145]  kasan_save_alloc_info+0x1e/0x30
[   32.539525]  __kasan_kmalloc+0xb6/0xc0
[   32.539777]  kmalloc_trace+0x48/0xb0
[   32.540014]  kasan_bitops_generic+0x86/0x120
[   32.540270]  kunit_try_run_case+0x8f/0xd0
[   32.540606]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.540919]  kthread+0x17b/0x1b0
[   32.541148]  ret_from_fork+0x22/0x30
[   32.541648] 
[   32.541748] The buggy address belongs to the object at ffff888102f54b60
[   32.541748]  which belongs to the cache kmalloc-16 of size 16
[   32.542406] The buggy address is located 8 bytes inside of
[   32.542406]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.543014] 
[   32.543132] The buggy address belongs to the physical page:
[   32.543522] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.543992] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.544473] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.544859] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.545256] page dumped because: kasan: bad access detected
[   32.545787] 
[   32.545895] Memory state around the buggy address:
[   32.546147]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.546666]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.547028] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.547500]                                                           ^
[   32.547817]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.548179]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.548647] ==================================================================
[   32.433018] ==================================================================
[   32.433401] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x113/0x670
[   32.433834] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.434171] 
[   32.434283] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.434741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.435082] Call Trace:
[   32.435633]  <TASK>
[   32.435795]  dump_stack_lvl+0x49/0x62
[   32.436045]  print_report+0x189/0x492
[   32.436324]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.436642]  ? kasan_bitops_test_and_modify.constprop.0+0x113/0x670
[   32.436998]  kasan_report+0x10c/0x190
[   32.437219]  ? kasan_bitops_test_and_modify.constprop.0+0x113/0x670
[   32.437665]  kasan_check_range+0x10b/0x1c0
[   32.437863]  __kasan_check_write+0x14/0x20
[   32.438108]  kasan_bitops_test_and_modify.constprop.0+0x113/0x670
[   32.438625]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   32.438954]  ? kasan_set_track+0x25/0x40
[   32.439206]  ? kasan_save_alloc_info+0x1e/0x30
[   32.439562]  ? __kasan_kmalloc+0xb6/0xc0
[   32.439789]  kasan_bitops_generic+0xac/0x120
[   32.440041]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.440365]  ? kasan_test_init+0x13e/0x1b0
[   32.440568]  kunit_try_run_case+0x8f/0xd0
[   32.440833]  ? kunit_catch_run_case+0x80/0x80
[   32.441080]  ? kunit_try_catch_throw+0x40/0x40
[   32.441476]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.441773]  kthread+0x17b/0x1b0
[   32.441986]  ? kthread_complete_and_exit+0x30/0x30
[   32.442214]  ret_from_fork+0x22/0x30
[   32.442766]  </TASK>
[   32.442932] 
[   32.443035] Allocated by task 269:
[   32.443198]  kasan_save_stack+0x41/0x70
[   32.443626]  kasan_set_track+0x25/0x40
[   32.443847]  kasan_save_alloc_info+0x1e/0x30
[   32.444090]  __kasan_kmalloc+0xb6/0xc0
[   32.444359]  kmalloc_trace+0x48/0xb0
[   32.444544]  kasan_bitops_generic+0x86/0x120
[   32.444900]  kunit_try_run_case+0x8f/0xd0
[   32.445117]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.445398]  kthread+0x17b/0x1b0
[   32.445674]  ret_from_fork+0x22/0x30
[   32.445902] 
[   32.446011] The buggy address belongs to the object at ffff888102f54b60
[   32.446011]  which belongs to the cache kmalloc-16 of size 16
[   32.446551] The buggy address is located 8 bytes inside of
[   32.446551]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.447830] 
[   32.447953] The buggy address belongs to the physical page:
[   32.448233] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.448689] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.449101] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.449464] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.449828] page dumped because: kasan: bad access detected
[   32.450112] 
[   32.450232] Memory state around the buggy address:
[   32.450739]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.451078]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.451574] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.451900]                                                           ^
[   32.452201]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.452497]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.452860] ==================================================================
[   32.473775] ==================================================================
[   32.474116] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x18b/0x670
[   32.474709] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269
[   32.475058] 
[   32.475172] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.475885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.476417] Call Trace:
[   32.476556]  <TASK>
[   32.476709]  dump_stack_lvl+0x49/0x62
[   32.476971]  print_report+0x189/0x492
[   32.477189]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.477501]  ? kasan_bitops_test_and_modify.constprop.0+0x18b/0x670
[   32.477969]  kasan_report+0x10c/0x190
[   32.478227]  ? kasan_bitops_test_and_modify.constprop.0+0x18b/0x670
[   32.478643]  kasan_check_range+0x10b/0x1c0
[   32.478907]  __kasan_check_write+0x14/0x20
[   32.479116]  kasan_bitops_test_and_modify.constprop.0+0x18b/0x670
[   32.479416]  ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0
[   32.479994]  ? kasan_set_track+0x25/0x40
[   32.480219]  ? kasan_save_alloc_info+0x1e/0x30
[   32.480492]  ? __kasan_kmalloc+0xb6/0xc0
[   32.480792]  kasan_bitops_generic+0xac/0x120
[   32.481081]  ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670
[   32.481555]  ? kasan_test_init+0x13e/0x1b0
[   32.481815]  kunit_try_run_case+0x8f/0xd0
[   32.482064]  ? kunit_catch_run_case+0x80/0x80
[   32.482329]  ? kunit_try_catch_throw+0x40/0x40
[   32.482539]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.483052]  kthread+0x17b/0x1b0
[   32.483289]  ? kthread_complete_and_exit+0x30/0x30
[   32.483505]  ret_from_fork+0x22/0x30
[   32.483696]  </TASK>
[   32.483825] 
[   32.483941] Allocated by task 269:
[   32.484111]  kasan_save_stack+0x41/0x70
[   32.485796]  kasan_set_track+0x25/0x40
[   32.486278]  kasan_save_alloc_info+0x1e/0x30
[   32.486854]  __kasan_kmalloc+0xb6/0xc0
[   32.487054]  kmalloc_trace+0x48/0xb0
[   32.487236]  kasan_bitops_generic+0x86/0x120
[   32.487442]  kunit_try_run_case+0x8f/0xd0
[   32.487631]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.487860]  kthread+0x17b/0x1b0
[   32.488013]  ret_from_fork+0x22/0x30
[   32.488837] 
[   32.489039] The buggy address belongs to the object at ffff888102f54b60
[   32.489039]  which belongs to the cache kmalloc-16 of size 16
[   32.490500] The buggy address is located 8 bytes inside of
[   32.490500]  16-byte region [ffff888102f54b60, ffff888102f54b70)
[   32.491708] 
[   32.491952] The buggy address belongs to the physical page:
[   32.492646] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   32.493537] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.494296] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.495269] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.495770] page dumped because: kasan: bad access detected
[   32.495985] 
[   32.496077] Memory state around the buggy address:
[   32.496329]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   32.497038]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.497810] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.498553]                                                           ^
[   32.499296]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.499949]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.500243] ==================================================================