Hay
Date
Feb. 5, 2025, 2:09 p.m.

Environment
qemu-arm64

[  183.164023] ==================================================================
[  183.165445] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x130/0x6d8
[  183.167142] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.169137] 
[  183.169832] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.171748] Hardware name: linux,dummy-virt (DT)
[  183.172896] Call trace:
[  183.173623]  dump_backtrace+0x9c/0x128
[  183.174737]  show_stack+0x20/0x38
[  183.176070]  dump_stack_lvl+0x60/0xb0
[  183.177781]  print_report+0xf8/0x5d8
[  183.178843]  kasan_report+0xc8/0x118
[  183.180033]  __asan_load8+0x9c/0xc0
[  183.181213]  kasan_bitops_modify.constprop.0+0x130/0x6d8
[  183.183432]  kasan_bitops_generic+0xb4/0x148
[  183.184707]  kunit_try_run_case+0xf8/0x260
[  183.185924]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.187437]  kthread+0x18c/0x1a8
[  183.188393]  ret_from_fork+0x10/0x20
[  183.190227] 
[  183.190891] Allocated by task 206:
[  183.192042]  kasan_save_stack+0x3c/0x68
[  183.193294]  kasan_set_track+0x2c/0x40
[  183.194440]  kasan_save_alloc_info+0x24/0x38
[  183.195729]  __kasan_kmalloc+0xd4/0xd8
[  183.196846]  kmalloc_trace+0x68/0x130
[  183.197869]  kasan_bitops_generic+0x98/0x148
[  183.198918]  kunit_try_run_case+0xf8/0x260
[  183.199954]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.201802]  kthread+0x18c/0x1a8
[  183.202774]  ret_from_fork+0x10/0x20
[  183.203883] 
[  183.204386] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.204386]  which belongs to the cache kmalloc-16 of size 16
[  183.207710] The buggy address is located 8 bytes inside of
[  183.207710]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.210228] 
[  183.210842] The buggy address belongs to the physical page:
[  183.212137] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.214129] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.216084] page_type: 0xffffffff()
[  183.217275] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.219101] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.220680] page dumped because: kasan: bad access detected
[  183.221985] 
[  183.222509] Memory state around the buggy address:
[  183.224109]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.225969]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.227599] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.229291]                                               ^
[  183.230751]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.232351]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.234261] ==================================================================
[  183.096213] ==================================================================
[  183.097708] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0x6d8
[  183.099458] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.101152] 
[  183.101825] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.103626] Hardware name: linux,dummy-virt (DT)
[  183.104707] Call trace:
[  183.105416]  dump_backtrace+0x9c/0x128
[  183.106488]  show_stack+0x20/0x38
[  183.107465]  dump_stack_lvl+0x60/0xb0
[  183.108621]  print_report+0xf8/0x5d8
[  183.109741]  kasan_report+0xc8/0x118
[  183.110849]  kasan_check_range+0xe8/0x190
[  183.112048]  __kasan_check_write+0x20/0x30
[  183.113830]  kasan_bitops_modify.constprop.0+0x100/0x6d8
[  183.115016]  kasan_bitops_generic+0xb4/0x148
[  183.116372]  kunit_try_run_case+0xf8/0x260
[  183.117619]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.119072]  kthread+0x18c/0x1a8
[  183.120016]  ret_from_fork+0x10/0x20
[  183.121085] 
[  183.121592] Allocated by task 206:
[  183.122497]  kasan_save_stack+0x3c/0x68
[  183.123667]  kasan_set_track+0x2c/0x40
[  183.124779]  kasan_save_alloc_info+0x24/0x38
[  183.126058]  __kasan_kmalloc+0xd4/0xd8
[  183.127201]  kmalloc_trace+0x68/0x130
[  183.128250]  kasan_bitops_generic+0x98/0x148
[  183.129440]  kunit_try_run_case+0xf8/0x260
[  183.130648]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.132076]  kthread+0x18c/0x1a8
[  183.133037]  ret_from_fork+0x10/0x20
[  183.134118] 
[  183.134667] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.134667]  which belongs to the cache kmalloc-16 of size 16
[  183.136995] The buggy address is located 8 bytes inside of
[  183.136995]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.139424] 
[  183.139937] The buggy address belongs to the physical page:
[  183.141171] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.143105] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.144652] page_type: 0xffffffff()
[  183.145606] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.147308] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.148929] page dumped because: kasan: bad access detected
[  183.150147] 
[  183.150677] Memory state around the buggy address:
[  183.151871]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.153451]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.155060] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.156614]                                               ^
[  183.157927]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.159488]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.161018] ==================================================================
[  183.312666] ==================================================================
[  183.314481] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x194/0x6d8
[  183.316861] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.318537] 
[  183.319134] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.321400] Hardware name: linux,dummy-virt (DT)
[  183.322543] Call trace:
[  183.324022]  dump_backtrace+0x9c/0x128
[  183.325148]  show_stack+0x20/0x38
[  183.326169]  dump_stack_lvl+0x60/0xb0
[  183.327319]  print_report+0xf8/0x5d8
[  183.328428]  kasan_report+0xc8/0x118
[  183.329545]  kasan_check_range+0xe8/0x190
[  183.330869]  __kasan_check_write+0x20/0x30
[  183.332595]  kasan_bitops_modify.constprop.0+0x194/0x6d8
[  183.334075]  kasan_bitops_generic+0xb4/0x148
[  183.335275]  kunit_try_run_case+0xf8/0x260
[  183.336472]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.338936]  kthread+0x18c/0x1a8
[  183.339963]  ret_from_fork+0x10/0x20
[  183.341079] 
[  183.341593] Allocated by task 206:
[  183.342547]  kasan_save_stack+0x3c/0x68
[  183.343705]  kasan_set_track+0x2c/0x40
[  183.344837]  kasan_save_alloc_info+0x24/0x38
[  183.346310]  __kasan_kmalloc+0xd4/0xd8
[  183.347637]  kmalloc_trace+0x68/0x130
[  183.348877]  kasan_bitops_generic+0x98/0x148
[  183.350483]  kunit_try_run_case+0xf8/0x260
[  183.351941]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.353625]  kthread+0x18c/0x1a8
[  183.354731]  ret_from_fork+0x10/0x20
[  183.356083] 
[  183.356796] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.356796]  which belongs to the cache kmalloc-16 of size 16
[  183.359386] The buggy address is located 8 bytes inside of
[  183.359386]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.362116] 
[  183.362657] The buggy address belongs to the physical page:
[  183.363992] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.366099] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.367734] page_type: 0xffffffff()
[  183.368629] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.370611] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.372235] page dumped because: kasan: bad access detected
[  183.373248] 
[  183.373725] Memory state around the buggy address:
[  183.374616]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.376717]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.378732] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.380378]                                               ^
[  183.381827]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.383604]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.385445] ==================================================================
[  183.527186] ==================================================================
[  183.528627] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0x6d8
[  183.530392] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.532136] 
[  183.532710] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.534499] Hardware name: linux,dummy-virt (DT)
[  183.535617] Call trace:
[  183.536302]  dump_backtrace+0x9c/0x128
[  183.537368]  show_stack+0x20/0x38
[  183.538360]  dump_stack_lvl+0x60/0xb0
[  183.539510]  print_report+0xf8/0x5d8
[  183.540643]  kasan_report+0xc8/0x118
[  183.541805]  kasan_check_range+0xe8/0x190
[  183.543029]  __kasan_check_write+0x20/0x30
[  183.544150]  kasan_bitops_modify.constprop.0+0x1dc/0x6d8
[  183.545976]  kasan_bitops_generic+0xb4/0x148
[  183.546995]  kunit_try_run_case+0xf8/0x260
[  183.548642]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.550162]  kthread+0x18c/0x1a8
[  183.551006]  ret_from_fork+0x10/0x20
[  183.552104] 
[  183.552634] Allocated by task 206:
[  183.553518]  kasan_save_stack+0x3c/0x68
[  183.554681]  kasan_set_track+0x2c/0x40
[  183.555794]  kasan_save_alloc_info+0x24/0x38
[  183.557048]  __kasan_kmalloc+0xd4/0xd8
[  183.558182]  kmalloc_trace+0x68/0x130
[  183.559219]  kasan_bitops_generic+0x98/0x148
[  183.560406]  kunit_try_run_case+0xf8/0x260
[  183.561589]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.563016]  kthread+0x18c/0x1a8
[  183.563954]  ret_from_fork+0x10/0x20
[  183.565042] 
[  183.565655] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.565655]  which belongs to the cache kmalloc-16 of size 16
[  183.567978] The buggy address is located 8 bytes inside of
[  183.567978]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.570399] 
[  183.570969] The buggy address belongs to the physical page:
[  183.572198] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.574114] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.575649] page_type: 0xffffffff()
[  183.576623] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.578319] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.579920] page dumped because: kasan: bad access detected
[  183.581176] 
[  183.581740] Memory state around the buggy address:
[  183.582893]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.584468]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.586065] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.587559]                                               ^
[  183.588880]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.590461]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.591955] ==================================================================
[  183.388352] ==================================================================
[  183.389972] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x6d8
[  183.392168] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.394104] 
[  183.394777] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.396639] Hardware name: linux,dummy-virt (DT)
[  183.397817] Call trace:
[  183.398595]  dump_backtrace+0x9c/0x128
[  183.399694]  show_stack+0x20/0x38
[  183.400717]  dump_stack_lvl+0x60/0xb0
[  183.401950]  print_report+0xf8/0x5d8
[  183.403067]  kasan_report+0xc8/0x118
[  183.404207]  __asan_load8+0x9c/0xc0
[  183.405330]  kasan_bitops_modify.constprop.0+0x19c/0x6d8
[  183.406761]  kasan_bitops_generic+0xb4/0x148
[  183.407970]  kunit_try_run_case+0xf8/0x260
[  183.409166]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.410645]  kthread+0x18c/0x1a8
[  183.411618]  ret_from_fork+0x10/0x20
[  183.412708] 
[  183.413251] Allocated by task 206:
[  183.414213]  kasan_save_stack+0x3c/0x68
[  183.415363]  kasan_set_track+0x2c/0x40
[  183.416489]  kasan_save_alloc_info+0x24/0x38
[  183.417766]  __kasan_kmalloc+0xd4/0xd8
[  183.418917]  kmalloc_trace+0x68/0x130
[  183.419985]  kasan_bitops_generic+0x98/0x148
[  183.421208]  kunit_try_run_case+0xf8/0x260
[  183.422407]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.423875]  kthread+0x18c/0x1a8
[  183.424834]  ret_from_fork+0x10/0x20
[  183.425947] 
[  183.426448] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.426448]  which belongs to the cache kmalloc-16 of size 16
[  183.428808] The buggy address is located 8 bytes inside of
[  183.428808]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.431254] 
[  183.431690] The buggy address belongs to the physical page:
[  183.433117] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.435115] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.436670] page_type: 0xffffffff()
[  183.437654] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.439332] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.441032] page dumped because: kasan: bad access detected
[  183.442265] 
[  183.442769] Memory state around the buggy address:
[  183.444095]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.445821]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.447386] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.449389]                                               ^
[  183.450835]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.452439]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.453963] ==================================================================
[  182.958338] ==================================================================
[  182.960134] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4/0x6d8
[  182.962060] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  182.963722] 
[  182.964296] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  182.966142] Hardware name: linux,dummy-virt (DT)
[  182.967265] Call trace:
[  182.968021]  dump_backtrace+0x9c/0x128
[  182.969086]  show_stack+0x20/0x38
[  182.970083]  dump_stack_lvl+0x60/0xb0
[  182.971248]  print_report+0xf8/0x5d8
[  182.972358]  kasan_report+0xc8/0x118
[  182.973470]  kasan_check_range+0xe8/0x190
[  182.974708]  __kasan_check_write+0x20/0x30
[  182.975830]  kasan_bitops_modify.constprop.0+0xa4/0x6d8
[  182.977184]  kasan_bitops_generic+0xb4/0x148
[  182.978384]  kunit_try_run_case+0xf8/0x260
[  182.979594]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  182.981024]  kthread+0x18c/0x1a8
[  182.982009]  ret_from_fork+0x10/0x20
[  182.983089] 
[  182.983608] Allocated by task 206:
[  182.984500]  kasan_save_stack+0x3c/0x68
[  182.985668]  kasan_set_track+0x2c/0x40
[  182.986801]  kasan_save_alloc_info+0x24/0x38
[  182.988071]  __kasan_kmalloc+0xd4/0xd8
[  182.989189]  kmalloc_trace+0x68/0x130
[  182.990300]  kasan_bitops_generic+0x98/0x148
[  182.991450]  kunit_try_run_case+0xf8/0x260
[  182.992735]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  182.994241]  kthread+0x18c/0x1a8
[  182.995248]  ret_from_fork+0x10/0x20
[  182.996352] 
[  182.996982] The buggy address belongs to the object at ffff0000c5e9f5c0
[  182.996982]  which belongs to the cache kmalloc-16 of size 16
[  182.999527] The buggy address is located 8 bytes inside of
[  182.999527]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.002051] 
[  183.002645] The buggy address belongs to the physical page:
[  183.003983] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.005964] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.007496] page_type: 0xffffffff()
[  183.008539] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.010161] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.011503] page dumped because: kasan: bad access detected
[  183.012867] 
[  183.013388] Memory state around the buggy address:
[  183.014598]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.016202]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.017848] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.019395]                                               ^
[  183.020724]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.022310]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.023861] ==================================================================
[  183.237797] ==================================================================
[  183.239232] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x160/0x6d8
[  183.240972] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.243201] 
[  183.243747] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.246200] Hardware name: linux,dummy-virt (DT)
[  183.247704] Call trace:
[  183.248330]  dump_backtrace+0x9c/0x128
[  183.249741]  show_stack+0x20/0x38
[  183.250536]  dump_stack_lvl+0x60/0xb0
[  183.252026]  print_report+0xf8/0x5d8
[  183.253166]  kasan_report+0xc8/0x118
[  183.254316]  kasan_check_range+0xe8/0x190
[  183.255515]  __kasan_check_write+0x20/0x30
[  183.256668]  kasan_bitops_modify.constprop.0+0x160/0x6d8
[  183.258114]  kasan_bitops_generic+0xb4/0x148
[  183.259327]  kunit_try_run_case+0xf8/0x260
[  183.260444]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.262457]  kthread+0x18c/0x1a8
[  183.263490]  ret_from_fork+0x10/0x20
[  183.264609] 
[  183.265923] Allocated by task 206:
[  183.266702]  kasan_save_stack+0x3c/0x68
[  183.268074]  kasan_set_track+0x2c/0x40
[  183.269255]  kasan_save_alloc_info+0x24/0x38
[  183.270561]  __kasan_kmalloc+0xd4/0xd8
[  183.271741]  kmalloc_trace+0x68/0x130
[  183.272826]  kasan_bitops_generic+0x98/0x148
[  183.273856]  kunit_try_run_case+0xf8/0x260
[  183.275603]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.277047]  kthread+0x18c/0x1a8
[  183.278034]  ret_from_fork+0x10/0x20
[  183.279121] 
[  183.279663] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.279663]  which belongs to the cache kmalloc-16 of size 16
[  183.282722] The buggy address is located 8 bytes inside of
[  183.282722]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.285735] 
[  183.286293] The buggy address belongs to the physical page:
[  183.287548] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.289674] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.291283] page_type: 0xffffffff()
[  183.292994] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.294748] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.296302] page dumped because: kasan: bad access detected
[  183.297827] 
[  183.298292] Memory state around the buggy address:
[  183.299191]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.300815]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.302392] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.303932]                                               ^
[  183.305626]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.308131]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.310090] ==================================================================
[  183.027822] ==================================================================
[  183.029399] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xd0/0x6d8
[  183.031268] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.033184] 
[  183.033728] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.035313] Hardware name: linux,dummy-virt (DT)
[  183.036716] Call trace:
[  183.037531]  dump_backtrace+0x9c/0x128
[  183.038674]  show_stack+0x20/0x38
[  183.039682]  dump_stack_lvl+0x60/0xb0
[  183.040865]  print_report+0xf8/0x5d8
[  183.041995]  kasan_report+0xc8/0x118
[  183.043122]  __asan_load8+0x9c/0xc0
[  183.044232]  kasan_bitops_modify.constprop.0+0xd0/0x6d8
[  183.045619]  kasan_bitops_generic+0xb4/0x148
[  183.046842]  kunit_try_run_case+0xf8/0x260
[  183.048023]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.049473]  kthread+0x18c/0x1a8
[  183.050441]  ret_from_fork+0x10/0x20
[  183.051558] 
[  183.052081] Allocated by task 206:
[  183.053013]  kasan_save_stack+0x3c/0x68
[  183.054163]  kasan_set_track+0x2c/0x40
[  183.055286]  kasan_save_alloc_info+0x24/0x38
[  183.056542]  __kasan_kmalloc+0xd4/0xd8
[  183.057675]  kmalloc_trace+0x68/0x130
[  183.058738]  kasan_bitops_generic+0x98/0x148
[  183.059914]  kunit_try_run_case+0xf8/0x260
[  183.061119]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.062594]  kthread+0x18c/0x1a8
[  183.063533]  ret_from_fork+0x10/0x20
[  183.064624] 
[  183.065133] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.065133]  which belongs to the cache kmalloc-16 of size 16
[  183.067563] The buggy address is located 8 bytes inside of
[  183.067563]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.069954] 
[  183.070554] The buggy address belongs to the physical page:
[  183.071873] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.073848] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.075446] page_type: 0xffffffff()
[  183.076498] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.078229] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.079819] page dumped because: kasan: bad access detected
[  183.081096] 
[  183.081651] Memory state around the buggy address:
[  183.082883]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.084454]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.086046] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.087563]                                               ^
[  183.088870]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.090453]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.091961] ==================================================================
[  183.458039] ==================================================================
[  183.459432] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1ac/0x6d8
[  183.461161] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.463145] 
[  183.463849] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.465664] Hardware name: linux,dummy-virt (DT)
[  183.466785] Call trace:
[  183.467468]  dump_backtrace+0x9c/0x128
[  183.468607]  show_stack+0x20/0x38
[  183.469641]  dump_stack_lvl+0x60/0xb0
[  183.470858]  print_report+0xf8/0x5d8
[  183.471992]  kasan_report+0xc8/0x118
[  183.473143]  kasan_check_range+0xe8/0x190
[  183.474369]  __kasan_check_write+0x20/0x30
[  183.475519]  kasan_bitops_modify.constprop.0+0x1ac/0x6d8
[  183.476941]  kasan_bitops_generic+0xb4/0x148
[  183.478183]  kunit_try_run_case+0xf8/0x260
[  183.479403]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.480862]  kthread+0x18c/0x1a8
[  183.481896]  ret_from_fork+0x10/0x20
[  183.483040] 
[  183.483651] Allocated by task 206:
[  183.484563]  kasan_save_stack+0x3c/0x68
[  183.485766]  kasan_set_track+0x2c/0x40
[  183.486931]  kasan_save_alloc_info+0x24/0x38
[  183.488208]  __kasan_kmalloc+0xd4/0xd8
[  183.489346]  kmalloc_trace+0x68/0x130
[  183.490413]  kasan_bitops_generic+0x98/0x148
[  183.491623]  kunit_try_run_case+0xf8/0x260
[  183.492837]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.494305]  kthread+0x18c/0x1a8
[  183.495277]  ret_from_fork+0x10/0x20
[  183.496329] 
[  183.496884] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.496884]  which belongs to the cache kmalloc-16 of size 16
[  183.499120] The buggy address is located 8 bytes inside of
[  183.499120]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.501520] 
[  183.502031] The buggy address belongs to the physical page:
[  183.503311] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.505205] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.506764] page_type: 0xffffffff()
[  183.507792] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.509432] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.511033] page dumped because: kasan: bad access detected
[  183.512210] 
[  183.512771] Memory state around the buggy address:
[  183.513933]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.515508]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.517087] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.518620]                                               ^
[  183.519931]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.521493]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.523014] ==================================================================
[  183.594725] ==================================================================
[  183.596201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x20c/0x6d8
[  183.597943] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.599466] 
[  183.600075] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.601963] Hardware name: linux,dummy-virt (DT)
[  183.603068] Call trace:
[  183.603801]  dump_backtrace+0x9c/0x128
[  183.604880]  show_stack+0x20/0x38
[  183.605844]  dump_stack_lvl+0x60/0xb0
[  183.607011]  print_report+0xf8/0x5d8
[  183.608122]  kasan_report+0xc8/0x118
[  183.609228]  __asan_load8+0x9c/0xc0
[  183.610356]  kasan_bitops_modify.constprop.0+0x20c/0x6d8
[  183.611742]  kasan_bitops_generic+0xb4/0x148
[  183.612953]  kunit_try_run_case+0xf8/0x260
[  183.614140]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.615597]  kthread+0x18c/0x1a8
[  183.616550]  ret_from_fork+0x10/0x20
[  183.617641] 
[  183.618134] Allocated by task 206:
[  183.619099]  kasan_save_stack+0x3c/0x68
[  183.620264]  kasan_set_track+0x2c/0x40
[  183.621409]  kasan_save_alloc_info+0x24/0x38
[  183.622696]  __kasan_kmalloc+0xd4/0xd8
[  183.623823]  kmalloc_trace+0x68/0x130
[  183.624866]  kasan_bitops_generic+0x98/0x148
[  183.626085]  kunit_try_run_case+0xf8/0x260
[  183.627262]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.628719]  kthread+0x18c/0x1a8
[  183.629661]  ret_from_fork+0x10/0x20
[  183.630749] 
[  183.631268] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.631268]  which belongs to the cache kmalloc-16 of size 16
[  183.633598] The buggy address is located 8 bytes inside of
[  183.633598]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.636022] 
[  183.636646] The buggy address belongs to the physical page:
[  183.637932] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.639949] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.641480] page_type: 0xffffffff()
[  183.642562] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.644248] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.645878] page dumped because: kasan: bad access detected
[  183.647133] 
[  183.647661] Memory state around the buggy address:
[  183.648874]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.650609]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.652115] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.654662]                                               ^
[  183.656561]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.658172]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.659672] ==================================================================