Hay
Date
Feb. 5, 2025, 2:09 p.m.

Environment
qemu-arm64

[  184.276433] ==================================================================
[  184.279238] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8
[  184.281120] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  184.282764] 
[  184.283348] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  184.285148] Hardware name: linux,dummy-virt (DT)
[  184.286285] Call trace:
[  184.286997]  dump_backtrace+0x9c/0x128
[  184.288070]  show_stack+0x20/0x38
[  184.289061]  dump_stack_lvl+0x60/0xb0
[  184.290263]  print_report+0xf8/0x5d8
[  184.291359]  kasan_report+0xc8/0x118
[  184.292449]  kasan_check_range+0xe8/0x190
[  184.293672]  __kasan_check_write+0x20/0x30
[  184.294833]  kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8
[  184.296390]  kasan_bitops_generic+0xc0/0x148
[  184.297612]  kunit_try_run_case+0xf8/0x260
[  184.298836]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  184.300273]  kthread+0x18c/0x1a8
[  184.301238]  ret_from_fork+0x10/0x20
[  184.302324] 
[  184.302829] Allocated by task 206:
[  184.303722]  kasan_save_stack+0x3c/0x68
[  184.304946]  kasan_set_track+0x2c/0x40
[  184.306108]  kasan_save_alloc_info+0x24/0x38
[  184.307375]  __kasan_kmalloc+0xd4/0xd8
[  184.308521]  kmalloc_trace+0x68/0x130
[  184.309590]  kasan_bitops_generic+0x98/0x148
[  184.310800]  kunit_try_run_case+0xf8/0x260
[  184.312005]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  184.313450]  kthread+0x18c/0x1a8
[  184.314424]  ret_from_fork+0x10/0x20
[  184.315482] 
[  184.316041] The buggy address belongs to the object at ffff0000c5e9f5c0
[  184.316041]  which belongs to the cache kmalloc-16 of size 16
[  184.318393] The buggy address is located 8 bytes inside of
[  184.318393]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  184.320786] 
[  184.321341] The buggy address belongs to the physical page:
[  184.322627] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  184.324516] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.326128] page_type: 0xffffffff()
[  184.327161] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  184.328874] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  184.330471] page dumped because: kasan: bad access detected
[  184.331692] 
[  184.332225] Memory state around the buggy address:
[  184.333398]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  184.335018]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  184.336636] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  184.338197]                                               ^
[  184.339538]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.341132]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.342656] ==================================================================
[  183.662389] ==================================================================
[  183.663952] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8
[  183.665890] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.667316] 
[  183.667891] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.669779] Hardware name: linux,dummy-virt (DT)
[  183.670954] Call trace:
[  183.671709]  dump_backtrace+0x9c/0x128
[  183.672837]  show_stack+0x20/0x38
[  183.673822]  dump_stack_lvl+0x60/0xb0
[  183.674973]  print_report+0xf8/0x5d8
[  183.676061]  kasan_report+0xc8/0x118
[  183.677168]  kasan_check_range+0xe8/0x190
[  183.678388]  __kasan_check_write+0x20/0x30
[  183.679470]  kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8
[  183.680966]  kasan_bitops_generic+0xc0/0x148
[  183.682167]  kunit_try_run_case+0xf8/0x260
[  183.683351]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.684783]  kthread+0x18c/0x1a8
[  183.685776]  ret_from_fork+0x10/0x20
[  183.686863] 
[  183.687359] Allocated by task 206:
[  183.688276]  kasan_save_stack+0x3c/0x68
[  183.689429]  kasan_set_track+0x2c/0x40
[  183.690542]  kasan_save_alloc_info+0x24/0x38
[  183.691805]  __kasan_kmalloc+0xd4/0xd8
[  183.692987]  kmalloc_trace+0x68/0x130
[  183.694076]  kasan_bitops_generic+0x98/0x148
[  183.695251]  kunit_try_run_case+0xf8/0x260
[  183.696449]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.697953]  kthread+0x18c/0x1a8
[  183.698893]  ret_from_fork+0x10/0x20
[  183.699988] 
[  183.700522] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.700522]  which belongs to the cache kmalloc-16 of size 16
[  183.702841] The buggy address is located 8 bytes inside of
[  183.702841]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.705181] 
[  183.705766] The buggy address belongs to the physical page:
[  183.707102] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.709025] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.710553] page_type: 0xffffffff()
[  183.711594] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.713263] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.714894] page dumped because: kasan: bad access detected
[  183.716076] 
[  183.716596] Memory state around the buggy address:
[  183.717834]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.719455]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.721046] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.722546]                                               ^
[  183.723838]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.725400]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.726928] ==================================================================
[  183.729680] ==================================================================
[  183.731098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8
[  183.733001] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.734675] 
[  183.735321] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.737230] Hardware name: linux,dummy-virt (DT)
[  183.738303] Call trace:
[  183.739040]  dump_backtrace+0x9c/0x128
[  183.740133]  show_stack+0x20/0x38
[  183.741124]  dump_stack_lvl+0x60/0xb0
[  183.742278]  print_report+0xf8/0x5d8
[  183.743375]  kasan_report+0xc8/0x118
[  183.744486]  __asan_load8+0x9c/0xc0
[  183.745604]  kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8
[  183.747118]  kasan_bitops_generic+0xc0/0x148
[  183.748307]  kunit_try_run_case+0xf8/0x260
[  183.749499]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.750971]  kthread+0x18c/0x1a8
[  183.751899]  ret_from_fork+0x10/0x20
[  183.753061] 
[  183.754134] Allocated by task 206:
[  183.755245]  kasan_save_stack+0x3c/0x68
[  183.756674]  kasan_set_track+0x2c/0x40
[  183.757853]  kasan_save_alloc_info+0x24/0x38
[  183.759132]  __kasan_kmalloc+0xd4/0xd8
[  183.760279]  kmalloc_trace+0x68/0x130
[  183.761349]  kasan_bitops_generic+0x98/0x148
[  183.762531]  kunit_try_run_case+0xf8/0x260
[  183.763756]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.765187]  kthread+0x18c/0x1a8
[  183.766165]  ret_from_fork+0x10/0x20
[  183.767244] 
[  183.767772] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.767772]  which belongs to the cache kmalloc-16 of size 16
[  183.770172] The buggy address is located 8 bytes inside of
[  183.770172]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.772520] 
[  183.773274] The buggy address belongs to the physical page:
[  183.774566] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.776537] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.778103] page_type: 0xffffffff()
[  183.779178] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.780903] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.782522] page dumped because: kasan: bad access detected
[  183.783790] 
[  183.784317] Memory state around the buggy address:
[  183.785544]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.787155]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.788782] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.790311]                                               ^
[  183.791660]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.793244]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.794760] ==================================================================
[  184.207913] ==================================================================
[  184.209548] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8
[  184.211437] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  184.213059] 
[  184.213753] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  184.215551] Hardware name: linux,dummy-virt (DT)
[  184.216663] Call trace:
[  184.217382]  dump_backtrace+0x9c/0x128
[  184.218482]  show_stack+0x20/0x38
[  184.219448]  dump_stack_lvl+0x60/0xb0
[  184.220515]  print_report+0xf8/0x5d8
[  184.221498]  kasan_report+0xc8/0x118
[  184.222918]  __asan_load8+0x9c/0xc0
[  184.224137]  kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8
[  184.225775]  kasan_bitops_generic+0xc0/0x148
[  184.227064]  kunit_try_run_case+0xf8/0x260
[  184.228306]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  184.229828]  kthread+0x18c/0x1a8
[  184.230821]  ret_from_fork+0x10/0x20
[  184.231938] 
[  184.232972] Allocated by task 206:
[  184.234001]  kasan_save_stack+0x3c/0x68
[  184.235248]  kasan_set_track+0x2c/0x40
[  184.236399]  kasan_save_alloc_info+0x24/0x38
[  184.237687]  __kasan_kmalloc+0xd4/0xd8
[  184.238857]  kmalloc_trace+0x68/0x130
[  184.239932]  kasan_bitops_generic+0x98/0x148
[  184.241146]  kunit_try_run_case+0xf8/0x260
[  184.242371]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  184.243843]  kthread+0x18c/0x1a8
[  184.244771]  ret_from_fork+0x10/0x20
[  184.245868] 
[  184.246413] The buggy address belongs to the object at ffff0000c5e9f5c0
[  184.246413]  which belongs to the cache kmalloc-16 of size 16
[  184.248765] The buggy address is located 8 bytes inside of
[  184.248765]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  184.251183] 
[  184.251806] The buggy address belongs to the physical page:
[  184.253116] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  184.255159] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.256359] page_type: 0xffffffff()
[  184.257315] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  184.259110] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  184.260748] page dumped because: kasan: bad access detected
[  184.262027] 
[  184.262606] Memory state around the buggy address:
[  184.263791]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  184.265429]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  184.267046] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  184.268541]                                               ^
[  184.269882]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.271472]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.273012] ==================================================================
[  183.934158] ==================================================================
[  183.935458] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8
[  183.937373] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.939225] 
[  183.939821] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.941633] Hardware name: linux,dummy-virt (DT)
[  183.942762] Call trace:
[  183.943471]  dump_backtrace+0x9c/0x128
[  183.944551]  show_stack+0x20/0x38
[  183.945548]  dump_stack_lvl+0x60/0xb0
[  183.946741]  print_report+0xf8/0x5d8
[  183.947870]  kasan_report+0xc8/0x118
[  183.948977]  kasan_check_range+0xe8/0x190
[  183.950196]  __kasan_check_write+0x20/0x30
[  183.951319]  kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8
[  183.952911]  kasan_bitops_generic+0xc0/0x148
[  183.954123]  kunit_try_run_case+0xf8/0x260
[  183.955359]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.956828]  kthread+0x18c/0x1a8
[  183.957815]  ret_from_fork+0x10/0x20
[  183.958909] 
[  183.959390] Allocated by task 206:
[  183.960206]  kasan_save_stack+0x3c/0x68
[  183.961370]  kasan_set_track+0x2c/0x40
[  183.962354]  kasan_save_alloc_info+0x24/0x38
[  183.963900]  __kasan_kmalloc+0xd4/0xd8
[  183.965469]  kmalloc_trace+0x68/0x130
[  183.966600]  kasan_bitops_generic+0x98/0x148
[  183.967857]  kunit_try_run_case+0xf8/0x260
[  183.969124]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.970624]  kthread+0x18c/0x1a8
[  183.971602]  ret_from_fork+0x10/0x20
[  183.972713] 
[  183.973236] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.973236]  which belongs to the cache kmalloc-16 of size 16
[  183.975673] The buggy address is located 8 bytes inside of
[  183.975673]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.978075] 
[  183.978695] The buggy address belongs to the physical page:
[  183.979987] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.981980] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.983504] page_type: 0xffffffff()
[  183.984532] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.986287] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.987907] page dumped because: kasan: bad access detected
[  183.989179] 
[  183.989728] Memory state around the buggy address:
[  183.990967]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.992598]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.994216] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.995787]                                               ^
[  183.997095]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.998799]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.000332] ==================================================================
[  184.070999] ==================================================================
[  184.072869] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8
[  184.074872] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  184.076725] 
[  184.077458] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  184.079292] Hardware name: linux,dummy-virt (DT)
[  184.080440] Call trace:
[  184.081241]  dump_backtrace+0x9c/0x128
[  184.082372]  show_stack+0x20/0x38
[  184.083409]  dump_stack_lvl+0x60/0xb0
[  184.084609]  print_report+0xf8/0x5d8
[  184.085788]  kasan_report+0xc8/0x118
[  184.086974]  kasan_check_range+0xe8/0x190
[  184.088236]  __kasan_check_write+0x20/0x30
[  184.089412]  kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8
[  184.090987]  kasan_bitops_generic+0xc0/0x148
[  184.092252]  kunit_try_run_case+0xf8/0x260
[  184.093484]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  184.094994]  kthread+0x18c/0x1a8
[  184.095989]  ret_from_fork+0x10/0x20
[  184.097071] 
[  184.097560] Allocated by task 206:
[  184.098546]  kasan_save_stack+0x3c/0x68
[  184.099719]  kasan_set_track+0x2c/0x40
[  184.100850]  kasan_save_alloc_info+0x24/0x38
[  184.102110]  __kasan_kmalloc+0xd4/0xd8
[  184.103251]  kmalloc_trace+0x68/0x130
[  184.104294]  kasan_bitops_generic+0x98/0x148
[  184.105483]  kunit_try_run_case+0xf8/0x260
[  184.106709]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  184.108142]  kthread+0x18c/0x1a8
[  184.109136]  ret_from_fork+0x10/0x20
[  184.110186] 
[  184.110754] The buggy address belongs to the object at ffff0000c5e9f5c0
[  184.110754]  which belongs to the cache kmalloc-16 of size 16
[  184.113080] The buggy address is located 8 bytes inside of
[  184.113080]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  184.115549] 
[  184.116102] The buggy address belongs to the physical page:
[  184.117339] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  184.119279] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.120814] page_type: 0xffffffff()
[  184.121890] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  184.123597] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  184.125191] page dumped because: kasan: bad access detected
[  184.126480] 
[  184.127038] Memory state around the buggy address:
[  184.128240]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  184.129867]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  184.131445] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  184.133001]                                               ^
[  184.134291]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.135897]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.137414] ==================================================================
[  183.866462] ==================================================================
[  183.867992] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8
[  183.869946] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.871598] 
[  183.872275] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.874118] Hardware name: linux,dummy-virt (DT)
[  183.875227] Call trace:
[  183.875947]  dump_backtrace+0x9c/0x128
[  183.877032]  show_stack+0x20/0x38
[  183.878094]  dump_stack_lvl+0x60/0xb0
[  183.879283]  print_report+0xf8/0x5d8
[  183.880410]  kasan_report+0xc8/0x118
[  183.881543]  __asan_load8+0x9c/0xc0
[  183.882709]  kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8
[  183.884244]  kasan_bitops_generic+0xc0/0x148
[  183.885273]  kunit_try_run_case+0xf8/0x260
[  183.886985]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.888530]  kthread+0x18c/0x1a8
[  183.889530]  ret_from_fork+0x10/0x20
[  183.890688] 
[  183.891298] Allocated by task 206:
[  183.892210]  kasan_save_stack+0x3c/0x68
[  183.893419]  kasan_set_track+0x2c/0x40
[  183.894545]  kasan_save_alloc_info+0x24/0x38
[  183.895843]  __kasan_kmalloc+0xd4/0xd8
[  183.896972]  kmalloc_trace+0x68/0x130
[  183.898080]  kasan_bitops_generic+0x98/0x148
[  183.899303]  kunit_try_run_case+0xf8/0x260
[  183.900506]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.901973]  kthread+0x18c/0x1a8
[  183.902968]  ret_from_fork+0x10/0x20
[  183.904038] 
[  183.904548] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.904548]  which belongs to the cache kmalloc-16 of size 16
[  183.906979] The buggy address is located 8 bytes inside of
[  183.906979]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.909436] 
[  183.910025] The buggy address belongs to the physical page:
[  183.911324] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.913259] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.914874] page_type: 0xffffffff()
[  183.915927] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.917621] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.919251] page dumped because: kasan: bad access detected
[  183.920524] 
[  183.921045] Memory state around the buggy address:
[  183.922298]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.923886]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.925480] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.927060]                                               ^
[  183.928395]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.929988]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.931501] ==================================================================
[  183.797517] ==================================================================
[  183.799420] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8
[  183.801261] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  183.803090] 
[  183.803651] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  183.805439] Hardware name: linux,dummy-virt (DT)
[  183.806548] Call trace:
[  183.807271]  dump_backtrace+0x9c/0x128
[  183.808325]  show_stack+0x20/0x38
[  183.809332]  dump_stack_lvl+0x60/0xb0
[  183.810500]  print_report+0xf8/0x5d8
[  183.811640]  kasan_report+0xc8/0x118
[  183.812750]  kasan_check_range+0xe8/0x190
[  183.813988]  __kasan_check_write+0x20/0x30
[  183.815130]  kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8
[  183.816687]  kasan_bitops_generic+0xc0/0x148
[  183.817914]  kunit_try_run_case+0xf8/0x260
[  183.819100]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.820536]  kthread+0x18c/0x1a8
[  183.821526]  ret_from_fork+0x10/0x20
[  183.822602] 
[  183.823112] Allocated by task 206:
[  183.824014]  kasan_save_stack+0x3c/0x68
[  183.825156]  kasan_set_track+0x2c/0x40
[  183.826310]  kasan_save_alloc_info+0x24/0x38
[  183.827565]  __kasan_kmalloc+0xd4/0xd8
[  183.828705]  kmalloc_trace+0x68/0x130
[  183.829788]  kasan_bitops_generic+0x98/0x148
[  183.831061]  kunit_try_run_case+0xf8/0x260
[  183.832262]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  183.833730]  kthread+0x18c/0x1a8
[  183.834665]  ret_from_fork+0x10/0x20
[  183.835754] 
[  183.836265] The buggy address belongs to the object at ffff0000c5e9f5c0
[  183.836265]  which belongs to the cache kmalloc-16 of size 16
[  183.838598] The buggy address is located 8 bytes inside of
[  183.838598]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  183.840990] 
[  183.841620] The buggy address belongs to the physical page:
[  183.842910] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  183.844850] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  183.846407] page_type: 0xffffffff()
[  183.847440] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  183.849155] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  183.850788] page dumped because: kasan: bad access detected
[  183.852038] 
[  183.852601] Memory state around the buggy address:
[  183.853791]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  183.855367]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  183.857029] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  183.858334]                                               ^
[  183.860754]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.862268]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  183.863811] ==================================================================
[  184.003183] ==================================================================
[  184.004913] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8
[  184.006926] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  184.008634] 
[  184.009301] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  184.011132] Hardware name: linux,dummy-virt (DT)
[  184.012209] Call trace:
[  184.012937]  dump_backtrace+0x9c/0x128
[  184.014034]  show_stack+0x20/0x38
[  184.015054]  dump_stack_lvl+0x60/0xb0
[  184.016224]  print_report+0xf8/0x5d8
[  184.017332]  kasan_report+0xc8/0x118
[  184.018458]  __asan_load8+0x9c/0xc0
[  184.019557]  kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8
[  184.021112]  kasan_bitops_generic+0xc0/0x148
[  184.022334]  kunit_try_run_case+0xf8/0x260
[  184.023529]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  184.024996]  kthread+0x18c/0x1a8
[  184.025965]  ret_from_fork+0x10/0x20
[  184.027060] 
[  184.027686] Allocated by task 206:
[  184.028634]  kasan_save_stack+0x3c/0x68
[  184.029835]  kasan_set_track+0x2c/0x40
[  184.030962]  kasan_save_alloc_info+0x24/0x38
[  184.032244]  __kasan_kmalloc+0xd4/0xd8
[  184.033383]  kmalloc_trace+0x68/0x130
[  184.034450]  kasan_bitops_generic+0x98/0x148
[  184.035670]  kunit_try_run_case+0xf8/0x260
[  184.036864]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  184.038347]  kthread+0x18c/0x1a8
[  184.039343]  ret_from_fork+0x10/0x20
[  184.040446] 
[  184.041033] The buggy address belongs to the object at ffff0000c5e9f5c0
[  184.041033]  which belongs to the cache kmalloc-16 of size 16
[  184.043344] The buggy address is located 8 bytes inside of
[  184.043344]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  184.045758] 
[  184.046395] The buggy address belongs to the physical page:
[  184.047666] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  184.049584] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.051149] page_type: 0xffffffff()
[  184.052187] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  184.053918] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  184.055508] page dumped because: kasan: bad access detected
[  184.056795] 
[  184.057317] Memory state around the buggy address:
[  184.058540]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  184.060167]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  184.061774] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  184.063294]                                               ^
[  184.064621]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.066150]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.068370] ==================================================================
[  184.140309] ==================================================================
[  184.141965] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8
[  184.143828] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206
[  184.145452] 
[  184.146066] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  184.147938] Hardware name: linux,dummy-virt (DT)
[  184.149069] Call trace:
[  184.149836]  dump_backtrace+0x9c/0x128
[  184.150939]  show_stack+0x20/0x38
[  184.151958]  dump_stack_lvl+0x60/0xb0
[  184.153108]  print_report+0xf8/0x5d8
[  184.154276]  kasan_report+0xc8/0x118
[  184.155394]  __asan_load8+0x9c/0xc0
[  184.156533]  kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8
[  184.158131]  kasan_bitops_generic+0xc0/0x148
[  184.159340]  kunit_try_run_case+0xf8/0x260
[  184.160624]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  184.162079]  kthread+0x18c/0x1a8
[  184.163003]  ret_from_fork+0x10/0x20
[  184.164088] 
[  184.164657] Allocated by task 206:
[  184.165544]  kasan_save_stack+0x3c/0x68
[  184.166748]  kasan_set_track+0x2c/0x40
[  184.167882]  kasan_save_alloc_info+0x24/0x38
[  184.169240]  __kasan_kmalloc+0xd4/0xd8
[  184.170221]  kmalloc_trace+0x68/0x130
[  184.171507]  kasan_bitops_generic+0x98/0x148
[  184.173019]  kunit_try_run_case+0xf8/0x260
[  184.174285]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  184.175753]  kthread+0x18c/0x1a8
[  184.176732]  ret_from_fork+0x10/0x20
[  184.177852] 
[  184.178368] The buggy address belongs to the object at ffff0000c5e9f5c0
[  184.178368]  which belongs to the cache kmalloc-16 of size 16
[  184.180725] The buggy address is located 8 bytes inside of
[  184.180725]  allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9)
[  184.183160] 
[  184.183703] The buggy address belongs to the physical page:
[  184.185041] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f
[  184.187014] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  184.188596] page_type: 0xffffffff()
[  184.189627] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  184.191334] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  184.192990] page dumped because: kasan: bad access detected
[  184.194245] 
[  184.194816] Memory state around the buggy address:
[  184.196041]  ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[  184.197618]  ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  184.199198] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[  184.200752]                                               ^
[  184.202089]  ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.203691]  ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  184.205221] ==================================================================