Hay
Date
Feb. 5, 2025, 2:09 p.m.

Environment
qemu-x86_64

[   51.296935] ==================================================================
[   51.297678] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   51.298885] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224
[   51.299627] 
[   51.299919] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   51.301148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.302152] Call Trace:
[   51.302513]  <TASK>
[   51.302849]  dump_stack_lvl+0x4e/0x90
[   51.303542]  print_report+0xd2/0x660
[   51.304347]  ? __virt_addr_valid+0x156/0x1e0
[   51.305021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.305905]  kasan_report+0xff/0x140
[   51.306485]  ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   51.307456]  ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   51.308394]  kasan_check_range+0x10c/0x1c0
[   51.309087]  __kasan_check_write+0x18/0x20
[   51.309684]  kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   51.310509]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.311427]  ? kasan_set_track+0x29/0x40
[   51.312138]  ? kasan_save_alloc_info+0x22/0x30
[   51.312851]  ? __kasan_kmalloc+0xb7/0xc0
[   51.313562]  kasan_bitops_generic+0xb4/0x130
[   51.314368]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.315174]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.316561]  ? kunit_try_run_case+0x11b/0x290
[   51.317144]  kunit_try_run_case+0x126/0x290
[   51.317842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.318522]  ? __kasan_check_write+0x18/0x20
[   51.319518]  ? trace_preempt_on+0x20/0xa0
[   51.320357]  ? __kthread_parkme+0x4f/0xd0
[   51.321353]  ? preempt_count_sub+0x50/0x80
[   51.321859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.322601]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.323483]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.324373]  kthread+0x19e/0x1e0
[   51.324838]  ? __pfx_kthread+0x10/0x10
[   51.325335]  ret_from_fork+0x41/0x70
[   51.325815]  ? __pfx_kthread+0x10/0x10
[   51.326253]  ret_from_fork_asm+0x1b/0x30
[   51.326772]  </TASK>
[   51.327113] 
[   51.327393] Allocated by task 224:
[   51.327867]  kasan_save_stack+0x3c/0x60
[   51.329191]  kasan_set_track+0x29/0x40
[   51.329653]  kasan_save_alloc_info+0x22/0x30
[   51.330185]  __kasan_kmalloc+0xb7/0xc0
[   51.330754]  kmalloc_trace+0x4c/0xb0
[   51.331294]  kasan_bitops_generic+0x8e/0x130
[   51.331822]  kunit_try_run_case+0x126/0x290
[   51.333098]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.333941]  kthread+0x19e/0x1e0
[   51.334359]  ret_from_fork+0x41/0x70
[   51.334767]  ret_from_fork_asm+0x1b/0x30
[   51.335673] 
[   51.335953] The buggy address belongs to the object at ffff888101a813e0
[   51.335953]  which belongs to the cache kmalloc-16 of size 16
[   51.337999] The buggy address is located 8 bytes inside of
[   51.337999]  allocated 9-byte region [ffff888101a813e0, ffff888101a813e9)
[   51.339130] 
[   51.339370] The buggy address belongs to the physical page:
[   51.339908] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81
[   51.341553] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.342266] page_type: 0xffffffff()
[   51.343172] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.344013] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.344349] page dumped because: kasan: bad access detected
[   51.344593] 
[   51.344716] Memory state around the buggy address:
[   51.345219]  ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   51.346541]  ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   51.347301] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc
[   51.348803]                                                           ^
[   51.349532]  ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.350944]  ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.351971] ==================================================================
[   51.570716] ==================================================================
[   51.571977] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   51.573033] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224
[   51.574143] 
[   51.574390] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   51.575342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.576336] Call Trace:
[   51.576690]  <TASK>
[   51.577057]  dump_stack_lvl+0x4e/0x90
[   51.577517]  print_report+0xd2/0x660
[   51.578220]  ? __virt_addr_valid+0x156/0x1e0
[   51.578895]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.579765]  kasan_report+0xff/0x140
[   51.580385]  ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   51.581227]  ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   51.582079]  kasan_check_range+0x10c/0x1c0
[   51.582770]  __kasan_check_write+0x18/0x20
[   51.583404]  kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   51.584275]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.585114]  ? kasan_set_track+0x29/0x40
[   51.585675]  ? kasan_save_alloc_info+0x22/0x30
[   51.586347]  ? __kasan_kmalloc+0xb7/0xc0
[   51.586990]  kasan_bitops_generic+0xb4/0x130
[   51.587701]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.588369]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.589081]  ? kunit_try_run_case+0x11b/0x290
[   51.589817]  kunit_try_run_case+0x126/0x290
[   51.590445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.591126]  ? __kasan_check_write+0x18/0x20
[   51.591798]  ? trace_preempt_on+0x20/0xa0
[   51.592364]  ? __kthread_parkme+0x4f/0xd0
[   51.593075]  ? preempt_count_sub+0x50/0x80
[   51.593781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.594505]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.595311]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.596101]  kthread+0x19e/0x1e0
[   51.596681]  ? __pfx_kthread+0x10/0x10
[   51.597289]  ret_from_fork+0x41/0x70
[   51.597879]  ? __pfx_kthread+0x10/0x10
[   51.598542]  ret_from_fork_asm+0x1b/0x30
[   51.599130]  </TASK>
[   51.599555] 
[   51.599841] Allocated by task 224:
[   51.600285]  kasan_save_stack+0x3c/0x60
[   51.600939]  kasan_set_track+0x29/0x40
[   51.601481]  kasan_save_alloc_info+0x22/0x30
[   51.602211]  __kasan_kmalloc+0xb7/0xc0
[   51.602749]  kmalloc_trace+0x4c/0xb0
[   51.603346]  kasan_bitops_generic+0x8e/0x130
[   51.604024]  kunit_try_run_case+0x126/0x290
[   51.604641]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.605416]  kthread+0x19e/0x1e0
[   51.606029]  ret_from_fork+0x41/0x70
[   51.606665]  ret_from_fork_asm+0x1b/0x30
[   51.607279] 
[   51.607557] The buggy address belongs to the object at ffff888101a813e0
[   51.607557]  which belongs to the cache kmalloc-16 of size 16
[   51.608715] The buggy address is located 8 bytes inside of
[   51.608715]  allocated 9-byte region [ffff888101a813e0, ffff888101a813e9)
[   51.609936] 
[   51.610262] The buggy address belongs to the physical page:
[   51.610808] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81
[   51.611671] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.612277] page_type: 0xffffffff()
[   51.612697] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.613663] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.614468] page dumped because: kasan: bad access detected
[   51.615140] 
[   51.615429] Memory state around the buggy address:
[   51.616006]  ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   51.616749]  ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   51.617620] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc
[   51.618309]                                                           ^
[   51.619110]  ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.619898]  ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.620747] ==================================================================
[   51.407423] ==================================================================
[   51.408226] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   51.409291] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224
[   51.410328] 
[   51.410630] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   51.411578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.413288] Call Trace:
[   51.414412]  <TASK>
[   51.414981]  dump_stack_lvl+0x4e/0x90
[   51.415664]  print_report+0xd2/0x660
[   51.416360]  ? __virt_addr_valid+0x156/0x1e0
[   51.417666]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.418388]  kasan_report+0xff/0x140
[   51.419018]  ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   51.419947]  ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   51.420635]  kasan_check_range+0x10c/0x1c0
[   51.421426]  __kasan_check_write+0x18/0x20
[   51.422190]  kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   51.423243]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.424340]  ? kasan_set_track+0x29/0x40
[   51.424976]  ? kasan_save_alloc_info+0x22/0x30
[   51.426000]  ? __kasan_kmalloc+0xb7/0xc0
[   51.426508]  kasan_bitops_generic+0xb4/0x130
[   51.427394]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.428031]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.428603]  ? kunit_try_run_case+0x11b/0x290
[   51.429753]  kunit_try_run_case+0x126/0x290
[   51.430285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.430968]  ? __kasan_check_write+0x18/0x20
[   51.431550]  ? trace_preempt_on+0x20/0xa0
[   51.432075]  ? __kthread_parkme+0x4f/0xd0
[   51.432603]  ? preempt_count_sub+0x50/0x80
[   51.433880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.434640]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.435476]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.436137]  kthread+0x19e/0x1e0
[   51.436634]  ? __pfx_kthread+0x10/0x10
[   51.437500]  ret_from_fork+0x41/0x70
[   51.437936]  ? __pfx_kthread+0x10/0x10
[   51.438679]  ret_from_fork_asm+0x1b/0x30
[   51.439430]  </TASK>
[   51.439795] 
[   51.440100] Allocated by task 224:
[   51.440516]  kasan_save_stack+0x3c/0x60
[   51.441594]  kasan_set_track+0x29/0x40
[   51.442576]  kasan_save_alloc_info+0x22/0x30
[   51.443190]  __kasan_kmalloc+0xb7/0xc0
[   51.443529]  kmalloc_trace+0x4c/0xb0
[   51.444114]  kasan_bitops_generic+0x8e/0x130
[   51.444757]  kunit_try_run_case+0x126/0x290
[   51.445285]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.446330]  kthread+0x19e/0x1e0
[   51.447152]  ret_from_fork+0x41/0x70
[   51.447723]  ret_from_fork_asm+0x1b/0x30
[   51.448298] 
[   51.448541] The buggy address belongs to the object at ffff888101a813e0
[   51.448541]  which belongs to the cache kmalloc-16 of size 16
[   51.449680] The buggy address is located 8 bytes inside of
[   51.449680]  allocated 9-byte region [ffff888101a813e0, ffff888101a813e9)
[   51.451321] 
[   51.451530] The buggy address belongs to the physical page:
[   51.452443] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81
[   51.453567] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.454279] page_type: 0xffffffff()
[   51.454926] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.456112] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.456818] page dumped because: kasan: bad access detected
[   51.457292] 
[   51.457561] Memory state around the buggy address:
[   51.458969]  ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   51.459703]  ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   51.460446] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc
[   51.461579]                                                           ^
[   51.462631]  ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.463439]  ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.464060] ==================================================================
[   51.182862] ==================================================================
[   51.184452] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   51.185303] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224
[   51.185638] 
[   51.185895] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   51.187373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.188300] Call Trace:
[   51.188695]  <TASK>
[   51.189422]  dump_stack_lvl+0x4e/0x90
[   51.189962]  print_report+0xd2/0x660
[   51.190401]  ? __virt_addr_valid+0x156/0x1e0
[   51.191281]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.192110]  kasan_report+0xff/0x140
[   51.192919]  ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   51.193987]  ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   51.194960]  kasan_check_range+0x10c/0x1c0
[   51.195548]  __kasan_check_write+0x18/0x20
[   51.196258]  kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   51.197446]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.198495]  ? kasan_set_track+0x29/0x40
[   51.199149]  ? kasan_save_alloc_info+0x22/0x30
[   51.199694]  ? __kasan_kmalloc+0xb7/0xc0
[   51.201031]  kasan_bitops_generic+0xb4/0x130
[   51.201784]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.202532]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.203182]  ? kunit_try_run_case+0x11b/0x290
[   51.203749]  kunit_try_run_case+0x126/0x290
[   51.205177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.205934]  ? __kasan_check_write+0x18/0x20
[   51.206665]  ? trace_preempt_on+0x20/0xa0
[   51.207397]  ? __kthread_parkme+0x4f/0xd0
[   51.208393]  ? preempt_count_sub+0x50/0x80
[   51.208908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.210008]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.210752]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.211505]  kthread+0x19e/0x1e0
[   51.212088]  ? __pfx_kthread+0x10/0x10
[   51.212657]  ret_from_fork+0x41/0x70
[   51.213540]  ? __pfx_kthread+0x10/0x10
[   51.213993]  ret_from_fork_asm+0x1b/0x30
[   51.214860]  </TASK>
[   51.215282] 
[   51.215609] Allocated by task 224:
[   51.216175]  kasan_save_stack+0x3c/0x60
[   51.216839]  kasan_set_track+0x29/0x40
[   51.217258]  kasan_save_alloc_info+0x22/0x30
[   51.218195]  __kasan_kmalloc+0xb7/0xc0
[   51.219297]  kmalloc_trace+0x4c/0xb0
[   51.220040]  kasan_bitops_generic+0x8e/0x130
[   51.220674]  kunit_try_run_case+0x126/0x290
[   51.221283]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.221884]  kthread+0x19e/0x1e0
[   51.222600]  ret_from_fork+0x41/0x70
[   51.223125]  ret_from_fork_asm+0x1b/0x30
[   51.223664] 
[   51.223926] The buggy address belongs to the object at ffff888101a813e0
[   51.223926]  which belongs to the cache kmalloc-16 of size 16
[   51.225423] The buggy address is located 8 bytes inside of
[   51.225423]  allocated 9-byte region [ffff888101a813e0, ffff888101a813e9)
[   51.226603] 
[   51.227328] The buggy address belongs to the physical page:
[   51.228297] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81
[   51.229264] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.229844] page_type: 0xffffffff()
[   51.230602] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.231622] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.232757] page dumped because: kasan: bad access detected
[   51.233513] 
[   51.233941] Memory state around the buggy address:
[   51.234662]  ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   51.235450]  ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   51.236708] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc
[   51.237610]                                                           ^
[   51.238370]  ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.238960]  ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.239346] ==================================================================
[   51.069489] ==================================================================
[   51.070127] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   51.071201] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224
[   51.072769] 
[   51.073108] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   51.073921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.074921] Call Trace:
[   51.075642]  <TASK>
[   51.076331]  dump_stack_lvl+0x4e/0x90
[   51.077253]  print_report+0xd2/0x660
[   51.077704]  ? __virt_addr_valid+0x156/0x1e0
[   51.078272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.079298]  kasan_report+0xff/0x140
[   51.079683]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   51.080825]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   51.081527]  kasan_check_range+0x10c/0x1c0
[   51.082194]  __kasan_check_write+0x18/0x20
[   51.082791]  kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   51.084156]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.085073]  ? kasan_set_track+0x29/0x40
[   51.085571]  ? kasan_save_alloc_info+0x22/0x30
[   51.086248]  ? __kasan_kmalloc+0xb7/0xc0
[   51.086817]  kasan_bitops_generic+0xb4/0x130
[   51.088054]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.088654]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.089291]  ? kunit_try_run_case+0x11b/0x290
[   51.089943]  kunit_try_run_case+0x126/0x290
[   51.090531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.091403]  ? __kasan_check_write+0x18/0x20
[   51.092566]  ? trace_preempt_on+0x20/0xa0
[   51.093140]  ? __kthread_parkme+0x4f/0xd0
[   51.093698]  ? preempt_count_sub+0x50/0x80
[   51.094311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.095100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.095672]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.096579]  kthread+0x19e/0x1e0
[   51.097192]  ? __pfx_kthread+0x10/0x10
[   51.097844]  ret_from_fork+0x41/0x70
[   51.098432]  ? __pfx_kthread+0x10/0x10
[   51.099012]  ret_from_fork_asm+0x1b/0x30
[   51.100232]  </TASK>
[   51.100558] 
[   51.100875] Allocated by task 224:
[   51.101246]  kasan_save_stack+0x3c/0x60
[   51.101650]  kasan_set_track+0x29/0x40
[   51.102201]  kasan_save_alloc_info+0x22/0x30
[   51.102651]  __kasan_kmalloc+0xb7/0xc0
[   51.104050]  kmalloc_trace+0x4c/0xb0
[   51.104639]  kasan_bitops_generic+0x8e/0x130
[   51.105289]  kunit_try_run_case+0x126/0x290
[   51.105870]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.106491]  kthread+0x19e/0x1e0
[   51.107032]  ret_from_fork+0x41/0x70
[   51.107512]  ret_from_fork_asm+0x1b/0x30
[   51.108682] 
[   51.109026] The buggy address belongs to the object at ffff888101a813e0
[   51.109026]  which belongs to the cache kmalloc-16 of size 16
[   51.110095] The buggy address is located 8 bytes inside of
[   51.110095]  allocated 9-byte region [ffff888101a813e0, ffff888101a813e9)
[   51.111320] 
[   51.111639] The buggy address belongs to the physical page:
[   51.112538] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81
[   51.114183] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.114834] page_type: 0xffffffff()
[   51.115375] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.116654] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.117465] page dumped because: kasan: bad access detected
[   51.118121] 
[   51.118398] Memory state around the buggy address:
[   51.118996]  ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   51.119681]  ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   51.120444] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc
[   51.121573]                                                           ^
[   51.122572]  ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.123650]  ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.124200] ==================================================================
[   51.352998] ==================================================================
[   51.353615] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   51.355134] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224
[   51.356067] 
[   51.356967] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   51.357767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.358554] Call Trace:
[   51.359016]  <TASK>
[   51.359424]  dump_stack_lvl+0x4e/0x90
[   51.360045]  print_report+0xd2/0x660
[   51.360653]  ? __virt_addr_valid+0x156/0x1e0
[   51.361253]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.362073]  kasan_report+0xff/0x140
[   51.362622]  ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   51.363434]  ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   51.364157]  kasan_check_range+0x10c/0x1c0
[   51.364768]  __kasan_check_write+0x18/0x20
[   51.365385]  kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   51.366410]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.367353]  ? kasan_set_track+0x29/0x40
[   51.368527]  ? kasan_save_alloc_info+0x22/0x30
[   51.369027]  ? __kasan_kmalloc+0xb7/0xc0
[   51.369667]  kasan_bitops_generic+0xb4/0x130
[   51.370399]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.371399]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.371888]  ? kunit_try_run_case+0x11b/0x290
[   51.372516]  kunit_try_run_case+0x126/0x290
[   51.373341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.374066]  ? __kasan_check_write+0x18/0x20
[   51.374875]  ? trace_preempt_on+0x20/0xa0
[   51.375438]  ? __kthread_parkme+0x4f/0xd0
[   51.376579]  ? preempt_count_sub+0x50/0x80
[   51.377032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.377488]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.378252]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.378972]  kthread+0x19e/0x1e0
[   51.379447]  ? __pfx_kthread+0x10/0x10
[   51.380056]  ret_from_fork+0x41/0x70
[   51.380504]  ? __pfx_kthread+0x10/0x10
[   51.381103]  ret_from_fork_asm+0x1b/0x30
[   51.381624]  </TASK>
[   51.382722] 
[   51.382980] Allocated by task 224:
[   51.383345]  kasan_save_stack+0x3c/0x60
[   51.383939]  kasan_set_track+0x29/0x40
[   51.384355]  kasan_save_alloc_info+0x22/0x30
[   51.385004]  __kasan_kmalloc+0xb7/0xc0
[   51.385412]  kmalloc_trace+0x4c/0xb0
[   51.386659]  kasan_bitops_generic+0x8e/0x130
[   51.387169]  kunit_try_run_case+0x126/0x290
[   51.387655]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.388386]  kthread+0x19e/0x1e0
[   51.389016]  ret_from_fork+0x41/0x70
[   51.390048]  ret_from_fork_asm+0x1b/0x30
[   51.390902] 
[   51.391187] The buggy address belongs to the object at ffff888101a813e0
[   51.391187]  which belongs to the cache kmalloc-16 of size 16
[   51.392253] The buggy address is located 8 bytes inside of
[   51.392253]  allocated 9-byte region [ffff888101a813e0, ffff888101a813e9)
[   51.393528] 
[   51.393893] The buggy address belongs to the physical page:
[   51.395286] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81
[   51.396213] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.396791] page_type: 0xffffffff()
[   51.397332] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.398182] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.399658] page dumped because: kasan: bad access detected
[   51.400205] 
[   51.400455] Memory state around the buggy address:
[   51.401089]  ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   51.401863]  ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   51.402637] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc
[   51.403801]                                                           ^
[   51.404842]  ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.405625]  ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.406467] ==================================================================
[   51.465683] ==================================================================
[   51.467257] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   51.468207] Read of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224
[   51.469543] 
[   51.469699] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   51.470816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.471942] Call Trace:
[   51.472780]  <TASK>
[   51.473089]  dump_stack_lvl+0x4e/0x90
[   51.473561]  print_report+0xd2/0x660
[   51.474051]  ? __virt_addr_valid+0x156/0x1e0
[   51.474766]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.475587]  kasan_report+0xff/0x140
[   51.476693]  ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   51.477459]  ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   51.478315]  kasan_check_range+0x10c/0x1c0
[   51.478957]  __kasan_check_read+0x15/0x20
[   51.479513]  kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   51.480694]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.481537]  ? kasan_set_track+0x29/0x40
[   51.482108]  ? kasan_save_alloc_info+0x22/0x30
[   51.482761]  ? __kasan_kmalloc+0xb7/0xc0
[   51.483347]  kasan_bitops_generic+0xb4/0x130
[   51.484365]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.485377]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.486186]  ? kunit_try_run_case+0x11b/0x290
[   51.486824]  kunit_try_run_case+0x126/0x290
[   51.487320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.488297]  ? __kasan_check_write+0x18/0x20
[   51.489022]  ? trace_preempt_on+0x20/0xa0
[   51.489546]  ? __kthread_parkme+0x4f/0xd0
[   51.490200]  ? preempt_count_sub+0x50/0x80
[   51.490902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.491579]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.492324]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.493113]  kthread+0x19e/0x1e0
[   51.493586]  ? __pfx_kthread+0x10/0x10
[   51.494061]  ret_from_fork+0x41/0x70
[   51.494624]  ? __pfx_kthread+0x10/0x10
[   51.495258]  ret_from_fork_asm+0x1b/0x30
[   51.495949]  </TASK>
[   51.496267] 
[   51.496520] Allocated by task 224:
[   51.497024]  kasan_save_stack+0x3c/0x60
[   51.497403]  kasan_set_track+0x29/0x40
[   51.498014]  kasan_save_alloc_info+0x22/0x30
[   51.498659]  __kasan_kmalloc+0xb7/0xc0
[   51.499283]  kmalloc_trace+0x4c/0xb0
[   51.499913]  kasan_bitops_generic+0x8e/0x130
[   51.500486]  kunit_try_run_case+0x126/0x290
[   51.501051]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.501832]  kthread+0x19e/0x1e0
[   51.502394]  ret_from_fork+0x41/0x70
[   51.503007]  ret_from_fork_asm+0x1b/0x30
[   51.503611] 
[   51.503943] The buggy address belongs to the object at ffff888101a813e0
[   51.503943]  which belongs to the cache kmalloc-16 of size 16
[   51.505105] The buggy address is located 8 bytes inside of
[   51.505105]  allocated 9-byte region [ffff888101a813e0, ffff888101a813e9)
[   51.506186] 
[   51.506470] The buggy address belongs to the physical page:
[   51.507175] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81
[   51.508351] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.508951] page_type: 0xffffffff()
[   51.509458] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.510272] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.511143] page dumped because: kasan: bad access detected
[   51.511628] 
[   51.511962] Memory state around the buggy address:
[   51.512568]  ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   51.513872]  ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   51.515197] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc
[   51.515904]                                                           ^
[   51.516851]  ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.517696]  ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.518578] ==================================================================
[   51.125646] ==================================================================
[   51.126881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   51.128233] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224
[   51.129400] 
[   51.129626] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   51.130516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.131814] Call Trace:
[   51.132167]  <TASK>
[   51.132480]  dump_stack_lvl+0x4e/0x90
[   51.133725]  print_report+0xd2/0x660
[   51.134295]  ? __virt_addr_valid+0x156/0x1e0
[   51.134936]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.135805]  kasan_report+0xff/0x140
[   51.136408]  ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   51.137812]  ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   51.138675]  kasan_check_range+0x10c/0x1c0
[   51.139364]  __kasan_check_write+0x18/0x20
[   51.140299]  kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   51.141058]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.141756]  ? kasan_set_track+0x29/0x40
[   51.142882]  ? kasan_save_alloc_info+0x22/0x30
[   51.143580]  ? __kasan_kmalloc+0xb7/0xc0
[   51.144031]  kasan_bitops_generic+0xb4/0x130
[   51.144641]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.145233]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.146413]  ? kunit_try_run_case+0x11b/0x290
[   51.147153]  kunit_try_run_case+0x126/0x290
[   51.147721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.148301]  ? __kasan_check_write+0x18/0x20
[   51.149421]  ? trace_preempt_on+0x20/0xa0
[   51.149820]  ? __kthread_parkme+0x4f/0xd0
[   51.150960]  ? preempt_count_sub+0x50/0x80
[   51.151877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.152533]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.153228]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.154048]  kthread+0x19e/0x1e0
[   51.154675]  ? __pfx_kthread+0x10/0x10
[   51.155623]  ret_from_fork+0x41/0x70
[   51.156386]  ? __pfx_kthread+0x10/0x10
[   51.156988]  ret_from_fork_asm+0x1b/0x30
[   51.157771]  </TASK>
[   51.158239] 
[   51.158442] Allocated by task 224:
[   51.158800]  kasan_save_stack+0x3c/0x60
[   51.159644]  kasan_set_track+0x29/0x40
[   51.160077]  kasan_save_alloc_info+0x22/0x30
[   51.160539]  __kasan_kmalloc+0xb7/0xc0
[   51.161557]  kmalloc_trace+0x4c/0xb0
[   51.162821]  kasan_bitops_generic+0x8e/0x130
[   51.163091]  kunit_try_run_case+0x126/0x290
[   51.163342]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.163631]  kthread+0x19e/0x1e0
[   51.164146]  ret_from_fork+0x41/0x70
[   51.164846]  ret_from_fork_asm+0x1b/0x30
[   51.165513] 
[   51.165947] The buggy address belongs to the object at ffff888101a813e0
[   51.165947]  which belongs to the cache kmalloc-16 of size 16
[   51.167872] The buggy address is located 8 bytes inside of
[   51.167872]  allocated 9-byte region [ffff888101a813e0, ffff888101a813e9)
[   51.169382] 
[   51.170052] The buggy address belongs to the physical page:
[   51.170631] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81
[   51.171400] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.171974] page_type: 0xffffffff()
[   51.172509] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.173375] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.175057] page dumped because: kasan: bad access detected
[   51.175725] 
[   51.176046] Memory state around the buggy address:
[   51.176833]  ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   51.177832]  ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   51.178541] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc
[   51.179468]                                                           ^
[   51.180197]  ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.180943]  ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.181950] ==================================================================
[   51.520276] ==================================================================
[   51.521661] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   51.522995] Read of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224
[   51.523887] 
[   51.524192] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   51.525108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.526005] Call Trace:
[   51.526432]  <TASK>
[   51.526795]  dump_stack_lvl+0x4e/0x90
[   51.527425]  print_report+0xd2/0x660
[   51.528078]  ? __virt_addr_valid+0x156/0x1e0
[   51.528653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.529440]  kasan_report+0xff/0x140
[   51.529986]  ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   51.530880]  ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   51.531538]  __asan_load8+0x82/0xb0
[   51.532149]  kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   51.532901]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.533567]  ? kasan_set_track+0x29/0x40
[   51.534166]  ? kasan_save_alloc_info+0x22/0x30
[   51.534762]  ? __kasan_kmalloc+0xb7/0xc0
[   51.535381]  kasan_bitops_generic+0xb4/0x130
[   51.536006]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.536657]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.537302]  ? kunit_try_run_case+0x11b/0x290
[   51.537991]  kunit_try_run_case+0x126/0x290
[   51.538659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.539282]  ? __kasan_check_write+0x18/0x20
[   51.539893]  ? trace_preempt_on+0x20/0xa0
[   51.540447]  ? __kthread_parkme+0x4f/0xd0
[   51.541064]  ? preempt_count_sub+0x50/0x80
[   51.541667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.542270]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.543072]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.543866]  kthread+0x19e/0x1e0
[   51.544351]  ? __pfx_kthread+0x10/0x10
[   51.544972]  ret_from_fork+0x41/0x70
[   51.545519]  ? __pfx_kthread+0x10/0x10
[   51.546162]  ret_from_fork_asm+0x1b/0x30
[   51.546636]  </TASK>
[   51.547551] 
[   51.547940] Allocated by task 224:
[   51.548254]  kasan_save_stack+0x3c/0x60
[   51.548671]  kasan_set_track+0x29/0x40
[   51.549090]  kasan_save_alloc_info+0x22/0x30
[   51.549547]  __kasan_kmalloc+0xb7/0xc0
[   51.550571]  kmalloc_trace+0x4c/0xb0
[   51.551334]  kasan_bitops_generic+0x8e/0x130
[   51.552124]  kunit_try_run_case+0x126/0x290
[   51.552888]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.553744]  kthread+0x19e/0x1e0
[   51.554419]  ret_from_fork+0x41/0x70
[   51.555148]  ret_from_fork_asm+0x1b/0x30
[   51.555749] 
[   51.556056] The buggy address belongs to the object at ffff888101a813e0
[   51.556056]  which belongs to the cache kmalloc-16 of size 16
[   51.557216] The buggy address is located 8 bytes inside of
[   51.557216]  allocated 9-byte region [ffff888101a813e0, ffff888101a813e9)
[   51.558160] 
[   51.558512] The buggy address belongs to the physical page:
[   51.559240] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81
[   51.560198] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.560804] page_type: 0xffffffff()
[   51.561327] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.562132] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.563006] page dumped because: kasan: bad access detected
[   51.563511] 
[   51.563815] Memory state around the buggy address:
[   51.564442]  ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   51.565163]  ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   51.565884] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc
[   51.566586]                                                           ^
[   51.567382]  ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.568133]  ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.568915] ==================================================================
[   51.239964] ==================================================================
[   51.240620] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   51.242084] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224
[   51.243039] 
[   51.243380] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   51.244545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.246459] Call Trace:
[   51.247252]  <TASK>
[   51.247585]  dump_stack_lvl+0x4e/0x90
[   51.248097]  print_report+0xd2/0x660
[   51.248653]  ? __virt_addr_valid+0x156/0x1e0
[   51.249980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.250634]  kasan_report+0xff/0x140
[   51.251405]  ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   51.252303]  ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   51.253794]  kasan_check_range+0x10c/0x1c0
[   51.254325]  __kasan_check_write+0x18/0x20
[   51.254820]  kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   51.255442]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   51.256187]  ? kasan_set_track+0x29/0x40
[   51.256500]  ? kasan_save_alloc_info+0x22/0x30
[   51.256949]  ? __kasan_kmalloc+0xb7/0xc0
[   51.257920]  kasan_bitops_generic+0xb4/0x130
[   51.258520]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.259557]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   51.260325]  ? kunit_try_run_case+0x11b/0x290
[   51.261129]  kunit_try_run_case+0x126/0x290
[   51.261868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.262439]  ? __kasan_check_write+0x18/0x20
[   51.263571]  ? trace_preempt_on+0x20/0xa0
[   51.264029]  ? __kthread_parkme+0x4f/0xd0
[   51.264809]  ? preempt_count_sub+0x50/0x80
[   51.265480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.266779]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.267696]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.268370]  kthread+0x19e/0x1e0
[   51.269110]  ? __pfx_kthread+0x10/0x10
[   51.269370]  ret_from_fork+0x41/0x70
[   51.269610]  ? __pfx_kthread+0x10/0x10
[   51.270057]  ret_from_fork_asm+0x1b/0x30
[   51.270687]  </TASK>
[   51.271211] 
[   51.271583] Allocated by task 224:
[   51.272109]  kasan_save_stack+0x3c/0x60
[   51.272642]  kasan_set_track+0x29/0x40
[   51.273432]  kasan_save_alloc_info+0x22/0x30
[   51.274159]  __kasan_kmalloc+0xb7/0xc0
[   51.274803]  kmalloc_trace+0x4c/0xb0
[   51.275404]  kasan_bitops_generic+0x8e/0x130
[   51.276655]  kunit_try_run_case+0x126/0x290
[   51.277376]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.278237]  kthread+0x19e/0x1e0
[   51.278618]  ret_from_fork+0x41/0x70
[   51.279171]  ret_from_fork_asm+0x1b/0x30
[   51.279919] 
[   51.280307] The buggy address belongs to the object at ffff888101a813e0
[   51.280307]  which belongs to the cache kmalloc-16 of size 16
[   51.282277] The buggy address is located 8 bytes inside of
[   51.282277]  allocated 9-byte region [ffff888101a813e0, ffff888101a813e9)
[   51.283625] 
[   51.284029] The buggy address belongs to the physical page:
[   51.284635] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81
[   51.286000] flags: 0x200000000000800(slab|node=0|zone=2)
[   51.286655] page_type: 0xffffffff()
[   51.287166] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   51.288164] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   51.288857] page dumped because: kasan: bad access detected
[   51.289473] 
[   51.289706] Memory state around the buggy address:
[   51.290294]  ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   51.291005]  ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   51.291669] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc
[   51.292449]                                                           ^
[   51.294054]  ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.294990]  ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.295693] ==================================================================