Hay
Date
June 17, 2025, 3:39 p.m.

Environment
qemu-arm64
qemu-x86_64

[   95.013215] ==================================================================
[   95.014617] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4/0x6d8
[   95.015866] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.016918] 
[   95.017383] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.018609] Hardware name: linux,dummy-virt (DT)
[   95.020120] Call trace:
[   95.020770]  dump_backtrace+0x9c/0x128
[   95.021628]  show_stack+0x20/0x38
[   95.022366]  dump_stack_lvl+0x60/0xb0
[   95.023181]  print_report+0xf8/0x5e8
[   95.023991]  kasan_report+0xdc/0x128
[   95.024805]  kasan_check_range+0xe8/0x190
[   95.025624]  __kasan_check_write+0x20/0x30
[   95.026379]  kasan_bitops_modify.constprop.0+0xa4/0x6d8
[   95.027312]  kasan_bitops_generic+0xb4/0x148
[   95.028183]  kunit_try_run_case+0x114/0x298
[   95.029807]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.031030]  kthread+0x18c/0x1a8
[   95.031752]  ret_from_fork+0x10/0x20
[   95.032482] 
[   95.032797] Allocated by task 207:
[   95.033310]  kasan_save_stack+0x3c/0x68
[   95.034304]  kasan_set_track+0x2c/0x40
[   95.035648]  kasan_save_alloc_info+0x24/0x38
[   95.036425]  __kasan_kmalloc+0xd4/0xd8
[   95.037390]  kmalloc_trace+0x68/0x130
[   95.038144]  kasan_bitops_generic+0x98/0x148
[   95.039034]  kunit_try_run_case+0x114/0x298
[   95.039974]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.041016]  kthread+0x18c/0x1a8
[   95.041713]  ret_from_fork+0x10/0x20
[   95.042497] 
[   95.042982] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.042982]  which belongs to the cache kmalloc-16 of size 16
[   95.044863] The buggy address is located 8 bytes inside of
[   95.044863]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.047070] 
[   95.047783] The buggy address belongs to the physical page:
[   95.048718] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.049961] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.050971] page_type: 0xffffffff()
[   95.051788] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.053190] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.054803] page dumped because: kasan: bad access detected
[   95.055465] 
[   95.056106] Memory state around the buggy address:
[   95.058384]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.059224]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.064521] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.065534]                                               ^
[   95.066499]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.068081]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.069730] ==================================================================
[   95.121926] ==================================================================
[   95.123280] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0x6d8
[   95.124399] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.125812] 
[   95.126353] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.127816] Hardware name: linux,dummy-virt (DT)
[   95.128555] Call trace:
[   95.129012]  dump_backtrace+0x9c/0x128
[   95.130495]  show_stack+0x20/0x38
[   95.131232]  dump_stack_lvl+0x60/0xb0
[   95.132090]  print_report+0xf8/0x5e8
[   95.132937]  kasan_report+0xdc/0x128
[   95.133770]  kasan_check_range+0xe8/0x190
[   95.134603]  __kasan_check_write+0x20/0x30
[   95.135317]  kasan_bitops_modify.constprop.0+0x100/0x6d8
[   95.136511]  kasan_bitops_generic+0xb4/0x148
[   95.137322]  kunit_try_run_case+0x114/0x298
[   95.138296]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.139262]  kthread+0x18c/0x1a8
[   95.139978]  ret_from_fork+0x10/0x20
[   95.140855] 
[   95.141245] Allocated by task 207:
[   95.141881]  kasan_save_stack+0x3c/0x68
[   95.142676]  kasan_set_track+0x2c/0x40
[   95.143452]  kasan_save_alloc_info+0x24/0x38
[   95.144319]  __kasan_kmalloc+0xd4/0xd8
[   95.145071]  kmalloc_trace+0x68/0x130
[   95.146007]  kasan_bitops_generic+0x98/0x148
[   95.146513]  kunit_try_run_case+0x114/0x298
[   95.147023]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.148177]  kthread+0x18c/0x1a8
[   95.148909]  ret_from_fork+0x10/0x20
[   95.149646] 
[   95.150045] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.150045]  which belongs to the cache kmalloc-16 of size 16
[   95.151576] The buggy address is located 8 bytes inside of
[   95.151576]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.152904] 
[   95.153313] The buggy address belongs to the physical page:
[   95.154215] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.156086] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.157224] page_type: 0xffffffff()
[   95.158030] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.159115] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.160836] page dumped because: kasan: bad access detected
[   95.161870] 
[   95.162119] Memory state around the buggy address:
[   95.163138]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.164069]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.165227] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.166248]                                               ^
[   95.167793]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.169149]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.170314] ==================================================================
[   95.427946] ==================================================================
[   95.428622] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0x6d8
[   95.429386] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.430066] 
[   95.430294] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.431168] Hardware name: linux,dummy-virt (DT)
[   95.431591] Call trace:
[   95.431890]  dump_backtrace+0x9c/0x128
[   95.432375]  show_stack+0x20/0x38
[   95.432849]  dump_stack_lvl+0x60/0xb0
[   95.433318]  print_report+0xf8/0x5e8
[   95.433783]  kasan_report+0xdc/0x128
[   95.434239]  kasan_check_range+0xe8/0x190
[   95.434791]  __kasan_check_write+0x20/0x30
[   95.435311]  kasan_bitops_modify.constprop.0+0x1dc/0x6d8
[   95.435957]  kasan_bitops_generic+0xb4/0x148
[   95.436497]  kunit_try_run_case+0x114/0x298
[   95.436988]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.437553]  kthread+0x18c/0x1a8
[   95.437936]  ret_from_fork+0x10/0x20
[   95.438374] 
[   95.438558] Allocated by task 207:
[   95.438937]  kasan_save_stack+0x3c/0x68
[   95.439439]  kasan_set_track+0x2c/0x40
[   95.439929]  kasan_save_alloc_info+0x24/0x38
[   95.440521]  __kasan_kmalloc+0xd4/0xd8
[   95.440994]  kmalloc_trace+0x68/0x130
[   95.441483]  kasan_bitops_generic+0x98/0x148
[   95.441945]  kunit_try_run_case+0x114/0x298
[   95.442461]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.443101]  kthread+0x18c/0x1a8
[   95.443488]  ret_from_fork+0x10/0x20
[   95.443991] 
[   95.444239] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.444239]  which belongs to the cache kmalloc-16 of size 16
[   95.444989] The buggy address is located 8 bytes inside of
[   95.444989]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.446080] 
[   95.446324] The buggy address belongs to the physical page:
[   95.446810] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.447671] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.448308] page_type: 0xffffffff()
[   95.448772] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.449535] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.450211] page dumped because: kasan: bad access detected
[   95.450678] 
[   95.450912] Memory state around the buggy address:
[   95.451428]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.452148]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.452845] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.453518]                                               ^
[   95.454027]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.454704]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.455321] ==================================================================
[   95.172911] ==================================================================
[   95.173825] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x130/0x6d8
[   95.175372] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.176396] 
[   95.177344] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.178658] Hardware name: linux,dummy-virt (DT)
[   95.179514] Call trace:
[   95.180021]  dump_backtrace+0x9c/0x128
[   95.180954]  show_stack+0x20/0x38
[   95.181744]  dump_stack_lvl+0x60/0xb0
[   95.182537]  print_report+0xf8/0x5e8
[   95.183467]  kasan_report+0xdc/0x128
[   95.184739]  __asan_load8+0x9c/0xc0
[   95.185872]  kasan_bitops_modify.constprop.0+0x130/0x6d8
[   95.186824]  kasan_bitops_generic+0xb4/0x148
[   95.187636]  kunit_try_run_case+0x114/0x298
[   95.188556]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.189626]  kthread+0x18c/0x1a8
[   95.190388]  ret_from_fork+0x10/0x20
[   95.191214] 
[   95.191584] Allocated by task 207:
[   95.192720]  kasan_save_stack+0x3c/0x68
[   95.193750]  kasan_set_track+0x2c/0x40
[   95.194631]  kasan_save_alloc_info+0x24/0x38
[   95.195571]  __kasan_kmalloc+0xd4/0xd8
[   95.196464]  kmalloc_trace+0x68/0x130
[   95.197317]  kasan_bitops_generic+0x98/0x148
[   95.198093]  kunit_try_run_case+0x114/0x298
[   95.198755]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.200243]  kthread+0x18c/0x1a8
[   95.201661]  ret_from_fork+0x10/0x20
[   95.202555] 
[   95.203041] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.203041]  which belongs to the cache kmalloc-16 of size 16
[   95.204785] The buggy address is located 8 bytes inside of
[   95.204785]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.206360] 
[   95.207607] The buggy address belongs to the physical page:
[   95.208377] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.209712] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.210866] page_type: 0xffffffff()
[   95.211604] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.212864] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.213975] page dumped because: kasan: bad access detected
[   95.215627] 
[   95.216040] Memory state around the buggy address:
[   95.216760]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.217911]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.218993] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.220078]                                               ^
[   95.221054]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.222142]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.222943] ==================================================================
[   95.072750] ==================================================================
[   95.073703] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xd0/0x6d8
[   95.075502] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.076455] 
[   95.076855] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.078368] Hardware name: linux,dummy-virt (DT)
[   95.079168] Call trace:
[   95.079691]  dump_backtrace+0x9c/0x128
[   95.080487]  show_stack+0x20/0x38
[   95.081235]  dump_stack_lvl+0x60/0xb0
[   95.082005]  print_report+0xf8/0x5e8
[   95.083643]  kasan_report+0xdc/0x128
[   95.084633]  __asan_load8+0x9c/0xc0
[   95.085454]  kasan_bitops_modify.constprop.0+0xd0/0x6d8
[   95.086445]  kasan_bitops_generic+0xb4/0x148
[   95.087346]  kunit_try_run_case+0x114/0x298
[   95.088253]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.089560]  kthread+0x18c/0x1a8
[   95.090288]  ret_from_fork+0x10/0x20
[   95.091280] 
[   95.091586] Allocated by task 207:
[   95.092047]  kasan_save_stack+0x3c/0x68
[   95.092612]  kasan_set_track+0x2c/0x40
[   95.093139]  kasan_save_alloc_info+0x24/0x38
[   95.093737]  __kasan_kmalloc+0xd4/0xd8
[   95.095264]  kmalloc_trace+0x68/0x130
[   95.096127]  kasan_bitops_generic+0x98/0x148
[   95.096954]  kunit_try_run_case+0x114/0x298
[   95.097698]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.099058]  kthread+0x18c/0x1a8
[   95.099620]  ret_from_fork+0x10/0x20
[   95.100149] 
[   95.100429] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.100429]  which belongs to the cache kmalloc-16 of size 16
[   95.102424] The buggy address is located 8 bytes inside of
[   95.102424]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.104184] 
[   95.104577] The buggy address belongs to the physical page:
[   95.105311] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.106935] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.108215] page_type: 0xffffffff()
[   95.109063] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.110267] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.111563] page dumped because: kasan: bad access detected
[   95.112793] 
[   95.113153] Memory state around the buggy address:
[   95.113562]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.114040]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.115164] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.116255]                                               ^
[   95.117290]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.118297]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.119236] ==================================================================
[   95.276928] ==================================================================
[   95.278233] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x194/0x6d8
[   95.279711] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.281182] 
[   95.281629] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.283172] Hardware name: linux,dummy-virt (DT)
[   95.284089] Call trace:
[   95.284729]  dump_backtrace+0x9c/0x128
[   95.285570]  show_stack+0x20/0x38
[   95.286346]  dump_stack_lvl+0x60/0xb0
[   95.287283]  print_report+0xf8/0x5e8
[   95.288209]  kasan_report+0xdc/0x128
[   95.289118]  kasan_check_range+0xe8/0x190
[   95.290003]  __kasan_check_write+0x20/0x30
[   95.290852]  kasan_bitops_modify.constprop.0+0x194/0x6d8
[   95.292018]  kasan_bitops_generic+0xb4/0x148
[   95.292997]  kunit_try_run_case+0x114/0x298
[   95.293934]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.294940]  kthread+0x18c/0x1a8
[   95.295838]  ret_from_fork+0x10/0x20
[   95.296805] 
[   95.297243] Allocated by task 207:
[   95.297736]  kasan_save_stack+0x3c/0x68
[   95.298656]  kasan_set_track+0x2c/0x40
[   95.299776]  kasan_save_alloc_info+0x24/0x38
[   95.300870]  __kasan_kmalloc+0xd4/0xd8
[   95.301690]  kmalloc_trace+0x68/0x130
[   95.302483]  kasan_bitops_generic+0x98/0x148
[   95.303404]  kunit_try_run_case+0x114/0x298
[   95.304510]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.305582]  kthread+0x18c/0x1a8
[   95.306354]  ret_from_fork+0x10/0x20
[   95.307231] 
[   95.307815] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.307815]  which belongs to the cache kmalloc-16 of size 16
[   95.309548] The buggy address is located 8 bytes inside of
[   95.309548]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.311274] 
[   95.311833] The buggy address belongs to the physical page:
[   95.312792] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.314027] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.315054] page_type: 0xffffffff()
[   95.315660] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.319027] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.319984] page dumped because: kasan: bad access detected
[   95.321436] 
[   95.322142] Memory state around the buggy address:
[   95.323663]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.326211]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.329362] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.330916]                                               ^
[   95.331822]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.332936]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.333914] ==================================================================
[   95.457068] ==================================================================
[   95.457593] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x20c/0x6d8
[   95.458480] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.459190] 
[   95.459455] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.460353] Hardware name: linux,dummy-virt (DT)
[   95.460795] Call trace:
[   95.461077]  dump_backtrace+0x9c/0x128
[   95.461562]  show_stack+0x20/0x38
[   95.462003]  dump_stack_lvl+0x60/0xb0
[   95.462407]  print_report+0xf8/0x5e8
[   95.462952]  kasan_report+0xdc/0x128
[   95.463397]  __asan_load8+0x9c/0xc0
[   95.463885]  kasan_bitops_modify.constprop.0+0x20c/0x6d8
[   95.464555]  kasan_bitops_generic+0xb4/0x148
[   95.464982]  kunit_try_run_case+0x114/0x298
[   95.466548]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.467264]  kthread+0x18c/0x1a8
[   95.467702]  ret_from_fork+0x10/0x20
[   95.468192] 
[   95.468403] Allocated by task 207:
[   95.468774]  kasan_save_stack+0x3c/0x68
[   95.469305]  kasan_set_track+0x2c/0x40
[   95.469763]  kasan_save_alloc_info+0x24/0x38
[   95.470245]  __kasan_kmalloc+0xd4/0xd8
[   95.470702]  kmalloc_trace+0x68/0x130
[   95.471436]  kasan_bitops_generic+0x98/0x148
[   95.472375]  kunit_try_run_case+0x114/0x298
[   95.472934]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.473505]  kthread+0x18c/0x1a8
[   95.473874]  ret_from_fork+0x10/0x20
[   95.474308] 
[   95.474563] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.474563]  which belongs to the cache kmalloc-16 of size 16
[   95.475504] The buggy address is located 8 bytes inside of
[   95.475504]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.476531] 
[   95.476808] The buggy address belongs to the physical page:
[   95.477366] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.478221] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.479100] page_type: 0xffffffff()
[   95.479789] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.481237] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.481997] page dumped because: kasan: bad access detected
[   95.482598] 
[   95.482840] Memory state around the buggy address:
[   95.483362]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.484110]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.484814] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.485535]                                               ^
[   95.486136]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.486838]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.488885] ==================================================================
[   95.337761] ==================================================================
[   95.338641] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x6d8
[   95.339739] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.340706] 
[   95.341419] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.342598] Hardware name: linux,dummy-virt (DT)
[   95.343237] Call trace:
[   95.343787]  dump_backtrace+0x9c/0x128
[   95.344588]  show_stack+0x20/0x38
[   95.345277]  dump_stack_lvl+0x60/0xb0
[   95.346938]  print_report+0xf8/0x5e8
[   95.347755]  kasan_report+0xdc/0x128
[   95.348588]  __asan_load8+0x9c/0xc0
[   95.349444]  kasan_bitops_modify.constprop.0+0x19c/0x6d8
[   95.350496]  kasan_bitops_generic+0xb4/0x148
[   95.351337]  kunit_try_run_case+0x114/0x298
[   95.352221]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.354041]  kthread+0x18c/0x1a8
[   95.354712]  ret_from_fork+0x10/0x20
[   95.355419] 
[   95.355752] Allocated by task 207:
[   95.356297]  kasan_save_stack+0x3c/0x68
[   95.357139]  kasan_set_track+0x2c/0x40
[   95.357769]  kasan_save_alloc_info+0x24/0x38
[   95.358580]  __kasan_kmalloc+0xd4/0xd8
[   95.359363]  kmalloc_trace+0x68/0x130
[   95.360086]  kasan_bitops_generic+0x98/0x148
[   95.361582]  kunit_try_run_case+0x114/0x298
[   95.362636]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.363668]  kthread+0x18c/0x1a8
[   95.364238]  ret_from_fork+0x10/0x20
[   95.365093] 
[   95.365498] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.365498]  which belongs to the cache kmalloc-16 of size 16
[   95.367135] The buggy address is located 8 bytes inside of
[   95.367135]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.368795] 
[   95.369530] The buggy address belongs to the physical page:
[   95.370457] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.371842] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.372923] page_type: 0xffffffff()
[   95.373781] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.374938] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.376207] page dumped because: kasan: bad access detected
[   95.377140] 
[   95.377854] Memory state around the buggy address:
[   95.378523]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.379406]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.380883] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.381868]                                               ^
[   95.382818]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.383701]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.384696] ==================================================================
[   95.224436] ==================================================================
[   95.225723] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x160/0x6d8
[   95.227634] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.228721] 
[   95.229132] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.230373] Hardware name: linux,dummy-virt (DT)
[   95.231050] Call trace:
[   95.231471]  dump_backtrace+0x9c/0x128
[   95.232374]  show_stack+0x20/0x38
[   95.233663]  dump_stack_lvl+0x60/0xb0
[   95.234459]  print_report+0xf8/0x5e8
[   95.235277]  kasan_report+0xdc/0x128
[   95.236122]  kasan_check_range+0xe8/0x190
[   95.237017]  __kasan_check_write+0x20/0x30
[   95.237833]  kasan_bitops_modify.constprop.0+0x160/0x6d8
[   95.238892]  kasan_bitops_generic+0xb4/0x148
[   95.239888]  kunit_try_run_case+0x114/0x298
[   95.241103]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.242111]  kthread+0x18c/0x1a8
[   95.242832]  ret_from_fork+0x10/0x20
[   95.243533] 
[   95.243798] Allocated by task 207:
[   95.244213]  kasan_save_stack+0x3c/0x68
[   95.245098]  kasan_set_track+0x2c/0x40
[   95.246045]  kasan_save_alloc_info+0x24/0x38
[   95.246933]  __kasan_kmalloc+0xd4/0xd8
[   95.247749]  kmalloc_trace+0x68/0x130
[   95.248602]  kasan_bitops_generic+0x98/0x148
[   95.249640]  kunit_try_run_case+0x114/0x298
[   95.250595]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.251781]  kthread+0x18c/0x1a8
[   95.252639]  ret_from_fork+0x10/0x20
[   95.253548] 
[   95.253988] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.253988]  which belongs to the cache kmalloc-16 of size 16
[   95.255597] The buggy address is located 8 bytes inside of
[   95.255597]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.257971] 
[   95.258437] The buggy address belongs to the physical page:
[   95.259422] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.260770] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.261902] page_type: 0xffffffff()
[   95.262805] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.264038] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.265299] page dumped because: kasan: bad access detected
[   95.266086] 
[   95.266567] Memory state around the buggy address:
[   95.267486]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.268601]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.269992] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.270962]                                               ^
[   95.271882]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.273062]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.274311] ==================================================================
[   95.387209] ==================================================================
[   95.389235] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1ac/0x6d8
[   95.390473] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.391401] 
[   95.391967] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.393208] Hardware name: linux,dummy-virt (DT)
[   95.393990] Call trace:
[   95.394450]  dump_backtrace+0x9c/0x128
[   95.395227]  show_stack+0x20/0x38
[   95.395987]  dump_stack_lvl+0x60/0xb0
[   95.396796]  print_report+0xf8/0x5e8
[   95.397548]  kasan_report+0xdc/0x128
[   95.398292]  kasan_check_range+0xe8/0x190
[   95.399051]  __kasan_check_write+0x20/0x30
[   95.399968]  kasan_bitops_modify.constprop.0+0x1ac/0x6d8
[   95.401018]  kasan_bitops_generic+0xb4/0x148
[   95.401910]  kunit_try_run_case+0x114/0x298
[   95.402808]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.403833]  kthread+0x18c/0x1a8
[   95.404516]  ret_from_fork+0x10/0x20
[   95.405321] 
[   95.405769] Allocated by task 207:
[   95.406373]  kasan_save_stack+0x3c/0x68
[   95.407148]  kasan_set_track+0x2c/0x40
[   95.407921]  kasan_save_alloc_info+0x24/0x38
[   95.408745]  __kasan_kmalloc+0xd4/0xd8
[   95.409547]  kmalloc_trace+0x68/0x130
[   95.410074]  kasan_bitops_generic+0x98/0x148
[   95.410553]  kunit_try_run_case+0x114/0x298
[   95.411173]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.411696]  kthread+0x18c/0x1a8
[   95.412151]  ret_from_fork+0x10/0x20
[   95.412624] 
[   95.412919] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.412919]  which belongs to the cache kmalloc-16 of size 16
[   95.413643] The buggy address is located 8 bytes inside of
[   95.413643]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.414632] 
[   95.414883] The buggy address belongs to the physical page:
[   95.415542] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.416472] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.417228] page_type: 0xffffffff()
[   95.417666] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.418464] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.420051] page dumped because: kasan: bad access detected
[   95.420587] 
[   95.420819] Memory state around the buggy address:
[   95.421314]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.422002]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.422663] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.423326]                                               ^
[   95.423930]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.424684]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.425367] ==================================================================


[   35.744143] ==================================================================
[   35.745293] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   35.746355] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   35.747005] 
[   35.747166] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.747944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.749185] Call Trace:
[   35.749643]  <TASK>
[   35.750150]  dump_stack_lvl+0x4e/0x90
[   35.750754]  print_report+0xd2/0x650
[   35.751085]  ? __virt_addr_valid+0x156/0x1e0
[   35.751334]  ? kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   35.751979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.752708]  ? kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   35.753346]  kasan_report+0x147/0x180
[   35.753988]  ? kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   35.754734]  kasan_check_range+0x10c/0x1c0
[   35.755260]  __kasan_check_write+0x18/0x20
[   35.756130]  kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   35.756599]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   35.757225]  ? kasan_set_track+0x29/0x40
[   35.757821]  ? kasan_save_alloc_info+0x22/0x30
[   35.758322]  ? __kasan_kmalloc+0xb7/0xc0
[   35.758816]  kasan_bitops_generic+0xa9/0x130
[   35.759084]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   35.759687]  ? ktime_get_ts64+0x118/0x140
[   35.760222]  kunit_try_run_case+0x120/0x290
[   35.760869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.761399]  ? __kasan_check_write+0x18/0x20
[   35.761961]  ? trace_preempt_on+0x20/0xa0
[   35.762493]  ? __kthread_parkme+0x4f/0xd0
[   35.763015]  ? preempt_count_sub+0x50/0x80
[   35.763518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.764276]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.765061]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.765692]  kthread+0x19e/0x1e0
[   35.765917]  ? __pfx_kthread+0x10/0x10
[   35.766142]  ret_from_fork+0x41/0x70
[   35.766357]  ? __pfx_kthread+0x10/0x10
[   35.766894]  ret_from_fork_asm+0x1b/0x30
[   35.767371]  </TASK>
[   35.767668] 
[   35.768294] Allocated by task 222:
[   35.769004]  kasan_save_stack+0x44/0x70
[   35.769567]  kasan_set_track+0x29/0x40
[   35.770017]  kasan_save_alloc_info+0x22/0x30
[   35.770584]  __kasan_kmalloc+0xb7/0xc0
[   35.771093]  kmalloc_trace+0x4c/0xb0
[   35.771921]  kasan_bitops_generic+0x8e/0x130
[   35.772417]  kunit_try_run_case+0x120/0x290
[   35.772697]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.773461]  kthread+0x19e/0x1e0
[   35.773890]  ret_from_fork+0x41/0x70
[   35.774096]  ret_from_fork_asm+0x1b/0x30
[   35.774303] 
[   35.774425] The buggy address belongs to the object at ffff8881024a3ac0
[   35.774425]  which belongs to the cache kmalloc-16 of size 16
[   35.775375] The buggy address is located 8 bytes inside of
[   35.775375]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   35.776478] 
[   35.776719] The buggy address belongs to the physical page:
[   35.777057] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   35.777659] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.778004] page_type: 0xffffffff()
[   35.778236] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   35.778788] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   35.779258] page dumped because: kasan: bad access detected
[   35.779924] 
[   35.780062] Memory state around the buggy address:
[   35.780314]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   35.780904]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   35.781258] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.781751]                                               ^
[   35.782059]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.782462]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.783025] ==================================================================
[   35.783820] ==================================================================
[   35.784250] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xda/0x5e0
[   35.785219] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   35.785926] 
[   35.786072] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.786618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.787166] Call Trace:
[   35.787437]  <TASK>
[   35.787626]  dump_stack_lvl+0x4e/0x90
[   35.787953]  print_report+0xd2/0x650
[   35.788196]  ? __virt_addr_valid+0x156/0x1e0
[   35.788885]  ? kasan_bitops_modify.constprop.0+0xda/0x5e0
[   35.789237]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.789557]  ? kasan_bitops_modify.constprop.0+0xda/0x5e0
[   35.790093]  kasan_report+0x147/0x180
[   35.790370]  ? kasan_bitops_modify.constprop.0+0xda/0x5e0
[   35.790711]  kasan_check_range+0x10c/0x1c0
[   35.791117]  __kasan_check_write+0x18/0x20
[   35.791463]  kasan_bitops_modify.constprop.0+0xda/0x5e0
[   35.791811]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   35.792165]  ? kasan_set_track+0x29/0x40
[   35.792432]  ? kasan_save_alloc_info+0x22/0x30
[   35.792719]  ? __kasan_kmalloc+0xb7/0xc0
[   35.793291]  kasan_bitops_generic+0xa9/0x130
[   35.793755]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   35.794101]  ? ktime_get_ts64+0x118/0x140
[   35.794463]  kunit_try_run_case+0x120/0x290
[   35.794767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.795120]  ? __kasan_check_write+0x18/0x20
[   35.795474]  ? trace_preempt_on+0x20/0xa0
[   35.795771]  ? __kthread_parkme+0x4f/0xd0
[   35.796028]  ? preempt_count_sub+0x50/0x80
[   35.796639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.796988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.797351]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.798006]  kthread+0x19e/0x1e0
[   35.798262]  ? __pfx_kthread+0x10/0x10
[   35.798518]  ret_from_fork+0x41/0x70
[   35.798965]  ? __pfx_kthread+0x10/0x10
[   35.799201]  ret_from_fork_asm+0x1b/0x30
[   35.799500]  </TASK>
[   35.799818] 
[   35.799962] Allocated by task 222:
[   35.800152]  kasan_save_stack+0x44/0x70
[   35.800425]  kasan_set_track+0x29/0x40
[   35.801191]  kasan_save_alloc_info+0x22/0x30
[   35.801505]  __kasan_kmalloc+0xb7/0xc0
[   35.801946]  kmalloc_trace+0x4c/0xb0
[   35.802189]  kasan_bitops_generic+0x8e/0x130
[   35.802521]  kunit_try_run_case+0x120/0x290
[   35.802833]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.803173]  kthread+0x19e/0x1e0
[   35.803504]  ret_from_fork+0x41/0x70
[   35.803732]  ret_from_fork_asm+0x1b/0x30
[   35.804081] 
[   35.804186] The buggy address belongs to the object at ffff8881024a3ac0
[   35.804186]  which belongs to the cache kmalloc-16 of size 16
[   35.805235] The buggy address is located 8 bytes inside of
[   35.805235]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   35.806068] 
[   35.806205] The buggy address belongs to the physical page:
[   35.806491] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   35.807119] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.807407] page_type: 0xffffffff()
[   35.807672] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   35.808188] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   35.808926] page dumped because: kasan: bad access detected
[   35.809232] 
[   35.809358] Memory state around the buggy address:
[   35.809873]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   35.810256]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   35.810884] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.811255]                                               ^
[   35.811769]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.812166]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.812559] ==================================================================
[   35.871623] ==================================================================
[   35.872088] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   35.873588] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   35.874030] 
[   35.874204] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.874683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.875177] Call Trace:
[   35.875359]  <TASK>
[   35.875514]  dump_stack_lvl+0x4e/0x90
[   35.875855]  print_report+0xd2/0x650
[   35.876102]  ? __virt_addr_valid+0x156/0x1e0
[   35.876415]  ? kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   35.877016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.877425]  ? kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   35.877836]  kasan_report+0x147/0x180
[   35.878105]  ? kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   35.878486]  kasan_check_range+0x10c/0x1c0
[   35.878774]  __kasan_check_write+0x18/0x20
[   35.879060]  kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   35.879393]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   35.879707]  ? kasan_set_track+0x29/0x40
[   35.880026]  ? kasan_save_alloc_info+0x22/0x30
[   35.880361]  ? __kasan_kmalloc+0xb7/0xc0
[   35.880671]  kasan_bitops_generic+0xa9/0x130
[   35.880993]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   35.881323]  ? ktime_get_ts64+0x118/0x140
[   35.881624]  kunit_try_run_case+0x120/0x290
[   35.881960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.882248]  ? __kasan_check_write+0x18/0x20
[   35.882545]  ? trace_preempt_on+0x20/0xa0
[   35.883813]  ? __kthread_parkme+0x4f/0xd0
[   35.884129]  ? preempt_count_sub+0x50/0x80
[   35.884431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.884750]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.885141]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.885473]  kthread+0x19e/0x1e0
[   35.885685]  ? __pfx_kthread+0x10/0x10
[   35.885987]  ret_from_fork+0x41/0x70
[   35.886218]  ? __pfx_kthread+0x10/0x10
[   35.886484]  ret_from_fork_asm+0x1b/0x30
[   35.886770]  </TASK>
[   35.886922] 
[   35.887048] Allocated by task 222:
[   35.887251]  kasan_save_stack+0x44/0x70
[   35.887523]  kasan_set_track+0x29/0x40
[   35.888438]  kasan_save_alloc_info+0x22/0x30
[   35.888780]  __kasan_kmalloc+0xb7/0xc0
[   35.889043]  kmalloc_trace+0x4c/0xb0
[   35.889275]  kasan_bitops_generic+0x8e/0x130
[   35.889694]  kunit_try_run_case+0x120/0x290
[   35.889991]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.890314]  kthread+0x19e/0x1e0
[   35.890638]  ret_from_fork+0x41/0x70
[   35.890994]  ret_from_fork_asm+0x1b/0x30
[   35.891249] 
[   35.891374] The buggy address belongs to the object at ffff8881024a3ac0
[   35.891374]  which belongs to the cache kmalloc-16 of size 16
[   35.892166] The buggy address is located 8 bytes inside of
[   35.892166]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   35.893486] 
[   35.893608] The buggy address belongs to the physical page:
[   35.894091] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   35.894606] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.894936] page_type: 0xffffffff()
[   35.895201] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   35.895635] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   35.896052] page dumped because: kasan: bad access detected
[   35.897024] 
[   35.897160] Memory state around the buggy address:
[   35.897405]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   35.897727]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   35.898352] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.898943]                                               ^
[   35.899309]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.899778]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.900200] ==================================================================
[   35.929731] ==================================================================
[   35.930147] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   35.930730] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   35.931306] 
[   35.931578] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.932083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.933141] Call Trace:
[   35.933346]  <TASK>
[   35.933504]  dump_stack_lvl+0x4e/0x90
[   35.933783]  print_report+0xd2/0x650
[   35.934085]  ? __virt_addr_valid+0x156/0x1e0
[   35.934372]  ? kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   35.934665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.935072]  ? kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   35.935368]  kasan_report+0x147/0x180
[   35.935633]  ? kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   35.935976]  kasan_check_range+0x10c/0x1c0
[   35.936285]  __kasan_check_write+0x18/0x20
[   35.936797]  kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   35.937687]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   35.938190]  ? kasan_set_track+0x29/0x40
[   35.938566]  ? kasan_save_alloc_info+0x22/0x30
[   35.938988]  ? __kasan_kmalloc+0xb7/0xc0
[   35.939364]  kasan_bitops_generic+0xa9/0x130
[   35.939752]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   35.940204]  ? ktime_get_ts64+0x118/0x140
[   35.940604]  kunit_try_run_case+0x120/0x290
[   35.941008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.941321]  ? __kasan_check_write+0x18/0x20
[   35.941609]  ? trace_preempt_on+0x20/0xa0
[   35.942575]  ? __kthread_parkme+0x4f/0xd0
[   35.942872]  ? preempt_count_sub+0x50/0x80
[   35.943743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.944513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.945483]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.946379]  kthread+0x19e/0x1e0
[   35.946600]  ? __pfx_kthread+0x10/0x10
[   35.946840]  ret_from_fork+0x41/0x70
[   35.947363]  ? __pfx_kthread+0x10/0x10
[   35.947898]  ret_from_fork_asm+0x1b/0x30
[   35.948412]  </TASK>
[   35.948711] 
[   35.948950] Allocated by task 222:
[   35.949361]  kasan_save_stack+0x44/0x70
[   35.949934]  kasan_set_track+0x29/0x40
[   35.950404]  kasan_save_alloc_info+0x22/0x30
[   35.950781]  __kasan_kmalloc+0xb7/0xc0
[   35.951341]  kmalloc_trace+0x4c/0xb0
[   35.951842]  kasan_bitops_generic+0x8e/0x130
[   35.952359]  kunit_try_run_case+0x120/0x290
[   35.952658]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.953212]  kthread+0x19e/0x1e0
[   35.953642]  ret_from_fork+0x41/0x70
[   35.954150]  ret_from_fork_asm+0x1b/0x30
[   35.954497] 
[   35.954758] The buggy address belongs to the object at ffff8881024a3ac0
[   35.954758]  which belongs to the cache kmalloc-16 of size 16
[   35.955975] The buggy address is located 8 bytes inside of
[   35.955975]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   35.956669] 
[   35.956793] The buggy address belongs to the physical page:
[   35.957050] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   35.957451] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.957709] page_type: 0xffffffff()
[   35.958117] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   35.958939] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   35.959799] page dumped because: kasan: bad access detected
[   35.960414] 
[   35.960635] Memory state around the buggy address:
[   35.961125]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   35.962046]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   35.962895] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.963652]                                               ^
[   35.964233]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.965071]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.965853] ==================================================================
[   35.843488] ==================================================================
[   35.844291] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   35.845079] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   35.845478] 
[   35.845667] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.846141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.846627] Call Trace:
[   35.846839]  <TASK>
[   35.847020]  dump_stack_lvl+0x4e/0x90
[   35.847321]  print_report+0xd2/0x650
[   35.848072]  ? __virt_addr_valid+0x156/0x1e0
[   35.848387]  ? kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   35.848749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.849093]  ? kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   35.849429]  kasan_report+0x147/0x180
[   35.849690]  ? kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   35.850033]  kasan_check_range+0x10c/0x1c0
[   35.850333]  __kasan_check_write+0x18/0x20
[   35.850614]  kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   35.850954]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   35.851749]  ? kasan_set_track+0x29/0x40
[   35.852048]  ? kasan_save_alloc_info+0x22/0x30
[   35.852332]  ? __kasan_kmalloc+0xb7/0xc0
[   35.852616]  kasan_bitops_generic+0xa9/0x130
[   35.853043]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   35.853380]  ? ktime_get_ts64+0x118/0x140
[   35.853642]  kunit_try_run_case+0x120/0x290
[   35.853950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.854227]  ? __kasan_check_write+0x18/0x20
[   35.854528]  ? trace_preempt_on+0x20/0xa0
[   35.854854]  ? __kthread_parkme+0x4f/0xd0
[   35.855169]  ? preempt_count_sub+0x50/0x80
[   35.855854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.856172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.856549]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.856946]  kthread+0x19e/0x1e0
[   35.857155]  ? __pfx_kthread+0x10/0x10
[   35.857447]  ret_from_fork+0x41/0x70
[   35.857732]  ? __pfx_kthread+0x10/0x10
[   35.857985]  ret_from_fork_asm+0x1b/0x30
[   35.858283]  </TASK>
[   35.858450] 
[   35.858574] Allocated by task 222:
[   35.858753]  kasan_save_stack+0x44/0x70
[   35.859110]  kasan_set_track+0x29/0x40
[   35.859344]  kasan_save_alloc_info+0x22/0x30
[   35.859678]  __kasan_kmalloc+0xb7/0xc0
[   35.859976]  kmalloc_trace+0x4c/0xb0
[   35.860196]  kasan_bitops_generic+0x8e/0x130
[   35.860483]  kunit_try_run_case+0x120/0x290
[   35.861410]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.861737]  kthread+0x19e/0x1e0
[   35.861996]  ret_from_fork+0x41/0x70
[   35.862209]  ret_from_fork_asm+0x1b/0x30
[   35.862453] 
[   35.862581] The buggy address belongs to the object at ffff8881024a3ac0
[   35.862581]  which belongs to the cache kmalloc-16 of size 16
[   35.863358] The buggy address is located 8 bytes inside of
[   35.863358]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   35.864017] 
[   35.864160] The buggy address belongs to the physical page:
[   35.864450] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   35.865612] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.865994] page_type: 0xffffffff()
[   35.866247] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   35.866659] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   35.867170] page dumped because: kasan: bad access detected
[   35.867467] 
[   35.867590] Memory state around the buggy address:
[   35.867886]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   35.868338]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   35.869356] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.869761]                                               ^
[   35.870089]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.870479]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.870885] ==================================================================
[   35.901734] ==================================================================
[   35.902163] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   35.902800] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   35.903230] 
[   35.903377] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.903939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.904465] Call Trace:
[   35.904675]  <TASK>
[   35.904835]  dump_stack_lvl+0x4e/0x90
[   35.905696]  print_report+0xd2/0x650
[   35.906101]  ? __virt_addr_valid+0x156/0x1e0
[   35.906397]  ? kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   35.906742]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.907135]  ? kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   35.907464]  kasan_report+0x147/0x180
[   35.907740]  ? kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   35.908060]  kasan_check_range+0x10c/0x1c0
[   35.908349]  __kasan_check_write+0x18/0x20
[   35.909091]  kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   35.909431]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   35.909830]  ? kasan_set_track+0x29/0x40
[   35.910086]  ? kasan_save_alloc_info+0x22/0x30
[   35.910381]  ? __kasan_kmalloc+0xb7/0xc0
[   35.910660]  kasan_bitops_generic+0xa9/0x130
[   35.910963]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   35.911323]  ? ktime_get_ts64+0x118/0x140
[   35.911581]  kunit_try_run_case+0x120/0x290
[   35.911857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.912194]  ? __kasan_check_write+0x18/0x20
[   35.913068]  ? trace_preempt_on+0x20/0xa0
[   35.913330]  ? __kthread_parkme+0x4f/0xd0
[   35.913652]  ? preempt_count_sub+0x50/0x80
[   35.913930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.914225]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.914577]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.914943]  kthread+0x19e/0x1e0
[   35.915202]  ? __pfx_kthread+0x10/0x10
[   35.915463]  ret_from_fork+0x41/0x70
[   35.915726]  ? __pfx_kthread+0x10/0x10
[   35.915956]  ret_from_fork_asm+0x1b/0x30
[   35.916265]  </TASK>
[   35.917029] 
[   35.917146] Allocated by task 222:
[   35.917373]  kasan_save_stack+0x44/0x70
[   35.917665]  kasan_set_track+0x29/0x40
[   35.917931]  kasan_save_alloc_info+0x22/0x30
[   35.918197]  __kasan_kmalloc+0xb7/0xc0
[   35.918453]  kmalloc_trace+0x4c/0xb0
[   35.918664]  kasan_bitops_generic+0x8e/0x130
[   35.918938]  kunit_try_run_case+0x120/0x290
[   35.919239]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.919577]  kthread+0x19e/0x1e0
[   35.919802]  ret_from_fork+0x41/0x70
[   35.920067]  ret_from_fork_asm+0x1b/0x30
[   35.920416] 
[   35.921056] The buggy address belongs to the object at ffff8881024a3ac0
[   35.921056]  which belongs to the cache kmalloc-16 of size 16
[   35.921736] The buggy address is located 8 bytes inside of
[   35.921736]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   35.922381] 
[   35.922514] The buggy address belongs to the physical page:
[   35.922872] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   35.923399] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.923704] page_type: 0xffffffff()
[   35.923958] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   35.924890] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   35.925304] page dumped because: kasan: bad access detected
[   35.925637] 
[   35.925742] Memory state around the buggy address:
[   35.926075]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   35.926421]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   35.926929] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.927315]                                               ^
[   35.927614]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.928026]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.929080] ==================================================================
[   35.814272] ==================================================================
[   35.814935] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   35.815503] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   35.815950] 
[   35.816079] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.816527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.817253] Call Trace:
[   35.817736]  <TASK>
[   35.817952]  dump_stack_lvl+0x4e/0x90
[   35.818232]  print_report+0xd2/0x650
[   35.818749]  ? __virt_addr_valid+0x156/0x1e0
[   35.819048]  ? kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   35.819536]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.819969]  ? kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   35.820303]  kasan_report+0x147/0x180
[   35.820535]  ? kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   35.820937]  kasan_check_range+0x10c/0x1c0
[   35.821200]  __kasan_check_write+0x18/0x20
[   35.821454]  kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   35.821793]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   35.822155]  ? kasan_set_track+0x29/0x40
[   35.822387]  ? kasan_save_alloc_info+0x22/0x30
[   35.822692]  ? __kasan_kmalloc+0xb7/0xc0
[   35.823423]  kasan_bitops_generic+0xa9/0x130
[   35.823758]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   35.824082]  ? ktime_get_ts64+0x118/0x140
[   35.824451]  kunit_try_run_case+0x120/0x290
[   35.824764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.825085]  ? __kasan_check_write+0x18/0x20
[   35.825333]  ? trace_preempt_on+0x20/0xa0
[   35.825733]  ? __kthread_parkme+0x4f/0xd0
[   35.826066]  ? preempt_count_sub+0x50/0x80
[   35.826332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.827110]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.827472]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.827972]  kthread+0x19e/0x1e0
[   35.828234]  ? __pfx_kthread+0x10/0x10
[   35.828489]  ret_from_fork+0x41/0x70
[   35.828841]  ? __pfx_kthread+0x10/0x10
[   35.829092]  ret_from_fork_asm+0x1b/0x30
[   35.829475]  </TASK>
[   35.829643] 
[   35.829747] Allocated by task 222:
[   35.830124]  kasan_save_stack+0x44/0x70
[   35.830837]  kasan_set_track+0x29/0x40
[   35.831113]  kasan_save_alloc_info+0x22/0x30
[   35.831589]  __kasan_kmalloc+0xb7/0xc0
[   35.831818]  kmalloc_trace+0x4c/0xb0
[   35.832079]  kasan_bitops_generic+0x8e/0x130
[   35.832347]  kunit_try_run_case+0x120/0x290
[   35.832713]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.833060]  kthread+0x19e/0x1e0
[   35.833296]  ret_from_fork+0x41/0x70
[   35.833581]  ret_from_fork_asm+0x1b/0x30
[   35.833972] 
[   35.834089] The buggy address belongs to the object at ffff8881024a3ac0
[   35.834089]  which belongs to the cache kmalloc-16 of size 16
[   35.835145] The buggy address is located 8 bytes inside of
[   35.835145]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   35.836005] 
[   35.836126] The buggy address belongs to the physical page:
[   35.836410] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   35.837054] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.837368] page_type: 0xffffffff()
[   35.837597] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   35.838044] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   35.838443] page dumped because: kasan: bad access detected
[   35.838754] 
[   35.838891] Memory state around the buggy address:
[   35.839182]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   35.839569]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   35.839975] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.840325]                                               ^
[   35.840679]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.841100]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.841499] ==================================================================
[   35.966876] ==================================================================
[   35.967239] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   35.967631] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   35.968509] 
[   35.968723] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.969540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.970572] Call Trace:
[   35.970912]  <TASK>
[   35.971180]  dump_stack_lvl+0x4e/0x90
[   35.971928]  print_report+0xd2/0x650
[   35.972347]  ? __virt_addr_valid+0x156/0x1e0
[   35.972881]  ? kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   35.973537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.973971]  ? kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   35.974253]  kasan_report+0x147/0x180
[   35.974565]  ? kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   35.974946]  kasan_check_range+0x10c/0x1c0
[   35.975708]  __kasan_check_write+0x18/0x20
[   35.976334]  kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   35.976755]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   35.977381]  ? kasan_set_track+0x29/0x40
[   35.977690]  ? kasan_save_alloc_info+0x22/0x30
[   35.977959]  ? __kasan_kmalloc+0xb7/0xc0
[   35.978181]  kasan_bitops_generic+0xa9/0x130
[   35.979088]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   35.979672]  ? ktime_get_ts64+0x118/0x140
[   35.980155]  kunit_try_run_case+0x120/0x290
[   35.980624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.981148]  ? __kasan_check_write+0x18/0x20
[   35.981604]  ? trace_preempt_on+0x20/0xa0
[   35.982095]  ? __kthread_parkme+0x4f/0xd0
[   35.982938]  ? preempt_count_sub+0x50/0x80
[   35.983312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.983569]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.984105]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.984656]  kthread+0x19e/0x1e0
[   35.985090]  ? __pfx_kthread+0x10/0x10
[   35.985507]  ret_from_fork+0x41/0x70
[   35.985942]  ? __pfx_kthread+0x10/0x10
[   35.986694]  ret_from_fork_asm+0x1b/0x30
[   35.987201]  </TASK>
[   35.987465] 
[   35.987586] Allocated by task 222:
[   35.987800]  kasan_save_stack+0x44/0x70
[   35.988234]  kasan_set_track+0x29/0x40
[   35.988649]  kasan_save_alloc_info+0x22/0x30
[   35.989039]  __kasan_kmalloc+0xb7/0xc0
[   35.989236]  kmalloc_trace+0x4c/0xb0
[   35.989423]  kasan_bitops_generic+0x8e/0x130
[   35.989643]  kunit_try_run_case+0x120/0x290
[   35.990088]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.991129]  kthread+0x19e/0x1e0
[   35.991562]  ret_from_fork+0x41/0x70
[   35.991990]  ret_from_fork_asm+0x1b/0x30
[   35.992419] 
[   35.992607] The buggy address belongs to the object at ffff8881024a3ac0
[   35.992607]  which belongs to the cache kmalloc-16 of size 16
[   35.993835] The buggy address is located 8 bytes inside of
[   35.993835]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   35.995322] 
[   35.995439] The buggy address belongs to the physical page:
[   35.995685] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   35.996645] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.997334] page_type: 0xffffffff()
[   35.997723] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   35.998994] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   35.999640] page dumped because: kasan: bad access detected
[   35.999915] 
[   36.000015] Memory state around the buggy address:
[   36.000236]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   36.001501]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   36.002294] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   36.003397]                                               ^
[   36.003994]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.004688]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.005257] ==================================================================