Hay
Date
June 17, 2025, 3:39 p.m.

Environment
qemu-arm64
qemu-x86_64

[   95.585819] ==================================================================
[   95.587227] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8
[   95.588058] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.590587] 
[   95.590902] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.591666] Hardware name: linux,dummy-virt (DT)
[   95.592175] Call trace:
[   95.592506]  dump_backtrace+0x9c/0x128
[   95.593006]  show_stack+0x20/0x38
[   95.593838]  dump_stack_lvl+0x60/0xb0
[   95.594310]  print_report+0xf8/0x5e8
[   95.595000]  kasan_report+0xdc/0x128
[   95.595526]  __asan_load8+0x9c/0xc0
[   95.597063]  kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8
[   95.597937]  kasan_bitops_generic+0xc0/0x148
[   95.598568]  kunit_try_run_case+0x114/0x298
[   95.599179]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.599853]  kthread+0x18c/0x1a8
[   95.600462]  ret_from_fork+0x10/0x20
[   95.601035] 
[   95.601380] Allocated by task 207:
[   95.601909]  kasan_save_stack+0x3c/0x68
[   95.602478]  kasan_set_track+0x2c/0x40
[   95.603066]  kasan_save_alloc_info+0x24/0x38
[   95.603669]  __kasan_kmalloc+0xd4/0xd8
[   95.604079]  kmalloc_trace+0x68/0x130
[   95.604525]  kasan_bitops_generic+0x98/0x148
[   95.605277]  kunit_try_run_case+0x114/0x298
[   95.605723]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.606345]  kthread+0x18c/0x1a8
[   95.606812]  ret_from_fork+0x10/0x20
[   95.607310] 
[   95.607553] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.607553]  which belongs to the cache kmalloc-16 of size 16
[   95.608651] The buggy address is located 8 bytes inside of
[   95.608651]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.609668] 
[   95.609926] The buggy address belongs to the physical page:
[   95.610428] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.611454] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.612056] page_type: 0xffffffff()
[   95.612493] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.613366] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.614043] page dumped because: kasan: bad access detected
[   95.614544] 
[   95.614759] Memory state around the buggy address:
[   95.615238]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.615924]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.616609] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.617228]                                               ^
[   95.617754]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.618422]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.619058] ==================================================================
[   95.738311] ==================================================================
[   95.739104] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8
[   95.739981] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.740704] 
[   95.740978] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.741809] Hardware name: linux,dummy-virt (DT)
[   95.742271] Call trace:
[   95.742593]  dump_backtrace+0x9c/0x128
[   95.743059]  show_stack+0x20/0x38
[   95.743504]  dump_stack_lvl+0x60/0xb0
[   95.743968]  print_report+0xf8/0x5e8
[   95.744430]  kasan_report+0xdc/0x128
[   95.744922]  __asan_load8+0x9c/0xc0
[   95.745381]  kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8
[   95.746100]  kasan_bitops_generic+0xc0/0x148
[   95.746579]  kunit_try_run_case+0x114/0x298
[   95.748282]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.748881]  kthread+0x18c/0x1a8
[   95.749366]  ret_from_fork+0x10/0x20
[   95.749792] 
[   95.750018] Allocated by task 207:
[   95.750333]  kasan_save_stack+0x3c/0x68
[   95.750859]  kasan_set_track+0x2c/0x40
[   95.751293]  kasan_save_alloc_info+0x24/0x38
[   95.751758]  __kasan_kmalloc+0xd4/0xd8
[   95.752240]  kmalloc_trace+0x68/0x130
[   95.752706]  kasan_bitops_generic+0x98/0x148
[   95.753191]  kunit_try_run_case+0x114/0x298
[   95.753688]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.754249]  kthread+0x18c/0x1a8
[   95.754616]  ret_from_fork+0x10/0x20
[   95.755049] 
[   95.755254] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.755254]  which belongs to the cache kmalloc-16 of size 16
[   95.756227] The buggy address is located 8 bytes inside of
[   95.756227]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.757129] 
[   95.757384] The buggy address belongs to the physical page:
[   95.757872] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.758641] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.759266] page_type: 0xffffffff()
[   95.759709] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.760436] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.761100] page dumped because: kasan: bad access detected
[   95.761603] 
[   95.761819] Memory state around the buggy address:
[   95.762267]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.762922]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.763408] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.764088]                                               ^
[   95.764751]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.765481]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.766119] ==================================================================
[   95.522077] ==================================================================
[   95.522712] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8
[   95.523644] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.524506] 
[   95.524838] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.525572] Hardware name: linux,dummy-virt (DT)
[   95.526165] Call trace:
[   95.526490]  dump_backtrace+0x9c/0x128
[   95.527044]  show_stack+0x20/0x38
[   95.527738]  dump_stack_lvl+0x60/0xb0
[   95.528377]  print_report+0xf8/0x5e8
[   95.528895]  kasan_report+0xdc/0x128
[   95.529401]  __asan_load8+0x9c/0xc0
[   95.529898]  kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8
[   95.530598]  kasan_bitops_generic+0xc0/0x148
[   95.531354]  kunit_try_run_case+0x114/0x298
[   95.531907]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.532591]  kthread+0x18c/0x1a8
[   95.533050]  ret_from_fork+0x10/0x20
[   95.533478] 
[   95.533722] Allocated by task 207:
[   95.534103]  kasan_save_stack+0x3c/0x68
[   95.534584]  kasan_set_track+0x2c/0x40
[   95.535092]  kasan_save_alloc_info+0x24/0x38
[   95.535581]  __kasan_kmalloc+0xd4/0xd8
[   95.536086]  kmalloc_trace+0x68/0x130
[   95.536784]  kasan_bitops_generic+0x98/0x148
[   95.537246]  kunit_try_run_case+0x114/0x298
[   95.537814]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.538326]  kthread+0x18c/0x1a8
[   95.538766]  ret_from_fork+0x10/0x20
[   95.541196] 
[   95.541502] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.541502]  which belongs to the cache kmalloc-16 of size 16
[   95.542730] The buggy address is located 8 bytes inside of
[   95.542730]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.543712] 
[   95.544022] The buggy address belongs to the physical page:
[   95.544560] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.545581] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.546338] page_type: 0xffffffff()
[   95.546808] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.547444] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.548539] page dumped because: kasan: bad access detected
[   95.549083] 
[   95.549337] Memory state around the buggy address:
[   95.549944]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.550569]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.551336] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.552003]                                               ^
[   95.552600]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.553312]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.554014] ==================================================================
[   95.680700] ==================================================================
[   95.681439] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8
[   95.682357] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.683196] 
[   95.683426] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.684190] Hardware name: linux,dummy-virt (DT)
[   95.684694] Call trace:
[   95.685022]  dump_backtrace+0x9c/0x128
[   95.685542]  show_stack+0x20/0x38
[   95.685990]  dump_stack_lvl+0x60/0xb0
[   95.686481]  print_report+0xf8/0x5e8
[   95.686961]  kasan_report+0xdc/0x128
[   95.687430]  kasan_check_range+0xe8/0x190
[   95.687958]  __kasan_check_write+0x20/0x30
[   95.688446]  kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8
[   95.689058]  kasan_bitops_generic+0xc0/0x148
[   95.689657]  kunit_try_run_case+0x114/0x298
[   95.690282]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.690807]  kthread+0x18c/0x1a8
[   95.691211]  ret_from_fork+0x10/0x20
[   95.691698] 
[   95.691956] Allocated by task 207:
[   95.692418]  kasan_save_stack+0x3c/0x68
[   95.692974]  kasan_set_track+0x2c/0x40
[   95.693430]  kasan_save_alloc_info+0x24/0x38
[   95.693973]  __kasan_kmalloc+0xd4/0xd8
[   95.694452]  kmalloc_trace+0x68/0x130
[   95.694907]  kasan_bitops_generic+0x98/0x148
[   95.695407]  kunit_try_run_case+0x114/0x298
[   95.695972]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.696654]  kthread+0x18c/0x1a8
[   95.697063]  ret_from_fork+0x10/0x20
[   95.697496] 
[   95.697748] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.697748]  which belongs to the cache kmalloc-16 of size 16
[   95.698762] The buggy address is located 8 bytes inside of
[   95.698762]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.699781] 
[   95.700066] The buggy address belongs to the physical page:
[   95.700651] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.701506] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.702151] page_type: 0xffffffff()
[   95.702578] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.703359] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.704107] page dumped because: kasan: bad access detected
[   95.704646] 
[   95.704872] Memory state around the buggy address:
[   95.705369]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.706099]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.706563] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.707012]                                               ^
[   95.707680]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.708445]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.709150] ==================================================================
[   95.710337] ==================================================================
[   95.710945] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8
[   95.711764] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.712363] 
[   95.712650] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.713418] Hardware name: linux,dummy-virt (DT)
[   95.713857] Call trace:
[   95.714164]  dump_backtrace+0x9c/0x128
[   95.714611]  show_stack+0x20/0x38
[   95.715007]  dump_stack_lvl+0x60/0xb0
[   95.715458]  print_report+0xf8/0x5e8
[   95.715935]  kasan_report+0xdc/0x128
[   95.716397]  __asan_load8+0x9c/0xc0
[   95.716885]  kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8
[   95.717577]  kasan_bitops_generic+0xc0/0x148
[   95.718059]  kunit_try_run_case+0x114/0x298
[   95.718565]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.719018]  kthread+0x18c/0x1a8
[   95.719323]  ret_from_fork+0x10/0x20
[   95.719862] 
[   95.720139] Allocated by task 207:
[   95.720538]  kasan_save_stack+0x3c/0x68
[   95.721009]  kasan_set_track+0x2c/0x40
[   95.721444]  kasan_save_alloc_info+0x24/0x38
[   95.721906]  __kasan_kmalloc+0xd4/0xd8
[   95.722359]  kmalloc_trace+0x68/0x130
[   95.722778]  kasan_bitops_generic+0x98/0x148
[   95.723275]  kunit_try_run_case+0x114/0x298
[   95.723817]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.724492]  kthread+0x18c/0x1a8
[   95.724911]  ret_from_fork+0x10/0x20
[   95.725369] 
[   95.725595] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.725595]  which belongs to the cache kmalloc-16 of size 16
[   95.726628] The buggy address is located 8 bytes inside of
[   95.726628]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.727554] 
[   95.727833] The buggy address belongs to the physical page:
[   95.728269] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.729267] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.729910] page_type: 0xffffffff()
[   95.730340] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.730888] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.731541] page dumped because: kasan: bad access detected
[   95.732154] 
[   95.732444] Memory state around the buggy address:
[   95.732981]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.733715]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.734403] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.735068]                                               ^
[   95.735559]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.736389]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.737124] ==================================================================
[   95.620992] ==================================================================
[   95.621774] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8
[   95.622398] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.622912] 
[   95.623209] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.624428] Hardware name: linux,dummy-virt (DT)
[   95.624903] Call trace:
[   95.625266]  dump_backtrace+0x9c/0x128
[   95.625767]  show_stack+0x20/0x38
[   95.626179]  dump_stack_lvl+0x60/0xb0
[   95.626624]  print_report+0xf8/0x5e8
[   95.627025]  kasan_report+0xdc/0x128
[   95.627458]  kasan_check_range+0xe8/0x190
[   95.627993]  __kasan_check_write+0x20/0x30
[   95.628479]  kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8
[   95.629153]  kasan_bitops_generic+0xc0/0x148
[   95.629569]  kunit_try_run_case+0x114/0x298
[   95.630065]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.630698]  kthread+0x18c/0x1a8
[   95.631077]  ret_from_fork+0x10/0x20
[   95.631512] 
[   95.631760] Allocated by task 207:
[   95.632169]  kasan_save_stack+0x3c/0x68
[   95.632688]  kasan_set_track+0x2c/0x40
[   95.633184]  kasan_save_alloc_info+0x24/0x38
[   95.633681]  __kasan_kmalloc+0xd4/0xd8
[   95.634193]  kmalloc_trace+0x68/0x130
[   95.634661]  kasan_bitops_generic+0x98/0x148
[   95.635108]  kunit_try_run_case+0x114/0x298
[   95.635776]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.636470]  kthread+0x18c/0x1a8
[   95.636961]  ret_from_fork+0x10/0x20
[   95.637443] 
[   95.637695] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.637695]  which belongs to the cache kmalloc-16 of size 16
[   95.638730] The buggy address is located 8 bytes inside of
[   95.638730]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.639703] 
[   95.639952] The buggy address belongs to the physical page:
[   95.640555] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.641436] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.642121] page_type: 0xffffffff()
[   95.642620] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.643534] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.644182] page dumped because: kasan: bad access detected
[   95.645309] 
[   95.645561] Memory state around the buggy address:
[   95.645913]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.646384]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.647071] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.647727]                                               ^
[   95.648325]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.649038]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.649645] ==================================================================
[   95.767345] ==================================================================
[   95.768016] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8
[   95.768971] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.769790] 
[   95.770033] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.770704] Hardware name: linux,dummy-virt (DT)
[   95.771472] Call trace:
[   95.771803]  dump_backtrace+0x9c/0x128
[   95.772293]  show_stack+0x20/0x38
[   95.772780]  dump_stack_lvl+0x60/0xb0
[   95.773300]  print_report+0xf8/0x5e8
[   95.773779]  kasan_report+0xdc/0x128
[   95.774265]  kasan_check_range+0xe8/0x190
[   95.774826]  __kasan_check_write+0x20/0x30
[   95.775321]  kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8
[   95.775879]  kasan_bitops_generic+0xc0/0x148
[   95.777061]  kunit_try_run_case+0x114/0x298
[   95.777926]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.778879]  kthread+0x18c/0x1a8
[   95.779584]  ret_from_fork+0x10/0x20
[   95.780349] 
[   95.780729] Allocated by task 207:
[   95.781401]  kasan_save_stack+0x3c/0x68
[   95.782185]  kasan_set_track+0x2c/0x40
[   95.782979]  kasan_save_alloc_info+0x24/0x38
[   95.783776]  __kasan_kmalloc+0xd4/0xd8
[   95.784651]  kmalloc_trace+0x68/0x130
[   95.785431]  kasan_bitops_generic+0x98/0x148
[   95.786281]  kunit_try_run_case+0x114/0x298
[   95.787135]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.788223]  kthread+0x18c/0x1a8
[   95.788959]  ret_from_fork+0x10/0x20
[   95.789753] 
[   95.790101] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.790101]  which belongs to the cache kmalloc-16 of size 16
[   95.791856] The buggy address is located 8 bytes inside of
[   95.791856]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.793603] 
[   95.794049] The buggy address belongs to the physical page:
[   95.794945] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.796284] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.797417] page_type: 0xffffffff()
[   95.798164] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.799266] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.800435] page dumped because: kasan: bad access detected
[   95.801328] 
[   95.801753] Memory state around the buggy address:
[   95.802551]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.803564]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.804667] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.805710]                                               ^
[   95.806656]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.807710]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.808824] ==================================================================
[   95.651189] ==================================================================
[   95.651962] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8
[   95.652840] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.653547] 
[   95.653830] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.654647] Hardware name: linux,dummy-virt (DT)
[   95.655206] Call trace:
[   95.655480]  dump_backtrace+0x9c/0x128
[   95.656029]  show_stack+0x20/0x38
[   95.656527]  dump_stack_lvl+0x60/0xb0
[   95.656940]  print_report+0xf8/0x5e8
[   95.657400]  kasan_report+0xdc/0x128
[   95.657973]  __asan_load8+0x9c/0xc0
[   95.658451]  kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8
[   95.659115]  kasan_bitops_generic+0xc0/0x148
[   95.659610]  kunit_try_run_case+0x114/0x298
[   95.660170]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.660848]  kthread+0x18c/0x1a8
[   95.661305]  ret_from_fork+0x10/0x20
[   95.661772] 
[   95.662026] Allocated by task 207:
[   95.662408]  kasan_save_stack+0x3c/0x68
[   95.662931]  kasan_set_track+0x2c/0x40
[   95.663450]  kasan_save_alloc_info+0x24/0x38
[   95.663947]  __kasan_kmalloc+0xd4/0xd8
[   95.664456]  kmalloc_trace+0x68/0x130
[   95.664908]  kasan_bitops_generic+0x98/0x148
[   95.665365]  kunit_try_run_case+0x114/0x298
[   95.665908]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.666565]  kthread+0x18c/0x1a8
[   95.666997]  ret_from_fork+0x10/0x20
[   95.667457] 
[   95.667691] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.667691]  which belongs to the cache kmalloc-16 of size 16
[   95.668836] The buggy address is located 8 bytes inside of
[   95.668836]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.669858] 
[   95.670106] The buggy address belongs to the physical page:
[   95.670647] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.671498] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.672178] page_type: 0xffffffff()
[   95.672682] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.673437] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.674125] page dumped because: kasan: bad access detected
[   95.674684] 
[   95.674918] Memory state around the buggy address:
[   95.675416]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.676072]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.676726] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.677365]                                               ^
[   95.677944]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.678621]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.679258] ==================================================================
[   95.490341] ==================================================================
[   95.491242] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8
[   95.492193] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.493040] 
[   95.493329] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.494151] Hardware name: linux,dummy-virt (DT)
[   95.494666] Call trace:
[   95.494959]  dump_backtrace+0x9c/0x128
[   95.495472]  show_stack+0x20/0x38
[   95.495916]  dump_stack_lvl+0x60/0xb0
[   95.496399]  print_report+0xf8/0x5e8
[   95.497984]  kasan_report+0xdc/0x128
[   95.498465]  kasan_check_range+0xe8/0x190
[   95.498891]  __kasan_check_write+0x20/0x30
[   95.499268]  kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8
[   95.499990]  kasan_bitops_generic+0xc0/0x148
[   95.500520]  kunit_try_run_case+0x114/0x298
[   95.501081]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.501569]  kthread+0x18c/0x1a8
[   95.501949]  ret_from_fork+0x10/0x20
[   95.502320] 
[   95.502589] Allocated by task 207:
[   95.503283]  kasan_save_stack+0x3c/0x68
[   95.503773]  kasan_set_track+0x2c/0x40
[   95.504322]  kasan_save_alloc_info+0x24/0x38
[   95.504831]  __kasan_kmalloc+0xd4/0xd8
[   95.505488]  kmalloc_trace+0x68/0x130
[   95.506108]  kasan_bitops_generic+0x98/0x148
[   95.506712]  kunit_try_run_case+0x114/0x298
[   95.507221]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.507835]  kthread+0x18c/0x1a8
[   95.508257]  ret_from_fork+0x10/0x20
[   95.508758] 
[   95.508989] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.508989]  which belongs to the cache kmalloc-16 of size 16
[   95.509895] The buggy address is located 8 bytes inside of
[   95.509895]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.510854] 
[   95.511106] The buggy address belongs to the physical page:
[   95.511625] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.512665] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.513592] page_type: 0xffffffff()
[   95.514089] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.514830] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.515507] page dumped because: kasan: bad access detected
[   95.515952] 
[   95.516243] Memory state around the buggy address:
[   95.516907]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.517597]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.518266] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.518986]                                               ^
[   95.519370]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.520650]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.521185] ==================================================================
[   95.555224] ==================================================================
[   95.555948] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8
[   95.556893] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207
[   95.557816] 
[   95.558037] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   95.558606] Hardware name: linux,dummy-virt (DT)
[   95.559159] Call trace:
[   95.559598]  dump_backtrace+0x9c/0x128
[   95.560194]  show_stack+0x20/0x38
[   95.560718]  dump_stack_lvl+0x60/0xb0
[   95.561243]  print_report+0xf8/0x5e8
[   95.561839]  kasan_report+0xdc/0x128
[   95.562382]  kasan_check_range+0xe8/0x190
[   95.563081]  __kasan_check_write+0x20/0x30
[   95.563545]  kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8
[   95.564086]  kasan_bitops_generic+0xc0/0x148
[   95.564516]  kunit_try_run_case+0x114/0x298
[   95.565321]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.566015]  kthread+0x18c/0x1a8
[   95.566477]  ret_from_fork+0x10/0x20
[   95.566935] 
[   95.567135] Allocated by task 207:
[   95.567471]  kasan_save_stack+0x3c/0x68
[   95.567963]  kasan_set_track+0x2c/0x40
[   95.568445]  kasan_save_alloc_info+0x24/0x38
[   95.568947]  __kasan_kmalloc+0xd4/0xd8
[   95.569442]  kmalloc_trace+0x68/0x130
[   95.569895]  kasan_bitops_generic+0x98/0x148
[   95.570374]  kunit_try_run_case+0x114/0x298
[   95.571174]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   95.571696]  kthread+0x18c/0x1a8
[   95.572279]  ret_from_fork+0x10/0x20
[   95.572729] 
[   95.573019] The buggy address belongs to the object at ffff0000c5adb6c0
[   95.573019]  which belongs to the cache kmalloc-16 of size 16
[   95.574095] The buggy address is located 8 bytes inside of
[   95.574095]  allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9)
[   95.575059] 
[   95.575342] The buggy address belongs to the physical page:
[   95.575942] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb
[   95.576826] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   95.577499] page_type: 0xffffffff()
[   95.577944] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[   95.578900] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   95.579743] page dumped because: kasan: bad access detected
[   95.580186] 
[   95.580697] Memory state around the buggy address:
[   95.581070]  ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc
[   95.581674]  ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   95.582107] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   95.582606]                                               ^
[   95.583264]  ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.583897]  ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   95.584558] ==================================================================


[   36.033624] ==================================================================
[   36.034160] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   36.034728] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   36.035633] 
[   36.035818] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   36.036306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   36.036849] Call Trace:
[   36.037109]  <TASK>
[   36.037314]  dump_stack_lvl+0x4e/0x90
[   36.037574]  print_report+0xd2/0x650
[   36.037902]  ? __virt_addr_valid+0x156/0x1e0
[   36.038211]  ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   36.038986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.039344]  ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   36.039988]  kasan_report+0x147/0x180
[   36.040289]  ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   36.040742]  kasan_check_range+0x10c/0x1c0
[   36.041043]  __kasan_check_write+0x18/0x20
[   36.041297]  kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   36.041651]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   36.042056]  ? kasan_set_track+0x29/0x40
[   36.042299]  ? kasan_save_alloc_info+0x22/0x30
[   36.042594]  ? __kasan_kmalloc+0xb7/0xc0
[   36.042829]  kasan_bitops_generic+0xb4/0x130
[   36.043125]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   36.043468]  ? ktime_get_ts64+0x118/0x140
[   36.044220]  kunit_try_run_case+0x120/0x290
[   36.044535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.044820]  ? __kasan_check_write+0x18/0x20
[   36.045137]  ? trace_preempt_on+0x20/0xa0
[   36.045397]  ? __kthread_parkme+0x4f/0xd0
[   36.045657]  ? preempt_count_sub+0x50/0x80
[   36.045961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.046253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.046595]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.046943]  kthread+0x19e/0x1e0
[   36.047235]  ? __pfx_kthread+0x10/0x10
[   36.047897]  ret_from_fork+0x41/0x70
[   36.048147]  ? __pfx_kthread+0x10/0x10
[   36.048441]  ret_from_fork_asm+0x1b/0x30
[   36.048709]  </TASK>
[   36.048888] 
[   36.049082] Allocated by task 222:
[   36.049307]  kasan_save_stack+0x44/0x70
[   36.049576]  kasan_set_track+0x29/0x40
[   36.049825]  kasan_save_alloc_info+0x22/0x30
[   36.050110]  __kasan_kmalloc+0xb7/0xc0
[   36.050344]  kmalloc_trace+0x4c/0xb0
[   36.050576]  kasan_bitops_generic+0x8e/0x130
[   36.050914]  kunit_try_run_case+0x120/0x290
[   36.051185]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.051480]  kthread+0x19e/0x1e0
[   36.052117]  ret_from_fork+0x41/0x70
[   36.052451]  ret_from_fork_asm+0x1b/0x30
[   36.052689] 
[   36.052798] The buggy address belongs to the object at ffff8881024a3ac0
[   36.052798]  which belongs to the cache kmalloc-16 of size 16
[   36.053506] The buggy address is located 8 bytes inside of
[   36.053506]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   36.054226] 
[   36.054333] The buggy address belongs to the physical page:
[   36.054614] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   36.055233] flags: 0x200000000000800(slab|node=0|zone=2)
[   36.055602] page_type: 0xffffffff()
[   36.055921] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   36.056792] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   36.057239] page dumped because: kasan: bad access detected
[   36.057531] 
[   36.057634] Memory state around the buggy address:
[   36.058032]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   36.058404]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   36.058813] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   36.059185]                                               ^
[   36.059468]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.059984]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.061013] ==================================================================
[   36.168189] ==================================================================
[   36.168546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   36.169443] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   36.169983] 
[   36.170103] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   36.170565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   36.171048] Call Trace:
[   36.171241]  <TASK>
[   36.171415]  dump_stack_lvl+0x4e/0x90
[   36.171667]  print_report+0xd2/0x650
[   36.171950]  ? __virt_addr_valid+0x156/0x1e0
[   36.172290]  ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   36.172671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.172988]  ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   36.173578]  kasan_report+0x147/0x180
[   36.173788]  ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   36.174219]  kasan_check_range+0x10c/0x1c0
[   36.174494]  __kasan_check_write+0x18/0x20
[   36.174796]  kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   36.175174]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   36.175582]  ? kasan_set_track+0x29/0x40
[   36.175844]  ? kasan_save_alloc_info+0x22/0x30
[   36.176166]  ? __kasan_kmalloc+0xb7/0xc0
[   36.176413]  kasan_bitops_generic+0xb4/0x130
[   36.176706]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   36.177057]  ? ktime_get_ts64+0x118/0x140
[   36.177307]  kunit_try_run_case+0x120/0x290
[   36.177607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.177890]  ? __kasan_check_write+0x18/0x20
[   36.178178]  ? trace_preempt_on+0x20/0xa0
[   36.178422]  ? __kthread_parkme+0x4f/0xd0
[   36.178693]  ? preempt_count_sub+0x50/0x80
[   36.178978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.179269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.179626]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.179995]  kthread+0x19e/0x1e0
[   36.180208]  ? __pfx_kthread+0x10/0x10
[   36.180475]  ret_from_fork+0x41/0x70
[   36.180709]  ? __pfx_kthread+0x10/0x10
[   36.181025]  ret_from_fork_asm+0x1b/0x30
[   36.181274]  </TASK>
[   36.181418] 
[   36.181545] Allocated by task 222:
[   36.181779]  kasan_save_stack+0x44/0x70
[   36.182064]  kasan_set_track+0x29/0x40
[   36.182345]  kasan_save_alloc_info+0x22/0x30
[   36.182567]  __kasan_kmalloc+0xb7/0xc0
[   36.182816]  kmalloc_trace+0x4c/0xb0
[   36.183157]  kasan_bitops_generic+0x8e/0x130
[   36.183396]  kunit_try_run_case+0x120/0x290
[   36.183668]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.184029]  kthread+0x19e/0x1e0
[   36.184436]  ret_from_fork+0x41/0x70
[   36.184659]  ret_from_fork_asm+0x1b/0x30
[   36.184938] 
[   36.185063] The buggy address belongs to the object at ffff8881024a3ac0
[   36.185063]  which belongs to the cache kmalloc-16 of size 16
[   36.185677] The buggy address is located 8 bytes inside of
[   36.185677]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   36.186298] 
[   36.186437] The buggy address belongs to the physical page:
[   36.186808] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   36.187302] flags: 0x200000000000800(slab|node=0|zone=2)
[   36.187668] page_type: 0xffffffff()
[   36.187942] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   36.188365] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   36.188752] page dumped because: kasan: bad access detected
[   36.189097] 
[   36.189208] Memory state around the buggy address:
[   36.189460]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   36.189904]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   36.190340] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   36.190692]                                               ^
[   36.191092]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.191482]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.191869] ==================================================================
[   36.144325] ==================================================================
[   36.144805] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   36.145269] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   36.145742] 
[   36.145882] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   36.146384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   36.146903] Call Trace:
[   36.147083]  <TASK>
[   36.147257]  dump_stack_lvl+0x4e/0x90
[   36.147496]  print_report+0xd2/0x650
[   36.147769]  ? __virt_addr_valid+0x156/0x1e0
[   36.148052]  ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   36.148412]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.148747]  ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   36.149116]  kasan_report+0x147/0x180
[   36.149381]  ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   36.149740]  kasan_check_range+0x10c/0x1c0
[   36.150056]  __kasan_check_write+0x18/0x20
[   36.150316]  kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   36.150706]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   36.151148]  ? kasan_set_track+0x29/0x40
[   36.151392]  ? kasan_save_alloc_info+0x22/0x30
[   36.151673]  ? __kasan_kmalloc+0xb7/0xc0
[   36.151982]  kasan_bitops_generic+0xb4/0x130
[   36.152243]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   36.152553]  ? ktime_get_ts64+0x118/0x140
[   36.152885]  kunit_try_run_case+0x120/0x290
[   36.153146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.153421]  ? __kasan_check_write+0x18/0x20
[   36.153715]  ? trace_preempt_on+0x20/0xa0
[   36.153995]  ? __kthread_parkme+0x4f/0xd0
[   36.154234]  ? preempt_count_sub+0x50/0x80
[   36.154522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.154832]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.155205]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.155536]  kthread+0x19e/0x1e0
[   36.155766]  ? __pfx_kthread+0x10/0x10
[   36.156054]  ret_from_fork+0x41/0x70
[   36.156328]  ? __pfx_kthread+0x10/0x10
[   36.156572]  ret_from_fork_asm+0x1b/0x30
[   36.156837]  </TASK>
[   36.157005] 
[   36.157103] Allocated by task 222:
[   36.157328]  kasan_save_stack+0x44/0x70
[   36.157585]  kasan_set_track+0x29/0x40
[   36.157894]  kasan_save_alloc_info+0x22/0x30
[   36.158150]  __kasan_kmalloc+0xb7/0xc0
[   36.158408]  kmalloc_trace+0x4c/0xb0
[   36.158651]  kasan_bitops_generic+0x8e/0x130
[   36.158916]  kunit_try_run_case+0x120/0x290
[   36.159211]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.159483]  kthread+0x19e/0x1e0
[   36.159738]  ret_from_fork+0x41/0x70
[   36.160011]  ret_from_fork_asm+0x1b/0x30
[   36.160251] 
[   36.160351] The buggy address belongs to the object at ffff8881024a3ac0
[   36.160351]  which belongs to the cache kmalloc-16 of size 16
[   36.161011] The buggy address is located 8 bytes inside of
[   36.161011]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   36.161660] 
[   36.161799] The buggy address belongs to the physical page:
[   36.162123] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   36.162544] flags: 0x200000000000800(slab|node=0|zone=2)
[   36.162914] page_type: 0xffffffff()
[   36.163201] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   36.163587] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   36.164133] page dumped because: kasan: bad access detected
[   36.164430] 
[   36.164550] Memory state around the buggy address:
[   36.164934]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   36.165368]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   36.165749] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   36.166126]                                               ^
[   36.166412]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.166829]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.167253] ==================================================================
[   36.088568] ==================================================================
[   36.089224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   36.090003] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   36.090413] 
[   36.090582] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   36.091134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   36.091606] Call Trace:
[   36.091811]  <TASK>
[   36.092058]  dump_stack_lvl+0x4e/0x90
[   36.092365]  print_report+0xd2/0x650
[   36.092653]  ? __virt_addr_valid+0x156/0x1e0
[   36.092975]  ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   36.093375]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.093774]  ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   36.094171]  kasan_report+0x147/0x180
[   36.094454]  ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   36.094967]  kasan_check_range+0x10c/0x1c0
[   36.095258]  __kasan_check_write+0x18/0x20
[   36.095539]  kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   36.096024]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   36.096424]  ? kasan_set_track+0x29/0x40
[   36.096707]  ? kasan_save_alloc_info+0x22/0x30
[   36.097053]  ? __kasan_kmalloc+0xb7/0xc0
[   36.097332]  kasan_bitops_generic+0xb4/0x130
[   36.097601]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   36.098006]  ? ktime_get_ts64+0x118/0x140
[   36.098302]  kunit_try_run_case+0x120/0x290
[   36.098601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.099018]  ? __kasan_check_write+0x18/0x20
[   36.099286]  ? trace_preempt_on+0x20/0xa0
[   36.099562]  ? __kthread_parkme+0x4f/0xd0
[   36.099842]  ? preempt_count_sub+0x50/0x80
[   36.100128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.100459]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.100847]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.101229]  kthread+0x19e/0x1e0
[   36.101470]  ? __pfx_kthread+0x10/0x10
[   36.101778]  ret_from_fork+0x41/0x70
[   36.102035]  ? __pfx_kthread+0x10/0x10
[   36.102325]  ret_from_fork_asm+0x1b/0x30
[   36.102621]  </TASK>
[   36.102810] 
[   36.102983] Allocated by task 222:
[   36.103159]  kasan_save_stack+0x44/0x70
[   36.103451]  kasan_set_track+0x29/0x40
[   36.103736]  kasan_save_alloc_info+0x22/0x30
[   36.104089]  __kasan_kmalloc+0xb7/0xc0
[   36.105046]  kmalloc_trace+0x4c/0xb0
[   36.105542]  kasan_bitops_generic+0x8e/0x130
[   36.105809]  kunit_try_run_case+0x120/0x290
[   36.106056]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.106320]  kthread+0x19e/0x1e0
[   36.106511]  ret_from_fork+0x41/0x70
[   36.106701]  ret_from_fork_asm+0x1b/0x30
[   36.107504] 
[   36.107806] The buggy address belongs to the object at ffff8881024a3ac0
[   36.107806]  which belongs to the cache kmalloc-16 of size 16
[   36.108643] The buggy address is located 8 bytes inside of
[   36.108643]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   36.109178] 
[   36.109289] The buggy address belongs to the physical page:
[   36.109550] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   36.110339] flags: 0x200000000000800(slab|node=0|zone=2)
[   36.110950] page_type: 0xffffffff()
[   36.111352] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   36.112227] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   36.113122] page dumped because: kasan: bad access detected
[   36.113675] 
[   36.113906] Memory state around the buggy address:
[   36.114395]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   36.115167]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   36.115919] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   36.116442]                                               ^
[   36.116695]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.117041]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.117345] ==================================================================
[   36.242622] ==================================================================
[   36.243200] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   36.243921] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   36.244315] 
[   36.244468] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   36.244961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   36.245503] Call Trace:
[   36.245662]  <TASK>
[   36.245843]  dump_stack_lvl+0x4e/0x90
[   36.246107]  print_report+0xd2/0x650
[   36.246372]  ? __virt_addr_valid+0x156/0x1e0
[   36.246648]  ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   36.247066]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.247433]  ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   36.247838]  kasan_report+0x147/0x180
[   36.248062]  ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   36.248484]  kasan_check_range+0x10c/0x1c0
[   36.248795]  __kasan_check_write+0x18/0x20
[   36.249029]  kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   36.249405]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   36.249794]  ? kasan_set_track+0x29/0x40
[   36.250139]  ? kasan_save_alloc_info+0x22/0x30
[   36.250465]  ? __kasan_kmalloc+0xb7/0xc0
[   36.250739]  kasan_bitops_generic+0xb4/0x130
[   36.251032]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   36.251361]  ? ktime_get_ts64+0x118/0x140
[   36.251612]  kunit_try_run_case+0x120/0x290
[   36.251890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.252236]  ? __kasan_check_write+0x18/0x20
[   36.252488]  ? trace_preempt_on+0x20/0xa0
[   36.252786]  ? __kthread_parkme+0x4f/0xd0
[   36.253039]  ? preempt_count_sub+0x50/0x80
[   36.253323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.253615]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.253995]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.254324]  kthread+0x19e/0x1e0
[   36.254571]  ? __pfx_kthread+0x10/0x10
[   36.254869]  ret_from_fork+0x41/0x70
[   36.255065]  ? __pfx_kthread+0x10/0x10
[   36.255342]  ret_from_fork_asm+0x1b/0x30
[   36.255683]  </TASK>
[   36.255897] 
[   36.256015] Allocated by task 222:
[   36.256200]  kasan_save_stack+0x44/0x70
[   36.256483]  kasan_set_track+0x29/0x40
[   36.256701]  kasan_save_alloc_info+0x22/0x30
[   36.257003]  __kasan_kmalloc+0xb7/0xc0
[   36.257230]  kmalloc_trace+0x4c/0xb0
[   36.257463]  kasan_bitops_generic+0x8e/0x130
[   36.257685]  kunit_try_run_case+0x120/0x290
[   36.258118]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.258430]  kthread+0x19e/0x1e0
[   36.258650]  ret_from_fork+0x41/0x70
[   36.258952]  ret_from_fork_asm+0x1b/0x30
[   36.259226] 
[   36.259345] The buggy address belongs to the object at ffff8881024a3ac0
[   36.259345]  which belongs to the cache kmalloc-16 of size 16
[   36.260073] The buggy address is located 8 bytes inside of
[   36.260073]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   36.260643] 
[   36.260769] The buggy address belongs to the physical page:
[   36.261125] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   36.261640] flags: 0x200000000000800(slab|node=0|zone=2)
[   36.262040] page_type: 0xffffffff()
[   36.262246] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   36.262684] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   36.263122] page dumped because: kasan: bad access detected
[   36.263422] 
[   36.263541] Memory state around the buggy address:
[   36.263827]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   36.264211]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   36.264554] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   36.265030]                                               ^
[   36.265299]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.265715]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.266098] ==================================================================
[   36.192943] ==================================================================
[   36.193388] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   36.193980] Read of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   36.194407] 
[   36.194550] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   36.195047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   36.195534] Call Trace:
[   36.195710]  <TASK>
[   36.195896]  dump_stack_lvl+0x4e/0x90
[   36.196181]  print_report+0xd2/0x650
[   36.196415]  ? __virt_addr_valid+0x156/0x1e0
[   36.196670]  ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   36.197065]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.197427]  ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   36.197796]  kasan_report+0x147/0x180
[   36.198073]  ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   36.198441]  kasan_check_range+0x10c/0x1c0
[   36.198699]  __kasan_check_read+0x15/0x20
[   36.199733]  kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   36.200242]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   36.200645]  ? kasan_set_track+0x29/0x40
[   36.200959]  ? kasan_save_alloc_info+0x22/0x30
[   36.201238]  ? __kasan_kmalloc+0xb7/0xc0
[   36.201472]  kasan_bitops_generic+0xb4/0x130
[   36.201758]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   36.202147]  ? ktime_get_ts64+0x118/0x140
[   36.202418]  kunit_try_run_case+0x120/0x290
[   36.202689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.203016]  ? __kasan_check_write+0x18/0x20
[   36.203278]  ? trace_preempt_on+0x20/0xa0
[   36.203545]  ? __kthread_parkme+0x4f/0xd0
[   36.203882]  ? preempt_count_sub+0x50/0x80
[   36.204202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.204493]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.204842]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.205150]  kthread+0x19e/0x1e0
[   36.205394]  ? __pfx_kthread+0x10/0x10
[   36.205650]  ret_from_fork+0x41/0x70
[   36.205940]  ? __pfx_kthread+0x10/0x10
[   36.206267]  ret_from_fork_asm+0x1b/0x30
[   36.206567]  </TASK>
[   36.206712] 
[   36.206849] Allocated by task 222:
[   36.207054]  kasan_save_stack+0x44/0x70
[   36.207298]  kasan_set_track+0x29/0x40
[   36.207543]  kasan_save_alloc_info+0x22/0x30
[   36.207870]  __kasan_kmalloc+0xb7/0xc0
[   36.208109]  kmalloc_trace+0x4c/0xb0
[   36.208364]  kasan_bitops_generic+0x8e/0x130
[   36.208662]  kunit_try_run_case+0x120/0x290
[   36.209594]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.209968]  kthread+0x19e/0x1e0
[   36.210212]  ret_from_fork+0x41/0x70
[   36.210430]  ret_from_fork_asm+0x1b/0x30
[   36.210669] 
[   36.210804] The buggy address belongs to the object at ffff8881024a3ac0
[   36.210804]  which belongs to the cache kmalloc-16 of size 16
[   36.211637] The buggy address is located 8 bytes inside of
[   36.211637]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   36.212304] 
[   36.212436] The buggy address belongs to the physical page:
[   36.212730] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   36.213230] flags: 0x200000000000800(slab|node=0|zone=2)
[   36.213532] page_type: 0xffffffff()
[   36.213748] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   36.214243] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   36.214628] page dumped because: kasan: bad access detected
[   36.214938] 
[   36.215055] Memory state around the buggy address:
[   36.215304]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   36.215702]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   36.216142] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   36.216532]                                               ^
[   36.216879]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.217258]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.217641] ==================================================================
[   36.218454] ==================================================================
[   36.218941] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   36.219412] Read of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   36.219926] 
[   36.220048] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   36.220596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   36.221076] Call Trace:
[   36.221282]  <TASK>
[   36.221424]  dump_stack_lvl+0x4e/0x90
[   36.221706]  print_report+0xd2/0x650
[   36.221980]  ? __virt_addr_valid+0x156/0x1e0
[   36.222256]  ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   36.222584]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.223098]  ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   36.223434]  kasan_report+0x147/0x180
[   36.223699]  ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   36.224134]  __asan_load8+0x82/0xb0
[   36.224385]  kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   36.224753]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   36.225184]  ? kasan_set_track+0x29/0x40
[   36.225418]  ? kasan_save_alloc_info+0x22/0x30
[   36.225704]  ? __kasan_kmalloc+0xb7/0xc0
[   36.226023]  kasan_bitops_generic+0xb4/0x130
[   36.226339]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   36.226611]  ? ktime_get_ts64+0x118/0x140
[   36.226984]  kunit_try_run_case+0x120/0x290
[   36.227227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.227555]  ? __kasan_check_write+0x18/0x20
[   36.227828]  ? trace_preempt_on+0x20/0xa0
[   36.228133]  ? __kthread_parkme+0x4f/0xd0
[   36.228406]  ? preempt_count_sub+0x50/0x80
[   36.228723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.229038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.229421]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.229816]  kthread+0x19e/0x1e0
[   36.230047]  ? __pfx_kthread+0x10/0x10
[   36.230319]  ret_from_fork+0x41/0x70
[   36.230555]  ? __pfx_kthread+0x10/0x10
[   36.230829]  ret_from_fork_asm+0x1b/0x30
[   36.231147]  </TASK>
[   36.231304] 
[   36.231415] Allocated by task 222:
[   36.231605]  kasan_save_stack+0x44/0x70
[   36.231893]  kasan_set_track+0x29/0x40
[   36.232133]  kasan_save_alloc_info+0x22/0x30
[   36.232427]  __kasan_kmalloc+0xb7/0xc0
[   36.232652]  kmalloc_trace+0x4c/0xb0
[   36.232928]  kasan_bitops_generic+0x8e/0x130
[   36.233207]  kunit_try_run_case+0x120/0x290
[   36.233444]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.233925]  kthread+0x19e/0x1e0
[   36.234126]  ret_from_fork+0x41/0x70
[   36.234312]  ret_from_fork_asm+0x1b/0x30
[   36.234576] 
[   36.234704] The buggy address belongs to the object at ffff8881024a3ac0
[   36.234704]  which belongs to the cache kmalloc-16 of size 16
[   36.235404] The buggy address is located 8 bytes inside of
[   36.235404]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   36.236115] 
[   36.236240] The buggy address belongs to the physical page:
[   36.236546] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   36.237087] flags: 0x200000000000800(slab|node=0|zone=2)
[   36.237422] page_type: 0xffffffff()
[   36.237658] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   36.238009] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   36.238517] page dumped because: kasan: bad access detected
[   36.238962] 
[   36.239063] Memory state around the buggy address:
[   36.239283]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   36.239698]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   36.240113] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   36.240462]                                               ^
[   36.240842]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.241169]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.241630] ==================================================================
[   36.005925] ==================================================================
[   36.006310] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   36.007582] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   36.008298] 
[   36.008445] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   36.008953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   36.009442] Call Trace:
[   36.009628]  <TASK>
[   36.009821]  dump_stack_lvl+0x4e/0x90
[   36.010166]  print_report+0xd2/0x650
[   36.010888]  ? __virt_addr_valid+0x156/0x1e0
[   36.011195]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   36.011657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.012035]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   36.012432]  kasan_report+0x147/0x180
[   36.012671]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   36.013086]  kasan_check_range+0x10c/0x1c0
[   36.013354]  __kasan_check_write+0x18/0x20
[   36.013598]  kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   36.014020]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   36.014870]  ? kasan_set_track+0x29/0x40
[   36.015136]  ? kasan_save_alloc_info+0x22/0x30
[   36.015413]  ? __kasan_kmalloc+0xb7/0xc0
[   36.015685]  kasan_bitops_generic+0xb4/0x130
[   36.015993]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   36.016297]  ? ktime_get_ts64+0x118/0x140
[   36.016561]  kunit_try_run_case+0x120/0x290
[   36.016855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.017205]  ? __kasan_check_write+0x18/0x20
[   36.017479]  ? trace_preempt_on+0x20/0xa0
[   36.017716]  ? __kthread_parkme+0x4f/0xd0
[   36.018024]  ? preempt_count_sub+0x50/0x80
[   36.018295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.019024]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.019459]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.019819]  kthread+0x19e/0x1e0
[   36.020094]  ? __pfx_kthread+0x10/0x10
[   36.020387]  ret_from_fork+0x41/0x70
[   36.020629]  ? __pfx_kthread+0x10/0x10
[   36.020934]  ret_from_fork_asm+0x1b/0x30
[   36.021192]  </TASK>
[   36.021355] 
[   36.021481] Allocated by task 222:
[   36.021682]  kasan_save_stack+0x44/0x70
[   36.021913]  kasan_set_track+0x29/0x40
[   36.022195]  kasan_save_alloc_info+0x22/0x30
[   36.022879]  __kasan_kmalloc+0xb7/0xc0
[   36.023129]  kmalloc_trace+0x4c/0xb0
[   36.023381]  kasan_bitops_generic+0x8e/0x130
[   36.023679]  kunit_try_run_case+0x120/0x290
[   36.023942]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.024286]  kthread+0x19e/0x1e0
[   36.024497]  ret_from_fork+0x41/0x70
[   36.024724]  ret_from_fork_asm+0x1b/0x30
[   36.025006] 
[   36.025130] The buggy address belongs to the object at ffff8881024a3ac0
[   36.025130]  which belongs to the cache kmalloc-16 of size 16
[   36.025756] The buggy address is located 8 bytes inside of
[   36.025756]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   36.026836] 
[   36.027014] The buggy address belongs to the physical page:
[   36.027328] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   36.027897] flags: 0x200000000000800(slab|node=0|zone=2)
[   36.028222] page_type: 0xffffffff()
[   36.028446] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   36.028912] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   36.029338] page dumped because: kasan: bad access detected
[   36.029636] 
[   36.029764] Memory state around the buggy address:
[   36.030008]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   36.030915]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   36.031315] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   36.031735]                                               ^
[   36.032054]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.032432]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.032809] ==================================================================
[   36.061652] ==================================================================
[   36.062040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   36.062632] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   36.063202] 
[   36.063371] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   36.063779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   36.064309] Call Trace:
[   36.064491]  <TASK>
[   36.064663]  dump_stack_lvl+0x4e/0x90
[   36.064962]  print_report+0xd2/0x650
[   36.065201]  ? __virt_addr_valid+0x156/0x1e0
[   36.065519]  ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   36.065929]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.066841]  ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   36.067269]  kasan_report+0x147/0x180
[   36.067530]  ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   36.068020]  kasan_check_range+0x10c/0x1c0
[   36.068315]  __kasan_check_write+0x18/0x20
[   36.068585]  kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   36.068993]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   36.069814]  ? kasan_set_track+0x29/0x40
[   36.070080]  ? kasan_save_alloc_info+0x22/0x30
[   36.070388]  ? __kasan_kmalloc+0xb7/0xc0
[   36.070649]  kasan_bitops_generic+0xb4/0x130
[   36.070984]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   36.071329]  ? ktime_get_ts64+0x118/0x140
[   36.071582]  kunit_try_run_case+0x120/0x290
[   36.071908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.072202]  ? __kasan_check_write+0x18/0x20
[   36.072484]  ? trace_preempt_on+0x20/0xa0
[   36.072760]  ? __kthread_parkme+0x4f/0xd0
[   36.073061]  ? preempt_count_sub+0x50/0x80
[   36.073292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.073988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.074333]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.074663]  kthread+0x19e/0x1e0
[   36.074939]  ? __pfx_kthread+0x10/0x10
[   36.075190]  ret_from_fork+0x41/0x70
[   36.075407]  ? __pfx_kthread+0x10/0x10
[   36.075684]  ret_from_fork_asm+0x1b/0x30
[   36.075976]  </TASK>
[   36.076133] 
[   36.076249] Allocated by task 222:
[   36.076419]  kasan_save_stack+0x44/0x70
[   36.076688]  kasan_set_track+0x29/0x40
[   36.076935]  kasan_save_alloc_info+0x22/0x30
[   36.077229]  __kasan_kmalloc+0xb7/0xc0
[   36.077902]  kmalloc_trace+0x4c/0xb0
[   36.078162]  kasan_bitops_generic+0x8e/0x130
[   36.078540]  kunit_try_run_case+0x120/0x290
[   36.078889]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.079204]  kthread+0x19e/0x1e0
[   36.079438]  ret_from_fork+0x41/0x70
[   36.079627]  ret_from_fork_asm+0x1b/0x30
[   36.079905] 
[   36.080018] The buggy address belongs to the object at ffff8881024a3ac0
[   36.080018]  which belongs to the cache kmalloc-16 of size 16
[   36.080641] The buggy address is located 8 bytes inside of
[   36.080641]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   36.081283] 
[   36.081933] The buggy address belongs to the physical page:
[   36.082255] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   36.082779] flags: 0x200000000000800(slab|node=0|zone=2)
[   36.083128] page_type: 0xffffffff()
[   36.083364] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   36.083771] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   36.084241] page dumped because: kasan: bad access detected
[   36.084526] 
[   36.084646] Memory state around the buggy address:
[   36.084918]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   36.085316]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   36.086104] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   36.086491]                                               ^
[   36.086854]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.087305]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.087702] ==================================================================
[   36.118228] ==================================================================
[   36.118621] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   36.119461] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222
[   36.119937] 
[   36.120085] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   36.120567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   36.121102] Call Trace:
[   36.121265]  <TASK>
[   36.121429]  dump_stack_lvl+0x4e/0x90
[   36.121723]  print_report+0xd2/0x650
[   36.121965]  ? __virt_addr_valid+0x156/0x1e0
[   36.122291]  ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   36.122666]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.123021]  ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   36.123444]  kasan_report+0x147/0x180
[   36.123695]  ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   36.124110]  kasan_check_range+0x10c/0x1c0
[   36.124408]  __kasan_check_write+0x18/0x20
[   36.124695]  kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   36.125067]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   36.125481]  ? kasan_set_track+0x29/0x40
[   36.125727]  ? kasan_save_alloc_info+0x22/0x30
[   36.126029]  ? __kasan_kmalloc+0xb7/0xc0
[   36.126255]  kasan_bitops_generic+0xb4/0x130
[   36.126559]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   36.126915]  ? ktime_get_ts64+0x118/0x140
[   36.127184]  kunit_try_run_case+0x120/0x290
[   36.127446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.127744]  ? __kasan_check_write+0x18/0x20
[   36.128148]  ? trace_preempt_on+0x20/0xa0
[   36.128415]  ? __kthread_parkme+0x4f/0xd0
[   36.128764]  ? preempt_count_sub+0x50/0x80
[   36.129205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.129520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.129893]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.130219]  kthread+0x19e/0x1e0
[   36.130439]  ? __pfx_kthread+0x10/0x10
[   36.130677]  ret_from_fork+0x41/0x70
[   36.130927]  ? __pfx_kthread+0x10/0x10
[   36.131227]  ret_from_fork_asm+0x1b/0x30
[   36.131497]  </TASK>
[   36.131668] 
[   36.131813] Allocated by task 222:
[   36.131998]  kasan_save_stack+0x44/0x70
[   36.132305]  kasan_set_track+0x29/0x40
[   36.132590]  kasan_save_alloc_info+0x22/0x30
[   36.132916]  __kasan_kmalloc+0xb7/0xc0
[   36.133174]  kmalloc_trace+0x4c/0xb0
[   36.133450]  kasan_bitops_generic+0x8e/0x130
[   36.133702]  kunit_try_run_case+0x120/0x290
[   36.133973]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   36.134307]  kthread+0x19e/0x1e0
[   36.134558]  ret_from_fork+0x41/0x70
[   36.134751]  ret_from_fork_asm+0x1b/0x30
[   36.135019] 
[   36.135230] The buggy address belongs to the object at ffff8881024a3ac0
[   36.135230]  which belongs to the cache kmalloc-16 of size 16
[   36.135940] The buggy address is located 8 bytes inside of
[   36.135940]  allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9)
[   36.136586] 
[   36.136728] The buggy address belongs to the physical page:
[   36.137070] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3
[   36.137531] flags: 0x200000000000800(slab|node=0|zone=2)
[   36.138286] page_type: 0xffffffff()
[   36.138545] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   36.139088] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   36.139604] page dumped because: kasan: bad access detected
[   36.140009] 
[   36.140234] Memory state around the buggy address:
[   36.140605]  ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   36.141137]  ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   36.141635] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   36.142150]                                               ^
[   36.142584]  ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.143079]  ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.143383] ==================================================================