Hay
Date
May 23, 2025, 11:07 p.m.

Environment
qemu-x86_64

[   14.903866] ==================================================================
[   14.904206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.904634] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.905072] 
[   14.905184] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.905228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.905239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.905259] Call Trace:
[   14.905272]  <TASK>
[   14.905285]  dump_stack_lvl+0x73/0xb0
[   14.905323]  print_report+0xd1/0x650
[   14.905346]  ? __virt_addr_valid+0x1db/0x2d0
[   14.905366]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.905389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.905411]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.905435]  kasan_report+0x141/0x180
[   14.905458]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.905486]  kasan_check_range+0x10c/0x1c0
[   14.905506]  __kasan_check_write+0x18/0x20
[   14.905526]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.905549]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.905574]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.905593]  ? trace_hardirqs_on+0x37/0xe0
[   14.905614]  ? kasan_bitops_generic+0x92/0x1c0
[   14.905638]  kasan_bitops_generic+0x121/0x1c0
[   14.905658]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.905679]  ? __pfx_read_tsc+0x10/0x10
[   14.905698]  ? ktime_get_ts64+0x86/0x230
[   14.905735]  kunit_try_run_case+0x1a5/0x480
[   14.905758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.905780]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.905802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.905824]  ? __kthread_parkme+0x82/0x180
[   14.905845]  ? preempt_count_sub+0x50/0x80
[   14.905870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.905893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.905916]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.905939]  kthread+0x337/0x6f0
[   14.905956]  ? trace_preempt_on+0x20/0xc0
[   14.905978]  ? __pfx_kthread+0x10/0x10
[   14.905997]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.906017]  ? calculate_sigpending+0x7b/0xa0
[   14.906038]  ? __pfx_kthread+0x10/0x10
[   14.906057]  ret_from_fork+0x41/0x80
[   14.906077]  ? __pfx_kthread+0x10/0x10
[   14.906095]  ret_from_fork_asm+0x1a/0x30
[   14.906126]  </TASK>
[   14.906136] 
[   14.914819] Allocated by task 280:
[   14.915256]  kasan_save_stack+0x45/0x70
[   14.915513]  kasan_save_track+0x18/0x40
[   14.915656]  kasan_save_alloc_info+0x3b/0x50
[   14.915805]  __kasan_kmalloc+0xb7/0xc0
[   14.915974]  __kmalloc_cache_noprof+0x189/0x420
[   14.916265]  kasan_bitops_generic+0x92/0x1c0
[   14.916548]  kunit_try_run_case+0x1a5/0x480
[   14.916703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.916879]  kthread+0x337/0x6f0
[   14.917012]  ret_from_fork+0x41/0x80
[   14.917208]  ret_from_fork_asm+0x1a/0x30
[   14.917424] 
[   14.917579] The buggy address belongs to the object at ffff8881029e3080
[   14.917579]  which belongs to the cache kmalloc-16 of size 16
[   14.918399] The buggy address is located 8 bytes inside of
[   14.918399]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.918781] 
[   14.918856] The buggy address belongs to the physical page:
[   14.919107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.919602] flags: 0x200000000000000(node=0|zone=2)
[   14.920100] page_type: f5(slab)
[   14.920274] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.920640] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.921004] page dumped because: kasan: bad access detected
[   14.921191] 
[   14.921265] Memory state around the buggy address:
[   14.921435]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.921759]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.922311] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.922600]                       ^
[   14.922733]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.922950]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.923163] ==================================================================
[   14.798517] ==================================================================
[   14.798832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.799559] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.799790] 
[   14.799878] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.799923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.799935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.799956] Call Trace:
[   14.799971]  <TASK>
[   14.800061]  dump_stack_lvl+0x73/0xb0
[   14.800119]  print_report+0xd1/0x650
[   14.800142]  ? __virt_addr_valid+0x1db/0x2d0
[   14.800163]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.800186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.800209]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.800233]  kasan_report+0x141/0x180
[   14.800256]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.800284]  kasan_check_range+0x10c/0x1c0
[   14.800316]  __kasan_check_write+0x18/0x20
[   14.800336]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.800378]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.800402]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.800423]  ? trace_hardirqs_on+0x37/0xe0
[   14.800445]  ? kasan_bitops_generic+0x92/0x1c0
[   14.800469]  kasan_bitops_generic+0x121/0x1c0
[   14.800490]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.800511]  ? __pfx_read_tsc+0x10/0x10
[   14.800532]  ? ktime_get_ts64+0x86/0x230
[   14.800557]  kunit_try_run_case+0x1a5/0x480
[   14.800579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.800601]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.800624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.800646]  ? __kthread_parkme+0x82/0x180
[   14.800668]  ? preempt_count_sub+0x50/0x80
[   14.800693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.800716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.800739]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.800761]  kthread+0x337/0x6f0
[   14.800778]  ? trace_preempt_on+0x20/0xc0
[   14.800800]  ? __pfx_kthread+0x10/0x10
[   14.800818]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.800839]  ? calculate_sigpending+0x7b/0xa0
[   14.800859]  ? __pfx_kthread+0x10/0x10
[   14.800878]  ret_from_fork+0x41/0x80
[   14.800898]  ? __pfx_kthread+0x10/0x10
[   14.800916]  ret_from_fork_asm+0x1a/0x30
[   14.800947]  </TASK>
[   14.800957] 
[   14.811079] Allocated by task 280:
[   14.811321]  kasan_save_stack+0x45/0x70
[   14.811542]  kasan_save_track+0x18/0x40
[   14.811740]  kasan_save_alloc_info+0x3b/0x50
[   14.812008]  __kasan_kmalloc+0xb7/0xc0
[   14.812216]  __kmalloc_cache_noprof+0x189/0x420
[   14.812470]  kasan_bitops_generic+0x92/0x1c0
[   14.812709]  kunit_try_run_case+0x1a5/0x480
[   14.812913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.813173]  kthread+0x337/0x6f0
[   14.813449]  ret_from_fork+0x41/0x80
[   14.813630]  ret_from_fork_asm+0x1a/0x30
[   14.813772] 
[   14.813847] The buggy address belongs to the object at ffff8881029e3080
[   14.813847]  which belongs to the cache kmalloc-16 of size 16
[   14.814404] The buggy address is located 8 bytes inside of
[   14.814404]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.815016] 
[   14.815237] The buggy address belongs to the physical page:
[   14.815560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.816043] flags: 0x200000000000000(node=0|zone=2)
[   14.816247] page_type: f5(slab)
[   14.816385] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.817033] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.817375] page dumped because: kasan: bad access detected
[   14.817669] 
[   14.817770] Memory state around the buggy address:
[   14.818234]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.818807]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.819131] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.819383]                       ^
[   14.819546]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.819869]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.820175] ==================================================================
[   14.820556] ==================================================================
[   14.820980] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.821312] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.821539] 
[   14.821647] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.821690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.821702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.821745] Call Trace:
[   14.821758]  <TASK>
[   14.821773]  dump_stack_lvl+0x73/0xb0
[   14.821798]  print_report+0xd1/0x650
[   14.821837]  ? __virt_addr_valid+0x1db/0x2d0
[   14.821866]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.822071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.822100]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.822124]  kasan_report+0x141/0x180
[   14.822147]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.822175]  kasan_check_range+0x10c/0x1c0
[   14.822196]  __kasan_check_write+0x18/0x20
[   14.822215]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.822239]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.822264]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.822284]  ? trace_hardirqs_on+0x37/0xe0
[   14.822319]  ? kasan_bitops_generic+0x92/0x1c0
[   14.822343]  kasan_bitops_generic+0x121/0x1c0
[   14.822363]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.822384]  ? __pfx_read_tsc+0x10/0x10
[   14.822424]  ? ktime_get_ts64+0x86/0x230
[   14.822457]  kunit_try_run_case+0x1a5/0x480
[   14.822482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.822524]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.822547]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.822569]  ? __kthread_parkme+0x82/0x180
[   14.822590]  ? preempt_count_sub+0x50/0x80
[   14.822615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.822638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.822661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.822690]  kthread+0x337/0x6f0
[   14.822707]  ? trace_preempt_on+0x20/0xc0
[   14.822746]  ? __pfx_kthread+0x10/0x10
[   14.822778]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.822799]  ? calculate_sigpending+0x7b/0xa0
[   14.822820]  ? __pfx_kthread+0x10/0x10
[   14.822839]  ret_from_fork+0x41/0x80
[   14.822860]  ? __pfx_kthread+0x10/0x10
[   14.822882]  ret_from_fork_asm+0x1a/0x30
[   14.822969]  </TASK>
[   14.822980] 
[   14.832933] Allocated by task 280:
[   14.833339]  kasan_save_stack+0x45/0x70
[   14.833516]  kasan_save_track+0x18/0x40
[   14.833736]  kasan_save_alloc_info+0x3b/0x50
[   14.833956]  __kasan_kmalloc+0xb7/0xc0
[   14.834249]  __kmalloc_cache_noprof+0x189/0x420
[   14.834657]  kasan_bitops_generic+0x92/0x1c0
[   14.834934]  kunit_try_run_case+0x1a5/0x480
[   14.835158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.835430]  kthread+0x337/0x6f0
[   14.835599]  ret_from_fork+0x41/0x80
[   14.835755]  ret_from_fork_asm+0x1a/0x30
[   14.836041] 
[   14.836167] The buggy address belongs to the object at ffff8881029e3080
[   14.836167]  which belongs to the cache kmalloc-16 of size 16
[   14.836741] The buggy address is located 8 bytes inside of
[   14.836741]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.837517] 
[   14.837685] The buggy address belongs to the physical page:
[   14.838085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.838462] flags: 0x200000000000000(node=0|zone=2)
[   14.838717] page_type: f5(slab)
[   14.838888] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.839228] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.839680] page dumped because: kasan: bad access detected
[   14.839922] 
[   14.840143] Memory state around the buggy address:
[   14.840377]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.840709]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.840934] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.841487]                       ^
[   14.841712]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.842218]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.842693] ==================================================================
[   14.843258] ==================================================================
[   14.843760] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.844197] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.844753] 
[   14.844892] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.844938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.844949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.844970] Call Trace:
[   14.844984]  <TASK>
[   14.844998]  dump_stack_lvl+0x73/0xb0
[   14.845086]  print_report+0xd1/0x650
[   14.845109]  ? __virt_addr_valid+0x1db/0x2d0
[   14.845131]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.845153]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.845175]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.845220]  kasan_report+0x141/0x180
[   14.845242]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.845270]  kasan_check_range+0x10c/0x1c0
[   14.845291]  __kasan_check_write+0x18/0x20
[   14.845323]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.845347]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.845373]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.845396]  ? trace_hardirqs_on+0x37/0xe0
[   14.845436]  ? kasan_bitops_generic+0x92/0x1c0
[   14.845475]  kasan_bitops_generic+0x121/0x1c0
[   14.845512]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.845548]  ? __pfx_read_tsc+0x10/0x10
[   14.845567]  ? ktime_get_ts64+0x86/0x230
[   14.845593]  kunit_try_run_case+0x1a5/0x480
[   14.845619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.845641]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.845664]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.845686]  ? __kthread_parkme+0x82/0x180
[   14.845709]  ? preempt_count_sub+0x50/0x80
[   14.845734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.845756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.845779]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.845801]  kthread+0x337/0x6f0
[   14.845818]  ? trace_preempt_on+0x20/0xc0
[   14.845841]  ? __pfx_kthread+0x10/0x10
[   14.845858]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.846160]  ? calculate_sigpending+0x7b/0xa0
[   14.846195]  ? __pfx_kthread+0x10/0x10
[   14.846215]  ret_from_fork+0x41/0x80
[   14.846237]  ? __pfx_kthread+0x10/0x10
[   14.846254]  ret_from_fork_asm+0x1a/0x30
[   14.846286]  </TASK>
[   14.846316] 
[   14.854986] Allocated by task 280:
[   14.855173]  kasan_save_stack+0x45/0x70
[   14.855389]  kasan_save_track+0x18/0x40
[   14.855626]  kasan_save_alloc_info+0x3b/0x50
[   14.855775]  __kasan_kmalloc+0xb7/0xc0
[   14.855929]  __kmalloc_cache_noprof+0x189/0x420
[   14.856155]  kasan_bitops_generic+0x92/0x1c0
[   14.856372]  kunit_try_run_case+0x1a5/0x480
[   14.856725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.856946]  kthread+0x337/0x6f0
[   14.857117]  ret_from_fork+0x41/0x80
[   14.857271]  ret_from_fork_asm+0x1a/0x30
[   14.857615] 
[   14.857732] The buggy address belongs to the object at ffff8881029e3080
[   14.857732]  which belongs to the cache kmalloc-16 of size 16
[   14.858412] The buggy address is located 8 bytes inside of
[   14.858412]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.858780] 
[   14.858855] The buggy address belongs to the physical page:
[   14.859088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.859455] flags: 0x200000000000000(node=0|zone=2)
[   14.860031] page_type: f5(slab)
[   14.860161] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.860408] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.861133] page dumped because: kasan: bad access detected
[   14.861451] 
[   14.861544] Memory state around the buggy address:
[   14.861753]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.862292]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.862537] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.862861]                       ^
[   14.863046]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.863391]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.864000] ==================================================================
[   14.864437] ==================================================================
[   14.864736] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.865137] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.865378] 
[   14.865469] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.865514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.865530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.865551] Call Trace:
[   14.865571]  <TASK>
[   14.865585]  dump_stack_lvl+0x73/0xb0
[   14.865612]  print_report+0xd1/0x650
[   14.865636]  ? __virt_addr_valid+0x1db/0x2d0
[   14.865658]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.865682]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.865704]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.865728]  kasan_report+0x141/0x180
[   14.865751]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.865790]  kasan_check_range+0x10c/0x1c0
[   14.865814]  __kasan_check_write+0x18/0x20
[   14.865834]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.865859]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.866088]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.866122]  ? trace_hardirqs_on+0x37/0xe0
[   14.866145]  ? kasan_bitops_generic+0x92/0x1c0
[   14.866169]  kasan_bitops_generic+0x121/0x1c0
[   14.866190]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.866211]  ? __pfx_read_tsc+0x10/0x10
[   14.866231]  ? ktime_get_ts64+0x86/0x230
[   14.866256]  kunit_try_run_case+0x1a5/0x480
[   14.866279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.866316]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.866339]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.866362]  ? __kthread_parkme+0x82/0x180
[   14.866383]  ? preempt_count_sub+0x50/0x80
[   14.866408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.866431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.866465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.866487]  kthread+0x337/0x6f0
[   14.866505]  ? trace_preempt_on+0x20/0xc0
[   14.866528]  ? __pfx_kthread+0x10/0x10
[   14.866546]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.866567]  ? calculate_sigpending+0x7b/0xa0
[   14.866588]  ? __pfx_kthread+0x10/0x10
[   14.866607]  ret_from_fork+0x41/0x80
[   14.866627]  ? __pfx_kthread+0x10/0x10
[   14.866645]  ret_from_fork_asm+0x1a/0x30
[   14.866682]  </TASK>
[   14.866692] 
[   14.875874] Allocated by task 280:
[   14.876063]  kasan_save_stack+0x45/0x70
[   14.876267]  kasan_save_track+0x18/0x40
[   14.876475]  kasan_save_alloc_info+0x3b/0x50
[   14.876722]  __kasan_kmalloc+0xb7/0xc0
[   14.876862]  __kmalloc_cache_noprof+0x189/0x420
[   14.877036]  kasan_bitops_generic+0x92/0x1c0
[   14.877293]  kunit_try_run_case+0x1a5/0x480
[   14.877520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.877781]  kthread+0x337/0x6f0
[   14.877927]  ret_from_fork+0x41/0x80
[   14.878059]  ret_from_fork_asm+0x1a/0x30
[   14.878198] 
[   14.878271] The buggy address belongs to the object at ffff8881029e3080
[   14.878271]  which belongs to the cache kmalloc-16 of size 16
[   14.878998] The buggy address is located 8 bytes inside of
[   14.878998]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.879890] 
[   14.879997] The buggy address belongs to the physical page:
[   14.880211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.880615] flags: 0x200000000000000(node=0|zone=2)
[   14.880846] page_type: f5(slab)
[   14.880982] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.881252] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.881492] page dumped because: kasan: bad access detected
[   14.881725] 
[   14.881822] Memory state around the buggy address:
[   14.882051]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.882388]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.882717] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.883204]                       ^
[   14.883390]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.883669]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.883988] ==================================================================
[   14.945995] ==================================================================
[   14.946278] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.946762] Read of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.947137] 
[   14.947256] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.947315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.947328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.947348] Call Trace:
[   14.947364]  <TASK>
[   14.947379]  dump_stack_lvl+0x73/0xb0
[   14.947406]  print_report+0xd1/0x650
[   14.947428]  ? __virt_addr_valid+0x1db/0x2d0
[   14.947448]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.947475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.947498]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.947521]  kasan_report+0x141/0x180
[   14.947544]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.947572]  __asan_report_load8_noabort+0x18/0x20
[   14.947593]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.947617]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.947644]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.947665]  ? trace_hardirqs_on+0x37/0xe0
[   14.947687]  ? kasan_bitops_generic+0x92/0x1c0
[   14.947711]  kasan_bitops_generic+0x121/0x1c0
[   14.947730]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.947752]  ? __pfx_read_tsc+0x10/0x10
[   14.947771]  ? ktime_get_ts64+0x86/0x230
[   14.947797]  kunit_try_run_case+0x1a5/0x480
[   14.947821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.947842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.947864]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.947887]  ? __kthread_parkme+0x82/0x180
[   14.947909]  ? preempt_count_sub+0x50/0x80
[   14.947934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.947957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.947981]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.948003]  kthread+0x337/0x6f0
[   14.948021]  ? trace_preempt_on+0x20/0xc0
[   14.948044]  ? __pfx_kthread+0x10/0x10
[   14.948062]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.948082]  ? calculate_sigpending+0x7b/0xa0
[   14.948104]  ? __pfx_kthread+0x10/0x10
[   14.948123]  ret_from_fork+0x41/0x80
[   14.948144]  ? __pfx_kthread+0x10/0x10
[   14.948162]  ret_from_fork_asm+0x1a/0x30
[   14.948192]  </TASK>
[   14.948203] 
[   14.957860] Allocated by task 280:
[   14.958055]  kasan_save_stack+0x45/0x70
[   14.958258]  kasan_save_track+0x18/0x40
[   14.958466]  kasan_save_alloc_info+0x3b/0x50
[   14.958731]  __kasan_kmalloc+0xb7/0xc0
[   14.958979]  __kmalloc_cache_noprof+0x189/0x420
[   14.959158]  kasan_bitops_generic+0x92/0x1c0
[   14.959385]  kunit_try_run_case+0x1a5/0x480
[   14.959562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.959812]  kthread+0x337/0x6f0
[   14.959959]  ret_from_fork+0x41/0x80
[   14.960149]  ret_from_fork_asm+0x1a/0x30
[   14.960375] 
[   14.960451] The buggy address belongs to the object at ffff8881029e3080
[   14.960451]  which belongs to the cache kmalloc-16 of size 16
[   14.960826] The buggy address is located 8 bytes inside of
[   14.960826]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.961257] 
[   14.961341] The buggy address belongs to the physical page:
[   14.961514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.961754] flags: 0x200000000000000(node=0|zone=2)
[   14.961917] page_type: f5(slab)
[   14.962040] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.962273] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.962507] page dumped because: kasan: bad access detected
[   14.962720] 
[   14.962815] Memory state around the buggy address:
[   14.963390]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.963743]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.964110] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.964426]                       ^
[   14.964671]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.965068]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.965345] ==================================================================
[   14.884397] ==================================================================
[   14.884630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.885475] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.885779] 
[   14.885882] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.885928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.885940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.885960] Call Trace:
[   14.885973]  <TASK>
[   14.885987]  dump_stack_lvl+0x73/0xb0
[   14.886016]  print_report+0xd1/0x650
[   14.886038]  ? __virt_addr_valid+0x1db/0x2d0
[   14.886059]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.886082]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.886105]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.886128]  kasan_report+0x141/0x180
[   14.886150]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.886178]  kasan_check_range+0x10c/0x1c0
[   14.886198]  __kasan_check_write+0x18/0x20
[   14.886218]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.886242]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.886322]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.886347]  ? trace_hardirqs_on+0x37/0xe0
[   14.886369]  ? kasan_bitops_generic+0x92/0x1c0
[   14.886393]  kasan_bitops_generic+0x121/0x1c0
[   14.886413]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.886435]  ? __pfx_read_tsc+0x10/0x10
[   14.886454]  ? ktime_get_ts64+0x86/0x230
[   14.886478]  kunit_try_run_case+0x1a5/0x480
[   14.886501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.886523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.886546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.886569]  ? __kthread_parkme+0x82/0x180
[   14.886590]  ? preempt_count_sub+0x50/0x80
[   14.886615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.886638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.886660]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.886689]  kthread+0x337/0x6f0
[   14.886705]  ? trace_preempt_on+0x20/0xc0
[   14.886728]  ? __pfx_kthread+0x10/0x10
[   14.886745]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.886766]  ? calculate_sigpending+0x7b/0xa0
[   14.886788]  ? __pfx_kthread+0x10/0x10
[   14.886806]  ret_from_fork+0x41/0x80
[   14.886827]  ? __pfx_kthread+0x10/0x10
[   14.886845]  ret_from_fork_asm+0x1a/0x30
[   14.886876]  </TASK>
[   14.887033] 
[   14.895086] Allocated by task 280:
[   14.895266]  kasan_save_stack+0x45/0x70
[   14.895456]  kasan_save_track+0x18/0x40
[   14.895597]  kasan_save_alloc_info+0x3b/0x50
[   14.895815]  __kasan_kmalloc+0xb7/0xc0
[   14.896005]  __kmalloc_cache_noprof+0x189/0x420
[   14.896222]  kasan_bitops_generic+0x92/0x1c0
[   14.896382]  kunit_try_run_case+0x1a5/0x480
[   14.896627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.896869]  kthread+0x337/0x6f0
[   14.896988]  ret_from_fork+0x41/0x80
[   14.897119]  ret_from_fork_asm+0x1a/0x30
[   14.897258] 
[   14.897339] The buggy address belongs to the object at ffff8881029e3080
[   14.897339]  which belongs to the cache kmalloc-16 of size 16
[   14.897900] The buggy address is located 8 bytes inside of
[   14.897900]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.898683] 
[   14.898762] The buggy address belongs to the physical page:
[   14.899128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.899607] flags: 0x200000000000000(node=0|zone=2)
[   14.899817] page_type: f5(slab)
[   14.900045] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.900281] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.900566] page dumped because: kasan: bad access detected
[   14.900823] 
[   14.900916] Memory state around the buggy address:
[   14.901268]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.901776]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.902257] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.902651]                       ^
[   14.902818]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.903151]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.903419] ==================================================================
[   14.923580] ==================================================================
[   14.924094] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.924641] Read of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.925065] 
[   14.925165] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.925209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.925221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.925241] Call Trace:
[   14.925255]  <TASK>
[   14.925268]  dump_stack_lvl+0x73/0xb0
[   14.925294]  print_report+0xd1/0x650
[   14.925329]  ? __virt_addr_valid+0x1db/0x2d0
[   14.925350]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.925372]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.925395]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.925418]  kasan_report+0x141/0x180
[   14.925441]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.925470]  kasan_check_range+0x10c/0x1c0
[   14.925489]  __kasan_check_read+0x15/0x20
[   14.925508]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.925532]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.925556]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.925576]  ? trace_hardirqs_on+0x37/0xe0
[   14.925597]  ? kasan_bitops_generic+0x92/0x1c0
[   14.925621]  kasan_bitops_generic+0x121/0x1c0
[   14.925641]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.925661]  ? __pfx_read_tsc+0x10/0x10
[   14.925680]  ? ktime_get_ts64+0x86/0x230
[   14.925704]  kunit_try_run_case+0x1a5/0x480
[   14.925728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.925748]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.925771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.925794]  ? __kthread_parkme+0x82/0x180
[   14.925816]  ? preempt_count_sub+0x50/0x80
[   14.925841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.925864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.925933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.925959]  kthread+0x337/0x6f0
[   14.925976]  ? trace_preempt_on+0x20/0xc0
[   14.925999]  ? __pfx_kthread+0x10/0x10
[   14.926018]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.926039]  ? calculate_sigpending+0x7b/0xa0
[   14.926060]  ? __pfx_kthread+0x10/0x10
[   14.926079]  ret_from_fork+0x41/0x80
[   14.926101]  ? __pfx_kthread+0x10/0x10
[   14.926119]  ret_from_fork_asm+0x1a/0x30
[   14.926150]  </TASK>
[   14.926161] 
[   14.935154] Allocated by task 280:
[   14.935359]  kasan_save_stack+0x45/0x70
[   14.935567]  kasan_save_track+0x18/0x40
[   14.935764]  kasan_save_alloc_info+0x3b/0x50
[   14.935978]  __kasan_kmalloc+0xb7/0xc0
[   14.936169]  __kmalloc_cache_noprof+0x189/0x420
[   14.936547]  kasan_bitops_generic+0x92/0x1c0
[   14.936782]  kunit_try_run_case+0x1a5/0x480
[   14.937059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.937253]  kthread+0x337/0x6f0
[   14.937407]  ret_from_fork+0x41/0x80
[   14.937592]  ret_from_fork_asm+0x1a/0x30
[   14.937906] 
[   14.938085] The buggy address belongs to the object at ffff8881029e3080
[   14.938085]  which belongs to the cache kmalloc-16 of size 16
[   14.938523] The buggy address is located 8 bytes inside of
[   14.938523]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.939172] 
[   14.939257] The buggy address belongs to the physical page:
[   14.939442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.939685] flags: 0x200000000000000(node=0|zone=2)
[   14.940234] page_type: f5(slab)
[   14.940493] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.940847] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.941672] page dumped because: kasan: bad access detected
[   14.941857] 
[   14.942230] Memory state around the buggy address:
[   14.942658]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.943194]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.943671] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.944408]                       ^
[   14.944708]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.944951]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.945615] ==================================================================
[   14.775689] ==================================================================
[   14.776335] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.776690] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.777239] 
[   14.777350] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.777396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.777409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.777431] Call Trace:
[   14.777444]  <TASK>
[   14.777458]  dump_stack_lvl+0x73/0xb0
[   14.777484]  print_report+0xd1/0x650
[   14.777506]  ? __virt_addr_valid+0x1db/0x2d0
[   14.777526]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.777550]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.777572]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.777595]  kasan_report+0x141/0x180
[   14.777618]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.777646]  kasan_check_range+0x10c/0x1c0
[   14.777666]  __kasan_check_write+0x18/0x20
[   14.777686]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.777709]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.777734]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.777754]  ? trace_hardirqs_on+0x37/0xe0
[   14.777776]  ? kasan_bitops_generic+0x92/0x1c0
[   14.777800]  kasan_bitops_generic+0x121/0x1c0
[   14.777820]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.777841]  ? __pfx_read_tsc+0x10/0x10
[   14.777859]  ? ktime_get_ts64+0x86/0x230
[   14.777884]  kunit_try_run_case+0x1a5/0x480
[   14.777921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.777943]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.777965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.777988]  ? __kthread_parkme+0x82/0x180
[   14.778008]  ? preempt_count_sub+0x50/0x80
[   14.778033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.778057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.778079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.778101]  kthread+0x337/0x6f0
[   14.778118]  ? trace_preempt_on+0x20/0xc0
[   14.778141]  ? __pfx_kthread+0x10/0x10
[   14.778160]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.778181]  ? calculate_sigpending+0x7b/0xa0
[   14.778202]  ? __pfx_kthread+0x10/0x10
[   14.778221]  ret_from_fork+0x41/0x80
[   14.778241]  ? __pfx_kthread+0x10/0x10
[   14.778260]  ret_from_fork_asm+0x1a/0x30
[   14.778289]  </TASK>
[   14.778310] 
[   14.787424] Allocated by task 280:
[   14.787609]  kasan_save_stack+0x45/0x70
[   14.787821]  kasan_save_track+0x18/0x40
[   14.788054]  kasan_save_alloc_info+0x3b/0x50
[   14.788336]  __kasan_kmalloc+0xb7/0xc0
[   14.788583]  __kmalloc_cache_noprof+0x189/0x420
[   14.788813]  kasan_bitops_generic+0x92/0x1c0
[   14.789020]  kunit_try_run_case+0x1a5/0x480
[   14.789229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.789491]  kthread+0x337/0x6f0
[   14.789657]  ret_from_fork+0x41/0x80
[   14.789882]  ret_from_fork_asm+0x1a/0x30
[   14.791251] 
[   14.791386] The buggy address belongs to the object at ffff8881029e3080
[   14.791386]  which belongs to the cache kmalloc-16 of size 16
[   14.792377] The buggy address is located 8 bytes inside of
[   14.792377]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.792932] 
[   14.793114] The buggy address belongs to the physical page:
[   14.793419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.793779] flags: 0x200000000000000(node=0|zone=2)
[   14.794205] page_type: f5(slab)
[   14.794404] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.794719] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.795187] page dumped because: kasan: bad access detected
[   14.795565] 
[   14.795680] Memory state around the buggy address:
[   14.795945]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.796232]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.796503] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.796847]                       ^
[   14.797134]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.797520]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.797819] ==================================================================