Hay
Date
July 2, 2025, 11:09 p.m.

Environment
qemu-x86_64

[   13.669465] ==================================================================
[   13.669789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.670380] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280
[   13.670701] 
[   13.671414] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.671465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.671485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.671506] Call Trace:
[   13.671520]  <TASK>
[   13.671535]  dump_stack_lvl+0x73/0xb0
[   13.671572]  print_report+0xd1/0x650
[   13.671594]  ? __virt_addr_valid+0x1db/0x2d0
[   13.671619]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.671648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.671677]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.671704]  kasan_report+0x141/0x180
[   13.671725]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.671758]  kasan_check_range+0x10c/0x1c0
[   13.671782]  __kasan_check_write+0x18/0x20
[   13.671801]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.671827]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.671854]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.671878]  ? trace_hardirqs_on+0x37/0xe0
[   13.671901]  ? kasan_bitops_generic+0x92/0x1c0
[   13.671927]  kasan_bitops_generic+0x121/0x1c0
[   13.671949]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.671974]  ? __pfx_read_tsc+0x10/0x10
[   13.671993]  ? ktime_get_ts64+0x86/0x230
[   13.672016]  kunit_try_run_case+0x1a5/0x480
[   13.672040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.672061]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.672083]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.672105]  ? __kthread_parkme+0x82/0x180
[   13.672125]  ? preempt_count_sub+0x50/0x80
[   13.672147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.672170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.672192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.672214]  kthread+0x337/0x6f0
[   13.672233]  ? trace_preempt_on+0x20/0xc0
[   13.672255]  ? __pfx_kthread+0x10/0x10
[   13.672275]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.672296]  ? calculate_sigpending+0x7b/0xa0
[   13.672319]  ? __pfx_kthread+0x10/0x10
[   13.672340]  ret_from_fork+0x116/0x1d0
[   13.672370]  ? __pfx_kthread+0x10/0x10
[   13.672390]  ret_from_fork_asm+0x1a/0x30
[   13.672419]  </TASK>
[   13.672430] 
[   13.689696] Allocated by task 280:
[   13.689923]  kasan_save_stack+0x45/0x70
[   13.690340]  kasan_save_track+0x18/0x40
[   13.690772]  kasan_save_alloc_info+0x3b/0x50
[   13.691101]  __kasan_kmalloc+0xb7/0xc0
[   13.691394]  __kmalloc_cache_noprof+0x189/0x420
[   13.691764]  kasan_bitops_generic+0x92/0x1c0
[   13.692085]  kunit_try_run_case+0x1a5/0x480
[   13.692385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.692561]  kthread+0x337/0x6f0
[   13.692741]  ret_from_fork+0x116/0x1d0
[   13.693197]  ret_from_fork_asm+0x1a/0x30
[   13.693539] 
[   13.693783] The buggy address belongs to the object at ffff8881027960e0
[   13.693783]  which belongs to the cache kmalloc-16 of size 16
[   13.694482] The buggy address is located 8 bytes inside of
[   13.694482]  allocated 9-byte region [ffff8881027960e0, ffff8881027960e9)
[   13.695493] 
[   13.695719] The buggy address belongs to the physical page:
[   13.696298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796
[   13.697075] flags: 0x200000000000000(node=0|zone=2)
[   13.697622] page_type: f5(slab)
[   13.697747] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.697976] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.698200] page dumped because: kasan: bad access detected
[   13.698379] 
[   13.698447] Memory state around the buggy address:
[   13.698625]  ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.698838]  ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.699615] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.700173]                                                           ^
[   13.700535]  ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.701283]  ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.702016] ==================================================================
[   13.818463] ==================================================================
[   13.818817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.819386] Read of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280
[   13.819764] 
[   13.819900] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.819943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.819965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.819984] Call Trace:
[   13.819996]  <TASK>
[   13.820010]  dump_stack_lvl+0x73/0xb0
[   13.820049]  print_report+0xd1/0x650
[   13.820073]  ? __virt_addr_valid+0x1db/0x2d0
[   13.820095]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.820120]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.820151]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.820176]  kasan_report+0x141/0x180
[   13.820197]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.820239]  kasan_check_range+0x10c/0x1c0
[   13.820261]  __kasan_check_read+0x15/0x20
[   13.820279]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.820306]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.820332]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.820366]  ? trace_hardirqs_on+0x37/0xe0
[   13.820388]  ? kasan_bitops_generic+0x92/0x1c0
[   13.820422]  kasan_bitops_generic+0x121/0x1c0
[   13.820445]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.820469]  ? __pfx_read_tsc+0x10/0x10
[   13.820501]  ? ktime_get_ts64+0x86/0x230
[   13.820524]  kunit_try_run_case+0x1a5/0x480
[   13.820547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.820568]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.820591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.820612]  ? __kthread_parkme+0x82/0x180
[   13.820633]  ? preempt_count_sub+0x50/0x80
[   13.820656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.820678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.820701]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.820724]  kthread+0x337/0x6f0
[   13.820743]  ? trace_preempt_on+0x20/0xc0
[   13.820764]  ? __pfx_kthread+0x10/0x10
[   13.820828]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.820852]  ? calculate_sigpending+0x7b/0xa0
[   13.820888]  ? __pfx_kthread+0x10/0x10
[   13.820910]  ret_from_fork+0x116/0x1d0
[   13.820928]  ? __pfx_kthread+0x10/0x10
[   13.820948]  ret_from_fork_asm+0x1a/0x30
[   13.820986]  </TASK>
[   13.820996] 
[   13.832467] Allocated by task 280:
[   13.832653]  kasan_save_stack+0x45/0x70
[   13.832833]  kasan_save_track+0x18/0x40
[   13.833008]  kasan_save_alloc_info+0x3b/0x50
[   13.833202]  __kasan_kmalloc+0xb7/0xc0
[   13.833856]  __kmalloc_cache_noprof+0x189/0x420
[   13.834278]  kasan_bitops_generic+0x92/0x1c0
[   13.834926]  kunit_try_run_case+0x1a5/0x480
[   13.835257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.835851]  kthread+0x337/0x6f0
[   13.836154]  ret_from_fork+0x116/0x1d0
[   13.836641]  ret_from_fork_asm+0x1a/0x30
[   13.836928] 
[   13.837030] The buggy address belongs to the object at ffff8881027960e0
[   13.837030]  which belongs to the cache kmalloc-16 of size 16
[   13.837520] The buggy address is located 8 bytes inside of
[   13.837520]  allocated 9-byte region [ffff8881027960e0, ffff8881027960e9)
[   13.837996] 
[   13.838088] The buggy address belongs to the physical page:
[   13.838319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796
[   13.839171] flags: 0x200000000000000(node=0|zone=2)
[   13.839549] page_type: f5(slab)
[   13.839990] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.840490] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.841419] page dumped because: kasan: bad access detected
[   13.842101] 
[   13.842190] Memory state around the buggy address:
[   13.842425]  ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.843125]  ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.843560] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.844041]                                                           ^
[   13.844324]  ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.844922]  ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.845350] ==================================================================
[   13.646393] ==================================================================
[   13.646791] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.647489] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280
[   13.647915] 
[   13.648024] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.648081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.648093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.648113] Call Trace:
[   13.648128]  <TASK>
[   13.648163]  dump_stack_lvl+0x73/0xb0
[   13.648191]  print_report+0xd1/0x650
[   13.648212]  ? __virt_addr_valid+0x1db/0x2d0
[   13.648245]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.648271]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.648292]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.648319]  kasan_report+0x141/0x180
[   13.648340]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.648390]  kasan_check_range+0x10c/0x1c0
[   13.648412]  __kasan_check_write+0x18/0x20
[   13.648431]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.648468]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.648495]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.648519]  ? trace_hardirqs_on+0x37/0xe0
[   13.648540]  ? kasan_bitops_generic+0x92/0x1c0
[   13.648575]  kasan_bitops_generic+0x121/0x1c0
[   13.648597]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.648621]  ? __pfx_read_tsc+0x10/0x10
[   13.648692]  ? ktime_get_ts64+0x86/0x230
[   13.648715]  kunit_try_run_case+0x1a5/0x480
[   13.648740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.648760]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.648783]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.648804]  ? __kthread_parkme+0x82/0x180
[   13.648825]  ? preempt_count_sub+0x50/0x80
[   13.648847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.648869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.648891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.648914]  kthread+0x337/0x6f0
[   13.648932]  ? trace_preempt_on+0x20/0xc0
[   13.648953]  ? __pfx_kthread+0x10/0x10
[   13.648973]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.648993]  ? calculate_sigpending+0x7b/0xa0
[   13.649016]  ? __pfx_kthread+0x10/0x10
[   13.649037]  ret_from_fork+0x116/0x1d0
[   13.649055]  ? __pfx_kthread+0x10/0x10
[   13.649074]  ret_from_fork_asm+0x1a/0x30
[   13.649103]  </TASK>
[   13.649114] 
[   13.658067] Allocated by task 280:
[   13.658270]  kasan_save_stack+0x45/0x70
[   13.658495]  kasan_save_track+0x18/0x40
[   13.658844]  kasan_save_alloc_info+0x3b/0x50
[   13.659034]  __kasan_kmalloc+0xb7/0xc0
[   13.659252]  __kmalloc_cache_noprof+0x189/0x420
[   13.659480]  kasan_bitops_generic+0x92/0x1c0
[   13.659838]  kunit_try_run_case+0x1a5/0x480
[   13.659990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.660165]  kthread+0x337/0x6f0
[   13.660312]  ret_from_fork+0x116/0x1d0
[   13.660511]  ret_from_fork_asm+0x1a/0x30
[   13.660732] 
[   13.660828] The buggy address belongs to the object at ffff8881027960e0
[   13.660828]  which belongs to the cache kmalloc-16 of size 16
[   13.661268] The buggy address is located 8 bytes inside of
[   13.661268]  allocated 9-byte region [ffff8881027960e0, ffff8881027960e9)
[   13.662112] 
[   13.662213] The buggy address belongs to the physical page:
[   13.662660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796
[   13.663319] flags: 0x200000000000000(node=0|zone=2)
[   13.663990] page_type: f5(slab)
[   13.664280] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.664865] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.665274] page dumped because: kasan: bad access detected
[   13.665531] 
[   13.665867] Memory state around the buggy address:
[   13.666178]  ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.666561]  ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.667078] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.667457]                                                           ^
[   13.667995]  ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.668298]  ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.668761] ==================================================================
[   13.754614] ==================================================================
[   13.755165] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.755639] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280
[   13.755995] 
[   13.756120] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.756175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.756187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.756206] Call Trace:
[   13.756221]  <TASK>
[   13.756237]  dump_stack_lvl+0x73/0xb0
[   13.756263]  print_report+0xd1/0x650
[   13.756296]  ? __virt_addr_valid+0x1db/0x2d0
[   13.756318]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.756344]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.756386]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.756412]  kasan_report+0x141/0x180
[   13.756433]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.756464]  kasan_check_range+0x10c/0x1c0
[   13.756486]  __kasan_check_write+0x18/0x20
[   13.756514]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.756541]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.756567]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.756601]  ? trace_hardirqs_on+0x37/0xe0
[   13.756622]  ? kasan_bitops_generic+0x92/0x1c0
[   13.756648]  kasan_bitops_generic+0x121/0x1c0
[   13.756681]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.756705]  ? __pfx_read_tsc+0x10/0x10
[   13.756725]  ? ktime_get_ts64+0x86/0x230
[   13.756792]  kunit_try_run_case+0x1a5/0x480
[   13.756818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.756840]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.756862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.756894]  ? __kthread_parkme+0x82/0x180
[   13.756914]  ? preempt_count_sub+0x50/0x80
[   13.756937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.756972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.756994]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.757016]  kthread+0x337/0x6f0
[   13.757035]  ? trace_preempt_on+0x20/0xc0
[   13.757065]  ? __pfx_kthread+0x10/0x10
[   13.757085]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.757105]  ? calculate_sigpending+0x7b/0xa0
[   13.757143]  ? __pfx_kthread+0x10/0x10
[   13.757165]  ret_from_fork+0x116/0x1d0
[   13.757184]  ? __pfx_kthread+0x10/0x10
[   13.757212]  ret_from_fork_asm+0x1a/0x30
[   13.757242]  </TASK>
[   13.757254] 
[   13.766465] Allocated by task 280:
[   13.766604]  kasan_save_stack+0x45/0x70
[   13.766809]  kasan_save_track+0x18/0x40
[   13.767012]  kasan_save_alloc_info+0x3b/0x50
[   13.767251]  __kasan_kmalloc+0xb7/0xc0
[   13.767478]  __kmalloc_cache_noprof+0x189/0x420
[   13.767847]  kasan_bitops_generic+0x92/0x1c0
[   13.768053]  kunit_try_run_case+0x1a5/0x480
[   13.768210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.768394]  kthread+0x337/0x6f0
[   13.768552]  ret_from_fork+0x116/0x1d0
[   13.768736]  ret_from_fork_asm+0x1a/0x30
[   13.768965] 
[   13.769077] The buggy address belongs to the object at ffff8881027960e0
[   13.769077]  which belongs to the cache kmalloc-16 of size 16
[   13.769556] The buggy address is located 8 bytes inside of
[   13.769556]  allocated 9-byte region [ffff8881027960e0, ffff8881027960e9)
[   13.770366] 
[   13.770453] The buggy address belongs to the physical page:
[   13.770798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796
[   13.771086] flags: 0x200000000000000(node=0|zone=2)
[   13.771263] page_type: f5(slab)
[   13.771454] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.772111] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.772490] page dumped because: kasan: bad access detected
[   13.772811] 
[   13.772896] Memory state around the buggy address:
[   13.773053]  ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.773333]  ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.773671] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.773953]                                                           ^
[   13.774150]  ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.774716]  ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.775040] ==================================================================
[   13.775514] ==================================================================
[   13.776049] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.776443] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280
[   13.776845] 
[   13.776951] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.776994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.777006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.777027] Call Trace:
[   13.777041]  <TASK>
[   13.777055]  dump_stack_lvl+0x73/0xb0
[   13.777080]  print_report+0xd1/0x650
[   13.777102]  ? __virt_addr_valid+0x1db/0x2d0
[   13.777124]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.777150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.777171]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.777197]  kasan_report+0x141/0x180
[   13.777231]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.777262]  kasan_check_range+0x10c/0x1c0
[   13.777295]  __kasan_check_write+0x18/0x20
[   13.777314]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.777341]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.777378]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.777402]  ? trace_hardirqs_on+0x37/0xe0
[   13.777423]  ? kasan_bitops_generic+0x92/0x1c0
[   13.777449]  kasan_bitops_generic+0x121/0x1c0
[   13.777471]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.777495]  ? __pfx_read_tsc+0x10/0x10
[   13.777516]  ? ktime_get_ts64+0x86/0x230
[   13.777538]  kunit_try_run_case+0x1a5/0x480
[   13.777561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.777594]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.777616]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.777637]  ? __kthread_parkme+0x82/0x180
[   13.777657]  ? preempt_count_sub+0x50/0x80
[   13.777680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.777703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.777762]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.777787]  kthread+0x337/0x6f0
[   13.777820]  ? trace_preempt_on+0x20/0xc0
[   13.777841]  ? __pfx_kthread+0x10/0x10
[   13.777861]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.777881]  ? calculate_sigpending+0x7b/0xa0
[   13.777904]  ? __pfx_kthread+0x10/0x10
[   13.777924]  ret_from_fork+0x116/0x1d0
[   13.777941]  ? __pfx_kthread+0x10/0x10
[   13.777962]  ret_from_fork_asm+0x1a/0x30
[   13.777991]  </TASK>
[   13.778003] 
[   13.787108] Allocated by task 280:
[   13.787247]  kasan_save_stack+0x45/0x70
[   13.787479]  kasan_save_track+0x18/0x40
[   13.787678]  kasan_save_alloc_info+0x3b/0x50
[   13.787988]  __kasan_kmalloc+0xb7/0xc0
[   13.788209]  __kmalloc_cache_noprof+0x189/0x420
[   13.788429]  kasan_bitops_generic+0x92/0x1c0
[   13.788626]  kunit_try_run_case+0x1a5/0x480
[   13.789021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.789242]  kthread+0x337/0x6f0
[   13.789420]  ret_from_fork+0x116/0x1d0
[   13.789671]  ret_from_fork_asm+0x1a/0x30
[   13.789899] 
[   13.790008] The buggy address belongs to the object at ffff8881027960e0
[   13.790008]  which belongs to the cache kmalloc-16 of size 16
[   13.790508] The buggy address is located 8 bytes inside of
[   13.790508]  allocated 9-byte region [ffff8881027960e0, ffff8881027960e9)
[   13.791015] 
[   13.791092] The buggy address belongs to the physical page:
[   13.791264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796
[   13.791631] flags: 0x200000000000000(node=0|zone=2)
[   13.791899] page_type: f5(slab)
[   13.792068] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.792419] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.792734] page dumped because: kasan: bad access detected
[   13.793328] 
[   13.793422] Memory state around the buggy address:
[   13.793579]  ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.794373]  ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.794622] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.794836]                                                           ^
[   13.795140]  ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.795559]  ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.796154] ==================================================================
[   13.702679] ==================================================================
[   13.703546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.704353] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280
[   13.705086] 
[   13.705210] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.705253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.705266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.705286] Call Trace:
[   13.705299]  <TASK>
[   13.705316]  dump_stack_lvl+0x73/0xb0
[   13.705380]  print_report+0xd1/0x650
[   13.705404]  ? __virt_addr_valid+0x1db/0x2d0
[   13.705427]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.705453]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.705473]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.705500]  kasan_report+0x141/0x180
[   13.705544]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.705596]  kasan_check_range+0x10c/0x1c0
[   13.705630]  __kasan_check_write+0x18/0x20
[   13.705649]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.705675]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.705712]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.705737]  ? trace_hardirqs_on+0x37/0xe0
[   13.705759]  ? kasan_bitops_generic+0x92/0x1c0
[   13.705785]  kasan_bitops_generic+0x121/0x1c0
[   13.705807]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.705831]  ? __pfx_read_tsc+0x10/0x10
[   13.705851]  ? ktime_get_ts64+0x86/0x230
[   13.705875]  kunit_try_run_case+0x1a5/0x480
[   13.705898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.705919]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.705943]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.705964]  ? __kthread_parkme+0x82/0x180
[   13.705984]  ? preempt_count_sub+0x50/0x80
[   13.706007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.706029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.706051]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.706072]  kthread+0x337/0x6f0
[   13.706091]  ? trace_preempt_on+0x20/0xc0
[   13.706113]  ? __pfx_kthread+0x10/0x10
[   13.706133]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.706153]  ? calculate_sigpending+0x7b/0xa0
[   13.706176]  ? __pfx_kthread+0x10/0x10
[   13.706197]  ret_from_fork+0x116/0x1d0
[   13.706215]  ? __pfx_kthread+0x10/0x10
[   13.706235]  ret_from_fork_asm+0x1a/0x30
[   13.706264]  </TASK>
[   13.706275] 
[   13.720440] Allocated by task 280:
[   13.720813]  kasan_save_stack+0x45/0x70
[   13.721333]  kasan_save_track+0x18/0x40
[   13.721751]  kasan_save_alloc_info+0x3b/0x50
[   13.722292]  __kasan_kmalloc+0xb7/0xc0
[   13.722594]  __kmalloc_cache_noprof+0x189/0x420
[   13.723024]  kasan_bitops_generic+0x92/0x1c0
[   13.723178]  kunit_try_run_case+0x1a5/0x480
[   13.723323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.723509]  kthread+0x337/0x6f0
[   13.723658]  ret_from_fork+0x116/0x1d0
[   13.723793]  ret_from_fork_asm+0x1a/0x30
[   13.724040] 
[   13.724137] The buggy address belongs to the object at ffff8881027960e0
[   13.724137]  which belongs to the cache kmalloc-16 of size 16
[   13.724596] The buggy address is located 8 bytes inside of
[   13.724596]  allocated 9-byte region [ffff8881027960e0, ffff8881027960e9)
[   13.725160] 
[   13.725232] The buggy address belongs to the physical page:
[   13.725738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796
[   13.726281] flags: 0x200000000000000(node=0|zone=2)
[   13.726480] page_type: f5(slab)
[   13.726604] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.726981] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.727429] page dumped because: kasan: bad access detected
[   13.727842] 
[   13.727927] Memory state around the buggy address:
[   13.728169]  ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.728448]  ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.729191] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.730090]                                                           ^
[   13.730528]  ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.731078]  ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.731652] ==================================================================
[   13.846085] ==================================================================
[   13.846415] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.847470] Read of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280
[   13.848116] 
[   13.848223] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.848375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.848389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.848409] Call Trace:
[   13.848425]  <TASK>
[   13.848442]  dump_stack_lvl+0x73/0xb0
[   13.848469]  print_report+0xd1/0x650
[   13.848500]  ? __virt_addr_valid+0x1db/0x2d0
[   13.848523]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.848548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.848619]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.848649]  kasan_report+0x141/0x180
[   13.848672]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.848702]  __asan_report_load8_noabort+0x18/0x20
[   13.848727]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.848755]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.848783]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.848807]  ? trace_hardirqs_on+0x37/0xe0
[   13.848829]  ? kasan_bitops_generic+0x92/0x1c0
[   13.848856]  kasan_bitops_generic+0x121/0x1c0
[   13.848878]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.848901]  ? __pfx_read_tsc+0x10/0x10
[   13.848922]  ? ktime_get_ts64+0x86/0x230
[   13.848945]  kunit_try_run_case+0x1a5/0x480
[   13.848969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.848991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.849014]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.849036]  ? __kthread_parkme+0x82/0x180
[   13.849056]  ? preempt_count_sub+0x50/0x80
[   13.849079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.849101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.849123]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.849146]  kthread+0x337/0x6f0
[   13.849164]  ? trace_preempt_on+0x20/0xc0
[   13.849185]  ? __pfx_kthread+0x10/0x10
[   13.849206]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.849226]  ? calculate_sigpending+0x7b/0xa0
[   13.849249]  ? __pfx_kthread+0x10/0x10
[   13.849270]  ret_from_fork+0x116/0x1d0
[   13.849286]  ? __pfx_kthread+0x10/0x10
[   13.849306]  ret_from_fork_asm+0x1a/0x30
[   13.849336]  </TASK>
[   13.849346] 
[   13.858742] Allocated by task 280:
[   13.859008]  kasan_save_stack+0x45/0x70
[   13.859200]  kasan_save_track+0x18/0x40
[   13.859400]  kasan_save_alloc_info+0x3b/0x50
[   13.859586]  __kasan_kmalloc+0xb7/0xc0
[   13.860261]  __kmalloc_cache_noprof+0x189/0x420
[   13.860471]  kasan_bitops_generic+0x92/0x1c0
[   13.860912]  kunit_try_run_case+0x1a5/0x480
[   13.861251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.861598]  kthread+0x337/0x6f0
[   13.861882]  ret_from_fork+0x116/0x1d0
[   13.862119]  ret_from_fork_asm+0x1a/0x30
[   13.862311] 
[   13.862404] The buggy address belongs to the object at ffff8881027960e0
[   13.862404]  which belongs to the cache kmalloc-16 of size 16
[   13.863094] The buggy address is located 8 bytes inside of
[   13.863094]  allocated 9-byte region [ffff8881027960e0, ffff8881027960e9)
[   13.863596] 
[   13.863708] The buggy address belongs to the physical page:
[   13.864256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796
[   13.864885] flags: 0x200000000000000(node=0|zone=2)
[   13.865124] page_type: f5(slab)
[   13.865439] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.865852] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.866155] page dumped because: kasan: bad access detected
[   13.866400] 
[   13.866472] Memory state around the buggy address:
[   13.866683]  ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.867284]  ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.867572] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.868179]                                                           ^
[   13.868425]  ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.868985]  ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.869461] ==================================================================
[   13.732449] ==================================================================
[   13.733094] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.733536] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280
[   13.734097] 
[   13.734395] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.734443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.734454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.734474] Call Trace:
[   13.734490]  <TASK>
[   13.734506]  dump_stack_lvl+0x73/0xb0
[   13.734533]  print_report+0xd1/0x650
[   13.734667]  ? __virt_addr_valid+0x1db/0x2d0
[   13.734694]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.734720]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.734742]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.734768]  kasan_report+0x141/0x180
[   13.734790]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.734820]  kasan_check_range+0x10c/0x1c0
[   13.734843]  __kasan_check_write+0x18/0x20
[   13.734861]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.734887]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.734915]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.734939]  ? trace_hardirqs_on+0x37/0xe0
[   13.734961]  ? kasan_bitops_generic+0x92/0x1c0
[   13.734988]  kasan_bitops_generic+0x121/0x1c0
[   13.735011]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.735035]  ? __pfx_read_tsc+0x10/0x10
[   13.735055]  ? ktime_get_ts64+0x86/0x230
[   13.735078]  kunit_try_run_case+0x1a5/0x480
[   13.735102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.735123]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.735146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.735168]  ? __kthread_parkme+0x82/0x180
[   13.735187]  ? preempt_count_sub+0x50/0x80
[   13.735211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.735233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.735255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.735277]  kthread+0x337/0x6f0
[   13.735295]  ? trace_preempt_on+0x20/0xc0
[   13.735316]  ? __pfx_kthread+0x10/0x10
[   13.735336]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.735367]  ? calculate_sigpending+0x7b/0xa0
[   13.735389]  ? __pfx_kthread+0x10/0x10
[   13.735409]  ret_from_fork+0x116/0x1d0
[   13.735427]  ? __pfx_kthread+0x10/0x10
[   13.735447]  ret_from_fork_asm+0x1a/0x30
[   13.735476]  </TASK>
[   13.735487] 
[   13.745395] Allocated by task 280:
[   13.745552]  kasan_save_stack+0x45/0x70
[   13.745807]  kasan_save_track+0x18/0x40
[   13.746041]  kasan_save_alloc_info+0x3b/0x50
[   13.746263]  __kasan_kmalloc+0xb7/0xc0
[   13.746425]  __kmalloc_cache_noprof+0x189/0x420
[   13.746795]  kasan_bitops_generic+0x92/0x1c0
[   13.746990]  kunit_try_run_case+0x1a5/0x480
[   13.747185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.747387]  kthread+0x337/0x6f0
[   13.747575]  ret_from_fork+0x116/0x1d0
[   13.747766]  ret_from_fork_asm+0x1a/0x30
[   13.748035] 
[   13.748189] The buggy address belongs to the object at ffff8881027960e0
[   13.748189]  which belongs to the cache kmalloc-16 of size 16
[   13.748584] The buggy address is located 8 bytes inside of
[   13.748584]  allocated 9-byte region [ffff8881027960e0, ffff8881027960e9)
[   13.749345] 
[   13.749468] The buggy address belongs to the physical page:
[   13.749798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796
[   13.750047] flags: 0x200000000000000(node=0|zone=2)
[   13.750246] page_type: f5(slab)
[   13.750449] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.750930] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.751274] page dumped because: kasan: bad access detected
[   13.751458] 
[   13.751533] Memory state around the buggy address:
[   13.751762]  ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.752233]  ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.752475] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.753096]                                                           ^
[   13.753399]  ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.753857]  ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.754106] ==================================================================
[   13.796777] ==================================================================
[   13.797293] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.797679] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280
[   13.798004] 
[   13.798110] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.798150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.798163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.798182] Call Trace:
[   13.798198]  <TASK>
[   13.798214]  dump_stack_lvl+0x73/0xb0
[   13.798324]  print_report+0xd1/0x650
[   13.798349]  ? __virt_addr_valid+0x1db/0x2d0
[   13.798393]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.798419]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.798441]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.798479]  kasan_report+0x141/0x180
[   13.798500]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.798530]  kasan_check_range+0x10c/0x1c0
[   13.798562]  __kasan_check_write+0x18/0x20
[   13.798615]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.798656]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.798683]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.798717]  ? trace_hardirqs_on+0x37/0xe0
[   13.798739]  ? kasan_bitops_generic+0x92/0x1c0
[   13.798767]  kasan_bitops_generic+0x121/0x1c0
[   13.798790]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.798813]  ? __pfx_read_tsc+0x10/0x10
[   13.798833]  ? ktime_get_ts64+0x86/0x230
[   13.798856]  kunit_try_run_case+0x1a5/0x480
[   13.798879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.798900]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.798923]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.798944]  ? __kthread_parkme+0x82/0x180
[   13.798965]  ? preempt_count_sub+0x50/0x80
[   13.798988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.799011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.799033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.799054]  kthread+0x337/0x6f0
[   13.799073]  ? trace_preempt_on+0x20/0xc0
[   13.799095]  ? __pfx_kthread+0x10/0x10
[   13.799115]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.799135]  ? calculate_sigpending+0x7b/0xa0
[   13.799158]  ? __pfx_kthread+0x10/0x10
[   13.799179]  ret_from_fork+0x116/0x1d0
[   13.799196]  ? __pfx_kthread+0x10/0x10
[   13.799216]  ret_from_fork_asm+0x1a/0x30
[   13.799255]  </TASK>
[   13.799266] 
[   13.808750] Allocated by task 280:
[   13.808962]  kasan_save_stack+0x45/0x70
[   13.809154]  kasan_save_track+0x18/0x40
[   13.809294]  kasan_save_alloc_info+0x3b/0x50
[   13.809534]  __kasan_kmalloc+0xb7/0xc0
[   13.809722]  __kmalloc_cache_noprof+0x189/0x420
[   13.809972]  kasan_bitops_generic+0x92/0x1c0
[   13.810187]  kunit_try_run_case+0x1a5/0x480
[   13.810396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.810761]  kthread+0x337/0x6f0
[   13.810927]  ret_from_fork+0x116/0x1d0
[   13.811113]  ret_from_fork_asm+0x1a/0x30
[   13.811306] 
[   13.811386] The buggy address belongs to the object at ffff8881027960e0
[   13.811386]  which belongs to the cache kmalloc-16 of size 16
[   13.811739] The buggy address is located 8 bytes inside of
[   13.811739]  allocated 9-byte region [ffff8881027960e0, ffff8881027960e9)
[   13.812576] 
[   13.812668] The buggy address belongs to the physical page:
[   13.812841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796
[   13.813081] flags: 0x200000000000000(node=0|zone=2)
[   13.813244] page_type: f5(slab)
[   13.813768] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.814253] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.814773] page dumped because: kasan: bad access detected
[   13.815096] 
[   13.815195] Memory state around the buggy address:
[   13.815437]  ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.815853]  ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.816079] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.816403]                                                           ^
[   13.816816]  ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.817300]  ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.817829] ==================================================================