Hay
Date
July 10, 2025, 11:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.355755] ==================================================================
[   18.355990] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   18.356613] Read of size 8 at addr fff00000c43f09c8 by task kunit_try_catch/261
[   18.356759] 
[   18.357074] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.357386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.358636] Hardware name: linux,dummy-virt (DT)
[   18.360983]  kasan_bitops_generic+0x110/0x1c8
[   18.367383] The buggy address belongs to the object at fff00000c43f09c0
[   18.367383]  which belongs to the cache kmalloc-16 of size 16
[   18.374353]  fff00000c43f0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.379784] 
[   18.382201]  dump_stack_lvl+0x8c/0xd0
[   18.385511]  kthread+0x328/0x630
[   18.389007] 
[   18.390645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043f0
[   18.395230]                                               ^
[   18.399702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.400118]  kasan_bitops_generic+0x110/0x1c8
[   18.400627]  __kasan_kmalloc+0xd4/0xd8
[   18.401057] 
[   18.401365] page dumped because: kasan: bad access detected
[   18.401612]                                               ^
[   18.401710]  fff00000c43f0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.401920] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   18.402220] Call trace:
[   18.402243]  show_stack+0x20/0x38 (C)
[   18.402291]  dump_stack_lvl+0x8c/0xd0
[   18.402488]  kasan_check_range+0x100/0x1a8
[   18.403237]  kthread+0x328/0x630
[   18.403676]  kasan_bitops_generic+0xa0/0x1c8
[   18.404158] 
[   18.404889] page dumped because: kasan: bad access detected
[   18.405210] >fff00000c43f0980: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   18.406784] 
[   18.407016] Call trace:
[   18.407446]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   18.408454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.409340] page dumped because: kasan: bad access detected
[   18.411224]  kthread+0x328/0x630
[   18.411797]  kthread+0x328/0x630
[   18.412387] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.412903] ==================================================================
[   18.320984] ==================================================================
[   18.321069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.324529] Write of size 8 at addr fff00000c43f09c8 by task kunit_try_catch/261
[   18.324693] 
[   18.325246] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.325343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.326416] Hardware name: linux,dummy-virt (DT)
[   18.326465] Call trace:
[   18.326915]  show_stack+0x20/0x38 (C)
[   18.327892]  dump_stack_lvl+0x8c/0xd0
[   18.328145]  print_report+0x118/0x608
[   18.328201]  kasan_report+0xdc/0x128
[   18.328253]  kasan_check_range+0x100/0x1a8
[   18.329615]  __kasan_check_write+0x20/0x30
[   18.329686]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.330396]  kasan_bitops_generic+0x110/0x1c8
[   18.330572]  kunit_try_run_case+0x170/0x3f0
[   18.330628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.331552]  kthread+0x328/0x630
[   18.332187]  ret_from_fork+0x10/0x20
[   18.332759] 
[   18.333118] Allocated by task 261:
[   18.333493]  kasan_save_stack+0x3c/0x68
[   18.333949]  kasan_save_track+0x20/0x40
[   18.334982]  kasan_save_alloc_info+0x40/0x58
[   18.335851]  __kasan_kmalloc+0xd4/0xd8
[   18.336017]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.336217]  kasan_bitops_generic+0xa0/0x1c8
[   18.336264]  kunit_try_run_case+0x170/0x3f0
[   18.336306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.336361]  kthread+0x328/0x630
[   18.337631]  ret_from_fork+0x10/0x20
[   18.337748] 
[   18.338509] The buggy address belongs to the object at fff00000c43f09c0
[   18.338509]  which belongs to the cache kmalloc-16 of size 16
[   18.338747] The buggy address is located 8 bytes inside of
[   18.338747]  allocated 9-byte region [fff00000c43f09c0, fff00000c43f09c9)
[   18.339075] 
[   18.339115] The buggy address belongs to the physical page:
[   18.339347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043f0
[   18.339677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.339733] page_type: f5(slab)
[   18.339778] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.339832] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.340870] page dumped because: kasan: bad access detected
[   18.341109] 
[   18.341162] Memory state around the buggy address:
[   18.341265]  fff00000c43f0880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   18.341922]  fff00000c43f0900: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   18.341975] >fff00000c43f0980: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   18.342806]                                               ^
[   18.343050]  fff00000c43f0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.343343]  fff00000c43f0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.343545] ==================================================================

[   14.823517] ==================================================================
[   14.823804] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.824064] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.824301] 
[   14.824444] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.824487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.824500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.824521] Call Trace:
[   14.824536]  <TASK>
[   14.824549]  dump_stack_lvl+0x73/0xb0
[   14.824578]  print_report+0xd1/0x650
[   14.824600]  ? __virt_addr_valid+0x1db/0x2d0
[   14.824623]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.824676]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.824699]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.824725]  kasan_report+0x141/0x180
[   14.824747]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.824778]  kasan_check_range+0x10c/0x1c0
[   14.824802]  __kasan_check_write+0x18/0x20
[   14.824822]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.824866]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.824908]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.824932]  ? trace_hardirqs_on+0x37/0xe0
[   14.824955]  ? kasan_bitops_generic+0x92/0x1c0
[   14.824982]  kasan_bitops_generic+0x116/0x1c0
[   14.825006]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.825032]  ? __pfx_read_tsc+0x10/0x10
[   14.825054]  ? ktime_get_ts64+0x86/0x230
[   14.825077]  kunit_try_run_case+0x1a5/0x480
[   14.825100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.825124]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.825148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.825172]  ? __kthread_parkme+0x82/0x180
[   14.825193]  ? preempt_count_sub+0x50/0x80
[   14.825216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.825241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.825265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.825291]  kthread+0x337/0x6f0
[   14.825310]  ? trace_preempt_on+0x20/0xc0
[   14.825331]  ? __pfx_kthread+0x10/0x10
[   14.825365]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.825386]  ? calculate_sigpending+0x7b/0xa0
[   14.825429]  ? __pfx_kthread+0x10/0x10
[   14.825450]  ret_from_fork+0x116/0x1d0
[   14.825468]  ? __pfx_kthread+0x10/0x10
[   14.825488]  ret_from_fork_asm+0x1a/0x30
[   14.825518]  </TASK>
[   14.825528] 
[   14.833048] Allocated by task 279:
[   14.833257]  kasan_save_stack+0x45/0x70
[   14.833527]  kasan_save_track+0x18/0x40
[   14.833707]  kasan_save_alloc_info+0x3b/0x50
[   14.833947]  __kasan_kmalloc+0xb7/0xc0
[   14.834167]  __kmalloc_cache_noprof+0x189/0x420
[   14.834392]  kasan_bitops_generic+0x92/0x1c0
[   14.834624]  kunit_try_run_case+0x1a5/0x480
[   14.834828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.835098]  kthread+0x337/0x6f0
[   14.835263]  ret_from_fork+0x116/0x1d0
[   14.835501]  ret_from_fork_asm+0x1a/0x30
[   14.835646] 
[   14.835715] The buggy address belongs to the object at ffff888102749de0
[   14.835715]  which belongs to the cache kmalloc-16 of size 16
[   14.836051] The buggy address is located 8 bytes inside of
[   14.836051]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.836524] 
[   14.836620] The buggy address belongs to the physical page:
[   14.836884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.837255] flags: 0x200000000000000(node=0|zone=2)
[   14.837559] page_type: f5(slab)
[   14.837748] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.838124] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.838501] page dumped because: kasan: bad access detected
[   14.838769] 
[   14.838843] Memory state around the buggy address:
[   14.838989]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.839204]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.839584] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.839922]                                                           ^
[   14.840241]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.840529]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.840750] ==================================================================
[   14.715694] ==================================================================
[   14.715951] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.716282] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.716626] 
[   14.716732] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.716770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.716782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.716801] Call Trace:
[   14.716811]  <TASK>
[   14.716824]  dump_stack_lvl+0x73/0xb0
[   14.716851]  print_report+0xd1/0x650
[   14.716871]  ? __virt_addr_valid+0x1db/0x2d0
[   14.716891]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.716917]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.716938]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.716963]  kasan_report+0x141/0x180
[   14.716984]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.717014]  kasan_check_range+0x10c/0x1c0
[   14.717038]  __kasan_check_write+0x18/0x20
[   14.717056]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.717096]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.717393]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.717420]  ? trace_hardirqs_on+0x37/0xe0
[   14.717442]  ? kasan_bitops_generic+0x92/0x1c0
[   14.717469]  kasan_bitops_generic+0x116/0x1c0
[   14.717494]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.717519]  ? __pfx_read_tsc+0x10/0x10
[   14.717540]  ? ktime_get_ts64+0x86/0x230
[   14.717564]  kunit_try_run_case+0x1a5/0x480
[   14.717642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.717667]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.717691]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.717716]  ? __kthread_parkme+0x82/0x180
[   14.717737]  ? preempt_count_sub+0x50/0x80
[   14.717760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.717785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.717810]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.717835]  kthread+0x337/0x6f0
[   14.717853]  ? trace_preempt_on+0x20/0xc0
[   14.717876]  ? __pfx_kthread+0x10/0x10
[   14.717896]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.717918]  ? calculate_sigpending+0x7b/0xa0
[   14.717941]  ? __pfx_kthread+0x10/0x10
[   14.717963]  ret_from_fork+0x116/0x1d0
[   14.717981]  ? __pfx_kthread+0x10/0x10
[   14.718002]  ret_from_fork_asm+0x1a/0x30
[   14.718032]  </TASK>
[   14.718041] 
[   14.725819] Allocated by task 279:
[   14.726003]  kasan_save_stack+0x45/0x70
[   14.726213]  kasan_save_track+0x18/0x40
[   14.726424]  kasan_save_alloc_info+0x3b/0x50
[   14.726803]  __kasan_kmalloc+0xb7/0xc0
[   14.727001]  __kmalloc_cache_noprof+0x189/0x420
[   14.727226]  kasan_bitops_generic+0x92/0x1c0
[   14.727498]  kunit_try_run_case+0x1a5/0x480
[   14.727698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.727925]  kthread+0x337/0x6f0
[   14.728046]  ret_from_fork+0x116/0x1d0
[   14.728225]  ret_from_fork_asm+0x1a/0x30
[   14.728567] 
[   14.728678] The buggy address belongs to the object at ffff888102749de0
[   14.728678]  which belongs to the cache kmalloc-16 of size 16
[   14.729146] The buggy address is located 8 bytes inside of
[   14.729146]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.729724] 
[   14.729824] The buggy address belongs to the physical page:
[   14.730034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.730336] flags: 0x200000000000000(node=0|zone=2)
[   14.730727] page_type: f5(slab)
[   14.730885] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.731116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.731341] page dumped because: kasan: bad access detected
[   14.731524] 
[   14.731611] Memory state around the buggy address:
[   14.731829]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.732158]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.732571] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.732899]                                                           ^
[   14.733141]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.733407]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.733734] ==================================================================
[   14.737168] ==================================================================
[   14.738089] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.739381] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.739881] 
[   14.739974] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.740018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.740030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.740051] Call Trace:
[   14.740063]  <TASK>
[   14.740078]  dump_stack_lvl+0x73/0xb0
[   14.740108]  print_report+0xd1/0x650
[   14.740130]  ? __virt_addr_valid+0x1db/0x2d0
[   14.740153]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.740187]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.740210]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.740237]  kasan_report+0x141/0x180
[   14.740258]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.740289]  kasan_check_range+0x10c/0x1c0
[   14.740312]  __kasan_check_write+0x18/0x20
[   14.740331]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.740380]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.740462]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.740488]  ? trace_hardirqs_on+0x37/0xe0
[   14.740607]  ? kasan_bitops_generic+0x92/0x1c0
[   14.740677]  kasan_bitops_generic+0x116/0x1c0
[   14.740819]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.740851]  ? __pfx_read_tsc+0x10/0x10
[   14.740873]  ? ktime_get_ts64+0x86/0x230
[   14.740896]  kunit_try_run_case+0x1a5/0x480
[   14.740920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.740943]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.740966]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.740990]  ? __kthread_parkme+0x82/0x180
[   14.741011]  ? preempt_count_sub+0x50/0x80
[   14.741034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.741059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.741083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.741108]  kthread+0x337/0x6f0
[   14.741127]  ? trace_preempt_on+0x20/0xc0
[   14.741149]  ? __pfx_kthread+0x10/0x10
[   14.741170]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.741191]  ? calculate_sigpending+0x7b/0xa0
[   14.741214]  ? __pfx_kthread+0x10/0x10
[   14.741236]  ret_from_fork+0x116/0x1d0
[   14.741256]  ? __pfx_kthread+0x10/0x10
[   14.741276]  ret_from_fork_asm+0x1a/0x30
[   14.741306]  </TASK>
[   14.741316] 
[   14.756318] Allocated by task 279:
[   14.756500]  kasan_save_stack+0x45/0x70
[   14.756653]  kasan_save_track+0x18/0x40
[   14.756790]  kasan_save_alloc_info+0x3b/0x50
[   14.756943]  __kasan_kmalloc+0xb7/0xc0
[   14.757082]  __kmalloc_cache_noprof+0x189/0x420
[   14.757239]  kasan_bitops_generic+0x92/0x1c0
[   14.757481]  kunit_try_run_case+0x1a5/0x480
[   14.757950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.758457]  kthread+0x337/0x6f0
[   14.758791]  ret_from_fork+0x116/0x1d0
[   14.759166]  ret_from_fork_asm+0x1a/0x30
[   14.759648] 
[   14.759882] The buggy address belongs to the object at ffff888102749de0
[   14.759882]  which belongs to the cache kmalloc-16 of size 16
[   14.760467] The buggy address is located 8 bytes inside of
[   14.760467]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.761647] 
[   14.761775] The buggy address belongs to the physical page:
[   14.762118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.762372] flags: 0x200000000000000(node=0|zone=2)
[   14.762704] page_type: f5(slab)
[   14.763032] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.763777] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.764470] page dumped because: kasan: bad access detected
[   14.764975] 
[   14.765170] Memory state around the buggy address:
[   14.765569]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.765992]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.766357] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.766931]                                                           ^
[   14.767539]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.768000]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.768216] ==================================================================
[   14.693243] ==================================================================
[   14.693858] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.694199] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.694555] 
[   14.694683] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.694724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.694735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.694755] Call Trace:
[   14.694766]  <TASK>
[   14.694781]  dump_stack_lvl+0x73/0xb0
[   14.694808]  print_report+0xd1/0x650
[   14.694830]  ? __virt_addr_valid+0x1db/0x2d0
[   14.694853]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.694880]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.694903]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.694930]  kasan_report+0x141/0x180
[   14.694951]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.694982]  kasan_check_range+0x10c/0x1c0
[   14.695006]  __kasan_check_write+0x18/0x20
[   14.695026]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.695052]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.695080]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.695105]  ? trace_hardirqs_on+0x37/0xe0
[   14.695127]  ? kasan_bitops_generic+0x92/0x1c0
[   14.695155]  kasan_bitops_generic+0x116/0x1c0
[   14.695179]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.695204]  ? __pfx_read_tsc+0x10/0x10
[   14.695225]  ? ktime_get_ts64+0x86/0x230
[   14.695250]  kunit_try_run_case+0x1a5/0x480
[   14.695274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.695297]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.695321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.695345]  ? __kthread_parkme+0x82/0x180
[   14.695397]  ? preempt_count_sub+0x50/0x80
[   14.695421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.695446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.695470]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.695496]  kthread+0x337/0x6f0
[   14.695515]  ? trace_preempt_on+0x20/0xc0
[   14.695537]  ? __pfx_kthread+0x10/0x10
[   14.695558]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.695579]  ? calculate_sigpending+0x7b/0xa0
[   14.695603]  ? __pfx_kthread+0x10/0x10
[   14.695625]  ret_from_fork+0x116/0x1d0
[   14.695644]  ? __pfx_kthread+0x10/0x10
[   14.695664]  ret_from_fork_asm+0x1a/0x30
[   14.695696]  </TASK>
[   14.695706] 
[   14.703863] Allocated by task 279:
[   14.704088]  kasan_save_stack+0x45/0x70
[   14.704305]  kasan_save_track+0x18/0x40
[   14.704677]  kasan_save_alloc_info+0x3b/0x50
[   14.704902]  __kasan_kmalloc+0xb7/0xc0
[   14.705093]  __kmalloc_cache_noprof+0x189/0x420
[   14.705284]  kasan_bitops_generic+0x92/0x1c0
[   14.705551]  kunit_try_run_case+0x1a5/0x480
[   14.705740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.705916]  kthread+0x337/0x6f0
[   14.706083]  ret_from_fork+0x116/0x1d0
[   14.706271]  ret_from_fork_asm+0x1a/0x30
[   14.706609] 
[   14.706697] The buggy address belongs to the object at ffff888102749de0
[   14.706697]  which belongs to the cache kmalloc-16 of size 16
[   14.707144] The buggy address is located 8 bytes inside of
[   14.707144]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.707664] 
[   14.707749] The buggy address belongs to the physical page:
[   14.708009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.708311] flags: 0x200000000000000(node=0|zone=2)
[   14.708569] page_type: f5(slab)
[   14.708728] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.709036] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.709260] page dumped because: kasan: bad access detected
[   14.709439] 
[   14.709507] Memory state around the buggy address:
[   14.709657]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.710023]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.710340] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.710710]                                                           ^
[   14.710915]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.711130]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.711339] ==================================================================
[   14.796314] ==================================================================
[   14.797286] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.797801] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.798189] 
[   14.798532] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.798576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.798588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.798607] Call Trace:
[   14.798622]  <TASK>
[   14.798637]  dump_stack_lvl+0x73/0xb0
[   14.798666]  print_report+0xd1/0x650
[   14.798688]  ? __virt_addr_valid+0x1db/0x2d0
[   14.798822]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.798850]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.798908]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.798935]  kasan_report+0x141/0x180
[   14.798970]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.799001]  kasan_check_range+0x10c/0x1c0
[   14.799026]  __kasan_check_write+0x18/0x20
[   14.799045]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.799072]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.799100]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.799125]  ? trace_hardirqs_on+0x37/0xe0
[   14.799147]  ? kasan_bitops_generic+0x92/0x1c0
[   14.799174]  kasan_bitops_generic+0x116/0x1c0
[   14.799198]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.799224]  ? __pfx_read_tsc+0x10/0x10
[   14.799244]  ? ktime_get_ts64+0x86/0x230
[   14.799267]  kunit_try_run_case+0x1a5/0x480
[   14.799292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.799315]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.799338]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.799371]  ? __kthread_parkme+0x82/0x180
[   14.799391]  ? preempt_count_sub+0x50/0x80
[   14.799414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.799439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.799463]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.799488]  kthread+0x337/0x6f0
[   14.799507]  ? trace_preempt_on+0x20/0xc0
[   14.799528]  ? __pfx_kthread+0x10/0x10
[   14.799548]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.799570]  ? calculate_sigpending+0x7b/0xa0
[   14.799594]  ? __pfx_kthread+0x10/0x10
[   14.799615]  ret_from_fork+0x116/0x1d0
[   14.799634]  ? __pfx_kthread+0x10/0x10
[   14.799654]  ret_from_fork_asm+0x1a/0x30
[   14.799685]  </TASK>
[   14.799695] 
[   14.811133] Allocated by task 279:
[   14.811310]  kasan_save_stack+0x45/0x70
[   14.811571]  kasan_save_track+0x18/0x40
[   14.811809]  kasan_save_alloc_info+0x3b/0x50
[   14.812049]  __kasan_kmalloc+0xb7/0xc0
[   14.812399]  __kmalloc_cache_noprof+0x189/0x420
[   14.812848]  kasan_bitops_generic+0x92/0x1c0
[   14.813039]  kunit_try_run_case+0x1a5/0x480
[   14.813240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.813751]  kthread+0x337/0x6f0
[   14.813909]  ret_from_fork+0x116/0x1d0
[   14.814306]  ret_from_fork_asm+0x1a/0x30
[   14.814711] 
[   14.814804] The buggy address belongs to the object at ffff888102749de0
[   14.814804]  which belongs to the cache kmalloc-16 of size 16
[   14.815568] The buggy address is located 8 bytes inside of
[   14.815568]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.816203] 
[   14.816306] The buggy address belongs to the physical page:
[   14.816768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.817220] flags: 0x200000000000000(node=0|zone=2)
[   14.817619] page_type: f5(slab)
[   14.817908] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.818317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.818909] page dumped because: kasan: bad access detected
[   14.819255] 
[   14.819366] Memory state around the buggy address:
[   14.819845]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.820173]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.820654] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.820974]                                                           ^
[   14.821246]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.821818]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.822229] ==================================================================
[   14.768753] ==================================================================
[   14.769867] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.770693] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.771510] 
[   14.771760] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.771802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.771813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.771833] Call Trace:
[   14.771846]  <TASK>
[   14.771890]  dump_stack_lvl+0x73/0xb0
[   14.771922]  print_report+0xd1/0x650
[   14.771943]  ? __virt_addr_valid+0x1db/0x2d0
[   14.771977]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.772003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.772026]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.772053]  kasan_report+0x141/0x180
[   14.772074]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.772105]  kasan_check_range+0x10c/0x1c0
[   14.772129]  __kasan_check_write+0x18/0x20
[   14.772148]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.772178]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.772206]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.772230]  ? trace_hardirqs_on+0x37/0xe0
[   14.772252]  ? kasan_bitops_generic+0x92/0x1c0
[   14.772280]  kasan_bitops_generic+0x116/0x1c0
[   14.772307]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.772334]  ? __pfx_read_tsc+0x10/0x10
[   14.772364]  ? ktime_get_ts64+0x86/0x230
[   14.772387]  kunit_try_run_case+0x1a5/0x480
[   14.772411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.772442]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.772467]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.772491]  ? __kthread_parkme+0x82/0x180
[   14.772511]  ? preempt_count_sub+0x50/0x80
[   14.772536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.772561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.772585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.772611]  kthread+0x337/0x6f0
[   14.772629]  ? trace_preempt_on+0x20/0xc0
[   14.772651]  ? __pfx_kthread+0x10/0x10
[   14.772672]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.772694]  ? calculate_sigpending+0x7b/0xa0
[   14.772718]  ? __pfx_kthread+0x10/0x10
[   14.772739]  ret_from_fork+0x116/0x1d0
[   14.772757]  ? __pfx_kthread+0x10/0x10
[   14.772778]  ret_from_fork_asm+0x1a/0x30
[   14.772808]  </TASK>
[   14.772818] 
[   14.784599] Allocated by task 279:
[   14.784959]  kasan_save_stack+0x45/0x70
[   14.785293]  kasan_save_track+0x18/0x40
[   14.785714]  kasan_save_alloc_info+0x3b/0x50
[   14.786065]  __kasan_kmalloc+0xb7/0xc0
[   14.786213]  __kmalloc_cache_noprof+0x189/0x420
[   14.786657]  kasan_bitops_generic+0x92/0x1c0
[   14.786823]  kunit_try_run_case+0x1a5/0x480
[   14.787240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.787665]  kthread+0x337/0x6f0
[   14.787853]  ret_from_fork+0x116/0x1d0
[   14.788039]  ret_from_fork_asm+0x1a/0x30
[   14.788230] 
[   14.788309] The buggy address belongs to the object at ffff888102749de0
[   14.788309]  which belongs to the cache kmalloc-16 of size 16
[   14.789071] The buggy address is located 8 bytes inside of
[   14.789071]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.790014] 
[   14.790117] The buggy address belongs to the physical page:
[   14.790320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.791055] flags: 0x200000000000000(node=0|zone=2)
[   14.791273] page_type: f5(slab)
[   14.791589] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.791930] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.792367] page dumped because: kasan: bad access detected
[   14.792759] 
[   14.792861] Memory state around the buggy address:
[   14.793251]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.793665]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.794005] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.794605]                                                           ^
[   14.795008]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.795431]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.795740] ==================================================================
[   14.841272] ==================================================================
[   14.841636] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.841983] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.842292] 
[   14.842423] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.842464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.842476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.842495] Call Trace:
[   14.842508]  <TASK>
[   14.842522]  dump_stack_lvl+0x73/0xb0
[   14.842548]  print_report+0xd1/0x650
[   14.842569]  ? __virt_addr_valid+0x1db/0x2d0
[   14.842589]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.842614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.842636]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.842661]  kasan_report+0x141/0x180
[   14.842683]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.842713]  kasan_check_range+0x10c/0x1c0
[   14.842735]  __kasan_check_write+0x18/0x20
[   14.842753]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.842779]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.842805]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.842828]  ? trace_hardirqs_on+0x37/0xe0
[   14.842849]  ? kasan_bitops_generic+0x92/0x1c0
[   14.842875]  kasan_bitops_generic+0x116/0x1c0
[   14.842897]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.842922]  ? __pfx_read_tsc+0x10/0x10
[   14.842942]  ? ktime_get_ts64+0x86/0x230
[   14.842965]  kunit_try_run_case+0x1a5/0x480
[   14.842988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.843010]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.843031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.843054]  ? __kthread_parkme+0x82/0x180
[   14.843072]  ? preempt_count_sub+0x50/0x80
[   14.843094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.843117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.843140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.843163]  kthread+0x337/0x6f0
[   14.843181]  ? trace_preempt_on+0x20/0xc0
[   14.843202]  ? __pfx_kthread+0x10/0x10
[   14.843221]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.843241]  ? calculate_sigpending+0x7b/0xa0
[   14.843263]  ? __pfx_kthread+0x10/0x10
[   14.843284]  ret_from_fork+0x116/0x1d0
[   14.843301]  ? __pfx_kthread+0x10/0x10
[   14.843320]  ret_from_fork_asm+0x1a/0x30
[   14.843360]  </TASK>
[   14.843370] 
[   14.851282] Allocated by task 279:
[   14.851496]  kasan_save_stack+0x45/0x70
[   14.851686]  kasan_save_track+0x18/0x40
[   14.851870]  kasan_save_alloc_info+0x3b/0x50
[   14.852057]  __kasan_kmalloc+0xb7/0xc0
[   14.852188]  __kmalloc_cache_noprof+0x189/0x420
[   14.852395]  kasan_bitops_generic+0x92/0x1c0
[   14.852636]  kunit_try_run_case+0x1a5/0x480
[   14.852845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.853100]  kthread+0x337/0x6f0
[   14.853267]  ret_from_fork+0x116/0x1d0
[   14.853498]  ret_from_fork_asm+0x1a/0x30
[   14.853637] 
[   14.853729] The buggy address belongs to the object at ffff888102749de0
[   14.853729]  which belongs to the cache kmalloc-16 of size 16
[   14.854237] The buggy address is located 8 bytes inside of
[   14.854237]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.854785] 
[   14.854881] The buggy address belongs to the physical page:
[   14.855116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.855527] flags: 0x200000000000000(node=0|zone=2)
[   14.855803] page_type: f5(slab)
[   14.855981] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.856316] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.856667] page dumped because: kasan: bad access detected
[   14.856910] 
[   14.856999] Memory state around the buggy address:
[   14.857212]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.857453]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.857659] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.857862]                                                           ^
[   14.858051]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.858523]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.858860] ==================================================================
[   14.859853] ==================================================================
[   14.860250] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.860883] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.861271] 
[   14.861388] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.861428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.861439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.861457] Call Trace:
[   14.861470]  <TASK>
[   14.861483]  dump_stack_lvl+0x73/0xb0
[   14.861510]  print_report+0xd1/0x650
[   14.861532]  ? __virt_addr_valid+0x1db/0x2d0
[   14.861554]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.861580]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.861603]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.861630]  kasan_report+0x141/0x180
[   14.861652]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.861683]  kasan_check_range+0x10c/0x1c0
[   14.861708]  __kasan_check_write+0x18/0x20
[   14.861727]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.861753]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.861781]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.861805]  ? trace_hardirqs_on+0x37/0xe0
[   14.861826]  ? kasan_bitops_generic+0x92/0x1c0
[   14.861854]  kasan_bitops_generic+0x116/0x1c0
[   14.861877]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.861902]  ? __pfx_read_tsc+0x10/0x10
[   14.861924]  ? ktime_get_ts64+0x86/0x230
[   14.861947]  kunit_try_run_case+0x1a5/0x480
[   14.861970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.861994]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.862016]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.862040]  ? __kthread_parkme+0x82/0x180
[   14.862061]  ? preempt_count_sub+0x50/0x80
[   14.862083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.862108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.862133]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.862158]  kthread+0x337/0x6f0
[   14.862176]  ? trace_preempt_on+0x20/0xc0
[   14.862198]  ? __pfx_kthread+0x10/0x10
[   14.862218]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.862239]  ? calculate_sigpending+0x7b/0xa0
[   14.862263]  ? __pfx_kthread+0x10/0x10
[   14.862284]  ret_from_fork+0x116/0x1d0
[   14.862325]  ? __pfx_kthread+0x10/0x10
[   14.862347]  ret_from_fork_asm+0x1a/0x30
[   14.862387]  </TASK>
[   14.862396] 
[   14.870629] Allocated by task 279:
[   14.870830]  kasan_save_stack+0x45/0x70
[   14.871019]  kasan_save_track+0x18/0x40
[   14.871181]  kasan_save_alloc_info+0x3b/0x50
[   14.871408]  __kasan_kmalloc+0xb7/0xc0
[   14.871606]  __kmalloc_cache_noprof+0x189/0x420
[   14.871820]  kasan_bitops_generic+0x92/0x1c0
[   14.872023]  kunit_try_run_case+0x1a5/0x480
[   14.872231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.872428]  kthread+0x337/0x6f0
[   14.872618]  ret_from_fork+0x116/0x1d0
[   14.872827]  ret_from_fork_asm+0x1a/0x30
[   14.873017] 
[   14.873088] The buggy address belongs to the object at ffff888102749de0
[   14.873088]  which belongs to the cache kmalloc-16 of size 16
[   14.873432] The buggy address is located 8 bytes inside of
[   14.873432]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.873812] 
[   14.873904] The buggy address belongs to the physical page:
[   14.874144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.874639] flags: 0x200000000000000(node=0|zone=2)
[   14.874807] page_type: f5(slab)
[   14.874958] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.875287] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.875751] page dumped because: kasan: bad access detected
[   14.875922] 
[   14.875989] Memory state around the buggy address:
[   14.876142]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.876396]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.876742] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.877077]                                                           ^
[   14.877411]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.877746]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.878049] ==================================================================