Hay
Date
July 8, 2025, 11:09 p.m.

Environment
qemu-x86_64

[   14.733090] ==================================================================
[   14.734028] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.734501] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.734789] 
[   14.734873] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.734915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.734926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.734946] Call Trace:
[   14.734962]  <TASK>
[   14.734977]  dump_stack_lvl+0x73/0xb0
[   14.735007]  print_report+0xd1/0x650
[   14.735030]  ? __virt_addr_valid+0x1db/0x2d0
[   14.735054]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.735084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.735108]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.735160]  kasan_report+0x141/0x180
[   14.735182]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.735217]  kasan_check_range+0x10c/0x1c0
[   14.735241]  __kasan_check_write+0x18/0x20
[   14.735260]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.735306]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.735350]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.735389]  ? trace_hardirqs_on+0x37/0xe0
[   14.735411]  ? kasan_bitops_generic+0x92/0x1c0
[   14.735439]  kasan_bitops_generic+0x121/0x1c0
[   14.735463]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.735487]  ? trace_hardirqs_on+0x37/0xe0
[   14.735519]  ? __pfx_read_tsc+0x10/0x10
[   14.735540]  ? ktime_get_ts64+0x86/0x230
[   14.735562]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.735589]  kunit_try_run_case+0x1a5/0x480
[   14.735625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.735651]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.735697]  ? __kthread_parkme+0x82/0x180
[   14.735717]  ? preempt_count_sub+0x50/0x80
[   14.735742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.735766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.735791]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.735817]  kthread+0x337/0x6f0
[   14.735898]  ? trace_preempt_on+0x20/0xc0
[   14.735921]  ? __pfx_kthread+0x10/0x10
[   14.735942]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.735964]  ? calculate_sigpending+0x7b/0xa0
[   14.735988]  ? __pfx_kthread+0x10/0x10
[   14.736010]  ret_from_fork+0x116/0x1d0
[   14.736066]  ? __pfx_kthread+0x10/0x10
[   14.736090]  ret_from_fork_asm+0x1a/0x30
[   14.736123]  </TASK>
[   14.736133] 
[   14.744471] Allocated by task 279:
[   14.744717]  kasan_save_stack+0x45/0x70
[   14.744910]  kasan_save_track+0x18/0x40
[   14.745104]  kasan_save_alloc_info+0x3b/0x50
[   14.745279]  __kasan_kmalloc+0xb7/0xc0
[   14.745468]  __kmalloc_cache_noprof+0x189/0x420
[   14.745725]  kasan_bitops_generic+0x92/0x1c0
[   14.745910]  kunit_try_run_case+0x1a5/0x480
[   14.746050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.746230]  kthread+0x337/0x6f0
[   14.746387]  ret_from_fork+0x116/0x1d0
[   14.746564]  ret_from_fork_asm+0x1a/0x30
[   14.746763] 
[   14.746884] The buggy address belongs to the object at ffff8881026260e0
[   14.746884]  which belongs to the cache kmalloc-16 of size 16
[   14.747359] The buggy address is located 8 bytes inside of
[   14.747359]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.747827] 
[   14.748013] The buggy address belongs to the physical page:
[   14.748289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.748659] flags: 0x200000000000000(node=0|zone=2)
[   14.748938] page_type: f5(slab)
[   14.749154] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.749527] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.750061] page dumped because: kasan: bad access detected
[   14.750306] 
[   14.750393] Memory state around the buggy address:
[   14.750754]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.750974]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.751179] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.751380]                                                           ^
[   14.751751]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.752073]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.752418] ==================================================================
[   14.860694] ==================================================================
[   14.861154] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.861661] Read of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.862003] 
[   14.862108] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.862150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.862162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.862182] Call Trace:
[   14.862196]  <TASK>
[   14.862214]  dump_stack_lvl+0x73/0xb0
[   14.862242]  print_report+0xd1/0x650
[   14.862265]  ? __virt_addr_valid+0x1db/0x2d0
[   14.862288]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.862329]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.862361]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.862390]  kasan_report+0x141/0x180
[   14.862412]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.862447]  kasan_check_range+0x10c/0x1c0
[   14.862471]  __kasan_check_read+0x15/0x20
[   14.862490]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.862529]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.862560]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.862584]  ? trace_hardirqs_on+0x37/0xe0
[   14.862617]  ? kasan_bitops_generic+0x92/0x1c0
[   14.862645]  kasan_bitops_generic+0x121/0x1c0
[   14.862669]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.862694]  ? trace_hardirqs_on+0x37/0xe0
[   14.862717]  ? __pfx_read_tsc+0x10/0x10
[   14.862738]  ? ktime_get_ts64+0x86/0x230
[   14.862761]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.862788]  kunit_try_run_case+0x1a5/0x480
[   14.862812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.862837]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.862863]  ? __kthread_parkme+0x82/0x180
[   14.862883]  ? preempt_count_sub+0x50/0x80
[   14.862907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.862931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.862956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.862981]  kthread+0x337/0x6f0
[   14.863000]  ? trace_preempt_on+0x20/0xc0
[   14.863022]  ? __pfx_kthread+0x10/0x10
[   14.863043]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.863064]  ? calculate_sigpending+0x7b/0xa0
[   14.863089]  ? __pfx_kthread+0x10/0x10
[   14.863112]  ret_from_fork+0x116/0x1d0
[   14.863130]  ? __pfx_kthread+0x10/0x10
[   14.863150]  ret_from_fork_asm+0x1a/0x30
[   14.863182]  </TASK>
[   14.863192] 
[   14.871048] Allocated by task 279:
[   14.871222]  kasan_save_stack+0x45/0x70
[   14.871416]  kasan_save_track+0x18/0x40
[   14.871611]  kasan_save_alloc_info+0x3b/0x50
[   14.871821]  __kasan_kmalloc+0xb7/0xc0
[   14.872005]  __kmalloc_cache_noprof+0x189/0x420
[   14.872222]  kasan_bitops_generic+0x92/0x1c0
[   14.872430]  kunit_try_run_case+0x1a5/0x480
[   14.872786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.872962]  kthread+0x337/0x6f0
[   14.873081]  ret_from_fork+0x116/0x1d0
[   14.873211]  ret_from_fork_asm+0x1a/0x30
[   14.873366] 
[   14.873461] The buggy address belongs to the object at ffff8881026260e0
[   14.873461]  which belongs to the cache kmalloc-16 of size 16
[   14.874508] The buggy address is located 8 bytes inside of
[   14.874508]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.874994] 
[   14.875083] The buggy address belongs to the physical page:
[   14.875302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.876315] flags: 0x200000000000000(node=0|zone=2)
[   14.876750] page_type: f5(slab)
[   14.876895] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.877126] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.877388] page dumped because: kasan: bad access detected
[   14.877827] 
[   14.877923] Memory state around the buggy address:
[   14.878145]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.878425]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.878853] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.879063]                                                           ^
[   14.879256]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.879820]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.880061] ==================================================================
[   14.842409] ==================================================================
[   14.842712] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.843143] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.843591] 
[   14.843691] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.843734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.843746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.843766] Call Trace:
[   14.843782]  <TASK>
[   14.843797]  dump_stack_lvl+0x73/0xb0
[   14.843826]  print_report+0xd1/0x650
[   14.843851]  ? __virt_addr_valid+0x1db/0x2d0
[   14.843888]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.843918]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.843942]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.843972]  kasan_report+0x141/0x180
[   14.843995]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.844029]  kasan_check_range+0x10c/0x1c0
[   14.844053]  __kasan_check_write+0x18/0x20
[   14.844072]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.844101]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.844132]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.844157]  ? trace_hardirqs_on+0x37/0xe0
[   14.844180]  ? kasan_bitops_generic+0x92/0x1c0
[   14.844208]  kasan_bitops_generic+0x121/0x1c0
[   14.844232]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.844256]  ? trace_hardirqs_on+0x37/0xe0
[   14.844277]  ? __pfx_read_tsc+0x10/0x10
[   14.844298]  ? ktime_get_ts64+0x86/0x230
[   14.844320]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.844347]  kunit_try_run_case+0x1a5/0x480
[   14.844372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.844396]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.844422]  ? __kthread_parkme+0x82/0x180
[   14.844442]  ? preempt_count_sub+0x50/0x80
[   14.844467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.844491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.844516]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.844550]  kthread+0x337/0x6f0
[   14.844568]  ? trace_preempt_on+0x20/0xc0
[   14.844590]  ? __pfx_kthread+0x10/0x10
[   14.844621]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.844642]  ? calculate_sigpending+0x7b/0xa0
[   14.844666]  ? __pfx_kthread+0x10/0x10
[   14.844687]  ret_from_fork+0x116/0x1d0
[   14.844706]  ? __pfx_kthread+0x10/0x10
[   14.844726]  ret_from_fork_asm+0x1a/0x30
[   14.844758]  </TASK>
[   14.844768] 
[   14.852942] Allocated by task 279:
[   14.853072]  kasan_save_stack+0x45/0x70
[   14.853214]  kasan_save_track+0x18/0x40
[   14.853406]  kasan_save_alloc_info+0x3b/0x50
[   14.853690]  __kasan_kmalloc+0xb7/0xc0
[   14.854039]  __kmalloc_cache_noprof+0x189/0x420
[   14.854197]  kasan_bitops_generic+0x92/0x1c0
[   14.854345]  kunit_try_run_case+0x1a5/0x480
[   14.854571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.854838]  kthread+0x337/0x6f0
[   14.855010]  ret_from_fork+0x116/0x1d0
[   14.855202]  ret_from_fork_asm+0x1a/0x30
[   14.855398] 
[   14.855481] The buggy address belongs to the object at ffff8881026260e0
[   14.855481]  which belongs to the cache kmalloc-16 of size 16
[   14.855924] The buggy address is located 8 bytes inside of
[   14.855924]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.856452] 
[   14.856543] The buggy address belongs to the physical page:
[   14.856749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.857096] flags: 0x200000000000000(node=0|zone=2)
[   14.857301] page_type: f5(slab)
[   14.857461] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.857778] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.858120] page dumped because: kasan: bad access detected
[   14.858296] 
[   14.858370] Memory state around the buggy address:
[   14.858525]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.858751]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.859024] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.859347]                                                           ^
[   14.859816]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.860051]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.860262] ==================================================================
[   14.772204] ==================================================================
[   14.772537] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.772965] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.773283] 
[   14.773388] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.773430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.773441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.773460] Call Trace:
[   14.773475]  <TASK>
[   14.773489]  dump_stack_lvl+0x73/0xb0
[   14.773517]  print_report+0xd1/0x650
[   14.773539]  ? __virt_addr_valid+0x1db/0x2d0
[   14.773562]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.773592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.773626]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.773655]  kasan_report+0x141/0x180
[   14.773676]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.773714]  kasan_check_range+0x10c/0x1c0
[   14.773738]  __kasan_check_write+0x18/0x20
[   14.773757]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.773787]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.773845]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.773869]  ? trace_hardirqs_on+0x37/0xe0
[   14.773910]  ? kasan_bitops_generic+0x92/0x1c0
[   14.773938]  kasan_bitops_generic+0x121/0x1c0
[   14.773962]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.773985]  ? trace_hardirqs_on+0x37/0xe0
[   14.774007]  ? __pfx_read_tsc+0x10/0x10
[   14.774028]  ? ktime_get_ts64+0x86/0x230
[   14.774051]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.774077]  kunit_try_run_case+0x1a5/0x480
[   14.774101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.774126]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.774151]  ? __kthread_parkme+0x82/0x180
[   14.774171]  ? preempt_count_sub+0x50/0x80
[   14.774196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.774238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.774262]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.774288]  kthread+0x337/0x6f0
[   14.774306]  ? trace_preempt_on+0x20/0xc0
[   14.774328]  ? __pfx_kthread+0x10/0x10
[   14.774350]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.774373]  ? calculate_sigpending+0x7b/0xa0
[   14.774397]  ? __pfx_kthread+0x10/0x10
[   14.774438]  ret_from_fork+0x116/0x1d0
[   14.774456]  ? __pfx_kthread+0x10/0x10
[   14.774477]  ret_from_fork_asm+0x1a/0x30
[   14.774509]  </TASK>
[   14.774518] 
[   14.783026] Allocated by task 279:
[   14.783267]  kasan_save_stack+0x45/0x70
[   14.783483]  kasan_save_track+0x18/0x40
[   14.783692]  kasan_save_alloc_info+0x3b/0x50
[   14.784118]  __kasan_kmalloc+0xb7/0xc0
[   14.784302]  __kmalloc_cache_noprof+0x189/0x420
[   14.784521]  kasan_bitops_generic+0x92/0x1c0
[   14.784738]  kunit_try_run_case+0x1a5/0x480
[   14.784942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.785188]  kthread+0x337/0x6f0
[   14.785351]  ret_from_fork+0x116/0x1d0
[   14.785556]  ret_from_fork_asm+0x1a/0x30
[   14.785761] 
[   14.785857] The buggy address belongs to the object at ffff8881026260e0
[   14.785857]  which belongs to the cache kmalloc-16 of size 16
[   14.786339] The buggy address is located 8 bytes inside of
[   14.786339]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.786944] 
[   14.787015] The buggy address belongs to the physical page:
[   14.787201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.787614] flags: 0x200000000000000(node=0|zone=2)
[   14.787843] page_type: f5(slab)
[   14.788007] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.788323] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.788659] page dumped because: kasan: bad access detected
[   14.788926] 
[   14.788999] Memory state around the buggy address:
[   14.789215]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.789507]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.789797] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.790095]                                                           ^
[   14.790362]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.790673]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.790969] ==================================================================
[   14.753428] ==================================================================
[   14.753803] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.754070] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.754352] 
[   14.754484] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.754527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.754539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.754559] Call Trace:
[   14.754575]  <TASK>
[   14.754590]  dump_stack_lvl+0x73/0xb0
[   14.754630]  print_report+0xd1/0x650
[   14.754652]  ? __virt_addr_valid+0x1db/0x2d0
[   14.754674]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.754703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.754725]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.754755]  kasan_report+0x141/0x180
[   14.754797]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.754831]  kasan_check_range+0x10c/0x1c0
[   14.754854]  __kasan_check_write+0x18/0x20
[   14.754874]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.754902]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.754933]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.754974]  ? trace_hardirqs_on+0x37/0xe0
[   14.754996]  ? kasan_bitops_generic+0x92/0x1c0
[   14.755024]  kasan_bitops_generic+0x121/0x1c0
[   14.755048]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.755071]  ? trace_hardirqs_on+0x37/0xe0
[   14.755093]  ? __pfx_read_tsc+0x10/0x10
[   14.755130]  ? ktime_get_ts64+0x86/0x230
[   14.755152]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.755179]  kunit_try_run_case+0x1a5/0x480
[   14.755203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.755228]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.755253]  ? __kthread_parkme+0x82/0x180
[   14.755273]  ? preempt_count_sub+0x50/0x80
[   14.755316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.755341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.755378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.755417]  kthread+0x337/0x6f0
[   14.755449]  ? trace_preempt_on+0x20/0xc0
[   14.755484]  ? __pfx_kthread+0x10/0x10
[   14.755518]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.755552]  ? calculate_sigpending+0x7b/0xa0
[   14.755589]  ? __pfx_kthread+0x10/0x10
[   14.755634]  ret_from_fork+0x116/0x1d0
[   14.755666]  ? __pfx_kthread+0x10/0x10
[   14.755686]  ret_from_fork_asm+0x1a/0x30
[   14.755718]  </TASK>
[   14.755729] 
[   14.763769] Allocated by task 279:
[   14.763893]  kasan_save_stack+0x45/0x70
[   14.764031]  kasan_save_track+0x18/0x40
[   14.764161]  kasan_save_alloc_info+0x3b/0x50
[   14.764305]  __kasan_kmalloc+0xb7/0xc0
[   14.764433]  __kmalloc_cache_noprof+0x189/0x420
[   14.764664]  kasan_bitops_generic+0x92/0x1c0
[   14.764898]  kunit_try_run_case+0x1a5/0x480
[   14.765145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.765394]  kthread+0x337/0x6f0
[   14.765641]  ret_from_fork+0x116/0x1d0
[   14.765849]  ret_from_fork_asm+0x1a/0x30
[   14.766060] 
[   14.766154] The buggy address belongs to the object at ffff8881026260e0
[   14.766154]  which belongs to the cache kmalloc-16 of size 16
[   14.766680] The buggy address is located 8 bytes inside of
[   14.766680]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.767092] 
[   14.767181] The buggy address belongs to the physical page:
[   14.767442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.767835] flags: 0x200000000000000(node=0|zone=2)
[   14.768063] page_type: f5(slab)
[   14.768233] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.768559] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.768869] page dumped because: kasan: bad access detected
[   14.769105] 
[   14.769186] Memory state around the buggy address:
[   14.769399]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.769722]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.770044] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.770313]                                                           ^
[   14.770657]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.770959]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.771286] ==================================================================
[   14.813709] ==================================================================
[   14.814490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.815304] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.815782] 
[   14.815875] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.815921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.815933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.815954] Call Trace:
[   14.815972]  <TASK>
[   14.815988]  dump_stack_lvl+0x73/0xb0
[   14.816019]  print_report+0xd1/0x650
[   14.816042]  ? __virt_addr_valid+0x1db/0x2d0
[   14.816066]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.816095]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.816118]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.816147]  kasan_report+0x141/0x180
[   14.816169]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.816203]  kasan_check_range+0x10c/0x1c0
[   14.816227]  __kasan_check_write+0x18/0x20
[   14.816247]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.816276]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.816306]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.816331]  ? trace_hardirqs_on+0x37/0xe0
[   14.816354]  ? kasan_bitops_generic+0x92/0x1c0
[   14.816382]  kasan_bitops_generic+0x121/0x1c0
[   14.816406]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.816429]  ? trace_hardirqs_on+0x37/0xe0
[   14.816451]  ? __pfx_read_tsc+0x10/0x10
[   14.816472]  ? ktime_get_ts64+0x86/0x230
[   14.816494]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.816554]  kunit_try_run_case+0x1a5/0x480
[   14.816579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.816636]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.816663]  ? __kthread_parkme+0x82/0x180
[   14.816684]  ? preempt_count_sub+0x50/0x80
[   14.816708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.816733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.816758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.816783]  kthread+0x337/0x6f0
[   14.816802]  ? trace_preempt_on+0x20/0xc0
[   14.816824]  ? __pfx_kthread+0x10/0x10
[   14.816845]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.816898]  ? calculate_sigpending+0x7b/0xa0
[   14.816923]  ? __pfx_kthread+0x10/0x10
[   14.816955]  ret_from_fork+0x116/0x1d0
[   14.816973]  ? __pfx_kthread+0x10/0x10
[   14.816993]  ret_from_fork_asm+0x1a/0x30
[   14.817026]  </TASK>
[   14.817036] 
[   14.831110] Allocated by task 279:
[   14.831623]  kasan_save_stack+0x45/0x70
[   14.832172]  kasan_save_track+0x18/0x40
[   14.832720]  kasan_save_alloc_info+0x3b/0x50
[   14.833152]  __kasan_kmalloc+0xb7/0xc0
[   14.833423]  __kmalloc_cache_noprof+0x189/0x420
[   14.833910]  kasan_bitops_generic+0x92/0x1c0
[   14.834427]  kunit_try_run_case+0x1a5/0x480
[   14.834889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.835110]  kthread+0x337/0x6f0
[   14.835642]  ret_from_fork+0x116/0x1d0
[   14.836096]  ret_from_fork_asm+0x1a/0x30
[   14.836241] 
[   14.836313] The buggy address belongs to the object at ffff8881026260e0
[   14.836313]  which belongs to the cache kmalloc-16 of size 16
[   14.836733] The buggy address is located 8 bytes inside of
[   14.836733]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.837364] 
[   14.837467] The buggy address belongs to the physical page:
[   14.838046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.838428] flags: 0x200000000000000(node=0|zone=2)
[   14.838666] page_type: f5(slab)
[   14.838880] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.839162] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.839468] page dumped because: kasan: bad access detected
[   14.839715] 
[   14.839810] Memory state around the buggy address:
[   14.839979]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.840278]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.840558] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.840877]                                                           ^
[   14.841112]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.841406]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.841662] ==================================================================
[   14.880513] ==================================================================
[   14.880875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.881254] Read of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.881541] 
[   14.881662] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.881708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.881719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.881739] Call Trace:
[   14.881751]  <TASK>
[   14.881767]  dump_stack_lvl+0x73/0xb0
[   14.881796]  print_report+0xd1/0x650
[   14.881819]  ? __virt_addr_valid+0x1db/0x2d0
[   14.881841]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.881870]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.881893]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.881923]  kasan_report+0x141/0x180
[   14.881945]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.881979]  __asan_report_load8_noabort+0x18/0x20
[   14.882005]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.882034]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.882065]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.882090]  ? trace_hardirqs_on+0x37/0xe0
[   14.882112]  ? kasan_bitops_generic+0x92/0x1c0
[   14.882140]  kasan_bitops_generic+0x121/0x1c0
[   14.882164]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.882188]  ? trace_hardirqs_on+0x37/0xe0
[   14.882210]  ? __pfx_read_tsc+0x10/0x10
[   14.882231]  ? ktime_get_ts64+0x86/0x230
[   14.882253]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.882280]  kunit_try_run_case+0x1a5/0x480
[   14.882304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.882329]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.882354]  ? __kthread_parkme+0x82/0x180
[   14.882375]  ? preempt_count_sub+0x50/0x80
[   14.882398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.882423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.882448]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.882473]  kthread+0x337/0x6f0
[   14.882492]  ? trace_preempt_on+0x20/0xc0
[   14.882515]  ? __pfx_kthread+0x10/0x10
[   14.882535]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.882557]  ? calculate_sigpending+0x7b/0xa0
[   14.882582]  ? __pfx_kthread+0x10/0x10
[   14.882612]  ret_from_fork+0x116/0x1d0
[   14.882631]  ? __pfx_kthread+0x10/0x10
[   14.882651]  ret_from_fork_asm+0x1a/0x30
[   14.882683]  </TASK>
[   14.882703] 
[   14.890702] Allocated by task 279:
[   14.890836]  kasan_save_stack+0x45/0x70
[   14.891034]  kasan_save_track+0x18/0x40
[   14.891239]  kasan_save_alloc_info+0x3b/0x50
[   14.891456]  __kasan_kmalloc+0xb7/0xc0
[   14.891659]  __kmalloc_cache_noprof+0x189/0x420
[   14.891891]  kasan_bitops_generic+0x92/0x1c0
[   14.892108]  kunit_try_run_case+0x1a5/0x480
[   14.892316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.892573]  kthread+0x337/0x6f0
[   14.892700]  ret_from_fork+0x116/0x1d0
[   14.892831]  ret_from_fork_asm+0x1a/0x30
[   14.892968] 
[   14.893059] The buggy address belongs to the object at ffff8881026260e0
[   14.893059]  which belongs to the cache kmalloc-16 of size 16
[   14.893654] The buggy address is located 8 bytes inside of
[   14.893654]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.894157] 
[   14.894248] The buggy address belongs to the physical page:
[   14.894419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.894845] flags: 0x200000000000000(node=0|zone=2)
[   14.895075] page_type: f5(slab)
[   14.895188] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.895405] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.896057] page dumped because: kasan: bad access detected
[   14.896239] 
[   14.896306] Memory state around the buggy address:
[   14.896457]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.897051]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.897327] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.897673]                                                           ^
[   14.897939]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.898243]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.899551] ==================================================================
[   14.791656] ==================================================================
[   14.792171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.792522] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.792815] 
[   14.792904] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.792949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.792960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.792983] Call Trace:
[   14.793001]  <TASK>
[   14.793019]  dump_stack_lvl+0x73/0xb0
[   14.793049]  print_report+0xd1/0x650
[   14.793071]  ? __virt_addr_valid+0x1db/0x2d0
[   14.793095]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.793124]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.793147]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.793176]  kasan_report+0x141/0x180
[   14.793197]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.793231]  kasan_check_range+0x10c/0x1c0
[   14.793255]  __kasan_check_write+0x18/0x20
[   14.793274]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.793303]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.793334]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.793358]  ? trace_hardirqs_on+0x37/0xe0
[   14.793381]  ? kasan_bitops_generic+0x92/0x1c0
[   14.793409]  kasan_bitops_generic+0x121/0x1c0
[   14.793432]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.793456]  ? trace_hardirqs_on+0x37/0xe0
[   14.793478]  ? __pfx_read_tsc+0x10/0x10
[   14.793499]  ? ktime_get_ts64+0x86/0x230
[   14.793522]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.793549]  kunit_try_run_case+0x1a5/0x480
[   14.793573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.793608]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.793635]  ? __kthread_parkme+0x82/0x180
[   14.793655]  ? preempt_count_sub+0x50/0x80
[   14.793680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.793709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.793733]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.793759]  kthread+0x337/0x6f0
[   14.793778]  ? trace_preempt_on+0x20/0xc0
[   14.793801]  ? __pfx_kthread+0x10/0x10
[   14.793821]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.793842]  ? calculate_sigpending+0x7b/0xa0
[   14.793867]  ? __pfx_kthread+0x10/0x10
[   14.793888]  ret_from_fork+0x116/0x1d0
[   14.793906]  ? __pfx_kthread+0x10/0x10
[   14.793927]  ret_from_fork_asm+0x1a/0x30
[   14.793959]  </TASK>
[   14.793970] 
[   14.802052] Allocated by task 279:
[   14.802237]  kasan_save_stack+0x45/0x70
[   14.802437]  kasan_save_track+0x18/0x40
[   14.802802]  kasan_save_alloc_info+0x3b/0x50
[   14.803012]  __kasan_kmalloc+0xb7/0xc0
[   14.803197]  __kmalloc_cache_noprof+0x189/0x420
[   14.803418]  kasan_bitops_generic+0x92/0x1c0
[   14.803729]  kunit_try_run_case+0x1a5/0x480
[   14.803891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.804067]  kthread+0x337/0x6f0
[   14.804186]  ret_from_fork+0x116/0x1d0
[   14.804322]  ret_from_fork_asm+0x1a/0x30
[   14.804464] 
[   14.805545] The buggy address belongs to the object at ffff8881026260e0
[   14.805545]  which belongs to the cache kmalloc-16 of size 16
[   14.806120] The buggy address is located 8 bytes inside of
[   14.806120]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.807082] 
[   14.807188] The buggy address belongs to the physical page:
[   14.807865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.808475] flags: 0x200000000000000(node=0|zone=2)
[   14.808856] page_type: f5(slab)
[   14.809230] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.809766] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.810169] page dumped because: kasan: bad access detected
[   14.810401] 
[   14.810493] Memory state around the buggy address:
[   14.810962]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.811450]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.811778] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.812077]                                                           ^
[   14.812353]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.812875]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.813110] ==================================================================
[   14.712084] ==================================================================
[   14.712943] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.713801] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.714172] 
[   14.714309] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.714355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.714366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.714387] Call Trace:
[   14.714405]  <TASK>
[   14.714444]  dump_stack_lvl+0x73/0xb0
[   14.714475]  print_report+0xd1/0x650
[   14.714498]  ? __virt_addr_valid+0x1db/0x2d0
[   14.714522]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.714551]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.714585]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.714625]  kasan_report+0x141/0x180
[   14.714664]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.714699]  kasan_check_range+0x10c/0x1c0
[   14.714722]  __kasan_check_write+0x18/0x20
[   14.714742]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.714770]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.714800]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.714826]  ? trace_hardirqs_on+0x37/0xe0
[   14.714848]  ? kasan_bitops_generic+0x92/0x1c0
[   14.714877]  kasan_bitops_generic+0x121/0x1c0
[   14.714901]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.714925]  ? trace_hardirqs_on+0x37/0xe0
[   14.714946]  ? __pfx_read_tsc+0x10/0x10
[   14.714966]  ? ktime_get_ts64+0x86/0x230
[   14.714988]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.715016]  kunit_try_run_case+0x1a5/0x480
[   14.715041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.715066]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.715091]  ? __kthread_parkme+0x82/0x180
[   14.715112]  ? preempt_count_sub+0x50/0x80
[   14.715136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.715161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.715186]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.715210]  kthread+0x337/0x6f0
[   14.715229]  ? trace_preempt_on+0x20/0xc0
[   14.715251]  ? __pfx_kthread+0x10/0x10
[   14.715272]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.715293]  ? calculate_sigpending+0x7b/0xa0
[   14.715318]  ? __pfx_kthread+0x10/0x10
[   14.715338]  ret_from_fork+0x116/0x1d0
[   14.715356]  ? __pfx_kthread+0x10/0x10
[   14.715376]  ret_from_fork_asm+0x1a/0x30
[   14.715408]  </TASK>
[   14.715418] 
[   14.724317] Allocated by task 279:
[   14.724497]  kasan_save_stack+0x45/0x70
[   14.724702]  kasan_save_track+0x18/0x40
[   14.724892]  kasan_save_alloc_info+0x3b/0x50
[   14.725125]  __kasan_kmalloc+0xb7/0xc0
[   14.725269]  __kmalloc_cache_noprof+0x189/0x420
[   14.725420]  kasan_bitops_generic+0x92/0x1c0
[   14.725562]  kunit_try_run_case+0x1a5/0x480
[   14.725716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.725980]  kthread+0x337/0x6f0
[   14.726150]  ret_from_fork+0x116/0x1d0
[   14.726358]  ret_from_fork_asm+0x1a/0x30
[   14.726680] 
[   14.726804] The buggy address belongs to the object at ffff8881026260e0
[   14.726804]  which belongs to the cache kmalloc-16 of size 16
[   14.727396] The buggy address is located 8 bytes inside of
[   14.727396]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.727962] 
[   14.728055] The buggy address belongs to the physical page:
[   14.728296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.728818] flags: 0x200000000000000(node=0|zone=2)
[   14.729050] page_type: f5(slab)
[   14.729190] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.729486] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.729847] page dumped because: kasan: bad access detected
[   14.730042] 
[   14.730108] Memory state around the buggy address:
[   14.730255]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.730459]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.730673] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.731019]                                                           ^
[   14.731333]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.731708]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.732041] ==================================================================