Hay
Date
July 17, 2025, 11:11 p.m.

Environment
qemu-x86_64

[   14.635924] ==================================================================
[   14.636290] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.636674] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.636920] 
[   14.637005] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.637047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.637068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.637089] Call Trace:
[   14.637106]  <TASK>
[   14.637121]  dump_stack_lvl+0x73/0xb0
[   14.637148]  print_report+0xd1/0x610
[   14.637170]  ? __virt_addr_valid+0x1db/0x2d0
[   14.637192]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.637219]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.637242]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.637271]  kasan_report+0x141/0x180
[   14.637292]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.637326]  kasan_check_range+0x10c/0x1c0
[   14.637349]  __kasan_check_write+0x18/0x20
[   14.637368]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.637396]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.637425]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.637448]  ? trace_hardirqs_on+0x37/0xe0
[   14.637470]  ? kasan_bitops_generic+0x92/0x1c0
[   14.637498]  kasan_bitops_generic+0x121/0x1c0
[   14.637521]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.637545]  ? __pfx_read_tsc+0x10/0x10
[   14.637566]  ? ktime_get_ts64+0x86/0x230
[   14.637610]  kunit_try_run_case+0x1a5/0x480
[   14.637635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.637656]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.637680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.637703]  ? __kthread_parkme+0x82/0x180
[   14.637723]  ? preempt_count_sub+0x50/0x80
[   14.637749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.637773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.637797]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.637820]  kthread+0x337/0x6f0
[   14.637839]  ? trace_preempt_on+0x20/0xc0
[   14.637861]  ? __pfx_kthread+0x10/0x10
[   14.637881]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.637902]  ? calculate_sigpending+0x7b/0xa0
[   14.637926]  ? __pfx_kthread+0x10/0x10
[   14.637948]  ret_from_fork+0x116/0x1d0
[   14.637966]  ? __pfx_kthread+0x10/0x10
[   14.637986]  ret_from_fork_asm+0x1a/0x30
[   14.638019]  </TASK>
[   14.638029] 
[   14.646136] Allocated by task 278:
[   14.646286]  kasan_save_stack+0x45/0x70
[   14.646469]  kasan_save_track+0x18/0x40
[   14.646631]  kasan_save_alloc_info+0x3b/0x50
[   14.646782]  __kasan_kmalloc+0xb7/0xc0
[   14.646912]  __kmalloc_cache_noprof+0x189/0x420
[   14.647145]  kasan_bitops_generic+0x92/0x1c0
[   14.647362]  kunit_try_run_case+0x1a5/0x480
[   14.647595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.647866]  kthread+0x337/0x6f0
[   14.648043]  ret_from_fork+0x116/0x1d0
[   14.648192]  ret_from_fork_asm+0x1a/0x30
[   14.648393] 
[   14.648481] The buggy address belongs to the object at ffff8881025ee360
[   14.648481]  which belongs to the cache kmalloc-16 of size 16
[   14.648982] The buggy address is located 8 bytes inside of
[   14.648982]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.649459] 
[   14.649556] The buggy address belongs to the physical page:
[   14.649799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.650134] flags: 0x200000000000000(node=0|zone=2)
[   14.650357] page_type: f5(slab)
[   14.650511] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.650838] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.651136] page dumped because: kasan: bad access detected
[   14.651309] 
[   14.651377] Memory state around the buggy address:
[   14.651534]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.651774]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.652035] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.652352]                                                           ^
[   14.652665]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.652983]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.653307] ==================================================================
[   14.580241] ==================================================================
[   14.580602] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.581136] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.581424] 
[   14.581508] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.581551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.581562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.581583] Call Trace:
[   14.581598]  <TASK>
[   14.581613]  dump_stack_lvl+0x73/0xb0
[   14.581641]  print_report+0xd1/0x610
[   14.581663]  ? __virt_addr_valid+0x1db/0x2d0
[   14.581685]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.581714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.581737]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.581765]  kasan_report+0x141/0x180
[   14.581788]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.581821]  kasan_check_range+0x10c/0x1c0
[   14.581845]  __kasan_check_write+0x18/0x20
[   14.581863]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.581891]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.581922]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.581945]  ? trace_hardirqs_on+0x37/0xe0
[   14.581967]  ? kasan_bitops_generic+0x92/0x1c0
[   14.581995]  kasan_bitops_generic+0x121/0x1c0
[   14.582019]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.582068]  ? __pfx_read_tsc+0x10/0x10
[   14.582088]  ? ktime_get_ts64+0x86/0x230
[   14.582113]  kunit_try_run_case+0x1a5/0x480
[   14.582138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.582160]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.582184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.582213]  ? __kthread_parkme+0x82/0x180
[   14.582232]  ? preempt_count_sub+0x50/0x80
[   14.582256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.582280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.582303]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.582328]  kthread+0x337/0x6f0
[   14.582347]  ? trace_preempt_on+0x20/0xc0
[   14.582369]  ? __pfx_kthread+0x10/0x10
[   14.582389]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.582410]  ? calculate_sigpending+0x7b/0xa0
[   14.582434]  ? __pfx_kthread+0x10/0x10
[   14.582455]  ret_from_fork+0x116/0x1d0
[   14.582473]  ? __pfx_kthread+0x10/0x10
[   14.582493]  ret_from_fork_asm+0x1a/0x30
[   14.582526]  </TASK>
[   14.582537] 
[   14.591082] Allocated by task 278:
[   14.591225]  kasan_save_stack+0x45/0x70
[   14.591370]  kasan_save_track+0x18/0x40
[   14.591528]  kasan_save_alloc_info+0x3b/0x50
[   14.591936]  __kasan_kmalloc+0xb7/0xc0
[   14.592124]  __kmalloc_cache_noprof+0x189/0x420
[   14.592320]  kasan_bitops_generic+0x92/0x1c0
[   14.592471]  kunit_try_run_case+0x1a5/0x480
[   14.592646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.592916]  kthread+0x337/0x6f0
[   14.593093]  ret_from_fork+0x116/0x1d0
[   14.593227]  ret_from_fork_asm+0x1a/0x30
[   14.593368] 
[   14.593452] The buggy address belongs to the object at ffff8881025ee360
[   14.593452]  which belongs to the cache kmalloc-16 of size 16
[   14.594253] The buggy address is located 8 bytes inside of
[   14.594253]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.594655] 
[   14.594751] The buggy address belongs to the physical page:
[   14.595005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.595362] flags: 0x200000000000000(node=0|zone=2)
[   14.595578] page_type: f5(slab)
[   14.595751] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.596088] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.596377] page dumped because: kasan: bad access detected
[   14.596580] 
[   14.596648] Memory state around the buggy address:
[   14.596804]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.597025]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.597347] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.597662]                                                           ^
[   14.597958]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.598270]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.598486] ==================================================================
[   14.561443] ==================================================================
[   14.561843] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.562359] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.562785] 
[   14.562902] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.563110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.563123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.563143] Call Trace:
[   14.563159]  <TASK>
[   14.563175]  dump_stack_lvl+0x73/0xb0
[   14.563205]  print_report+0xd1/0x610
[   14.563228]  ? __virt_addr_valid+0x1db/0x2d0
[   14.563251]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.563279]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.563301]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.563329]  kasan_report+0x141/0x180
[   14.563351]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.563384]  kasan_check_range+0x10c/0x1c0
[   14.563408]  __kasan_check_write+0x18/0x20
[   14.563427]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.563455]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.563484]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.563508]  ? trace_hardirqs_on+0x37/0xe0
[   14.563530]  ? kasan_bitops_generic+0x92/0x1c0
[   14.563558]  kasan_bitops_generic+0x121/0x1c0
[   14.563581]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.563607]  ? __pfx_read_tsc+0x10/0x10
[   14.563627]  ? ktime_get_ts64+0x86/0x230
[   14.563654]  kunit_try_run_case+0x1a5/0x480
[   14.563682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.563706]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.563730]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.563754]  ? __kthread_parkme+0x82/0x180
[   14.563774]  ? preempt_count_sub+0x50/0x80
[   14.563799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.563823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.563847]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.563871]  kthread+0x337/0x6f0
[   14.563890]  ? trace_preempt_on+0x20/0xc0
[   14.563911]  ? __pfx_kthread+0x10/0x10
[   14.563930]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.563952]  ? calculate_sigpending+0x7b/0xa0
[   14.563976]  ? __pfx_kthread+0x10/0x10
[   14.563997]  ret_from_fork+0x116/0x1d0
[   14.564015]  ? __pfx_kthread+0x10/0x10
[   14.564035]  ret_from_fork_asm+0x1a/0x30
[   14.564078]  </TASK>
[   14.564087] 
[   14.572025] Allocated by task 278:
[   14.572219]  kasan_save_stack+0x45/0x70
[   14.572413]  kasan_save_track+0x18/0x40
[   14.572579]  kasan_save_alloc_info+0x3b/0x50
[   14.572729]  __kasan_kmalloc+0xb7/0xc0
[   14.572861]  __kmalloc_cache_noprof+0x189/0x420
[   14.573015]  kasan_bitops_generic+0x92/0x1c0
[   14.573253]  kunit_try_run_case+0x1a5/0x480
[   14.573461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.573997]  kthread+0x337/0x6f0
[   14.574171]  ret_from_fork+0x116/0x1d0
[   14.574361]  ret_from_fork_asm+0x1a/0x30
[   14.574530] 
[   14.574623] The buggy address belongs to the object at ffff8881025ee360
[   14.574623]  which belongs to the cache kmalloc-16 of size 16
[   14.575100] The buggy address is located 8 bytes inside of
[   14.575100]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.575453] 
[   14.575525] The buggy address belongs to the physical page:
[   14.575780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.576141] flags: 0x200000000000000(node=0|zone=2)
[   14.576378] page_type: f5(slab)
[   14.576554] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.576910] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.577189] page dumped because: kasan: bad access detected
[   14.577362] 
[   14.577430] Memory state around the buggy address:
[   14.577644]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.578000]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.578361] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.578722]                                                           ^
[   14.578947]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.579172]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.579398] ==================================================================
[   14.519088] ==================================================================
[   14.519398] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.519853] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.520607] 
[   14.520724] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.520769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.520780] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.520802] Call Trace:
[   14.520820]  <TASK>
[   14.520838]  dump_stack_lvl+0x73/0xb0
[   14.520867]  print_report+0xd1/0x610
[   14.520889]  ? __virt_addr_valid+0x1db/0x2d0
[   14.520912]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.520939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.520961]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.520990]  kasan_report+0x141/0x180
[   14.521011]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.521045]  kasan_check_range+0x10c/0x1c0
[   14.521081]  __kasan_check_write+0x18/0x20
[   14.521099]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.521127]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.521156]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.521181]  ? trace_hardirqs_on+0x37/0xe0
[   14.521204]  ? kasan_bitops_generic+0x92/0x1c0
[   14.521231]  kasan_bitops_generic+0x121/0x1c0
[   14.521254]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.521278]  ? __pfx_read_tsc+0x10/0x10
[   14.521298]  ? ktime_get_ts64+0x86/0x230
[   14.521322]  kunit_try_run_case+0x1a5/0x480
[   14.521347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.521369]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.521393]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.521416]  ? __kthread_parkme+0x82/0x180
[   14.521436]  ? preempt_count_sub+0x50/0x80
[   14.521461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.521484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.521508]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.521531]  kthread+0x337/0x6f0
[   14.521549]  ? trace_preempt_on+0x20/0xc0
[   14.521580]  ? __pfx_kthread+0x10/0x10
[   14.521659]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.521681]  ? calculate_sigpending+0x7b/0xa0
[   14.521706]  ? __pfx_kthread+0x10/0x10
[   14.521727]  ret_from_fork+0x116/0x1d0
[   14.521745]  ? __pfx_kthread+0x10/0x10
[   14.521764]  ret_from_fork_asm+0x1a/0x30
[   14.521796]  </TASK>
[   14.521805] 
[   14.531419] Allocated by task 278:
[   14.531562]  kasan_save_stack+0x45/0x70
[   14.532001]  kasan_save_track+0x18/0x40
[   14.532274]  kasan_save_alloc_info+0x3b/0x50
[   14.532454]  __kasan_kmalloc+0xb7/0xc0
[   14.532771]  __kmalloc_cache_noprof+0x189/0x420
[   14.532977]  kasan_bitops_generic+0x92/0x1c0
[   14.533193]  kunit_try_run_case+0x1a5/0x480
[   14.533383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.533614]  kthread+0x337/0x6f0
[   14.534007]  ret_from_fork+0x116/0x1d0
[   14.534166]  ret_from_fork_asm+0x1a/0x30
[   14.534439] 
[   14.534603] The buggy address belongs to the object at ffff8881025ee360
[   14.534603]  which belongs to the cache kmalloc-16 of size 16
[   14.535223] The buggy address is located 8 bytes inside of
[   14.535223]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.535924] 
[   14.536006] The buggy address belongs to the physical page:
[   14.536252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.536832] flags: 0x200000000000000(node=0|zone=2)
[   14.537064] page_type: f5(slab)
[   14.537201] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.537587] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.537951] page dumped because: kasan: bad access detected
[   14.538189] 
[   14.538277] Memory state around the buggy address:
[   14.538465]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.538780]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.539099] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.539478]                                                           ^
[   14.539705]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.539993]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.540259] ==================================================================
[   14.671656] ==================================================================
[   14.672044] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.672460] Read of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.672826] 
[   14.672940] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.672981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.672993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.673014] Call Trace:
[   14.673028]  <TASK>
[   14.673043]  dump_stack_lvl+0x73/0xb0
[   14.673080]  print_report+0xd1/0x610
[   14.673103]  ? __virt_addr_valid+0x1db/0x2d0
[   14.673125]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.673152]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.673175]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.673206]  kasan_report+0x141/0x180
[   14.673228]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.673263]  __asan_report_load8_noabort+0x18/0x20
[   14.673287]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.673316]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.673344]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.673368]  ? trace_hardirqs_on+0x37/0xe0
[   14.673390]  ? kasan_bitops_generic+0x92/0x1c0
[   14.673418]  kasan_bitops_generic+0x121/0x1c0
[   14.673441]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.673466]  ? __pfx_read_tsc+0x10/0x10
[   14.673486]  ? ktime_get_ts64+0x86/0x230
[   14.673510]  kunit_try_run_case+0x1a5/0x480
[   14.673535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.673559]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.673610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.673634]  ? __kthread_parkme+0x82/0x180
[   14.673653]  ? preempt_count_sub+0x50/0x80
[   14.673678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.673701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.673725]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.673749]  kthread+0x337/0x6f0
[   14.673767]  ? trace_preempt_on+0x20/0xc0
[   14.673789]  ? __pfx_kthread+0x10/0x10
[   14.673809]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.673830]  ? calculate_sigpending+0x7b/0xa0
[   14.673854]  ? __pfx_kthread+0x10/0x10
[   14.673875]  ret_from_fork+0x116/0x1d0
[   14.673893]  ? __pfx_kthread+0x10/0x10
[   14.673912]  ret_from_fork_asm+0x1a/0x30
[   14.673945]  </TASK>
[   14.673955] 
[   14.681516] Allocated by task 278:
[   14.681666]  kasan_save_stack+0x45/0x70
[   14.681812]  kasan_save_track+0x18/0x40
[   14.682007]  kasan_save_alloc_info+0x3b/0x50
[   14.682228]  __kasan_kmalloc+0xb7/0xc0
[   14.682413]  __kmalloc_cache_noprof+0x189/0x420
[   14.682659]  kasan_bitops_generic+0x92/0x1c0
[   14.682872]  kunit_try_run_case+0x1a5/0x480
[   14.683086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.683341]  kthread+0x337/0x6f0
[   14.683511]  ret_from_fork+0x116/0x1d0
[   14.683704]  ret_from_fork_asm+0x1a/0x30
[   14.683844] 
[   14.683914] The buggy address belongs to the object at ffff8881025ee360
[   14.683914]  which belongs to the cache kmalloc-16 of size 16
[   14.684279] The buggy address is located 8 bytes inside of
[   14.684279]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.684824] 
[   14.684922] The buggy address belongs to the physical page:
[   14.685180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.685440] flags: 0x200000000000000(node=0|zone=2)
[   14.685629] page_type: f5(slab)
[   14.685750] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.686067] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.686413] page dumped because: kasan: bad access detected
[   14.686695] 
[   14.686789] Memory state around the buggy address:
[   14.687021]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.687354]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.687670] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.687958]                                                           ^
[   14.688226]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.688462]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.688700] ==================================================================
[   14.653943] ==================================================================
[   14.654207] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.654592] Read of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.654949] 
[   14.655066] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.655107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.655119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.655140] Call Trace:
[   14.655156]  <TASK>
[   14.655172]  dump_stack_lvl+0x73/0xb0
[   14.655200]  print_report+0xd1/0x610
[   14.655221]  ? __virt_addr_valid+0x1db/0x2d0
[   14.655244]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.655271]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.655293]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.655322]  kasan_report+0x141/0x180
[   14.655343]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.655377]  kasan_check_range+0x10c/0x1c0
[   14.655400]  __kasan_check_read+0x15/0x20
[   14.655418]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.655446]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.655475]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.655499]  ? trace_hardirqs_on+0x37/0xe0
[   14.655521]  ? kasan_bitops_generic+0x92/0x1c0
[   14.655548]  kasan_bitops_generic+0x121/0x1c0
[   14.655591]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.655616]  ? __pfx_read_tsc+0x10/0x10
[   14.655636]  ? ktime_get_ts64+0x86/0x230
[   14.655659]  kunit_try_run_case+0x1a5/0x480
[   14.655684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.655705]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.655729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.655753]  ? __kthread_parkme+0x82/0x180
[   14.655772]  ? preempt_count_sub+0x50/0x80
[   14.655795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.655820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.655844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.655868]  kthread+0x337/0x6f0
[   14.655886]  ? trace_preempt_on+0x20/0xc0
[   14.655908]  ? __pfx_kthread+0x10/0x10
[   14.655928]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.655949]  ? calculate_sigpending+0x7b/0xa0
[   14.655972]  ? __pfx_kthread+0x10/0x10
[   14.655993]  ret_from_fork+0x116/0x1d0
[   14.656011]  ? __pfx_kthread+0x10/0x10
[   14.656031]  ret_from_fork_asm+0x1a/0x30
[   14.656071]  </TASK>
[   14.656080] 
[   14.664067] Allocated by task 278:
[   14.664221]  kasan_save_stack+0x45/0x70
[   14.664426]  kasan_save_track+0x18/0x40
[   14.664613]  kasan_save_alloc_info+0x3b/0x50
[   14.664796]  __kasan_kmalloc+0xb7/0xc0
[   14.664976]  __kmalloc_cache_noprof+0x189/0x420
[   14.665176]  kasan_bitops_generic+0x92/0x1c0
[   14.665375]  kunit_try_run_case+0x1a5/0x480
[   14.665551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.665746]  kthread+0x337/0x6f0
[   14.665867]  ret_from_fork+0x116/0x1d0
[   14.665999]  ret_from_fork_asm+0x1a/0x30
[   14.666149] 
[   14.666225] The buggy address belongs to the object at ffff8881025ee360
[   14.666225]  which belongs to the cache kmalloc-16 of size 16
[   14.666602] The buggy address is located 8 bytes inside of
[   14.666602]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.667111] 
[   14.667207] The buggy address belongs to the physical page:
[   14.667456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.667832] flags: 0x200000000000000(node=0|zone=2)
[   14.668073] page_type: f5(slab)
[   14.668241] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.668498] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.668750] page dumped because: kasan: bad access detected
[   14.668922] 
[   14.668990] Memory state around the buggy address:
[   14.669154]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.669372]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.669699] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.670024]                                                           ^
[   14.670329]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.670677]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.670994] ==================================================================
[   14.599188] ==================================================================
[   14.599553] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.600106] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.600436] 
[   14.600545] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.600587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.600598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.600618] Call Trace:
[   14.600637]  <TASK>
[   14.600654]  dump_stack_lvl+0x73/0xb0
[   14.600682]  print_report+0xd1/0x610
[   14.600703]  ? __virt_addr_valid+0x1db/0x2d0
[   14.600725]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.600753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.600776]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.600806]  kasan_report+0x141/0x180
[   14.600828]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.600861]  kasan_check_range+0x10c/0x1c0
[   14.600885]  __kasan_check_write+0x18/0x20
[   14.600904]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.600933]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.600962]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.600985]  ? trace_hardirqs_on+0x37/0xe0
[   14.601007]  ? kasan_bitops_generic+0x92/0x1c0
[   14.601035]  kasan_bitops_generic+0x121/0x1c0
[   14.601071]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.601096]  ? __pfx_read_tsc+0x10/0x10
[   14.601117]  ? ktime_get_ts64+0x86/0x230
[   14.601141]  kunit_try_run_case+0x1a5/0x480
[   14.601165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.601187]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.601211]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.601234]  ? __kthread_parkme+0x82/0x180
[   14.601255]  ? preempt_count_sub+0x50/0x80
[   14.601279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.601303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.601327]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.601351]  kthread+0x337/0x6f0
[   14.601370]  ? trace_preempt_on+0x20/0xc0
[   14.601392]  ? __pfx_kthread+0x10/0x10
[   14.601412]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.601433]  ? calculate_sigpending+0x7b/0xa0
[   14.601457]  ? __pfx_kthread+0x10/0x10
[   14.601478]  ret_from_fork+0x116/0x1d0
[   14.601496]  ? __pfx_kthread+0x10/0x10
[   14.601516]  ret_from_fork_asm+0x1a/0x30
[   14.601548]  </TASK>
[   14.601558] 
[   14.609583] Allocated by task 278:
[   14.609774]  kasan_save_stack+0x45/0x70
[   14.609983]  kasan_save_track+0x18/0x40
[   14.610141]  kasan_save_alloc_info+0x3b/0x50
[   14.610360]  __kasan_kmalloc+0xb7/0xc0
[   14.610521]  __kmalloc_cache_noprof+0x189/0x420
[   14.610756]  kasan_bitops_generic+0x92/0x1c0
[   14.610919]  kunit_try_run_case+0x1a5/0x480
[   14.611140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.611349]  kthread+0x337/0x6f0
[   14.611516]  ret_from_fork+0x116/0x1d0
[   14.611706]  ret_from_fork_asm+0x1a/0x30
[   14.611899] 
[   14.611988] The buggy address belongs to the object at ffff8881025ee360
[   14.611988]  which belongs to the cache kmalloc-16 of size 16
[   14.612417] The buggy address is located 8 bytes inside of
[   14.612417]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.612865] 
[   14.612963] The buggy address belongs to the physical page:
[   14.613225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.613552] flags: 0x200000000000000(node=0|zone=2)
[   14.613750] page_type: f5(slab)
[   14.613919] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.614217] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.614550] page dumped because: kasan: bad access detected
[   14.614814] 
[   14.614894] Memory state around the buggy address:
[   14.615076]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.615292]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.615507] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.615796]                                                           ^
[   14.616095]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.616480]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.616914] ==================================================================
[   14.617368] ==================================================================
[   14.617605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.617999] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.618359] 
[   14.618469] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.618511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.618522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.618544] Call Trace:
[   14.618559]  <TASK>
[   14.618573]  dump_stack_lvl+0x73/0xb0
[   14.618600]  print_report+0xd1/0x610
[   14.618620]  ? __virt_addr_valid+0x1db/0x2d0
[   14.618641]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.618667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.618689]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.618715]  kasan_report+0x141/0x180
[   14.618736]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.618769]  kasan_check_range+0x10c/0x1c0
[   14.618790]  __kasan_check_write+0x18/0x20
[   14.618808]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.618835]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.618863]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.618889]  ? trace_hardirqs_on+0x37/0xe0
[   14.618910]  ? kasan_bitops_generic+0x92/0x1c0
[   14.618937]  kasan_bitops_generic+0x121/0x1c0
[   14.618959]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.618983]  ? __pfx_read_tsc+0x10/0x10
[   14.619003]  ? ktime_get_ts64+0x86/0x230
[   14.619026]  kunit_try_run_case+0x1a5/0x480
[   14.619206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.619237]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.619263]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.619286]  ? __kthread_parkme+0x82/0x180
[   14.619306]  ? preempt_count_sub+0x50/0x80
[   14.619331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.619355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.619378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.619402]  kthread+0x337/0x6f0
[   14.619421]  ? trace_preempt_on+0x20/0xc0
[   14.619443]  ? __pfx_kthread+0x10/0x10
[   14.619463]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.619485]  ? calculate_sigpending+0x7b/0xa0
[   14.619509]  ? __pfx_kthread+0x10/0x10
[   14.619530]  ret_from_fork+0x116/0x1d0
[   14.619548]  ? __pfx_kthread+0x10/0x10
[   14.619589]  ret_from_fork_asm+0x1a/0x30
[   14.619623]  </TASK>
[   14.619632] 
[   14.627466] Allocated by task 278:
[   14.627657]  kasan_save_stack+0x45/0x70
[   14.627801]  kasan_save_track+0x18/0x40
[   14.627937]  kasan_save_alloc_info+0x3b/0x50
[   14.628096]  __kasan_kmalloc+0xb7/0xc0
[   14.628230]  __kmalloc_cache_noprof+0x189/0x420
[   14.628386]  kasan_bitops_generic+0x92/0x1c0
[   14.628535]  kunit_try_run_case+0x1a5/0x480
[   14.628697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.628949]  kthread+0x337/0x6f0
[   14.629126]  ret_from_fork+0x116/0x1d0
[   14.629311]  ret_from_fork_asm+0x1a/0x30
[   14.629504] 
[   14.629622] The buggy address belongs to the object at ffff8881025ee360
[   14.629622]  which belongs to the cache kmalloc-16 of size 16
[   14.630156] The buggy address is located 8 bytes inside of
[   14.630156]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.630711] 
[   14.630805] The buggy address belongs to the physical page:
[   14.631061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.631344] flags: 0x200000000000000(node=0|zone=2)
[   14.631508] page_type: f5(slab)
[   14.631652] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.631888] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.632241] page dumped because: kasan: bad access detected
[   14.632497] 
[   14.632618] Memory state around the buggy address:
[   14.632846]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.633180]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.633498] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.633834]                                                           ^
[   14.634101]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.634382]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.634712] ==================================================================
[   14.541004] ==================================================================
[   14.541371] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.541752] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.542134] 
[   14.542254] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.542297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.542308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.542330] Call Trace:
[   14.542341]  <TASK>
[   14.542357]  dump_stack_lvl+0x73/0xb0
[   14.542385]  print_report+0xd1/0x610
[   14.542407]  ? __virt_addr_valid+0x1db/0x2d0
[   14.542429]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.542457]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.542480]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.542508]  kasan_report+0x141/0x180
[   14.542529]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.542563]  kasan_check_range+0x10c/0x1c0
[   14.542586]  __kasan_check_write+0x18/0x20
[   14.542605]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.542633]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.542662]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.542686]  ? trace_hardirqs_on+0x37/0xe0
[   14.542709]  ? kasan_bitops_generic+0x92/0x1c0
[   14.542736]  kasan_bitops_generic+0x121/0x1c0
[   14.542759]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.542784]  ? __pfx_read_tsc+0x10/0x10
[   14.542804]  ? ktime_get_ts64+0x86/0x230
[   14.542828]  kunit_try_run_case+0x1a5/0x480
[   14.542853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.542874]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.542898]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.542922]  ? __kthread_parkme+0x82/0x180
[   14.542941]  ? preempt_count_sub+0x50/0x80
[   14.542965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.542990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.543013]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.543037]  kthread+0x337/0x6f0
[   14.543066]  ? trace_preempt_on+0x20/0xc0
[   14.543088]  ? __pfx_kthread+0x10/0x10
[   14.543107]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.543128]  ? calculate_sigpending+0x7b/0xa0
[   14.543151]  ? __pfx_kthread+0x10/0x10
[   14.543172]  ret_from_fork+0x116/0x1d0
[   14.543190]  ? __pfx_kthread+0x10/0x10
[   14.543210]  ret_from_fork_asm+0x1a/0x30
[   14.543242]  </TASK>
[   14.543251] 
[   14.551384] Allocated by task 278:
[   14.551569]  kasan_save_stack+0x45/0x70
[   14.551866]  kasan_save_track+0x18/0x40
[   14.552015]  kasan_save_alloc_info+0x3b/0x50
[   14.552234]  __kasan_kmalloc+0xb7/0xc0
[   14.552409]  __kmalloc_cache_noprof+0x189/0x420
[   14.552593]  kasan_bitops_generic+0x92/0x1c0
[   14.552741]  kunit_try_run_case+0x1a5/0x480
[   14.552887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.553133]  kthread+0x337/0x6f0
[   14.553299]  ret_from_fork+0x116/0x1d0
[   14.553497]  ret_from_fork_asm+0x1a/0x30
[   14.553839] 
[   14.553928] The buggy address belongs to the object at ffff8881025ee360
[   14.553928]  which belongs to the cache kmalloc-16 of size 16
[   14.554396] The buggy address is located 8 bytes inside of
[   14.554396]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.554900] 
[   14.554995] The buggy address belongs to the physical page:
[   14.555202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.555444] flags: 0x200000000000000(node=0|zone=2)
[   14.555677] page_type: f5(slab)
[   14.555847] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.556209] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.556552] page dumped because: kasan: bad access detected
[   14.557335] 
[   14.557604] Memory state around the buggy address:
[   14.557779]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.557999]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.558852] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.559170]                                                           ^
[   14.559448]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.559999]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.560306] ==================================================================