Hay
Date
July 18, 2025, 11:11 p.m.

Environment
qemu-x86_64

[   14.431201] ==================================================================
[   14.431657] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.432004] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280
[   14.432292] 
[   14.432434] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.432478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.432489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.432508] Call Trace:
[   14.432524]  <TASK>
[   14.432537]  dump_stack_lvl+0x73/0xb0
[   14.432564]  print_report+0xd1/0x610
[   14.432584]  ? __virt_addr_valid+0x1db/0x2d0
[   14.432606]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.432672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.432694]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.432722]  kasan_report+0x141/0x180
[   14.432744]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.432777]  kasan_check_range+0x10c/0x1c0
[   14.432800]  __kasan_check_write+0x18/0x20
[   14.432818]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.432846]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.432876]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.432898]  ? trace_hardirqs_on+0x37/0xe0
[   14.432920]  ? kasan_bitops_generic+0x92/0x1c0
[   14.432947]  kasan_bitops_generic+0x121/0x1c0
[   14.432978]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.433003]  ? __pfx_read_tsc+0x10/0x10
[   14.433071]  ? ktime_get_ts64+0x86/0x230
[   14.433094]  kunit_try_run_case+0x1a5/0x480
[   14.433118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.433140]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.433165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.433188]  ? __kthread_parkme+0x82/0x180
[   14.433208]  ? preempt_count_sub+0x50/0x80
[   14.433231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.433255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.433279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.433314]  kthread+0x337/0x6f0
[   14.433333]  ? trace_preempt_on+0x20/0xc0
[   14.433355]  ? __pfx_kthread+0x10/0x10
[   14.433375]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.433396]  ? calculate_sigpending+0x7b/0xa0
[   14.433419]  ? __pfx_kthread+0x10/0x10
[   14.433440]  ret_from_fork+0x116/0x1d0
[   14.433458]  ? __pfx_kthread+0x10/0x10
[   14.433478]  ret_from_fork_asm+0x1a/0x30
[   14.433507]  </TASK>
[   14.433517] 
[   14.443484] Allocated by task 280:
[   14.443696]  kasan_save_stack+0x45/0x70
[   14.443903]  kasan_save_track+0x18/0x40
[   14.444206]  kasan_save_alloc_info+0x3b/0x50
[   14.444433]  __kasan_kmalloc+0xb7/0xc0
[   14.444569]  __kmalloc_cache_noprof+0x189/0x420
[   14.444725]  kasan_bitops_generic+0x92/0x1c0
[   14.444874]  kunit_try_run_case+0x1a5/0x480
[   14.445055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.445317]  kthread+0x337/0x6f0
[   14.445483]  ret_from_fork+0x116/0x1d0
[   14.445670]  ret_from_fork_asm+0x1a/0x30
[   14.445864] 
[   14.445960] The buggy address belongs to the object at ffff8881025c7500
[   14.445960]  which belongs to the cache kmalloc-16 of size 16
[   14.446618] The buggy address is located 8 bytes inside of
[   14.446618]  allocated 9-byte region [ffff8881025c7500, ffff8881025c7509)
[   14.446982] 
[   14.447179] The buggy address belongs to the physical page:
[   14.447538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7
[   14.447906] flags: 0x200000000000000(node=0|zone=2)
[   14.448560] page_type: f5(slab)
[   14.448831] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.449291] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.449668] page dumped because: kasan: bad access detected
[   14.449843] 
[   14.449913] Memory state around the buggy address:
[   14.450068]  ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.450404]  ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.450789] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.451395]                       ^
[   14.451712]  ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.451978]  ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.452333] ==================================================================
[   14.408398] ==================================================================
[   14.408790] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.409346] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280
[   14.409688] 
[   14.409793] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.409833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.409845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.409897] Call Trace:
[   14.409909]  <TASK>
[   14.409922]  dump_stack_lvl+0x73/0xb0
[   14.409950]  print_report+0xd1/0x610
[   14.409971]  ? __virt_addr_valid+0x1db/0x2d0
[   14.409993]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.410100]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.410126]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.410155]  kasan_report+0x141/0x180
[   14.410177]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.410246]  kasan_check_range+0x10c/0x1c0
[   14.410270]  __kasan_check_write+0x18/0x20
[   14.410289]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.410329]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.410358]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.410382]  ? trace_hardirqs_on+0x37/0xe0
[   14.410403]  ? kasan_bitops_generic+0x92/0x1c0
[   14.410430]  kasan_bitops_generic+0x121/0x1c0
[   14.410453]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.410478]  ? __pfx_read_tsc+0x10/0x10
[   14.410497]  ? ktime_get_ts64+0x86/0x230
[   14.410520]  kunit_try_run_case+0x1a5/0x480
[   14.410575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.410598]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.410621]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.410645]  ? __kthread_parkme+0x82/0x180
[   14.410665]  ? preempt_count_sub+0x50/0x80
[   14.410714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.410760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.410806]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.410832]  kthread+0x337/0x6f0
[   14.410850]  ? trace_preempt_on+0x20/0xc0
[   14.410897]  ? __pfx_kthread+0x10/0x10
[   14.410934]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.410955]  ? calculate_sigpending+0x7b/0xa0
[   14.410979]  ? __pfx_kthread+0x10/0x10
[   14.411000]  ret_from_fork+0x116/0x1d0
[   14.411018]  ? __pfx_kthread+0x10/0x10
[   14.411084]  ret_from_fork_asm+0x1a/0x30
[   14.411113]  </TASK>
[   14.411124] 
[   14.421366] Allocated by task 280:
[   14.421631]  kasan_save_stack+0x45/0x70
[   14.421855]  kasan_save_track+0x18/0x40
[   14.422120]  kasan_save_alloc_info+0x3b/0x50
[   14.422279]  __kasan_kmalloc+0xb7/0xc0
[   14.422479]  __kmalloc_cache_noprof+0x189/0x420
[   14.422783]  kasan_bitops_generic+0x92/0x1c0
[   14.423242]  kunit_try_run_case+0x1a5/0x480
[   14.423437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.423675]  kthread+0x337/0x6f0
[   14.423845]  ret_from_fork+0x116/0x1d0
[   14.424084]  ret_from_fork_asm+0x1a/0x30
[   14.424279] 
[   14.424386] The buggy address belongs to the object at ffff8881025c7500
[   14.424386]  which belongs to the cache kmalloc-16 of size 16
[   14.425037] The buggy address is located 8 bytes inside of
[   14.425037]  allocated 9-byte region [ffff8881025c7500, ffff8881025c7509)
[   14.425780] 
[   14.425913] The buggy address belongs to the physical page:
[   14.426199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7
[   14.426647] flags: 0x200000000000000(node=0|zone=2)
[   14.426863] page_type: f5(slab)
[   14.427082] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.427469] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.427796] page dumped because: kasan: bad access detected
[   14.428045] 
[   14.428338] Memory state around the buggy address:
[   14.428575]  ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.428851]  ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.429128] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.429575]                       ^
[   14.429874]  ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.430313]  ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.430658] ==================================================================
[   14.499831] ==================================================================
[   14.500462] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.500986] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280
[   14.501369] 
[   14.501458] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.501501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.501513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.501533] Call Trace:
[   14.501548]  <TASK>
[   14.501562]  dump_stack_lvl+0x73/0xb0
[   14.501630]  print_report+0xd1/0x610
[   14.501677]  ? __virt_addr_valid+0x1db/0x2d0
[   14.501700]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.501729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.501752]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.501779]  kasan_report+0x141/0x180
[   14.501801]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.501835]  kasan_check_range+0x10c/0x1c0
[   14.501858]  __kasan_check_write+0x18/0x20
[   14.501877]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.501906]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.501967]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.502014]  ? trace_hardirqs_on+0x37/0xe0
[   14.502051]  ? kasan_bitops_generic+0x92/0x1c0
[   14.502079]  kasan_bitops_generic+0x121/0x1c0
[   14.502101]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.502126]  ? __pfx_read_tsc+0x10/0x10
[   14.502145]  ? ktime_get_ts64+0x86/0x230
[   14.502168]  kunit_try_run_case+0x1a5/0x480
[   14.502192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.502214]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.502237]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.502261]  ? __kthread_parkme+0x82/0x180
[   14.502281]  ? preempt_count_sub+0x50/0x80
[   14.502315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.502338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.502361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.502385]  kthread+0x337/0x6f0
[   14.502406]  ? trace_preempt_on+0x20/0xc0
[   14.502427]  ? __pfx_kthread+0x10/0x10
[   14.502447]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.502468]  ? calculate_sigpending+0x7b/0xa0
[   14.502574]  ? __pfx_kthread+0x10/0x10
[   14.502596]  ret_from_fork+0x116/0x1d0
[   14.502615]  ? __pfx_kthread+0x10/0x10
[   14.502635]  ret_from_fork_asm+0x1a/0x30
[   14.502666]  </TASK>
[   14.502676] 
[   14.512935] Allocated by task 280:
[   14.513194]  kasan_save_stack+0x45/0x70
[   14.513496]  kasan_save_track+0x18/0x40
[   14.513777]  kasan_save_alloc_info+0x3b/0x50
[   14.514015]  __kasan_kmalloc+0xb7/0xc0
[   14.514345]  __kmalloc_cache_noprof+0x189/0x420
[   14.514609]  kasan_bitops_generic+0x92/0x1c0
[   14.514817]  kunit_try_run_case+0x1a5/0x480
[   14.515015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.515296]  kthread+0x337/0x6f0
[   14.515450]  ret_from_fork+0x116/0x1d0
[   14.515856]  ret_from_fork_asm+0x1a/0x30
[   14.516080] 
[   14.516173] The buggy address belongs to the object at ffff8881025c7500
[   14.516173]  which belongs to the cache kmalloc-16 of size 16
[   14.516738] The buggy address is located 8 bytes inside of
[   14.516738]  allocated 9-byte region [ffff8881025c7500, ffff8881025c7509)
[   14.517340] 
[   14.517410] The buggy address belongs to the physical page:
[   14.517793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7
[   14.518419] flags: 0x200000000000000(node=0|zone=2)
[   14.518692] page_type: f5(slab)
[   14.518888] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.519325] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.519659] page dumped because: kasan: bad access detected
[   14.519900] 
[   14.519991] Memory state around the buggy address:
[   14.520235]  ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.520702]  ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.521160] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.521509]                       ^
[   14.521700]  ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.521989]  ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.522366] ==================================================================
[   14.452853] ==================================================================
[   14.453335] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.453937] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280
[   14.454384] 
[   14.454529] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.454572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.454584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.454604] Call Trace:
[   14.454620]  <TASK>
[   14.454635]  dump_stack_lvl+0x73/0xb0
[   14.454662]  print_report+0xd1/0x610
[   14.454720]  ? __virt_addr_valid+0x1db/0x2d0
[   14.454741]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.454770]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.454792]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.454850]  kasan_report+0x141/0x180
[   14.454871]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.454904]  kasan_check_range+0x10c/0x1c0
[   14.454928]  __kasan_check_write+0x18/0x20
[   14.454947]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.455004]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.455034]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.455057]  ? trace_hardirqs_on+0x37/0xe0
[   14.455131]  ? kasan_bitops_generic+0x92/0x1c0
[   14.455197]  kasan_bitops_generic+0x121/0x1c0
[   14.455220]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.455244]  ? __pfx_read_tsc+0x10/0x10
[   14.455265]  ? ktime_get_ts64+0x86/0x230
[   14.455288]  kunit_try_run_case+0x1a5/0x480
[   14.455356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.455377]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.455402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.455425]  ? __kthread_parkme+0x82/0x180
[   14.455444]  ? preempt_count_sub+0x50/0x80
[   14.455501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.455524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.455547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.455581]  kthread+0x337/0x6f0
[   14.455600]  ? trace_preempt_on+0x20/0xc0
[   14.455650]  ? __pfx_kthread+0x10/0x10
[   14.455670]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.455691]  ? calculate_sigpending+0x7b/0xa0
[   14.455715]  ? __pfx_kthread+0x10/0x10
[   14.455736]  ret_from_fork+0x116/0x1d0
[   14.455754]  ? __pfx_kthread+0x10/0x10
[   14.455774]  ret_from_fork_asm+0x1a/0x30
[   14.455804]  </TASK>
[   14.455813] 
[   14.466323] Allocated by task 280:
[   14.466577]  kasan_save_stack+0x45/0x70
[   14.466790]  kasan_save_track+0x18/0x40
[   14.466979]  kasan_save_alloc_info+0x3b/0x50
[   14.467205]  __kasan_kmalloc+0xb7/0xc0
[   14.467448]  __kmalloc_cache_noprof+0x189/0x420
[   14.467804]  kasan_bitops_generic+0x92/0x1c0
[   14.468106]  kunit_try_run_case+0x1a5/0x480
[   14.468339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.468603]  kthread+0x337/0x6f0
[   14.468813]  ret_from_fork+0x116/0x1d0
[   14.469005]  ret_from_fork_asm+0x1a/0x30
[   14.469389] 
[   14.469465] The buggy address belongs to the object at ffff8881025c7500
[   14.469465]  which belongs to the cache kmalloc-16 of size 16
[   14.469826] The buggy address is located 8 bytes inside of
[   14.469826]  allocated 9-byte region [ffff8881025c7500, ffff8881025c7509)
[   14.470207] 
[   14.470401] The buggy address belongs to the physical page:
[   14.470890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7
[   14.471351] flags: 0x200000000000000(node=0|zone=2)
[   14.471519] page_type: f5(slab)
[   14.471639] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.471870] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.472434] page dumped because: kasan: bad access detected
[   14.472759] 
[   14.472911] Memory state around the buggy address:
[   14.473264]  ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.473927]  ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.474184] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.474587]                       ^
[   14.474769]  ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.475245]  ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.475632] ==================================================================
[   14.610137] ==================================================================
[   14.610465] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.611298] Read of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280
[   14.611945] 
[   14.612065] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.612111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.612122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.612143] Call Trace:
[   14.612158]  <TASK>
[   14.612174]  dump_stack_lvl+0x73/0xb0
[   14.612203]  print_report+0xd1/0x610
[   14.612225]  ? __virt_addr_valid+0x1db/0x2d0
[   14.612246]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.612274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.612297]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.612338]  kasan_report+0x141/0x180
[   14.612359]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.612391]  __asan_report_load8_noabort+0x18/0x20
[   14.612415]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.612444]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.612473]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.612497]  ? trace_hardirqs_on+0x37/0xe0
[   14.612518]  ? kasan_bitops_generic+0x92/0x1c0
[   14.612545]  kasan_bitops_generic+0x121/0x1c0
[   14.612569]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.612593]  ? __pfx_read_tsc+0x10/0x10
[   14.612614]  ? ktime_get_ts64+0x86/0x230
[   14.612636]  kunit_try_run_case+0x1a5/0x480
[   14.612660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.612681]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.612706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.612728]  ? __kthread_parkme+0x82/0x180
[   14.612748]  ? preempt_count_sub+0x50/0x80
[   14.612772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.612795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.612819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.612843]  kthread+0x337/0x6f0
[   14.612862]  ? trace_preempt_on+0x20/0xc0
[   14.612883]  ? __pfx_kthread+0x10/0x10
[   14.612903]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.612924]  ? calculate_sigpending+0x7b/0xa0
[   14.612948]  ? __pfx_kthread+0x10/0x10
[   14.612976]  ret_from_fork+0x116/0x1d0
[   14.612994]  ? __pfx_kthread+0x10/0x10
[   14.613013]  ret_from_fork_asm+0x1a/0x30
[   14.613043]  </TASK>
[   14.613053] 
[   14.624821] Allocated by task 280:
[   14.625173]  kasan_save_stack+0x45/0x70
[   14.625394]  kasan_save_track+0x18/0x40
[   14.625763]  kasan_save_alloc_info+0x3b/0x50
[   14.626072]  __kasan_kmalloc+0xb7/0xc0
[   14.626362]  __kmalloc_cache_noprof+0x189/0x420
[   14.626740]  kasan_bitops_generic+0x92/0x1c0
[   14.627030]  kunit_try_run_case+0x1a5/0x480
[   14.627320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.627513]  kthread+0x337/0x6f0
[   14.627918]  ret_from_fork+0x116/0x1d0
[   14.628098]  ret_from_fork_asm+0x1a/0x30
[   14.628387] 
[   14.628663] The buggy address belongs to the object at ffff8881025c7500
[   14.628663]  which belongs to the cache kmalloc-16 of size 16
[   14.629152] The buggy address is located 8 bytes inside of
[   14.629152]  allocated 9-byte region [ffff8881025c7500, ffff8881025c7509)
[   14.629987] 
[   14.630084] The buggy address belongs to the physical page:
[   14.630292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7
[   14.630814] flags: 0x200000000000000(node=0|zone=2)
[   14.631148] page_type: f5(slab)
[   14.631427] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.631951] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.632384] page dumped because: kasan: bad access detected
[   14.632743] 
[   14.632942] Memory state around the buggy address:
[   14.633144]  ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.633483]  ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.634022] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.634419]                       ^
[   14.634783]  ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.635135]  ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.635560] ==================================================================
[   14.583939] ==================================================================
[   14.584267] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.584802] Read of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280
[   14.585390] 
[   14.585655] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.585804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.585818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.585839] Call Trace:
[   14.585855]  <TASK>
[   14.585869]  dump_stack_lvl+0x73/0xb0
[   14.585900]  print_report+0xd1/0x610
[   14.585922]  ? __virt_addr_valid+0x1db/0x2d0
[   14.585944]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.585971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.585993]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.586022]  kasan_report+0x141/0x180
[   14.586043]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.586076]  kasan_check_range+0x10c/0x1c0
[   14.586098]  __kasan_check_read+0x15/0x20
[   14.586117]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.586144]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.586173]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.586197]  ? trace_hardirqs_on+0x37/0xe0
[   14.586217]  ? kasan_bitops_generic+0x92/0x1c0
[   14.586244]  kasan_bitops_generic+0x121/0x1c0
[   14.586267]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.586291]  ? __pfx_read_tsc+0x10/0x10
[   14.586324]  ? ktime_get_ts64+0x86/0x230
[   14.586346]  kunit_try_run_case+0x1a5/0x480
[   14.586369]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.586391]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.586414]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.586438]  ? __kthread_parkme+0x82/0x180
[   14.586457]  ? preempt_count_sub+0x50/0x80
[   14.586481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.586504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.586527]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.586551]  kthread+0x337/0x6f0
[   14.586570]  ? trace_preempt_on+0x20/0xc0
[   14.586591]  ? __pfx_kthread+0x10/0x10
[   14.586611]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.586632]  ? calculate_sigpending+0x7b/0xa0
[   14.586656]  ? __pfx_kthread+0x10/0x10
[   14.586678]  ret_from_fork+0x116/0x1d0
[   14.586696]  ? __pfx_kthread+0x10/0x10
[   14.586716]  ret_from_fork_asm+0x1a/0x30
[   14.586746]  </TASK>
[   14.586755] 
[   14.598342] Allocated by task 280:
[   14.598645]  kasan_save_stack+0x45/0x70
[   14.598910]  kasan_save_track+0x18/0x40
[   14.599074]  kasan_save_alloc_info+0x3b/0x50
[   14.599281]  __kasan_kmalloc+0xb7/0xc0
[   14.599463]  __kmalloc_cache_noprof+0x189/0x420
[   14.599656]  kasan_bitops_generic+0x92/0x1c0
[   14.599847]  kunit_try_run_case+0x1a5/0x480
[   14.600037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.600274]  kthread+0x337/0x6f0
[   14.600871]  ret_from_fork+0x116/0x1d0
[   14.601027]  ret_from_fork_asm+0x1a/0x30
[   14.601406] 
[   14.601505] The buggy address belongs to the object at ffff8881025c7500
[   14.601505]  which belongs to the cache kmalloc-16 of size 16
[   14.602262] The buggy address is located 8 bytes inside of
[   14.602262]  allocated 9-byte region [ffff8881025c7500, ffff8881025c7509)
[   14.603000] 
[   14.603103] The buggy address belongs to the physical page:
[   14.603380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7
[   14.603962] flags: 0x200000000000000(node=0|zone=2)
[   14.604271] page_type: f5(slab)
[   14.604453] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.604960] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.605390] page dumped because: kasan: bad access detected
[   14.605731] 
[   14.605982] Memory state around the buggy address:
[   14.606191]  ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.606609]  ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.607022] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.607433]                       ^
[   14.607742]  ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.608058]  ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.608376] ==================================================================
[   14.557089] ==================================================================
[   14.557366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.558583] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280
[   14.559200] 
[   14.559317] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.559365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.559376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.559397] Call Trace:
[   14.559409]  <TASK>
[   14.559424]  dump_stack_lvl+0x73/0xb0
[   14.559454]  print_report+0xd1/0x610
[   14.559482]  ? __virt_addr_valid+0x1db/0x2d0
[   14.559504]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.559531]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.559554]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.559582]  kasan_report+0x141/0x180
[   14.559603]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.559635]  kasan_check_range+0x10c/0x1c0
[   14.559658]  __kasan_check_write+0x18/0x20
[   14.559677]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.559706]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.559735]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.559757]  ? trace_hardirqs_on+0x37/0xe0
[   14.559778]  ? kasan_bitops_generic+0x92/0x1c0
[   14.559805]  kasan_bitops_generic+0x121/0x1c0
[   14.559829]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.559853]  ? __pfx_read_tsc+0x10/0x10
[   14.559873]  ? ktime_get_ts64+0x86/0x230
[   14.559896]  kunit_try_run_case+0x1a5/0x480
[   14.559918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.559940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.559963]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.559987]  ? __kthread_parkme+0x82/0x180
[   14.560005]  ? preempt_count_sub+0x50/0x80
[   14.560029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.560052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.560075]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.560099]  kthread+0x337/0x6f0
[   14.560117]  ? trace_preempt_on+0x20/0xc0
[   14.560139]  ? __pfx_kthread+0x10/0x10
[   14.560158]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.560179]  ? calculate_sigpending+0x7b/0xa0
[   14.560201]  ? __pfx_kthread+0x10/0x10
[   14.560222]  ret_from_fork+0x116/0x1d0
[   14.560241]  ? __pfx_kthread+0x10/0x10
[   14.560261]  ret_from_fork_asm+0x1a/0x30
[   14.560290]  </TASK>
[   14.560515] 
[   14.572441] Allocated by task 280:
[   14.572773]  kasan_save_stack+0x45/0x70
[   14.573073]  kasan_save_track+0x18/0x40
[   14.573381]  kasan_save_alloc_info+0x3b/0x50
[   14.573875]  __kasan_kmalloc+0xb7/0xc0
[   14.574060]  __kmalloc_cache_noprof+0x189/0x420
[   14.574292]  kasan_bitops_generic+0x92/0x1c0
[   14.574483]  kunit_try_run_case+0x1a5/0x480
[   14.574682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.574949]  kthread+0x337/0x6f0
[   14.575110]  ret_from_fork+0x116/0x1d0
[   14.575286]  ret_from_fork_asm+0x1a/0x30
[   14.575479] 
[   14.575557] The buggy address belongs to the object at ffff8881025c7500
[   14.575557]  which belongs to the cache kmalloc-16 of size 16
[   14.576064] The buggy address is located 8 bytes inside of
[   14.576064]  allocated 9-byte region [ffff8881025c7500, ffff8881025c7509)
[   14.577223] 
[   14.577524] The buggy address belongs to the physical page:
[   14.577774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7
[   14.578195] flags: 0x200000000000000(node=0|zone=2)
[   14.578526] page_type: f5(slab)
[   14.578700] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.579022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.579352] page dumped because: kasan: bad access detected
[   14.579849] 
[   14.579945] Memory state around the buggy address:
[   14.580281]  ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.580759]  ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.581184] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.581673]                       ^
[   14.581857]  ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.582334]  ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.582888] ==================================================================
[   14.523182] ==================================================================
[   14.523516] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.524130] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280
[   14.524900] 
[   14.525531] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.525580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.525593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.525614] Call Trace:
[   14.525628]  <TASK>
[   14.525643]  dump_stack_lvl+0x73/0xb0
[   14.525673]  print_report+0xd1/0x610
[   14.525695]  ? __virt_addr_valid+0x1db/0x2d0
[   14.525717]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.525744]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.525767]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.525795]  kasan_report+0x141/0x180
[   14.525816]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.525849]  kasan_check_range+0x10c/0x1c0
[   14.525873]  __kasan_check_write+0x18/0x20
[   14.525891]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.525920]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.525948]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.525971]  ? trace_hardirqs_on+0x37/0xe0
[   14.525992]  ? kasan_bitops_generic+0x92/0x1c0
[   14.526020]  kasan_bitops_generic+0x121/0x1c0
[   14.526042]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.526066]  ? __pfx_read_tsc+0x10/0x10
[   14.526087]  ? ktime_get_ts64+0x86/0x230
[   14.526109]  kunit_try_run_case+0x1a5/0x480
[   14.526133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.526154]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.526179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.526202]  ? __kthread_parkme+0x82/0x180
[   14.526221]  ? preempt_count_sub+0x50/0x80
[   14.526244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.526267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.526290]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.526327]  kthread+0x337/0x6f0
[   14.526346]  ? trace_preempt_on+0x20/0xc0
[   14.526367]  ? __pfx_kthread+0x10/0x10
[   14.526387]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.526407]  ? calculate_sigpending+0x7b/0xa0
[   14.526431]  ? __pfx_kthread+0x10/0x10
[   14.526452]  ret_from_fork+0x116/0x1d0
[   14.526469]  ? __pfx_kthread+0x10/0x10
[   14.526787]  ret_from_fork_asm+0x1a/0x30
[   14.526819]  </TASK>
[   14.526830] 
[   14.543030] Allocated by task 280:
[   14.543403]  kasan_save_stack+0x45/0x70
[   14.543869]  kasan_save_track+0x18/0x40
[   14.544344]  kasan_save_alloc_info+0x3b/0x50
[   14.544817]  __kasan_kmalloc+0xb7/0xc0
[   14.544949]  __kmalloc_cache_noprof+0x189/0x420
[   14.545341]  kasan_bitops_generic+0x92/0x1c0
[   14.545794]  kunit_try_run_case+0x1a5/0x480
[   14.546268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.546938]  kthread+0x337/0x6f0
[   14.547256]  ret_from_fork+0x116/0x1d0
[   14.547675]  ret_from_fork_asm+0x1a/0x30
[   14.547839] 
[   14.548008] The buggy address belongs to the object at ffff8881025c7500
[   14.548008]  which belongs to the cache kmalloc-16 of size 16
[   14.548960] The buggy address is located 8 bytes inside of
[   14.548960]  allocated 9-byte region [ffff8881025c7500, ffff8881025c7509)
[   14.550243] 
[   14.550473] The buggy address belongs to the physical page:
[   14.550814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7
[   14.551697] flags: 0x200000000000000(node=0|zone=2)
[   14.551871] page_type: f5(slab)
[   14.551994] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.552227] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.552908] page dumped because: kasan: bad access detected
[   14.553389] 
[   14.553503] Memory state around the buggy address:
[   14.553879]  ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.554348]  ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.554894] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.555317]                       ^
[   14.555491]  ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.556038]  ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.556504] ==================================================================
[   14.476593] ==================================================================
[   14.477229] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.477795] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280
[   14.478259] 
[   14.478385] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.478430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.478441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.478461] Call Trace:
[   14.478473]  <TASK>
[   14.478487]  dump_stack_lvl+0x73/0xb0
[   14.478514]  print_report+0xd1/0x610
[   14.478535]  ? __virt_addr_valid+0x1db/0x2d0
[   14.478595]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.478648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.478671]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.478699]  kasan_report+0x141/0x180
[   14.478721]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.478754]  kasan_check_range+0x10c/0x1c0
[   14.478777]  __kasan_check_write+0x18/0x20
[   14.478795]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.478824]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.478853]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.478876]  ? trace_hardirqs_on+0x37/0xe0
[   14.478897]  ? kasan_bitops_generic+0x92/0x1c0
[   14.478924]  kasan_bitops_generic+0x121/0x1c0
[   14.478947]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.478971]  ? __pfx_read_tsc+0x10/0x10
[   14.478991]  ? ktime_get_ts64+0x86/0x230
[   14.479014]  kunit_try_run_case+0x1a5/0x480
[   14.479038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.479060]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.479157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.479181]  ? __kthread_parkme+0x82/0x180
[   14.479200]  ? preempt_count_sub+0x50/0x80
[   14.479224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.479248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.479272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.479296]  kthread+0x337/0x6f0
[   14.479326]  ? trace_preempt_on+0x20/0xc0
[   14.479384]  ? __pfx_kthread+0x10/0x10
[   14.479404]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.479425]  ? calculate_sigpending+0x7b/0xa0
[   14.479448]  ? __pfx_kthread+0x10/0x10
[   14.479469]  ret_from_fork+0x116/0x1d0
[   14.479497]  ? __pfx_kthread+0x10/0x10
[   14.479517]  ret_from_fork_asm+0x1a/0x30
[   14.479579]  </TASK>
[   14.479589] 
[   14.489757] Allocated by task 280:
[   14.489962]  kasan_save_stack+0x45/0x70
[   14.490228]  kasan_save_track+0x18/0x40
[   14.490437]  kasan_save_alloc_info+0x3b/0x50
[   14.490750]  __kasan_kmalloc+0xb7/0xc0
[   14.490920]  __kmalloc_cache_noprof+0x189/0x420
[   14.491337]  kasan_bitops_generic+0x92/0x1c0
[   14.491573]  kunit_try_run_case+0x1a5/0x480
[   14.491721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.491897]  kthread+0x337/0x6f0
[   14.492064]  ret_from_fork+0x116/0x1d0
[   14.492247]  ret_from_fork_asm+0x1a/0x30
[   14.492522] 
[   14.492621] The buggy address belongs to the object at ffff8881025c7500
[   14.492621]  which belongs to the cache kmalloc-16 of size 16
[   14.493233] The buggy address is located 8 bytes inside of
[   14.493233]  allocated 9-byte region [ffff8881025c7500, ffff8881025c7509)
[   14.493885] 
[   14.494004] The buggy address belongs to the physical page:
[   14.494194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7
[   14.494449] flags: 0x200000000000000(node=0|zone=2)
[   14.495089] page_type: f5(slab)
[   14.495428] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.495806] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.496348] page dumped because: kasan: bad access detected
[   14.496678] 
[   14.496775] Memory state around the buggy address:
[   14.496961]  ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.497230]  ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.497800] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.498206]                       ^
[   14.498486]  ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.498900]  ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.499221] ==================================================================