Hay
Date
May 12, 2025, 11:48 a.m.

Environment
qemu-x86_64

[   19.435016] ==================================================================
[   19.435973] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   19.436840] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.437486] 
[   19.437762] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.437877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.437903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.437947] Call Trace:
[   19.437987]  <TASK>
[   19.438023]  dump_stack_lvl+0x73/0xb0
[   19.438236]  print_report+0xd1/0x650
[   19.438292]  ? __virt_addr_valid+0x1db/0x2d0
[   19.438332]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   19.438363]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.438388]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   19.438418]  kasan_report+0x141/0x180
[   19.438442]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   19.438476]  kasan_check_range+0x10c/0x1c0
[   19.438502]  __kasan_check_write+0x18/0x20
[   19.438524]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   19.438554]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.438584]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.438607]  ? trace_hardirqs_on+0x37/0xe0
[   19.438633]  ? kasan_bitops_generic+0x92/0x1c0
[   19.438684]  kasan_bitops_generic+0x121/0x1c0
[   19.438720]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.438748]  ? __pfx_read_tsc+0x10/0x10
[   19.438771]  ? ktime_get_ts64+0x86/0x230
[   19.438797]  kunit_try_run_case+0x1a5/0x480
[   19.438823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.438847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.438871]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.438895]  ? __kthread_parkme+0x82/0x180
[   19.438917]  ? preempt_count_sub+0x50/0x80
[   19.438942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.438967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.439001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.439029]  kthread+0x337/0x6f0
[   19.439100]  ? trace_preempt_on+0x20/0xc0
[   19.439147]  ? __pfx_kthread+0x10/0x10
[   19.439182]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.439215]  ? calculate_sigpending+0x7b/0xa0
[   19.439255]  ? __pfx_kthread+0x10/0x10
[   19.439307]  ret_from_fork+0x116/0x1d0
[   19.439339]  ? __pfx_kthread+0x10/0x10
[   19.439374]  ret_from_fork_asm+0x1a/0x30
[   19.439426]  </TASK>
[   19.439448] 
[   19.456151] Allocated by task 278:
[   19.456459]  kasan_save_stack+0x45/0x70
[   19.457030]  kasan_save_track+0x18/0x40
[   19.457859]  kasan_save_alloc_info+0x3b/0x50
[   19.458474]  __kasan_kmalloc+0xb7/0xc0
[   19.458827]  __kmalloc_cache_noprof+0x189/0x420
[   19.459064]  kasan_bitops_generic+0x92/0x1c0
[   19.459293]  kunit_try_run_case+0x1a5/0x480
[   19.459614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.460039]  kthread+0x337/0x6f0
[   19.460942]  ret_from_fork+0x116/0x1d0
[   19.461399]  ret_from_fork_asm+0x1a/0x30
[   19.461806] 
[   19.461967] The buggy address belongs to the object at ffff8881026fb960
[   19.461967]  which belongs to the cache kmalloc-16 of size 16
[   19.462871] The buggy address is located 8 bytes inside of
[   19.462871]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.463831] 
[   19.464540] The buggy address belongs to the physical page:
[   19.464915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.465400] flags: 0x200000000000000(node=0|zone=2)
[   19.465989] page_type: f5(slab)
[   19.466539] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.467003] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.467521] page dumped because: kasan: bad access detected
[   19.467903] 
[   19.468092] Memory state around the buggy address:
[   19.468456]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.469327]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.470012] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.470431]                                                           ^
[   19.470692]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.471206]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.471976] ==================================================================
[   19.548329] ==================================================================
[   19.548731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   19.549950] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.550982] 
[   19.551214] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.551377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.551406] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.551467] Call Trace:
[   19.551509]  <TASK>
[   19.551548]  dump_stack_lvl+0x73/0xb0
[   19.551615]  print_report+0xd1/0x650
[   19.551666]  ? __virt_addr_valid+0x1db/0x2d0
[   19.551731]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   19.551786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.552007]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   19.552086]  kasan_report+0x141/0x180
[   19.552117]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   19.552151]  kasan_check_range+0x10c/0x1c0
[   19.552176]  __kasan_check_write+0x18/0x20
[   19.552197]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   19.552226]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.552272]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.552310]  ? trace_hardirqs_on+0x37/0xe0
[   19.552345]  ? kasan_bitops_generic+0x92/0x1c0
[   19.552387]  kasan_bitops_generic+0x121/0x1c0
[   19.552425]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.552464]  ? __pfx_read_tsc+0x10/0x10
[   19.552488]  ? ktime_get_ts64+0x86/0x230
[   19.552512]  kunit_try_run_case+0x1a5/0x480
[   19.552539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.552562]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.552587]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.552610]  ? __kthread_parkme+0x82/0x180
[   19.552631]  ? preempt_count_sub+0x50/0x80
[   19.552658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.552708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.552735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.552759]  kthread+0x337/0x6f0
[   19.552780]  ? trace_preempt_on+0x20/0xc0
[   19.552803]  ? __pfx_kthread+0x10/0x10
[   19.552824]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.552845]  ? calculate_sigpending+0x7b/0xa0
[   19.552870]  ? __pfx_kthread+0x10/0x10
[   19.552892]  ret_from_fork+0x116/0x1d0
[   19.552911]  ? __pfx_kthread+0x10/0x10
[   19.552932]  ret_from_fork_asm+0x1a/0x30
[   19.552963]  </TASK>
[   19.552977] 
[   19.568275] Allocated by task 278:
[   19.568594]  kasan_save_stack+0x45/0x70
[   19.568936]  kasan_save_track+0x18/0x40
[   19.569136]  kasan_save_alloc_info+0x3b/0x50
[   19.569513]  __kasan_kmalloc+0xb7/0xc0
[   19.570703]  __kmalloc_cache_noprof+0x189/0x420
[   19.571095]  kasan_bitops_generic+0x92/0x1c0
[   19.571889]  kunit_try_run_case+0x1a5/0x480
[   19.572490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.572834]  kthread+0x337/0x6f0
[   19.573364]  ret_from_fork+0x116/0x1d0
[   19.573728]  ret_from_fork_asm+0x1a/0x30
[   19.574240] 
[   19.575030] The buggy address belongs to the object at ffff8881026fb960
[   19.575030]  which belongs to the cache kmalloc-16 of size 16
[   19.575814] The buggy address is located 8 bytes inside of
[   19.575814]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.576767] 
[   19.576961] The buggy address belongs to the physical page:
[   19.577939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.578658] flags: 0x200000000000000(node=0|zone=2)
[   19.579382] page_type: f5(slab)
[   19.579658] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.580377] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.580899] page dumped because: kasan: bad access detected
[   19.581311] 
[   19.581796] Memory state around the buggy address:
[   19.582283]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.582781]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.583383] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.584334]                                                           ^
[   19.585093]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.585833]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.586294] ==================================================================
[   19.509415] ==================================================================
[   19.509845] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   19.510487] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.511022] 
[   19.511175] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.511805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.511842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.511882] Call Trace:
[   19.511919]  <TASK>
[   19.511958]  dump_stack_lvl+0x73/0xb0
[   19.512026]  print_report+0xd1/0x650
[   19.512074]  ? __virt_addr_valid+0x1db/0x2d0
[   19.512119]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   19.512174]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.512222]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   19.512290]  kasan_report+0x141/0x180
[   19.512334]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   19.512400]  kasan_check_range+0x10c/0x1c0
[   19.512452]  __kasan_check_write+0x18/0x20
[   19.512495]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   19.512670]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.512745]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.512786]  ? trace_hardirqs_on+0x37/0xe0
[   19.512831]  ? kasan_bitops_generic+0x92/0x1c0
[   19.512891]  kasan_bitops_generic+0x121/0x1c0
[   19.512942]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.512988]  ? __pfx_read_tsc+0x10/0x10
[   19.513047]  ? ktime_get_ts64+0x86/0x230
[   19.513311]  kunit_try_run_case+0x1a5/0x480
[   19.513370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.513421]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.513472]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.513522]  ? __kthread_parkme+0x82/0x180
[   19.513563]  ? preempt_count_sub+0x50/0x80
[   19.513592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.513617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.513642]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.513674]  kthread+0x337/0x6f0
[   19.513720]  ? trace_preempt_on+0x20/0xc0
[   19.513746]  ? __pfx_kthread+0x10/0x10
[   19.513769]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.513790]  ? calculate_sigpending+0x7b/0xa0
[   19.513817]  ? __pfx_kthread+0x10/0x10
[   19.513840]  ret_from_fork+0x116/0x1d0
[   19.513860]  ? __pfx_kthread+0x10/0x10
[   19.513883]  ret_from_fork_asm+0x1a/0x30
[   19.513915]  </TASK>
[   19.513929] 
[   19.529584] Allocated by task 278:
[   19.530601]  kasan_save_stack+0x45/0x70
[   19.531031]  kasan_save_track+0x18/0x40
[   19.531384]  kasan_save_alloc_info+0x3b/0x50
[   19.532150]  __kasan_kmalloc+0xb7/0xc0
[   19.532412]  __kmalloc_cache_noprof+0x189/0x420
[   19.532918]  kasan_bitops_generic+0x92/0x1c0
[   19.533789]  kunit_try_run_case+0x1a5/0x480
[   19.534446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.534896]  kthread+0x337/0x6f0
[   19.535427]  ret_from_fork+0x116/0x1d0
[   19.535652]  ret_from_fork_asm+0x1a/0x30
[   19.535977] 
[   19.536291] The buggy address belongs to the object at ffff8881026fb960
[   19.536291]  which belongs to the cache kmalloc-16 of size 16
[   19.537068] The buggy address is located 8 bytes inside of
[   19.537068]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.537769] 
[   19.538753] The buggy address belongs to the physical page:
[   19.539127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.539725] flags: 0x200000000000000(node=0|zone=2)
[   19.540455] page_type: f5(slab)
[   19.540929] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.541526] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.542087] page dumped because: kasan: bad access detected
[   19.542603] 
[   19.542879] Memory state around the buggy address:
[   19.543628]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.544155]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.545033] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.545663]                                                           ^
[   19.546417]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.546847]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.547484] ==================================================================
[   19.587599] ==================================================================
[   19.588510] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   19.590002] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.590593] 
[   19.591135] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.591316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.591351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.591391] Call Trace:
[   19.591430]  <TASK>
[   19.591469]  dump_stack_lvl+0x73/0xb0
[   19.591528]  print_report+0xd1/0x650
[   19.591556]  ? __virt_addr_valid+0x1db/0x2d0
[   19.591581]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   19.591611]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.591635]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   19.591686]  kasan_report+0x141/0x180
[   19.591719]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   19.591753]  kasan_check_range+0x10c/0x1c0
[   19.591779]  __kasan_check_write+0x18/0x20
[   19.591799]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   19.591829]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.591860]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.591883]  ? trace_hardirqs_on+0x37/0xe0
[   19.591908]  ? kasan_bitops_generic+0x92/0x1c0
[   19.591938]  kasan_bitops_generic+0x121/0x1c0
[   19.591963]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.591990]  ? __pfx_read_tsc+0x10/0x10
[   19.592013]  ? ktime_get_ts64+0x86/0x230
[   19.592043]  kunit_try_run_case+0x1a5/0x480
[   19.592104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.592141]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.592177]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.592213]  ? __kthread_parkme+0x82/0x180
[   19.592248]  ? preempt_count_sub+0x50/0x80
[   19.592300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.592340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.592378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.592415]  kthread+0x337/0x6f0
[   19.592446]  ? trace_preempt_on+0x20/0xc0
[   19.592485]  ? __pfx_kthread+0x10/0x10
[   19.592533]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.592567]  ? calculate_sigpending+0x7b/0xa0
[   19.592594]  ? __pfx_kthread+0x10/0x10
[   19.592626]  ret_from_fork+0x116/0x1d0
[   19.592647]  ? __pfx_kthread+0x10/0x10
[   19.592680]  ret_from_fork_asm+0x1a/0x30
[   19.592719]  </TASK>
[   19.592732] 
[   19.605717] Allocated by task 278:
[   19.605839]  kasan_save_stack+0x45/0x70
[   19.605960]  kasan_save_track+0x18/0x40
[   19.606055]  kasan_save_alloc_info+0x3b/0x50
[   19.606153]  __kasan_kmalloc+0xb7/0xc0
[   19.606245]  __kmalloc_cache_noprof+0x189/0x420
[   19.606701]  kasan_bitops_generic+0x92/0x1c0
[   19.607196]  kunit_try_run_case+0x1a5/0x480
[   19.607723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.608598]  kthread+0x337/0x6f0
[   19.609136]  ret_from_fork+0x116/0x1d0
[   19.609578]  ret_from_fork_asm+0x1a/0x30
[   19.609983] 
[   19.610176] The buggy address belongs to the object at ffff8881026fb960
[   19.610176]  which belongs to the cache kmalloc-16 of size 16
[   19.611164] The buggy address is located 8 bytes inside of
[   19.611164]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.612457] 
[   19.612657] The buggy address belongs to the physical page:
[   19.613239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.613941] flags: 0x200000000000000(node=0|zone=2)
[   19.614511] page_type: f5(slab)
[   19.614812] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.616139] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.616607] page dumped because: kasan: bad access detected
[   19.617081] 
[   19.617205] Memory state around the buggy address:
[   19.617648]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.618355]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.619013] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.619802]                                                           ^
[   19.620530]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.621369]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.621779] ==================================================================
[   19.622608] ==================================================================
[   19.622947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   19.624382] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.625272] 
[   19.625425] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.625854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.625888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.625925] Call Trace:
[   19.625960]  <TASK>
[   19.625992]  dump_stack_lvl+0x73/0xb0
[   19.626050]  print_report+0xd1/0x650
[   19.626081]  ? __virt_addr_valid+0x1db/0x2d0
[   19.626113]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   19.626151]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.626186]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   19.626224]  kasan_report+0x141/0x180
[   19.626329]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   19.626392]  kasan_check_range+0x10c/0x1c0
[   19.626437]  __kasan_check_write+0x18/0x20
[   19.626460]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   19.626489]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.626520]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.626541]  ? trace_hardirqs_on+0x37/0xe0
[   19.626567]  ? kasan_bitops_generic+0x92/0x1c0
[   19.626595]  kasan_bitops_generic+0x121/0x1c0
[   19.626619]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.626645]  ? __pfx_read_tsc+0x10/0x10
[   19.626706]  ? ktime_get_ts64+0x86/0x230
[   19.626735]  kunit_try_run_case+0x1a5/0x480
[   19.626762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.626785]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.626809]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.626834]  ? __kthread_parkme+0x82/0x180
[   19.626856]  ? preempt_count_sub+0x50/0x80
[   19.626881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.626905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.626929]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.626953]  kthread+0x337/0x6f0
[   19.626973]  ? trace_preempt_on+0x20/0xc0
[   19.627011]  ? __pfx_kthread+0x10/0x10
[   19.627036]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.627087]  ? calculate_sigpending+0x7b/0xa0
[   19.627128]  ? __pfx_kthread+0x10/0x10
[   19.627163]  ret_from_fork+0x116/0x1d0
[   19.627195]  ? __pfx_kthread+0x10/0x10
[   19.627228]  ret_from_fork_asm+0x1a/0x30
[   19.627291]  </TASK>
[   19.627312] 
[   19.645094] Allocated by task 278:
[   19.645815]  kasan_save_stack+0x45/0x70
[   19.646321]  kasan_save_track+0x18/0x40
[   19.647145]  kasan_save_alloc_info+0x3b/0x50
[   19.647378]  __kasan_kmalloc+0xb7/0xc0
[   19.647637]  __kmalloc_cache_noprof+0x189/0x420
[   19.648493]  kasan_bitops_generic+0x92/0x1c0
[   19.649018]  kunit_try_run_case+0x1a5/0x480
[   19.649249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.649637]  kthread+0x337/0x6f0
[   19.649924]  ret_from_fork+0x116/0x1d0
[   19.650733]  ret_from_fork_asm+0x1a/0x30
[   19.650977] 
[   19.651458] The buggy address belongs to the object at ffff8881026fb960
[   19.651458]  which belongs to the cache kmalloc-16 of size 16
[   19.652730] The buggy address is located 8 bytes inside of
[   19.652730]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.653332] 
[   19.653519] The buggy address belongs to the physical page:
[   19.653737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.654428] flags: 0x200000000000000(node=0|zone=2)
[   19.654732] page_type: f5(slab)
[   19.654966] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.655331] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.655867] page dumped because: kasan: bad access detected
[   19.656320] 
[   19.656490] Memory state around the buggy address:
[   19.656747]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.657185]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.658208] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.658514]                                                           ^
[   19.659598]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.660360]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.660737] ==================================================================
[   19.396581] ==================================================================
[   19.397310] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   19.398732] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.399815] 
[   19.399938] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.400004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.400019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.400062] Call Trace:
[   19.400113]  <TASK>
[   19.400148]  dump_stack_lvl+0x73/0xb0
[   19.400221]  print_report+0xd1/0x650
[   19.400278]  ? __virt_addr_valid+0x1db/0x2d0
[   19.400325]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   19.400429]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.400478]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   19.400531]  kasan_report+0x141/0x180
[   19.400578]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   19.400640]  kasan_check_range+0x10c/0x1c0
[   19.400683]  __kasan_check_write+0x18/0x20
[   19.400718]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   19.400766]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.400819]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.400864]  ? trace_hardirqs_on+0x37/0xe0
[   19.400908]  ? kasan_bitops_generic+0x92/0x1c0
[   19.400955]  kasan_bitops_generic+0x121/0x1c0
[   19.400992]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.401019]  ? __pfx_read_tsc+0x10/0x10
[   19.401050]  ? ktime_get_ts64+0x86/0x230
[   19.401108]  kunit_try_run_case+0x1a5/0x480
[   19.401146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.401180]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.401218]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.401272]  ? __kthread_parkme+0x82/0x180
[   19.401302]  ? preempt_count_sub+0x50/0x80
[   19.401328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.401354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.401379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.401404]  kthread+0x337/0x6f0
[   19.401425]  ? trace_preempt_on+0x20/0xc0
[   19.401449]  ? __pfx_kthread+0x10/0x10
[   19.401472]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.401493]  ? calculate_sigpending+0x7b/0xa0
[   19.401519]  ? __pfx_kthread+0x10/0x10
[   19.401542]  ret_from_fork+0x116/0x1d0
[   19.401562]  ? __pfx_kthread+0x10/0x10
[   19.401584]  ret_from_fork_asm+0x1a/0x30
[   19.401618]  </TASK>
[   19.401632] 
[   19.417960] Allocated by task 278:
[   19.418315]  kasan_save_stack+0x45/0x70
[   19.418547]  kasan_save_track+0x18/0x40
[   19.419595]  kasan_save_alloc_info+0x3b/0x50
[   19.420028]  __kasan_kmalloc+0xb7/0xc0
[   19.420606]  __kmalloc_cache_noprof+0x189/0x420
[   19.420947]  kasan_bitops_generic+0x92/0x1c0
[   19.421199]  kunit_try_run_case+0x1a5/0x480
[   19.421559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.422000]  kthread+0x337/0x6f0
[   19.422224]  ret_from_fork+0x116/0x1d0
[   19.422841]  ret_from_fork_asm+0x1a/0x30
[   19.423769] 
[   19.423972] The buggy address belongs to the object at ffff8881026fb960
[   19.423972]  which belongs to the cache kmalloc-16 of size 16
[   19.424827] The buggy address is located 8 bytes inside of
[   19.424827]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.425600] 
[   19.425823] The buggy address belongs to the physical page:
[   19.426441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.426923] flags: 0x200000000000000(node=0|zone=2)
[   19.427708] page_type: f5(slab)
[   19.428033] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.428508] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.428891] page dumped because: kasan: bad access detected
[   19.429544] 
[   19.429759] Memory state around the buggy address:
[   19.430282]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.430853]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.431850] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.432444]                                                           ^
[   19.432871]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.433526]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.433997] ==================================================================
[   19.698605] ==================================================================
[   19.699695] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   19.700432] Read of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.700914] 
[   19.701549] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.701757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.701777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.701802] Call Trace:
[   19.701824]  <TASK>
[   19.701848]  dump_stack_lvl+0x73/0xb0
[   19.701885]  print_report+0xd1/0x650
[   19.701910]  ? __virt_addr_valid+0x1db/0x2d0
[   19.701935]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   19.701963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.701986]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   19.702015]  kasan_report+0x141/0x180
[   19.702038]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   19.702070]  __asan_report_load8_noabort+0x18/0x20
[   19.702095]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   19.702124]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.702153]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.702175]  ? trace_hardirqs_on+0x37/0xe0
[   19.702198]  ? kasan_bitops_generic+0x92/0x1c0
[   19.702226]  kasan_bitops_generic+0x121/0x1c0
[   19.702251]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.702302]  ? __pfx_read_tsc+0x10/0x10
[   19.702326]  ? ktime_get_ts64+0x86/0x230
[   19.702351]  kunit_try_run_case+0x1a5/0x480
[   19.702379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.702402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.702426]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.702449]  ? __kthread_parkme+0x82/0x180
[   19.702472]  ? preempt_count_sub+0x50/0x80
[   19.702496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.702520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.702543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.702567]  kthread+0x337/0x6f0
[   19.702588]  ? trace_preempt_on+0x20/0xc0
[   19.702610]  ? __pfx_kthread+0x10/0x10
[   19.702631]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.702653]  ? calculate_sigpending+0x7b/0xa0
[   19.702706]  ? __pfx_kthread+0x10/0x10
[   19.702731]  ret_from_fork+0x116/0x1d0
[   19.702751]  ? __pfx_kthread+0x10/0x10
[   19.702774]  ret_from_fork_asm+0x1a/0x30
[   19.702806]  </TASK>
[   19.702819] 
[   19.714059] Allocated by task 278:
[   19.714277]  kasan_save_stack+0x45/0x70
[   19.714629]  kasan_save_track+0x18/0x40
[   19.714943]  kasan_save_alloc_info+0x3b/0x50
[   19.715321]  __kasan_kmalloc+0xb7/0xc0
[   19.715645]  __kmalloc_cache_noprof+0x189/0x420
[   19.716015]  kasan_bitops_generic+0x92/0x1c0
[   19.716238]  kunit_try_run_case+0x1a5/0x480
[   19.716563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.717029]  kthread+0x337/0x6f0
[   19.717331]  ret_from_fork+0x116/0x1d0
[   19.717522]  ret_from_fork_asm+0x1a/0x30
[   19.717773] 
[   19.717970] The buggy address belongs to the object at ffff8881026fb960
[   19.717970]  which belongs to the cache kmalloc-16 of size 16
[   19.718751] The buggy address is located 8 bytes inside of
[   19.718751]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.719386] 
[   19.719603] The buggy address belongs to the physical page:
[   19.720080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.720442] flags: 0x200000000000000(node=0|zone=2)
[   19.720972] page_type: f5(slab)
[   19.721246] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.721700] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.722197] page dumped because: kasan: bad access detected
[   19.722426] 
[   19.722547] Memory state around the buggy address:
[   19.722759]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.723035]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.723344] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.723958]                                                           ^
[   19.724679]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.725272]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.725840] ==================================================================
[   19.473002] ==================================================================
[   19.473910] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   19.474691] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.475490] 
[   19.475782] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.475892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.475918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.475970] Call Trace:
[   19.476009]  <TASK>
[   19.476195]  dump_stack_lvl+0x73/0xb0
[   19.476296]  print_report+0xd1/0x650
[   19.476345]  ? __virt_addr_valid+0x1db/0x2d0
[   19.476391]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   19.476444]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.476487]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   19.476547]  kasan_report+0x141/0x180
[   19.476609]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   19.476694]  kasan_check_range+0x10c/0x1c0
[   19.476727]  __kasan_check_write+0x18/0x20
[   19.476748]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   19.476778]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.476807]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.476828]  ? trace_hardirqs_on+0x37/0xe0
[   19.476852]  ? kasan_bitops_generic+0x92/0x1c0
[   19.476879]  kasan_bitops_generic+0x121/0x1c0
[   19.476904]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.476930]  ? __pfx_read_tsc+0x10/0x10
[   19.476953]  ? ktime_get_ts64+0x86/0x230
[   19.476977]  kunit_try_run_case+0x1a5/0x480
[   19.477003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.477026]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.477107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.477151]  ? __kthread_parkme+0x82/0x180
[   19.477187]  ? preempt_count_sub+0x50/0x80
[   19.477223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.477275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.477317]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.477352]  kthread+0x337/0x6f0
[   19.477384]  ? trace_preempt_on+0x20/0xc0
[   19.477423]  ? __pfx_kthread+0x10/0x10
[   19.477454]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.477490]  ? calculate_sigpending+0x7b/0xa0
[   19.477528]  ? __pfx_kthread+0x10/0x10
[   19.477591]  ret_from_fork+0x116/0x1d0
[   19.477628]  ? __pfx_kthread+0x10/0x10
[   19.477651]  ret_from_fork_asm+0x1a/0x30
[   19.477719]  </TASK>
[   19.477733] 
[   19.492198] Allocated by task 278:
[   19.492847]  kasan_save_stack+0x45/0x70
[   19.493186]  kasan_save_track+0x18/0x40
[   19.493633]  kasan_save_alloc_info+0x3b/0x50
[   19.493962]  __kasan_kmalloc+0xb7/0xc0
[   19.494895]  __kmalloc_cache_noprof+0x189/0x420
[   19.495418]  kasan_bitops_generic+0x92/0x1c0
[   19.495700]  kunit_try_run_case+0x1a5/0x480
[   19.495911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.496146]  kthread+0x337/0x6f0
[   19.496617]  ret_from_fork+0x116/0x1d0
[   19.497157]  ret_from_fork_asm+0x1a/0x30
[   19.498012] 
[   19.498489] The buggy address belongs to the object at ffff8881026fb960
[   19.498489]  which belongs to the cache kmalloc-16 of size 16
[   19.500304] The buggy address is located 8 bytes inside of
[   19.500304]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.500874] 
[   19.501088] The buggy address belongs to the physical page:
[   19.501479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.501979] flags: 0x200000000000000(node=0|zone=2)
[   19.502335] page_type: f5(slab)
[   19.502548] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.503051] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.504232] page dumped because: kasan: bad access detected
[   19.504664] 
[   19.504877] Memory state around the buggy address:
[   19.505482]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.505847]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.506354] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.506987]                                                           ^
[   19.507523]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.507990]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.508436] ==================================================================
[   19.662367] ==================================================================
[   19.663447] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   19.664362] Read of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.665432] 
[   19.665986] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.666060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.666074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.666099] Call Trace:
[   19.666116]  <TASK>
[   19.666140]  dump_stack_lvl+0x73/0xb0
[   19.666177]  print_report+0xd1/0x650
[   19.666203]  ? __virt_addr_valid+0x1db/0x2d0
[   19.666228]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   19.666272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.666306]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   19.666336]  kasan_report+0x141/0x180
[   19.666359]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   19.666391]  kasan_check_range+0x10c/0x1c0
[   19.666416]  __kasan_check_read+0x15/0x20
[   19.666436]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   19.666465]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   19.666495]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.666517]  ? trace_hardirqs_on+0x37/0xe0
[   19.666542]  ? kasan_bitops_generic+0x92/0x1c0
[   19.666570]  kasan_bitops_generic+0x121/0x1c0
[   19.666595]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.666621]  ? __pfx_read_tsc+0x10/0x10
[   19.666644]  ? ktime_get_ts64+0x86/0x230
[   19.666681]  kunit_try_run_case+0x1a5/0x480
[   19.666712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.666735]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.666759]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.666783]  ? __kthread_parkme+0x82/0x180
[   19.666805]  ? preempt_count_sub+0x50/0x80
[   19.666831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.666855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.666879]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.666904]  kthread+0x337/0x6f0
[   19.666925]  ? trace_preempt_on+0x20/0xc0
[   19.666948]  ? __pfx_kthread+0x10/0x10
[   19.666970]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.667002]  ? calculate_sigpending+0x7b/0xa0
[   19.667033]  ? __pfx_kthread+0x10/0x10
[   19.667056]  ret_from_fork+0x116/0x1d0
[   19.667076]  ? __pfx_kthread+0x10/0x10
[   19.667098]  ret_from_fork_asm+0x1a/0x30
[   19.667131]  </TASK>
[   19.667143] 
[   19.682832] Allocated by task 278:
[   19.683166]  kasan_save_stack+0x45/0x70
[   19.683432]  kasan_save_track+0x18/0x40
[   19.684141]  kasan_save_alloc_info+0x3b/0x50
[   19.684418]  __kasan_kmalloc+0xb7/0xc0
[   19.684584]  __kmalloc_cache_noprof+0x189/0x420
[   19.685204]  kasan_bitops_generic+0x92/0x1c0
[   19.685816]  kunit_try_run_case+0x1a5/0x480
[   19.686007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.686582]  kthread+0x337/0x6f0
[   19.686880]  ret_from_fork+0x116/0x1d0
[   19.687484]  ret_from_fork_asm+0x1a/0x30
[   19.687925] 
[   19.688056] The buggy address belongs to the object at ffff8881026fb960
[   19.688056]  which belongs to the cache kmalloc-16 of size 16
[   19.688536] The buggy address is located 8 bytes inside of
[   19.688536]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.690108] 
[   19.690231] The buggy address belongs to the physical page:
[   19.690485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.691178] flags: 0x200000000000000(node=0|zone=2)
[   19.691471] page_type: f5(slab)
[   19.692088] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.692488] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.693176] page dumped because: kasan: bad access detected
[   19.693454] 
[   19.693556] Memory state around the buggy address:
[   19.694466]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.694717]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.695247] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.696052]                                                           ^
[   19.696384]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.696878]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.697325] ==================================================================