Hay
Date
June 16, 2025, 7:07 a.m.

Environment
qemu-x86_64

[   13.742993] ==================================================================
[   13.743301] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.744227] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286
[   13.745066] 
[   13.745180] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.745224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.745236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.745256] Call Trace:
[   13.745272]  <TASK>
[   13.745286]  dump_stack_lvl+0x73/0xb0
[   13.745315]  print_report+0xd1/0x650
[   13.745336]  ? __virt_addr_valid+0x1db/0x2d0
[   13.745357]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.745383]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.745666]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.745702]  kasan_report+0x141/0x180
[   13.745725]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.745755]  kasan_check_range+0x10c/0x1c0
[   13.745778]  __kasan_check_write+0x18/0x20
[   13.745796]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.745822]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.745849]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.745872]  ? trace_hardirqs_on+0x37/0xe0
[   13.745893]  ? kasan_bitops_generic+0x92/0x1c0
[   13.745918]  kasan_bitops_generic+0x121/0x1c0
[   13.745952]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.745976]  ? __pfx_read_tsc+0x10/0x10
[   13.745996]  ? ktime_get_ts64+0x86/0x230
[   13.746020]  kunit_try_run_case+0x1a5/0x480
[   13.746043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.746065]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.746087]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.746108]  ? __kthread_parkme+0x82/0x180
[   13.746128]  ? preempt_count_sub+0x50/0x80
[   13.746150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.746173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.746195]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.746217]  kthread+0x337/0x6f0
[   13.746236]  ? trace_preempt_on+0x20/0xc0
[   13.746257]  ? __pfx_kthread+0x10/0x10
[   13.746277]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.746298]  ? calculate_sigpending+0x7b/0xa0
[   13.746322]  ? __pfx_kthread+0x10/0x10
[   13.746343]  ret_from_fork+0x116/0x1d0
[   13.746361]  ? __pfx_kthread+0x10/0x10
[   13.746381]  ret_from_fork_asm+0x1a/0x30
[   13.746465]  </TASK>
[   13.746476] 
[   13.757250] Allocated by task 286:
[   13.757862]  kasan_save_stack+0x45/0x70
[   13.758046]  kasan_save_track+0x18/0x40
[   13.758208]  kasan_save_alloc_info+0x3b/0x50
[   13.758573]  __kasan_kmalloc+0xb7/0xc0
[   13.758766]  __kmalloc_cache_noprof+0x189/0x420
[   13.758981]  kasan_bitops_generic+0x92/0x1c0
[   13.759175]  kunit_try_run_case+0x1a5/0x480
[   13.759362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.759662]  kthread+0x337/0x6f0
[   13.759815]  ret_from_fork+0x116/0x1d0
[   13.759990]  ret_from_fork_asm+0x1a/0x30
[   13.760166] 
[   13.760251] The buggy address belongs to the object at ffff8881025394a0
[   13.760251]  which belongs to the cache kmalloc-16 of size 16
[   13.761238] The buggy address is located 8 bytes inside of
[   13.761238]  allocated 9-byte region [ffff8881025394a0, ffff8881025394a9)
[   13.761979] 
[   13.762078] The buggy address belongs to the physical page:
[   13.762310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539
[   13.762832] flags: 0x200000000000000(node=0|zone=2)
[   13.763078] page_type: f5(slab)
[   13.763232] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.763651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.763968] page dumped because: kasan: bad access detected
[   13.764202] 
[   13.764285] Memory state around the buggy address:
[   13.764547]  ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.764833]  ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.765123] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   13.765459]                                   ^
[   13.765657]  ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.765940]  ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.766165] ==================================================================
[   13.789240] ==================================================================
[   13.789661] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.790084] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286
[   13.790355] 
[   13.790519] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.790564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.790574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.790594] Call Trace:
[   13.790611]  <TASK>
[   13.790627]  dump_stack_lvl+0x73/0xb0
[   13.790655]  print_report+0xd1/0x650
[   13.790675]  ? __virt_addr_valid+0x1db/0x2d0
[   13.790697]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.790723]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.790744]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.790770]  kasan_report+0x141/0x180
[   13.790790]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.790821]  kasan_check_range+0x10c/0x1c0
[   13.790843]  __kasan_check_write+0x18/0x20
[   13.790861]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.790888]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.790915]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.790949]  ? trace_hardirqs_on+0x37/0xe0
[   13.790971]  ? kasan_bitops_generic+0x92/0x1c0
[   13.790997]  kasan_bitops_generic+0x121/0x1c0
[   13.791020]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.791044]  ? __pfx_read_tsc+0x10/0x10
[   13.791064]  ? ktime_get_ts64+0x86/0x230
[   13.791097]  kunit_try_run_case+0x1a5/0x480
[   13.791122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.791143]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.791166]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.791187]  ? __kthread_parkme+0x82/0x180
[   13.791206]  ? preempt_count_sub+0x50/0x80
[   13.791229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.791252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.791274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.791296]  kthread+0x337/0x6f0
[   13.791315]  ? trace_preempt_on+0x20/0xc0
[   13.791336]  ? __pfx_kthread+0x10/0x10
[   13.791357]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.791376]  ? calculate_sigpending+0x7b/0xa0
[   13.791399]  ? __pfx_kthread+0x10/0x10
[   13.791419]  ret_from_fork+0x116/0x1d0
[   13.791437]  ? __pfx_kthread+0x10/0x10
[   13.791456]  ret_from_fork_asm+0x1a/0x30
[   13.791486]  </TASK>
[   13.791496] 
[   13.800053] Allocated by task 286:
[   13.800174]  kasan_save_stack+0x45/0x70
[   13.800307]  kasan_save_track+0x18/0x40
[   13.800642]  kasan_save_alloc_info+0x3b/0x50
[   13.800852]  __kasan_kmalloc+0xb7/0xc0
[   13.801051]  __kmalloc_cache_noprof+0x189/0x420
[   13.801267]  kasan_bitops_generic+0x92/0x1c0
[   13.801588]  kunit_try_run_case+0x1a5/0x480
[   13.801892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.802150]  kthread+0x337/0x6f0
[   13.802266]  ret_from_fork+0x116/0x1d0
[   13.802494]  ret_from_fork_asm+0x1a/0x30
[   13.802704] 
[   13.802789] The buggy address belongs to the object at ffff8881025394a0
[   13.802789]  which belongs to the cache kmalloc-16 of size 16
[   13.803237] The buggy address is located 8 bytes inside of
[   13.803237]  allocated 9-byte region [ffff8881025394a0, ffff8881025394a9)
[   13.803717] 
[   13.803807] The buggy address belongs to the physical page:
[   13.804076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539
[   13.804391] flags: 0x200000000000000(node=0|zone=2)
[   13.804612] page_type: f5(slab)
[   13.804739] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.805077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.805294] page dumped because: kasan: bad access detected
[   13.805616] 
[   13.805706] Memory state around the buggy address:
[   13.805959]  ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.806212]  ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.806419] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   13.806989]                                   ^
[   13.807145]  ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.807500]  ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.807764] ==================================================================
[   13.827591] ==================================================================
[   13.827951] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.828270] Read of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286
[   13.829331] 
[   13.829579] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.829638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.829650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.829673] Call Trace:
[   13.829696]  <TASK>
[   13.829714]  dump_stack_lvl+0x73/0xb0
[   13.829746]  print_report+0xd1/0x650
[   13.829767]  ? __virt_addr_valid+0x1db/0x2d0
[   13.829789]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.829815]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.829835]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.829862]  kasan_report+0x141/0x180
[   13.829883]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.829914]  kasan_check_range+0x10c/0x1c0
[   13.829946]  __kasan_check_read+0x15/0x20
[   13.829964]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.829991]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.830018]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.830041]  ? trace_hardirqs_on+0x37/0xe0
[   13.830063]  ? kasan_bitops_generic+0x92/0x1c0
[   13.830089]  kasan_bitops_generic+0x121/0x1c0
[   13.830112]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.830135]  ? __pfx_read_tsc+0x10/0x10
[   13.830156]  ? ktime_get_ts64+0x86/0x230
[   13.830181]  kunit_try_run_case+0x1a5/0x480
[   13.830205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.830226]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.830249]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.830271]  ? __kthread_parkme+0x82/0x180
[   13.830291]  ? preempt_count_sub+0x50/0x80
[   13.830314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.830336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.830358]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.830513]  kthread+0x337/0x6f0
[   13.830540]  ? trace_preempt_on+0x20/0xc0
[   13.830563]  ? __pfx_kthread+0x10/0x10
[   13.830583]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.830603]  ? calculate_sigpending+0x7b/0xa0
[   13.830628]  ? __pfx_kthread+0x10/0x10
[   13.830691]  ret_from_fork+0x116/0x1d0
[   13.830710]  ? __pfx_kthread+0x10/0x10
[   13.830730]  ret_from_fork_asm+0x1a/0x30
[   13.830760]  </TASK>
[   13.830772] 
[   13.841332] Allocated by task 286:
[   13.841497]  kasan_save_stack+0x45/0x70
[   13.841672]  kasan_save_track+0x18/0x40
[   13.841806]  kasan_save_alloc_info+0x3b/0x50
[   13.842057]  __kasan_kmalloc+0xb7/0xc0
[   13.842349]  __kmalloc_cache_noprof+0x189/0x420
[   13.842582]  kasan_bitops_generic+0x92/0x1c0
[   13.842815]  kunit_try_run_case+0x1a5/0x480
[   13.843056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.843225]  kthread+0x337/0x6f0
[   13.843414]  ret_from_fork+0x116/0x1d0
[   13.843597]  ret_from_fork_asm+0x1a/0x30
[   13.843772] 
[   13.843859] The buggy address belongs to the object at ffff8881025394a0
[   13.843859]  which belongs to the cache kmalloc-16 of size 16
[   13.844307] The buggy address is located 8 bytes inside of
[   13.844307]  allocated 9-byte region [ffff8881025394a0, ffff8881025394a9)
[   13.844781] 
[   13.844850] The buggy address belongs to the physical page:
[   13.845029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539
[   13.845332] flags: 0x200000000000000(node=0|zone=2)
[   13.845592] page_type: f5(slab)
[   13.845912] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.846236] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.846492] page dumped because: kasan: bad access detected
[   13.846657] 
[   13.846720] Memory state around the buggy address:
[   13.846866]  ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.847159]  ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.847470] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   13.847782]                                   ^
[   13.848022]  ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.848451]  ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.848678] ==================================================================
[   13.690259] ==================================================================
[   13.691204] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.693186] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286
[   13.693621] 
[   13.694636] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.694696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.694708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.694731] Call Trace:
[   13.694751]  <TASK>
[   13.694770]  dump_stack_lvl+0x73/0xb0
[   13.694803]  print_report+0xd1/0x650
[   13.694826]  ? __virt_addr_valid+0x1db/0x2d0
[   13.694850]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.694876]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.694898]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.694923]  kasan_report+0x141/0x180
[   13.694963]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.694994]  kasan_check_range+0x10c/0x1c0
[   13.695016]  __kasan_check_write+0x18/0x20
[   13.695035]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.695062]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.695088]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.695111]  ? trace_hardirqs_on+0x37/0xe0
[   13.695135]  ? kasan_bitops_generic+0x92/0x1c0
[   13.695161]  kasan_bitops_generic+0x121/0x1c0
[   13.695183]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.695208]  ? __pfx_read_tsc+0x10/0x10
[   13.695230]  ? ktime_get_ts64+0x86/0x230
[   13.695256]  kunit_try_run_case+0x1a5/0x480
[   13.695280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.695302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.695324]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.695346]  ? __kthread_parkme+0x82/0x180
[   13.695366]  ? preempt_count_sub+0x50/0x80
[   13.695460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.695483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.695506]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.695529]  kthread+0x337/0x6f0
[   13.695548]  ? trace_preempt_on+0x20/0xc0
[   13.695570]  ? __pfx_kthread+0x10/0x10
[   13.695590]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.695610]  ? calculate_sigpending+0x7b/0xa0
[   13.695634]  ? __pfx_kthread+0x10/0x10
[   13.695654]  ret_from_fork+0x116/0x1d0
[   13.695672]  ? __pfx_kthread+0x10/0x10
[   13.695692]  ret_from_fork_asm+0x1a/0x30
[   13.695722]  </TASK>
[   13.695734] 
[   13.705331] Allocated by task 286:
[   13.705572]  kasan_save_stack+0x45/0x70
[   13.705764]  kasan_save_track+0x18/0x40
[   13.705920]  kasan_save_alloc_info+0x3b/0x50
[   13.706080]  __kasan_kmalloc+0xb7/0xc0
[   13.706205]  __kmalloc_cache_noprof+0x189/0x420
[   13.706357]  kasan_bitops_generic+0x92/0x1c0
[   13.706863]  kunit_try_run_case+0x1a5/0x480
[   13.707088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.707257]  kthread+0x337/0x6f0
[   13.707371]  ret_from_fork+0x116/0x1d0
[   13.708015]  ret_from_fork_asm+0x1a/0x30
[   13.708221] 
[   13.708313] The buggy address belongs to the object at ffff8881025394a0
[   13.708313]  which belongs to the cache kmalloc-16 of size 16
[   13.709789] The buggy address is located 8 bytes inside of
[   13.709789]  allocated 9-byte region [ffff8881025394a0, ffff8881025394a9)
[   13.710274] 
[   13.710371] The buggy address belongs to the physical page:
[   13.710607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539
[   13.710976] flags: 0x200000000000000(node=0|zone=2)
[   13.711183] page_type: f5(slab)
[   13.711325] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.711657] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.712002] page dumped because: kasan: bad access detected
[   13.712235] 
[   13.712309] Memory state around the buggy address:
[   13.712791]  ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.713041]  ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.713364] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   13.713698]                                   ^
[   13.713912]  ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.714213]  ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.714600] ==================================================================
[   13.766766] ==================================================================
[   13.767122] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.767577] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286
[   13.767802] 
[   13.767880] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.767925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.767948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.767970] Call Trace:
[   13.767988]  <TASK>
[   13.768004]  dump_stack_lvl+0x73/0xb0
[   13.768032]  print_report+0xd1/0x650
[   13.768053]  ? __virt_addr_valid+0x1db/0x2d0
[   13.768075]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.768101]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.768122]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.768148]  kasan_report+0x141/0x180
[   13.768169]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.768200]  kasan_check_range+0x10c/0x1c0
[   13.768222]  __kasan_check_write+0x18/0x20
[   13.768241]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.768266]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.768293]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.768317]  ? trace_hardirqs_on+0x37/0xe0
[   13.768339]  ? kasan_bitops_generic+0x92/0x1c0
[   13.768365]  kasan_bitops_generic+0x121/0x1c0
[   13.768388]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.768413]  ? __pfx_read_tsc+0x10/0x10
[   13.768435]  ? ktime_get_ts64+0x86/0x230
[   13.768459]  kunit_try_run_case+0x1a5/0x480
[   13.768483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.768504]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.768526]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.768549]  ? __kthread_parkme+0x82/0x180
[   13.768568]  ? preempt_count_sub+0x50/0x80
[   13.768592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.768614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.768636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.768658]  kthread+0x337/0x6f0
[   13.768677]  ? trace_preempt_on+0x20/0xc0
[   13.768698]  ? __pfx_kthread+0x10/0x10
[   13.768719]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.768738]  ? calculate_sigpending+0x7b/0xa0
[   13.768761]  ? __pfx_kthread+0x10/0x10
[   13.768781]  ret_from_fork+0x116/0x1d0
[   13.768799]  ? __pfx_kthread+0x10/0x10
[   13.768818]  ret_from_fork_asm+0x1a/0x30
[   13.768849]  </TASK>
[   13.768859] 
[   13.780950] Allocated by task 286:
[   13.781168]  kasan_save_stack+0x45/0x70
[   13.781366]  kasan_save_track+0x18/0x40
[   13.781587]  kasan_save_alloc_info+0x3b/0x50
[   13.781737]  __kasan_kmalloc+0xb7/0xc0
[   13.781999]  __kmalloc_cache_noprof+0x189/0x420
[   13.782222]  kasan_bitops_generic+0x92/0x1c0
[   13.782436]  kunit_try_run_case+0x1a5/0x480
[   13.782708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.783007]  kthread+0x337/0x6f0
[   13.783153]  ret_from_fork+0x116/0x1d0
[   13.783404]  ret_from_fork_asm+0x1a/0x30
[   13.783581] 
[   13.783662] The buggy address belongs to the object at ffff8881025394a0
[   13.783662]  which belongs to the cache kmalloc-16 of size 16
[   13.784130] The buggy address is located 8 bytes inside of
[   13.784130]  allocated 9-byte region [ffff8881025394a0, ffff8881025394a9)
[   13.784470] 
[   13.784598] The buggy address belongs to the physical page:
[   13.784849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539
[   13.785324] flags: 0x200000000000000(node=0|zone=2)
[   13.785541] page_type: f5(slab)
[   13.785672] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.785982] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.786202] page dumped because: kasan: bad access detected
[   13.786364] 
[   13.786426] Memory state around the buggy address:
[   13.786571]  ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.787051]  ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.787693] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   13.787965]                                   ^
[   13.788173]  ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.788385]  ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.788693] ==================================================================
[   13.715055] ==================================================================
[   13.715387] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.716086] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286
[   13.716886] 
[   13.717019] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.717072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.717083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.717103] Call Trace:
[   13.717120]  <TASK>
[   13.717135]  dump_stack_lvl+0x73/0xb0
[   13.717165]  print_report+0xd1/0x650
[   13.717186]  ? __virt_addr_valid+0x1db/0x2d0
[   13.717208]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.717233]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.717254]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.717282]  kasan_report+0x141/0x180
[   13.717302]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.717333]  kasan_check_range+0x10c/0x1c0
[   13.717356]  __kasan_check_write+0x18/0x20
[   13.717374]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.717503]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.717538]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.717564]  ? trace_hardirqs_on+0x37/0xe0
[   13.717587]  ? kasan_bitops_generic+0x92/0x1c0
[   13.717613]  kasan_bitops_generic+0x121/0x1c0
[   13.717636]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.717706]  ? __pfx_read_tsc+0x10/0x10
[   13.717726]  ? ktime_get_ts64+0x86/0x230
[   13.717752]  kunit_try_run_case+0x1a5/0x480
[   13.717775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.717796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.717818]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.717840]  ? __kthread_parkme+0x82/0x180
[   13.717859]  ? preempt_count_sub+0x50/0x80
[   13.717882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.717904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.717927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.717959]  kthread+0x337/0x6f0
[   13.717978]  ? trace_preempt_on+0x20/0xc0
[   13.718000]  ? __pfx_kthread+0x10/0x10
[   13.718020]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.718040]  ? calculate_sigpending+0x7b/0xa0
[   13.718064]  ? __pfx_kthread+0x10/0x10
[   13.718085]  ret_from_fork+0x116/0x1d0
[   13.718103]  ? __pfx_kthread+0x10/0x10
[   13.718123]  ret_from_fork_asm+0x1a/0x30
[   13.718153]  </TASK>
[   13.718165] 
[   13.730330] Allocated by task 286:
[   13.730598]  kasan_save_stack+0x45/0x70
[   13.730790]  kasan_save_track+0x18/0x40
[   13.730977]  kasan_save_alloc_info+0x3b/0x50
[   13.731170]  __kasan_kmalloc+0xb7/0xc0
[   13.731341]  __kmalloc_cache_noprof+0x189/0x420
[   13.731585]  kasan_bitops_generic+0x92/0x1c0
[   13.731775]  kunit_try_run_case+0x1a5/0x480
[   13.731971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.732201]  kthread+0x337/0x6f0
[   13.732351]  ret_from_fork+0x116/0x1d0
[   13.733262]  ret_from_fork_asm+0x1a/0x30
[   13.733762] 
[   13.733876] The buggy address belongs to the object at ffff8881025394a0
[   13.733876]  which belongs to the cache kmalloc-16 of size 16
[   13.734832] The buggy address is located 8 bytes inside of
[   13.734832]  allocated 9-byte region [ffff8881025394a0, ffff8881025394a9)
[   13.735328] 
[   13.735762] The buggy address belongs to the physical page:
[   13.736099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539
[   13.736785] flags: 0x200000000000000(node=0|zone=2)
[   13.737240] page_type: f5(slab)
[   13.737581] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.737906] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.738214] page dumped because: kasan: bad access detected
[   13.738754] 
[   13.739012] Memory state around the buggy address:
[   13.739349]  ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.739716]  ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.740019] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   13.740297]                                   ^
[   13.740946]  ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.741376]  ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.742094] ==================================================================
[   13.671087] ==================================================================
[   13.671605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.671978] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286
[   13.672250] 
[   13.672351] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.672393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.672456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.672476] Call Trace:
[   13.672489]  <TASK>
[   13.672504]  dump_stack_lvl+0x73/0xb0
[   13.672529]  print_report+0xd1/0x650
[   13.672550]  ? __virt_addr_valid+0x1db/0x2d0
[   13.672571]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.672597]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.672617]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.672644]  kasan_report+0x141/0x180
[   13.672665]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.672696]  kasan_check_range+0x10c/0x1c0
[   13.672719]  __kasan_check_write+0x18/0x20
[   13.672737]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.672763]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.672791]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.672814]  ? trace_hardirqs_on+0x37/0xe0
[   13.672835]  ? kasan_bitops_generic+0x92/0x1c0
[   13.672861]  kasan_bitops_generic+0x121/0x1c0
[   13.672884]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.672908]  ? __pfx_read_tsc+0x10/0x10
[   13.672928]  ? ktime_get_ts64+0x86/0x230
[   13.672966]  kunit_try_run_case+0x1a5/0x480
[   13.672989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.673010]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.673032]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.673054]  ? __kthread_parkme+0x82/0x180
[   13.673074]  ? preempt_count_sub+0x50/0x80
[   13.673096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.673119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.673141]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.673163]  kthread+0x337/0x6f0
[   13.673182]  ? trace_preempt_on+0x20/0xc0
[   13.673203]  ? __pfx_kthread+0x10/0x10
[   13.673224]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.673243]  ? calculate_sigpending+0x7b/0xa0
[   13.673267]  ? __pfx_kthread+0x10/0x10
[   13.673288]  ret_from_fork+0x116/0x1d0
[   13.673305]  ? __pfx_kthread+0x10/0x10
[   13.673325]  ret_from_fork_asm+0x1a/0x30
[   13.673355]  </TASK>
[   13.673366] 
[   13.681699] Allocated by task 286:
[   13.681856]  kasan_save_stack+0x45/0x70
[   13.682010]  kasan_save_track+0x18/0x40
[   13.682140]  kasan_save_alloc_info+0x3b/0x50
[   13.682280]  __kasan_kmalloc+0xb7/0xc0
[   13.682403]  __kmalloc_cache_noprof+0x189/0x420
[   13.682778]  kasan_bitops_generic+0x92/0x1c0
[   13.683004]  kunit_try_run_case+0x1a5/0x480
[   13.683211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.683450]  kthread+0x337/0x6f0
[   13.683615]  ret_from_fork+0x116/0x1d0
[   13.683768]  ret_from_fork_asm+0x1a/0x30
[   13.683900] 
[   13.683972] The buggy address belongs to the object at ffff8881025394a0
[   13.683972]  which belongs to the cache kmalloc-16 of size 16
[   13.684336] The buggy address is located 8 bytes inside of
[   13.684336]  allocated 9-byte region [ffff8881025394a0, ffff8881025394a9)
[   13.685747] 
[   13.685844] The buggy address belongs to the physical page:
[   13.686090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539
[   13.686489] flags: 0x200000000000000(node=0|zone=2)
[   13.686659] page_type: f5(slab)
[   13.686778] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.687104] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.687502] page dumped because: kasan: bad access detected
[   13.687726] 
[   13.687791] Memory state around the buggy address:
[   13.687998]  ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.688207]  ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.688501] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   13.688825]                                   ^
[   13.689052]  ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.689372]  ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.689797] ==================================================================
[   13.849143] ==================================================================
[   13.849425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.849701] Read of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286
[   13.849992] 
[   13.850095] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.850138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.850148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.850167] Call Trace:
[   13.850183]  <TASK>
[   13.850197]  dump_stack_lvl+0x73/0xb0
[   13.850222]  print_report+0xd1/0x650
[   13.850244]  ? __virt_addr_valid+0x1db/0x2d0
[   13.850266]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.850293]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.850315]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.850341]  kasan_report+0x141/0x180
[   13.850362]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.850418]  __asan_report_load8_noabort+0x18/0x20
[   13.850442]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.850468]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.850495]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.850518]  ? trace_hardirqs_on+0x37/0xe0
[   13.850541]  ? kasan_bitops_generic+0x92/0x1c0
[   13.850567]  kasan_bitops_generic+0x121/0x1c0
[   13.850589]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.850613]  ? __pfx_read_tsc+0x10/0x10
[   13.850633]  ? ktime_get_ts64+0x86/0x230
[   13.850657]  kunit_try_run_case+0x1a5/0x480
[   13.850680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.850701]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.850723]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.850744]  ? __kthread_parkme+0x82/0x180
[   13.850763]  ? preempt_count_sub+0x50/0x80
[   13.850787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.850809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.850831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.850853]  kthread+0x337/0x6f0
[   13.850872]  ? trace_preempt_on+0x20/0xc0
[   13.850894]  ? __pfx_kthread+0x10/0x10
[   13.850913]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.850941]  ? calculate_sigpending+0x7b/0xa0
[   13.850965]  ? __pfx_kthread+0x10/0x10
[   13.850986]  ret_from_fork+0x116/0x1d0
[   13.851004]  ? __pfx_kthread+0x10/0x10
[   13.851024]  ret_from_fork_asm+0x1a/0x30
[   13.851054]  </TASK>
[   13.851064] 
[   13.859273] Allocated by task 286:
[   13.859515]  kasan_save_stack+0x45/0x70
[   13.859703]  kasan_save_track+0x18/0x40
[   13.859877]  kasan_save_alloc_info+0x3b/0x50
[   13.860051]  __kasan_kmalloc+0xb7/0xc0
[   13.860176]  __kmalloc_cache_noprof+0x189/0x420
[   13.860323]  kasan_bitops_generic+0x92/0x1c0
[   13.860464]  kunit_try_run_case+0x1a5/0x480
[   13.860669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.860911]  kthread+0x337/0x6f0
[   13.861083]  ret_from_fork+0x116/0x1d0
[   13.861274]  ret_from_fork_asm+0x1a/0x30
[   13.861471] 
[   13.861560] The buggy address belongs to the object at ffff8881025394a0
[   13.861560]  which belongs to the cache kmalloc-16 of size 16
[   13.862193] The buggy address is located 8 bytes inside of
[   13.862193]  allocated 9-byte region [ffff8881025394a0, ffff8881025394a9)
[   13.862650] 
[   13.862741] The buggy address belongs to the physical page:
[   13.862977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539
[   13.863251] flags: 0x200000000000000(node=0|zone=2)
[   13.863587] page_type: f5(slab)
[   13.863729] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.864016] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.864401] page dumped because: kasan: bad access detected
[   13.864563] 
[   13.864668] Memory state around the buggy address:
[   13.865011]  ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.865276]  ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.865609] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   13.865831]                                   ^
[   13.866162]  ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.866483]  ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.866716] ==================================================================
[   13.808171] ==================================================================
[   13.808396] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.808657] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286
[   13.808868] 
[   13.808957] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.808998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.809020] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.809041] Call Trace:
[   13.809056]  <TASK>
[   13.809072]  dump_stack_lvl+0x73/0xb0
[   13.809098]  print_report+0xd1/0x650
[   13.809119]  ? __virt_addr_valid+0x1db/0x2d0
[   13.809142]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.809167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.809189]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.809215]  kasan_report+0x141/0x180
[   13.809236]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.809267]  kasan_check_range+0x10c/0x1c0
[   13.809289]  __kasan_check_write+0x18/0x20
[   13.809308]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.809334]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.809361]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.809384]  ? trace_hardirqs_on+0x37/0xe0
[   13.809406]  ? kasan_bitops_generic+0x92/0x1c0
[   13.809431]  kasan_bitops_generic+0x121/0x1c0
[   13.809453]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.809477]  ? __pfx_read_tsc+0x10/0x10
[   13.809497]  ? ktime_get_ts64+0x86/0x230
[   13.809521]  kunit_try_run_case+0x1a5/0x480
[   13.809544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.809566]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.809587]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.809608]  ? __kthread_parkme+0x82/0x180
[   13.809628]  ? preempt_count_sub+0x50/0x80
[   13.809651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.809674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.809702]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.809725]  kthread+0x337/0x6f0
[   13.809743]  ? trace_preempt_on+0x20/0xc0
[   13.809764]  ? __pfx_kthread+0x10/0x10
[   13.809784]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.809804]  ? calculate_sigpending+0x7b/0xa0
[   13.809827]  ? __pfx_kthread+0x10/0x10
[   13.809848]  ret_from_fork+0x116/0x1d0
[   13.809865]  ? __pfx_kthread+0x10/0x10
[   13.809885]  ret_from_fork_asm+0x1a/0x30
[   13.809914]  </TASK>
[   13.809925] 
[   13.818796] Allocated by task 286:
[   13.818982]  kasan_save_stack+0x45/0x70
[   13.819179]  kasan_save_track+0x18/0x40
[   13.819366]  kasan_save_alloc_info+0x3b/0x50
[   13.819573]  __kasan_kmalloc+0xb7/0xc0
[   13.819763]  __kmalloc_cache_noprof+0x189/0x420
[   13.819992]  kasan_bitops_generic+0x92/0x1c0
[   13.820219]  kunit_try_run_case+0x1a5/0x480
[   13.820423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.820668]  kthread+0x337/0x6f0
[   13.820831]  ret_from_fork+0x116/0x1d0
[   13.821031]  ret_from_fork_asm+0x1a/0x30
[   13.821231] 
[   13.821321] The buggy address belongs to the object at ffff8881025394a0
[   13.821321]  which belongs to the cache kmalloc-16 of size 16
[   13.821882] The buggy address is located 8 bytes inside of
[   13.821882]  allocated 9-byte region [ffff8881025394a0, ffff8881025394a9)
[   13.822231] 
[   13.822296] The buggy address belongs to the physical page:
[   13.822460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539
[   13.822688] flags: 0x200000000000000(node=0|zone=2)
[   13.822838] page_type: f5(slab)
[   13.822976] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.823389] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.823875] page dumped because: kasan: bad access detected
[   13.824126] 
[   13.824210] Memory state around the buggy address:
[   13.824421]  ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.824724]  ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.824956] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   13.825162]                                   ^
[   13.825300]  ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.825604]  ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.825906] ==================================================================