Hay
Date
June 24, 2025, 12:47 p.m.

Environment
qemu-x86_64

[   14.419263] ==================================================================
[   14.419648] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.420125] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.420420] 
[   14.420562] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.421705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.421737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.421770] Call Trace:
[   14.421795]  <TASK>
[   14.421821]  dump_stack_lvl+0x73/0xb0
[   14.421860]  print_report+0xd1/0x650
[   14.421883]  ? __virt_addr_valid+0x1db/0x2d0
[   14.421905]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.421928]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.421963]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.421987]  kasan_report+0x141/0x180
[   14.422009]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.422037]  kasan_check_range+0x10c/0x1c0
[   14.422057]  __kasan_check_write+0x18/0x20
[   14.422077]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.422098]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.422121]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.422141]  ? trace_hardirqs_on+0x37/0xe0
[   14.422163]  ? kasan_bitops_generic+0x92/0x1c0
[   14.422186]  kasan_bitops_generic+0x121/0x1c0
[   14.422205]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.422225]  ? __pfx_read_tsc+0x10/0x10
[   14.422245]  ? ktime_get_ts64+0x86/0x230
[   14.422270]  kunit_try_run_case+0x1a5/0x480
[   14.422304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.422325]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.422348]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.422370]  ? __kthread_parkme+0x82/0x180
[   14.422392]  ? preempt_count_sub+0x50/0x80
[   14.422416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.422437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.422459]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.422480]  kthread+0x337/0x6f0
[   14.422497]  ? trace_preempt_on+0x20/0xc0
[   14.422517]  ? __pfx_kthread+0x10/0x10
[   14.422535]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.422565]  ? calculate_sigpending+0x7b/0xa0
[   14.422586]  ? __pfx_kthread+0x10/0x10
[   14.422604]  ret_from_fork+0x41/0x80
[   14.422638]  ? __pfx_kthread+0x10/0x10
[   14.422659]  ret_from_fork_asm+0x1a/0x30
[   14.422689]  </TASK>
[   14.422703] 
[   14.434513] Allocated by task 281:
[   14.434928]  kasan_save_stack+0x45/0x70
[   14.435279]  kasan_save_track+0x18/0x40
[   14.435445]  kasan_save_alloc_info+0x3b/0x50
[   14.435943]  __kasan_kmalloc+0xb7/0xc0
[   14.436335]  __kmalloc_cache_noprof+0x189/0x420
[   14.436548]  kasan_bitops_generic+0x92/0x1c0
[   14.436729]  kunit_try_run_case+0x1a5/0x480
[   14.436908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.437106]  kthread+0x337/0x6f0
[   14.437371]  ret_from_fork+0x41/0x80
[   14.437808]  ret_from_fork_asm+0x1a/0x30
[   14.438166] 
[   14.438284] The buggy address belongs to the object at ffff888102662fc0
[   14.438284]  which belongs to the cache kmalloc-16 of size 16
[   14.438981] The buggy address is located 8 bytes inside of
[   14.438981]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.439580] 
[   14.439771] The buggy address belongs to the physical page:
[   14.440149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.440460] flags: 0x200000000000000(node=0|zone=2)
[   14.440681] page_type: f5(slab)
[   14.440951] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.441532] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.441972] page dumped because: kasan: bad access detected
[   14.442182] 
[   14.442323] Memory state around the buggy address:
[   14.442692]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.443470]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.444082] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.444477]                                               ^
[   14.444924]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.445268]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.445711] ==================================================================
[   14.475214] ==================================================================
[   14.476207] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.476993] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.477538] 
[   14.477871] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.477984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.478030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.478073] Call Trace:
[   14.478119]  <TASK>
[   14.478161]  dump_stack_lvl+0x73/0xb0
[   14.478224]  print_report+0xd1/0x650
[   14.478287]  ? __virt_addr_valid+0x1db/0x2d0
[   14.478332]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.478377]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.478415]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.478459]  kasan_report+0x141/0x180
[   14.478501]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.478573]  kasan_check_range+0x10c/0x1c0
[   14.478613]  __kasan_check_write+0x18/0x20
[   14.478664]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.478711]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.478742]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.478771]  ? trace_hardirqs_on+0x37/0xe0
[   14.478799]  ? kasan_bitops_generic+0x92/0x1c0
[   14.478829]  kasan_bitops_generic+0x121/0x1c0
[   14.478859]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.478892]  ? __pfx_read_tsc+0x10/0x10
[   14.478917]  ? ktime_get_ts64+0x86/0x230
[   14.478941]  kunit_try_run_case+0x1a5/0x480
[   14.478968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.478988]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.479012]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.479034]  ? __kthread_parkme+0x82/0x180
[   14.479056]  ? preempt_count_sub+0x50/0x80
[   14.479080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.479102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.479124]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.479146]  kthread+0x337/0x6f0
[   14.479162]  ? trace_preempt_on+0x20/0xc0
[   14.479183]  ? __pfx_kthread+0x10/0x10
[   14.479200]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.479220]  ? calculate_sigpending+0x7b/0xa0
[   14.479242]  ? __pfx_kthread+0x10/0x10
[   14.479260]  ret_from_fork+0x41/0x80
[   14.479278]  ? __pfx_kthread+0x10/0x10
[   14.479295]  ret_from_fork_asm+0x1a/0x30
[   14.479327]  </TASK>
[   14.479340] 
[   14.489147] Allocated by task 281:
[   14.489373]  kasan_save_stack+0x45/0x70
[   14.489753]  kasan_save_track+0x18/0x40
[   14.490045]  kasan_save_alloc_info+0x3b/0x50
[   14.490375]  __kasan_kmalloc+0xb7/0xc0
[   14.490657]  __kmalloc_cache_noprof+0x189/0x420
[   14.490994]  kasan_bitops_generic+0x92/0x1c0
[   14.491294]  kunit_try_run_case+0x1a5/0x480
[   14.491522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.491795]  kthread+0x337/0x6f0
[   14.491956]  ret_from_fork+0x41/0x80
[   14.492124]  ret_from_fork_asm+0x1a/0x30
[   14.492399] 
[   14.492556] The buggy address belongs to the object at ffff888102662fc0
[   14.492556]  which belongs to the cache kmalloc-16 of size 16
[   14.493323] The buggy address is located 8 bytes inside of
[   14.493323]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.493789] 
[   14.493896] The buggy address belongs to the physical page:
[   14.494152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.494693] flags: 0x200000000000000(node=0|zone=2)
[   14.495045] page_type: f5(slab)
[   14.495318] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.495885] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.496316] page dumped because: kasan: bad access detected
[   14.496610] 
[   14.496726] Memory state around the buggy address:
[   14.496916]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.497161]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.497494] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.497956]                                               ^
[   14.498396]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.498636]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.498862] ==================================================================
[   14.328848] ==================================================================
[   14.330731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.331313] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.331718] 
[   14.331868] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.331982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.332008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.332051] Call Trace:
[   14.332110]  <TASK>
[   14.332164]  dump_stack_lvl+0x73/0xb0
[   14.332225]  print_report+0xd1/0x650
[   14.332279]  ? __virt_addr_valid+0x1db/0x2d0
[   14.332321]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.332367]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.332414]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.332464]  kasan_report+0x141/0x180
[   14.332511]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.332575]  kasan_check_range+0x10c/0x1c0
[   14.332613]  __kasan_check_write+0x18/0x20
[   14.332668]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.332726]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.332772]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.332823]  ? trace_hardirqs_on+0x37/0xe0
[   14.332867]  ? kasan_bitops_generic+0x92/0x1c0
[   14.332925]  kasan_bitops_generic+0x121/0x1c0
[   14.332974]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.333011]  ? __pfx_read_tsc+0x10/0x10
[   14.333049]  ? ktime_get_ts64+0x86/0x230
[   14.333094]  kunit_try_run_case+0x1a5/0x480
[   14.333140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.333184]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.333232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.333278]  ? __kthread_parkme+0x82/0x180
[   14.333323]  ? preempt_count_sub+0x50/0x80
[   14.333375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.333422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.333469]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.333510]  kthread+0x337/0x6f0
[   14.333537]  ? trace_preempt_on+0x20/0xc0
[   14.333575]  ? __pfx_kthread+0x10/0x10
[   14.333604]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.333655]  ? calculate_sigpending+0x7b/0xa0
[   14.333694]  ? __pfx_kthread+0x10/0x10
[   14.333729]  ret_from_fork+0x41/0x80
[   14.334075]  ? __pfx_kthread+0x10/0x10
[   14.334131]  ret_from_fork_asm+0x1a/0x30
[   14.334192]  </TASK>
[   14.334215] 
[   14.348095] Allocated by task 281:
[   14.348457]  kasan_save_stack+0x45/0x70
[   14.348924]  kasan_save_track+0x18/0x40
[   14.349080]  kasan_save_alloc_info+0x3b/0x50
[   14.349568]  __kasan_kmalloc+0xb7/0xc0
[   14.349937]  __kmalloc_cache_noprof+0x189/0x420
[   14.350363]  kasan_bitops_generic+0x92/0x1c0
[   14.350722]  kunit_try_run_case+0x1a5/0x480
[   14.351035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.351433]  kthread+0x337/0x6f0
[   14.351882]  ret_from_fork+0x41/0x80
[   14.352097]  ret_from_fork_asm+0x1a/0x30
[   14.352379] 
[   14.352538] The buggy address belongs to the object at ffff888102662fc0
[   14.352538]  which belongs to the cache kmalloc-16 of size 16
[   14.353330] The buggy address is located 8 bytes inside of
[   14.353330]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.354219] 
[   14.354377] The buggy address belongs to the physical page:
[   14.354596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.355230] flags: 0x200000000000000(node=0|zone=2)
[   14.355635] page_type: f5(slab)
[   14.355931] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.356509] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.356941] page dumped because: kasan: bad access detected
[   14.357341] 
[   14.357498] Memory state around the buggy address:
[   14.357851]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.358170]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.358616] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.359001]                                               ^
[   14.359336]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.360268]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.360502] ==================================================================
[   14.390078] ==================================================================
[   14.390384] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.390853] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.391337] 
[   14.392153] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.392282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.392299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.392325] Call Trace:
[   14.392352]  <TASK>
[   14.392378]  dump_stack_lvl+0x73/0xb0
[   14.392415]  print_report+0xd1/0x650
[   14.392439]  ? __virt_addr_valid+0x1db/0x2d0
[   14.392461]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.392483]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.392505]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.392529]  kasan_report+0x141/0x180
[   14.392948]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.393031]  kasan_check_range+0x10c/0x1c0
[   14.393079]  __kasan_check_write+0x18/0x20
[   14.393112]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.393137]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.393160]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.393182]  ? trace_hardirqs_on+0x37/0xe0
[   14.393204]  ? kasan_bitops_generic+0x92/0x1c0
[   14.393227]  kasan_bitops_generic+0x121/0x1c0
[   14.393247]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.393267]  ? __pfx_read_tsc+0x10/0x10
[   14.393287]  ? ktime_get_ts64+0x86/0x230
[   14.393310]  kunit_try_run_case+0x1a5/0x480
[   14.393336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.393356]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.393378]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.393400]  ? __kthread_parkme+0x82/0x180
[   14.393421]  ? preempt_count_sub+0x50/0x80
[   14.393445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.393466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.393488]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.393509]  kthread+0x337/0x6f0
[   14.393525]  ? trace_preempt_on+0x20/0xc0
[   14.393570]  ? __pfx_kthread+0x10/0x10
[   14.393589]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.393609]  ? calculate_sigpending+0x7b/0xa0
[   14.393649]  ? __pfx_kthread+0x10/0x10
[   14.393670]  ret_from_fork+0x41/0x80
[   14.393691]  ? __pfx_kthread+0x10/0x10
[   14.393708]  ret_from_fork_asm+0x1a/0x30
[   14.393738]  </TASK>
[   14.393750] 
[   14.406349] Allocated by task 281:
[   14.407126]  kasan_save_stack+0x45/0x70
[   14.407359]  kasan_save_track+0x18/0x40
[   14.407526]  kasan_save_alloc_info+0x3b/0x50
[   14.408013]  __kasan_kmalloc+0xb7/0xc0
[   14.408402]  __kmalloc_cache_noprof+0x189/0x420
[   14.408873]  kasan_bitops_generic+0x92/0x1c0
[   14.409099]  kunit_try_run_case+0x1a5/0x480
[   14.409308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.409542]  kthread+0x337/0x6f0
[   14.409727]  ret_from_fork+0x41/0x80
[   14.409897]  ret_from_fork_asm+0x1a/0x30
[   14.410104] 
[   14.410203] The buggy address belongs to the object at ffff888102662fc0
[   14.410203]  which belongs to the cache kmalloc-16 of size 16
[   14.411782] The buggy address is located 8 bytes inside of
[   14.411782]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.412402] 
[   14.412548] The buggy address belongs to the physical page:
[   14.412805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.413124] flags: 0x200000000000000(node=0|zone=2)
[   14.413370] page_type: f5(slab)
[   14.413707] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.414049] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.414306] page dumped because: kasan: bad access detected
[   14.414674] 
[   14.414845] Memory state around the buggy address:
[   14.415272]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.415804]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.416196] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.416696]                                               ^
[   14.417087]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.417483]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.417918] ==================================================================
[   14.362759] ==================================================================
[   14.363061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.363323] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.363503] 
[   14.363725] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.363818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.363842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.363885] Call Trace:
[   14.363925]  <TASK>
[   14.363960]  dump_stack_lvl+0x73/0xb0
[   14.364043]  print_report+0xd1/0x650
[   14.364089]  ? __virt_addr_valid+0x1db/0x2d0
[   14.364146]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.364192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.364240]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.364289]  kasan_report+0x141/0x180
[   14.364331]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.364360]  kasan_check_range+0x10c/0x1c0
[   14.364380]  __kasan_check_write+0x18/0x20
[   14.364400]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.364423]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.364448]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.364469]  ? trace_hardirqs_on+0x37/0xe0
[   14.364491]  ? kasan_bitops_generic+0x92/0x1c0
[   14.364514]  kasan_bitops_generic+0x121/0x1c0
[   14.364533]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.364578]  ? __pfx_read_tsc+0x10/0x10
[   14.364609]  ? ktime_get_ts64+0x86/0x230
[   14.364667]  kunit_try_run_case+0x1a5/0x480
[   14.364713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.364752]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.364794]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.364840]  ? __kthread_parkme+0x82/0x180
[   14.364880]  ? preempt_count_sub+0x50/0x80
[   14.364928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.364973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.365013]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.365047]  kthread+0x337/0x6f0
[   14.365078]  ? trace_preempt_on+0x20/0xc0
[   14.365121]  ? __pfx_kthread+0x10/0x10
[   14.365159]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.365201]  ? calculate_sigpending+0x7b/0xa0
[   14.365246]  ? __pfx_kthread+0x10/0x10
[   14.365283]  ret_from_fork+0x41/0x80
[   14.365324]  ? __pfx_kthread+0x10/0x10
[   14.365356]  ret_from_fork_asm+0x1a/0x30
[   14.365395]  </TASK>
[   14.365413] 
[   14.377975] Allocated by task 281:
[   14.378339]  kasan_save_stack+0x45/0x70
[   14.378672]  kasan_save_track+0x18/0x40
[   14.379062]  kasan_save_alloc_info+0x3b/0x50
[   14.379349]  __kasan_kmalloc+0xb7/0xc0
[   14.379566]  __kmalloc_cache_noprof+0x189/0x420
[   14.379817]  kasan_bitops_generic+0x92/0x1c0
[   14.380013]  kunit_try_run_case+0x1a5/0x480
[   14.380224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.380464]  kthread+0x337/0x6f0
[   14.380710]  ret_from_fork+0x41/0x80
[   14.381371]  ret_from_fork_asm+0x1a/0x30
[   14.381620] 
[   14.382137] The buggy address belongs to the object at ffff888102662fc0
[   14.382137]  which belongs to the cache kmalloc-16 of size 16
[   14.382795] The buggy address is located 8 bytes inside of
[   14.382795]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.383268] 
[   14.383372] The buggy address belongs to the physical page:
[   14.383697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.384238] flags: 0x200000000000000(node=0|zone=2)
[   14.384449] page_type: f5(slab)
[   14.384683] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.384944] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.385260] page dumped because: kasan: bad access detected
[   14.385726] 
[   14.385899] Memory state around the buggy address:
[   14.386289]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.386865]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.387345] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.387609]                                               ^
[   14.387903]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.388293]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.388635] ==================================================================
[   14.447685] ==================================================================
[   14.448166] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.449299] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.449742] 
[   14.450172] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.450248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.450269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.450309] Call Trace:
[   14.450372]  <TASK>
[   14.450402]  dump_stack_lvl+0x73/0xb0
[   14.450441]  print_report+0xd1/0x650
[   14.450471]  ? __virt_addr_valid+0x1db/0x2d0
[   14.450493]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.450526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.450657]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.450712]  kasan_report+0x141/0x180
[   14.450737]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.450765]  kasan_check_range+0x10c/0x1c0
[   14.450784]  __kasan_check_write+0x18/0x20
[   14.450803]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.450825]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.450847]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.450868]  ? trace_hardirqs_on+0x37/0xe0
[   14.450890]  ? kasan_bitops_generic+0x92/0x1c0
[   14.450912]  kasan_bitops_generic+0x121/0x1c0
[   14.450932]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.450952]  ? __pfx_read_tsc+0x10/0x10
[   14.450970]  ? ktime_get_ts64+0x86/0x230
[   14.450994]  kunit_try_run_case+0x1a5/0x480
[   14.451019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.451039]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.451061]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.451083]  ? __kthread_parkme+0x82/0x180
[   14.451104]  ? preempt_count_sub+0x50/0x80
[   14.451128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.451149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.451171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.451192]  kthread+0x337/0x6f0
[   14.451209]  ? trace_preempt_on+0x20/0xc0
[   14.451229]  ? __pfx_kthread+0x10/0x10
[   14.451246]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.451266]  ? calculate_sigpending+0x7b/0xa0
[   14.451287]  ? __pfx_kthread+0x10/0x10
[   14.451304]  ret_from_fork+0x41/0x80
[   14.451323]  ? __pfx_kthread+0x10/0x10
[   14.451340]  ret_from_fork_asm+0x1a/0x30
[   14.451369]  </TASK>
[   14.451382] 
[   14.462534] Allocated by task 281:
[   14.462977]  kasan_save_stack+0x45/0x70
[   14.463365]  kasan_save_track+0x18/0x40
[   14.463765]  kasan_save_alloc_info+0x3b/0x50
[   14.464170]  __kasan_kmalloc+0xb7/0xc0
[   14.464344]  __kmalloc_cache_noprof+0x189/0x420
[   14.464754]  kasan_bitops_generic+0x92/0x1c0
[   14.464941]  kunit_try_run_case+0x1a5/0x480
[   14.465338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.465601]  kthread+0x337/0x6f0
[   14.465912]  ret_from_fork+0x41/0x80
[   14.466129]  ret_from_fork_asm+0x1a/0x30
[   14.466507] 
[   14.466664] The buggy address belongs to the object at ffff888102662fc0
[   14.466664]  which belongs to the cache kmalloc-16 of size 16
[   14.467035] The buggy address is located 8 bytes inside of
[   14.467035]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.467873] 
[   14.468042] The buggy address belongs to the physical page:
[   14.468419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.468860] flags: 0x200000000000000(node=0|zone=2)
[   14.469072] page_type: f5(slab)
[   14.469241] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.469645] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.470187] page dumped because: kasan: bad access detected
[   14.470602] 
[   14.470801] Memory state around the buggy address:
[   14.471066]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.471311]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.471903] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.472398]                                               ^
[   14.472842]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.473319]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.473786] ==================================================================
[   14.500204] ==================================================================
[   14.501528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.502160] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.502658] 
[   14.502852] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.502945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.502970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.503011] Call Trace:
[   14.503056]  <TASK>
[   14.503096]  dump_stack_lvl+0x73/0xb0
[   14.503150]  print_report+0xd1/0x650
[   14.503197]  ? __virt_addr_valid+0x1db/0x2d0
[   14.503244]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.503287]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.503330]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.503373]  kasan_report+0x141/0x180
[   14.503418]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.503475]  kasan_check_range+0x10c/0x1c0
[   14.503516]  __kasan_check_write+0x18/0x20
[   14.503550]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.503585]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.504092]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.504176]  ? trace_hardirqs_on+0x37/0xe0
[   14.504224]  ? kasan_bitops_generic+0x92/0x1c0
[   14.504276]  kasan_bitops_generic+0x121/0x1c0
[   14.504316]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.504360]  ? __pfx_read_tsc+0x10/0x10
[   14.504400]  ? ktime_get_ts64+0x86/0x230
[   14.504451]  kunit_try_run_case+0x1a5/0x480
[   14.504502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.504544]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.504588]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.504648]  ? __kthread_parkme+0x82/0x180
[   14.504695]  ? preempt_count_sub+0x50/0x80
[   14.504745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.504792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.504839]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.504881]  kthread+0x337/0x6f0
[   14.504913]  ? trace_preempt_on+0x20/0xc0
[   14.504957]  ? __pfx_kthread+0x10/0x10
[   14.504993]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.505030]  ? calculate_sigpending+0x7b/0xa0
[   14.505053]  ? __pfx_kthread+0x10/0x10
[   14.505070]  ret_from_fork+0x41/0x80
[   14.505090]  ? __pfx_kthread+0x10/0x10
[   14.505107]  ret_from_fork_asm+0x1a/0x30
[   14.505135]  </TASK>
[   14.505147] 
[   14.515073] Allocated by task 281:
[   14.515394]  kasan_save_stack+0x45/0x70
[   14.515861]  kasan_save_track+0x18/0x40
[   14.516027]  kasan_save_alloc_info+0x3b/0x50
[   14.516206]  __kasan_kmalloc+0xb7/0xc0
[   14.516369]  __kmalloc_cache_noprof+0x189/0x420
[   14.516722]  kasan_bitops_generic+0x92/0x1c0
[   14.517055]  kunit_try_run_case+0x1a5/0x480
[   14.517384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.517836]  kthread+0x337/0x6f0
[   14.518100]  ret_from_fork+0x41/0x80
[   14.518275]  ret_from_fork_asm+0x1a/0x30
[   14.518572] 
[   14.518756] The buggy address belongs to the object at ffff888102662fc0
[   14.518756]  which belongs to the cache kmalloc-16 of size 16
[   14.519258] The buggy address is located 8 bytes inside of
[   14.519258]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.519720] 
[   14.519887] The buggy address belongs to the physical page:
[   14.520286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.520881] flags: 0x200000000000000(node=0|zone=2)
[   14.521153] page_type: f5(slab)
[   14.521335] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.521702] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.522222] page dumped because: kasan: bad access detected
[   14.522646] 
[   14.522778] Memory state around the buggy address:
[   14.523065]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.523421]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.524016] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.524316]                                               ^
[   14.524772]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.525017]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.525248] ==================================================================
[   14.528465] ==================================================================
[   14.529050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.530259] Read of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.530903] 
[   14.531111] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.531219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.531246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.531307] Call Trace:
[   14.531349]  <TASK>
[   14.531388]  dump_stack_lvl+0x73/0xb0
[   14.531463]  print_report+0xd1/0x650
[   14.531523]  ? __virt_addr_valid+0x1db/0x2d0
[   14.531574]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.531616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.531684]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.531732]  kasan_report+0x141/0x180
[   14.531791]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.531846]  kasan_check_range+0x10c/0x1c0
[   14.531895]  __kasan_check_read+0x15/0x20
[   14.531938]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.532000]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.532051]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.532075]  ? trace_hardirqs_on+0x37/0xe0
[   14.532099]  ? kasan_bitops_generic+0x92/0x1c0
[   14.532122]  kasan_bitops_generic+0x121/0x1c0
[   14.532142]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.532163]  ? __pfx_read_tsc+0x10/0x10
[   14.532189]  ? ktime_get_ts64+0x86/0x230
[   14.532230]  kunit_try_run_case+0x1a5/0x480
[   14.532277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.532317]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.532363]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.532405]  ? __kthread_parkme+0x82/0x180
[   14.532442]  ? preempt_count_sub+0x50/0x80
[   14.532483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.532525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.532582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.532638]  kthread+0x337/0x6f0
[   14.532675]  ? trace_preempt_on+0x20/0xc0
[   14.532723]  ? __pfx_kthread+0x10/0x10
[   14.532751]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.532772]  ? calculate_sigpending+0x7b/0xa0
[   14.532794]  ? __pfx_kthread+0x10/0x10
[   14.532812]  ret_from_fork+0x41/0x80
[   14.532832]  ? __pfx_kthread+0x10/0x10
[   14.532850]  ret_from_fork_asm+0x1a/0x30
[   14.532880]  </TASK>
[   14.532893] 
[   14.542201] Allocated by task 281:
[   14.542434]  kasan_save_stack+0x45/0x70
[   14.542780]  kasan_save_track+0x18/0x40
[   14.543055]  kasan_save_alloc_info+0x3b/0x50
[   14.543378]  __kasan_kmalloc+0xb7/0xc0
[   14.543693]  __kmalloc_cache_noprof+0x189/0x420
[   14.544063]  kasan_bitops_generic+0x92/0x1c0
[   14.544266]  kunit_try_run_case+0x1a5/0x480
[   14.544568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.544803]  kthread+0x337/0x6f0
[   14.544958]  ret_from_fork+0x41/0x80
[   14.545212]  ret_from_fork_asm+0x1a/0x30
[   14.545481] 
[   14.545662] The buggy address belongs to the object at ffff888102662fc0
[   14.545662]  which belongs to the cache kmalloc-16 of size 16
[   14.546176] The buggy address is located 8 bytes inside of
[   14.546176]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.546548] 
[   14.546669] The buggy address belongs to the physical page:
[   14.547138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.547655] flags: 0x200000000000000(node=0|zone=2)
[   14.548134] page_type: f5(slab)
[   14.548299] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.548538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.550318] page dumped because: kasan: bad access detected
[   14.550555] 
[   14.550676] Memory state around the buggy address:
[   14.551037]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.551372]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.552181] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.552872]                                               ^
[   14.553243]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.553504]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.553954] ==================================================================
[   14.555742] ==================================================================
[   14.556104] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.556519] Read of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.556945] 
[   14.557103] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.557202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.557224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.557265] Call Trace:
[   14.557299]  <TASK>
[   14.557336]  dump_stack_lvl+0x73/0xb0
[   14.557393]  print_report+0xd1/0x650
[   14.557433]  ? __virt_addr_valid+0x1db/0x2d0
[   14.557469]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.557508]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.557582]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.557611]  kasan_report+0x141/0x180
[   14.557662]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.557710]  __asan_report_load8_noabort+0x18/0x20
[   14.557749]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.557789]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.557829]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.557866]  ? trace_hardirqs_on+0x37/0xe0
[   14.557903]  ? kasan_bitops_generic+0x92/0x1c0
[   14.557957]  kasan_bitops_generic+0x121/0x1c0
[   14.557998]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.558035]  ? __pfx_read_tsc+0x10/0x10
[   14.558074]  ? ktime_get_ts64+0x86/0x230
[   14.558118]  kunit_try_run_case+0x1a5/0x480
[   14.558167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.558206]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.558244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.558267]  ? __kthread_parkme+0x82/0x180
[   14.558290]  ? preempt_count_sub+0x50/0x80
[   14.558314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.558335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.558357]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.558378]  kthread+0x337/0x6f0
[   14.558395]  ? trace_preempt_on+0x20/0xc0
[   14.558416]  ? __pfx_kthread+0x10/0x10
[   14.558434]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.558454]  ? calculate_sigpending+0x7b/0xa0
[   14.558474]  ? __pfx_kthread+0x10/0x10
[   14.558491]  ret_from_fork+0x41/0x80
[   14.558510]  ? __pfx_kthread+0x10/0x10
[   14.558527]  ret_from_fork_asm+0x1a/0x30
[   14.558578]  </TASK>
[   14.558593] 
[   14.567353] Allocated by task 281:
[   14.567571]  kasan_save_stack+0x45/0x70
[   14.567918]  kasan_save_track+0x18/0x40
[   14.568210]  kasan_save_alloc_info+0x3b/0x50
[   14.568534]  __kasan_kmalloc+0xb7/0xc0
[   14.568895]  __kmalloc_cache_noprof+0x189/0x420
[   14.569238]  kasan_bitops_generic+0x92/0x1c0
[   14.569548]  kunit_try_run_case+0x1a5/0x480
[   14.569874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.570084]  kthread+0x337/0x6f0
[   14.570330]  ret_from_fork+0x41/0x80
[   14.570568]  ret_from_fork_asm+0x1a/0x30
[   14.570776] 
[   14.570923] The buggy address belongs to the object at ffff888102662fc0
[   14.570923]  which belongs to the cache kmalloc-16 of size 16
[   14.571470] The buggy address is located 8 bytes inside of
[   14.571470]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.572251] 
[   14.572435] The buggy address belongs to the physical page:
[   14.572763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.573183] flags: 0x200000000000000(node=0|zone=2)
[   14.573439] page_type: f5(slab)
[   14.573717] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.574207] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.574645] page dumped because: kasan: bad access detected
[   14.574994] 
[   14.575154] Memory state around the buggy address:
[   14.575477]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.575837]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.576275] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.576696]                                               ^
[   14.576969]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.577214]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.577447] ==================================================================