Hay
Date
June 23, 2025, 1:39 p.m.

Environment
qemu-x86_64

[   20.955503] ==================================================================
[   20.956541] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   20.957419] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.957913] 
[   20.958180] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.958444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.958487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.958541] Call Trace:
[   20.958722]  <TASK>
[   20.958776]  dump_stack_lvl+0x73/0xb0
[   20.958847]  print_report+0xd1/0x650
[   20.958917]  ? __virt_addr_valid+0x1db/0x2d0
[   20.958988]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   20.959062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.959136]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   20.959212]  kasan_report+0x141/0x180
[   20.959299]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   20.959424]  kasan_check_range+0x10c/0x1c0
[   20.959504]  __kasan_check_write+0x18/0x20
[   20.959573]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   20.959666]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.959748]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.960219]  ? trace_hardirqs_on+0x37/0xe0
[   20.960300]  ? kasan_bitops_generic+0x92/0x1c0
[   20.960379]  kasan_bitops_generic+0x121/0x1c0
[   20.960442]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.960478]  ? __pfx_read_tsc+0x10/0x10
[   20.960506]  ? ktime_get_ts64+0x86/0x230
[   20.960541]  kunit_try_run_case+0x1a5/0x480
[   20.960576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.960676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.960754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.960791]  ? __kthread_parkme+0x82/0x180
[   20.960827]  ? preempt_count_sub+0x50/0x80
[   20.960863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.960900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.960935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.960970]  kthread+0x337/0x6f0
[   20.960994]  ? trace_preempt_on+0x20/0xc0
[   20.961026]  ? __pfx_kthread+0x10/0x10
[   20.961051]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.961083]  ? calculate_sigpending+0x7b/0xa0
[   20.961114]  ? __pfx_kthread+0x10/0x10
[   20.961140]  ret_from_fork+0x41/0x80
[   20.961170]  ? __pfx_kthread+0x10/0x10
[   20.961196]  ret_from_fork_asm+0x1a/0x30
[   20.961277]  </TASK>
[   20.961294] 
[   20.984629] Allocated by task 282:
[   20.985499]  kasan_save_stack+0x45/0x70
[   20.986431]  kasan_save_track+0x18/0x40
[   20.986854]  kasan_save_alloc_info+0x3b/0x50
[   20.987905]  __kasan_kmalloc+0xb7/0xc0
[   20.988648]  __kmalloc_cache_noprof+0x189/0x420
[   20.989040]  kasan_bitops_generic+0x92/0x1c0
[   20.989974]  kunit_try_run_case+0x1a5/0x480
[   20.990805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.991517]  kthread+0x337/0x6f0
[   20.992154]  ret_from_fork+0x41/0x80
[   20.992709]  ret_from_fork_asm+0x1a/0x30
[   20.993396] 
[   20.993591] The buggy address belongs to the object at ffff8881025ebc60
[   20.993591]  which belongs to the cache kmalloc-16 of size 16
[   20.995899] The buggy address is located 8 bytes inside of
[   20.995899]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.997087] 
[   20.997362] The buggy address belongs to the physical page:
[   20.998029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.998880] flags: 0x200000000000000(node=0|zone=2)
[   20.999451] page_type: f5(slab)
[   20.999824] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.000894] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.001988] page dumped because: kasan: bad access detected
[   21.002199] 
[   21.002626] Memory state around the buggy address:
[   21.003455]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   21.003940]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.004734] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.005615]                                                           ^
[   21.006371]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.007086]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.007681] ==================================================================
[   21.106984] ==================================================================
[   21.107589] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.108391] Read of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   21.108933] 
[   21.109186] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.109344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.109375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.109427] Call Trace:
[   21.109475]  <TASK>
[   21.109509]  dump_stack_lvl+0x73/0xb0
[   21.109575]  print_report+0xd1/0x650
[   21.109677]  ? __virt_addr_valid+0x1db/0x2d0
[   21.109748]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.109831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.109910]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.109992]  kasan_report+0x141/0x180
[   21.110071]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.110162]  __asan_report_load8_noabort+0x18/0x20
[   21.110279]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.110364]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.110446]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.110517]  ? trace_hardirqs_on+0x37/0xe0
[   21.110595]  ? kasan_bitops_generic+0x92/0x1c0
[   21.110698]  kasan_bitops_generic+0x121/0x1c0
[   21.110772]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.110848]  ? __pfx_read_tsc+0x10/0x10
[   21.110914]  ? ktime_get_ts64+0x86/0x230
[   21.110994]  kunit_try_run_case+0x1a5/0x480
[   21.111069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.111140]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.111255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.111337]  ? __kthread_parkme+0x82/0x180
[   21.111410]  ? preempt_count_sub+0x50/0x80
[   21.111487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.111562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.111655]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.111728]  kthread+0x337/0x6f0
[   21.111757]  ? trace_preempt_on+0x20/0xc0
[   21.111793]  ? __pfx_kthread+0x10/0x10
[   21.111818]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.111850]  ? calculate_sigpending+0x7b/0xa0
[   21.111882]  ? __pfx_kthread+0x10/0x10
[   21.111910]  ret_from_fork+0x41/0x80
[   21.111941]  ? __pfx_kthread+0x10/0x10
[   21.111966]  ret_from_fork_asm+0x1a/0x30
[   21.112009]  </TASK>
[   21.112023] 
[   21.130673] Allocated by task 282:
[   21.131048]  kasan_save_stack+0x45/0x70
[   21.131650]  kasan_save_track+0x18/0x40
[   21.132008]  kasan_save_alloc_info+0x3b/0x50
[   21.132672]  __kasan_kmalloc+0xb7/0xc0
[   21.133035]  __kmalloc_cache_noprof+0x189/0x420
[   21.133645]  kasan_bitops_generic+0x92/0x1c0
[   21.134078]  kunit_try_run_case+0x1a5/0x480
[   21.134565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.135104]  kthread+0x337/0x6f0
[   21.135505]  ret_from_fork+0x41/0x80
[   21.136065]  ret_from_fork_asm+0x1a/0x30
[   21.136525] 
[   21.136731] The buggy address belongs to the object at ffff8881025ebc60
[   21.136731]  which belongs to the cache kmalloc-16 of size 16
[   21.137830] The buggy address is located 8 bytes inside of
[   21.137830]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   21.138824] 
[   21.139054] The buggy address belongs to the physical page:
[   21.139692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   21.140451] flags: 0x200000000000000(node=0|zone=2)
[   21.140869] page_type: f5(slab)
[   21.141354] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.142055] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.142702] page dumped because: kasan: bad access detected
[   21.143194] 
[   21.143574] Memory state around the buggy address:
[   21.144044]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   21.144649]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.145276] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.145965]                                                           ^
[   21.146567]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.147297]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.147917] ==================================================================
[   20.903999] ==================================================================
[   20.904628] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   20.906117] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.907426] 
[   20.907666] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.907830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.907869] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.908049] Call Trace:
[   20.908095]  <TASK>
[   20.908139]  dump_stack_lvl+0x73/0xb0
[   20.908217]  print_report+0xd1/0x650
[   20.908290]  ? __virt_addr_valid+0x1db/0x2d0
[   20.908355]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   20.908394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.908429]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   20.908464]  kasan_report+0x141/0x180
[   20.908497]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   20.908537]  kasan_check_range+0x10c/0x1c0
[   20.908566]  __kasan_check_write+0x18/0x20
[   20.908594]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   20.908688]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.908768]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.908840]  ? trace_hardirqs_on+0x37/0xe0
[   20.908913]  ? kasan_bitops_generic+0x92/0x1c0
[   20.908995]  kasan_bitops_generic+0x121/0x1c0
[   20.909032]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.909063]  ? __pfx_read_tsc+0x10/0x10
[   20.909091]  ? ktime_get_ts64+0x86/0x230
[   20.909125]  kunit_try_run_case+0x1a5/0x480
[   20.909161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.909193]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.909267]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.909308]  ? __kthread_parkme+0x82/0x180
[   20.909340]  ? preempt_count_sub+0x50/0x80
[   20.909376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.909409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.909443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.909475]  kthread+0x337/0x6f0
[   20.909498]  ? trace_preempt_on+0x20/0xc0
[   20.909530]  ? __pfx_kthread+0x10/0x10
[   20.909553]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.909583]  ? calculate_sigpending+0x7b/0xa0
[   20.909654]  ? __pfx_kthread+0x10/0x10
[   20.909728]  ret_from_fork+0x41/0x80
[   20.909781]  ? __pfx_kthread+0x10/0x10
[   20.909808]  ret_from_fork_asm+0x1a/0x30
[   20.909849]  </TASK>
[   20.909864] 
[   20.933788] Allocated by task 282:
[   20.934141]  kasan_save_stack+0x45/0x70
[   20.934854]  kasan_save_track+0x18/0x40
[   20.935321]  kasan_save_alloc_info+0x3b/0x50
[   20.935669]  __kasan_kmalloc+0xb7/0xc0
[   20.936253]  __kmalloc_cache_noprof+0x189/0x420
[   20.937119]  kasan_bitops_generic+0x92/0x1c0
[   20.938129]  kunit_try_run_case+0x1a5/0x480
[   20.938555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.939531]  kthread+0x337/0x6f0
[   20.940260]  ret_from_fork+0x41/0x80
[   20.940548]  ret_from_fork_asm+0x1a/0x30
[   20.941039] 
[   20.941394] The buggy address belongs to the object at ffff8881025ebc60
[   20.941394]  which belongs to the cache kmalloc-16 of size 16
[   20.942475] The buggy address is located 8 bytes inside of
[   20.942475]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.943427] 
[   20.944119] The buggy address belongs to the physical page:
[   20.944566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.945382] flags: 0x200000000000000(node=0|zone=2)
[   20.946100] page_type: f5(slab)
[   20.946569] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.947513] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.948292] page dumped because: kasan: bad access detected
[   20.949212] 
[   20.949449] Memory state around the buggy address:
[   20.950053]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   20.950875]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.951574] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.952596]                                                           ^
[   20.953229]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.953813]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.954478] ==================================================================
[   20.849272] ==================================================================
[   20.850444] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   20.851584] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.852397] 
[   20.853105] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.853314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.853353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.853410] Call Trace:
[   20.853446]  <TASK>
[   20.853491]  dump_stack_lvl+0x73/0xb0
[   20.853567]  print_report+0xd1/0x650
[   20.853818]  ? __virt_addr_valid+0x1db/0x2d0
[   20.853922]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   20.854000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.854073]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   20.854150]  kasan_report+0x141/0x180
[   20.854262]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   20.854357]  kasan_check_range+0x10c/0x1c0
[   20.854426]  __kasan_check_write+0x18/0x20
[   20.854478]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   20.854516]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.854551]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.854581]  ? trace_hardirqs_on+0x37/0xe0
[   20.854694]  ? kasan_bitops_generic+0x92/0x1c0
[   20.854766]  kasan_bitops_generic+0x121/0x1c0
[   20.854800]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.854833]  ? __pfx_read_tsc+0x10/0x10
[   20.854860]  ? ktime_get_ts64+0x86/0x230
[   20.854897]  kunit_try_run_case+0x1a5/0x480
[   20.854934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.854967]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.855000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.855034]  ? __kthread_parkme+0x82/0x180
[   20.855066]  ? preempt_count_sub+0x50/0x80
[   20.855101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.855136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.855171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.855205]  kthread+0x337/0x6f0
[   20.855272]  ? trace_preempt_on+0x20/0xc0
[   20.855308]  ? __pfx_kthread+0x10/0x10
[   20.855333]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.855364]  ? calculate_sigpending+0x7b/0xa0
[   20.855393]  ? __pfx_kthread+0x10/0x10
[   20.855417]  ret_from_fork+0x41/0x80
[   20.855447]  ? __pfx_kthread+0x10/0x10
[   20.855471]  ret_from_fork_asm+0x1a/0x30
[   20.855511]  </TASK>
[   20.855524] 
[   20.880279] Allocated by task 282:
[   20.881085]  kasan_save_stack+0x45/0x70
[   20.881572]  kasan_save_track+0x18/0x40
[   20.882079]  kasan_save_alloc_info+0x3b/0x50
[   20.883129]  __kasan_kmalloc+0xb7/0xc0
[   20.883674]  __kmalloc_cache_noprof+0x189/0x420
[   20.884139]  kasan_bitops_generic+0x92/0x1c0
[   20.885160]  kunit_try_run_case+0x1a5/0x480
[   20.886178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.886895]  kthread+0x337/0x6f0
[   20.887274]  ret_from_fork+0x41/0x80
[   20.887625]  ret_from_fork_asm+0x1a/0x30
[   20.888054] 
[   20.888267] The buggy address belongs to the object at ffff8881025ebc60
[   20.888267]  which belongs to the cache kmalloc-16 of size 16
[   20.889457] The buggy address is located 8 bytes inside of
[   20.889457]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.890983] 
[   20.891280] The buggy address belongs to the physical page:
[   20.891956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.892786] flags: 0x200000000000000(node=0|zone=2)
[   20.893304] page_type: f5(slab)
[   20.894103] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.894887] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.895742] page dumped because: kasan: bad access detected
[   20.896375] 
[   20.896985] Memory state around the buggy address:
[   20.897273]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   20.898440]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.899274] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.900032]                                                           ^
[   20.900774]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.901400]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.902339] ==================================================================
[   20.802430] ==================================================================
[   20.803428] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   20.804709] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.805535] 
[   20.805984] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.806105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.806139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.806194] Call Trace:
[   20.806241]  <TASK>
[   20.806285]  dump_stack_lvl+0x73/0xb0
[   20.806391]  print_report+0xd1/0x650
[   20.806476]  ? __virt_addr_valid+0x1db/0x2d0
[   20.806576]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   20.806889]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.806982]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   20.807061]  kasan_report+0x141/0x180
[   20.807102]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   20.807147]  kasan_check_range+0x10c/0x1c0
[   20.807178]  __kasan_check_write+0x18/0x20
[   20.807207]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   20.807243]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.807282]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.807312]  ? trace_hardirqs_on+0x37/0xe0
[   20.807386]  ? kasan_bitops_generic+0x92/0x1c0
[   20.807424]  kasan_bitops_generic+0x121/0x1c0
[   20.807454]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.807486]  ? __pfx_read_tsc+0x10/0x10
[   20.807514]  ? ktime_get_ts64+0x86/0x230
[   20.807550]  kunit_try_run_case+0x1a5/0x480
[   20.807587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.807670]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.807745]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.807784]  ? __kthread_parkme+0x82/0x180
[   20.807817]  ? preempt_count_sub+0x50/0x80
[   20.807854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.807890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.807924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.807960]  kthread+0x337/0x6f0
[   20.807984]  ? trace_preempt_on+0x20/0xc0
[   20.808018]  ? __pfx_kthread+0x10/0x10
[   20.808044]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.808076]  ? calculate_sigpending+0x7b/0xa0
[   20.808108]  ? __pfx_kthread+0x10/0x10
[   20.808135]  ret_from_fork+0x41/0x80
[   20.808168]  ? __pfx_kthread+0x10/0x10
[   20.808192]  ret_from_fork_asm+0x1a/0x30
[   20.808268]  </TASK>
[   20.808287] 
[   20.829148] Allocated by task 282:
[   20.829499]  kasan_save_stack+0x45/0x70
[   20.830048]  kasan_save_track+0x18/0x40
[   20.830627]  kasan_save_alloc_info+0x3b/0x50
[   20.831428]  __kasan_kmalloc+0xb7/0xc0
[   20.831802]  __kmalloc_cache_noprof+0x189/0x420
[   20.832360]  kasan_bitops_generic+0x92/0x1c0
[   20.832885]  kunit_try_run_case+0x1a5/0x480
[   20.833358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.834057]  kthread+0x337/0x6f0
[   20.834471]  ret_from_fork+0x41/0x80
[   20.835175]  ret_from_fork_asm+0x1a/0x30
[   20.835763] 
[   20.836008] The buggy address belongs to the object at ffff8881025ebc60
[   20.836008]  which belongs to the cache kmalloc-16 of size 16
[   20.836905] The buggy address is located 8 bytes inside of
[   20.836905]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.837702] 
[   20.837988] The buggy address belongs to the physical page:
[   20.838470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.839326] flags: 0x200000000000000(node=0|zone=2)
[   20.840206] page_type: f5(slab)
[   20.840667] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.841528] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.842377] page dumped because: kasan: bad access detected
[   20.842785] 
[   20.843015] Memory state around the buggy address:
[   20.843649]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   20.845252]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.845763] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.846005]                                                           ^
[   20.846224]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.846457]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.847018] ==================================================================
[   20.751097] ==================================================================
[   20.751743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   20.752498] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.753701] 
[   20.753939] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.754140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.754179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.754297] Call Trace:
[   20.754380]  <TASK>
[   20.754429]  dump_stack_lvl+0x73/0xb0
[   20.754505]  print_report+0xd1/0x650
[   20.754576]  ? __virt_addr_valid+0x1db/0x2d0
[   20.754666]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   20.754749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.754826]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   20.754902]  kasan_report+0x141/0x180
[   20.754978]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   20.755068]  kasan_check_range+0x10c/0x1c0
[   20.755136]  __kasan_check_write+0x18/0x20
[   20.755204]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   20.755287]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.755367]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.755437]  ? trace_hardirqs_on+0x37/0xe0
[   20.755510]  ? kasan_bitops_generic+0x92/0x1c0
[   20.755587]  kasan_bitops_generic+0x121/0x1c0
[   20.755675]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.755757]  ? __pfx_read_tsc+0x10/0x10
[   20.755825]  ? ktime_get_ts64+0x86/0x230
[   20.755903]  kunit_try_run_case+0x1a5/0x480
[   20.755979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.756041]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.756080]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.756118]  ? __kthread_parkme+0x82/0x180
[   20.756151]  ? preempt_count_sub+0x50/0x80
[   20.756189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.756262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.756303]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.756340]  kthread+0x337/0x6f0
[   20.756365]  ? trace_preempt_on+0x20/0xc0
[   20.756399]  ? __pfx_kthread+0x10/0x10
[   20.756425]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.756457]  ? calculate_sigpending+0x7b/0xa0
[   20.756490]  ? __pfx_kthread+0x10/0x10
[   20.756518]  ret_from_fork+0x41/0x80
[   20.756548]  ? __pfx_kthread+0x10/0x10
[   20.756574]  ret_from_fork_asm+0x1a/0x30
[   20.756701]  </TASK>
[   20.756747] 
[   20.778878] Allocated by task 282:
[   20.779545]  kasan_save_stack+0x45/0x70
[   20.779991]  kasan_save_track+0x18/0x40
[   20.780858]  kasan_save_alloc_info+0x3b/0x50
[   20.781438]  __kasan_kmalloc+0xb7/0xc0
[   20.781770]  __kmalloc_cache_noprof+0x189/0x420
[   20.782105]  kasan_bitops_generic+0x92/0x1c0
[   20.782970]  kunit_try_run_case+0x1a5/0x480
[   20.784072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.785058]  kthread+0x337/0x6f0
[   20.785411]  ret_from_fork+0x41/0x80
[   20.785853]  ret_from_fork_asm+0x1a/0x30
[   20.786531] 
[   20.786957] The buggy address belongs to the object at ffff8881025ebc60
[   20.786957]  which belongs to the cache kmalloc-16 of size 16
[   20.788433] The buggy address is located 8 bytes inside of
[   20.788433]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.789641] 
[   20.790165] The buggy address belongs to the physical page:
[   20.790698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.792001] flags: 0x200000000000000(node=0|zone=2)
[   20.792856] page_type: f5(slab)
[   20.793180] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.794033] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.794923] page dumped because: kasan: bad access detected
[   20.795470] 
[   20.795729] Memory state around the buggy address:
[   20.796582]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   20.797182]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.797797] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.798708]                                                           ^
[   20.799729]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.800388]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.801370] ==================================================================
[   21.062033] ==================================================================
[   21.062899] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.063799] Read of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   21.064532] 
[   21.064925] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.065045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.065079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.065137] Call Trace:
[   21.065176]  <TASK>
[   21.065235]  dump_stack_lvl+0x73/0xb0
[   21.065313]  print_report+0xd1/0x650
[   21.065387]  ? __virt_addr_valid+0x1db/0x2d0
[   21.065462]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.065539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.065630]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.065709]  kasan_report+0x141/0x180
[   21.065797]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.065886]  kasan_check_range+0x10c/0x1c0
[   21.065948]  __kasan_check_read+0x15/0x20
[   21.065980]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.066017]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.066055]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.066086]  ? trace_hardirqs_on+0x37/0xe0
[   21.066120]  ? kasan_bitops_generic+0x92/0x1c0
[   21.066152]  kasan_bitops_generic+0x121/0x1c0
[   21.066181]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.066219]  ? __pfx_read_tsc+0x10/0x10
[   21.066273]  ? ktime_get_ts64+0x86/0x230
[   21.066311]  kunit_try_run_case+0x1a5/0x480
[   21.066348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.066382]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.066416]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.066452]  ? __kthread_parkme+0x82/0x180
[   21.066486]  ? preempt_count_sub+0x50/0x80
[   21.066523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.066558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.066592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.066653]  kthread+0x337/0x6f0
[   21.066679]  ? trace_preempt_on+0x20/0xc0
[   21.066713]  ? __pfx_kthread+0x10/0x10
[   21.066738]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.066769]  ? calculate_sigpending+0x7b/0xa0
[   21.066801]  ? __pfx_kthread+0x10/0x10
[   21.066827]  ret_from_fork+0x41/0x80
[   21.066857]  ? __pfx_kthread+0x10/0x10
[   21.066882]  ret_from_fork_asm+0x1a/0x30
[   21.066925]  </TASK>
[   21.066939] 
[   21.086963] Allocated by task 282:
[   21.087508]  kasan_save_stack+0x45/0x70
[   21.087848]  kasan_save_track+0x18/0x40
[   21.088397]  kasan_save_alloc_info+0x3b/0x50
[   21.088843]  __kasan_kmalloc+0xb7/0xc0
[   21.089400]  __kmalloc_cache_noprof+0x189/0x420
[   21.089794]  kasan_bitops_generic+0x92/0x1c0
[   21.090185]  kunit_try_run_case+0x1a5/0x480
[   21.090918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.091809]  kthread+0x337/0x6f0
[   21.092460]  ret_from_fork+0x41/0x80
[   21.093440]  ret_from_fork_asm+0x1a/0x30
[   21.094123] 
[   21.094335] The buggy address belongs to the object at ffff8881025ebc60
[   21.094335]  which belongs to the cache kmalloc-16 of size 16
[   21.095228] The buggy address is located 8 bytes inside of
[   21.095228]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   21.096200] 
[   21.096375] The buggy address belongs to the physical page:
[   21.096777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   21.098050] flags: 0x200000000000000(node=0|zone=2)
[   21.098313] page_type: f5(slab)
[   21.099105] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.099821] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.100434] page dumped because: kasan: bad access detected
[   21.101129] 
[   21.101393] Memory state around the buggy address:
[   21.102097]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   21.102831]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.103587] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.104092]                                                           ^
[   21.104699]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.105207]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.105814] ==================================================================
[   20.707500] ==================================================================
[   20.708311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   20.709511] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.710164] 
[   20.710450] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.710573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.710630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.710688] Call Trace:
[   20.710738]  <TASK>
[   20.710787]  dump_stack_lvl+0x73/0xb0
[   20.710866]  print_report+0xd1/0x650
[   20.710944]  ? __virt_addr_valid+0x1db/0x2d0
[   20.711020]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   20.711094]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.711172]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   20.711251]  kasan_report+0x141/0x180
[   20.711330]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   20.711420]  kasan_check_range+0x10c/0x1c0
[   20.711497]  __kasan_check_write+0x18/0x20
[   20.711573]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   20.711820]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   20.711868]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.711898]  ? trace_hardirqs_on+0x37/0xe0
[   20.711933]  ? kasan_bitops_generic+0x92/0x1c0
[   20.711968]  kasan_bitops_generic+0x121/0x1c0
[   20.711995]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.712025]  ? __pfx_read_tsc+0x10/0x10
[   20.712052]  ? ktime_get_ts64+0x86/0x230
[   20.712087]  kunit_try_run_case+0x1a5/0x480
[   20.712122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.712156]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.712190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.712257]  ? __kthread_parkme+0x82/0x180
[   20.712293]  ? preempt_count_sub+0x50/0x80
[   20.712331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.712366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.712400]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.712433]  kthread+0x337/0x6f0
[   20.712457]  ? trace_preempt_on+0x20/0xc0
[   20.712488]  ? __pfx_kthread+0x10/0x10
[   20.712513]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.712544]  ? calculate_sigpending+0x7b/0xa0
[   20.712575]  ? __pfx_kthread+0x10/0x10
[   20.712621]  ret_from_fork+0x41/0x80
[   20.712731]  ? __pfx_kthread+0x10/0x10
[   20.712805]  ret_from_fork_asm+0x1a/0x30
[   20.712906]  </TASK>
[   20.712937] 
[   20.730901] Allocated by task 282:
[   20.731245]  kasan_save_stack+0x45/0x70
[   20.731781]  kasan_save_track+0x18/0x40
[   20.732144]  kasan_save_alloc_info+0x3b/0x50
[   20.732577]  __kasan_kmalloc+0xb7/0xc0
[   20.733006]  __kmalloc_cache_noprof+0x189/0x420
[   20.733477]  kasan_bitops_generic+0x92/0x1c0
[   20.734386]  kunit_try_run_case+0x1a5/0x480
[   20.734902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.735433]  kthread+0x337/0x6f0
[   20.735957]  ret_from_fork+0x41/0x80
[   20.736382]  ret_from_fork_asm+0x1a/0x30
[   20.736741] 
[   20.736919] The buggy address belongs to the object at ffff8881025ebc60
[   20.736919]  which belongs to the cache kmalloc-16 of size 16
[   20.737893] The buggy address is located 8 bytes inside of
[   20.737893]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.738999] 
[   20.739304] The buggy address belongs to the physical page:
[   20.739752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.740820] flags: 0x200000000000000(node=0|zone=2)
[   20.741192] page_type: f5(slab)
[   20.741562] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.742415] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.743153] page dumped because: kasan: bad access detected
[   20.743517] 
[   20.743714] Memory state around the buggy address:
[   20.744151]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   20.745108]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.746045] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.746600]                                                           ^
[   20.747035]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.747974]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.748574] ==================================================================
[   21.008661] ==================================================================
[   21.009162] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.011256] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   21.012365] 
[   21.012872] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.012996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.013034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.013088] Call Trace:
[   21.013135]  <TASK>
[   21.013180]  dump_stack_lvl+0x73/0xb0
[   21.013293]  print_report+0xd1/0x650
[   21.013372]  ? __virt_addr_valid+0x1db/0x2d0
[   21.013445]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.013521]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.013972]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.014066]  kasan_report+0x141/0x180
[   21.014146]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.014277]  kasan_check_range+0x10c/0x1c0
[   21.014358]  __kasan_check_write+0x18/0x20
[   21.014433]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.014512]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.014591]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.014687]  ? trace_hardirqs_on+0x37/0xe0
[   21.014764]  ? kasan_bitops_generic+0x92/0x1c0
[   21.014801]  kasan_bitops_generic+0x121/0x1c0
[   21.014832]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.014863]  ? __pfx_read_tsc+0x10/0x10
[   21.014891]  ? ktime_get_ts64+0x86/0x230
[   21.014927]  kunit_try_run_case+0x1a5/0x480
[   21.014963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.014995]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.015029]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.015064]  ? __kthread_parkme+0x82/0x180
[   21.015096]  ? preempt_count_sub+0x50/0x80
[   21.015131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.015167]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.015201]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.015263]  kthread+0x337/0x6f0
[   21.015290]  ? trace_preempt_on+0x20/0xc0
[   21.015324]  ? __pfx_kthread+0x10/0x10
[   21.015349]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.015380]  ? calculate_sigpending+0x7b/0xa0
[   21.015411]  ? __pfx_kthread+0x10/0x10
[   21.015437]  ret_from_fork+0x41/0x80
[   21.015469]  ? __pfx_kthread+0x10/0x10
[   21.015495]  ret_from_fork_asm+0x1a/0x30
[   21.015538]  </TASK>
[   21.015552] 
[   21.040044] Allocated by task 282:
[   21.040479]  kasan_save_stack+0x45/0x70
[   21.041138]  kasan_save_track+0x18/0x40
[   21.041566]  kasan_save_alloc_info+0x3b/0x50
[   21.042399]  __kasan_kmalloc+0xb7/0xc0
[   21.042874]  __kmalloc_cache_noprof+0x189/0x420
[   21.043240]  kasan_bitops_generic+0x92/0x1c0
[   21.043807]  kunit_try_run_case+0x1a5/0x480
[   21.044319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.044990]  kthread+0x337/0x6f0
[   21.045410]  ret_from_fork+0x41/0x80
[   21.046200]  ret_from_fork_asm+0x1a/0x30
[   21.046840] 
[   21.047056] The buggy address belongs to the object at ffff8881025ebc60
[   21.047056]  which belongs to the cache kmalloc-16 of size 16
[   21.048011] The buggy address is located 8 bytes inside of
[   21.048011]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   21.049331] 
[   21.049560] The buggy address belongs to the physical page:
[   21.050400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   21.051186] flags: 0x200000000000000(node=0|zone=2)
[   21.051822] page_type: f5(slab)
[   21.052190] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.052986] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.053871] page dumped because: kasan: bad access detected
[   21.054431] 
[   21.054651] Memory state around the buggy address:
[   21.055073]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   21.056254]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   21.057205] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.058158]                                                           ^
[   21.059200]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.059808]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.060623] ==================================================================