Hay
Date
July 3, 2025, 3:13 p.m.

Environment
qemu-x86_64

[   13.429728] ==================================================================
[   13.430019] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.430466] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.430694] 
[   13.430781] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.430825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.430837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.430859] Call Trace:
[   13.430874]  <TASK>
[   13.430889]  dump_stack_lvl+0x73/0xb0
[   13.430913]  print_report+0xd1/0x650
[   13.430936]  ? __virt_addr_valid+0x1db/0x2d0
[   13.430957]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.430980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.431004]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.431029]  kasan_report+0x141/0x180
[   13.431052]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.431082]  kasan_check_range+0x10c/0x1c0
[   13.431102]  __kasan_check_write+0x18/0x20
[   13.431122]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.431147]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.431172]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.431193]  ? trace_hardirqs_on+0x37/0xe0
[   13.431217]  ? kasan_bitops_generic+0x92/0x1c0
[   13.431254]  kasan_bitops_generic+0x121/0x1c0
[   13.431275]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.431297]  ? __pfx_read_tsc+0x10/0x10
[   13.431317]  ? ktime_get_ts64+0x86/0x230
[   13.431342]  kunit_try_run_case+0x1a5/0x480
[   13.431367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.431389]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.431416]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.431440]  ? __kthread_parkme+0x82/0x180
[   13.431462]  ? preempt_count_sub+0x50/0x80
[   13.431488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.431512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.431536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.431559]  kthread+0x337/0x6f0
[   13.431576]  ? trace_preempt_on+0x20/0xc0
[   13.431599]  ? __pfx_kthread+0x10/0x10
[   13.431618]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.431640]  ? calculate_sigpending+0x7b/0xa0
[   13.431662]  ? __pfx_kthread+0x10/0x10
[   13.431681]  ret_from_fork+0x41/0x80
[   13.431703]  ? __pfx_kthread+0x10/0x10
[   13.431721]  ret_from_fork_asm+0x1a/0x30
[   13.431753]  </TASK>
[   13.431763] 
[   13.440515] Allocated by task 280:
[   13.440657]  kasan_save_stack+0x45/0x70
[   13.440935]  kasan_save_track+0x18/0x40
[   13.441210]  kasan_save_alloc_info+0x3b/0x50
[   13.441540]  __kasan_kmalloc+0xb7/0xc0
[   13.441692]  __kmalloc_cache_noprof+0x189/0x420
[   13.441845]  kasan_bitops_generic+0x92/0x1c0
[   13.441991]  kunit_try_run_case+0x1a5/0x480
[   13.442137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.442638]  kthread+0x337/0x6f0
[   13.442815]  ret_from_fork+0x41/0x80
[   13.442999]  ret_from_fork_asm+0x1a/0x30
[   13.443193] 
[   13.443386] The buggy address belongs to the object at ffff888102307e00
[   13.443386]  which belongs to the cache kmalloc-16 of size 16
[   13.443887] The buggy address is located 8 bytes inside of
[   13.443887]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.444249] 
[   13.445044] The buggy address belongs to the physical page:
[   13.445643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.446015] flags: 0x200000000000000(node=0|zone=2)
[   13.446592] page_type: f5(slab)
[   13.447041] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.447617] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.447943] page dumped because: kasan: bad access detected
[   13.448177] 
[   13.448279] Memory state around the buggy address:
[   13.448489]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.449260]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.450169] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.450737]                       ^
[   13.450911]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.451207]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.451438] ==================================================================
[   13.594597] ==================================================================
[   13.595311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.596015] Read of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.596818] 
[   13.596968] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.597017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.597029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.597082] Call Trace:
[   13.597101]  <TASK>
[   13.597121]  dump_stack_lvl+0x73/0xb0
[   13.597149]  print_report+0xd1/0x650
[   13.597173]  ? __virt_addr_valid+0x1db/0x2d0
[   13.597195]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.597219]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.597254]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.597476]  kasan_report+0x141/0x180
[   13.597504]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.597534]  __asan_report_load8_noabort+0x18/0x20
[   13.597561]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.597587]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.597613]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.597658]  ? trace_hardirqs_on+0x37/0xe0
[   13.597681]  ? kasan_bitops_generic+0x92/0x1c0
[   13.597706]  kasan_bitops_generic+0x121/0x1c0
[   13.597727]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.597749]  ? __pfx_read_tsc+0x10/0x10
[   13.597770]  ? ktime_get_ts64+0x86/0x230
[   13.597795]  kunit_try_run_case+0x1a5/0x480
[   13.597821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.597843]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.597869]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.597893]  ? __kthread_parkme+0x82/0x180
[   13.597916]  ? preempt_count_sub+0x50/0x80
[   13.597941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.597965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.597990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.598013]  kthread+0x337/0x6f0
[   13.598030]  ? trace_preempt_on+0x20/0xc0
[   13.598053]  ? __pfx_kthread+0x10/0x10
[   13.598071]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.598093]  ? calculate_sigpending+0x7b/0xa0
[   13.598116]  ? __pfx_kthread+0x10/0x10
[   13.598134]  ret_from_fork+0x41/0x80
[   13.598155]  ? __pfx_kthread+0x10/0x10
[   13.598173]  ret_from_fork_asm+0x1a/0x30
[   13.598205]  </TASK>
[   13.598216] 
[   13.613756] Allocated by task 280:
[   13.614147]  kasan_save_stack+0x45/0x70
[   13.614474]  kasan_save_track+0x18/0x40
[   13.614622]  kasan_save_alloc_info+0x3b/0x50
[   13.615024]  __kasan_kmalloc+0xb7/0xc0
[   13.615458]  __kmalloc_cache_noprof+0x189/0x420
[   13.616015]  kasan_bitops_generic+0x92/0x1c0
[   13.616474]  kunit_try_run_case+0x1a5/0x480
[   13.616811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.616990]  kthread+0x337/0x6f0
[   13.617109]  ret_from_fork+0x41/0x80
[   13.617253]  ret_from_fork_asm+0x1a/0x30
[   13.617906] 
[   13.618093] The buggy address belongs to the object at ffff888102307e00
[   13.618093]  which belongs to the cache kmalloc-16 of size 16
[   13.619346] The buggy address is located 8 bytes inside of
[   13.619346]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.620755] 
[   13.620927] The buggy address belongs to the physical page:
[   13.621575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.621954] flags: 0x200000000000000(node=0|zone=2)
[   13.622119] page_type: f5(slab)
[   13.622254] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.622531] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.622818] page dumped because: kasan: bad access detected
[   13.623488] 
[   13.623823] Memory state around the buggy address:
[   13.624413]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.625210]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.626127] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.626932]                       ^
[   13.627623]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.628351]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.629107] ==================================================================
[   13.544282] ==================================================================
[   13.544728] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.545089] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.545496] 
[   13.545630] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.545675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.545688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.545710] Call Trace:
[   13.545727]  <TASK>
[   13.545753]  dump_stack_lvl+0x73/0xb0
[   13.545778]  print_report+0xd1/0x650
[   13.545801]  ? __virt_addr_valid+0x1db/0x2d0
[   13.545835]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.545859]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.545882]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.545917]  kasan_report+0x141/0x180
[   13.545940]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.545969]  kasan_check_range+0x10c/0x1c0
[   13.546001]  __kasan_check_write+0x18/0x20
[   13.546022]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.546047]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.546072]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.546094]  ? trace_hardirqs_on+0x37/0xe0
[   13.546117]  ? kasan_bitops_generic+0x92/0x1c0
[   13.546152]  kasan_bitops_generic+0x121/0x1c0
[   13.546172]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.546193]  ? __pfx_read_tsc+0x10/0x10
[   13.546224]  ? ktime_get_ts64+0x86/0x230
[   13.546274]  kunit_try_run_case+0x1a5/0x480
[   13.546298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.546320]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.546346]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.546370]  ? __kthread_parkme+0x82/0x180
[   13.546392]  ? preempt_count_sub+0x50/0x80
[   13.546419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.546443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.546466]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.546490]  kthread+0x337/0x6f0
[   13.546507]  ? trace_preempt_on+0x20/0xc0
[   13.546530]  ? __pfx_kthread+0x10/0x10
[   13.546549]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.546572]  ? calculate_sigpending+0x7b/0xa0
[   13.546594]  ? __pfx_kthread+0x10/0x10
[   13.546613]  ret_from_fork+0x41/0x80
[   13.546633]  ? __pfx_kthread+0x10/0x10
[   13.546652]  ret_from_fork_asm+0x1a/0x30
[   13.546683]  </TASK>
[   13.546693] 
[   13.556208] Allocated by task 280:
[   13.556455]  kasan_save_stack+0x45/0x70
[   13.556619]  kasan_save_track+0x18/0x40
[   13.556806]  kasan_save_alloc_info+0x3b/0x50
[   13.557132]  __kasan_kmalloc+0xb7/0xc0
[   13.557408]  __kmalloc_cache_noprof+0x189/0x420
[   13.557629]  kasan_bitops_generic+0x92/0x1c0
[   13.557838]  kunit_try_run_case+0x1a5/0x480
[   13.558045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.558315]  kthread+0x337/0x6f0
[   13.558593]  ret_from_fork+0x41/0x80
[   13.558806]  ret_from_fork_asm+0x1a/0x30
[   13.558979] 
[   13.559075] The buggy address belongs to the object at ffff888102307e00
[   13.559075]  which belongs to the cache kmalloc-16 of size 16
[   13.559792] The buggy address is located 8 bytes inside of
[   13.559792]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.560303] 
[   13.560407] The buggy address belongs to the physical page:
[   13.560764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.561194] flags: 0x200000000000000(node=0|zone=2)
[   13.561435] page_type: f5(slab)
[   13.561637] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.562240] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.562727] page dumped because: kasan: bad access detected
[   13.562996] 
[   13.563068] Memory state around the buggy address:
[   13.563330]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.563876]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.564184] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.564630]                       ^
[   13.564821]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.565107]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.565479] ==================================================================
[   13.475342] ==================================================================
[   13.475770] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.476164] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.476515] 
[   13.476834] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.476899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.476912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.476933] Call Trace:
[   13.476952]  <TASK>
[   13.476969]  dump_stack_lvl+0x73/0xb0
[   13.476996]  print_report+0xd1/0x650
[   13.477029]  ? __virt_addr_valid+0x1db/0x2d0
[   13.477051]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.477078]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.477112]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.477137]  kasan_report+0x141/0x180
[   13.477161]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.477198]  kasan_check_range+0x10c/0x1c0
[   13.477219]  __kasan_check_write+0x18/0x20
[   13.477257]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.477299]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.477328]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.477349]  ? trace_hardirqs_on+0x37/0xe0
[   13.477372]  ? kasan_bitops_generic+0x92/0x1c0
[   13.477406]  kasan_bitops_generic+0x121/0x1c0
[   13.477428]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.477524]  ? __pfx_read_tsc+0x10/0x10
[   13.477558]  ? ktime_get_ts64+0x86/0x230
[   13.477584]  kunit_try_run_case+0x1a5/0x480
[   13.477610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.477635]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.477671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.477695]  ? __kthread_parkme+0x82/0x180
[   13.477728]  ? preempt_count_sub+0x50/0x80
[   13.477754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.477779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.477801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.477825]  kthread+0x337/0x6f0
[   13.477842]  ? trace_preempt_on+0x20/0xc0
[   13.477864]  ? __pfx_kthread+0x10/0x10
[   13.477884]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.477906]  ? calculate_sigpending+0x7b/0xa0
[   13.477929]  ? __pfx_kthread+0x10/0x10
[   13.477947]  ret_from_fork+0x41/0x80
[   13.477968]  ? __pfx_kthread+0x10/0x10
[   13.477987]  ret_from_fork_asm+0x1a/0x30
[   13.478028]  </TASK>
[   13.478038] 
[   13.487543] Allocated by task 280:
[   13.487846]  kasan_save_stack+0x45/0x70
[   13.488042]  kasan_save_track+0x18/0x40
[   13.488202]  kasan_save_alloc_info+0x3b/0x50
[   13.488739]  __kasan_kmalloc+0xb7/0xc0
[   13.488930]  __kmalloc_cache_noprof+0x189/0x420
[   13.489150]  kasan_bitops_generic+0x92/0x1c0
[   13.489361]  kunit_try_run_case+0x1a5/0x480
[   13.489689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.489886]  kthread+0x337/0x6f0
[   13.490006]  ret_from_fork+0x41/0x80
[   13.490140]  ret_from_fork_asm+0x1a/0x30
[   13.490362] 
[   13.490489] The buggy address belongs to the object at ffff888102307e00
[   13.490489]  which belongs to the cache kmalloc-16 of size 16
[   13.491072] The buggy address is located 8 bytes inside of
[   13.491072]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.491602] 
[   13.491768] The buggy address belongs to the physical page:
[   13.492055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.492898] flags: 0x200000000000000(node=0|zone=2)
[   13.493158] page_type: f5(slab)
[   13.493414] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.493805] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.494146] page dumped because: kasan: bad access detected
[   13.494480] 
[   13.494580] Memory state around the buggy address:
[   13.494876]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.495167]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.495648] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.495959]                       ^
[   13.496144]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.496478]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.496821] ==================================================================
[   13.452737] ==================================================================
[   13.453272] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.453955] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.454369] 
[   13.454468] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.454524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.454537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.454558] Call Trace:
[   13.454583]  <TASK>
[   13.454599]  dump_stack_lvl+0x73/0xb0
[   13.454625]  print_report+0xd1/0x650
[   13.454648]  ? __virt_addr_valid+0x1db/0x2d0
[   13.454669]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.454703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.454726]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.454751]  kasan_report+0x141/0x180
[   13.454783]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.454814]  kasan_check_range+0x10c/0x1c0
[   13.454836]  __kasan_check_write+0x18/0x20
[   13.454856]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.454890]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.454916]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.454947]  ? trace_hardirqs_on+0x37/0xe0
[   13.454969]  ? kasan_bitops_generic+0x92/0x1c0
[   13.454994]  kasan_bitops_generic+0x121/0x1c0
[   13.455014]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.455037]  ? __pfx_read_tsc+0x10/0x10
[   13.455066]  ? ktime_get_ts64+0x86/0x230
[   13.455092]  kunit_try_run_case+0x1a5/0x480
[   13.455117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.455150]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.455175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.455199]  ? __kthread_parkme+0x82/0x180
[   13.455221]  ? preempt_count_sub+0x50/0x80
[   13.455257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.455354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.455383]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.455407]  kthread+0x337/0x6f0
[   13.455426]  ? trace_preempt_on+0x20/0xc0
[   13.455448]  ? __pfx_kthread+0x10/0x10
[   13.455467]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.455491]  ? calculate_sigpending+0x7b/0xa0
[   13.455513]  ? __pfx_kthread+0x10/0x10
[   13.455532]  ret_from_fork+0x41/0x80
[   13.455553]  ? __pfx_kthread+0x10/0x10
[   13.455571]  ret_from_fork_asm+0x1a/0x30
[   13.455602]  </TASK>
[   13.455612] 
[   13.465640] Allocated by task 280:
[   13.465778]  kasan_save_stack+0x45/0x70
[   13.466214]  kasan_save_track+0x18/0x40
[   13.466399]  kasan_save_alloc_info+0x3b/0x50
[   13.466679]  __kasan_kmalloc+0xb7/0xc0
[   13.466925]  __kmalloc_cache_noprof+0x189/0x420
[   13.467120]  kasan_bitops_generic+0x92/0x1c0
[   13.467359]  kunit_try_run_case+0x1a5/0x480
[   13.467608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.467864]  kthread+0x337/0x6f0
[   13.468046]  ret_from_fork+0x41/0x80
[   13.468247]  ret_from_fork_asm+0x1a/0x30
[   13.468795] 
[   13.468892] The buggy address belongs to the object at ffff888102307e00
[   13.468892]  which belongs to the cache kmalloc-16 of size 16
[   13.469488] The buggy address is located 8 bytes inside of
[   13.469488]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.470052] 
[   13.470166] The buggy address belongs to the physical page:
[   13.470425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.470930] flags: 0x200000000000000(node=0|zone=2)
[   13.471170] page_type: f5(slab)
[   13.471442] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.471813] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.472147] page dumped because: kasan: bad access detected
[   13.472562] 
[   13.472775] Memory state around the buggy address:
[   13.473027]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.473274]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.473498] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.473912]                       ^
[   13.474091]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.474486]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.474822] ==================================================================
[   13.521790] ==================================================================
[   13.522254] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.522638] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.523054] 
[   13.523220] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.523294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.523306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.523330] Call Trace:
[   13.523350]  <TASK>
[   13.523485]  dump_stack_lvl+0x73/0xb0
[   13.523525]  print_report+0xd1/0x650
[   13.523550]  ? __virt_addr_valid+0x1db/0x2d0
[   13.523572]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.523598]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.523623]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.523647]  kasan_report+0x141/0x180
[   13.523670]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.523699]  kasan_check_range+0x10c/0x1c0
[   13.523721]  __kasan_check_write+0x18/0x20
[   13.523741]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.523766]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.523792]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.523814]  ? trace_hardirqs_on+0x37/0xe0
[   13.523836]  ? kasan_bitops_generic+0x92/0x1c0
[   13.523861]  kasan_bitops_generic+0x121/0x1c0
[   13.523881]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.523903]  ? __pfx_read_tsc+0x10/0x10
[   13.523923]  ? ktime_get_ts64+0x86/0x230
[   13.523950]  kunit_try_run_case+0x1a5/0x480
[   13.524096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.524121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.524145]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.524170]  ? __kthread_parkme+0x82/0x180
[   13.524192]  ? preempt_count_sub+0x50/0x80
[   13.524218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.524252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.524326]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.524354]  kthread+0x337/0x6f0
[   13.524373]  ? trace_preempt_on+0x20/0xc0
[   13.524396]  ? __pfx_kthread+0x10/0x10
[   13.524414]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.524436]  ? calculate_sigpending+0x7b/0xa0
[   13.524459]  ? __pfx_kthread+0x10/0x10
[   13.524478]  ret_from_fork+0x41/0x80
[   13.524499]  ? __pfx_kthread+0x10/0x10
[   13.524518]  ret_from_fork_asm+0x1a/0x30
[   13.524549]  </TASK>
[   13.524560] 
[   13.534368] Allocated by task 280:
[   13.534612]  kasan_save_stack+0x45/0x70
[   13.534867]  kasan_save_track+0x18/0x40
[   13.535062]  kasan_save_alloc_info+0x3b/0x50
[   13.535275]  __kasan_kmalloc+0xb7/0xc0
[   13.535543]  __kmalloc_cache_noprof+0x189/0x420
[   13.535960]  kasan_bitops_generic+0x92/0x1c0
[   13.536167]  kunit_try_run_case+0x1a5/0x480
[   13.536419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.536766]  kthread+0x337/0x6f0
[   13.536968]  ret_from_fork+0x41/0x80
[   13.537099]  ret_from_fork_asm+0x1a/0x30
[   13.537250] 
[   13.537331] The buggy address belongs to the object at ffff888102307e00
[   13.537331]  which belongs to the cache kmalloc-16 of size 16
[   13.538144] The buggy address is located 8 bytes inside of
[   13.538144]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.538508] 
[   13.538582] The buggy address belongs to the physical page:
[   13.538857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.539264] flags: 0x200000000000000(node=0|zone=2)
[   13.539520] page_type: f5(slab)
[   13.539863] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.540270] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.540775] page dumped because: kasan: bad access detected
[   13.541053] 
[   13.541143] Memory state around the buggy address:
[   13.541415]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.541823]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.542155] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.542680]                       ^
[   13.542815]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.543033]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.543442] ==================================================================
[   13.409565] ==================================================================
[   13.409904] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.410274] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.410861] 
[   13.410957] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.411005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.411017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.411038] Call Trace:
[   13.411055]  <TASK>
[   13.411073]  dump_stack_lvl+0x73/0xb0
[   13.411101]  print_report+0xd1/0x650
[   13.411123]  ? __virt_addr_valid+0x1db/0x2d0
[   13.411146]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.411171]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.411194]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.411219]  kasan_report+0x141/0x180
[   13.411255]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.411285]  kasan_check_range+0x10c/0x1c0
[   13.411306]  __kasan_check_write+0x18/0x20
[   13.411325]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.411350]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.411375]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.411473]  ? trace_hardirqs_on+0x37/0xe0
[   13.411497]  ? kasan_bitops_generic+0x92/0x1c0
[   13.411522]  kasan_bitops_generic+0x121/0x1c0
[   13.411543]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.411565]  ? __pfx_read_tsc+0x10/0x10
[   13.411586]  ? ktime_get_ts64+0x86/0x230
[   13.411612]  kunit_try_run_case+0x1a5/0x480
[   13.411637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.411662]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.411688]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.411712]  ? __kthread_parkme+0x82/0x180
[   13.411735]  ? preempt_count_sub+0x50/0x80
[   13.411761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.411785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.411808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.411832]  kthread+0x337/0x6f0
[   13.411850]  ? trace_preempt_on+0x20/0xc0
[   13.411874]  ? __pfx_kthread+0x10/0x10
[   13.411892]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.411925]  ? calculate_sigpending+0x7b/0xa0
[   13.411948]  ? __pfx_kthread+0x10/0x10
[   13.411967]  ret_from_fork+0x41/0x80
[   13.411988]  ? __pfx_kthread+0x10/0x10
[   13.412006]  ret_from_fork_asm+0x1a/0x30
[   13.412037]  </TASK>
[   13.412048] 
[   13.421178] Allocated by task 280:
[   13.421380]  kasan_save_stack+0x45/0x70
[   13.421585]  kasan_save_track+0x18/0x40
[   13.421865]  kasan_save_alloc_info+0x3b/0x50
[   13.422047]  __kasan_kmalloc+0xb7/0xc0
[   13.422182]  __kmalloc_cache_noprof+0x189/0x420
[   13.422477]  kasan_bitops_generic+0x92/0x1c0
[   13.422697]  kunit_try_run_case+0x1a5/0x480
[   13.423082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.423327]  kthread+0x337/0x6f0
[   13.423506]  ret_from_fork+0x41/0x80
[   13.423747]  ret_from_fork_asm+0x1a/0x30
[   13.423932] 
[   13.424013] The buggy address belongs to the object at ffff888102307e00
[   13.424013]  which belongs to the cache kmalloc-16 of size 16
[   13.424557] The buggy address is located 8 bytes inside of
[   13.424557]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.425080] 
[   13.425172] The buggy address belongs to the physical page:
[   13.425503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.425856] flags: 0x200000000000000(node=0|zone=2)
[   13.426026] page_type: f5(slab)
[   13.426146] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.426390] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.426618] page dumped because: kasan: bad access detected
[   13.426870] 
[   13.426992] Memory state around the buggy address:
[   13.427217]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.427544]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.428046] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.428483]                       ^
[   13.428647]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.428925]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.429198] ==================================================================
[   13.566052] ==================================================================
[   13.566499] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.566900] Read of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.567246] 
[   13.567417] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.567463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.567475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.567496] Call Trace:
[   13.567512]  <TASK>
[   13.567528]  dump_stack_lvl+0x73/0xb0
[   13.567552]  print_report+0xd1/0x650
[   13.567575]  ? __virt_addr_valid+0x1db/0x2d0
[   13.567597]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.567620]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.567644]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.567669]  kasan_report+0x141/0x180
[   13.567691]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.567720]  kasan_check_range+0x10c/0x1c0
[   13.567741]  __kasan_check_read+0x15/0x20
[   13.567968]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.567999]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.568026]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.568047]  ? trace_hardirqs_on+0x37/0xe0
[   13.568069]  ? kasan_bitops_generic+0x92/0x1c0
[   13.568103]  kasan_bitops_generic+0x121/0x1c0
[   13.568125]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.568148]  ? __pfx_read_tsc+0x10/0x10
[   13.568168]  ? ktime_get_ts64+0x86/0x230
[   13.568194]  kunit_try_run_case+0x1a5/0x480
[   13.568219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.568255]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.568373]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.568403]  ? __kthread_parkme+0x82/0x180
[   13.568426]  ? preempt_count_sub+0x50/0x80
[   13.568453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.568487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.568514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.568538]  kthread+0x337/0x6f0
[   13.568565]  ? trace_preempt_on+0x20/0xc0
[   13.568589]  ? __pfx_kthread+0x10/0x10
[   13.568608]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.568639]  ? calculate_sigpending+0x7b/0xa0
[   13.568662]  ? __pfx_kthread+0x10/0x10
[   13.568681]  ret_from_fork+0x41/0x80
[   13.568711]  ? __pfx_kthread+0x10/0x10
[   13.568730]  ret_from_fork_asm+0x1a/0x30
[   13.568761]  </TASK>
[   13.568772] 
[   13.579562] Allocated by task 280:
[   13.579722]  kasan_save_stack+0x45/0x70
[   13.579884]  kasan_save_track+0x18/0x40
[   13.580030]  kasan_save_alloc_info+0x3b/0x50
[   13.580960]  __kasan_kmalloc+0xb7/0xc0
[   13.581181]  __kmalloc_cache_noprof+0x189/0x420
[   13.581691]  kasan_bitops_generic+0x92/0x1c0
[   13.581956]  kunit_try_run_case+0x1a5/0x480
[   13.582192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.582789]  kthread+0x337/0x6f0
[   13.583003]  ret_from_fork+0x41/0x80
[   13.583206]  ret_from_fork_asm+0x1a/0x30
[   13.583623] 
[   13.583812] The buggy address belongs to the object at ffff888102307e00
[   13.583812]  which belongs to the cache kmalloc-16 of size 16
[   13.584200] The buggy address is located 8 bytes inside of
[   13.584200]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.585397] 
[   13.585830] The buggy address belongs to the physical page:
[   13.586097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.587346] flags: 0x200000000000000(node=0|zone=2)
[   13.587748] page_type: f5(slab)
[   13.588260] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.588830] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.589062] page dumped because: kasan: bad access detected
[   13.589240] 
[   13.589340] Memory state around the buggy address:
[   13.590100]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.590869]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.591589] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.592255]                       ^
[   13.592719]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.593065]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.593558] ==================================================================
[   13.497520] ==================================================================
[   13.498293] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.499053] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.499585] 
[   13.499745] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.499793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.499807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.499830] Call Trace:
[   13.499842]  <TASK>
[   13.499860]  dump_stack_lvl+0x73/0xb0
[   13.499887]  print_report+0xd1/0x650
[   13.499911]  ? __virt_addr_valid+0x1db/0x2d0
[   13.499934]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.499958]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.499982]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.500007]  kasan_report+0x141/0x180
[   13.500029]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.500059]  kasan_check_range+0x10c/0x1c0
[   13.500080]  __kasan_check_write+0x18/0x20
[   13.500100]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.500138]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.500164]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.500186]  ? trace_hardirqs_on+0x37/0xe0
[   13.500221]  ? kasan_bitops_generic+0x92/0x1c0
[   13.500256]  kasan_bitops_generic+0x121/0x1c0
[   13.500277]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.500298]  ? __pfx_read_tsc+0x10/0x10
[   13.500320]  ? ktime_get_ts64+0x86/0x230
[   13.500346]  kunit_try_run_case+0x1a5/0x480
[   13.500371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.500394]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.500419]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.500442]  ? __kthread_parkme+0x82/0x180
[   13.500466]  ? preempt_count_sub+0x50/0x80
[   13.500492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.500573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.500603]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.500627]  kthread+0x337/0x6f0
[   13.500645]  ? trace_preempt_on+0x20/0xc0
[   13.500668]  ? __pfx_kthread+0x10/0x10
[   13.500687]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.500710]  ? calculate_sigpending+0x7b/0xa0
[   13.500732]  ? __pfx_kthread+0x10/0x10
[   13.500752]  ret_from_fork+0x41/0x80
[   13.500774]  ? __pfx_kthread+0x10/0x10
[   13.500792]  ret_from_fork_asm+0x1a/0x30
[   13.500824]  </TASK>
[   13.500835] 
[   13.510805] Allocated by task 280:
[   13.511029]  kasan_save_stack+0x45/0x70
[   13.511623]  kasan_save_track+0x18/0x40
[   13.511848]  kasan_save_alloc_info+0x3b/0x50
[   13.512096]  __kasan_kmalloc+0xb7/0xc0
[   13.512337]  __kmalloc_cache_noprof+0x189/0x420
[   13.512514]  kasan_bitops_generic+0x92/0x1c0
[   13.512657]  kunit_try_run_case+0x1a5/0x480
[   13.512807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.513313]  kthread+0x337/0x6f0
[   13.513482]  ret_from_fork+0x41/0x80
[   13.513811]  ret_from_fork_asm+0x1a/0x30
[   13.514055] 
[   13.514196] The buggy address belongs to the object at ffff888102307e00
[   13.514196]  which belongs to the cache kmalloc-16 of size 16
[   13.514831] The buggy address is located 8 bytes inside of
[   13.514831]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.515206] 
[   13.515538] The buggy address belongs to the physical page:
[   13.515953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.516408] flags: 0x200000000000000(node=0|zone=2)
[   13.516735] page_type: f5(slab)
[   13.516912] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.517322] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.517748] page dumped because: kasan: bad access detected
[   13.517925] 
[   13.518017] Memory state around the buggy address:
[   13.518363]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.518900]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.519266] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.519848]                       ^
[   13.520082]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.520521]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.520950] ==================================================================