Hay
Date
July 1, 2025, 3:08 p.m.

Environment
qemu-x86_64

[   13.969556] ==================================================================
[   13.969916] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.970332] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278
[   13.970879] 
[   13.970998] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.971067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.971081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.971108] Call Trace:
[   13.971126]  <TASK>
[   13.971144]  dump_stack_lvl+0x73/0xb0
[   13.971176]  print_report+0xd1/0x650
[   13.971199]  ? __virt_addr_valid+0x1db/0x2d0
[   13.971223]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.971252]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.971277]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.971306]  kasan_report+0x141/0x180
[   13.971328]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.971362]  kasan_check_range+0x10c/0x1c0
[   13.971388]  __kasan_check_write+0x18/0x20
[   13.971408]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.971438]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.971468]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.971494]  ? trace_hardirqs_on+0x37/0xe0
[   13.971519]  ? kasan_bitops_generic+0x92/0x1c0
[   13.971546]  kasan_bitops_generic+0x121/0x1c0
[   13.971570]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.971596]  ? __pfx_read_tsc+0x10/0x10
[   13.971617]  ? ktime_get_ts64+0x86/0x230
[   13.971642]  kunit_try_run_case+0x1a5/0x480
[   13.971690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.971713]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.971739]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.971762]  ? __kthread_parkme+0x82/0x180
[   13.971783]  ? preempt_count_sub+0x50/0x80
[   13.971808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.971832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.971857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.971881]  kthread+0x337/0x6f0
[   13.971901]  ? trace_preempt_on+0x20/0xc0
[   13.971923]  ? __pfx_kthread+0x10/0x10
[   13.971943]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.971965]  ? calculate_sigpending+0x7b/0xa0
[   13.971990]  ? __pfx_kthread+0x10/0x10
[   13.972011]  ret_from_fork+0x116/0x1d0
[   13.972040]  ? __pfx_kthread+0x10/0x10
[   13.972060]  ret_from_fork_asm+0x1a/0x30
[   13.972092]  </TASK>
[   13.972103] 
[   13.980556] Allocated by task 278:
[   13.980858]  kasan_save_stack+0x45/0x70
[   13.981054]  kasan_save_track+0x18/0x40
[   13.981230]  kasan_save_alloc_info+0x3b/0x50
[   13.981420]  __kasan_kmalloc+0xb7/0xc0
[   13.981579]  __kmalloc_cache_noprof+0x189/0x420
[   13.981757]  kasan_bitops_generic+0x92/0x1c0
[   13.982016]  kunit_try_run_case+0x1a5/0x480
[   13.982244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.982420]  kthread+0x337/0x6f0
[   13.982660]  ret_from_fork+0x116/0x1d0
[   13.982846]  ret_from_fork_asm+0x1a/0x30
[   13.983056] 
[   13.983178] The buggy address belongs to the object at ffff88810191e8e0
[   13.983178]  which belongs to the cache kmalloc-16 of size 16
[   13.983710] The buggy address is located 8 bytes inside of
[   13.983710]  allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9)
[   13.984308] 
[   13.984384] The buggy address belongs to the physical page:
[   13.984618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e
[   13.984863] flags: 0x200000000000000(node=0|zone=2)
[   13.985038] page_type: f5(slab)
[   13.985159] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.985393] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.986064] page dumped because: kasan: bad access detected
[   13.986426] 
[   13.986495] Memory state around the buggy address:
[   13.986652]  ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.986870]  ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.987100] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.987316]                                                           ^
[   13.987517]  ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.988100]  ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.988818] ==================================================================
[   13.901835] ==================================================================
[   13.902189] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.902466] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278
[   13.902905] 
[   13.903112] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.903165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.903179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.903207] Call Trace:
[   13.903227]  <TASK>
[   13.903245]  dump_stack_lvl+0x73/0xb0
[   13.903276]  print_report+0xd1/0x650
[   13.903298]  ? __virt_addr_valid+0x1db/0x2d0
[   13.903322]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.903352]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.903376]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.903405]  kasan_report+0x141/0x180
[   13.903427]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.903461]  kasan_check_range+0x10c/0x1c0
[   13.903486]  __kasan_check_write+0x18/0x20
[   13.903505]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.903534]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.903564]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.903590]  ? trace_hardirqs_on+0x37/0xe0
[   13.903614]  ? kasan_bitops_generic+0x92/0x1c0
[   13.903655]  kasan_bitops_generic+0x121/0x1c0
[   13.903679]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.903705]  ? __pfx_read_tsc+0x10/0x10
[   13.903726]  ? ktime_get_ts64+0x86/0x230
[   13.903751]  kunit_try_run_case+0x1a5/0x480
[   13.903775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.903799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.903825]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.903849]  ? __kthread_parkme+0x82/0x180
[   13.903870]  ? preempt_count_sub+0x50/0x80
[   13.903894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.903918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.903942]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.903968]  kthread+0x337/0x6f0
[   13.903986]  ? trace_preempt_on+0x20/0xc0
[   13.904008]  ? __pfx_kthread+0x10/0x10
[   13.904040]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.904063]  ? calculate_sigpending+0x7b/0xa0
[   13.904087]  ? __pfx_kthread+0x10/0x10
[   13.904108]  ret_from_fork+0x116/0x1d0
[   13.904127]  ? __pfx_kthread+0x10/0x10
[   13.904154]  ret_from_fork_asm+0x1a/0x30
[   13.904185]  </TASK>
[   13.904196] 
[   13.913285] Allocated by task 278:
[   13.913460]  kasan_save_stack+0x45/0x70
[   13.913685]  kasan_save_track+0x18/0x40
[   13.913881]  kasan_save_alloc_info+0x3b/0x50
[   13.914091]  __kasan_kmalloc+0xb7/0xc0
[   13.914267]  __kmalloc_cache_noprof+0x189/0x420
[   13.914454]  kasan_bitops_generic+0x92/0x1c0
[   13.914747]  kunit_try_run_case+0x1a5/0x480
[   13.914964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.915225]  kthread+0x337/0x6f0
[   13.915384]  ret_from_fork+0x116/0x1d0
[   13.915534]  ret_from_fork_asm+0x1a/0x30
[   13.915813] 
[   13.915908] The buggy address belongs to the object at ffff88810191e8e0
[   13.915908]  which belongs to the cache kmalloc-16 of size 16
[   13.916371] The buggy address is located 8 bytes inside of
[   13.916371]  allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9)
[   13.916729] 
[   13.916802] The buggy address belongs to the physical page:
[   13.916978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e
[   13.917694] flags: 0x200000000000000(node=0|zone=2)
[   13.917987] page_type: f5(slab)
[   13.918761] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.919133] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.919373] page dumped because: kasan: bad access detected
[   13.919549] 
[   13.919621] Memory state around the buggy address:
[   13.920320]  ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.921071]  ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.921376] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.922126]                                                           ^
[   13.922579]  ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.923190]  ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.923879] ==================================================================
[   13.842076] ==================================================================
[   13.842379] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.842789] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278
[   13.843228] 
[   13.843341] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.843391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.843403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.843429] Call Trace:
[   13.843447]  <TASK>
[   13.843463]  dump_stack_lvl+0x73/0xb0
[   13.843490]  print_report+0xd1/0x650
[   13.843514]  ? __virt_addr_valid+0x1db/0x2d0
[   13.843537]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.843566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.843590]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.843620]  kasan_report+0x141/0x180
[   13.843641]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.843675]  kasan_check_range+0x10c/0x1c0
[   13.843698]  __kasan_check_write+0x18/0x20
[   13.843718]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.843748]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.843779]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.843805]  ? trace_hardirqs_on+0x37/0xe0
[   13.843827]  ? kasan_bitops_generic+0x92/0x1c0
[   13.843855]  kasan_bitops_generic+0x121/0x1c0
[   13.843879]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.843904]  ? __pfx_read_tsc+0x10/0x10
[   13.844018]  ? ktime_get_ts64+0x86/0x230
[   13.844061]  kunit_try_run_case+0x1a5/0x480
[   13.844086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.844110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.844134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.844166]  ? __kthread_parkme+0x82/0x180
[   13.844187]  ? preempt_count_sub+0x50/0x80
[   13.844211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.844235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.844260]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.844284]  kthread+0x337/0x6f0
[   13.844304]  ? trace_preempt_on+0x20/0xc0
[   13.844326]  ? __pfx_kthread+0x10/0x10
[   13.844346]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.844368]  ? calculate_sigpending+0x7b/0xa0
[   13.844392]  ? __pfx_kthread+0x10/0x10
[   13.844413]  ret_from_fork+0x116/0x1d0
[   13.844432]  ? __pfx_kthread+0x10/0x10
[   13.844453]  ret_from_fork_asm+0x1a/0x30
[   13.844484]  </TASK>
[   13.844495] 
[   13.853190] Allocated by task 278:
[   13.853326]  kasan_save_stack+0x45/0x70
[   13.853769]  kasan_save_track+0x18/0x40
[   13.854077]  kasan_save_alloc_info+0x3b/0x50
[   13.854375]  __kasan_kmalloc+0xb7/0xc0
[   13.854528]  __kmalloc_cache_noprof+0x189/0x420
[   13.855042]  kasan_bitops_generic+0x92/0x1c0
[   13.855273]  kunit_try_run_case+0x1a5/0x480
[   13.855436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.855624]  kthread+0x337/0x6f0
[   13.855974]  ret_from_fork+0x116/0x1d0
[   13.856192]  ret_from_fork_asm+0x1a/0x30
[   13.856392] 
[   13.856479] The buggy address belongs to the object at ffff88810191e8e0
[   13.856479]  which belongs to the cache kmalloc-16 of size 16
[   13.857048] The buggy address is located 8 bytes inside of
[   13.857048]  allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9)
[   13.857532] 
[   13.857628] The buggy address belongs to the physical page:
[   13.857903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e
[   13.858158] flags: 0x200000000000000(node=0|zone=2)
[   13.858328] page_type: f5(slab)
[   13.858497] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.858837] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.859200] page dumped because: kasan: bad access detected
[   13.859453] 
[   13.859542] Memory state around the buggy address:
[   13.859985]  ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.860296]  ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.860582] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.860968]                                                           ^
[   13.861204]  ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.861522]  ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.861901] ==================================================================
[   13.924453] ==================================================================
[   13.924705] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.925199] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278
[   13.925493] 
[   13.925612] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.925677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.925691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.925720] Call Trace:
[   13.925741]  <TASK>
[   13.925762]  dump_stack_lvl+0x73/0xb0
[   13.925791]  print_report+0xd1/0x650
[   13.925815]  ? __virt_addr_valid+0x1db/0x2d0
[   13.925840]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.925873]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.925898]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.925926]  kasan_report+0x141/0x180
[   13.925948]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.925985]  kasan_check_range+0x10c/0x1c0
[   13.926008]  __kasan_check_write+0x18/0x20
[   13.926040]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.926069]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.926101]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.926128]  ? trace_hardirqs_on+0x37/0xe0
[   13.926152]  ? kasan_bitops_generic+0x92/0x1c0
[   13.926180]  kasan_bitops_generic+0x121/0x1c0
[   13.926204]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.926229]  ? __pfx_read_tsc+0x10/0x10
[   13.926251]  ? ktime_get_ts64+0x86/0x230
[   13.926276]  kunit_try_run_case+0x1a5/0x480
[   13.926301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.926323]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.926348]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.926373]  ? __kthread_parkme+0x82/0x180
[   13.926394]  ? preempt_count_sub+0x50/0x80
[   13.926418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.926443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.926467]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.926492]  kthread+0x337/0x6f0
[   13.926510]  ? trace_preempt_on+0x20/0xc0
[   13.926533]  ? __pfx_kthread+0x10/0x10
[   13.926553]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.926574]  ? calculate_sigpending+0x7b/0xa0
[   13.926598]  ? __pfx_kthread+0x10/0x10
[   13.926620]  ret_from_fork+0x116/0x1d0
[   13.926638]  ? __pfx_kthread+0x10/0x10
[   13.927010]  ret_from_fork_asm+0x1a/0x30
[   13.927068]  </TASK>
[   13.927081] 
[   13.935430] Allocated by task 278:
[   13.935605]  kasan_save_stack+0x45/0x70
[   13.935778]  kasan_save_track+0x18/0x40
[   13.935969]  kasan_save_alloc_info+0x3b/0x50
[   13.936176]  __kasan_kmalloc+0xb7/0xc0
[   13.936373]  __kmalloc_cache_noprof+0x189/0x420
[   13.936554]  kasan_bitops_generic+0x92/0x1c0
[   13.936886]  kunit_try_run_case+0x1a5/0x480
[   13.937117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.937332]  kthread+0x337/0x6f0
[   13.937502]  ret_from_fork+0x116/0x1d0
[   13.937866]  ret_from_fork_asm+0x1a/0x30
[   13.938074] 
[   13.938159] The buggy address belongs to the object at ffff88810191e8e0
[   13.938159]  which belongs to the cache kmalloc-16 of size 16
[   13.938554] The buggy address is located 8 bytes inside of
[   13.938554]  allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9)
[   13.938945] 
[   13.939146] The buggy address belongs to the physical page:
[   13.939688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e
[   13.940121] flags: 0x200000000000000(node=0|zone=2)
[   13.940343] page_type: f5(slab)
[   13.940466] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.940909] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.941476] page dumped because: kasan: bad access detected
[   13.941912] 
[   13.941989] Memory state around the buggy address:
[   13.942165]  ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.942499]  ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.942790] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.943007]                                                           ^
[   13.943316]  ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.943637]  ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.943974] ==================================================================
[   13.989367] ==================================================================
[   13.989713] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.990106] Read of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278
[   13.990551] 
[   13.990667] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.990719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.990731] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.990759] Call Trace:
[   13.990777]  <TASK>
[   13.990793]  dump_stack_lvl+0x73/0xb0
[   13.990822]  print_report+0xd1/0x650
[   13.990845]  ? __virt_addr_valid+0x1db/0x2d0
[   13.990869]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.990899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.990923]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.990953]  kasan_report+0x141/0x180
[   13.990974]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.991008]  kasan_check_range+0x10c/0x1c0
[   13.991045]  __kasan_check_read+0x15/0x20
[   13.991064]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.991093]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.991123]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.991150]  ? trace_hardirqs_on+0x37/0xe0
[   13.991174]  ? kasan_bitops_generic+0x92/0x1c0
[   13.991202]  kasan_bitops_generic+0x121/0x1c0
[   13.991226]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.991254]  ? __pfx_read_tsc+0x10/0x10
[   13.991275]  ? ktime_get_ts64+0x86/0x230
[   13.991301]  kunit_try_run_case+0x1a5/0x480
[   13.991334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.991359]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.991383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.991407]  ? __kthread_parkme+0x82/0x180
[   13.991428]  ? preempt_count_sub+0x50/0x80
[   13.991452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.991476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.991502]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.991527]  kthread+0x337/0x6f0
[   13.991546]  ? trace_preempt_on+0x20/0xc0
[   13.991568]  ? __pfx_kthread+0x10/0x10
[   13.991589]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.991610]  ? calculate_sigpending+0x7b/0xa0
[   13.991647]  ? __pfx_kthread+0x10/0x10
[   13.991669]  ret_from_fork+0x116/0x1d0
[   13.991699]  ? __pfx_kthread+0x10/0x10
[   13.991720]  ret_from_fork_asm+0x1a/0x30
[   13.991751]  </TASK>
[   13.991764] 
[   14.000184] Allocated by task 278:
[   14.000527]  kasan_save_stack+0x45/0x70
[   14.000788]  kasan_save_track+0x18/0x40
[   14.000934]  kasan_save_alloc_info+0x3b/0x50
[   14.001098]  __kasan_kmalloc+0xb7/0xc0
[   14.001231]  __kmalloc_cache_noprof+0x189/0x420
[   14.001386]  kasan_bitops_generic+0x92/0x1c0
[   14.001537]  kunit_try_run_case+0x1a5/0x480
[   14.001692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.002043]  kthread+0x337/0x6f0
[   14.002225]  ret_from_fork+0x116/0x1d0
[   14.002414]  ret_from_fork_asm+0x1a/0x30
[   14.002677] 
[   14.002803] The buggy address belongs to the object at ffff88810191e8e0
[   14.002803]  which belongs to the cache kmalloc-16 of size 16
[   14.003583] The buggy address is located 8 bytes inside of
[   14.003583]  allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9)
[   14.004096] 
[   14.004174] The buggy address belongs to the physical page:
[   14.004459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e
[   14.004701] flags: 0x200000000000000(node=0|zone=2)
[   14.004866] page_type: f5(slab)
[   14.004987] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.005230] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.005666] page dumped because: kasan: bad access detected
[   14.005989] 
[   14.006095] Memory state around the buggy address:
[   14.006319]  ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.006641]  ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.006905] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.007131]                                                           ^
[   14.007332]  ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.007550]  ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.007764] ==================================================================
[   13.944471] ==================================================================
[   13.944957] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.945355] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278
[   13.945583] 
[   13.945869] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.945924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.945937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.945965] Call Trace:
[   13.945981]  <TASK>
[   13.945996]  dump_stack_lvl+0x73/0xb0
[   13.946042]  print_report+0xd1/0x650
[   13.946065]  ? __virt_addr_valid+0x1db/0x2d0
[   13.946089]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.946118]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.946141]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.946171]  kasan_report+0x141/0x180
[   13.946193]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.946226]  kasan_check_range+0x10c/0x1c0
[   13.946250]  __kasan_check_write+0x18/0x20
[   13.946270]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.946299]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.946330]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.946356]  ? trace_hardirqs_on+0x37/0xe0
[   13.946378]  ? kasan_bitops_generic+0x92/0x1c0
[   13.946406]  kasan_bitops_generic+0x121/0x1c0
[   13.946430]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.946455]  ? __pfx_read_tsc+0x10/0x10
[   13.946477]  ? ktime_get_ts64+0x86/0x230
[   13.946501]  kunit_try_run_case+0x1a5/0x480
[   13.946526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.946549]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.946574]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.946597]  ? __kthread_parkme+0x82/0x180
[   13.946619]  ? preempt_count_sub+0x50/0x80
[   13.946997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.947036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.947062]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.947087]  kthread+0x337/0x6f0
[   13.947107]  ? trace_preempt_on+0x20/0xc0
[   13.947129]  ? __pfx_kthread+0x10/0x10
[   13.947150]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.947171]  ? calculate_sigpending+0x7b/0xa0
[   13.947196]  ? __pfx_kthread+0x10/0x10
[   13.947217]  ret_from_fork+0x116/0x1d0
[   13.947236]  ? __pfx_kthread+0x10/0x10
[   13.947256]  ret_from_fork_asm+0x1a/0x30
[   13.947288]  </TASK>
[   13.947298] 
[   13.958008] Allocated by task 278:
[   13.958260]  kasan_save_stack+0x45/0x70
[   13.958473]  kasan_save_track+0x18/0x40
[   13.958672]  kasan_save_alloc_info+0x3b/0x50
[   13.959151]  __kasan_kmalloc+0xb7/0xc0
[   13.959354]  __kmalloc_cache_noprof+0x189/0x420
[   13.959582]  kasan_bitops_generic+0x92/0x1c0
[   13.959822]  kunit_try_run_case+0x1a5/0x480
[   13.960344]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.960778]  kthread+0x337/0x6f0
[   13.960968]  ret_from_fork+0x116/0x1d0
[   13.961279]  ret_from_fork_asm+0x1a/0x30
[   13.961592] 
[   13.961682] The buggy address belongs to the object at ffff88810191e8e0
[   13.961682]  which belongs to the cache kmalloc-16 of size 16
[   13.962449] The buggy address is located 8 bytes inside of
[   13.962449]  allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9)
[   13.962985] 
[   13.963127] The buggy address belongs to the physical page:
[   13.963719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e
[   13.964055] flags: 0x200000000000000(node=0|zone=2)
[   13.964432] page_type: f5(slab)
[   13.964564] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.965249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.965706] page dumped because: kasan: bad access detected
[   13.966037] 
[   13.966139] Memory state around the buggy address:
[   13.966368]  ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.966904]  ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.967297] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.967615]                                                           ^
[   13.968105]  ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.968503]  ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.968807] ==================================================================
[   13.862391] ==================================================================
[   13.862801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.863161] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278
[   13.863439] 
[   13.863553] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.863603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.863615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.863818] Call Trace:
[   13.863842]  <TASK>
[   13.863858]  dump_stack_lvl+0x73/0xb0
[   13.863889]  print_report+0xd1/0x650
[   13.863913]  ? __virt_addr_valid+0x1db/0x2d0
[   13.863938]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.863966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.863989]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.864034]  kasan_report+0x141/0x180
[   13.864057]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.864091]  kasan_check_range+0x10c/0x1c0
[   13.864115]  __kasan_check_write+0x18/0x20
[   13.864135]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.864167]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.864198]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.864223]  ? trace_hardirqs_on+0x37/0xe0
[   13.864246]  ? kasan_bitops_generic+0x92/0x1c0
[   13.864273]  kasan_bitops_generic+0x121/0x1c0
[   13.864297]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.864323]  ? __pfx_read_tsc+0x10/0x10
[   13.864344]  ? ktime_get_ts64+0x86/0x230
[   13.864368]  kunit_try_run_case+0x1a5/0x480
[   13.864392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.864415]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.864440]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.864463]  ? __kthread_parkme+0x82/0x180
[   13.864485]  ? preempt_count_sub+0x50/0x80
[   13.864510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.864534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.864559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.864584]  kthread+0x337/0x6f0
[   13.864603]  ? trace_preempt_on+0x20/0xc0
[   13.864625]  ? __pfx_kthread+0x10/0x10
[   13.864658]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.864680]  ? calculate_sigpending+0x7b/0xa0
[   13.864704]  ? __pfx_kthread+0x10/0x10
[   13.864726]  ret_from_fork+0x116/0x1d0
[   13.864744]  ? __pfx_kthread+0x10/0x10
[   13.864765]  ret_from_fork_asm+0x1a/0x30
[   13.864795]  </TASK>
[   13.864807] 
[   13.873533] Allocated by task 278:
[   13.873870]  kasan_save_stack+0x45/0x70
[   13.874093]  kasan_save_track+0x18/0x40
[   13.874296]  kasan_save_alloc_info+0x3b/0x50
[   13.874516]  __kasan_kmalloc+0xb7/0xc0
[   13.874831]  __kmalloc_cache_noprof+0x189/0x420
[   13.875042]  kasan_bitops_generic+0x92/0x1c0
[   13.875192]  kunit_try_run_case+0x1a5/0x480
[   13.875337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.875511]  kthread+0x337/0x6f0
[   13.875660]  ret_from_fork+0x116/0x1d0
[   13.875848]  ret_from_fork_asm+0x1a/0x30
[   13.876058] 
[   13.876154] The buggy address belongs to the object at ffff88810191e8e0
[   13.876154]  which belongs to the cache kmalloc-16 of size 16
[   13.876669] The buggy address is located 8 bytes inside of
[   13.876669]  allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9)
[   13.877224] 
[   13.877336] The buggy address belongs to the physical page:
[   13.877596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e
[   13.878044] flags: 0x200000000000000(node=0|zone=2)
[   13.878286] page_type: f5(slab)
[   13.878465] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.879007] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.879258] page dumped because: kasan: bad access detected
[   13.879433] 
[   13.879518] Memory state around the buggy address:
[   13.879737]  ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.880132]  ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.880440] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.880699]                                                           ^
[   13.881002]  ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.881314]  ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.881584] ==================================================================
[   13.882057] ==================================================================
[   13.882505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.883006] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278
[   13.883316] 
[   13.883400] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.883449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.883462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.883490] Call Trace:
[   13.883506]  <TASK>
[   13.883520]  dump_stack_lvl+0x73/0xb0
[   13.883549]  print_report+0xd1/0x650
[   13.883572]  ? __virt_addr_valid+0x1db/0x2d0
[   13.883595]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.883799]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.883827]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.883856]  kasan_report+0x141/0x180
[   13.883879]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.883913]  kasan_check_range+0x10c/0x1c0
[   13.883937]  __kasan_check_write+0x18/0x20
[   13.883956]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.883985]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.884016]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.884058]  ? trace_hardirqs_on+0x37/0xe0
[   13.884082]  ? kasan_bitops_generic+0x92/0x1c0
[   13.884109]  kasan_bitops_generic+0x121/0x1c0
[   13.884133]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.884161]  ? __pfx_read_tsc+0x10/0x10
[   13.884184]  ? ktime_get_ts64+0x86/0x230
[   13.884208]  kunit_try_run_case+0x1a5/0x480
[   13.884233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.884255]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.884280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.884304]  ? __kthread_parkme+0x82/0x180
[   13.884324]  ? preempt_count_sub+0x50/0x80
[   13.884348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.884372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.884396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.884422]  kthread+0x337/0x6f0
[   13.884440]  ? trace_preempt_on+0x20/0xc0
[   13.884462]  ? __pfx_kthread+0x10/0x10
[   13.884483]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.884504]  ? calculate_sigpending+0x7b/0xa0
[   13.884528]  ? __pfx_kthread+0x10/0x10
[   13.884550]  ret_from_fork+0x116/0x1d0
[   13.884569]  ? __pfx_kthread+0x10/0x10
[   13.884590]  ret_from_fork_asm+0x1a/0x30
[   13.884621]  </TASK>
[   13.884632] 
[   13.893394] Allocated by task 278:
[   13.893539]  kasan_save_stack+0x45/0x70
[   13.893766]  kasan_save_track+0x18/0x40
[   13.893985]  kasan_save_alloc_info+0x3b/0x50
[   13.894227]  __kasan_kmalloc+0xb7/0xc0
[   13.894419]  __kmalloc_cache_noprof+0x189/0x420
[   13.894631]  kasan_bitops_generic+0x92/0x1c0
[   13.894906]  kunit_try_run_case+0x1a5/0x480
[   13.895114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.895343]  kthread+0x337/0x6f0
[   13.895494]  ret_from_fork+0x116/0x1d0
[   13.895849]  ret_from_fork_asm+0x1a/0x30
[   13.896014] 
[   13.896119] The buggy address belongs to the object at ffff88810191e8e0
[   13.896119]  which belongs to the cache kmalloc-16 of size 16
[   13.896592] The buggy address is located 8 bytes inside of
[   13.896592]  allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9)
[   13.897098] 
[   13.897195] The buggy address belongs to the physical page:
[   13.897404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e
[   13.897838] flags: 0x200000000000000(node=0|zone=2)
[   13.898117] page_type: f5(slab)
[   13.898288] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.898586] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.898928] page dumped because: kasan: bad access detected
[   13.899120] 
[   13.899192] Memory state around the buggy address:
[   13.899350]  ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.899569]  ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.899870] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.900223]                                                           ^
[   13.900520]  ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.901063]  ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.901354] ==================================================================
[   14.008130] ==================================================================
[   14.008490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.009245] Read of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278
[   14.009580] 
[   14.009735] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.009791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.009804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.009833] Call Trace:
[   14.009852]  <TASK>
[   14.009870]  dump_stack_lvl+0x73/0xb0
[   14.009908]  print_report+0xd1/0x650
[   14.009930]  ? __virt_addr_valid+0x1db/0x2d0
[   14.009955]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.009985]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.010009]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.010051]  kasan_report+0x141/0x180
[   14.010073]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.010107]  __asan_report_load8_noabort+0x18/0x20
[   14.010132]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.010161]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.010192]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.010217]  ? trace_hardirqs_on+0x37/0xe0
[   14.010241]  ? kasan_bitops_generic+0x92/0x1c0
[   14.010268]  kasan_bitops_generic+0x121/0x1c0
[   14.010293]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.010318]  ? __pfx_read_tsc+0x10/0x10
[   14.010340]  ? ktime_get_ts64+0x86/0x230
[   14.010364]  kunit_try_run_case+0x1a5/0x480
[   14.010389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.010411]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.010437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.010462]  ? __kthread_parkme+0x82/0x180
[   14.010483]  ? preempt_count_sub+0x50/0x80
[   14.010508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.010532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.010556]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.010582]  kthread+0x337/0x6f0
[   14.010600]  ? trace_preempt_on+0x20/0xc0
[   14.010625]  ? __pfx_kthread+0x10/0x10
[   14.010657]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.010680]  ? calculate_sigpending+0x7b/0xa0
[   14.010705]  ? __pfx_kthread+0x10/0x10
[   14.010726]  ret_from_fork+0x116/0x1d0
[   14.010745]  ? __pfx_kthread+0x10/0x10
[   14.010766]  ret_from_fork_asm+0x1a/0x30
[   14.010797]  </TASK>
[   14.010810] 
[   14.023059] Allocated by task 278:
[   14.023425]  kasan_save_stack+0x45/0x70
[   14.023659]  kasan_save_track+0x18/0x40
[   14.024073]  kasan_save_alloc_info+0x3b/0x50
[   14.024344]  __kasan_kmalloc+0xb7/0xc0
[   14.024719]  __kmalloc_cache_noprof+0x189/0x420
[   14.024935]  kasan_bitops_generic+0x92/0x1c0
[   14.025153]  kunit_try_run_case+0x1a5/0x480
[   14.025345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.025580]  kthread+0x337/0x6f0
[   14.026069]  ret_from_fork+0x116/0x1d0
[   14.026285]  ret_from_fork_asm+0x1a/0x30
[   14.026467] 
[   14.026568] The buggy address belongs to the object at ffff88810191e8e0
[   14.026568]  which belongs to the cache kmalloc-16 of size 16
[   14.027343] The buggy address is located 8 bytes inside of
[   14.027343]  allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9)
[   14.028201] 
[   14.028386] The buggy address belongs to the physical page:
[   14.028595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e
[   14.029174] flags: 0x200000000000000(node=0|zone=2)
[   14.029409] page_type: f5(slab)
[   14.029559] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.030048] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.030402] page dumped because: kasan: bad access detected
[   14.030697] 
[   14.030921] Memory state around the buggy address:
[   14.031180]  ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.031706]  ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.031994] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.032446]                                                           ^
[   14.032820]  ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.033156]  ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.033565] ==================================================================