Hay
Date
July 5, 2025, 5:09 p.m.

Environment
qemu-x86_64

[   13.876165] ==================================================================
[   13.876715] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.877054] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279
[   13.877443] 
[   13.877580] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.877625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.877636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.877658] Call Trace:
[   13.877673]  <TASK>
[   13.877691]  dump_stack_lvl+0x73/0xb0
[   13.877717]  print_report+0xd1/0x650
[   13.877740]  ? __virt_addr_valid+0x1db/0x2d0
[   13.877761]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.877787]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.877809]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.877835]  kasan_report+0x141/0x180
[   13.877856]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.877887]  kasan_check_range+0x10c/0x1c0
[   13.877911]  __kasan_check_write+0x18/0x20
[   13.877929]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.877956]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.877983]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.878007]  ? trace_hardirqs_on+0x37/0xe0
[   13.878028]  ? kasan_bitops_generic+0x92/0x1c0
[   13.878056]  kasan_bitops_generic+0x121/0x1c0
[   13.878078]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.878101]  ? __pfx_read_tsc+0x10/0x10
[   13.878121]  ? ktime_get_ts64+0x86/0x230
[   13.878145]  kunit_try_run_case+0x1a5/0x480
[   13.878167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.878189]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.878226]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.878249]  ? __kthread_parkme+0x82/0x180
[   13.878268]  ? preempt_count_sub+0x50/0x80
[   13.878292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.878314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.878337]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.878359]  kthread+0x337/0x6f0
[   13.878378]  ? trace_preempt_on+0x20/0xc0
[   13.878400]  ? __pfx_kthread+0x10/0x10
[   13.878421]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.878441]  ? calculate_sigpending+0x7b/0xa0
[   13.878474]  ? __pfx_kthread+0x10/0x10
[   13.878494]  ret_from_fork+0x116/0x1d0
[   13.878512]  ? __pfx_kthread+0x10/0x10
[   13.878532]  ret_from_fork_asm+0x1a/0x30
[   13.878562]  </TASK>
[   13.878573] 
[   13.886685] Allocated by task 279:
[   13.886888]  kasan_save_stack+0x45/0x70
[   13.887111]  kasan_save_track+0x18/0x40
[   13.887305]  kasan_save_alloc_info+0x3b/0x50
[   13.887528]  __kasan_kmalloc+0xb7/0xc0
[   13.887667]  __kmalloc_cache_noprof+0x189/0x420
[   13.888144]  kasan_bitops_generic+0x92/0x1c0
[   13.888307]  kunit_try_run_case+0x1a5/0x480
[   13.888469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.888913]  kthread+0x337/0x6f0
[   13.889086]  ret_from_fork+0x116/0x1d0
[   13.889408]  ret_from_fork_asm+0x1a/0x30
[   13.889591] 
[   13.889699] The buggy address belongs to the object at ffff88810274c280
[   13.889699]  which belongs to the cache kmalloc-16 of size 16
[   13.890130] The buggy address is located 8 bytes inside of
[   13.890130]  allocated 9-byte region [ffff88810274c280, ffff88810274c289)
[   13.890615] 
[   13.890716] The buggy address belongs to the physical page:
[   13.891116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c
[   13.891667] flags: 0x200000000000000(node=0|zone=2)
[   13.891877] page_type: f5(slab)
[   13.892036] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.892294] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.892653] page dumped because: kasan: bad access detected
[   13.892991] 
[   13.893083] Memory state around the buggy address:
[   13.893367]  ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.893626]  ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.894166] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.894380]                       ^
[   13.894588]  ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.895205]  ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.895489] ==================================================================
[   13.957999] ==================================================================
[   13.958419] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.958894] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279
[   13.959189] 
[   13.959327] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.959371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.959383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.959404] Call Trace:
[   13.959420]  <TASK>
[   13.959435]  dump_stack_lvl+0x73/0xb0
[   13.959486]  print_report+0xd1/0x650
[   13.959507]  ? __virt_addr_valid+0x1db/0x2d0
[   13.959529]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.959556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.959578]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.959604]  kasan_report+0x141/0x180
[   13.959626]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.959657]  kasan_check_range+0x10c/0x1c0
[   13.959680]  __kasan_check_write+0x18/0x20
[   13.959700]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.959726]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.959754]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.959777]  ? trace_hardirqs_on+0x37/0xe0
[   13.959800]  ? kasan_bitops_generic+0x92/0x1c0
[   13.959826]  kasan_bitops_generic+0x121/0x1c0
[   13.959849]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.959873]  ? __pfx_read_tsc+0x10/0x10
[   13.959893]  ? ktime_get_ts64+0x86/0x230
[   13.959917]  kunit_try_run_case+0x1a5/0x480
[   13.959940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.959962]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.959984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.960006]  ? __kthread_parkme+0x82/0x180
[   13.960025]  ? preempt_count_sub+0x50/0x80
[   13.960048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.960072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.960093]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.960116]  kthread+0x337/0x6f0
[   13.960135]  ? trace_preempt_on+0x20/0xc0
[   13.960156]  ? __pfx_kthread+0x10/0x10
[   13.960176]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.960373]  ? calculate_sigpending+0x7b/0xa0
[   13.960403]  ? __pfx_kthread+0x10/0x10
[   13.960426]  ret_from_fork+0x116/0x1d0
[   13.960444]  ? __pfx_kthread+0x10/0x10
[   13.960480]  ret_from_fork_asm+0x1a/0x30
[   13.960510]  </TASK>
[   13.960522] 
[   13.969499] Allocated by task 279:
[   13.969660]  kasan_save_stack+0x45/0x70
[   13.969835]  kasan_save_track+0x18/0x40
[   13.969986]  kasan_save_alloc_info+0x3b/0x50
[   13.970255]  __kasan_kmalloc+0xb7/0xc0
[   13.970462]  __kmalloc_cache_noprof+0x189/0x420
[   13.970661]  kasan_bitops_generic+0x92/0x1c0
[   13.970856]  kunit_try_run_case+0x1a5/0x480
[   13.971037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.971395]  kthread+0x337/0x6f0
[   13.971545]  ret_from_fork+0x116/0x1d0
[   13.971781]  ret_from_fork_asm+0x1a/0x30
[   13.971941] 
[   13.972040] The buggy address belongs to the object at ffff88810274c280
[   13.972040]  which belongs to the cache kmalloc-16 of size 16
[   13.972473] The buggy address is located 8 bytes inside of
[   13.972473]  allocated 9-byte region [ffff88810274c280, ffff88810274c289)
[   13.972822] 
[   13.972892] The buggy address belongs to the physical page:
[   13.973064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c
[   13.973498] flags: 0x200000000000000(node=0|zone=2)
[   13.974209] page_type: f5(slab)
[   13.974385] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.974851] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.975089] page dumped because: kasan: bad access detected
[   13.975517] 
[   13.975621] Memory state around the buggy address:
[   13.975985]  ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.976322]  ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.976576] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.976792]                       ^
[   13.976920]  ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.977609]  ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.977942] ==================================================================
[   14.000840] ==================================================================
[   14.001245] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.001880] Read of size 8 at addr ffff88810274c288 by task kunit_try_catch/279
[   14.002260] 
[   14.002378] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.002420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.002433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.002466] Call Trace:
[   14.002483]  <TASK>
[   14.002500]  dump_stack_lvl+0x73/0xb0
[   14.002528]  print_report+0xd1/0x650
[   14.002550]  ? __virt_addr_valid+0x1db/0x2d0
[   14.002570]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.002597]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.002619]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.002646]  kasan_report+0x141/0x180
[   14.002667]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.002698]  kasan_check_range+0x10c/0x1c0
[   14.002722]  __kasan_check_read+0x15/0x20
[   14.002741]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.002779]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.002806]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.002830]  ? trace_hardirqs_on+0x37/0xe0
[   14.002852]  ? kasan_bitops_generic+0x92/0x1c0
[   14.002878]  kasan_bitops_generic+0x121/0x1c0
[   14.002901]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.002926]  ? __pfx_read_tsc+0x10/0x10
[   14.002945]  ? ktime_get_ts64+0x86/0x230
[   14.002969]  kunit_try_run_case+0x1a5/0x480
[   14.002991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.003013]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.003035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.003058]  ? __kthread_parkme+0x82/0x180
[   14.003077]  ? preempt_count_sub+0x50/0x80
[   14.003099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.003123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.003145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.003167]  kthread+0x337/0x6f0
[   14.003186]  ? trace_preempt_on+0x20/0xc0
[   14.003207]  ? __pfx_kthread+0x10/0x10
[   14.003227]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.003247]  ? calculate_sigpending+0x7b/0xa0
[   14.003271]  ? __pfx_kthread+0x10/0x10
[   14.003293]  ret_from_fork+0x116/0x1d0
[   14.003311]  ? __pfx_kthread+0x10/0x10
[   14.003332]  ret_from_fork_asm+0x1a/0x30
[   14.003362]  </TASK>
[   14.003372] 
[   14.012346] Allocated by task 279:
[   14.012549]  kasan_save_stack+0x45/0x70
[   14.012846]  kasan_save_track+0x18/0x40
[   14.013033]  kasan_save_alloc_info+0x3b/0x50
[   14.013192]  __kasan_kmalloc+0xb7/0xc0
[   14.013327]  __kmalloc_cache_noprof+0x189/0x420
[   14.013516]  kasan_bitops_generic+0x92/0x1c0
[   14.013729]  kunit_try_run_case+0x1a5/0x480
[   14.014212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.014589]  kthread+0x337/0x6f0
[   14.014719]  ret_from_fork+0x116/0x1d0
[   14.014855]  ret_from_fork_asm+0x1a/0x30
[   14.015060] 
[   14.015158] The buggy address belongs to the object at ffff88810274c280
[   14.015158]  which belongs to the cache kmalloc-16 of size 16
[   14.015811] The buggy address is located 8 bytes inside of
[   14.015811]  allocated 9-byte region [ffff88810274c280, ffff88810274c289)
[   14.016285] 
[   14.016358] The buggy address belongs to the physical page:
[   14.016585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c
[   14.016942] flags: 0x200000000000000(node=0|zone=2)
[   14.017439] page_type: f5(slab)
[   14.017619] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.018019] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.018404] page dumped because: kasan: bad access detected
[   14.018659] 
[   14.018813] Memory state around the buggy address:
[   14.018982]  ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.019379]  ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.019724] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.019975]                       ^
[   14.020153]  ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.020537]  ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.020900] ==================================================================
[   13.846685] ==================================================================
[   13.847021] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.847473] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279
[   13.848130] 
[   13.848304] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.848348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.848361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.848384] Call Trace:
[   13.848401]  <TASK>
[   13.848417]  dump_stack_lvl+0x73/0xb0
[   13.848446]  print_report+0xd1/0x650
[   13.848481]  ? __virt_addr_valid+0x1db/0x2d0
[   13.848503]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.848530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.848552]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.848579]  kasan_report+0x141/0x180
[   13.848602]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.848633]  kasan_check_range+0x10c/0x1c0
[   13.848656]  __kasan_check_write+0x18/0x20
[   13.848675]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.848702]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.848729]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.848752]  ? trace_hardirqs_on+0x37/0xe0
[   13.848774]  ? kasan_bitops_generic+0x92/0x1c0
[   13.848801]  kasan_bitops_generic+0x121/0x1c0
[   13.848823]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.848849]  ? __pfx_read_tsc+0x10/0x10
[   13.848869]  ? ktime_get_ts64+0x86/0x230
[   13.848891]  kunit_try_run_case+0x1a5/0x480
[   13.848914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.848935]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.848958]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.848980]  ? __kthread_parkme+0x82/0x180
[   13.848999]  ? preempt_count_sub+0x50/0x80
[   13.849023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.849045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.849067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.849090]  kthread+0x337/0x6f0
[   13.849108]  ? trace_preempt_on+0x20/0xc0
[   13.849129]  ? __pfx_kthread+0x10/0x10
[   13.849150]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.849171]  ? calculate_sigpending+0x7b/0xa0
[   13.849217]  ? __pfx_kthread+0x10/0x10
[   13.849239]  ret_from_fork+0x116/0x1d0
[   13.849256]  ? __pfx_kthread+0x10/0x10
[   13.849276]  ret_from_fork_asm+0x1a/0x30
[   13.849306]  </TASK>
[   13.849317] 
[   13.861114] Allocated by task 279:
[   13.861782]  kasan_save_stack+0x45/0x70
[   13.861997]  kasan_save_track+0x18/0x40
[   13.862165]  kasan_save_alloc_info+0x3b/0x50
[   13.862579]  __kasan_kmalloc+0xb7/0xc0
[   13.863034]  __kmalloc_cache_noprof+0x189/0x420
[   13.863471]  kasan_bitops_generic+0x92/0x1c0
[   13.863931]  kunit_try_run_case+0x1a5/0x480
[   13.864153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.864959]  kthread+0x337/0x6f0
[   13.865270]  ret_from_fork+0x116/0x1d0
[   13.865628]  ret_from_fork_asm+0x1a/0x30
[   13.866123] 
[   13.866385] The buggy address belongs to the object at ffff88810274c280
[   13.866385]  which belongs to the cache kmalloc-16 of size 16
[   13.867422] The buggy address is located 8 bytes inside of
[   13.867422]  allocated 9-byte region [ffff88810274c280, ffff88810274c289)
[   13.868219] 
[   13.868487] The buggy address belongs to the physical page:
[   13.869009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c
[   13.869697] flags: 0x200000000000000(node=0|zone=2)
[   13.869933] page_type: f5(slab)
[   13.870093] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.870718] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.871031] page dumped because: kasan: bad access detected
[   13.871522] 
[   13.871785] Memory state around the buggy address:
[   13.872117]  ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.872619]  ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.873522] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.874124]                       ^
[   13.874438]  ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.874987]  ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.875677] ==================================================================
[   14.021211] ==================================================================
[   14.021614] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.022126] Read of size 8 at addr ffff88810274c288 by task kunit_try_catch/279
[   14.022535] 
[   14.022643] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.022686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.022697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.022719] Call Trace:
[   14.022733]  <TASK>
[   14.022748]  dump_stack_lvl+0x73/0xb0
[   14.022775]  print_report+0xd1/0x650
[   14.022797]  ? __virt_addr_valid+0x1db/0x2d0
[   14.022818]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.022845]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.022867]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.022894]  kasan_report+0x141/0x180
[   14.022917]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.022948]  __asan_report_load8_noabort+0x18/0x20
[   14.022971]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.022998]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.023026]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.023050]  ? trace_hardirqs_on+0x37/0xe0
[   14.023071]  ? kasan_bitops_generic+0x92/0x1c0
[   14.023098]  kasan_bitops_generic+0x121/0x1c0
[   14.023121]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.023145]  ? __pfx_read_tsc+0x10/0x10
[   14.023165]  ? ktime_get_ts64+0x86/0x230
[   14.023188]  kunit_try_run_case+0x1a5/0x480
[   14.023211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.023233]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.023256]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.023277]  ? __kthread_parkme+0x82/0x180
[   14.023297]  ? preempt_count_sub+0x50/0x80
[   14.023320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.023343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.023365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.023389]  kthread+0x337/0x6f0
[   14.023408]  ? trace_preempt_on+0x20/0xc0
[   14.023430]  ? __pfx_kthread+0x10/0x10
[   14.023463]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.023485]  ? calculate_sigpending+0x7b/0xa0
[   14.023508]  ? __pfx_kthread+0x10/0x10
[   14.023529]  ret_from_fork+0x116/0x1d0
[   14.023547]  ? __pfx_kthread+0x10/0x10
[   14.023567]  ret_from_fork_asm+0x1a/0x30
[   14.023611]  </TASK>
[   14.023623] 
[   14.032523] Allocated by task 279:
[   14.032671]  kasan_save_stack+0x45/0x70
[   14.032871]  kasan_save_track+0x18/0x40
[   14.033061]  kasan_save_alloc_info+0x3b/0x50
[   14.033392]  __kasan_kmalloc+0xb7/0xc0
[   14.033576]  __kmalloc_cache_noprof+0x189/0x420
[   14.033815]  kasan_bitops_generic+0x92/0x1c0
[   14.033994]  kunit_try_run_case+0x1a5/0x480
[   14.034199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.034399]  kthread+0x337/0x6f0
[   14.034706]  ret_from_fork+0x116/0x1d0
[   14.034908]  ret_from_fork_asm+0x1a/0x30
[   14.035110] 
[   14.035207] The buggy address belongs to the object at ffff88810274c280
[   14.035207]  which belongs to the cache kmalloc-16 of size 16
[   14.035636] The buggy address is located 8 bytes inside of
[   14.035636]  allocated 9-byte region [ffff88810274c280, ffff88810274c289)
[   14.036262] 
[   14.036412] The buggy address belongs to the physical page:
[   14.036653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c
[   14.036998] flags: 0x200000000000000(node=0|zone=2)
[   14.037168] page_type: f5(slab)
[   14.037292] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.037582] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.037917] page dumped because: kasan: bad access detected
[   14.038560] 
[   14.038652] Memory state around the buggy address:
[   14.038914]  ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.039136]  ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.039657] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.039967]                       ^
[   14.040207]  ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.040624]  ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.040878] ==================================================================
[   13.895888] ==================================================================
[   13.896232] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.896979] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279
[   13.897413] 
[   13.897544] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.897588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.897600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.897621] Call Trace:
[   13.897636]  <TASK>
[   13.897651]  dump_stack_lvl+0x73/0xb0
[   13.897680]  print_report+0xd1/0x650
[   13.897702]  ? __virt_addr_valid+0x1db/0x2d0
[   13.897724]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.897750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.897772]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.897798]  kasan_report+0x141/0x180
[   13.897820]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.897851]  kasan_check_range+0x10c/0x1c0
[   13.897874]  __kasan_check_write+0x18/0x20
[   13.897893]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.897920]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.897948]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.897972]  ? trace_hardirqs_on+0x37/0xe0
[   13.897993]  ? kasan_bitops_generic+0x92/0x1c0
[   13.898022]  kasan_bitops_generic+0x121/0x1c0
[   13.898048]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.898074]  ? __pfx_read_tsc+0x10/0x10
[   13.898095]  ? ktime_get_ts64+0x86/0x230
[   13.898118]  kunit_try_run_case+0x1a5/0x480
[   13.898141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.898162]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.898186]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.898209]  ? __kthread_parkme+0x82/0x180
[   13.898229]  ? preempt_count_sub+0x50/0x80
[   13.898252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.898275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.898297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.898320]  kthread+0x337/0x6f0
[   13.898339]  ? trace_preempt_on+0x20/0xc0
[   13.898360]  ? __pfx_kthread+0x10/0x10
[   13.898380]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.898401]  ? calculate_sigpending+0x7b/0xa0
[   13.898423]  ? __pfx_kthread+0x10/0x10
[   13.898445]  ret_from_fork+0x116/0x1d0
[   13.898475]  ? __pfx_kthread+0x10/0x10
[   13.898495]  ret_from_fork_asm+0x1a/0x30
[   13.898526]  </TASK>
[   13.898536] 
[   13.907304] Allocated by task 279:
[   13.907440]  kasan_save_stack+0x45/0x70
[   13.907597]  kasan_save_track+0x18/0x40
[   13.907732]  kasan_save_alloc_info+0x3b/0x50
[   13.907882]  __kasan_kmalloc+0xb7/0xc0
[   13.908071]  __kmalloc_cache_noprof+0x189/0x420
[   13.908311]  kasan_bitops_generic+0x92/0x1c0
[   13.908531]  kunit_try_run_case+0x1a5/0x480
[   13.908788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.909279]  kthread+0x337/0x6f0
[   13.909491]  ret_from_fork+0x116/0x1d0
[   13.909691]  ret_from_fork_asm+0x1a/0x30
[   13.909891] 
[   13.909988] The buggy address belongs to the object at ffff88810274c280
[   13.909988]  which belongs to the cache kmalloc-16 of size 16
[   13.910651] The buggy address is located 8 bytes inside of
[   13.910651]  allocated 9-byte region [ffff88810274c280, ffff88810274c289)
[   13.911057] 
[   13.911134] The buggy address belongs to the physical page:
[   13.911688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c
[   13.912051] flags: 0x200000000000000(node=0|zone=2)
[   13.912500] page_type: f5(slab)
[   13.912663] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.912976] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.913371] page dumped because: kasan: bad access detected
[   13.913625] 
[   13.913719] Memory state around the buggy address:
[   13.913947]  ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.914186]  ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.914536] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.914903]                       ^
[   13.915033]  ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.915518]  ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.915864] ==================================================================
[   13.916242] ==================================================================
[   13.916518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.916916] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279
[   13.917483] 
[   13.917595] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.917638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.917650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.917671] Call Trace:
[   13.917686]  <TASK>
[   13.917703]  dump_stack_lvl+0x73/0xb0
[   13.917907]  print_report+0xd1/0x650
[   13.917938]  ? __virt_addr_valid+0x1db/0x2d0
[   13.917959]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.917986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.918006]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.918034]  kasan_report+0x141/0x180
[   13.918055]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.918087]  kasan_check_range+0x10c/0x1c0
[   13.918110]  __kasan_check_write+0x18/0x20
[   13.918131]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.918158]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.918186]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.918256]  ? trace_hardirqs_on+0x37/0xe0
[   13.918277]  ? kasan_bitops_generic+0x92/0x1c0
[   13.918304]  kasan_bitops_generic+0x121/0x1c0
[   13.918327]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.918352]  ? __pfx_read_tsc+0x10/0x10
[   13.918371]  ? ktime_get_ts64+0x86/0x230
[   13.918394]  kunit_try_run_case+0x1a5/0x480
[   13.918416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.918438]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.918472]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.918495]  ? __kthread_parkme+0x82/0x180
[   13.918515]  ? preempt_count_sub+0x50/0x80
[   13.918538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.918561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.918584]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.918607]  kthread+0x337/0x6f0
[   13.918625]  ? trace_preempt_on+0x20/0xc0
[   13.918647]  ? __pfx_kthread+0x10/0x10
[   13.918667]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.918702]  ? calculate_sigpending+0x7b/0xa0
[   13.918724]  ? __pfx_kthread+0x10/0x10
[   13.918746]  ret_from_fork+0x116/0x1d0
[   13.918763]  ? __pfx_kthread+0x10/0x10
[   13.918783]  ret_from_fork_asm+0x1a/0x30
[   13.918813]  </TASK>
[   13.918824] 
[   13.927818] Allocated by task 279:
[   13.928008]  kasan_save_stack+0x45/0x70
[   13.928278]  kasan_save_track+0x18/0x40
[   13.928446]  kasan_save_alloc_info+0x3b/0x50
[   13.928611]  __kasan_kmalloc+0xb7/0xc0
[   13.928745]  __kmalloc_cache_noprof+0x189/0x420
[   13.928900]  kasan_bitops_generic+0x92/0x1c0
[   13.929060]  kunit_try_run_case+0x1a5/0x480
[   13.929276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.929903]  kthread+0x337/0x6f0
[   13.930381]  ret_from_fork+0x116/0x1d0
[   13.930602]  ret_from_fork_asm+0x1a/0x30
[   13.930758] 
[   13.930830] The buggy address belongs to the object at ffff88810274c280
[   13.930830]  which belongs to the cache kmalloc-16 of size 16
[   13.931184] The buggy address is located 8 bytes inside of
[   13.931184]  allocated 9-byte region [ffff88810274c280, ffff88810274c289)
[   13.931708] 
[   13.931807] The buggy address belongs to the physical page:
[   13.932204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c
[   13.932568] flags: 0x200000000000000(node=0|zone=2)
[   13.932768] page_type: f5(slab)
[   13.932889] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.933121] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.933350] page dumped because: kasan: bad access detected
[   13.933793] 
[   13.933889] Memory state around the buggy address:
[   13.934118]  ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.934437]  ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.934777] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.935103]                       ^
[   13.935268]  ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.936123]  ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.936693] ==================================================================
[   13.937046] ==================================================================
[   13.937525] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.938012] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279
[   13.938276] 
[   13.938405] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.938446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.938469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.938490] Call Trace:
[   13.938502]  <TASK>
[   13.938518]  dump_stack_lvl+0x73/0xb0
[   13.938544]  print_report+0xd1/0x650
[   13.938566]  ? __virt_addr_valid+0x1db/0x2d0
[   13.938589]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.938615]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.938637]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.938663]  kasan_report+0x141/0x180
[   13.938687]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.938718]  kasan_check_range+0x10c/0x1c0
[   13.938742]  __kasan_check_write+0x18/0x20
[   13.938761]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.938788]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.938815]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.938839]  ? trace_hardirqs_on+0x37/0xe0
[   13.938859]  ? kasan_bitops_generic+0x92/0x1c0
[   13.938886]  kasan_bitops_generic+0x121/0x1c0
[   13.938910]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.938934]  ? __pfx_read_tsc+0x10/0x10
[   13.938954]  ? ktime_get_ts64+0x86/0x230
[   13.938977]  kunit_try_run_case+0x1a5/0x480
[   13.939000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.939022]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.939044]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.939067]  ? __kthread_parkme+0x82/0x180
[   13.939087]  ? preempt_count_sub+0x50/0x80
[   13.939110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.939132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.939155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.939177]  kthread+0x337/0x6f0
[   13.939196]  ? trace_preempt_on+0x20/0xc0
[   13.939217]  ? __pfx_kthread+0x10/0x10
[   13.939237]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.939258]  ? calculate_sigpending+0x7b/0xa0
[   13.939280]  ? __pfx_kthread+0x10/0x10
[   13.939302]  ret_from_fork+0x116/0x1d0
[   13.939320]  ? __pfx_kthread+0x10/0x10
[   13.939339]  ret_from_fork_asm+0x1a/0x30
[   13.939369]  </TASK>
[   13.939381] 
[   13.948857] Allocated by task 279:
[   13.949016]  kasan_save_stack+0x45/0x70
[   13.949189]  kasan_save_track+0x18/0x40
[   13.949414]  kasan_save_alloc_info+0x3b/0x50
[   13.949600]  __kasan_kmalloc+0xb7/0xc0
[   13.949736]  __kmalloc_cache_noprof+0x189/0x420
[   13.950045]  kasan_bitops_generic+0x92/0x1c0
[   13.950259]  kunit_try_run_case+0x1a5/0x480
[   13.950478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.950853]  kthread+0x337/0x6f0
[   13.951000]  ret_from_fork+0x116/0x1d0
[   13.951134]  ret_from_fork_asm+0x1a/0x30
[   13.951550] 
[   13.951650] The buggy address belongs to the object at ffff88810274c280
[   13.951650]  which belongs to the cache kmalloc-16 of size 16
[   13.952161] The buggy address is located 8 bytes inside of
[   13.952161]  allocated 9-byte region [ffff88810274c280, ffff88810274c289)
[   13.952786] 
[   13.952867] The buggy address belongs to the physical page:
[   13.953085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c
[   13.953444] flags: 0x200000000000000(node=0|zone=2)
[   13.953690] page_type: f5(slab)
[   13.953817] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.954052] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.954279] page dumped because: kasan: bad access detected
[   13.954450] 
[   13.954545] Memory state around the buggy address:
[   13.954974]  ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.955505]  ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.956024] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.956694]                       ^
[   13.956888]  ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.957270]  ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.957596] ==================================================================
[   13.978407] ==================================================================
[   13.978955] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.979440] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279
[   13.979689] 
[   13.979775] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.979817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.979829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.979850] Call Trace:
[   13.979868]  <TASK>
[   13.979882]  dump_stack_lvl+0x73/0xb0
[   13.979909]  print_report+0xd1/0x650
[   13.979931]  ? __virt_addr_valid+0x1db/0x2d0
[   13.979953]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.979979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.980001]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.980028]  kasan_report+0x141/0x180
[   13.980049]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.980081]  kasan_check_range+0x10c/0x1c0
[   13.980116]  __kasan_check_write+0x18/0x20
[   13.980134]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.980161]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.980189]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.980213]  ? trace_hardirqs_on+0x37/0xe0
[   13.980233]  ? kasan_bitops_generic+0x92/0x1c0
[   13.980260]  kasan_bitops_generic+0x121/0x1c0
[   13.980283]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.980307]  ? __pfx_read_tsc+0x10/0x10
[   13.980328]  ? ktime_get_ts64+0x86/0x230
[   13.980350]  kunit_try_run_case+0x1a5/0x480
[   13.980374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.980396]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.980418]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.980441]  ? __kthread_parkme+0x82/0x180
[   13.980472]  ? preempt_count_sub+0x50/0x80
[   13.980494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.980517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.980540]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.980611]  kthread+0x337/0x6f0
[   13.980633]  ? trace_preempt_on+0x20/0xc0
[   13.980655]  ? __pfx_kthread+0x10/0x10
[   13.980674]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.980696]  ? calculate_sigpending+0x7b/0xa0
[   13.980719]  ? __pfx_kthread+0x10/0x10
[   13.980740]  ret_from_fork+0x116/0x1d0
[   13.980758]  ? __pfx_kthread+0x10/0x10
[   13.980779]  ret_from_fork_asm+0x1a/0x30
[   13.980808]  </TASK>
[   13.980819] 
[   13.991097] Allocated by task 279:
[   13.991317]  kasan_save_stack+0x45/0x70
[   13.991514]  kasan_save_track+0x18/0x40
[   13.991703]  kasan_save_alloc_info+0x3b/0x50
[   13.992327]  __kasan_kmalloc+0xb7/0xc0
[   13.992534]  __kmalloc_cache_noprof+0x189/0x420
[   13.992750]  kasan_bitops_generic+0x92/0x1c0
[   13.993115]  kunit_try_run_case+0x1a5/0x480
[   13.993524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.993788]  kthread+0x337/0x6f0
[   13.993983]  ret_from_fork+0x116/0x1d0
[   13.994248]  ret_from_fork_asm+0x1a/0x30
[   13.994619] 
[   13.994771] The buggy address belongs to the object at ffff88810274c280
[   13.994771]  which belongs to the cache kmalloc-16 of size 16
[   13.995325] The buggy address is located 8 bytes inside of
[   13.995325]  allocated 9-byte region [ffff88810274c280, ffff88810274c289)
[   13.995827] 
[   13.996003] The buggy address belongs to the physical page:
[   13.996216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c
[   13.996658] flags: 0x200000000000000(node=0|zone=2)
[   13.996895] page_type: f5(slab)
[   13.997036] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.997367] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.997966] page dumped because: kasan: bad access detected
[   13.998251] 
[   13.998342] Memory state around the buggy address:
[   13.998555]  ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.998904]  ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.999173] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.999551]                       ^
[   13.999732]  ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.999989]  ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.000304] ==================================================================