Hay
Date
July 8, 2025, 7:07 p.m.

Environment
qemu-x86_64

[   15.348933] ==================================================================
[   15.349589] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.349954] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.350471] 
[   15.350598] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.350646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.350659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.350680] Call Trace:
[   15.350698]  <TASK>
[   15.350717]  dump_stack_lvl+0x73/0xb0
[   15.350746]  print_report+0xd1/0x650
[   15.350769]  ? __virt_addr_valid+0x1db/0x2d0
[   15.350791]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.350818]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.350843]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.350870]  kasan_report+0x141/0x180
[   15.350891]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.350923]  kasan_check_range+0x10c/0x1c0
[   15.350946]  __kasan_check_write+0x18/0x20
[   15.350965]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.350990]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.351018]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.351056]  ? trace_hardirqs_on+0x37/0xe0
[   15.351079]  ? kasan_bitops_generic+0x92/0x1c0
[   15.351105]  kasan_bitops_generic+0x121/0x1c0
[   15.351127]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.351152]  ? __pfx_read_tsc+0x10/0x10
[   15.351175]  ? ktime_get_ts64+0x86/0x230
[   15.351199]  kunit_try_run_case+0x1a5/0x480
[   15.351223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.351245]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.351268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.351290]  ? __kthread_parkme+0x82/0x180
[   15.351310]  ? preempt_count_sub+0x50/0x80
[   15.351333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.351356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.351744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.351817]  kthread+0x337/0x6f0
[   15.351857]  ? trace_preempt_on+0x20/0xc0
[   15.351880]  ? __pfx_kthread+0x10/0x10
[   15.351915]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.351950]  ? calculate_sigpending+0x7b/0xa0
[   15.351976]  ? __pfx_kthread+0x10/0x10
[   15.351997]  ret_from_fork+0x116/0x1d0
[   15.352029]  ? __pfx_kthread+0x10/0x10
[   15.352082]  ret_from_fork_asm+0x1a/0x30
[   15.352115]  </TASK>
[   15.352128] 
[   15.365758] Allocated by task 278:
[   15.366075]  kasan_save_stack+0x45/0x70
[   15.366429]  kasan_save_track+0x18/0x40
[   15.366616]  kasan_save_alloc_info+0x3b/0x50
[   15.366900]  __kasan_kmalloc+0xb7/0xc0
[   15.367298]  __kmalloc_cache_noprof+0x189/0x420
[   15.367671]  kasan_bitops_generic+0x92/0x1c0
[   15.368030]  kunit_try_run_case+0x1a5/0x480
[   15.368398]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.368765]  kthread+0x337/0x6f0
[   15.368943]  ret_from_fork+0x116/0x1d0
[   15.369400]  ret_from_fork_asm+0x1a/0x30
[   15.369646] 
[   15.369789] The buggy address belongs to the object at ffff8881022bacc0
[   15.369789]  which belongs to the cache kmalloc-16 of size 16
[   15.370734] The buggy address is located 8 bytes inside of
[   15.370734]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.371603] 
[   15.371718] The buggy address belongs to the physical page:
[   15.371972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.372812] flags: 0x200000000000000(node=0|zone=2)
[   15.373207] page_type: f5(slab)
[   15.373468] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.373987] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.374498] page dumped because: kasan: bad access detected
[   15.374872] 
[   15.375186] Memory state around the buggy address:
[   15.375418]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.375999]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.376573] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.376999]                                               ^
[   15.377381]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.377946]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.378442] ==================================================================
[   15.407890] ==================================================================
[   15.408830] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.409417] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.409991] 
[   15.410297] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.410484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.410524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.410548] Call Trace:
[   15.410567]  <TASK>
[   15.410586]  dump_stack_lvl+0x73/0xb0
[   15.410618]  print_report+0xd1/0x650
[   15.410640]  ? __virt_addr_valid+0x1db/0x2d0
[   15.410664]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.410691]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.410715]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.410742]  kasan_report+0x141/0x180
[   15.410764]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.410796]  kasan_check_range+0x10c/0x1c0
[   15.410818]  __kasan_check_write+0x18/0x20
[   15.410837]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.410864]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.410891]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.410916]  ? trace_hardirqs_on+0x37/0xe0
[   15.410938]  ? kasan_bitops_generic+0x92/0x1c0
[   15.410965]  kasan_bitops_generic+0x121/0x1c0
[   15.410987]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.411011]  ? __pfx_read_tsc+0x10/0x10
[   15.411032]  ? ktime_get_ts64+0x86/0x230
[   15.411132]  kunit_try_run_case+0x1a5/0x480
[   15.411158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.411180]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.411204]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.411225]  ? __kthread_parkme+0x82/0x180
[   15.411246]  ? preempt_count_sub+0x50/0x80
[   15.411269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.411293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.411314]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.411337]  kthread+0x337/0x6f0
[   15.411355]  ? trace_preempt_on+0x20/0xc0
[   15.411375]  ? __pfx_kthread+0x10/0x10
[   15.411396]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.411417]  ? calculate_sigpending+0x7b/0xa0
[   15.411441]  ? __pfx_kthread+0x10/0x10
[   15.411463]  ret_from_fork+0x116/0x1d0
[   15.411481]  ? __pfx_kthread+0x10/0x10
[   15.411521]  ret_from_fork_asm+0x1a/0x30
[   15.411552]  </TASK>
[   15.411564] 
[   15.424185] Allocated by task 278:
[   15.424393]  kasan_save_stack+0x45/0x70
[   15.424587]  kasan_save_track+0x18/0x40
[   15.424769]  kasan_save_alloc_info+0x3b/0x50
[   15.424970]  __kasan_kmalloc+0xb7/0xc0
[   15.425967]  __kmalloc_cache_noprof+0x189/0x420
[   15.426427]  kasan_bitops_generic+0x92/0x1c0
[   15.426767]  kunit_try_run_case+0x1a5/0x480
[   15.426992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.427468]  kthread+0x337/0x6f0
[   15.427797]  ret_from_fork+0x116/0x1d0
[   15.427994]  ret_from_fork_asm+0x1a/0x30
[   15.428410] 
[   15.428633] The buggy address belongs to the object at ffff8881022bacc0
[   15.428633]  which belongs to the cache kmalloc-16 of size 16
[   15.429468] The buggy address is located 8 bytes inside of
[   15.429468]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.430289] 
[   15.430422] The buggy address belongs to the physical page:
[   15.430839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.431201] flags: 0x200000000000000(node=0|zone=2)
[   15.431653] page_type: f5(slab)
[   15.431952] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.432430] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.432925] page dumped because: kasan: bad access detected
[   15.433454] 
[   15.433592] Memory state around the buggy address:
[   15.433963]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.434412]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.434897] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.435368]                                               ^
[   15.435788]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.436097]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.436657] ==================================================================
[   15.321636] ==================================================================
[   15.322285] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.322820] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.323476] 
[   15.323696] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.323744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.323757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.323778] Call Trace:
[   15.323814]  <TASK>
[   15.323830]  dump_stack_lvl+0x73/0xb0
[   15.323860]  print_report+0xd1/0x650
[   15.323882]  ? __virt_addr_valid+0x1db/0x2d0
[   15.323904]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.323931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.323957]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.323982]  kasan_report+0x141/0x180
[   15.324004]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.324036]  kasan_check_range+0x10c/0x1c0
[   15.324073]  __kasan_check_write+0x18/0x20
[   15.324092]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.324118]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.324146]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.324168]  ? trace_hardirqs_on+0x37/0xe0
[   15.324190]  ? kasan_bitops_generic+0x92/0x1c0
[   15.324218]  kasan_bitops_generic+0x121/0x1c0
[   15.324240]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.324265]  ? __pfx_read_tsc+0x10/0x10
[   15.324285]  ? ktime_get_ts64+0x86/0x230
[   15.324309]  kunit_try_run_case+0x1a5/0x480
[   15.324333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.324354]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.324378]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.324401]  ? __kthread_parkme+0x82/0x180
[   15.324421]  ? preempt_count_sub+0x50/0x80
[   15.324444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.324467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.324489]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.324512]  kthread+0x337/0x6f0
[   15.324531]  ? trace_preempt_on+0x20/0xc0
[   15.324552]  ? __pfx_kthread+0x10/0x10
[   15.324572]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.324593]  ? calculate_sigpending+0x7b/0xa0
[   15.324617]  ? __pfx_kthread+0x10/0x10
[   15.324638]  ret_from_fork+0x116/0x1d0
[   15.324655]  ? __pfx_kthread+0x10/0x10
[   15.324675]  ret_from_fork_asm+0x1a/0x30
[   15.324706]  </TASK>
[   15.324718] 
[   15.337701] Allocated by task 278:
[   15.338034]  kasan_save_stack+0x45/0x70
[   15.338266]  kasan_save_track+0x18/0x40
[   15.338454]  kasan_save_alloc_info+0x3b/0x50
[   15.339264]  __kasan_kmalloc+0xb7/0xc0
[   15.339803]  __kmalloc_cache_noprof+0x189/0x420
[   15.340119]  kasan_bitops_generic+0x92/0x1c0
[   15.340276]  kunit_try_run_case+0x1a5/0x480
[   15.340422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.340595]  kthread+0x337/0x6f0
[   15.340714]  ret_from_fork+0x116/0x1d0
[   15.340843]  ret_from_fork_asm+0x1a/0x30
[   15.340977] 
[   15.341058] The buggy address belongs to the object at ffff8881022bacc0
[   15.341058]  which belongs to the cache kmalloc-16 of size 16
[   15.341404] The buggy address is located 8 bytes inside of
[   15.341404]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.341761] 
[   15.341838] The buggy address belongs to the physical page:
[   15.342010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.342262] flags: 0x200000000000000(node=0|zone=2)
[   15.342428] page_type: f5(slab)
[   15.342608] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.343245] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.343757] page dumped because: kasan: bad access detected
[   15.343942] 
[   15.344019] Memory state around the buggy address:
[   15.345688]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.346033]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.346375] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.346685]                                               ^
[   15.347507]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.347839]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.348211] ==================================================================
[   15.290864] ==================================================================
[   15.291405] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.292028] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.292508] 
[   15.292872] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.292921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.292932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.292953] Call Trace:
[   15.292968]  <TASK>
[   15.292983]  dump_stack_lvl+0x73/0xb0
[   15.293010]  print_report+0xd1/0x650
[   15.293326]  ? __virt_addr_valid+0x1db/0x2d0
[   15.293351]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.293381]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.293408]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.293435]  kasan_report+0x141/0x180
[   15.293458]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.293490]  kasan_check_range+0x10c/0x1c0
[   15.293513]  __kasan_check_write+0x18/0x20
[   15.293532]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.293567]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.293595]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.293619]  ? trace_hardirqs_on+0x37/0xe0
[   15.293641]  ? kasan_bitops_generic+0x92/0x1c0
[   15.293668]  kasan_bitops_generic+0x121/0x1c0
[   15.293690]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.293715]  ? __pfx_read_tsc+0x10/0x10
[   15.293735]  ? ktime_get_ts64+0x86/0x230
[   15.293759]  kunit_try_run_case+0x1a5/0x480
[   15.293784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.293806]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.293828]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.293851]  ? __kthread_parkme+0x82/0x180
[   15.293872]  ? preempt_count_sub+0x50/0x80
[   15.293895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.293919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.293942]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.293966]  kthread+0x337/0x6f0
[   15.293985]  ? trace_preempt_on+0x20/0xc0
[   15.294007]  ? __pfx_kthread+0x10/0x10
[   15.294027]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.294116]  ? calculate_sigpending+0x7b/0xa0
[   15.294145]  ? __pfx_kthread+0x10/0x10
[   15.294166]  ret_from_fork+0x116/0x1d0
[   15.294185]  ? __pfx_kthread+0x10/0x10
[   15.294206]  ret_from_fork_asm+0x1a/0x30
[   15.294236]  </TASK>
[   15.294248] 
[   15.308499] Allocated by task 278:
[   15.308698]  kasan_save_stack+0x45/0x70
[   15.309247]  kasan_save_track+0x18/0x40
[   15.309434]  kasan_save_alloc_info+0x3b/0x50
[   15.309912]  __kasan_kmalloc+0xb7/0xc0
[   15.310092]  __kmalloc_cache_noprof+0x189/0x420
[   15.310469]  kasan_bitops_generic+0x92/0x1c0
[   15.310811]  kunit_try_run_case+0x1a5/0x480
[   15.311052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.311552]  kthread+0x337/0x6f0
[   15.311740]  ret_from_fork+0x116/0x1d0
[   15.312058]  ret_from_fork_asm+0x1a/0x30
[   15.312357] 
[   15.312441] The buggy address belongs to the object at ffff8881022bacc0
[   15.312441]  which belongs to the cache kmalloc-16 of size 16
[   15.313627] The buggy address is located 8 bytes inside of
[   15.313627]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.314143] 
[   15.314596] The buggy address belongs to the physical page:
[   15.314838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.315572] flags: 0x200000000000000(node=0|zone=2)
[   15.315822] page_type: f5(slab)
[   15.316146] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.316619] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.316936] page dumped because: kasan: bad access detected
[   15.317502] 
[   15.317685] Memory state around the buggy address:
[   15.318129]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.318541]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.318845] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.319451]                                               ^
[   15.319764]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.320116]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.320701] ==================================================================
[   15.379127] ==================================================================
[   15.379874] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.380310] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.381192] 
[   15.381325] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.381538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.381561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.381584] Call Trace:
[   15.381603]  <TASK>
[   15.381621]  dump_stack_lvl+0x73/0xb0
[   15.381653]  print_report+0xd1/0x650
[   15.381675]  ? __virt_addr_valid+0x1db/0x2d0
[   15.381698]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.381724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.381750]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.381776]  kasan_report+0x141/0x180
[   15.381798]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.381828]  kasan_check_range+0x10c/0x1c0
[   15.381851]  __kasan_check_write+0x18/0x20
[   15.381870]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.381896]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.381923]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.381947]  ? trace_hardirqs_on+0x37/0xe0
[   15.381968]  ? kasan_bitops_generic+0x92/0x1c0
[   15.381995]  kasan_bitops_generic+0x121/0x1c0
[   15.382018]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.382115]  ? __pfx_read_tsc+0x10/0x10
[   15.382141]  ? ktime_get_ts64+0x86/0x230
[   15.382166]  kunit_try_run_case+0x1a5/0x480
[   15.382190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.382213]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.382235]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.382259]  ? __kthread_parkme+0x82/0x180
[   15.382278]  ? preempt_count_sub+0x50/0x80
[   15.382301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.382324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.382345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.382368]  kthread+0x337/0x6f0
[   15.382386]  ? trace_preempt_on+0x20/0xc0
[   15.382407]  ? __pfx_kthread+0x10/0x10
[   15.382426]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.382446]  ? calculate_sigpending+0x7b/0xa0
[   15.382470]  ? __pfx_kthread+0x10/0x10
[   15.382510]  ret_from_fork+0x116/0x1d0
[   15.382528]  ? __pfx_kthread+0x10/0x10
[   15.382548]  ret_from_fork_asm+0x1a/0x30
[   15.382579]  </TASK>
[   15.382592] 
[   15.395309] Allocated by task 278:
[   15.395730]  kasan_save_stack+0x45/0x70
[   15.396024]  kasan_save_track+0x18/0x40
[   15.396435]  kasan_save_alloc_info+0x3b/0x50
[   15.396825]  __kasan_kmalloc+0xb7/0xc0
[   15.397180]  __kmalloc_cache_noprof+0x189/0x420
[   15.397397]  kasan_bitops_generic+0x92/0x1c0
[   15.397762]  kunit_try_run_case+0x1a5/0x480
[   15.398143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.398400]  kthread+0x337/0x6f0
[   15.398583]  ret_from_fork+0x116/0x1d0
[   15.398774]  ret_from_fork_asm+0x1a/0x30
[   15.398969] 
[   15.399459] The buggy address belongs to the object at ffff8881022bacc0
[   15.399459]  which belongs to the cache kmalloc-16 of size 16
[   15.400430] The buggy address is located 8 bytes inside of
[   15.400430]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.401225] 
[   15.401314] The buggy address belongs to the physical page:
[   15.401762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.402262] flags: 0x200000000000000(node=0|zone=2)
[   15.402651] page_type: f5(slab)
[   15.402901] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.403427] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.403857] page dumped because: kasan: bad access detected
[   15.404427] 
[   15.404523] Memory state around the buggy address:
[   15.404912]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.405250]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.405585] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.405860]                                               ^
[   15.406133]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.406461]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.406769] ==================================================================
[   15.496262] ==================================================================
[   15.497011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.497515] Read of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.498420] 
[   15.498550] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.498597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.498609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.498632] Call Trace:
[   15.498651]  <TASK>
[   15.498669]  dump_stack_lvl+0x73/0xb0
[   15.498722]  print_report+0xd1/0x650
[   15.498744]  ? __virt_addr_valid+0x1db/0x2d0
[   15.498768]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.498794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.498819]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.498846]  kasan_report+0x141/0x180
[   15.498867]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.498898]  kasan_check_range+0x10c/0x1c0
[   15.498921]  __kasan_check_read+0x15/0x20
[   15.498939]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.498966]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.498993]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.499017]  ? trace_hardirqs_on+0x37/0xe0
[   15.499053]  ? kasan_bitops_generic+0x92/0x1c0
[   15.499080]  kasan_bitops_generic+0x121/0x1c0
[   15.499103]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.499126]  ? __pfx_read_tsc+0x10/0x10
[   15.499147]  ? ktime_get_ts64+0x86/0x230
[   15.499171]  kunit_try_run_case+0x1a5/0x480
[   15.499267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.499288]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.499313]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.499336]  ? __kthread_parkme+0x82/0x180
[   15.499357]  ? preempt_count_sub+0x50/0x80
[   15.499380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.499403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.499426]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.499449]  kthread+0x337/0x6f0
[   15.499468]  ? trace_preempt_on+0x20/0xc0
[   15.499490]  ? __pfx_kthread+0x10/0x10
[   15.499511]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.499532]  ? calculate_sigpending+0x7b/0xa0
[   15.499556]  ? __pfx_kthread+0x10/0x10
[   15.499576]  ret_from_fork+0x116/0x1d0
[   15.499596]  ? __pfx_kthread+0x10/0x10
[   15.499616]  ret_from_fork_asm+0x1a/0x30
[   15.499647]  </TASK>
[   15.499658] 
[   15.508910] Allocated by task 278:
[   15.509176]  kasan_save_stack+0x45/0x70
[   15.509425]  kasan_save_track+0x18/0x40
[   15.509664]  kasan_save_alloc_info+0x3b/0x50
[   15.509875]  __kasan_kmalloc+0xb7/0xc0
[   15.510142]  __kmalloc_cache_noprof+0x189/0x420
[   15.510556]  kasan_bitops_generic+0x92/0x1c0
[   15.510779]  kunit_try_run_case+0x1a5/0x480
[   15.510974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.511366]  kthread+0x337/0x6f0
[   15.511489]  ret_from_fork+0x116/0x1d0
[   15.511643]  ret_from_fork_asm+0x1a/0x30
[   15.511938] 
[   15.512022] The buggy address belongs to the object at ffff8881022bacc0
[   15.512022]  which belongs to the cache kmalloc-16 of size 16
[   15.512449] The buggy address is located 8 bytes inside of
[   15.512449]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.513189] 
[   15.513263] The buggy address belongs to the physical page:
[   15.513433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.514053] flags: 0x200000000000000(node=0|zone=2)
[   15.514479] page_type: f5(slab)
[   15.514683] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.514947] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.515255] page dumped because: kasan: bad access detected
[   15.515758] 
[   15.515880] Memory state around the buggy address:
[   15.516223]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.516551]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.516851] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.517077]                                               ^
[   15.517301]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.517691]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.518031] ==================================================================
[   15.437518] ==================================================================
[   15.437865] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.438714] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.439348] 
[   15.439467] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.439697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.439713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.439736] Call Trace:
[   15.439755]  <TASK>
[   15.439774]  dump_stack_lvl+0x73/0xb0
[   15.439803]  print_report+0xd1/0x650
[   15.439825]  ? __virt_addr_valid+0x1db/0x2d0
[   15.439848]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.439874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.439899]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.439926]  kasan_report+0x141/0x180
[   15.439946]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.439977]  kasan_check_range+0x10c/0x1c0
[   15.439999]  __kasan_check_write+0x18/0x20
[   15.440018]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.440123]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.440156]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.440181]  ? trace_hardirqs_on+0x37/0xe0
[   15.440201]  ? kasan_bitops_generic+0x92/0x1c0
[   15.440228]  kasan_bitops_generic+0x121/0x1c0
[   15.440250]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.440274]  ? __pfx_read_tsc+0x10/0x10
[   15.440294]  ? ktime_get_ts64+0x86/0x230
[   15.440318]  kunit_try_run_case+0x1a5/0x480
[   15.440342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.440362]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.440386]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.440408]  ? __kthread_parkme+0x82/0x180
[   15.440428]  ? preempt_count_sub+0x50/0x80
[   15.440450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.440473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.440513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.440536]  kthread+0x337/0x6f0
[   15.440554]  ? trace_preempt_on+0x20/0xc0
[   15.440575]  ? __pfx_kthread+0x10/0x10
[   15.440596]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.440615]  ? calculate_sigpending+0x7b/0xa0
[   15.440638]  ? __pfx_kthread+0x10/0x10
[   15.440660]  ret_from_fork+0x116/0x1d0
[   15.440678]  ? __pfx_kthread+0x10/0x10
[   15.440697]  ret_from_fork_asm+0x1a/0x30
[   15.440727]  </TASK>
[   15.440739] 
[   15.453869] Allocated by task 278:
[   15.454016]  kasan_save_stack+0x45/0x70
[   15.454515]  kasan_save_track+0x18/0x40
[   15.454708]  kasan_save_alloc_info+0x3b/0x50
[   15.455013]  __kasan_kmalloc+0xb7/0xc0
[   15.455420]  __kmalloc_cache_noprof+0x189/0x420
[   15.455653]  kasan_bitops_generic+0x92/0x1c0
[   15.455864]  kunit_try_run_case+0x1a5/0x480
[   15.456070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.456666]  kthread+0x337/0x6f0
[   15.456937]  ret_from_fork+0x116/0x1d0
[   15.457440]  ret_from_fork_asm+0x1a/0x30
[   15.457761] 
[   15.457864] The buggy address belongs to the object at ffff8881022bacc0
[   15.457864]  which belongs to the cache kmalloc-16 of size 16
[   15.458688] The buggy address is located 8 bytes inside of
[   15.458688]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.459424] 
[   15.459722] The buggy address belongs to the physical page:
[   15.460135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.460659] flags: 0x200000000000000(node=0|zone=2)
[   15.460892] page_type: f5(slab)
[   15.461242] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.461842] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.462439] page dumped because: kasan: bad access detected
[   15.462705] 
[   15.462780] Memory state around the buggy address:
[   15.463294]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.463797]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.464252] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.464682]                                               ^
[   15.464894]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.465558]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.465974] ==================================================================
[   15.518745] ==================================================================
[   15.519061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.519499] Read of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.519868] 
[   15.520069] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.520114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.520126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.520147] Call Trace:
[   15.520166]  <TASK>
[   15.520184]  dump_stack_lvl+0x73/0xb0
[   15.520211]  print_report+0xd1/0x650
[   15.520233]  ? __virt_addr_valid+0x1db/0x2d0
[   15.520256]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.520346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.520395]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.520422]  kasan_report+0x141/0x180
[   15.520444]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.520476]  __asan_report_load8_noabort+0x18/0x20
[   15.520500]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.520527]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.520572]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.520595]  ? trace_hardirqs_on+0x37/0xe0
[   15.520616]  ? kasan_bitops_generic+0x92/0x1c0
[   15.520644]  kasan_bitops_generic+0x121/0x1c0
[   15.520666]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.520691]  ? __pfx_read_tsc+0x10/0x10
[   15.520712]  ? ktime_get_ts64+0x86/0x230
[   15.520755]  kunit_try_run_case+0x1a5/0x480
[   15.520779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.520801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.520824]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.520847]  ? __kthread_parkme+0x82/0x180
[   15.520868]  ? preempt_count_sub+0x50/0x80
[   15.520891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.520914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.520936]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.520960]  kthread+0x337/0x6f0
[   15.520979]  ? trace_preempt_on+0x20/0xc0
[   15.521018]  ? __pfx_kthread+0x10/0x10
[   15.521038]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.521104]  ? calculate_sigpending+0x7b/0xa0
[   15.521131]  ? __pfx_kthread+0x10/0x10
[   15.521151]  ret_from_fork+0x116/0x1d0
[   15.521170]  ? __pfx_kthread+0x10/0x10
[   15.521209]  ret_from_fork_asm+0x1a/0x30
[   15.521242]  </TASK>
[   15.521253] 
[   15.530912] Allocated by task 278:
[   15.531204]  kasan_save_stack+0x45/0x70
[   15.531405]  kasan_save_track+0x18/0x40
[   15.531662]  kasan_save_alloc_info+0x3b/0x50
[   15.531875]  __kasan_kmalloc+0xb7/0xc0
[   15.532054]  __kmalloc_cache_noprof+0x189/0x420
[   15.532350]  kasan_bitops_generic+0x92/0x1c0
[   15.532600]  kunit_try_run_case+0x1a5/0x480
[   15.532841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.533161]  kthread+0x337/0x6f0
[   15.533338]  ret_from_fork+0x116/0x1d0
[   15.533523]  ret_from_fork_asm+0x1a/0x30
[   15.533684] 
[   15.533757] The buggy address belongs to the object at ffff8881022bacc0
[   15.533757]  which belongs to the cache kmalloc-16 of size 16
[   15.534735] The buggy address is located 8 bytes inside of
[   15.534735]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.535441] 
[   15.535561] The buggy address belongs to the physical page:
[   15.535743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.536179] flags: 0x200000000000000(node=0|zone=2)
[   15.536447] page_type: f5(slab)
[   15.536661] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.536996] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.537421] page dumped because: kasan: bad access detected
[   15.537686] 
[   15.537775] Memory state around the buggy address:
[   15.538024]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.538558]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.538821] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.539165]                                               ^
[   15.539410]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.539738]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.540003] ==================================================================
[   15.466735] ==================================================================
[   15.467452] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.467973] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.468558] 
[   15.468776] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.468824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.468837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.468858] Call Trace:
[   15.468876]  <TASK>
[   15.468894]  dump_stack_lvl+0x73/0xb0
[   15.468923]  print_report+0xd1/0x650
[   15.468944]  ? __virt_addr_valid+0x1db/0x2d0
[   15.468966]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.468993]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.469020]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.469059]  kasan_report+0x141/0x180
[   15.469080]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.469112]  kasan_check_range+0x10c/0x1c0
[   15.469135]  __kasan_check_write+0x18/0x20
[   15.469153]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.469179]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.469206]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.469230]  ? trace_hardirqs_on+0x37/0xe0
[   15.469252]  ? kasan_bitops_generic+0x92/0x1c0
[   15.469278]  kasan_bitops_generic+0x121/0x1c0
[   15.469301]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.469325]  ? __pfx_read_tsc+0x10/0x10
[   15.469346]  ? ktime_get_ts64+0x86/0x230
[   15.469370]  kunit_try_run_case+0x1a5/0x480
[   15.469394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.469415]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.469439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.469460]  ? __kthread_parkme+0x82/0x180
[   15.469480]  ? preempt_count_sub+0x50/0x80
[   15.469503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.469526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.469548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.469578]  kthread+0x337/0x6f0
[   15.469596]  ? trace_preempt_on+0x20/0xc0
[   15.469618]  ? __pfx_kthread+0x10/0x10
[   15.469638]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.469659]  ? calculate_sigpending+0x7b/0xa0
[   15.469682]  ? __pfx_kthread+0x10/0x10
[   15.469703]  ret_from_fork+0x116/0x1d0
[   15.469721]  ? __pfx_kthread+0x10/0x10
[   15.469741]  ret_from_fork_asm+0x1a/0x30
[   15.469772]  </TASK>
[   15.469784] 
[   15.482815] Allocated by task 278:
[   15.483374]  kasan_save_stack+0x45/0x70
[   15.483666]  kasan_save_track+0x18/0x40
[   15.483960]  kasan_save_alloc_info+0x3b/0x50
[   15.484262]  __kasan_kmalloc+0xb7/0xc0
[   15.484673]  __kmalloc_cache_noprof+0x189/0x420
[   15.484887]  kasan_bitops_generic+0x92/0x1c0
[   15.485383]  kunit_try_run_case+0x1a5/0x480
[   15.485547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.485904]  kthread+0x337/0x6f0
[   15.486433]  ret_from_fork+0x116/0x1d0
[   15.486624]  ret_from_fork_asm+0x1a/0x30
[   15.486974] 
[   15.487185] The buggy address belongs to the object at ffff8881022bacc0
[   15.487185]  which belongs to the cache kmalloc-16 of size 16
[   15.487917] The buggy address is located 8 bytes inside of
[   15.487917]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.488723] 
[   15.488981] The buggy address belongs to the physical page:
[   15.489413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.489901] flags: 0x200000000000000(node=0|zone=2)
[   15.490311] page_type: f5(slab)
[   15.490763] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.491230] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.491712] page dumped because: kasan: bad access detected
[   15.491965] 
[   15.492091] Memory state around the buggy address:
[   15.492542]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.492861]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.493430] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.493893]                                               ^
[   15.494340]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.494956]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.495567] ==================================================================