Hay
Date
July 1, 2025, 11:08 a.m.

Environment
qemu-x86_64

[   13.737309] ==================================================================
[   13.737592] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.738091] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.738435] 
[   13.738529] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.738592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.738604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.738624] Call Trace:
[   13.738641]  <TASK>
[   13.738656]  dump_stack_lvl+0x73/0xb0
[   13.738684]  print_report+0xd1/0x650
[   13.738706]  ? __virt_addr_valid+0x1db/0x2d0
[   13.738729]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.738755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.738776]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.738802]  kasan_report+0x141/0x180
[   13.738823]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.738854]  kasan_check_range+0x10c/0x1c0
[   13.738876]  __kasan_check_write+0x18/0x20
[   13.738895]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.738985]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.739014]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.739038]  ? trace_hardirqs_on+0x37/0xe0
[   13.739061]  ? kasan_bitops_generic+0x92/0x1c0
[   13.739086]  kasan_bitops_generic+0x121/0x1c0
[   13.739109]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.739132]  ? __pfx_read_tsc+0x10/0x10
[   13.739153]  ? ktime_get_ts64+0x86/0x230
[   13.739175]  kunit_try_run_case+0x1a5/0x480
[   13.739199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.739220]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.739244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.739266]  ? __kthread_parkme+0x82/0x180
[   13.739285]  ? preempt_count_sub+0x50/0x80
[   13.739309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.739332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.739355]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.739386]  kthread+0x337/0x6f0
[   13.739406]  ? trace_preempt_on+0x20/0xc0
[   13.739426]  ? __pfx_kthread+0x10/0x10
[   13.739446]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.739466]  ? calculate_sigpending+0x7b/0xa0
[   13.739489]  ? __pfx_kthread+0x10/0x10
[   13.739509]  ret_from_fork+0x116/0x1d0
[   13.739527]  ? __pfx_kthread+0x10/0x10
[   13.739546]  ret_from_fork_asm+0x1a/0x30
[   13.739594]  </TASK>
[   13.739604] 
[   13.750498] Allocated by task 278:
[   13.750699]  kasan_save_stack+0x45/0x70
[   13.750970]  kasan_save_track+0x18/0x40
[   13.751120]  kasan_save_alloc_info+0x3b/0x50
[   13.751271]  __kasan_kmalloc+0xb7/0xc0
[   13.751426]  __kmalloc_cache_noprof+0x189/0x420
[   13.751676]  kasan_bitops_generic+0x92/0x1c0
[   13.751885]  kunit_try_run_case+0x1a5/0x480
[   13.752283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.752538]  kthread+0x337/0x6f0
[   13.752683]  ret_from_fork+0x116/0x1d0
[   13.752872]  ret_from_fork_asm+0x1a/0x30
[   13.753111] 
[   13.753211] The buggy address belongs to the object at ffff888102531780
[   13.753211]  which belongs to the cache kmalloc-16 of size 16
[   13.753727] The buggy address is located 8 bytes inside of
[   13.753727]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.754212] 
[   13.754288] The buggy address belongs to the physical page:
[   13.754525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.754897] flags: 0x200000000000000(node=0|zone=2)
[   13.755199] page_type: f5(slab)
[   13.755382] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.755673] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.756204] page dumped because: kasan: bad access detected
[   13.756433] 
[   13.756526] Memory state around the buggy address:
[   13.756705]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.757041]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.757338] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.757642]                       ^
[   13.757791]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.758077]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.758358] ==================================================================
[   13.697531] ==================================================================
[   13.697879] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.698309] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.698638] 
[   13.698750] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.698793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.698805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.698825] Call Trace:
[   13.698840]  <TASK>
[   13.698855]  dump_stack_lvl+0x73/0xb0
[   13.698882]  print_report+0xd1/0x650
[   13.698970]  ? __virt_addr_valid+0x1db/0x2d0
[   13.698997]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.699023]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.699044]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.699070]  kasan_report+0x141/0x180
[   13.699092]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.699123]  kasan_check_range+0x10c/0x1c0
[   13.699145]  __kasan_check_write+0x18/0x20
[   13.699163]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.699190]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.699217]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.699241]  ? trace_hardirqs_on+0x37/0xe0
[   13.699262]  ? kasan_bitops_generic+0x92/0x1c0
[   13.699288]  kasan_bitops_generic+0x121/0x1c0
[   13.699311]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.699334]  ? __pfx_read_tsc+0x10/0x10
[   13.699355]  ? ktime_get_ts64+0x86/0x230
[   13.699388]  kunit_try_run_case+0x1a5/0x480
[   13.699411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.699432]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.699456]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.699477]  ? __kthread_parkme+0x82/0x180
[   13.699497]  ? preempt_count_sub+0x50/0x80
[   13.699521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.699544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.699566]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.699589]  kthread+0x337/0x6f0
[   13.699625]  ? trace_preempt_on+0x20/0xc0
[   13.699647]  ? __pfx_kthread+0x10/0x10
[   13.699667]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.699687]  ? calculate_sigpending+0x7b/0xa0
[   13.699711]  ? __pfx_kthread+0x10/0x10
[   13.699732]  ret_from_fork+0x116/0x1d0
[   13.699750]  ? __pfx_kthread+0x10/0x10
[   13.699770]  ret_from_fork_asm+0x1a/0x30
[   13.699799]  </TASK>
[   13.699811] 
[   13.708630] Allocated by task 278:
[   13.708855]  kasan_save_stack+0x45/0x70
[   13.709136]  kasan_save_track+0x18/0x40
[   13.709338]  kasan_save_alloc_info+0x3b/0x50
[   13.709561]  __kasan_kmalloc+0xb7/0xc0
[   13.709736]  __kmalloc_cache_noprof+0x189/0x420
[   13.710059]  kasan_bitops_generic+0x92/0x1c0
[   13.710239]  kunit_try_run_case+0x1a5/0x480
[   13.710437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.710696]  kthread+0x337/0x6f0
[   13.710828]  ret_from_fork+0x116/0x1d0
[   13.711028]  ret_from_fork_asm+0x1a/0x30
[   13.711175] 
[   13.711246] The buggy address belongs to the object at ffff888102531780
[   13.711246]  which belongs to the cache kmalloc-16 of size 16
[   13.711777] The buggy address is located 8 bytes inside of
[   13.711777]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.712501] 
[   13.712582] The buggy address belongs to the physical page:
[   13.712764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.713034] flags: 0x200000000000000(node=0|zone=2)
[   13.713273] page_type: f5(slab)
[   13.713449] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.713803] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.714142] page dumped because: kasan: bad access detected
[   13.714479] 
[   13.714611] Memory state around the buggy address:
[   13.714798]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.715153]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.715438] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.715746]                       ^
[   13.716184]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.716477]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.716774] ==================================================================
[   13.717324] ==================================================================
[   13.717595] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.718111] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.718369] 
[   13.718491] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.718533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.718545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.718568] Call Trace:
[   13.718585]  <TASK>
[   13.718601]  dump_stack_lvl+0x73/0xb0
[   13.718652]  print_report+0xd1/0x650
[   13.718674]  ? __virt_addr_valid+0x1db/0x2d0
[   13.718697]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.718724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.718745]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.718771]  kasan_report+0x141/0x180
[   13.718793]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.718823]  kasan_check_range+0x10c/0x1c0
[   13.718848]  __kasan_check_write+0x18/0x20
[   13.718868]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.718896]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.718996]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.719021]  ? trace_hardirqs_on+0x37/0xe0
[   13.719044]  ? kasan_bitops_generic+0x92/0x1c0
[   13.719071]  kasan_bitops_generic+0x121/0x1c0
[   13.719095]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.719120]  ? __pfx_read_tsc+0x10/0x10
[   13.719140]  ? ktime_get_ts64+0x86/0x230
[   13.719165]  kunit_try_run_case+0x1a5/0x480
[   13.719187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.719209]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.719233]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.719255]  ? __kthread_parkme+0x82/0x180
[   13.719274]  ? preempt_count_sub+0x50/0x80
[   13.719298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.719321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.719342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.719364]  kthread+0x337/0x6f0
[   13.719393]  ? trace_preempt_on+0x20/0xc0
[   13.719414]  ? __pfx_kthread+0x10/0x10
[   13.719435]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.719454]  ? calculate_sigpending+0x7b/0xa0
[   13.719477]  ? __pfx_kthread+0x10/0x10
[   13.719498]  ret_from_fork+0x116/0x1d0
[   13.719515]  ? __pfx_kthread+0x10/0x10
[   13.719534]  ret_from_fork_asm+0x1a/0x30
[   13.719564]  </TASK>
[   13.719575] 
[   13.728506] Allocated by task 278:
[   13.728644]  kasan_save_stack+0x45/0x70
[   13.728825]  kasan_save_track+0x18/0x40
[   13.729105]  kasan_save_alloc_info+0x3b/0x50
[   13.729332]  __kasan_kmalloc+0xb7/0xc0
[   13.729490]  __kmalloc_cache_noprof+0x189/0x420
[   13.729675]  kasan_bitops_generic+0x92/0x1c0
[   13.729827]  kunit_try_run_case+0x1a5/0x480
[   13.730110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.730386]  kthread+0x337/0x6f0
[   13.730562]  ret_from_fork+0x116/0x1d0
[   13.730773]  ret_from_fork_asm+0x1a/0x30
[   13.731047] 
[   13.731145] The buggy address belongs to the object at ffff888102531780
[   13.731145]  which belongs to the cache kmalloc-16 of size 16
[   13.731672] The buggy address is located 8 bytes inside of
[   13.731672]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.732451] 
[   13.732578] The buggy address belongs to the physical page:
[   13.732838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.733232] flags: 0x200000000000000(node=0|zone=2)
[   13.733459] page_type: f5(slab)
[   13.733634] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.734061] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.734358] page dumped because: kasan: bad access detected
[   13.734577] 
[   13.734698] Memory state around the buggy address:
[   13.734901]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.735264]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.735507] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.735735]                       ^
[   13.735905]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.736222]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.736762] ==================================================================
[   13.855543] ==================================================================
[   13.856055] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.856775] Read of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.857467] 
[   13.857708] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.857754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.857765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.857792] Call Trace:
[   13.857808]  <TASK>
[   13.857824]  dump_stack_lvl+0x73/0xb0
[   13.857853]  print_report+0xd1/0x650
[   13.857875]  ? __virt_addr_valid+0x1db/0x2d0
[   13.857897]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.857922]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.857944]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.857970]  kasan_report+0x141/0x180
[   13.857991]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.858021]  __asan_report_load8_noabort+0x18/0x20
[   13.858045]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.858071]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.858098]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.858122]  ? trace_hardirqs_on+0x37/0xe0
[   13.858144]  ? kasan_bitops_generic+0x92/0x1c0
[   13.858171]  kasan_bitops_generic+0x121/0x1c0
[   13.858193]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.858217]  ? __pfx_read_tsc+0x10/0x10
[   13.858239]  ? ktime_get_ts64+0x86/0x230
[   13.858262]  kunit_try_run_case+0x1a5/0x480
[   13.858287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.858307]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.858331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.858353]  ? __kthread_parkme+0x82/0x180
[   13.858386]  ? preempt_count_sub+0x50/0x80
[   13.858409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.858432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.858455]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.858477]  kthread+0x337/0x6f0
[   13.858497]  ? trace_preempt_on+0x20/0xc0
[   13.858518]  ? __pfx_kthread+0x10/0x10
[   13.858538]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.858560]  ? calculate_sigpending+0x7b/0xa0
[   13.858594]  ? __pfx_kthread+0x10/0x10
[   13.858614]  ret_from_fork+0x116/0x1d0
[   13.858633]  ? __pfx_kthread+0x10/0x10
[   13.858652]  ret_from_fork_asm+0x1a/0x30
[   13.858682]  </TASK>
[   13.858693] 
[   13.873727] Allocated by task 278:
[   13.874103]  kasan_save_stack+0x45/0x70
[   13.874569]  kasan_save_track+0x18/0x40
[   13.874952]  kasan_save_alloc_info+0x3b/0x50
[   13.875292]  __kasan_kmalloc+0xb7/0xc0
[   13.875449]  __kmalloc_cache_noprof+0x189/0x420
[   13.875623]  kasan_bitops_generic+0x92/0x1c0
[   13.876000]  kunit_try_run_case+0x1a5/0x480
[   13.876543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.877058]  kthread+0x337/0x6f0
[   13.877428]  ret_from_fork+0x116/0x1d0
[   13.877906]  ret_from_fork_asm+0x1a/0x30
[   13.878336] 
[   13.878517] The buggy address belongs to the object at ffff888102531780
[   13.878517]  which belongs to the cache kmalloc-16 of size 16
[   13.879410] The buggy address is located 8 bytes inside of
[   13.879410]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.880167] 
[   13.880446] The buggy address belongs to the physical page:
[   13.880986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.881699] flags: 0x200000000000000(node=0|zone=2)
[   13.882151] page_type: f5(slab)
[   13.882393] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.882647] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.883494] page dumped because: kasan: bad access detected
[   13.884103] 
[   13.884274] Memory state around the buggy address:
[   13.884741]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.885121]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.885832] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.886567]                       ^
[   13.886734]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.887218]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.887886] ==================================================================
[   13.677796] ==================================================================
[   13.678245] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.678686] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.679085] 
[   13.679202] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.679246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.679257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.679278] Call Trace:
[   13.679291]  <TASK>
[   13.679306]  dump_stack_lvl+0x73/0xb0
[   13.679335]  print_report+0xd1/0x650
[   13.679356]  ? __virt_addr_valid+0x1db/0x2d0
[   13.679389]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.679414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.679436]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.679462]  kasan_report+0x141/0x180
[   13.679482]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.679513]  kasan_check_range+0x10c/0x1c0
[   13.679536]  __kasan_check_write+0x18/0x20
[   13.679554]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.679580]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.679627]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.679651]  ? trace_hardirqs_on+0x37/0xe0
[   13.679674]  ? kasan_bitops_generic+0x92/0x1c0
[   13.679699]  kasan_bitops_generic+0x121/0x1c0
[   13.679722]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.679747]  ? __pfx_read_tsc+0x10/0x10
[   13.679767]  ? ktime_get_ts64+0x86/0x230
[   13.679791]  kunit_try_run_case+0x1a5/0x480
[   13.679814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.679835]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.679858]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.679880]  ? __kthread_parkme+0x82/0x180
[   13.679900]  ? preempt_count_sub+0x50/0x80
[   13.680174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.680200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.680223]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.680246]  kthread+0x337/0x6f0
[   13.680265]  ? trace_preempt_on+0x20/0xc0
[   13.680285]  ? __pfx_kthread+0x10/0x10
[   13.680306]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.680327]  ? calculate_sigpending+0x7b/0xa0
[   13.680350]  ? __pfx_kthread+0x10/0x10
[   13.680370]  ret_from_fork+0x116/0x1d0
[   13.680406]  ? __pfx_kthread+0x10/0x10
[   13.680426]  ret_from_fork_asm+0x1a/0x30
[   13.680456]  </TASK>
[   13.680468] 
[   13.689023] Allocated by task 278:
[   13.689205]  kasan_save_stack+0x45/0x70
[   13.689416]  kasan_save_track+0x18/0x40
[   13.689626]  kasan_save_alloc_info+0x3b/0x50
[   13.689833]  __kasan_kmalloc+0xb7/0xc0
[   13.690023]  __kmalloc_cache_noprof+0x189/0x420
[   13.690242]  kasan_bitops_generic+0x92/0x1c0
[   13.690547]  kunit_try_run_case+0x1a5/0x480
[   13.690741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.691020]  kthread+0x337/0x6f0
[   13.691187]  ret_from_fork+0x116/0x1d0
[   13.691318]  ret_from_fork_asm+0x1a/0x30
[   13.691467] 
[   13.691537] The buggy address belongs to the object at ffff888102531780
[   13.691537]  which belongs to the cache kmalloc-16 of size 16
[   13.692244] The buggy address is located 8 bytes inside of
[   13.692244]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.692831] 
[   13.693011] The buggy address belongs to the physical page:
[   13.693248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.693504] flags: 0x200000000000000(node=0|zone=2)
[   13.693736] page_type: f5(slab)
[   13.693903] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.694303] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.694643] page dumped because: kasan: bad access detected
[   13.694870] 
[   13.694976] Memory state around the buggy address:
[   13.695157]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.695454]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.695740] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.695951]                       ^
[   13.696072]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.696634]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.697037] ==================================================================
[   13.780913] ==================================================================
[   13.781228] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.781729] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.782084] 
[   13.782174] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.782216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.782229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.782248] Call Trace:
[   13.782262]  <TASK>
[   13.782275]  dump_stack_lvl+0x73/0xb0
[   13.782303]  print_report+0xd1/0x650
[   13.782326]  ? __virt_addr_valid+0x1db/0x2d0
[   13.782347]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.782384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.782406]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.782433]  kasan_report+0x141/0x180
[   13.782454]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.782484]  kasan_check_range+0x10c/0x1c0
[   13.782506]  __kasan_check_write+0x18/0x20
[   13.782524]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.782551]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.782579]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.782623]  ? trace_hardirqs_on+0x37/0xe0
[   13.782645]  ? kasan_bitops_generic+0x92/0x1c0
[   13.782671]  kasan_bitops_generic+0x121/0x1c0
[   13.782693]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.782717]  ? __pfx_read_tsc+0x10/0x10
[   13.782737]  ? ktime_get_ts64+0x86/0x230
[   13.782761]  kunit_try_run_case+0x1a5/0x480
[   13.782785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.782807]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.782830]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.782852]  ? __kthread_parkme+0x82/0x180
[   13.782871]  ? preempt_count_sub+0x50/0x80
[   13.782894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.783164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.783192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.783216]  kthread+0x337/0x6f0
[   13.783235]  ? trace_preempt_on+0x20/0xc0
[   13.783257]  ? __pfx_kthread+0x10/0x10
[   13.783277]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.783298]  ? calculate_sigpending+0x7b/0xa0
[   13.783321]  ? __pfx_kthread+0x10/0x10
[   13.783341]  ret_from_fork+0x116/0x1d0
[   13.783359]  ? __pfx_kthread+0x10/0x10
[   13.783391]  ret_from_fork_asm+0x1a/0x30
[   13.783421]  </TASK>
[   13.783432] 
[   13.792036] Allocated by task 278:
[   13.792221]  kasan_save_stack+0x45/0x70
[   13.792438]  kasan_save_track+0x18/0x40
[   13.792644]  kasan_save_alloc_info+0x3b/0x50
[   13.792816]  __kasan_kmalloc+0xb7/0xc0
[   13.793073]  __kmalloc_cache_noprof+0x189/0x420
[   13.793235]  kasan_bitops_generic+0x92/0x1c0
[   13.793394]  kunit_try_run_case+0x1a5/0x480
[   13.793542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.793812]  kthread+0x337/0x6f0
[   13.793996]  ret_from_fork+0x116/0x1d0
[   13.794180]  ret_from_fork_asm+0x1a/0x30
[   13.794380] 
[   13.794476] The buggy address belongs to the object at ffff888102531780
[   13.794476]  which belongs to the cache kmalloc-16 of size 16
[   13.794967] The buggy address is located 8 bytes inside of
[   13.794967]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.795326] 
[   13.795707] The buggy address belongs to the physical page:
[   13.796039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.796411] flags: 0x200000000000000(node=0|zone=2)
[   13.796653] page_type: f5(slab)
[   13.796812] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.797208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.797506] page dumped because: kasan: bad access detected
[   13.797760] 
[   13.797836] Memory state around the buggy address:
[   13.798071]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.798360]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.798713] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.799237]                       ^
[   13.799432]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.799707]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.800062] ==================================================================
[   13.800599] ==================================================================
[   13.800883] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.801355] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.801701] 
[   13.801799] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.801842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.801854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.801875] Call Trace:
[   13.801891]  <TASK>
[   13.801974]  dump_stack_lvl+0x73/0xb0
[   13.802008]  print_report+0xd1/0x650
[   13.802029]  ? __virt_addr_valid+0x1db/0x2d0
[   13.802051]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.802077]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.802098]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.802126]  kasan_report+0x141/0x180
[   13.802147]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.802177]  kasan_check_range+0x10c/0x1c0
[   13.802200]  __kasan_check_write+0x18/0x20
[   13.802220]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.802245]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.802272]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.802295]  ? trace_hardirqs_on+0x37/0xe0
[   13.802318]  ? kasan_bitops_generic+0x92/0x1c0
[   13.802344]  kasan_bitops_generic+0x121/0x1c0
[   13.802367]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.802405]  ? __pfx_read_tsc+0x10/0x10
[   13.802425]  ? ktime_get_ts64+0x86/0x230
[   13.802449]  kunit_try_run_case+0x1a5/0x480
[   13.802472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.802493]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.802517]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.802538]  ? __kthread_parkme+0x82/0x180
[   13.802558]  ? preempt_count_sub+0x50/0x80
[   13.802581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.802622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.802645]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.802667]  kthread+0x337/0x6f0
[   13.802686]  ? trace_preempt_on+0x20/0xc0
[   13.802707]  ? __pfx_kthread+0x10/0x10
[   13.802728]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.802750]  ? calculate_sigpending+0x7b/0xa0
[   13.802775]  ? __pfx_kthread+0x10/0x10
[   13.802796]  ret_from_fork+0x116/0x1d0
[   13.802813]  ? __pfx_kthread+0x10/0x10
[   13.802833]  ret_from_fork_asm+0x1a/0x30
[   13.802863]  </TASK>
[   13.802874] 
[   13.811756] Allocated by task 278:
[   13.811897]  kasan_save_stack+0x45/0x70
[   13.812175]  kasan_save_track+0x18/0x40
[   13.812347]  kasan_save_alloc_info+0x3b/0x50
[   13.812535]  __kasan_kmalloc+0xb7/0xc0
[   13.812741]  __kmalloc_cache_noprof+0x189/0x420
[   13.812992]  kasan_bitops_generic+0x92/0x1c0
[   13.813224]  kunit_try_run_case+0x1a5/0x480
[   13.813404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.813652]  kthread+0x337/0x6f0
[   13.813775]  ret_from_fork+0x116/0x1d0
[   13.813907]  ret_from_fork_asm+0x1a/0x30
[   13.814122] 
[   13.814200] The buggy address belongs to the object at ffff888102531780
[   13.814200]  which belongs to the cache kmalloc-16 of size 16
[   13.814768] The buggy address is located 8 bytes inside of
[   13.814768]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.815486] 
[   13.815588] The buggy address belongs to the physical page:
[   13.815764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.816208] flags: 0x200000000000000(node=0|zone=2)
[   13.816465] page_type: f5(slab)
[   13.816658] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.817138] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.817460] page dumped because: kasan: bad access detected
[   13.818664] 
[   13.818879] Memory state around the buggy address:
[   13.819490]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.819980]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.820243] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.820801]                       ^
[   13.821214]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.821667]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.822167] ==================================================================
[   13.822736] ==================================================================
[   13.823524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.823924] Read of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.824244] 
[   13.824337] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.824401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.824412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.824433] Call Trace:
[   13.824452]  <TASK>
[   13.824472]  dump_stack_lvl+0x73/0xb0
[   13.824503]  print_report+0xd1/0x650
[   13.824526]  ? __virt_addr_valid+0x1db/0x2d0
[   13.824549]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.824575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.824597]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.824623]  kasan_report+0x141/0x180
[   13.824644]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.824674]  kasan_check_range+0x10c/0x1c0
[   13.824697]  __kasan_check_read+0x15/0x20
[   13.824716]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.824742]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.824769]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.824794]  ? trace_hardirqs_on+0x37/0xe0
[   13.824816]  ? kasan_bitops_generic+0x92/0x1c0
[   13.824879]  kasan_bitops_generic+0x121/0x1c0
[   13.824901]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.824926]  ? __pfx_read_tsc+0x10/0x10
[   13.824946]  ? ktime_get_ts64+0x86/0x230
[   13.824971]  kunit_try_run_case+0x1a5/0x480
[   13.824997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.825017]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.825041]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.825063]  ? __kthread_parkme+0x82/0x180
[   13.825084]  ? preempt_count_sub+0x50/0x80
[   13.825107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.825130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.825152]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.825174]  kthread+0x337/0x6f0
[   13.825192]  ? trace_preempt_on+0x20/0xc0
[   13.825213]  ? __pfx_kthread+0x10/0x10
[   13.825233]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.825252]  ? calculate_sigpending+0x7b/0xa0
[   13.825275]  ? __pfx_kthread+0x10/0x10
[   13.825297]  ret_from_fork+0x116/0x1d0
[   13.825314]  ? __pfx_kthread+0x10/0x10
[   13.825334]  ret_from_fork_asm+0x1a/0x30
[   13.825363]  </TASK>
[   13.825384] 
[   13.840336] Allocated by task 278:
[   13.840512]  kasan_save_stack+0x45/0x70
[   13.840834]  kasan_save_track+0x18/0x40
[   13.841306]  kasan_save_alloc_info+0x3b/0x50
[   13.841776]  __kasan_kmalloc+0xb7/0xc0
[   13.842131]  __kmalloc_cache_noprof+0x189/0x420
[   13.842295]  kasan_bitops_generic+0x92/0x1c0
[   13.842458]  kunit_try_run_case+0x1a5/0x480
[   13.842618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.843080]  kthread+0x337/0x6f0
[   13.843450]  ret_from_fork+0x116/0x1d0
[   13.844040]  ret_from_fork_asm+0x1a/0x30
[   13.844427] 
[   13.844590] The buggy address belongs to the object at ffff888102531780
[   13.844590]  which belongs to the cache kmalloc-16 of size 16
[   13.845837] The buggy address is located 8 bytes inside of
[   13.845837]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.847061] 
[   13.847152] The buggy address belongs to the physical page:
[   13.847323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.847584] flags: 0x200000000000000(node=0|zone=2)
[   13.848011] page_type: f5(slab)
[   13.848370] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.849223] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.849980] page dumped because: kasan: bad access detected
[   13.850708] 
[   13.850886] Memory state around the buggy address:
[   13.851476]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.851834]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.852607] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.853418]                       ^
[   13.853689]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.853901]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.854627] ==================================================================
[   13.760417] ==================================================================
[   13.761177] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.761897] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.762259] 
[   13.762389] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.762435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.762447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.762469] Call Trace:
[   13.762482]  <TASK>
[   13.762497]  dump_stack_lvl+0x73/0xb0
[   13.762526]  print_report+0xd1/0x650
[   13.762548]  ? __virt_addr_valid+0x1db/0x2d0
[   13.762592]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.762618]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.762640]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.762665]  kasan_report+0x141/0x180
[   13.762687]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.762716]  kasan_check_range+0x10c/0x1c0
[   13.762739]  __kasan_check_write+0x18/0x20
[   13.762758]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.762784]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.762811]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.762835]  ? trace_hardirqs_on+0x37/0xe0
[   13.762858]  ? kasan_bitops_generic+0x92/0x1c0
[   13.762883]  kasan_bitops_generic+0x121/0x1c0
[   13.763071]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.763107]  ? __pfx_read_tsc+0x10/0x10
[   13.763128]  ? ktime_get_ts64+0x86/0x230
[   13.763153]  kunit_try_run_case+0x1a5/0x480
[   13.763178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.763199]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.763223]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.763245]  ? __kthread_parkme+0x82/0x180
[   13.763264]  ? preempt_count_sub+0x50/0x80
[   13.763288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.763311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.763333]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.763356]  kthread+0x337/0x6f0
[   13.763386]  ? trace_preempt_on+0x20/0xc0
[   13.763408]  ? __pfx_kthread+0x10/0x10
[   13.763429]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.763448]  ? calculate_sigpending+0x7b/0xa0
[   13.763471]  ? __pfx_kthread+0x10/0x10
[   13.763491]  ret_from_fork+0x116/0x1d0
[   13.763509]  ? __pfx_kthread+0x10/0x10
[   13.763528]  ret_from_fork_asm+0x1a/0x30
[   13.763580]  </TASK>
[   13.763591] 
[   13.772519] Allocated by task 278:
[   13.772688]  kasan_save_stack+0x45/0x70
[   13.772834]  kasan_save_track+0x18/0x40
[   13.773030]  kasan_save_alloc_info+0x3b/0x50
[   13.773243]  __kasan_kmalloc+0xb7/0xc0
[   13.773500]  __kmalloc_cache_noprof+0x189/0x420
[   13.773715]  kasan_bitops_generic+0x92/0x1c0
[   13.774011]  kunit_try_run_case+0x1a5/0x480
[   13.774210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.774466]  kthread+0x337/0x6f0
[   13.774631]  ret_from_fork+0x116/0x1d0
[   13.774793]  ret_from_fork_asm+0x1a/0x30
[   13.775094] 
[   13.775171] The buggy address belongs to the object at ffff888102531780
[   13.775171]  which belongs to the cache kmalloc-16 of size 16
[   13.775724] The buggy address is located 8 bytes inside of
[   13.775724]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.776156] 
[   13.776228] The buggy address belongs to the physical page:
[   13.776409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.776762] flags: 0x200000000000000(node=0|zone=2)
[   13.776997] page_type: f5(slab)
[   13.777169] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.777600] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.777898] page dumped because: kasan: bad access detected
[   13.778181] 
[   13.778270] Memory state around the buggy address:
[   13.778484]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.778744]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.779176] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.779507]                       ^
[   13.779705]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.780096]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.780423] ==================================================================