Hay
Date
July 5, 2025, 11:09 a.m.

Environment
qemu-x86_64

[   16.284633] ==================================================================
[   16.286583] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.288068] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   16.288356] 
[   16.288470] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.288527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.288544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.288572] Call Trace:
[   16.288597]  <TASK>
[   16.288622]  dump_stack_lvl+0x73/0xb0
[   16.289255]  print_report+0xd1/0x650
[   16.289292]  ? __virt_addr_valid+0x1db/0x2d0
[   16.289322]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.289355]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.289381]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.289414]  kasan_report+0x141/0x180
[   16.289440]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.289478]  kasan_check_range+0x10c/0x1c0
[   16.289505]  __kasan_check_write+0x18/0x20
[   16.289526]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.289558]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.289590]  ? ret_from_fork_asm+0x1a/0x30
[   16.289616]  ? kthread+0x337/0x6f0
[   16.289705]  kasan_bitops_generic+0x121/0x1c0
[   16.289737]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.289858]  ? __pfx_read_tsc+0x10/0x10
[   16.289888]  ? ktime_get_ts64+0x86/0x230
[   16.289919]  kunit_try_run_case+0x1a5/0x480
[   16.289948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.289974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.290002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.290028]  ? __kthread_parkme+0x82/0x180
[   16.290053]  ? preempt_count_sub+0x50/0x80
[   16.290081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.290107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.290134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.290160]  kthread+0x337/0x6f0
[   16.290183]  ? trace_preempt_on+0x20/0xc0
[   16.290211]  ? __pfx_kthread+0x10/0x10
[   16.290235]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.290258]  ? calculate_sigpending+0x7b/0xa0
[   16.290287]  ? __pfx_kthread+0x10/0x10
[   16.290311]  ret_from_fork+0x116/0x1d0
[   16.290333]  ? __pfx_kthread+0x10/0x10
[   16.290358]  ret_from_fork_asm+0x1a/0x30
[   16.290395]  </TASK>
[   16.290411] 
[   16.303056] Allocated by task 279:
[   16.303308]  kasan_save_stack+0x45/0x70
[   16.303699]  kasan_save_track+0x18/0x40
[   16.304182]  kasan_save_alloc_info+0x3b/0x50
[   16.304450]  __kasan_kmalloc+0xb7/0xc0
[   16.304722]  __kmalloc_cache_noprof+0x189/0x420
[   16.305248]  kasan_bitops_generic+0x92/0x1c0
[   16.305502]  kunit_try_run_case+0x1a5/0x480
[   16.305802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.306017]  kthread+0x337/0x6f0
[   16.306158]  ret_from_fork+0x116/0x1d0
[   16.306362]  ret_from_fork_asm+0x1a/0x30
[   16.306841] 
[   16.306966] The buggy address belongs to the object at ffff88810267b740
[   16.306966]  which belongs to the cache kmalloc-16 of size 16
[   16.307628] The buggy address is located 8 bytes inside of
[   16.307628]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.308402] 
[   16.308525] The buggy address belongs to the physical page:
[   16.308952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.309418] flags: 0x200000000000000(node=0|zone=2)
[   16.309783] page_type: f5(slab)
[   16.310129] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.310619] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.311105] page dumped because: kasan: bad access detected
[   16.311313] 
[   16.311397] Memory state around the buggy address:
[   16.311580]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.312385]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.312743] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.313031]                                               ^
[   16.313235]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.313948]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.314381] ==================================================================
[   16.179699] ==================================================================
[   16.180013] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.180596] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   16.181366] 
[   16.181505] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.181563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.181577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.181605] Call Trace:
[   16.181627]  <TASK>
[   16.181666]  dump_stack_lvl+0x73/0xb0
[   16.181700]  print_report+0xd1/0x650
[   16.181727]  ? __virt_addr_valid+0x1db/0x2d0
[   16.181755]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.181883]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.181916]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.181948]  kasan_report+0x141/0x180
[   16.181976]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.182013]  kasan_check_range+0x10c/0x1c0
[   16.182041]  __kasan_check_write+0x18/0x20
[   16.182063]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.182095]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.182128]  ? ret_from_fork_asm+0x1a/0x30
[   16.182154]  ? kthread+0x337/0x6f0
[   16.182183]  kasan_bitops_generic+0x121/0x1c0
[   16.182210]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.182239]  ? __pfx_read_tsc+0x10/0x10
[   16.182264]  ? ktime_get_ts64+0x86/0x230
[   16.182293]  kunit_try_run_case+0x1a5/0x480
[   16.182323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.182349]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.182376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.182402]  ? __kthread_parkme+0x82/0x180
[   16.182433]  ? preempt_count_sub+0x50/0x80
[   16.182461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.182489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.182516]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.182543]  kthread+0x337/0x6f0
[   16.182566]  ? trace_preempt_on+0x20/0xc0
[   16.182593]  ? __pfx_kthread+0x10/0x10
[   16.182617]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.182641]  ? calculate_sigpending+0x7b/0xa0
[   16.182683]  ? __pfx_kthread+0x10/0x10
[   16.182708]  ret_from_fork+0x116/0x1d0
[   16.182730]  ? __pfx_kthread+0x10/0x10
[   16.182753]  ret_from_fork_asm+0x1a/0x30
[   16.182864]  </TASK>
[   16.182880] 
[   16.193969] Allocated by task 279:
[   16.194512]  kasan_save_stack+0x45/0x70
[   16.194823]  kasan_save_track+0x18/0x40
[   16.195192]  kasan_save_alloc_info+0x3b/0x50
[   16.195443]  __kasan_kmalloc+0xb7/0xc0
[   16.195607]  __kmalloc_cache_noprof+0x189/0x420
[   16.196068]  kasan_bitops_generic+0x92/0x1c0
[   16.196336]  kunit_try_run_case+0x1a5/0x480
[   16.196583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.196855]  kthread+0x337/0x6f0
[   16.197079]  ret_from_fork+0x116/0x1d0
[   16.197433]  ret_from_fork_asm+0x1a/0x30
[   16.197610] 
[   16.197716] The buggy address belongs to the object at ffff88810267b740
[   16.197716]  which belongs to the cache kmalloc-16 of size 16
[   16.198413] The buggy address is located 8 bytes inside of
[   16.198413]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.199420] 
[   16.199591] The buggy address belongs to the physical page:
[   16.200119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.200450] flags: 0x200000000000000(node=0|zone=2)
[   16.200749] page_type: f5(slab)
[   16.201079] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.201428] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.201845] page dumped because: kasan: bad access detected
[   16.202129] 
[   16.202217] Memory state around the buggy address:
[   16.202672]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.203345]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.203719] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.204348]                                               ^
[   16.204570]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.205198]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.205495] ==================================================================
[   16.315233] ==================================================================
[   16.315687] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.316210] Read of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   16.316632] 
[   16.316888] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.316987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.317003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.317030] Call Trace:
[   16.317053]  <TASK>
[   16.317078]  dump_stack_lvl+0x73/0xb0
[   16.317115]  print_report+0xd1/0x650
[   16.317141]  ? __virt_addr_valid+0x1db/0x2d0
[   16.317207]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.317266]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.317292]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.317326]  kasan_report+0x141/0x180
[   16.317351]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.317388]  kasan_check_range+0x10c/0x1c0
[   16.317417]  __kasan_check_read+0x15/0x20
[   16.317439]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.317510]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.317544]  ? ret_from_fork_asm+0x1a/0x30
[   16.317570]  ? kthread+0x337/0x6f0
[   16.317599]  kasan_bitops_generic+0x121/0x1c0
[   16.317626]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.317704]  ? __pfx_read_tsc+0x10/0x10
[   16.317730]  ? ktime_get_ts64+0x86/0x230
[   16.317779]  kunit_try_run_case+0x1a5/0x480
[   16.317829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.317855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.317883]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.317909]  ? __kthread_parkme+0x82/0x180
[   16.317971]  ? preempt_count_sub+0x50/0x80
[   16.318003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.318031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.318059]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.318086]  kthread+0x337/0x6f0
[   16.318108]  ? trace_preempt_on+0x20/0xc0
[   16.318174]  ? __pfx_kthread+0x10/0x10
[   16.318197]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.318222]  ? calculate_sigpending+0x7b/0xa0
[   16.318250]  ? __pfx_kthread+0x10/0x10
[   16.318275]  ret_from_fork+0x116/0x1d0
[   16.318328]  ? __pfx_kthread+0x10/0x10
[   16.318353]  ret_from_fork_asm+0x1a/0x30
[   16.318389]  </TASK>
[   16.318401] 
[   16.329786] Allocated by task 279:
[   16.330002]  kasan_save_stack+0x45/0x70
[   16.330233]  kasan_save_track+0x18/0x40
[   16.330463]  kasan_save_alloc_info+0x3b/0x50
[   16.330902]  __kasan_kmalloc+0xb7/0xc0
[   16.331137]  __kmalloc_cache_noprof+0x189/0x420
[   16.331399]  kasan_bitops_generic+0x92/0x1c0
[   16.331659]  kunit_try_run_case+0x1a5/0x480
[   16.332222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.332578]  kthread+0x337/0x6f0
[   16.332921]  ret_from_fork+0x116/0x1d0
[   16.333192]  ret_from_fork_asm+0x1a/0x30
[   16.333440] 
[   16.333589] The buggy address belongs to the object at ffff88810267b740
[   16.333589]  which belongs to the cache kmalloc-16 of size 16
[   16.334332] The buggy address is located 8 bytes inside of
[   16.334332]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.335125] 
[   16.335253] The buggy address belongs to the physical page:
[   16.335560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.336275] flags: 0x200000000000000(node=0|zone=2)
[   16.336501] page_type: f5(slab)
[   16.336758] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.337303] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.337743] page dumped because: kasan: bad access detected
[   16.338190] 
[   16.338342] Memory state around the buggy address:
[   16.338583]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.339141]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.339529] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.340251]                                               ^
[   16.340547]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.341030]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.341354] ==================================================================
[   16.130425] ==================================================================
[   16.130765] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.131192] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   16.132132] 
[   16.132250] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.132306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.132321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.132346] Call Trace:
[   16.132366]  <TASK>
[   16.132385]  dump_stack_lvl+0x73/0xb0
[   16.132419]  print_report+0xd1/0x650
[   16.132445]  ? __virt_addr_valid+0x1db/0x2d0
[   16.132471]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.132502]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.132529]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.132560]  kasan_report+0x141/0x180
[   16.132586]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.132623]  kasan_check_range+0x10c/0x1c0
[   16.132670]  __kasan_check_write+0x18/0x20
[   16.132697]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.132731]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.132765]  ? ret_from_fork_asm+0x1a/0x30
[   16.132791]  ? kthread+0x337/0x6f0
[   16.132821]  kasan_bitops_generic+0x121/0x1c0
[   16.132849]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.132877]  ? __pfx_read_tsc+0x10/0x10
[   16.132903]  ? ktime_get_ts64+0x86/0x230
[   16.132931]  kunit_try_run_case+0x1a5/0x480
[   16.132960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.132986]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.133012]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.133039]  ? __kthread_parkme+0x82/0x180
[   16.133062]  ? preempt_count_sub+0x50/0x80
[   16.133089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.133117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.133143]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.133170]  kthread+0x337/0x6f0
[   16.133192]  ? trace_preempt_on+0x20/0xc0
[   16.133218]  ? __pfx_kthread+0x10/0x10
[   16.133242]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.133265]  ? calculate_sigpending+0x7b/0xa0
[   16.133293]  ? __pfx_kthread+0x10/0x10
[   16.133318]  ret_from_fork+0x116/0x1d0
[   16.133339]  ? __pfx_kthread+0x10/0x10
[   16.133362]  ret_from_fork_asm+0x1a/0x30
[   16.133397]  </TASK>
[   16.133410] 
[   16.144134] Allocated by task 279:
[   16.144373]  kasan_save_stack+0x45/0x70
[   16.144633]  kasan_save_track+0x18/0x40
[   16.144964]  kasan_save_alloc_info+0x3b/0x50
[   16.145185]  __kasan_kmalloc+0xb7/0xc0
[   16.145364]  __kmalloc_cache_noprof+0x189/0x420
[   16.145618]  kasan_bitops_generic+0x92/0x1c0
[   16.145991]  kunit_try_run_case+0x1a5/0x480
[   16.146219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.146483]  kthread+0x337/0x6f0
[   16.146706]  ret_from_fork+0x116/0x1d0
[   16.146982]  ret_from_fork_asm+0x1a/0x30
[   16.147221] 
[   16.147325] The buggy address belongs to the object at ffff88810267b740
[   16.147325]  which belongs to the cache kmalloc-16 of size 16
[   16.148226] The buggy address is located 8 bytes inside of
[   16.148226]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.148754] 
[   16.148847] The buggy address belongs to the physical page:
[   16.149056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.149452] flags: 0x200000000000000(node=0|zone=2)
[   16.149747] page_type: f5(slab)
[   16.150104] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.150386] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.150678] page dumped because: kasan: bad access detected
[   16.151246] 
[   16.151365] Memory state around the buggy address:
[   16.151641]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.152356]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.153073] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.153337]                                               ^
[   16.153546]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.154200]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.154595] ==================================================================
[   16.341916] ==================================================================
[   16.342230] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.342678] Read of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   16.343184] 
[   16.343297] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.343352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.343367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.343393] Call Trace:
[   16.343415]  <TASK>
[   16.343434]  dump_stack_lvl+0x73/0xb0
[   16.343468]  print_report+0xd1/0x650
[   16.343492]  ? __virt_addr_valid+0x1db/0x2d0
[   16.343520]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.343554]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.343582]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.343615]  kasan_report+0x141/0x180
[   16.343757]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.344049]  __asan_report_load8_noabort+0x18/0x20
[   16.344083]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.344116]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.344180]  ? ret_from_fork_asm+0x1a/0x30
[   16.344208]  ? kthread+0x337/0x6f0
[   16.344239]  kasan_bitops_generic+0x121/0x1c0
[   16.344267]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.344298]  ? __pfx_read_tsc+0x10/0x10
[   16.344323]  ? ktime_get_ts64+0x86/0x230
[   16.344351]  kunit_try_run_case+0x1a5/0x480
[   16.344382]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.344408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.344437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.344464]  ? __kthread_parkme+0x82/0x180
[   16.344487]  ? preempt_count_sub+0x50/0x80
[   16.344516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.344544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.344569]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.344597]  kthread+0x337/0x6f0
[   16.344644]  ? trace_preempt_on+0x20/0xc0
[   16.344685]  ? __pfx_kthread+0x10/0x10
[   16.344710]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.344735]  ? calculate_sigpending+0x7b/0xa0
[   16.344763]  ? __pfx_kthread+0x10/0x10
[   16.344873]  ret_from_fork+0x116/0x1d0
[   16.344898]  ? __pfx_kthread+0x10/0x10
[   16.344922]  ret_from_fork_asm+0x1a/0x30
[   16.344959]  </TASK>
[   16.344972] 
[   16.356580] Allocated by task 279:
[   16.356931]  kasan_save_stack+0x45/0x70
[   16.357195]  kasan_save_track+0x18/0x40
[   16.357440]  kasan_save_alloc_info+0x3b/0x50
[   16.357629]  __kasan_kmalloc+0xb7/0xc0
[   16.358000]  __kmalloc_cache_noprof+0x189/0x420
[   16.358323]  kasan_bitops_generic+0x92/0x1c0
[   16.358604]  kunit_try_run_case+0x1a5/0x480
[   16.359094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.359610]  kthread+0x337/0x6f0
[   16.359881]  ret_from_fork+0x116/0x1d0
[   16.360223]  ret_from_fork_asm+0x1a/0x30
[   16.360487] 
[   16.360608] The buggy address belongs to the object at ffff88810267b740
[   16.360608]  which belongs to the cache kmalloc-16 of size 16
[   16.361330] The buggy address is located 8 bytes inside of
[   16.361330]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.362069] 
[   16.362191] The buggy address belongs to the physical page:
[   16.362451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.362914] flags: 0x200000000000000(node=0|zone=2)
[   16.363452] page_type: f5(slab)
[   16.363610] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.363912] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.364402] page dumped because: kasan: bad access detected
[   16.364902] 
[   16.365022] Memory state around the buggy address:
[   16.365342]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.365747]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.366210] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.366633]                                               ^
[   16.367361]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.367734]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.368121] ==================================================================
[   16.232003] ==================================================================
[   16.232435] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.233215] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   16.233602] 
[   16.233747] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.233803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.233819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.233847] Call Trace:
[   16.233870]  <TASK>
[   16.233894]  dump_stack_lvl+0x73/0xb0
[   16.233928]  print_report+0xd1/0x650
[   16.233955]  ? __virt_addr_valid+0x1db/0x2d0
[   16.233982]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.234015]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.234243]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.234288]  kasan_report+0x141/0x180
[   16.234315]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.234354]  kasan_check_range+0x10c/0x1c0
[   16.234382]  __kasan_check_write+0x18/0x20
[   16.234406]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.234442]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.234475]  ? ret_from_fork_asm+0x1a/0x30
[   16.234501]  ? kthread+0x337/0x6f0
[   16.234531]  kasan_bitops_generic+0x121/0x1c0
[   16.234559]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.234589]  ? __pfx_read_tsc+0x10/0x10
[   16.234613]  ? ktime_get_ts64+0x86/0x230
[   16.234642]  kunit_try_run_case+0x1a5/0x480
[   16.234683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.234710]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.234928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.234957]  ? __kthread_parkme+0x82/0x180
[   16.234982]  ? preempt_count_sub+0x50/0x80
[   16.235010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.235039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.235067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.235094]  kthread+0x337/0x6f0
[   16.235117]  ? trace_preempt_on+0x20/0xc0
[   16.235144]  ? __pfx_kthread+0x10/0x10
[   16.235168]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.235193]  ? calculate_sigpending+0x7b/0xa0
[   16.235221]  ? __pfx_kthread+0x10/0x10
[   16.235247]  ret_from_fork+0x116/0x1d0
[   16.235269]  ? __pfx_kthread+0x10/0x10
[   16.235293]  ret_from_fork_asm+0x1a/0x30
[   16.235329]  </TASK>
[   16.235343] 
[   16.246719] Allocated by task 279:
[   16.246898]  kasan_save_stack+0x45/0x70
[   16.247146]  kasan_save_track+0x18/0x40
[   16.247377]  kasan_save_alloc_info+0x3b/0x50
[   16.247774]  __kasan_kmalloc+0xb7/0xc0
[   16.248185]  __kmalloc_cache_noprof+0x189/0x420
[   16.248385]  kasan_bitops_generic+0x92/0x1c0
[   16.248638]  kunit_try_run_case+0x1a5/0x480
[   16.248991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.249304]  kthread+0x337/0x6f0
[   16.249454]  ret_from_fork+0x116/0x1d0
[   16.249616]  ret_from_fork_asm+0x1a/0x30
[   16.250063] 
[   16.250356] The buggy address belongs to the object at ffff88810267b740
[   16.250356]  which belongs to the cache kmalloc-16 of size 16
[   16.251048] The buggy address is located 8 bytes inside of
[   16.251048]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.251609] 
[   16.251769] The buggy address belongs to the physical page:
[   16.251991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.252893] flags: 0x200000000000000(node=0|zone=2)
[   16.253189] page_type: f5(slab)
[   16.253359] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.253782] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.254404] page dumped because: kasan: bad access detected
[   16.254777] 
[   16.254873] Memory state around the buggy address:
[   16.255228]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.255528]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.255939] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.256340]                                               ^
[   16.256621]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.257098]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.257611] ==================================================================
[   16.206272] ==================================================================
[   16.206616] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.207216] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   16.207896] 
[   16.208015] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.208072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.208088] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.208116] Call Trace:
[   16.208138]  <TASK>
[   16.208160]  dump_stack_lvl+0x73/0xb0
[   16.208195]  print_report+0xd1/0x650
[   16.208221]  ? __virt_addr_valid+0x1db/0x2d0
[   16.208249]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.208282]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.208308]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.208341]  kasan_report+0x141/0x180
[   16.208368]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.208407]  kasan_check_range+0x10c/0x1c0
[   16.208434]  __kasan_check_write+0x18/0x20
[   16.208458]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.208491]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.208526]  ? ret_from_fork_asm+0x1a/0x30
[   16.208552]  ? kthread+0x337/0x6f0
[   16.208582]  kasan_bitops_generic+0x121/0x1c0
[   16.208610]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.208640]  ? __pfx_read_tsc+0x10/0x10
[   16.208708]  ? ktime_get_ts64+0x86/0x230
[   16.208739]  kunit_try_run_case+0x1a5/0x480
[   16.208768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.208795]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.208823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.208850]  ? __kthread_parkme+0x82/0x180
[   16.208873]  ? preempt_count_sub+0x50/0x80
[   16.208900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.208929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.208955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.208998]  kthread+0x337/0x6f0
[   16.209021]  ? trace_preempt_on+0x20/0xc0
[   16.209048]  ? __pfx_kthread+0x10/0x10
[   16.209072]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.209098]  ? calculate_sigpending+0x7b/0xa0
[   16.209126]  ? __pfx_kthread+0x10/0x10
[   16.209152]  ret_from_fork+0x116/0x1d0
[   16.209173]  ? __pfx_kthread+0x10/0x10
[   16.209198]  ret_from_fork_asm+0x1a/0x30
[   16.209235]  </TASK>
[   16.209249] 
[   16.220455] Allocated by task 279:
[   16.220700]  kasan_save_stack+0x45/0x70
[   16.221104]  kasan_save_track+0x18/0x40
[   16.221291]  kasan_save_alloc_info+0x3b/0x50
[   16.221500]  __kasan_kmalloc+0xb7/0xc0
[   16.221763]  __kmalloc_cache_noprof+0x189/0x420
[   16.221983]  kasan_bitops_generic+0x92/0x1c0
[   16.222204]  kunit_try_run_case+0x1a5/0x480
[   16.222778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.223141]  kthread+0x337/0x6f0
[   16.223331]  ret_from_fork+0x116/0x1d0
[   16.223551]  ret_from_fork_asm+0x1a/0x30
[   16.223734] 
[   16.223823] The buggy address belongs to the object at ffff88810267b740
[   16.223823]  which belongs to the cache kmalloc-16 of size 16
[   16.224813] The buggy address is located 8 bytes inside of
[   16.224813]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.225427] 
[   16.225621] The buggy address belongs to the physical page:
[   16.226176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.226479] flags: 0x200000000000000(node=0|zone=2)
[   16.226890] page_type: f5(slab)
[   16.227108] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.227533] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.228091] page dumped because: kasan: bad access detected
[   16.228367] 
[   16.228489] Memory state around the buggy address:
[   16.228767]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.229208]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.229475] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.230198]                                               ^
[   16.230529]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.231064]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.231400] ==================================================================
[   16.258134] ==================================================================
[   16.258559] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.259342] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   16.259884] 
[   16.260061] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.260121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.260138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.260165] Call Trace:
[   16.260189]  <TASK>
[   16.260211]  dump_stack_lvl+0x73/0xb0
[   16.260247]  print_report+0xd1/0x650
[   16.260274]  ? __virt_addr_valid+0x1db/0x2d0
[   16.260302]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.260335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.260363]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.260396]  kasan_report+0x141/0x180
[   16.260423]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.260462]  kasan_check_range+0x10c/0x1c0
[   16.260492]  __kasan_check_write+0x18/0x20
[   16.260515]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.260549]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.260583]  ? ret_from_fork_asm+0x1a/0x30
[   16.260609]  ? kthread+0x337/0x6f0
[   16.260639]  kasan_bitops_generic+0x121/0x1c0
[   16.260682]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.260712]  ? __pfx_read_tsc+0x10/0x10
[   16.260737]  ? ktime_get_ts64+0x86/0x230
[   16.260767]  kunit_try_run_case+0x1a5/0x480
[   16.260916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.260943]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.260971]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.260999]  ? __kthread_parkme+0x82/0x180
[   16.261024]  ? preempt_count_sub+0x50/0x80
[   16.261052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.261081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.261108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.261136]  kthread+0x337/0x6f0
[   16.261159]  ? trace_preempt_on+0x20/0xc0
[   16.261188]  ? __pfx_kthread+0x10/0x10
[   16.261212]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.261237]  ? calculate_sigpending+0x7b/0xa0
[   16.261265]  ? __pfx_kthread+0x10/0x10
[   16.261291]  ret_from_fork+0x116/0x1d0
[   16.261312]  ? __pfx_kthread+0x10/0x10
[   16.261339]  ret_from_fork_asm+0x1a/0x30
[   16.261374]  </TASK>
[   16.261388] 
[   16.272728] Allocated by task 279:
[   16.272996]  kasan_save_stack+0x45/0x70
[   16.273388]  kasan_save_track+0x18/0x40
[   16.273591]  kasan_save_alloc_info+0x3b/0x50
[   16.273786]  __kasan_kmalloc+0xb7/0xc0
[   16.273961]  __kmalloc_cache_noprof+0x189/0x420
[   16.274224]  kasan_bitops_generic+0x92/0x1c0
[   16.274612]  kunit_try_run_case+0x1a5/0x480
[   16.275187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.275487]  kthread+0x337/0x6f0
[   16.275738]  ret_from_fork+0x116/0x1d0
[   16.275909]  ret_from_fork_asm+0x1a/0x30
[   16.276307] 
[   16.276463] The buggy address belongs to the object at ffff88810267b740
[   16.276463]  which belongs to the cache kmalloc-16 of size 16
[   16.277060] The buggy address is located 8 bytes inside of
[   16.277060]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.277583] 
[   16.277754] The buggy address belongs to the physical page:
[   16.278073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.278536] flags: 0x200000000000000(node=0|zone=2)
[   16.279062] page_type: f5(slab)
[   16.279511] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.279902] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.280177] page dumped because: kasan: bad access detected
[   16.280586] 
[   16.280809] Memory state around the buggy address:
[   16.281142]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.281467]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.281754] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.282005]                                               ^
[   16.282207]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.282470]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.283159] ==================================================================
[   16.155198] ==================================================================
[   16.155572] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.156078] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   16.156853] 
[   16.157008] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.157065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.157081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.157107] Call Trace:
[   16.157129]  <TASK>
[   16.157152]  dump_stack_lvl+0x73/0xb0
[   16.157186]  print_report+0xd1/0x650
[   16.157211]  ? __virt_addr_valid+0x1db/0x2d0
[   16.157237]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.157269]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.157295]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.157327]  kasan_report+0x141/0x180
[   16.157352]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.157389]  kasan_check_range+0x10c/0x1c0
[   16.157416]  __kasan_check_write+0x18/0x20
[   16.157440]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.157472]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.157504]  ? ret_from_fork_asm+0x1a/0x30
[   16.157530]  ? kthread+0x337/0x6f0
[   16.157559]  kasan_bitops_generic+0x121/0x1c0
[   16.157586]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.157614]  ? __pfx_read_tsc+0x10/0x10
[   16.157639]  ? ktime_get_ts64+0x86/0x230
[   16.157684]  kunit_try_run_case+0x1a5/0x480
[   16.157713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.157739]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.157767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.157793]  ? __kthread_parkme+0x82/0x180
[   16.157815]  ? preempt_count_sub+0x50/0x80
[   16.157844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.157870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.157897]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.157924]  kthread+0x337/0x6f0
[   16.157946]  ? trace_preempt_on+0x20/0xc0
[   16.157973]  ? __pfx_kthread+0x10/0x10
[   16.157997]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.158022]  ? calculate_sigpending+0x7b/0xa0
[   16.158050]  ? __pfx_kthread+0x10/0x10
[   16.158075]  ret_from_fork+0x116/0x1d0
[   16.158097]  ? __pfx_kthread+0x10/0x10
[   16.158121]  ret_from_fork_asm+0x1a/0x30
[   16.158156]  </TASK>
[   16.158168] 
[   16.169070] Allocated by task 279:
[   16.169256]  kasan_save_stack+0x45/0x70
[   16.169491]  kasan_save_track+0x18/0x40
[   16.169672]  kasan_save_alloc_info+0x3b/0x50
[   16.170098]  __kasan_kmalloc+0xb7/0xc0
[   16.170336]  __kmalloc_cache_noprof+0x189/0x420
[   16.170610]  kasan_bitops_generic+0x92/0x1c0
[   16.170963]  kunit_try_run_case+0x1a5/0x480
[   16.171151]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.171361]  kthread+0x337/0x6f0
[   16.171559]  ret_from_fork+0x116/0x1d0
[   16.171774]  ret_from_fork_asm+0x1a/0x30
[   16.172013] 
[   16.172126] The buggy address belongs to the object at ffff88810267b740
[   16.172126]  which belongs to the cache kmalloc-16 of size 16
[   16.172772] The buggy address is located 8 bytes inside of
[   16.172772]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.173279] 
[   16.173673] The buggy address belongs to the physical page:
[   16.174014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.174457] flags: 0x200000000000000(node=0|zone=2)
[   16.174977] page_type: f5(slab)
[   16.175168] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.175479] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.175845] page dumped because: kasan: bad access detected
[   16.176161] 
[   16.176414] Memory state around the buggy address:
[   16.176707]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.177275]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.177614] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.177888]                                               ^
[   16.178100]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.178744]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.179131] ==================================================================