Hay
Date
July 12, 2025, 11:09 a.m.

Environment
qemu-x86_64

[   14.913537] ==================================================================
[   14.914215] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.914689] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.915344] 
[   14.915573] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.915622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.915634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.915821] Call Trace:
[   14.915842]  <TASK>
[   14.915857]  dump_stack_lvl+0x73/0xb0
[   14.915887]  print_report+0xd1/0x650
[   14.915909]  ? __virt_addr_valid+0x1db/0x2d0
[   14.915932]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.915961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.915985]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.916014]  kasan_report+0x141/0x180
[   14.916035]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.916069]  kasan_check_range+0x10c/0x1c0
[   14.916093]  __kasan_check_write+0x18/0x20
[   14.916112]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.916141]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.916172]  ? kasan_save_alloc_info+0x3b/0x50
[   14.916196]  ? kasan_save_stack+0x45/0x70
[   14.916220]  kasan_bitops_generic+0x121/0x1c0
[   14.916244]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.916270]  ? __pfx_read_tsc+0x10/0x10
[   14.916290]  ? ktime_get_ts64+0x86/0x230
[   14.916314]  kunit_try_run_case+0x1a5/0x480
[   14.916337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.916360]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.916384]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.916408]  ? __kthread_parkme+0x82/0x180
[   14.916428]  ? preempt_count_sub+0x50/0x80
[   14.916451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.916476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.916500]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.916525]  kthread+0x337/0x6f0
[   14.916544]  ? trace_preempt_on+0x20/0xc0
[   14.916568]  ? __pfx_kthread+0x10/0x10
[   14.916588]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.916611]  ? calculate_sigpending+0x7b/0xa0
[   14.916634]  ? __pfx_kthread+0x10/0x10
[   14.916675]  ret_from_fork+0x116/0x1d0
[   14.916696]  ? __pfx_kthread+0x10/0x10
[   14.916717]  ret_from_fork_asm+0x1a/0x30
[   14.916759]  </TASK>
[   14.916768] 
[   14.929766] Allocated by task 279:
[   14.930373]  kasan_save_stack+0x45/0x70
[   14.930735]  kasan_save_track+0x18/0x40
[   14.930918]  kasan_save_alloc_info+0x3b/0x50
[   14.931319]  __kasan_kmalloc+0xb7/0xc0
[   14.931504]  __kmalloc_cache_noprof+0x189/0x420
[   14.932002]  kasan_bitops_generic+0x92/0x1c0
[   14.932220]  kunit_try_run_case+0x1a5/0x480
[   14.932501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.932992]  kthread+0x337/0x6f0
[   14.933278]  ret_from_fork+0x116/0x1d0
[   14.933556]  ret_from_fork_asm+0x1a/0x30
[   14.933970] 
[   14.934162] The buggy address belongs to the object at ffff888102894300
[   14.934162]  which belongs to the cache kmalloc-16 of size 16
[   14.935140] The buggy address is located 8 bytes inside of
[   14.935140]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   14.935620] 
[   14.935967] The buggy address belongs to the physical page:
[   14.936218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   14.936531] flags: 0x200000000000000(node=0|zone=2)
[   14.937035] page_type: f5(slab)
[   14.937297] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.937900] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.938251] page dumped because: kasan: bad access detected
[   14.938575] 
[   14.938856] Memory state around the buggy address:
[   14.939073]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.939471]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.940124] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.940524]                       ^
[   14.940911]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.941322]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.941718] ==================================================================
[   14.857265] ==================================================================
[   14.857577] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.858075] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.859008] 
[   14.859315] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.859362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.859375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.859395] Call Trace:
[   14.859413]  <TASK>
[   14.859429]  dump_stack_lvl+0x73/0xb0
[   14.859461]  print_report+0xd1/0x650
[   14.859485]  ? __virt_addr_valid+0x1db/0x2d0
[   14.859508]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.859537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.859562]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.859591]  kasan_report+0x141/0x180
[   14.859613]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.859666]  kasan_check_range+0x10c/0x1c0
[   14.859691]  __kasan_check_write+0x18/0x20
[   14.859711]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.859740]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.859785]  ? kasan_save_alloc_info+0x3b/0x50
[   14.859809]  ? kasan_save_stack+0x45/0x70
[   14.859833]  kasan_bitops_generic+0x121/0x1c0
[   14.859858]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.859884]  ? __pfx_read_tsc+0x10/0x10
[   14.859905]  ? ktime_get_ts64+0x86/0x230
[   14.859930]  kunit_try_run_case+0x1a5/0x480
[   14.859954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.859977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.860002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.860027]  ? __kthread_parkme+0x82/0x180
[   14.860047]  ? preempt_count_sub+0x50/0x80
[   14.860070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.860095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.860120]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.860144]  kthread+0x337/0x6f0
[   14.860164]  ? trace_preempt_on+0x20/0xc0
[   14.860188]  ? __pfx_kthread+0x10/0x10
[   14.860210]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.860232]  ? calculate_sigpending+0x7b/0xa0
[   14.860257]  ? __pfx_kthread+0x10/0x10
[   14.860279]  ret_from_fork+0x116/0x1d0
[   14.860297]  ? __pfx_kthread+0x10/0x10
[   14.860318]  ret_from_fork_asm+0x1a/0x30
[   14.860349]  </TASK>
[   14.860360] 
[   14.873483] Allocated by task 279:
[   14.873625]  kasan_save_stack+0x45/0x70
[   14.874100]  kasan_save_track+0x18/0x40
[   14.874373]  kasan_save_alloc_info+0x3b/0x50
[   14.874672]  __kasan_kmalloc+0xb7/0xc0
[   14.875046]  __kmalloc_cache_noprof+0x189/0x420
[   14.875353]  kasan_bitops_generic+0x92/0x1c0
[   14.875558]  kunit_try_run_case+0x1a5/0x480
[   14.876092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.876336]  kthread+0x337/0x6f0
[   14.876601]  ret_from_fork+0x116/0x1d0
[   14.877047]  ret_from_fork_asm+0x1a/0x30
[   14.877251] 
[   14.877346] The buggy address belongs to the object at ffff888102894300
[   14.877346]  which belongs to the cache kmalloc-16 of size 16
[   14.878282] The buggy address is located 8 bytes inside of
[   14.878282]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   14.879125] 
[   14.879232] The buggy address belongs to the physical page:
[   14.879439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   14.880002] flags: 0x200000000000000(node=0|zone=2)
[   14.880334] page_type: f5(slab)
[   14.880590] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.881223] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.881732] page dumped because: kasan: bad access detected
[   14.881942] 
[   14.882215] Memory state around the buggy address:
[   14.882553]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.882970]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.883278] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.883842]                       ^
[   14.884145]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.884475]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.884869] ==================================================================
[   15.051178] ==================================================================
[   15.051623] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.052118] Read of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   15.052403] 
[   15.052527] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.052579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.052591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.052611] Call Trace:
[   15.052704]  <TASK>
[   15.052725]  dump_stack_lvl+0x73/0xb0
[   15.052767]  print_report+0xd1/0x650
[   15.052790]  ? __virt_addr_valid+0x1db/0x2d0
[   15.052813]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.052843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.052868]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.052897]  kasan_report+0x141/0x180
[   15.052929]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.052962]  __asan_report_load8_noabort+0x18/0x20
[   15.052999]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.053037]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.053069]  ? kasan_save_alloc_info+0x3b/0x50
[   15.053103]  ? kasan_save_stack+0x45/0x70
[   15.053127]  kasan_bitops_generic+0x121/0x1c0
[   15.053150]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.053176]  ? __pfx_read_tsc+0x10/0x10
[   15.053197]  ? ktime_get_ts64+0x86/0x230
[   15.053223]  kunit_try_run_case+0x1a5/0x480
[   15.053257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.053281]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.053307]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.053342]  ? __kthread_parkme+0x82/0x180
[   15.053362]  ? preempt_count_sub+0x50/0x80
[   15.053386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.053410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.053435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.053469]  kthread+0x337/0x6f0
[   15.053488]  ? trace_preempt_on+0x20/0xc0
[   15.053512]  ? __pfx_kthread+0x10/0x10
[   15.053543]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.053565]  ? calculate_sigpending+0x7b/0xa0
[   15.053589]  ? __pfx_kthread+0x10/0x10
[   15.053610]  ret_from_fork+0x116/0x1d0
[   15.053689]  ? __pfx_kthread+0x10/0x10
[   15.053714]  ret_from_fork_asm+0x1a/0x30
[   15.053756]  </TASK>
[   15.053767] 
[   15.066980] Allocated by task 279:
[   15.067309]  kasan_save_stack+0x45/0x70
[   15.067696]  kasan_save_track+0x18/0x40
[   15.068182]  kasan_save_alloc_info+0x3b/0x50
[   15.068697]  __kasan_kmalloc+0xb7/0xc0
[   15.069093]  __kmalloc_cache_noprof+0x189/0x420
[   15.069280]  kasan_bitops_generic+0x92/0x1c0
[   15.069762]  kunit_try_run_case+0x1a5/0x480
[   15.070150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.070332]  kthread+0x337/0x6f0
[   15.070625]  ret_from_fork+0x116/0x1d0
[   15.071067]  ret_from_fork_asm+0x1a/0x30
[   15.071548] 
[   15.071762] The buggy address belongs to the object at ffff888102894300
[   15.071762]  which belongs to the cache kmalloc-16 of size 16
[   15.072317] The buggy address is located 8 bytes inside of
[   15.072317]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   15.072692] 
[   15.072787] The buggy address belongs to the physical page:
[   15.073384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   15.073733] flags: 0x200000000000000(node=0|zone=2)
[   15.074158] page_type: f5(slab)
[   15.074353] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.074666] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.075042] page dumped because: kasan: bad access detected
[   15.075349] 
[   15.075442] Memory state around the buggy address:
[   15.075667]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.076110]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.076392] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.076906]                       ^
[   15.077088]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.077477]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.077920] ==================================================================
[   14.885501] ==================================================================
[   14.886230] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.886646] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.887369] 
[   14.887591] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.887805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.887824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.887844] Call Trace:
[   14.887859]  <TASK>
[   14.887875]  dump_stack_lvl+0x73/0xb0
[   14.887906]  print_report+0xd1/0x650
[   14.887927]  ? __virt_addr_valid+0x1db/0x2d0
[   14.887951]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.887981]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.888005]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.888035]  kasan_report+0x141/0x180
[   14.888056]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.888090]  kasan_check_range+0x10c/0x1c0
[   14.888114]  __kasan_check_write+0x18/0x20
[   14.888133]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.888162]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.888195]  ? kasan_save_alloc_info+0x3b/0x50
[   14.888218]  ? kasan_save_stack+0x45/0x70
[   14.888242]  kasan_bitops_generic+0x121/0x1c0
[   14.888265]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.888291]  ? __pfx_read_tsc+0x10/0x10
[   14.888311]  ? ktime_get_ts64+0x86/0x230
[   14.888336]  kunit_try_run_case+0x1a5/0x480
[   14.888359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.888383]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.888407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.888431]  ? __kthread_parkme+0x82/0x180
[   14.888451]  ? preempt_count_sub+0x50/0x80
[   14.888475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.888500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.888524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.888550]  kthread+0x337/0x6f0
[   14.888569]  ? trace_preempt_on+0x20/0xc0
[   14.888592]  ? __pfx_kthread+0x10/0x10
[   14.888613]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.888634]  ? calculate_sigpending+0x7b/0xa0
[   14.888722]  ? __pfx_kthread+0x10/0x10
[   14.888743]  ret_from_fork+0x116/0x1d0
[   14.888774]  ? __pfx_kthread+0x10/0x10
[   14.888794]  ret_from_fork_asm+0x1a/0x30
[   14.888825]  </TASK>
[   14.888836] 
[   14.901205] Allocated by task 279:
[   14.901526]  kasan_save_stack+0x45/0x70
[   14.901951]  kasan_save_track+0x18/0x40
[   14.902262]  kasan_save_alloc_info+0x3b/0x50
[   14.902482]  __kasan_kmalloc+0xb7/0xc0
[   14.903144]  __kmalloc_cache_noprof+0x189/0x420
[   14.903361]  kasan_bitops_generic+0x92/0x1c0
[   14.903645]  kunit_try_run_case+0x1a5/0x480
[   14.903979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.904235]  kthread+0x337/0x6f0
[   14.904395]  ret_from_fork+0x116/0x1d0
[   14.904533]  ret_from_fork_asm+0x1a/0x30
[   14.905118] 
[   14.905218] The buggy address belongs to the object at ffff888102894300
[   14.905218]  which belongs to the cache kmalloc-16 of size 16
[   14.906066] The buggy address is located 8 bytes inside of
[   14.906066]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   14.906945] 
[   14.907058] The buggy address belongs to the physical page:
[   14.907263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   14.907868] flags: 0x200000000000000(node=0|zone=2)
[   14.908264] page_type: f5(slab)
[   14.908466] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.909138] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.909611] page dumped because: kasan: bad access detected
[   14.910002] 
[   14.910107] Memory state around the buggy address:
[   14.910326]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.910595]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.911203] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.911568]                       ^
[   14.912048]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.912375]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.912664] ==================================================================
[   14.970557] ==================================================================
[   14.970809] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.972350] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.972596] 
[   14.972693] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.972738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.972761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.972781] Call Trace:
[   14.972796]  <TASK>
[   14.973280]  dump_stack_lvl+0x73/0xb0
[   14.973321]  print_report+0xd1/0x650
[   14.973352]  ? __virt_addr_valid+0x1db/0x2d0
[   14.973375]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.973416]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.973456]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.973485]  kasan_report+0x141/0x180
[   14.973507]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.973541]  kasan_check_range+0x10c/0x1c0
[   14.973566]  __kasan_check_write+0x18/0x20
[   14.973585]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.973614]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.973655]  ? kasan_save_alloc_info+0x3b/0x50
[   14.973696]  ? kasan_save_stack+0x45/0x70
[   14.973719]  kasan_bitops_generic+0x121/0x1c0
[   14.973743]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.973778]  ? __pfx_read_tsc+0x10/0x10
[   14.973799]  ? ktime_get_ts64+0x86/0x230
[   14.973823]  kunit_try_run_case+0x1a5/0x480
[   14.973847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.973870]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.973894]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.973918]  ? __kthread_parkme+0x82/0x180
[   14.973939]  ? preempt_count_sub+0x50/0x80
[   14.973962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.973987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.974011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.974036]  kthread+0x337/0x6f0
[   14.974055]  ? trace_preempt_on+0x20/0xc0
[   14.974078]  ? __pfx_kthread+0x10/0x10
[   14.974099]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.974121]  ? calculate_sigpending+0x7b/0xa0
[   14.974145]  ? __pfx_kthread+0x10/0x10
[   14.974166]  ret_from_fork+0x116/0x1d0
[   14.974184]  ? __pfx_kthread+0x10/0x10
[   14.974205]  ret_from_fork_asm+0x1a/0x30
[   14.974234]  </TASK>
[   14.974245] 
[   14.983644] Allocated by task 279:
[   14.983831]  kasan_save_stack+0x45/0x70
[   14.984032]  kasan_save_track+0x18/0x40
[   14.984226]  kasan_save_alloc_info+0x3b/0x50
[   14.984425]  __kasan_kmalloc+0xb7/0xc0
[   14.984594]  __kmalloc_cache_noprof+0x189/0x420
[   14.984831]  kasan_bitops_generic+0x92/0x1c0
[   14.985029]  kunit_try_run_case+0x1a5/0x480
[   14.985175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.985350]  kthread+0x337/0x6f0
[   14.985494]  ret_from_fork+0x116/0x1d0
[   14.985694]  ret_from_fork_asm+0x1a/0x30
[   14.986124] 
[   14.986244] The buggy address belongs to the object at ffff888102894300
[   14.986244]  which belongs to the cache kmalloc-16 of size 16
[   14.986642] The buggy address is located 8 bytes inside of
[   14.986642]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   14.987208] 
[   14.987294] The buggy address belongs to the physical page:
[   14.987524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   14.987917] flags: 0x200000000000000(node=0|zone=2)
[   14.988126] page_type: f5(slab)
[   14.988248] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.988528] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.989184] page dumped because: kasan: bad access detected
[   14.989448] 
[   14.989545] Memory state around the buggy address:
[   14.989879]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.990190]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.990472] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.990840]                       ^
[   14.990968]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.991186]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.991400] ==================================================================
[   14.992029] ==================================================================
[   14.992374] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.992885] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.993114] 
[   14.993197] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.993238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.993250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.993269] Call Trace:
[   14.993284]  <TASK>
[   14.993298]  dump_stack_lvl+0x73/0xb0
[   14.993326]  print_report+0xd1/0x650
[   14.993349]  ? __virt_addr_valid+0x1db/0x2d0
[   14.993371]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.993401]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.993425]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.993455]  kasan_report+0x141/0x180
[   14.993478]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.993512]  kasan_check_range+0x10c/0x1c0
[   14.993535]  __kasan_check_write+0x18/0x20
[   14.993555]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.993584]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.993615]  ? kasan_save_alloc_info+0x3b/0x50
[   14.993638]  ? kasan_save_stack+0x45/0x70
[   14.993718]  kasan_bitops_generic+0x121/0x1c0
[   14.993757]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.993783]  ? __pfx_read_tsc+0x10/0x10
[   14.993803]  ? ktime_get_ts64+0x86/0x230
[   14.993827]  kunit_try_run_case+0x1a5/0x480
[   14.993851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.993873]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.993898]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.993921]  ? __kthread_parkme+0x82/0x180
[   14.993941]  ? preempt_count_sub+0x50/0x80
[   14.993965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.993989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.994014]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.994040]  kthread+0x337/0x6f0
[   14.994059]  ? trace_preempt_on+0x20/0xc0
[   14.994082]  ? __pfx_kthread+0x10/0x10
[   14.994103]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.994124]  ? calculate_sigpending+0x7b/0xa0
[   14.994147]  ? __pfx_kthread+0x10/0x10
[   14.994168]  ret_from_fork+0x116/0x1d0
[   14.994186]  ? __pfx_kthread+0x10/0x10
[   14.994207]  ret_from_fork_asm+0x1a/0x30
[   14.994236]  </TASK>
[   14.994247] 
[   15.002473] Allocated by task 279:
[   15.002640]  kasan_save_stack+0x45/0x70
[   15.002875]  kasan_save_track+0x18/0x40
[   15.003069]  kasan_save_alloc_info+0x3b/0x50
[   15.003285]  __kasan_kmalloc+0xb7/0xc0
[   15.003454]  __kmalloc_cache_noprof+0x189/0x420
[   15.003708]  kasan_bitops_generic+0x92/0x1c0
[   15.003917]  kunit_try_run_case+0x1a5/0x480
[   15.004086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.004344]  kthread+0x337/0x6f0
[   15.004487]  ret_from_fork+0x116/0x1d0
[   15.004719]  ret_from_fork_asm+0x1a/0x30
[   15.004994] 
[   15.005080] The buggy address belongs to the object at ffff888102894300
[   15.005080]  which belongs to the cache kmalloc-16 of size 16
[   15.005487] The buggy address is located 8 bytes inside of
[   15.005487]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   15.006052] 
[   15.006121] The buggy address belongs to the physical page:
[   15.006289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   15.006529] flags: 0x200000000000000(node=0|zone=2)
[   15.006687] page_type: f5(slab)
[   15.006911] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.007254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.007586] page dumped because: kasan: bad access detected
[   15.008054] 
[   15.008147] Memory state around the buggy address:
[   15.008827]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.009070]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.009285] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.009496]                       ^
[   15.009714]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.010051]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.010372] ==================================================================
[   14.942227] ==================================================================
[   14.942468] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.943529] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.944098] 
[   14.944412] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.944463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.944475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.944495] Call Trace:
[   14.944512]  <TASK>
[   14.944528]  dump_stack_lvl+0x73/0xb0
[   14.944558]  print_report+0xd1/0x650
[   14.944582]  ? __virt_addr_valid+0x1db/0x2d0
[   14.944606]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.944635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.944725]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.944768]  kasan_report+0x141/0x180
[   14.944792]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.944826]  kasan_check_range+0x10c/0x1c0
[   14.944849]  __kasan_check_write+0x18/0x20
[   14.944869]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.944898]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.944930]  ? kasan_save_alloc_info+0x3b/0x50
[   14.944954]  ? kasan_save_stack+0x45/0x70
[   14.944977]  kasan_bitops_generic+0x121/0x1c0
[   14.945001]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.945027]  ? __pfx_read_tsc+0x10/0x10
[   14.945048]  ? ktime_get_ts64+0x86/0x230
[   14.945074]  kunit_try_run_case+0x1a5/0x480
[   14.945098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.945122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.945148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.945173]  ? __kthread_parkme+0x82/0x180
[   14.945192]  ? preempt_count_sub+0x50/0x80
[   14.945216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.945241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.945266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.945293]  kthread+0x337/0x6f0
[   14.945312]  ? trace_preempt_on+0x20/0xc0
[   14.945336]  ? __pfx_kthread+0x10/0x10
[   14.945357]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.945379]  ? calculate_sigpending+0x7b/0xa0
[   14.945403]  ? __pfx_kthread+0x10/0x10
[   14.945425]  ret_from_fork+0x116/0x1d0
[   14.945444]  ? __pfx_kthread+0x10/0x10
[   14.945464]  ret_from_fork_asm+0x1a/0x30
[   14.945495]  </TASK>
[   14.945506] 
[   14.958178] Allocated by task 279:
[   14.958364]  kasan_save_stack+0x45/0x70
[   14.958568]  kasan_save_track+0x18/0x40
[   14.959169]  kasan_save_alloc_info+0x3b/0x50
[   14.959375]  __kasan_kmalloc+0xb7/0xc0
[   14.959632]  __kmalloc_cache_noprof+0x189/0x420
[   14.960100]  kasan_bitops_generic+0x92/0x1c0
[   14.960538]  kunit_try_run_case+0x1a5/0x480
[   14.960891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.961224]  kthread+0x337/0x6f0
[   14.961389]  ret_from_fork+0x116/0x1d0
[   14.961564]  ret_from_fork_asm+0x1a/0x30
[   14.961801] 
[   14.962282] The buggy address belongs to the object at ffff888102894300
[   14.962282]  which belongs to the cache kmalloc-16 of size 16
[   14.962973] The buggy address is located 8 bytes inside of
[   14.962973]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   14.963780] 
[   14.963889] The buggy address belongs to the physical page:
[   14.964123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   14.964435] flags: 0x200000000000000(node=0|zone=2)
[   14.964668] page_type: f5(slab)
[   14.965261] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.965578] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.966248] page dumped because: kasan: bad access detected
[   14.966613] 
[   14.966876] Memory state around the buggy address:
[   14.967199]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.967611]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.968254] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.968623]                       ^
[   14.969086]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.969515]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.970087] ==================================================================
[   15.030100] ==================================================================
[   15.030445] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.031317] Read of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   15.031726] 
[   15.031839] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.031879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.031890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.031910] Call Trace:
[   15.031925]  <TASK>
[   15.031940]  dump_stack_lvl+0x73/0xb0
[   15.031969]  print_report+0xd1/0x650
[   15.031991]  ? __virt_addr_valid+0x1db/0x2d0
[   15.032013]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.032043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.032066]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.032096]  kasan_report+0x141/0x180
[   15.032118]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.032152]  kasan_check_range+0x10c/0x1c0
[   15.032176]  __kasan_check_read+0x15/0x20
[   15.032195]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.032224]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.032255]  ? kasan_save_alloc_info+0x3b/0x50
[   15.032278]  ? kasan_save_stack+0x45/0x70
[   15.032301]  kasan_bitops_generic+0x121/0x1c0
[   15.032326]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.032351]  ? __pfx_read_tsc+0x10/0x10
[   15.032372]  ? ktime_get_ts64+0x86/0x230
[   15.032397]  kunit_try_run_case+0x1a5/0x480
[   15.032421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.032444]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.032468]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.032493]  ? __kthread_parkme+0x82/0x180
[   15.032513]  ? preempt_count_sub+0x50/0x80
[   15.032535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.032560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.032585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.032610]  kthread+0x337/0x6f0
[   15.032629]  ? trace_preempt_on+0x20/0xc0
[   15.032714]  ? __pfx_kthread+0x10/0x10
[   15.032735]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.032770]  ? calculate_sigpending+0x7b/0xa0
[   15.032795]  ? __pfx_kthread+0x10/0x10
[   15.032815]  ret_from_fork+0x116/0x1d0
[   15.032834]  ? __pfx_kthread+0x10/0x10
[   15.032855]  ret_from_fork_asm+0x1a/0x30
[   15.032885]  </TASK>
[   15.032895] 
[   15.041489] Allocated by task 279:
[   15.041710]  kasan_save_stack+0x45/0x70
[   15.041892]  kasan_save_track+0x18/0x40
[   15.042052]  kasan_save_alloc_info+0x3b/0x50
[   15.042255]  __kasan_kmalloc+0xb7/0xc0
[   15.042438]  __kmalloc_cache_noprof+0x189/0x420
[   15.042614]  kasan_bitops_generic+0x92/0x1c0
[   15.042771]  kunit_try_run_case+0x1a5/0x480
[   15.042918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.043093]  kthread+0x337/0x6f0
[   15.043213]  ret_from_fork+0x116/0x1d0
[   15.043344]  ret_from_fork_asm+0x1a/0x30
[   15.043481] 
[   15.043549] The buggy address belongs to the object at ffff888102894300
[   15.043549]  which belongs to the cache kmalloc-16 of size 16
[   15.044493] The buggy address is located 8 bytes inside of
[   15.044493]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   15.045019] 
[   15.045112] The buggy address belongs to the physical page:
[   15.045320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   15.045553] flags: 0x200000000000000(node=0|zone=2)
[   15.045710] page_type: f5(slab)
[   15.047035] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.047426] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.047835] page dumped because: kasan: bad access detected
[   15.048086] 
[   15.048183] Memory state around the buggy address:
[   15.048376]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.048603]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.049017] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.049327]                       ^
[   15.049476]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.049857]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.050172] ==================================================================
[   15.010976] ==================================================================
[   15.011292] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.011592] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   15.012125] 
[   15.012211] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.012253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.012265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.012285] Call Trace:
[   15.012298]  <TASK>
[   15.012312]  dump_stack_lvl+0x73/0xb0
[   15.012341]  print_report+0xd1/0x650
[   15.012364]  ? __virt_addr_valid+0x1db/0x2d0
[   15.012388]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.012417]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.012441]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.012471]  kasan_report+0x141/0x180
[   15.012493]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.012526]  kasan_check_range+0x10c/0x1c0
[   15.012550]  __kasan_check_write+0x18/0x20
[   15.012569]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.012598]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.012630]  ? kasan_save_alloc_info+0x3b/0x50
[   15.012653]  ? kasan_save_stack+0x45/0x70
[   15.012677]  kasan_bitops_generic+0x121/0x1c0
[   15.012701]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.012726]  ? __pfx_read_tsc+0x10/0x10
[   15.012759]  ? ktime_get_ts64+0x86/0x230
[   15.012837]  kunit_try_run_case+0x1a5/0x480
[   15.012863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.012887]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.012912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.012938]  ? __kthread_parkme+0x82/0x180
[   15.012958]  ? preempt_count_sub+0x50/0x80
[   15.012984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.013008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.013032]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.013058]  kthread+0x337/0x6f0
[   15.013077]  ? trace_preempt_on+0x20/0xc0
[   15.013101]  ? __pfx_kthread+0x10/0x10
[   15.013121]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.013143]  ? calculate_sigpending+0x7b/0xa0
[   15.013166]  ? __pfx_kthread+0x10/0x10
[   15.013188]  ret_from_fork+0x116/0x1d0
[   15.013206]  ? __pfx_kthread+0x10/0x10
[   15.013227]  ret_from_fork_asm+0x1a/0x30
[   15.013257]  </TASK>
[   15.013267] 
[   15.021620] Allocated by task 279:
[   15.021825]  kasan_save_stack+0x45/0x70
[   15.022028]  kasan_save_track+0x18/0x40
[   15.022220]  kasan_save_alloc_info+0x3b/0x50
[   15.022435]  __kasan_kmalloc+0xb7/0xc0
[   15.022758]  __kmalloc_cache_noprof+0x189/0x420
[   15.022921]  kasan_bitops_generic+0x92/0x1c0
[   15.023096]  kunit_try_run_case+0x1a5/0x480
[   15.023308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.023571]  kthread+0x337/0x6f0
[   15.023893]  ret_from_fork+0x116/0x1d0
[   15.024062]  ret_from_fork_asm+0x1a/0x30
[   15.024225] 
[   15.024295] The buggy address belongs to the object at ffff888102894300
[   15.024295]  which belongs to the cache kmalloc-16 of size 16
[   15.024991] The buggy address is located 8 bytes inside of
[   15.024991]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   15.025487] 
[   15.025573] The buggy address belongs to the physical page:
[   15.025934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   15.026305] flags: 0x200000000000000(node=0|zone=2)
[   15.026603] page_type: f5(slab)
[   15.026757] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.027226] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.027539] page dumped because: kasan: bad access detected
[   15.027834] 
[   15.027938] Memory state around the buggy address:
[   15.028129]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.028411]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.028819] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.029034]                       ^
[   15.029156]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.029371]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.029581] ==================================================================