Hay
Date
July 17, 2025, 11:10 a.m.

Environment
qemu-x86_64

[   15.477205] ==================================================================
[   15.477622] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.477946] Read of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.478249] 
[   15.478351] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.478410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.478421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.478442] Call Trace:
[   15.478455]  <TASK>
[   15.478470]  dump_stack_lvl+0x73/0xb0
[   15.478498]  print_report+0xd1/0x610
[   15.478521]  ? __virt_addr_valid+0x1db/0x2d0
[   15.478543]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.478583]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.478608]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.478638]  kasan_report+0x141/0x180
[   15.478660]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.478695]  __asan_report_load8_noabort+0x18/0x20
[   15.478724]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.478755]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.478795]  kasan_bitops_generic+0x121/0x1c0
[   15.478820]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.478845]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.478876]  kunit_try_run_case+0x1a5/0x480
[   15.478901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.478925]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.478949]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.478975]  ? __kthread_parkme+0x82/0x180
[   15.478996]  ? preempt_count_sub+0x50/0x80
[   15.479021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.479047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.479073]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.479100]  kthread+0x337/0x6f0
[   15.479119]  ? trace_preempt_on+0x20/0xc0
[   15.479143]  ? __pfx_kthread+0x10/0x10
[   15.479164]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.479186]  ? calculate_sigpending+0x7b/0xa0
[   15.479211]  ? __pfx_kthread+0x10/0x10
[   15.479232]  ret_from_fork+0x116/0x1d0
[   15.479251]  ? __pfx_kthread+0x10/0x10
[   15.479272]  ret_from_fork_asm+0x1a/0x30
[   15.479303]  </TASK>
[   15.479313] 
[   15.487357] Allocated by task 278:
[   15.487538]  kasan_save_stack+0x45/0x70
[   15.487909]  kasan_save_track+0x18/0x40
[   15.488067]  kasan_save_alloc_info+0x3b/0x50
[   15.488221]  __kasan_kmalloc+0xb7/0xc0
[   15.488416]  __kmalloc_cache_noprof+0x189/0x420
[   15.488658]  kasan_bitops_generic+0x92/0x1c0
[   15.488882]  kunit_try_run_case+0x1a5/0x480
[   15.489089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.489404]  kthread+0x337/0x6f0
[   15.489572]  ret_from_fork+0x116/0x1d0
[   15.489750]  ret_from_fork_asm+0x1a/0x30
[   15.489954] 
[   15.490030] The buggy address belongs to the object at ffff888101679da0
[   15.490030]  which belongs to the cache kmalloc-16 of size 16
[   15.490529] The buggy address is located 8 bytes inside of
[   15.490529]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.491339] 
[   15.491438] The buggy address belongs to the physical page:
[   15.491681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.492005] flags: 0x200000000000000(node=0|zone=2)
[   15.492206] page_type: f5(slab)
[   15.492437] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.492680] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.492905] page dumped because: kasan: bad access detected
[   15.493079] 
[   15.493226] Memory state around the buggy address:
[   15.493589]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.493906]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.494218] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.494972]                                   ^
[   15.495133]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.496080]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.496909] ==================================================================
[   15.418977] ==================================================================
[   15.419325] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.419715] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.420033] 
[   15.420120] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.420162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.420174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.420195] Call Trace:
[   15.420207]  <TASK>
[   15.420221]  dump_stack_lvl+0x73/0xb0
[   15.420248]  print_report+0xd1/0x610
[   15.420270]  ? __virt_addr_valid+0x1db/0x2d0
[   15.420292]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.420321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.420345]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.420375]  kasan_report+0x141/0x180
[   15.420397]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.420431]  kasan_check_range+0x10c/0x1c0
[   15.420455]  __kasan_check_write+0x18/0x20
[   15.420474]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.420504]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.420542]  kasan_bitops_generic+0x121/0x1c0
[   15.420577]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.420602]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.420632]  kunit_try_run_case+0x1a5/0x480
[   15.420656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.420680]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.420704]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.420729]  ? __kthread_parkme+0x82/0x180
[   15.420750]  ? preempt_count_sub+0x50/0x80
[   15.420774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.420799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.420824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.420851]  kthread+0x337/0x6f0
[   15.420870]  ? trace_preempt_on+0x20/0xc0
[   15.420894]  ? __pfx_kthread+0x10/0x10
[   15.420915]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.420937]  ? calculate_sigpending+0x7b/0xa0
[   15.420962]  ? __pfx_kthread+0x10/0x10
[   15.420984]  ret_from_fork+0x116/0x1d0
[   15.421003]  ? __pfx_kthread+0x10/0x10
[   15.421024]  ret_from_fork_asm+0x1a/0x30
[   15.421054]  </TASK>
[   15.421064] 
[   15.428894] Allocated by task 278:
[   15.429064]  kasan_save_stack+0x45/0x70
[   15.429233]  kasan_save_track+0x18/0x40
[   15.429600]  kasan_save_alloc_info+0x3b/0x50
[   15.429871]  __kasan_kmalloc+0xb7/0xc0
[   15.430043]  __kmalloc_cache_noprof+0x189/0x420
[   15.430229]  kasan_bitops_generic+0x92/0x1c0
[   15.430379]  kunit_try_run_case+0x1a5/0x480
[   15.430524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.430788]  kthread+0x337/0x6f0
[   15.430955]  ret_from_fork+0x116/0x1d0
[   15.431268]  ret_from_fork_asm+0x1a/0x30
[   15.431575] 
[   15.431649] The buggy address belongs to the object at ffff888101679da0
[   15.431649]  which belongs to the cache kmalloc-16 of size 16
[   15.432017] The buggy address is located 8 bytes inside of
[   15.432017]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.432836] 
[   15.432928] The buggy address belongs to the physical page:
[   15.433152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.433526] flags: 0x200000000000000(node=0|zone=2)
[   15.433796] page_type: f5(slab)
[   15.433940] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.434310] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.434662] page dumped because: kasan: bad access detected
[   15.434897] 
[   15.434990] Memory state around the buggy address:
[   15.435166]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.435386]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.435618] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.435834]                                   ^
[   15.436222]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.437717]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.438007] ==================================================================
[   15.371988] ==================================================================
[   15.372640] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.373424] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.373749] 
[   15.373855] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.373901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.373914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.373936] Call Trace:
[   15.373952]  <TASK>
[   15.373969]  dump_stack_lvl+0x73/0xb0
[   15.373998]  print_report+0xd1/0x610
[   15.374022]  ? __virt_addr_valid+0x1db/0x2d0
[   15.374045]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.374075]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.374100]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.374130]  kasan_report+0x141/0x180
[   15.374152]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.374187]  kasan_check_range+0x10c/0x1c0
[   15.374212]  __kasan_check_write+0x18/0x20
[   15.374233]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.374449]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.374499]  kasan_bitops_generic+0x121/0x1c0
[   15.374524]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.374713]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.374755]  kunit_try_run_case+0x1a5/0x480
[   15.374782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.374806]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.374833]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.374859]  ? __kthread_parkme+0x82/0x180
[   15.374881]  ? preempt_count_sub+0x50/0x80
[   15.374906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.374931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.374957]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.374984]  kthread+0x337/0x6f0
[   15.375003]  ? trace_preempt_on+0x20/0xc0
[   15.375027]  ? __pfx_kthread+0x10/0x10
[   15.375049]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.375072]  ? calculate_sigpending+0x7b/0xa0
[   15.375097]  ? __pfx_kthread+0x10/0x10
[   15.375118]  ret_from_fork+0x116/0x1d0
[   15.375137]  ? __pfx_kthread+0x10/0x10
[   15.375159]  ret_from_fork_asm+0x1a/0x30
[   15.375189]  </TASK>
[   15.375200] 
[   15.386886] Allocated by task 278:
[   15.387071]  kasan_save_stack+0x45/0x70
[   15.387434]  kasan_save_track+0x18/0x40
[   15.387762]  kasan_save_alloc_info+0x3b/0x50
[   15.387978]  __kasan_kmalloc+0xb7/0xc0
[   15.388153]  __kmalloc_cache_noprof+0x189/0x420
[   15.388726]  kasan_bitops_generic+0x92/0x1c0
[   15.389012]  kunit_try_run_case+0x1a5/0x480
[   15.389431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.389789]  kthread+0x337/0x6f0
[   15.389961]  ret_from_fork+0x116/0x1d0
[   15.390140]  ret_from_fork_asm+0x1a/0x30
[   15.390317] 
[   15.390408] The buggy address belongs to the object at ffff888101679da0
[   15.390408]  which belongs to the cache kmalloc-16 of size 16
[   15.390892] The buggy address is located 8 bytes inside of
[   15.390892]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.391360] 
[   15.391928] The buggy address belongs to the physical page:
[   15.392364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.392853] flags: 0x200000000000000(node=0|zone=2)
[   15.393481] page_type: f5(slab)
[   15.393724] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.394159] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.395227] page dumped because: kasan: bad access detected
[   15.395625] 
[   15.395867] Memory state around the buggy address:
[   15.396089]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.396839]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.397336] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.397832]                                   ^
[   15.398033]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.398735]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.399187] ==================================================================
[   15.399894] ==================================================================
[   15.400146] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.400639] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.401001] 
[   15.401114] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.401161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.401173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.401195] Call Trace:
[   15.401209]  <TASK>
[   15.401224]  dump_stack_lvl+0x73/0xb0
[   15.401251]  print_report+0xd1/0x610
[   15.401274]  ? __virt_addr_valid+0x1db/0x2d0
[   15.401296]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.401326]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.401350]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.401392]  kasan_report+0x141/0x180
[   15.401414]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.401448]  kasan_check_range+0x10c/0x1c0
[   15.401472]  __kasan_check_write+0x18/0x20
[   15.401492]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.401522]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.401617]  kasan_bitops_generic+0x121/0x1c0
[   15.401644]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.401669]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.401699]  kunit_try_run_case+0x1a5/0x480
[   15.401724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.401748]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.401772]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.401797]  ? __kthread_parkme+0x82/0x180
[   15.401818]  ? preempt_count_sub+0x50/0x80
[   15.401842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.401867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.401893]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.401919]  kthread+0x337/0x6f0
[   15.401938]  ? trace_preempt_on+0x20/0xc0
[   15.401961]  ? __pfx_kthread+0x10/0x10
[   15.401982]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.402007]  ? calculate_sigpending+0x7b/0xa0
[   15.402031]  ? __pfx_kthread+0x10/0x10
[   15.402053]  ret_from_fork+0x116/0x1d0
[   15.402072]  ? __pfx_kthread+0x10/0x10
[   15.402092]  ret_from_fork_asm+0x1a/0x30
[   15.402123]  </TASK>
[   15.402133] 
[   15.409812] Allocated by task 278:
[   15.409987]  kasan_save_stack+0x45/0x70
[   15.410316]  kasan_save_track+0x18/0x40
[   15.410663]  kasan_save_alloc_info+0x3b/0x50
[   15.410820]  __kasan_kmalloc+0xb7/0xc0
[   15.410954]  __kmalloc_cache_noprof+0x189/0x420
[   15.411178]  kasan_bitops_generic+0x92/0x1c0
[   15.411644]  kunit_try_run_case+0x1a5/0x480
[   15.411845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.412094]  kthread+0x337/0x6f0
[   15.412460]  ret_from_fork+0x116/0x1d0
[   15.412673]  ret_from_fork_asm+0x1a/0x30
[   15.412854] 
[   15.412937] The buggy address belongs to the object at ffff888101679da0
[   15.412937]  which belongs to the cache kmalloc-16 of size 16
[   15.413293] The buggy address is located 8 bytes inside of
[   15.413293]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.413945] 
[   15.414047] The buggy address belongs to the physical page:
[   15.414368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.414660] flags: 0x200000000000000(node=0|zone=2)
[   15.414824] page_type: f5(slab)
[   15.414943] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.415351] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.415703] page dumped because: kasan: bad access detected
[   15.416063] 
[   15.416133] Memory state around the buggy address:
[   15.416287]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.416747]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.417072] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.417506]                                   ^
[   15.417689]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.418006]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.418607] ==================================================================
[   15.438452] ==================================================================
[   15.438795] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.439074] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.439657] 
[   15.439770] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.439815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.439827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.439848] Call Trace:
[   15.439862]  <TASK>
[   15.439877]  dump_stack_lvl+0x73/0xb0
[   15.439904]  print_report+0xd1/0x610
[   15.439925]  ? __virt_addr_valid+0x1db/0x2d0
[   15.439949]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.439980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.440004]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.440035]  kasan_report+0x141/0x180
[   15.440062]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.440097]  kasan_check_range+0x10c/0x1c0
[   15.440121]  __kasan_check_write+0x18/0x20
[   15.440142]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.440172]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.440212]  kasan_bitops_generic+0x121/0x1c0
[   15.440237]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.440262]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.440291]  kunit_try_run_case+0x1a5/0x480
[   15.440316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.440340]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.440365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.440391]  ? __kthread_parkme+0x82/0x180
[   15.440412]  ? preempt_count_sub+0x50/0x80
[   15.440497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.440523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.440562]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.440590]  kthread+0x337/0x6f0
[   15.440611]  ? trace_preempt_on+0x20/0xc0
[   15.440635]  ? __pfx_kthread+0x10/0x10
[   15.440657]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.440679]  ? calculate_sigpending+0x7b/0xa0
[   15.440704]  ? __pfx_kthread+0x10/0x10
[   15.440726]  ret_from_fork+0x116/0x1d0
[   15.440746]  ? __pfx_kthread+0x10/0x10
[   15.440767]  ret_from_fork_asm+0x1a/0x30
[   15.440799]  </TASK>
[   15.440809] 
[   15.448782] Allocated by task 278:
[   15.448968]  kasan_save_stack+0x45/0x70
[   15.449127]  kasan_save_track+0x18/0x40
[   15.449458]  kasan_save_alloc_info+0x3b/0x50
[   15.449671]  __kasan_kmalloc+0xb7/0xc0
[   15.449807]  __kmalloc_cache_noprof+0x189/0x420
[   15.449972]  kasan_bitops_generic+0x92/0x1c0
[   15.450182]  kunit_try_run_case+0x1a5/0x480
[   15.450538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.450735]  kthread+0x337/0x6f0
[   15.450876]  ret_from_fork+0x116/0x1d0
[   15.451064]  ret_from_fork_asm+0x1a/0x30
[   15.451318] 
[   15.451420] The buggy address belongs to the object at ffff888101679da0
[   15.451420]  which belongs to the cache kmalloc-16 of size 16
[   15.452013] The buggy address is located 8 bytes inside of
[   15.452013]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.452600] 
[   15.452674] The buggy address belongs to the physical page:
[   15.452846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.453094] flags: 0x200000000000000(node=0|zone=2)
[   15.453318] page_type: f5(slab)
[   15.453482] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.453832] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.454731] page dumped because: kasan: bad access detected
[   15.454961] 
[   15.455055] Memory state around the buggy address:
[   15.455222]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.455440]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.455919] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.456288]                                   ^
[   15.456514]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.456816]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.457072] ==================================================================
[   15.457579] ==================================================================
[   15.457896] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.458267] Read of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.458608] 
[   15.458694] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.458736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.458748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.458769] Call Trace:
[   15.458783]  <TASK>
[   15.458797]  dump_stack_lvl+0x73/0xb0
[   15.458824]  print_report+0xd1/0x610
[   15.458847]  ? __virt_addr_valid+0x1db/0x2d0
[   15.458869]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.458899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.458924]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.458954]  kasan_report+0x141/0x180
[   15.458977]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.459012]  kasan_check_range+0x10c/0x1c0
[   15.459036]  __kasan_check_read+0x15/0x20
[   15.459055]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.459087]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.459125]  kasan_bitops_generic+0x121/0x1c0
[   15.459150]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.459175]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.459205]  kunit_try_run_case+0x1a5/0x480
[   15.459230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.459254]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.459278]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.459303]  ? __kthread_parkme+0x82/0x180
[   15.459323]  ? preempt_count_sub+0x50/0x80
[   15.459348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.459372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.459398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.459479]  kthread+0x337/0x6f0
[   15.459501]  ? trace_preempt_on+0x20/0xc0
[   15.459524]  ? __pfx_kthread+0x10/0x10
[   15.459546]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.459579]  ? calculate_sigpending+0x7b/0xa0
[   15.459604]  ? __pfx_kthread+0x10/0x10
[   15.459626]  ret_from_fork+0x116/0x1d0
[   15.459645]  ? __pfx_kthread+0x10/0x10
[   15.459666]  ret_from_fork_asm+0x1a/0x30
[   15.459697]  </TASK>
[   15.459707] 
[   15.468715] Allocated by task 278:
[   15.468861]  kasan_save_stack+0x45/0x70
[   15.469011]  kasan_save_track+0x18/0x40
[   15.469152]  kasan_save_alloc_info+0x3b/0x50
[   15.469492]  __kasan_kmalloc+0xb7/0xc0
[   15.469665]  __kmalloc_cache_noprof+0x189/0x420
[   15.469884]  kasan_bitops_generic+0x92/0x1c0
[   15.470059]  kunit_try_run_case+0x1a5/0x480
[   15.470259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.470436]  kthread+0x337/0x6f0
[   15.470565]  ret_from_fork+0x116/0x1d0
[   15.470752]  ret_from_fork_asm+0x1a/0x30
[   15.471181] 
[   15.471343] The buggy address belongs to the object at ffff888101679da0
[   15.471343]  which belongs to the cache kmalloc-16 of size 16
[   15.471833] The buggy address is located 8 bytes inside of
[   15.471833]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.472418] 
[   15.472495] The buggy address belongs to the physical page:
[   15.472728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.473017] flags: 0x200000000000000(node=0|zone=2)
[   15.473182] page_type: f5(slab)
[   15.473345] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.473879] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.474157] page dumped because: kasan: bad access detected
[   15.474661] 
[   15.474756] Memory state around the buggy address:
[   15.474940]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.475392]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.475635] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.475947]                                   ^
[   15.476149]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.476510]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.476769] ==================================================================
[   15.303198] ==================================================================
[   15.304148] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.305126] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.305771] 
[   15.305865] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.305912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.305925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.305946] Call Trace:
[   15.305961]  <TASK>
[   15.305976]  dump_stack_lvl+0x73/0xb0
[   15.306006]  print_report+0xd1/0x610
[   15.306029]  ? __virt_addr_valid+0x1db/0x2d0
[   15.306052]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.306083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.306106]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.306136]  kasan_report+0x141/0x180
[   15.306158]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.306192]  kasan_check_range+0x10c/0x1c0
[   15.306216]  __kasan_check_write+0x18/0x20
[   15.306236]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.306339]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.306392]  kasan_bitops_generic+0x121/0x1c0
[   15.306425]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.306450]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.306479]  kunit_try_run_case+0x1a5/0x480
[   15.306504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.306526]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.306561]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.306586]  ? __kthread_parkme+0x82/0x180
[   15.306607]  ? preempt_count_sub+0x50/0x80
[   15.306631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.306655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.306679]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.306705]  kthread+0x337/0x6f0
[   15.306725]  ? trace_preempt_on+0x20/0xc0
[   15.306747]  ? __pfx_kthread+0x10/0x10
[   15.306768]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.306790]  ? calculate_sigpending+0x7b/0xa0
[   15.306814]  ? __pfx_kthread+0x10/0x10
[   15.306835]  ret_from_fork+0x116/0x1d0
[   15.306853]  ? __pfx_kthread+0x10/0x10
[   15.306874]  ret_from_fork_asm+0x1a/0x30
[   15.306905]  </TASK>
[   15.306914] 
[   15.321864] Allocated by task 278:
[   15.322221]  kasan_save_stack+0x45/0x70
[   15.322582]  kasan_save_track+0x18/0x40
[   15.322952]  kasan_save_alloc_info+0x3b/0x50
[   15.323106]  __kasan_kmalloc+0xb7/0xc0
[   15.323239]  __kmalloc_cache_noprof+0x189/0x420
[   15.323420]  kasan_bitops_generic+0x92/0x1c0
[   15.323982]  kunit_try_run_case+0x1a5/0x480
[   15.324628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.325154]  kthread+0x337/0x6f0
[   15.325560]  ret_from_fork+0x116/0x1d0
[   15.325979]  ret_from_fork_asm+0x1a/0x30
[   15.326498] 
[   15.326688] The buggy address belongs to the object at ffff888101679da0
[   15.326688]  which belongs to the cache kmalloc-16 of size 16
[   15.327143] The buggy address is located 8 bytes inside of
[   15.327143]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.328440] 
[   15.328644] The buggy address belongs to the physical page:
[   15.329224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.329996] flags: 0x200000000000000(node=0|zone=2)
[   15.330467] page_type: f5(slab)
[   15.330718] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.331411] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.331809] page dumped because: kasan: bad access detected
[   15.331988] 
[   15.332063] Memory state around the buggy address:
[   15.332219]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.333104]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.333925] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.334762]                                   ^
[   15.335444]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.336023]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.336303] ==================================================================
[   15.337221] ==================================================================
[   15.338136] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.338826] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.339061] 
[   15.339148] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.339192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.339204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.339226] Call Trace:
[   15.339241]  <TASK>
[   15.339257]  dump_stack_lvl+0x73/0xb0
[   15.339287]  print_report+0xd1/0x610
[   15.339308]  ? __virt_addr_valid+0x1db/0x2d0
[   15.339331]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.339361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.339386]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.339590]  kasan_report+0x141/0x180
[   15.339621]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.339658]  kasan_check_range+0x10c/0x1c0
[   15.339682]  __kasan_check_write+0x18/0x20
[   15.339704]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.339733]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.339772]  kasan_bitops_generic+0x121/0x1c0
[   15.339797]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.339822]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.339851]  kunit_try_run_case+0x1a5/0x480
[   15.339874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.339898]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.339922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.339947]  ? __kthread_parkme+0x82/0x180
[   15.339967]  ? preempt_count_sub+0x50/0x80
[   15.339991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.340016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.340040]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.340070]  kthread+0x337/0x6f0
[   15.340090]  ? trace_preempt_on+0x20/0xc0
[   15.340113]  ? __pfx_kthread+0x10/0x10
[   15.340134]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.340155]  ? calculate_sigpending+0x7b/0xa0
[   15.340179]  ? __pfx_kthread+0x10/0x10
[   15.340200]  ret_from_fork+0x116/0x1d0
[   15.340220]  ? __pfx_kthread+0x10/0x10
[   15.340289]  ret_from_fork_asm+0x1a/0x30
[   15.340323]  </TASK>
[   15.340332] 
[   15.356641] Allocated by task 278:
[   15.356820]  kasan_save_stack+0x45/0x70
[   15.356974]  kasan_save_track+0x18/0x40
[   15.357112]  kasan_save_alloc_info+0x3b/0x50
[   15.357779]  __kasan_kmalloc+0xb7/0xc0
[   15.358259]  __kmalloc_cache_noprof+0x189/0x420
[   15.359152]  kasan_bitops_generic+0x92/0x1c0
[   15.359687]  kunit_try_run_case+0x1a5/0x480
[   15.359906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.360140]  kthread+0x337/0x6f0
[   15.360294]  ret_from_fork+0x116/0x1d0
[   15.360452]  ret_from_fork_asm+0x1a/0x30
[   15.360612] 
[   15.360703] The buggy address belongs to the object at ffff888101679da0
[   15.360703]  which belongs to the cache kmalloc-16 of size 16
[   15.361172] The buggy address is located 8 bytes inside of
[   15.361172]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.362729] 
[   15.363075] The buggy address belongs to the physical page:
[   15.363796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.364999] flags: 0x200000000000000(node=0|zone=2)
[   15.365654] page_type: f5(slab)
[   15.365822] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.366139] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.367144] page dumped because: kasan: bad access detected
[   15.367924] 
[   15.368024] Memory state around the buggy address:
[   15.368512]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.368955]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.369464] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.369806]                                   ^
[   15.370006]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.370755]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.371177] ==================================================================
[   15.267744] ==================================================================
[   15.268107] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.271484] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.271738] 
[   15.271828] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.271874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.271886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.271907] Call Trace:
[   15.271918]  <TASK>
[   15.271934]  dump_stack_lvl+0x73/0xb0
[   15.271964]  print_report+0xd1/0x610
[   15.271986]  ? __virt_addr_valid+0x1db/0x2d0
[   15.272009]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.272039]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.272069]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.272101]  kasan_report+0x141/0x180
[   15.272123]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.272158]  kasan_check_range+0x10c/0x1c0
[   15.272182]  __kasan_check_write+0x18/0x20
[   15.272202]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.272547]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.272609]  kasan_bitops_generic+0x121/0x1c0
[   15.272634]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.272659]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.272699]  kunit_try_run_case+0x1a5/0x480
[   15.272725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.272748]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.272784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.272809]  ? __kthread_parkme+0x82/0x180
[   15.272831]  ? preempt_count_sub+0x50/0x80
[   15.272855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.272881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.272906]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.272932]  kthread+0x337/0x6f0
[   15.272951]  ? trace_preempt_on+0x20/0xc0
[   15.272975]  ? __pfx_kthread+0x10/0x10
[   15.273527]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.273604]  ? calculate_sigpending+0x7b/0xa0
[   15.273631]  ? __pfx_kthread+0x10/0x10
[   15.273654]  ret_from_fork+0x116/0x1d0
[   15.273676]  ? __pfx_kthread+0x10/0x10
[   15.273697]  ret_from_fork_asm+0x1a/0x30
[   15.273729]  </TASK>
[   15.273739] 
[   15.288136] Allocated by task 278:
[   15.288644]  kasan_save_stack+0x45/0x70
[   15.288844]  kasan_save_track+0x18/0x40
[   15.288979]  kasan_save_alloc_info+0x3b/0x50
[   15.289125]  __kasan_kmalloc+0xb7/0xc0
[   15.289336]  __kmalloc_cache_noprof+0x189/0x420
[   15.289932]  kasan_bitops_generic+0x92/0x1c0
[   15.290466]  kunit_try_run_case+0x1a5/0x480
[   15.290991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.291563]  kthread+0x337/0x6f0
[   15.291954]  ret_from_fork+0x116/0x1d0
[   15.292430]  ret_from_fork_asm+0x1a/0x30
[   15.292872] 
[   15.293012] The buggy address belongs to the object at ffff888101679da0
[   15.293012]  which belongs to the cache kmalloc-16 of size 16
[   15.293740] The buggy address is located 8 bytes inside of
[   15.293740]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.294958] 
[   15.295087] The buggy address belongs to the physical page:
[   15.295671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.296284] flags: 0x200000000000000(node=0|zone=2)
[   15.296675] page_type: f5(slab)
[   15.296893] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.297479] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.297774] page dumped because: kasan: bad access detected
[   15.297948] 
[   15.298017] Memory state around the buggy address:
[   15.298178]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.298934]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.299753] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.300524]                                   ^
[   15.301046]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.301785]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.302494] ==================================================================