Hay
Date
March 19, 2025, 10:35 a.m.

Environment
qemu-x86_64

[   25.719082] ==================================================================
[   25.719554] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.720566] Read of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.721315] 
[   25.721641] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.721814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.721853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.721909] Call Trace:
[   25.721941]  <TASK>
[   25.721975]  dump_stack_lvl+0x73/0xb0
[   25.722052]  print_report+0xd1/0x660
[   25.722136]  ? __virt_addr_valid+0x1db/0x2d0
[   25.722259]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.722336]  kasan_report+0x104/0x140
[   25.722455]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.722626]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.722799]  kasan_check_range+0x10c/0x1c0
[   25.722883]  __kasan_check_read+0x15/0x20
[   25.722944]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.723042]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.723198]  ? kasan_save_alloc_info+0x3b/0x50
[   25.723314]  ? kasan_save_stack+0x3d/0x60
[   25.723393]  kasan_bitops_generic+0x121/0x1c0
[   25.723469]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.723546]  ? __pfx_read_tsc+0x10/0x10
[   25.723618]  ? ktime_get_ts64+0x86/0x240
[   25.723671]  kunit_try_run_case+0x1b2/0x490
[   25.723759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.723797]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.723832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.723865]  ? __kthread_parkme+0x82/0x160
[   25.723896]  ? preempt_count_sub+0x50/0x80
[   25.723934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.723980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.724013]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.724048]  kthread+0x323/0x710
[   25.724078]  ? trace_preempt_on+0x20/0xc0
[   25.724135]  ? __pfx_kthread+0x10/0x10
[   25.724170]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.724198]  ? calculate_sigpending+0x7b/0xa0
[   25.724230]  ? __pfx_kthread+0x10/0x10
[   25.724263]  ret_from_fork+0x41/0x80
[   25.724294]  ? __pfx_kthread+0x10/0x10
[   25.724326]  ret_from_fork_asm+0x1a/0x30
[   25.724373]  </TASK>
[   25.724387] 
[   25.738569] Allocated by task 282:
[   25.738821]  kasan_save_stack+0x3d/0x60
[   25.739351]  kasan_save_track+0x18/0x40
[   25.739800]  kasan_save_alloc_info+0x3b/0x50
[   25.740371]  __kasan_kmalloc+0xb7/0xc0
[   25.741105]  __kmalloc_cache_noprof+0x183/0x410
[   25.741676]  kasan_bitops_generic+0x92/0x1c0
[   25.742199]  kunit_try_run_case+0x1b2/0x490
[   25.742700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.743242]  kthread+0x323/0x710
[   25.743508]  ret_from_fork+0x41/0x80
[   25.743785]  ret_from_fork_asm+0x1a/0x30
[   25.744070] 
[   25.744315] The buggy address belongs to the object at ffff888100a7a9a0
[   25.744315]  which belongs to the cache kmalloc-16 of size 16
[   25.745459] The buggy address is located 8 bytes inside of
[   25.745459]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.746650] 
[   25.747673] The buggy address belongs to the physical page:
[   25.748940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.750601] flags: 0x200000000000000(node=0|zone=2)
[   25.751546] page_type: f5(slab)
[   25.751864] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.753884] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.754300] page dumped because: kasan: bad access detected
[   25.754598] 
[   25.755140] Memory state around the buggy address:
[   25.755752]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.756425]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.757144] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.757885]                                   ^
[   25.758367]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.759062]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.759867] ==================================================================
[   25.449215] ==================================================================
[   25.450408] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.451981] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.452608] 
[   25.452888] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.453066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.453146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.453201] Call Trace:
[   25.453235]  <TASK>
[   25.453270]  dump_stack_lvl+0x73/0xb0
[   25.453345]  print_report+0xd1/0x660
[   25.453410]  ? __virt_addr_valid+0x1db/0x2d0
[   25.453534]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.453607]  kasan_report+0x104/0x140
[   25.453665]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.453749]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.453844]  kasan_check_range+0x10c/0x1c0
[   25.453915]  __kasan_check_write+0x18/0x20
[   25.453975]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.454055]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.454155]  ? kasan_save_alloc_info+0x3b/0x50
[   25.454227]  ? kasan_save_stack+0x3d/0x60
[   25.454339]  kasan_bitops_generic+0x121/0x1c0
[   25.454444]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.454544]  ? __pfx_read_tsc+0x10/0x10
[   25.454616]  ? ktime_get_ts64+0x86/0x240
[   25.454719]  kunit_try_run_case+0x1b2/0x490
[   25.454817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.454942]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.455044]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.455129]  ? __kthread_parkme+0x82/0x160
[   25.455197]  ? preempt_count_sub+0x50/0x80
[   25.455269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.455340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.455409]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.455475]  kthread+0x323/0x710
[   25.455536]  ? trace_preempt_on+0x20/0xc0
[   25.455630]  ? __pfx_kthread+0x10/0x10
[   25.455694]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.455786]  ? calculate_sigpending+0x7b/0xa0
[   25.455854]  ? __pfx_kthread+0x10/0x10
[   25.455913]  ret_from_fork+0x41/0x80
[   25.455981]  ? __pfx_kthread+0x10/0x10
[   25.456042]  ret_from_fork_asm+0x1a/0x30
[   25.456236]  </TASK>
[   25.456275] 
[   25.471967] Allocated by task 282:
[   25.472495]  kasan_save_stack+0x3d/0x60
[   25.472783]  kasan_save_track+0x18/0x40
[   25.473082]  kasan_save_alloc_info+0x3b/0x50
[   25.473859]  __kasan_kmalloc+0xb7/0xc0
[   25.474392]  __kmalloc_cache_noprof+0x183/0x410
[   25.475055]  kasan_bitops_generic+0x92/0x1c0
[   25.475467]  kunit_try_run_case+0x1b2/0x490
[   25.476048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.476498]  kthread+0x323/0x710
[   25.476967]  ret_from_fork+0x41/0x80
[   25.477339]  ret_from_fork_asm+0x1a/0x30
[   25.477636] 
[   25.477914] The buggy address belongs to the object at ffff888100a7a9a0
[   25.477914]  which belongs to the cache kmalloc-16 of size 16
[   25.481222] The buggy address is located 8 bytes inside of
[   25.481222]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.482063] 
[   25.482253] The buggy address belongs to the physical page:
[   25.482567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.482987] flags: 0x200000000000000(node=0|zone=2)
[   25.485619] page_type: f5(slab)
[   25.486406] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.487792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.488497] page dumped because: kasan: bad access detected
[   25.490259] 
[   25.490491] Memory state around the buggy address:
[   25.491494]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.492499]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.493207] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.493983]                                   ^
[   25.494509]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.495181]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.495801] ==================================================================
[   25.761098] ==================================================================
[   25.761908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.762594] Read of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.763339] 
[   25.763665] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.763888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.763951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.764023] Call Trace:
[   25.764055]  <TASK>
[   25.764086]  dump_stack_lvl+0x73/0xb0
[   25.764186]  print_report+0xd1/0x660
[   25.764316]  ? __virt_addr_valid+0x1db/0x2d0
[   25.764466]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.764540]  kasan_report+0x104/0x140
[   25.764601]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.764789]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.764905]  __asan_report_load8_noabort+0x18/0x20
[   25.764972]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.765104]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.765232]  ? kasan_save_alloc_info+0x3b/0x50
[   25.765305]  ? kasan_save_stack+0x3d/0x60
[   25.765374]  kasan_bitops_generic+0x121/0x1c0
[   25.765443]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.765607]  ? __pfx_read_tsc+0x10/0x10
[   25.765675]  ? ktime_get_ts64+0x86/0x240
[   25.765797]  kunit_try_run_case+0x1b2/0x490
[   25.765922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.766023]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.766092]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.766174]  ? __kthread_parkme+0x82/0x160
[   25.766233]  ? preempt_count_sub+0x50/0x80
[   25.766356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.766470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.766588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.766662]  kthread+0x323/0x710
[   25.766853]  ? trace_preempt_on+0x20/0xc0
[   25.766924]  ? __pfx_kthread+0x10/0x10
[   25.766975]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.767008]  ? calculate_sigpending+0x7b/0xa0
[   25.767040]  ? __pfx_kthread+0x10/0x10
[   25.767074]  ret_from_fork+0x41/0x80
[   25.767105]  ? __pfx_kthread+0x10/0x10
[   25.767164]  ret_from_fork_asm+0x1a/0x30
[   25.767212]  </TASK>
[   25.767230] 
[   25.782459] Allocated by task 282:
[   25.782695]  kasan_save_stack+0x3d/0x60
[   25.783753]  kasan_save_track+0x18/0x40
[   25.784088]  kasan_save_alloc_info+0x3b/0x50
[   25.785540]  __kasan_kmalloc+0xb7/0xc0
[   25.786572]  __kmalloc_cache_noprof+0x183/0x410
[   25.788042]  kasan_bitops_generic+0x92/0x1c0
[   25.788530]  kunit_try_run_case+0x1b2/0x490
[   25.788880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.792266]  kthread+0x323/0x710
[   25.792654]  ret_from_fork+0x41/0x80
[   25.793225]  ret_from_fork_asm+0x1a/0x30
[   25.793699] 
[   25.793898] The buggy address belongs to the object at ffff888100a7a9a0
[   25.793898]  which belongs to the cache kmalloc-16 of size 16
[   25.794498] The buggy address is located 8 bytes inside of
[   25.794498]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.796211] 
[   25.797555] The buggy address belongs to the physical page:
[   25.797924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.799078] flags: 0x200000000000000(node=0|zone=2)
[   25.800095] page_type: f5(slab)
[   25.800480] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.801239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.801741] page dumped because: kasan: bad access detected
[   25.802056] 
[   25.802215] Memory state around the buggy address:
[   25.802476]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.804083]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.804807] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.805529]                                   ^
[   25.806098]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.806873]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.807450] ==================================================================
[   25.666986] ==================================================================
[   25.667693] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.670900] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.671476] 
[   25.671682] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.672084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.672141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.672442] Call Trace:
[   25.672492]  <TASK>
[   25.672528]  dump_stack_lvl+0x73/0xb0
[   25.672913]  print_report+0xd1/0x660
[   25.672991]  ? __virt_addr_valid+0x1db/0x2d0
[   25.674528]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.674582]  kasan_report+0x104/0x140
[   25.674614]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.674657]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.674711]  kasan_check_range+0x10c/0x1c0
[   25.674783]  __kasan_check_write+0x18/0x20
[   25.674814]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.674854]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.674896]  ? kasan_save_alloc_info+0x3b/0x50
[   25.674933]  ? kasan_save_stack+0x3d/0x60
[   25.674971]  kasan_bitops_generic+0x121/0x1c0
[   25.675006]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.675042]  ? __pfx_read_tsc+0x10/0x10
[   25.675073]  ? ktime_get_ts64+0x86/0x240
[   25.675126]  kunit_try_run_case+0x1b2/0x490
[   25.675164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.675196]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.675228]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.675259]  ? __kthread_parkme+0x82/0x160
[   25.675291]  ? preempt_count_sub+0x50/0x80
[   25.675328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.675362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.675396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.675429]  kthread+0x323/0x710
[   25.675458]  ? trace_preempt_on+0x20/0xc0
[   25.675492]  ? __pfx_kthread+0x10/0x10
[   25.675523]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.675552]  ? calculate_sigpending+0x7b/0xa0
[   25.675583]  ? __pfx_kthread+0x10/0x10
[   25.675641]  ret_from_fork+0x41/0x80
[   25.675673]  ? __pfx_kthread+0x10/0x10
[   25.675709]  ret_from_fork_asm+0x1a/0x30
[   25.675837]  </TASK>
[   25.675871] 
[   25.697499] Allocated by task 282:
[   25.697738]  kasan_save_stack+0x3d/0x60
[   25.698181]  kasan_save_track+0x18/0x40
[   25.698542]  kasan_save_alloc_info+0x3b/0x50
[   25.699072]  __kasan_kmalloc+0xb7/0xc0
[   25.700249]  __kmalloc_cache_noprof+0x183/0x410
[   25.700689]  kasan_bitops_generic+0x92/0x1c0
[   25.701442]  kunit_try_run_case+0x1b2/0x490
[   25.702193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.702794]  kthread+0x323/0x710
[   25.703232]  ret_from_fork+0x41/0x80
[   25.703978]  ret_from_fork_asm+0x1a/0x30
[   25.704269] 
[   25.704973] The buggy address belongs to the object at ffff888100a7a9a0
[   25.704973]  which belongs to the cache kmalloc-16 of size 16
[   25.705721] The buggy address is located 8 bytes inside of
[   25.705721]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.707143] 
[   25.707425] The buggy address belongs to the physical page:
[   25.708838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.709331] flags: 0x200000000000000(node=0|zone=2)
[   25.709868] page_type: f5(slab)
[   25.710742] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.711302] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.712167] page dumped because: kasan: bad access detected
[   25.712725] 
[   25.713332] Memory state around the buggy address:
[   25.713803]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.714676]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.715483] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.716094]                                   ^
[   25.716431]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.717079]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.717636] ==================================================================
[   25.538962] ==================================================================
[   25.539730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.540567] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.543202] 
[   25.543391] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.543519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.543555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.543622] Call Trace:
[   25.543645]  <TASK>
[   25.543667]  dump_stack_lvl+0x73/0xb0
[   25.543722]  print_report+0xd1/0x660
[   25.543822]  ? __virt_addr_valid+0x1db/0x2d0
[   25.543914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.543966]  kasan_report+0x104/0x140
[   25.543997]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.544040]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.544090]  kasan_check_range+0x10c/0x1c0
[   25.544145]  __kasan_check_write+0x18/0x20
[   25.544176]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.544216]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.544258]  ? kasan_save_alloc_info+0x3b/0x50
[   25.544292]  ? kasan_save_stack+0x3d/0x60
[   25.544330]  kasan_bitops_generic+0x121/0x1c0
[   25.544366]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.544404]  ? __pfx_read_tsc+0x10/0x10
[   25.544432]  ? ktime_get_ts64+0x86/0x240
[   25.544469]  kunit_try_run_case+0x1b2/0x490
[   25.544503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.544534]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.544565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.544598]  ? __kthread_parkme+0x82/0x160
[   25.544628]  ? preempt_count_sub+0x50/0x80
[   25.544664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.544697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.544781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.544848]  kthread+0x323/0x710
[   25.544903]  ? trace_preempt_on+0x20/0xc0
[   25.544967]  ? __pfx_kthread+0x10/0x10
[   25.545030]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.545090]  ? calculate_sigpending+0x7b/0xa0
[   25.545181]  ? __pfx_kthread+0x10/0x10
[   25.545247]  ret_from_fork+0x41/0x80
[   25.545310]  ? __pfx_kthread+0x10/0x10
[   25.545373]  ret_from_fork_asm+0x1a/0x30
[   25.545468]  </TASK>
[   25.545498] 
[   25.559859] Allocated by task 282:
[   25.560258]  kasan_save_stack+0x3d/0x60
[   25.560589]  kasan_save_track+0x18/0x40
[   25.561127]  kasan_save_alloc_info+0x3b/0x50
[   25.561536]  __kasan_kmalloc+0xb7/0xc0
[   25.562039]  __kmalloc_cache_noprof+0x183/0x410
[   25.562461]  kasan_bitops_generic+0x92/0x1c0
[   25.562856]  kunit_try_run_case+0x1b2/0x490
[   25.563335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.564014]  kthread+0x323/0x710
[   25.564313]  ret_from_fork+0x41/0x80
[   25.564723]  ret_from_fork_asm+0x1a/0x30
[   25.565133] 
[   25.565391] The buggy address belongs to the object at ffff888100a7a9a0
[   25.565391]  which belongs to the cache kmalloc-16 of size 16
[   25.566328] The buggy address is located 8 bytes inside of
[   25.566328]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.567416] 
[   25.567665] The buggy address belongs to the physical page:
[   25.568089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.568852] flags: 0x200000000000000(node=0|zone=2)
[   25.569359] page_type: f5(slab)
[   25.569720] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.570470] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.571407] page dumped because: kasan: bad access detected
[   25.573045] 
[   25.573289] Memory state around the buggy address:
[   25.573766]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.574183]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.574568] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.574935]                                   ^
[   25.576812]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.578019]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.579305] ==================================================================
[   25.411179] ==================================================================
[   25.411922] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.412829] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.413558] 
[   25.413883] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.413994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.414065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.414140] Call Trace:
[   25.414223]  <TASK>
[   25.414266]  dump_stack_lvl+0x73/0xb0
[   25.414369]  print_report+0xd1/0x660
[   25.414435]  ? __virt_addr_valid+0x1db/0x2d0
[   25.414551]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.414624]  kasan_report+0x104/0x140
[   25.414767]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.414900]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.414997]  kasan_check_range+0x10c/0x1c0
[   25.415071]  __kasan_check_write+0x18/0x20
[   25.415207]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.415352]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.415464]  ? kasan_save_alloc_info+0x3b/0x50
[   25.415536]  ? kasan_save_stack+0x3d/0x60
[   25.415621]  kasan_bitops_generic+0x121/0x1c0
[   25.415661]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.415719]  ? __pfx_read_tsc+0x10/0x10
[   25.415836]  ? ktime_get_ts64+0x86/0x240
[   25.415951]  kunit_try_run_case+0x1b2/0x490
[   25.416005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.416040]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.416072]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.416104]  ? __kthread_parkme+0x82/0x160
[   25.416159]  ? preempt_count_sub+0x50/0x80
[   25.416196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.416231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.416264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.416297]  kthread+0x323/0x710
[   25.416327]  ? trace_preempt_on+0x20/0xc0
[   25.416361]  ? __pfx_kthread+0x10/0x10
[   25.416393]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.416423]  ? calculate_sigpending+0x7b/0xa0
[   25.416454]  ? __pfx_kthread+0x10/0x10
[   25.416486]  ret_from_fork+0x41/0x80
[   25.416517]  ? __pfx_kthread+0x10/0x10
[   25.416548]  ret_from_fork_asm+0x1a/0x30
[   25.416595]  </TASK>
[   25.416610] 
[   25.431047] Allocated by task 282:
[   25.431496]  kasan_save_stack+0x3d/0x60
[   25.431927]  kasan_save_track+0x18/0x40
[   25.432440]  kasan_save_alloc_info+0x3b/0x50
[   25.432949]  __kasan_kmalloc+0xb7/0xc0
[   25.433309]  __kmalloc_cache_noprof+0x183/0x410
[   25.433744]  kasan_bitops_generic+0x92/0x1c0
[   25.434292]  kunit_try_run_case+0x1b2/0x490
[   25.434860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.435347]  kthread+0x323/0x710
[   25.435786]  ret_from_fork+0x41/0x80
[   25.436228]  ret_from_fork_asm+0x1a/0x30
[   25.436714] 
[   25.437022] The buggy address belongs to the object at ffff888100a7a9a0
[   25.437022]  which belongs to the cache kmalloc-16 of size 16
[   25.437926] The buggy address is located 8 bytes inside of
[   25.437926]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.438908] 
[   25.439232] The buggy address belongs to the physical page:
[   25.439674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.440220] flags: 0x200000000000000(node=0|zone=2)
[   25.440622] page_type: f5(slab)
[   25.441004] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.442058] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.442740] page dumped because: kasan: bad access detected
[   25.443259] 
[   25.443476] Memory state around the buggy address:
[   25.444092]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.444839]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.445532] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.446497]                                   ^
[   25.447093]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.447677]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.448272] ==================================================================
[   25.581049] ==================================================================
[   25.582056] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.582846] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.584611] 
[   25.584858] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.584979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.585016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.585071] Call Trace:
[   25.585103]  <TASK>
[   25.585163]  dump_stack_lvl+0x73/0xb0
[   25.585240]  print_report+0xd1/0x660
[   25.585303]  ? __virt_addr_valid+0x1db/0x2d0
[   25.585953]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.586035]  kasan_report+0x104/0x140
[   25.586091]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.586195]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.586276]  kasan_check_range+0x10c/0x1c0
[   25.586315]  __kasan_check_write+0x18/0x20
[   25.586345]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.586385]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.586429]  ? kasan_save_alloc_info+0x3b/0x50
[   25.586463]  ? kasan_save_stack+0x3d/0x60
[   25.586501]  kasan_bitops_generic+0x121/0x1c0
[   25.586537]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.586573]  ? __pfx_read_tsc+0x10/0x10
[   25.586603]  ? ktime_get_ts64+0x86/0x240
[   25.586640]  kunit_try_run_case+0x1b2/0x490
[   25.586674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.586709]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.586772]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.586805]  ? __kthread_parkme+0x82/0x160
[   25.586836]  ? preempt_count_sub+0x50/0x80
[   25.586872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.586906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.586941]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.586975]  kthread+0x323/0x710
[   25.587003]  ? trace_preempt_on+0x20/0xc0
[   25.587037]  ? __pfx_kthread+0x10/0x10
[   25.587069]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.587099]  ? calculate_sigpending+0x7b/0xa0
[   25.587154]  ? __pfx_kthread+0x10/0x10
[   25.587187]  ret_from_fork+0x41/0x80
[   25.587218]  ? __pfx_kthread+0x10/0x10
[   25.587249]  ret_from_fork_asm+0x1a/0x30
[   25.587296]  </TASK>
[   25.587312] 
[   25.607353] Allocated by task 282:
[   25.607736]  kasan_save_stack+0x3d/0x60
[   25.608064]  kasan_save_track+0x18/0x40
[   25.608499]  kasan_save_alloc_info+0x3b/0x50
[   25.608901]  __kasan_kmalloc+0xb7/0xc0
[   25.610058]  __kmalloc_cache_noprof+0x183/0x410
[   25.610679]  kasan_bitops_generic+0x92/0x1c0
[   25.611298]  kunit_try_run_case+0x1b2/0x490
[   25.611724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.612588]  kthread+0x323/0x710
[   25.613198]  ret_from_fork+0x41/0x80
[   25.613627]  ret_from_fork_asm+0x1a/0x30
[   25.614035] 
[   25.614231] The buggy address belongs to the object at ffff888100a7a9a0
[   25.614231]  which belongs to the cache kmalloc-16 of size 16
[   25.614998] The buggy address is located 8 bytes inside of
[   25.614998]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.616610] 
[   25.617292] The buggy address belongs to the physical page:
[   25.617942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.618546] flags: 0x200000000000000(node=0|zone=2)
[   25.618991] page_type: f5(slab)
[   25.619833] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.620411] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.621404] page dumped because: kasan: bad access detected
[   25.622084] 
[   25.622281] Memory state around the buggy address:
[   25.622729]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.623725]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.624259] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.625086]                                   ^
[   25.625550]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.626290]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.627293] ==================================================================
[   25.496646] ==================================================================
[   25.497793] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.498328] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.498779] 
[   25.499036] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.499221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.499258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.499344] Call Trace:
[   25.499380]  <TASK>
[   25.499416]  dump_stack_lvl+0x73/0xb0
[   25.499493]  print_report+0xd1/0x660
[   25.499560]  ? __virt_addr_valid+0x1db/0x2d0
[   25.499712]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.499793]  kasan_report+0x104/0x140
[   25.499854]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.499950]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.500047]  kasan_check_range+0x10c/0x1c0
[   25.500137]  __kasan_check_write+0x18/0x20
[   25.500204]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.500288]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.500611]  ? kasan_save_alloc_info+0x3b/0x50
[   25.500711]  ? kasan_save_stack+0x3d/0x60
[   25.500845]  kasan_bitops_generic+0x121/0x1c0
[   25.500931]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.501045]  ? __pfx_read_tsc+0x10/0x10
[   25.501145]  ? ktime_get_ts64+0x86/0x240
[   25.501223]  kunit_try_run_case+0x1b2/0x490
[   25.501292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.501353]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.501391]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.501426]  ? __kthread_parkme+0x82/0x160
[   25.501460]  ? preempt_count_sub+0x50/0x80
[   25.501497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.501532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.501568]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.501603]  kthread+0x323/0x710
[   25.501633]  ? trace_preempt_on+0x20/0xc0
[   25.501667]  ? __pfx_kthread+0x10/0x10
[   25.501700]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.501770]  ? calculate_sigpending+0x7b/0xa0
[   25.501806]  ? __pfx_kthread+0x10/0x10
[   25.501840]  ret_from_fork+0x41/0x80
[   25.501873]  ? __pfx_kthread+0x10/0x10
[   25.501906]  ret_from_fork_asm+0x1a/0x30
[   25.501954]  </TASK>
[   25.501970] 
[   25.516226] Allocated by task 282:
[   25.516652]  kasan_save_stack+0x3d/0x60
[   25.517188]  kasan_save_track+0x18/0x40
[   25.517636]  kasan_save_alloc_info+0x3b/0x50
[   25.519137]  __kasan_kmalloc+0xb7/0xc0
[   25.519405]  __kmalloc_cache_noprof+0x183/0x410
[   25.522486]  kasan_bitops_generic+0x92/0x1c0
[   25.523056]  kunit_try_run_case+0x1b2/0x490
[   25.523660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.524339]  kthread+0x323/0x710
[   25.524586]  ret_from_fork+0x41/0x80
[   25.524895]  ret_from_fork_asm+0x1a/0x30
[   25.525378] 
[   25.525528] The buggy address belongs to the object at ffff888100a7a9a0
[   25.525528]  which belongs to the cache kmalloc-16 of size 16
[   25.526143] The buggy address is located 8 bytes inside of
[   25.526143]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.526722] 
[   25.526870] The buggy address belongs to the physical page:
[   25.527179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.527943] flags: 0x200000000000000(node=0|zone=2)
[   25.528440] page_type: f5(slab)
[   25.528882] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.531022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.531470] page dumped because: kasan: bad access detected
[   25.532501] 
[   25.532659] Memory state around the buggy address:
[   25.533277]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.533923]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.534344] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.534827]                                   ^
[   25.535240]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.535923]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.536873] ==================================================================
[   25.628471] ==================================================================
[   25.630172] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.630883] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282
[   25.631370] 
[   25.631565] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.631723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.632499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.632534] Call Trace:
[   25.632553]  <TASK>
[   25.632574]  dump_stack_lvl+0x73/0xb0
[   25.632617]  print_report+0xd1/0x660
[   25.632650]  ? __virt_addr_valid+0x1db/0x2d0
[   25.632720]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.632796]  kasan_report+0x104/0x140
[   25.632826]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.632870]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.632917]  kasan_check_range+0x10c/0x1c0
[   25.632953]  __kasan_check_write+0x18/0x20
[   25.632981]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.633021]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.633063]  ? kasan_save_alloc_info+0x3b/0x50
[   25.633096]  ? kasan_save_stack+0x3d/0x60
[   25.633155]  kasan_bitops_generic+0x121/0x1c0
[   25.633191]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.633226]  ? __pfx_read_tsc+0x10/0x10
[   25.633257]  ? ktime_get_ts64+0x86/0x240
[   25.633293]  kunit_try_run_case+0x1b2/0x490
[   25.633326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.633358]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.633389]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.633420]  ? __kthread_parkme+0x82/0x160
[   25.633451]  ? preempt_count_sub+0x50/0x80
[   25.633486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.633519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.633553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.633587]  kthread+0x323/0x710
[   25.633617]  ? trace_preempt_on+0x20/0xc0
[   25.633651]  ? __pfx_kthread+0x10/0x10
[   25.633682]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.633719]  ? calculate_sigpending+0x7b/0xa0
[   25.633774]  ? __pfx_kthread+0x10/0x10
[   25.633806]  ret_from_fork+0x41/0x80
[   25.633838]  ? __pfx_kthread+0x10/0x10
[   25.633870]  ret_from_fork_asm+0x1a/0x30
[   25.633917]  </TASK>
[   25.633932] 
[   25.648908] Allocated by task 282:
[   25.649162]  kasan_save_stack+0x3d/0x60
[   25.649582]  kasan_save_track+0x18/0x40
[   25.650170]  kasan_save_alloc_info+0x3b/0x50
[   25.650539]  __kasan_kmalloc+0xb7/0xc0
[   25.650879]  __kmalloc_cache_noprof+0x183/0x410
[   25.651420]  kasan_bitops_generic+0x92/0x1c0
[   25.652007]  kunit_try_run_case+0x1b2/0x490
[   25.652326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.652660]  kthread+0x323/0x710
[   25.653027]  ret_from_fork+0x41/0x80
[   25.653477]  ret_from_fork_asm+0x1a/0x30
[   25.653890] 
[   25.654190] The buggy address belongs to the object at ffff888100a7a9a0
[   25.654190]  which belongs to the cache kmalloc-16 of size 16
[   25.655058] The buggy address is located 8 bytes inside of
[   25.655058]  allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9)
[   25.655784] 
[   25.656023] The buggy address belongs to the physical page:
[   25.656594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a
[   25.657562] flags: 0x200000000000000(node=0|zone=2)
[   25.658306] page_type: f5(slab)
[   25.658606] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.659008] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.659725] page dumped because: kasan: bad access detected
[   25.660350] 
[   25.660609] Memory state around the buggy address:
[   25.661159]  ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.661539]  ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc
[   25.661912] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.662460]                                   ^
[   25.662928]  ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.663798]  ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.664555] ==================================================================