Hay
Date
May 15, 2025, 10:38 a.m.

Environment
qemu-x86_64

[   16.617914] ==================================================================
[   16.619251] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.620080] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.620902] 
[   16.621310] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.621417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.621443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.621479] Call Trace:
[   16.621507]  <TASK>
[   16.621537]  dump_stack_lvl+0x73/0xb0
[   16.621609]  print_report+0xd1/0x650
[   16.621646]  ? __virt_addr_valid+0x1db/0x2d0
[   16.621685]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.621724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.621759]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.621800]  kasan_report+0x141/0x180
[   16.621828]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.621857]  kasan_check_range+0x10c/0x1c0
[   16.621881]  __kasan_check_write+0x18/0x20
[   16.621900]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.621924]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.621950]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.621970]  ? kasan_bitops_generic+0x92/0x1c0
[   16.621995]  kasan_bitops_generic+0x121/0x1c0
[   16.622018]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.622040]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.622066]  kunit_try_run_case+0x1a5/0x480
[   16.622091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.622111]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.622134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.622155]  ? __kthread_parkme+0x82/0x180
[   16.622175]  ? preempt_count_sub+0x50/0x80
[   16.622199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.622239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.622266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.622288]  kthread+0x337/0x6f0
[   16.622307]  ? trace_preempt_on+0x20/0xc0
[   16.622331]  ? __pfx_kthread+0x10/0x10
[   16.622366]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.622389]  ? calculate_sigpending+0x7b/0xa0
[   16.622414]  ? __pfx_kthread+0x10/0x10
[   16.622436]  ret_from_fork+0x116/0x1d0
[   16.622473]  ? __pfx_kthread+0x10/0x10
[   16.622510]  ret_from_fork_asm+0x1a/0x30
[   16.622562]  </TASK>
[   16.622583] 
[   16.634655] Allocated by task 279:
[   16.634960]  kasan_save_stack+0x45/0x70
[   16.635214]  kasan_save_track+0x18/0x40
[   16.635920]  kasan_save_alloc_info+0x3b/0x50
[   16.636206]  __kasan_kmalloc+0xb7/0xc0
[   16.636646]  __kmalloc_cache_noprof+0x189/0x420
[   16.637009]  kasan_bitops_generic+0x92/0x1c0
[   16.637313]  kunit_try_run_case+0x1a5/0x480
[   16.638061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.638406]  kthread+0x337/0x6f0
[   16.638885]  ret_from_fork+0x116/0x1d0
[   16.639150]  ret_from_fork_asm+0x1a/0x30
[   16.639716] 
[   16.639900] The buggy address belongs to the object at ffff8881022a34c0
[   16.639900]  which belongs to the cache kmalloc-16 of size 16
[   16.640578] The buggy address is located 8 bytes inside of
[   16.640578]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.641399] 
[   16.641977] The buggy address belongs to the physical page:
[   16.642390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.642963] flags: 0x200000000000000(node=0|zone=2)
[   16.643342] page_type: f5(slab)
[   16.643824] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.644266] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.644903] page dumped because: kasan: bad access detected
[   16.645159] 
[   16.645324] Memory state around the buggy address:
[   16.646002]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.646609]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.646928] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.647420]                                               ^
[   16.648039]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.648391]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.648973] ==================================================================
[   16.720704] ==================================================================
[   16.721379] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.722140] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.722642] 
[   16.722771] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.722839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.722853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.722875] Call Trace:
[   16.722889]  <TASK>
[   16.722909]  dump_stack_lvl+0x73/0xb0
[   16.722941]  print_report+0xd1/0x650
[   16.722983]  ? __virt_addr_valid+0x1db/0x2d0
[   16.723008]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.723034]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.723055]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.723080]  kasan_report+0x141/0x180
[   16.723101]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.723149]  kasan_check_range+0x10c/0x1c0
[   16.723172]  __kasan_check_write+0x18/0x20
[   16.723191]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.723216]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.723253]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.723275]  ? kasan_bitops_generic+0x92/0x1c0
[   16.723300]  kasan_bitops_generic+0x121/0x1c0
[   16.723323]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.723345]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.723371]  kunit_try_run_case+0x1a5/0x480
[   16.723410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.723434]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.723565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.723592]  ? __kthread_parkme+0x82/0x180
[   16.723614]  ? preempt_count_sub+0x50/0x80
[   16.723638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.723661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.723684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.723706]  kthread+0x337/0x6f0
[   16.723725]  ? trace_preempt_on+0x20/0xc0
[   16.723748]  ? __pfx_kthread+0x10/0x10
[   16.723769]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.723808]  ? calculate_sigpending+0x7b/0xa0
[   16.723832]  ? __pfx_kthread+0x10/0x10
[   16.723854]  ret_from_fork+0x116/0x1d0
[   16.723873]  ? __pfx_kthread+0x10/0x10
[   16.723892]  ret_from_fork_asm+0x1a/0x30
[   16.723922]  </TASK>
[   16.723950] 
[   16.731089] Allocated by task 279:
[   16.731194]  kasan_save_stack+0x45/0x70
[   16.731317]  kasan_save_track+0x18/0x40
[   16.731642]  kasan_save_alloc_info+0x3b/0x50
[   16.731759]  __kasan_kmalloc+0xb7/0xc0
[   16.731967]  __kmalloc_cache_noprof+0x189/0x420
[   16.732158]  kasan_bitops_generic+0x92/0x1c0
[   16.732263]  kunit_try_run_case+0x1a5/0x480
[   16.732357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.732768]  kthread+0x337/0x6f0
[   16.732944]  ret_from_fork+0x116/0x1d0
[   16.733120]  ret_from_fork_asm+0x1a/0x30
[   16.733331] 
[   16.733575] The buggy address belongs to the object at ffff8881022a34c0
[   16.733575]  which belongs to the cache kmalloc-16 of size 16
[   16.733960] The buggy address is located 8 bytes inside of
[   16.733960]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.734154] 
[   16.734210] The buggy address belongs to the physical page:
[   16.734410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.734919] flags: 0x200000000000000(node=0|zone=2)
[   16.735238] page_type: f5(slab)
[   16.735367] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.735603] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.735934] page dumped because: kasan: bad access detected
[   16.736276] 
[   16.736400] Memory state around the buggy address:
[   16.736803]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.737088]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.737216] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.737354]                                               ^
[   16.737622]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.737999]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.738311] ==================================================================
[   16.757005] ==================================================================
[   16.757405] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.758062] Read of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.758198] 
[   16.758285] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.758364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.758378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.758402] Call Trace:
[   16.758423]  <TASK>
[   16.758444]  dump_stack_lvl+0x73/0xb0
[   16.758475]  print_report+0xd1/0x650
[   16.758500]  ? __virt_addr_valid+0x1db/0x2d0
[   16.758786]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.758818]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.758841]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.758869]  kasan_report+0x141/0x180
[   16.758897]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.758929]  kasan_check_range+0x10c/0x1c0
[   16.758953]  __kasan_check_read+0x15/0x20
[   16.758974]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.759001]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.759029]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.759052]  ? kasan_bitops_generic+0x92/0x1c0
[   16.759079]  kasan_bitops_generic+0x121/0x1c0
[   16.759103]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.759127]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.759179]  kunit_try_run_case+0x1a5/0x480
[   16.759211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.759261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.759290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.759314]  ? __kthread_parkme+0x82/0x180
[   16.759345]  ? preempt_count_sub+0x50/0x80
[   16.759370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.759396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.759418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.759439]  kthread+0x337/0x6f0
[   16.759459]  ? trace_preempt_on+0x20/0xc0
[   16.759483]  ? __pfx_kthread+0x10/0x10
[   16.759503]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.759639]  ? calculate_sigpending+0x7b/0xa0
[   16.759665]  ? __pfx_kthread+0x10/0x10
[   16.759688]  ret_from_fork+0x116/0x1d0
[   16.759707]  ? __pfx_kthread+0x10/0x10
[   16.759728]  ret_from_fork_asm+0x1a/0x30
[   16.759760]  </TASK>
[   16.759772] 
[   16.767214] Allocated by task 279:
[   16.767486]  kasan_save_stack+0x45/0x70
[   16.767752]  kasan_save_track+0x18/0x40
[   16.768251]  kasan_save_alloc_info+0x3b/0x50
[   16.768365]  __kasan_kmalloc+0xb7/0xc0
[   16.768456]  __kmalloc_cache_noprof+0x189/0x420
[   16.768751]  kasan_bitops_generic+0x92/0x1c0
[   16.769040]  kunit_try_run_case+0x1a5/0x480
[   16.769317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.769731]  kthread+0x337/0x6f0
[   16.769898]  ret_from_fork+0x116/0x1d0
[   16.770008]  ret_from_fork_asm+0x1a/0x30
[   16.770101] 
[   16.770154] The buggy address belongs to the object at ffff8881022a34c0
[   16.770154]  which belongs to the cache kmalloc-16 of size 16
[   16.770989] The buggy address is located 8 bytes inside of
[   16.770989]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.771193] 
[   16.771260] The buggy address belongs to the physical page:
[   16.771631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.772100] flags: 0x200000000000000(node=0|zone=2)
[   16.772217] page_type: f5(slab)
[   16.772320] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.772617] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.773055] page dumped because: kasan: bad access detected
[   16.773415] 
[   16.773585] Memory state around the buggy address:
[   16.773768]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.773897]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.774023] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.774303]                                               ^
[   16.774652]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.775186]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.775325] ==================================================================
[   16.681207] ==================================================================
[   16.681656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.682254] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.682765] 
[   16.683023] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.683107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.683122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.683143] Call Trace:
[   16.683168]  <TASK>
[   16.683191]  dump_stack_lvl+0x73/0xb0
[   16.683240]  print_report+0xd1/0x650
[   16.683269]  ? __virt_addr_valid+0x1db/0x2d0
[   16.683294]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.683320]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.683341]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.683366]  kasan_report+0x141/0x180
[   16.683388]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.683418]  kasan_check_range+0x10c/0x1c0
[   16.683440]  __kasan_check_write+0x18/0x20
[   16.683473]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.683574]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.683643]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.683668]  ? kasan_bitops_generic+0x92/0x1c0
[   16.683695]  kasan_bitops_generic+0x121/0x1c0
[   16.683718]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.683741]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.683768]  kunit_try_run_case+0x1a5/0x480
[   16.683797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.683818]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.683843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.683865]  ? __kthread_parkme+0x82/0x180
[   16.683886]  ? preempt_count_sub+0x50/0x80
[   16.683909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.683931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.683952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.683974]  kthread+0x337/0x6f0
[   16.683992]  ? trace_preempt_on+0x20/0xc0
[   16.684016]  ? __pfx_kthread+0x10/0x10
[   16.684036]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.684056]  ? calculate_sigpending+0x7b/0xa0
[   16.684079]  ? __pfx_kthread+0x10/0x10
[   16.684100]  ret_from_fork+0x116/0x1d0
[   16.684118]  ? __pfx_kthread+0x10/0x10
[   16.684138]  ret_from_fork_asm+0x1a/0x30
[   16.684170]  </TASK>
[   16.684182] 
[   16.693963] Allocated by task 279:
[   16.694281]  kasan_save_stack+0x45/0x70
[   16.694576]  kasan_save_track+0x18/0x40
[   16.694876]  kasan_save_alloc_info+0x3b/0x50
[   16.695107]  __kasan_kmalloc+0xb7/0xc0
[   16.695379]  __kmalloc_cache_noprof+0x189/0x420
[   16.695714]  kasan_bitops_generic+0x92/0x1c0
[   16.695988]  kunit_try_run_case+0x1a5/0x480
[   16.696251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.696682]  kthread+0x337/0x6f0
[   16.696861]  ret_from_fork+0x116/0x1d0
[   16.696966]  ret_from_fork_asm+0x1a/0x30
[   16.697293] 
[   16.697408] The buggy address belongs to the object at ffff8881022a34c0
[   16.697408]  which belongs to the cache kmalloc-16 of size 16
[   16.698112] The buggy address is located 8 bytes inside of
[   16.698112]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.699019] 
[   16.699127] The buggy address belongs to the physical page:
[   16.699413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.699853] flags: 0x200000000000000(node=0|zone=2)
[   16.700692] page_type: f5(slab)
[   16.700830] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.700982] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.701113] page dumped because: kasan: bad access detected
[   16.701214] 
[   16.701279] Memory state around the buggy address:
[   16.701536]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.701737]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.701861] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.702162]                                               ^
[   16.702424]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.702674]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.703029] ==================================================================
[   16.776045] ==================================================================
[   16.776197] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.776700] Read of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.777027] 
[   16.777460] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.777533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.777547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.777570] Call Trace:
[   16.777593]  <TASK>
[   16.777712]  dump_stack_lvl+0x73/0xb0
[   16.777745]  print_report+0xd1/0x650
[   16.777787]  ? __virt_addr_valid+0x1db/0x2d0
[   16.777814]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.777840]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.777862]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.777887]  kasan_report+0x141/0x180
[   16.777925]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.777960]  __asan_report_load8_noabort+0x18/0x20
[   16.777981]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.778007]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.778034]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.778074]  ? kasan_bitops_generic+0x92/0x1c0
[   16.778102]  kasan_bitops_generic+0x121/0x1c0
[   16.778125]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.778148]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.778176]  kunit_try_run_case+0x1a5/0x480
[   16.778201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.778241]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.778268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.778290]  ? __kthread_parkme+0x82/0x180
[   16.778311]  ? preempt_count_sub+0x50/0x80
[   16.778342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.778368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.778391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.778415]  kthread+0x337/0x6f0
[   16.778434]  ? trace_preempt_on+0x20/0xc0
[   16.778483]  ? __pfx_kthread+0x10/0x10
[   16.778504]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.778526]  ? calculate_sigpending+0x7b/0xa0
[   16.778620]  ? __pfx_kthread+0x10/0x10
[   16.778662]  ret_from_fork+0x116/0x1d0
[   16.778685]  ? __pfx_kthread+0x10/0x10
[   16.778705]  ret_from_fork_asm+0x1a/0x30
[   16.778736]  </TASK>
[   16.778748] 
[   16.785198] Allocated by task 279:
[   16.785309]  kasan_save_stack+0x45/0x70
[   16.785804]  kasan_save_track+0x18/0x40
[   16.786144]  kasan_save_alloc_info+0x3b/0x50
[   16.786427]  __kasan_kmalloc+0xb7/0xc0
[   16.786671]  __kmalloc_cache_noprof+0x189/0x420
[   16.786772]  kasan_bitops_generic+0x92/0x1c0
[   16.786870]  kunit_try_run_case+0x1a5/0x480
[   16.787102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.787570]  kthread+0x337/0x6f0
[   16.787805]  ret_from_fork+0x116/0x1d0
[   16.787968]  ret_from_fork_asm+0x1a/0x30
[   16.788061] 
[   16.788115] The buggy address belongs to the object at ffff8881022a34c0
[   16.788115]  which belongs to the cache kmalloc-16 of size 16
[   16.788752] The buggy address is located 8 bytes inside of
[   16.788752]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.788950] 
[   16.789005] The buggy address belongs to the physical page:
[   16.789108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.789259] flags: 0x200000000000000(node=0|zone=2)
[   16.789579] page_type: f5(slab)
[   16.789799] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.790239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.790700] page dumped because: kasan: bad access detected
[   16.790859] 
[   16.790912] Memory state around the buggy address:
[   16.791008]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.791134]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.791697] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.792156]                                               ^
[   16.792572]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.792856]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.793095] ==================================================================
[   16.650175] ==================================================================
[   16.650919] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.651419] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.652060] 
[   16.652324] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.652424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.652449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.652700] Call Trace:
[   16.652744]  <TASK>
[   16.652808]  dump_stack_lvl+0x73/0xb0
[   16.652888]  print_report+0xd1/0x650
[   16.652929]  ? __virt_addr_valid+0x1db/0x2d0
[   16.652963]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.653003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.653034]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.653060]  kasan_report+0x141/0x180
[   16.653082]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.653113]  kasan_check_range+0x10c/0x1c0
[   16.653135]  __kasan_check_write+0x18/0x20
[   16.653155]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.653181]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.653206]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.653248]  ? kasan_bitops_generic+0x92/0x1c0
[   16.653278]  kasan_bitops_generic+0x121/0x1c0
[   16.653301]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.653324]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.653352]  kunit_try_run_case+0x1a5/0x480
[   16.653377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.653399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.653423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.653444]  ? __kthread_parkme+0x82/0x180
[   16.653517]  ? preempt_count_sub+0x50/0x80
[   16.653563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.653599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.653637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.653673]  kthread+0x337/0x6f0
[   16.653704]  ? trace_preempt_on+0x20/0xc0
[   16.653745]  ? __pfx_kthread+0x10/0x10
[   16.653779]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.653831]  ? calculate_sigpending+0x7b/0xa0
[   16.653857]  ? __pfx_kthread+0x10/0x10
[   16.653878]  ret_from_fork+0x116/0x1d0
[   16.653898]  ? __pfx_kthread+0x10/0x10
[   16.653918]  ret_from_fork_asm+0x1a/0x30
[   16.653950]  </TASK>
[   16.653963] 
[   16.667248] Allocated by task 279:
[   16.667823]  kasan_save_stack+0x45/0x70
[   16.668158]  kasan_save_track+0x18/0x40
[   16.668653]  kasan_save_alloc_info+0x3b/0x50
[   16.669029]  __kasan_kmalloc+0xb7/0xc0
[   16.669255]  __kmalloc_cache_noprof+0x189/0x420
[   16.669923]  kasan_bitops_generic+0x92/0x1c0
[   16.670288]  kunit_try_run_case+0x1a5/0x480
[   16.670835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.671239]  kthread+0x337/0x6f0
[   16.671688]  ret_from_fork+0x116/0x1d0
[   16.671857]  ret_from_fork_asm+0x1a/0x30
[   16.672169] 
[   16.672338] The buggy address belongs to the object at ffff8881022a34c0
[   16.672338]  which belongs to the cache kmalloc-16 of size 16
[   16.673017] The buggy address is located 8 bytes inside of
[   16.673017]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.673538] 
[   16.673732] The buggy address belongs to the physical page:
[   16.674743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.675105] flags: 0x200000000000000(node=0|zone=2)
[   16.675736] page_type: f5(slab)
[   16.675975] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.676373] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.676876] page dumped because: kasan: bad access detected
[   16.677287] 
[   16.677418] Memory state around the buggy address:
[   16.678033]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.678306]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.678754] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.679026]                                               ^
[   16.679986]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.680266]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.680489] ==================================================================
[   16.738956] ==================================================================
[   16.739262] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.739627] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.739946] 
[   16.740098] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.740151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.740164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.740185] Call Trace:
[   16.740207]  <TASK>
[   16.740237]  dump_stack_lvl+0x73/0xb0
[   16.740269]  print_report+0xd1/0x650
[   16.740294]  ? __virt_addr_valid+0x1db/0x2d0
[   16.740318]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.740366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.740391]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.740417]  kasan_report+0x141/0x180
[   16.740438]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.740467]  kasan_check_range+0x10c/0x1c0
[   16.740489]  __kasan_check_write+0x18/0x20
[   16.740508]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.740533]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.740559]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.740579]  ? kasan_bitops_generic+0x92/0x1c0
[   16.740605]  kasan_bitops_generic+0x121/0x1c0
[   16.740628]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.740650]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.740677]  kunit_try_run_case+0x1a5/0x480
[   16.740702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.740725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.740747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.741022]  ? __kthread_parkme+0x82/0x180
[   16.741055]  ? preempt_count_sub+0x50/0x80
[   16.741081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.741105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.741128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.741149]  kthread+0x337/0x6f0
[   16.741167]  ? trace_preempt_on+0x20/0xc0
[   16.741193]  ? __pfx_kthread+0x10/0x10
[   16.741259]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.741281]  ? calculate_sigpending+0x7b/0xa0
[   16.741305]  ? __pfx_kthread+0x10/0x10
[   16.741326]  ret_from_fork+0x116/0x1d0
[   16.741344]  ? __pfx_kthread+0x10/0x10
[   16.741363]  ret_from_fork_asm+0x1a/0x30
[   16.741395]  </TASK>
[   16.741408] 
[   16.748891] Allocated by task 279:
[   16.749008]  kasan_save_stack+0x45/0x70
[   16.749294]  kasan_save_track+0x18/0x40
[   16.749548]  kasan_save_alloc_info+0x3b/0x50
[   16.749646]  __kasan_kmalloc+0xb7/0xc0
[   16.749732]  __kmalloc_cache_noprof+0x189/0x420
[   16.749852]  kasan_bitops_generic+0x92/0x1c0
[   16.750112]  kunit_try_run_case+0x1a5/0x480
[   16.750528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.750819]  kthread+0x337/0x6f0
[   16.750908]  ret_from_fork+0x116/0x1d0
[   16.751131]  ret_from_fork_asm+0x1a/0x30
[   16.751499] 
[   16.751555] The buggy address belongs to the object at ffff8881022a34c0
[   16.751555]  which belongs to the cache kmalloc-16 of size 16
[   16.751957] The buggy address is located 8 bytes inside of
[   16.751957]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.752155] 
[   16.752209] The buggy address belongs to the physical page:
[   16.752324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.752809] flags: 0x200000000000000(node=0|zone=2)
[   16.753156] page_type: f5(slab)
[   16.753395] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.753591] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.753720] page dumped because: kasan: bad access detected
[   16.753818] 
[   16.753866] Memory state around the buggy address:
[   16.753994]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.754846]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.755292] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.755684]                                               ^
[   16.755911]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.756210]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.756429] ==================================================================
[   16.703445] ==================================================================
[   16.703857] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.704296] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.704616] 
[   16.704740] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.704792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.704804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.704878] Call Trace:
[   16.704901]  <TASK>
[   16.704923]  dump_stack_lvl+0x73/0xb0
[   16.704951]  print_report+0xd1/0x650
[   16.704975]  ? __virt_addr_valid+0x1db/0x2d0
[   16.704997]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.705022]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.705044]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.705069]  kasan_report+0x141/0x180
[   16.705091]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.705121]  kasan_check_range+0x10c/0x1c0
[   16.705144]  __kasan_check_write+0x18/0x20
[   16.705164]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.705190]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.705216]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.705250]  ? kasan_bitops_generic+0x92/0x1c0
[   16.705277]  kasan_bitops_generic+0x121/0x1c0
[   16.705300]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.705323]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.705351]  kunit_try_run_case+0x1a5/0x480
[   16.705377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.705399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.705422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.705443]  ? __kthread_parkme+0x82/0x180
[   16.705464]  ? preempt_count_sub+0x50/0x80
[   16.705498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.705523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.705546]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.705585]  kthread+0x337/0x6f0
[   16.705604]  ? trace_preempt_on+0x20/0xc0
[   16.705658]  ? __pfx_kthread+0x10/0x10
[   16.705679]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.705701]  ? calculate_sigpending+0x7b/0xa0
[   16.705724]  ? __pfx_kthread+0x10/0x10
[   16.705745]  ret_from_fork+0x116/0x1d0
[   16.705764]  ? __pfx_kthread+0x10/0x10
[   16.705785]  ret_from_fork_asm+0x1a/0x30
[   16.705816]  </TASK>
[   16.705828] 
[   16.712726] Allocated by task 279:
[   16.712929]  kasan_save_stack+0x45/0x70
[   16.713129]  kasan_save_track+0x18/0x40
[   16.713299]  kasan_save_alloc_info+0x3b/0x50
[   16.713395]  __kasan_kmalloc+0xb7/0xc0
[   16.713547]  __kmalloc_cache_noprof+0x189/0x420
[   16.713708]  kasan_bitops_generic+0x92/0x1c0
[   16.713953]  kunit_try_run_case+0x1a5/0x480
[   16.714181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.714748]  kthread+0x337/0x6f0
[   16.714978]  ret_from_fork+0x116/0x1d0
[   16.715174]  ret_from_fork_asm+0x1a/0x30
[   16.715279] 
[   16.715334] The buggy address belongs to the object at ffff8881022a34c0
[   16.715334]  which belongs to the cache kmalloc-16 of size 16
[   16.715953] The buggy address is located 8 bytes inside of
[   16.715953]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.716147] 
[   16.716200] The buggy address belongs to the physical page:
[   16.716313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.716540] flags: 0x200000000000000(node=0|zone=2)
[   16.716766] page_type: f5(slab)
[   16.716971] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.717279] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.717702] page dumped because: kasan: bad access detected
[   16.718011] 
[   16.718144] Memory state around the buggy address:
[   16.718393]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.718892]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.719174] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.719386]                                               ^
[   16.719668]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.719925]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.720107] ==================================================================
[   16.585357] ==================================================================
[   16.586180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.586648] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.586895] 
[   16.587039] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.587759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.587785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.587836] Call Trace:
[   16.587878]  <TASK>
[   16.587915]  dump_stack_lvl+0x73/0xb0
[   16.587973]  print_report+0xd1/0x650
[   16.588020]  ? __virt_addr_valid+0x1db/0x2d0
[   16.588065]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.588124]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.588186]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.588243]  kasan_report+0x141/0x180
[   16.588272]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.588303]  kasan_check_range+0x10c/0x1c0
[   16.588326]  __kasan_check_write+0x18/0x20
[   16.588345]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.588383]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.588430]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.588468]  ? kasan_bitops_generic+0x92/0x1c0
[   16.588513]  kasan_bitops_generic+0x121/0x1c0
[   16.588652]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.588694]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.588747]  kunit_try_run_case+0x1a5/0x480
[   16.588796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.588830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.589045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.589085]  ? __kthread_parkme+0x82/0x180
[   16.589125]  ? preempt_count_sub+0x50/0x80
[   16.589151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.589175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.589199]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.589243]  kthread+0x337/0x6f0
[   16.589268]  ? trace_preempt_on+0x20/0xc0
[   16.589293]  ? __pfx_kthread+0x10/0x10
[   16.589314]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.589334]  ? calculate_sigpending+0x7b/0xa0
[   16.589360]  ? __pfx_kthread+0x10/0x10
[   16.589380]  ret_from_fork+0x116/0x1d0
[   16.589399]  ? __pfx_kthread+0x10/0x10
[   16.589419]  ret_from_fork_asm+0x1a/0x30
[   16.589448]  </TASK>
[   16.589478] 
[   16.603944] Allocated by task 279:
[   16.604455]  kasan_save_stack+0x45/0x70
[   16.605281]  kasan_save_track+0x18/0x40
[   16.605496]  kasan_save_alloc_info+0x3b/0x50
[   16.605966]  __kasan_kmalloc+0xb7/0xc0
[   16.606430]  __kmalloc_cache_noprof+0x189/0x420
[   16.606734]  kasan_bitops_generic+0x92/0x1c0
[   16.607055]  kunit_try_run_case+0x1a5/0x480
[   16.607251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.607442]  kthread+0x337/0x6f0
[   16.607746]  ret_from_fork+0x116/0x1d0
[   16.608042]  ret_from_fork_asm+0x1a/0x30
[   16.608349] 
[   16.608520] The buggy address belongs to the object at ffff8881022a34c0
[   16.608520]  which belongs to the cache kmalloc-16 of size 16
[   16.609231] The buggy address is located 8 bytes inside of
[   16.609231]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.609604] 
[   16.609792] The buggy address belongs to the physical page:
[   16.610234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.611006] flags: 0x200000000000000(node=0|zone=2)
[   16.611383] page_type: f5(slab)
[   16.611695] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.611961] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.612463] page dumped because: kasan: bad access detected
[   16.612860] 
[   16.613047] Memory state around the buggy address:
[   16.613517]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.613714]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.614265] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.614556]                                               ^
[   16.614766]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.615265]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.615922] ==================================================================