Hay
Date
May 26, 2025, 9:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   20.368527] ==================================================================
[   20.368654] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.368931] Write of size 8 at addr fff00000c3eeb5e8 by task kunit_try_catch/261
[   20.369120] 
[   20.369311] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.370043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.370140] Hardware name: linux,dummy-virt (DT)
[   20.370427] Call trace:
[   20.370714]  show_stack+0x20/0x38 (C)
[   20.371212]  dump_stack_lvl+0x8c/0xd0
[   20.371464]  print_report+0x118/0x608
[   20.371739]  kasan_report+0xdc/0x128
[   20.372104]  kasan_check_range+0x100/0x1a8
[   20.372173]  __kasan_check_write+0x20/0x30
[   20.372225]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.372279]  kasan_bitops_generic+0x110/0x1c8
[   20.372341]  kunit_try_run_case+0x170/0x3f0
[   20.372398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.372506]  kthread+0x328/0x630
[   20.372618]  ret_from_fork+0x10/0x20
[   20.372685] 
[   20.372737] Allocated by task 261:
[   20.372773]  kasan_save_stack+0x3c/0x68
[   20.372820]  kasan_save_track+0x20/0x40
[   20.372862]  kasan_save_alloc_info+0x40/0x58
[   20.372904]  __kasan_kmalloc+0xd4/0xd8
[   20.372942]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.372988]  kasan_bitops_generic+0xa0/0x1c8
[   20.373028]  kunit_try_run_case+0x170/0x3f0
[   20.373067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.373122]  kthread+0x328/0x630
[   20.373189]  ret_from_fork+0x10/0x20
[   20.373246] 
[   20.373269] The buggy address belongs to the object at fff00000c3eeb5e0
[   20.373269]  which belongs to the cache kmalloc-16 of size 16
[   20.373347] The buggy address is located 8 bytes inside of
[   20.373347]  allocated 9-byte region [fff00000c3eeb5e0, fff00000c3eeb5e9)
[   20.373472] 
[   20.373499] The buggy address belongs to the physical page:
[   20.373562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb
[   20.373618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.373673] page_type: f5(slab)
[   20.373720] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.373776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.373816] page dumped because: kasan: bad access detected
[   20.373850] 
[   20.373869] Memory state around the buggy address:
[   20.374024] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.375539]  kasan_report+0xdc/0x128
[   20.375964]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.376226]  kunit_try_run_case+0x170/0x3f0
[   20.377406]  kasan_save_alloc_info+0x40/0x58
[   20.378011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.378695] 
[   20.379422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.380045] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.382031]  show_stack+0x20/0x38 (C)
[   20.383484]  kunit_try_run_case+0x170/0x3f0
[   20.383636] 
[   20.383717] The buggy address is located 8 bytes inside of
[   20.383717]  allocated 9-byte region [fff00000c3eeb5e0, fff00000c3eeb5e9)
[   20.383939] page_type: f5(slab)
[   20.386530] Call trace:
[   20.387272]  kasan_save_stack+0x3c/0x68
[   20.389495] 
[   20.390248] page_type: f5(slab)
[   20.397292]  kunit_try_run_case+0x170/0x3f0
[   20.398727]  kasan_save_track+0x20/0x40
[   20.399896]  kthread+0x328/0x630
[   20.400408] 
[   20.400886] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.404019]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.406045] ==================================================================


[   13.093694] ==================================================================
[   13.094791] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.095358] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.095758] 
[   13.095992] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.096159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.096175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.096196] Call Trace:
[   13.096212]  <TASK>
[   13.096228]  dump_stack_lvl+0x73/0xb0
[   13.096257]  print_report+0xd1/0x650
[   13.096282]  ? __virt_addr_valid+0x1db/0x2d0
[   13.096305]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.096331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.096354]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.096396]  kasan_report+0x141/0x180
[   13.096419]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.096449]  kasan_check_range+0x10c/0x1c0
[   13.096474]  __kasan_check_write+0x18/0x20
[   13.096493]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.096519]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.096546]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.096566]  ? trace_hardirqs_on+0x37/0xe0
[   13.096590]  ? kasan_bitops_generic+0x92/0x1c0
[   13.096616]  kasan_bitops_generic+0x116/0x1c0
[   13.096636]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.096663]  ? __pfx_read_tsc+0x10/0x10
[   13.096685]  ? ktime_get_ts64+0x86/0x230
[   13.096710]  kunit_try_run_case+0x1a5/0x480
[   13.096731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.096750]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.096775]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.096800]  ? __kthread_parkme+0x82/0x180
[   13.096820]  ? preempt_count_sub+0x50/0x80
[   13.096844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.096864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.096888]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.096912]  kthread+0x337/0x6f0
[   13.096931]  ? trace_preempt_on+0x20/0xc0
[   13.096953]  ? __pfx_kthread+0x10/0x10
[   13.096973]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.096996]  ? calculate_sigpending+0x7b/0xa0
[   13.097072]  ? __pfx_kthread+0x10/0x10
[   13.097096]  ret_from_fork+0x116/0x1d0
[   13.097115]  ? __pfx_kthread+0x10/0x10
[   13.097136]  ret_from_fork_asm+0x1a/0x30
[   13.097167]  </TASK>
[   13.097177] 
[   13.106200] Allocated by task 279:
[   13.106543]  kasan_save_stack+0x45/0x70
[   13.106928]  kasan_save_track+0x18/0x40
[   13.107279]  kasan_save_alloc_info+0x3b/0x50
[   13.107943]  __kasan_kmalloc+0xb7/0xc0
[   13.108285]  __kmalloc_cache_noprof+0x189/0x420
[   13.108533]  kasan_bitops_generic+0x92/0x1c0
[   13.108696]  kunit_try_run_case+0x1a5/0x480
[   13.108900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.109160]  kthread+0x337/0x6f0
[   13.109408]  ret_from_fork+0x116/0x1d0
[   13.109585]  ret_from_fork_asm+0x1a/0x30
[   13.109738] 
[   13.109827] The buggy address belongs to the object at ffff888101892d40
[   13.109827]  which belongs to the cache kmalloc-16 of size 16
[   13.110646] The buggy address is located 8 bytes inside of
[   13.110646]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.111148] 
[   13.111246] The buggy address belongs to the physical page:
[   13.111489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.112540] flags: 0x200000000000000(node=0|zone=2)
[   13.113229] page_type: f5(slab)
[   13.113408] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.113892] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.114331] page dumped because: kasan: bad access detected
[   13.114768] 
[   13.114852] Memory state around the buggy address:
[   13.115068]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.115601]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.116088] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.116501]                                               ^
[   13.116760]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.117443]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.117914] ==================================================================
[   13.164394] ==================================================================
[   13.164681] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.165145] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.165441] 
[   13.165528] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.165574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.165585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.165607] Call Trace:
[   13.165620]  <TASK>
[   13.165634]  dump_stack_lvl+0x73/0xb0
[   13.165660]  print_report+0xd1/0x650
[   13.165683]  ? __virt_addr_valid+0x1db/0x2d0
[   13.165743]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.165768]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.165801]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.165827]  kasan_report+0x141/0x180
[   13.165877]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.165908]  kasan_check_range+0x10c/0x1c0
[   13.165931]  __kasan_check_write+0x18/0x20
[   13.165961]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.165987]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.166013]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.166037]  ? trace_hardirqs_on+0x37/0xe0
[   13.166060]  ? kasan_bitops_generic+0x92/0x1c0
[   13.166084]  kasan_bitops_generic+0x116/0x1c0
[   13.166103]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.166128]  ? __pfx_read_tsc+0x10/0x10
[   13.166148]  ? ktime_get_ts64+0x86/0x230
[   13.166245]  kunit_try_run_case+0x1a5/0x480
[   13.166283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.166303]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.166328]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.166353]  ? __kthread_parkme+0x82/0x180
[   13.166373]  ? preempt_count_sub+0x50/0x80
[   13.166407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.166428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.166451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.166475]  kthread+0x337/0x6f0
[   13.166494]  ? trace_preempt_on+0x20/0xc0
[   13.166516]  ? __pfx_kthread+0x10/0x10
[   13.166536]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.166559]  ? calculate_sigpending+0x7b/0xa0
[   13.166582]  ? __pfx_kthread+0x10/0x10
[   13.166603]  ret_from_fork+0x116/0x1d0
[   13.166621]  ? __pfx_kthread+0x10/0x10
[   13.166641]  ret_from_fork_asm+0x1a/0x30
[   13.166671]  </TASK>
[   13.166682] 
[   13.176737] Allocated by task 279:
[   13.176931]  kasan_save_stack+0x45/0x70
[   13.177193]  kasan_save_track+0x18/0x40
[   13.177437]  kasan_save_alloc_info+0x3b/0x50
[   13.177796]  __kasan_kmalloc+0xb7/0xc0
[   13.177997]  __kmalloc_cache_noprof+0x189/0x420
[   13.178300]  kasan_bitops_generic+0x92/0x1c0
[   13.178464]  kunit_try_run_case+0x1a5/0x480
[   13.178630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.179074]  kthread+0x337/0x6f0
[   13.179255]  ret_from_fork+0x116/0x1d0
[   13.179434]  ret_from_fork_asm+0x1a/0x30
[   13.179612] 
[   13.179684] The buggy address belongs to the object at ffff888101892d40
[   13.179684]  which belongs to the cache kmalloc-16 of size 16
[   13.180312] The buggy address is located 8 bytes inside of
[   13.180312]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.181031] 
[   13.181249] The buggy address belongs to the physical page:
[   13.181478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.181724] flags: 0x200000000000000(node=0|zone=2)
[   13.181933] page_type: f5(slab)
[   13.182165] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.182667] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.183249] page dumped because: kasan: bad access detected
[   13.183468] 
[   13.183586] Memory state around the buggy address:
[   13.183909]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.184302]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.184616] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.185050]                                               ^
[   13.185348]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.185647]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.186340] ==================================================================
[   13.051914] ==================================================================
[   13.052501] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.052900] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.053251] 
[   13.053368] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.053428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.053441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.053464] Call Trace:
[   13.053476]  <TASK>
[   13.053493]  dump_stack_lvl+0x73/0xb0
[   13.053520]  print_report+0xd1/0x650
[   13.053543]  ? __virt_addr_valid+0x1db/0x2d0
[   13.053567]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.053592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.053614]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.053640]  kasan_report+0x141/0x180
[   13.053663]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.053693]  kasan_check_range+0x10c/0x1c0
[   13.053716]  __kasan_check_write+0x18/0x20
[   13.053735]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.053761]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.053787]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.053808]  ? trace_hardirqs_on+0x37/0xe0
[   13.053830]  ? kasan_bitops_generic+0x92/0x1c0
[   13.053853]  kasan_bitops_generic+0x116/0x1c0
[   13.053873]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.053898]  ? __pfx_read_tsc+0x10/0x10
[   13.053919]  ? ktime_get_ts64+0x86/0x230
[   13.053943]  kunit_try_run_case+0x1a5/0x480
[   13.053965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.053984]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.054021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.054049]  ? __kthread_parkme+0x82/0x180
[   13.054070]  ? preempt_count_sub+0x50/0x80
[   13.054094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.054114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.054138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.054162]  kthread+0x337/0x6f0
[   13.054180]  ? trace_preempt_on+0x20/0xc0
[   13.054202]  ? __pfx_kthread+0x10/0x10
[   13.054222]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.054245]  ? calculate_sigpending+0x7b/0xa0
[   13.054269]  ? __pfx_kthread+0x10/0x10
[   13.054290]  ret_from_fork+0x116/0x1d0
[   13.054308]  ? __pfx_kthread+0x10/0x10
[   13.054328]  ret_from_fork_asm+0x1a/0x30
[   13.054358]  </TASK>
[   13.054368] 
[   13.062590] Allocated by task 279:
[   13.062777]  kasan_save_stack+0x45/0x70
[   13.062986]  kasan_save_track+0x18/0x40
[   13.063169]  kasan_save_alloc_info+0x3b/0x50
[   13.063455]  __kasan_kmalloc+0xb7/0xc0
[   13.063606]  __kmalloc_cache_noprof+0x189/0x420
[   13.063920]  kasan_bitops_generic+0x92/0x1c0
[   13.064186]  kunit_try_run_case+0x1a5/0x480
[   13.064392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.064618]  kthread+0x337/0x6f0
[   13.064808]  ret_from_fork+0x116/0x1d0
[   13.064962]  ret_from_fork_asm+0x1a/0x30
[   13.065205] 
[   13.065289] The buggy address belongs to the object at ffff888101892d40
[   13.065289]  which belongs to the cache kmalloc-16 of size 16
[   13.065813] The buggy address is located 8 bytes inside of
[   13.065813]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.066438] 
[   13.066520] The buggy address belongs to the physical page:
[   13.066696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.066941] flags: 0x200000000000000(node=0|zone=2)
[   13.067172] page_type: f5(slab)
[   13.067559] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.067980] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.068291] page dumped because: kasan: bad access detected
[   13.068481] 
[   13.068552] Memory state around the buggy address:
[   13.068708]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.069176]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.069512] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.069836]                                               ^
[   13.070171]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.070450]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.070700] ==================================================================
[   13.209235] ==================================================================
[   13.209558] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.209853] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.210570] 
[   13.210703] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.210761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.210774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.210795] Call Trace:
[   13.210810]  <TASK>
[   13.210825]  dump_stack_lvl+0x73/0xb0
[   13.210851]  print_report+0xd1/0x650
[   13.210874]  ? __virt_addr_valid+0x1db/0x2d0
[   13.210896]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.210921]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.210943]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.210968]  kasan_report+0x141/0x180
[   13.210990]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.211088]  kasan_check_range+0x10c/0x1c0
[   13.211157]  __kasan_check_write+0x18/0x20
[   13.211188]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.211224]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.211251]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.211271]  ? trace_hardirqs_on+0x37/0xe0
[   13.211293]  ? kasan_bitops_generic+0x92/0x1c0
[   13.211317]  kasan_bitops_generic+0x116/0x1c0
[   13.211338]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.211363]  ? __pfx_read_tsc+0x10/0x10
[   13.211393]  ? ktime_get_ts64+0x86/0x230
[   13.211417]  kunit_try_run_case+0x1a5/0x480
[   13.211438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.211458]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.211482]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.211507]  ? __kthread_parkme+0x82/0x180
[   13.211556]  ? preempt_count_sub+0x50/0x80
[   13.211580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.211613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.211637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.211662]  kthread+0x337/0x6f0
[   13.211681]  ? trace_preempt_on+0x20/0xc0
[   13.211703]  ? __pfx_kthread+0x10/0x10
[   13.211736]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.211759]  ? calculate_sigpending+0x7b/0xa0
[   13.211782]  ? __pfx_kthread+0x10/0x10
[   13.211804]  ret_from_fork+0x116/0x1d0
[   13.211822]  ? __pfx_kthread+0x10/0x10
[   13.211843]  ret_from_fork_asm+0x1a/0x30
[   13.211872]  </TASK>
[   13.211882] 
[   13.222246] Allocated by task 279:
[   13.222438]  kasan_save_stack+0x45/0x70
[   13.222641]  kasan_save_track+0x18/0x40
[   13.222877]  kasan_save_alloc_info+0x3b/0x50
[   13.223029]  __kasan_kmalloc+0xb7/0xc0
[   13.223448]  __kmalloc_cache_noprof+0x189/0x420
[   13.223911]  kasan_bitops_generic+0x92/0x1c0
[   13.224256]  kunit_try_run_case+0x1a5/0x480
[   13.224476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.224732]  kthread+0x337/0x6f0
[   13.224909]  ret_from_fork+0x116/0x1d0
[   13.225149]  ret_from_fork_asm+0x1a/0x30
[   13.225648] 
[   13.225726] The buggy address belongs to the object at ffff888101892d40
[   13.225726]  which belongs to the cache kmalloc-16 of size 16
[   13.226399] The buggy address is located 8 bytes inside of
[   13.226399]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.226991] 
[   13.227199] The buggy address belongs to the physical page:
[   13.227573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.227989] flags: 0x200000000000000(node=0|zone=2)
[   13.228251] page_type: f5(slab)
[   13.228405] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.228822] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.229208] page dumped because: kasan: bad access detected
[   13.229546] 
[   13.229618] Memory state around the buggy address:
[   13.230180]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.230516]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.230925] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.231412]                                               ^
[   13.231695]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.231998]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.232430] ==================================================================
[   13.071181] ==================================================================
[   13.071854] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.072227] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.072538] 
[   13.072645] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.072689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.072701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.072722] Call Trace:
[   13.072735]  <TASK>
[   13.072748]  dump_stack_lvl+0x73/0xb0
[   13.072774]  print_report+0xd1/0x650
[   13.072797]  ? __virt_addr_valid+0x1db/0x2d0
[   13.072819]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.072845]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.072868]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.072893]  kasan_report+0x141/0x180
[   13.072916]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.072946]  kasan_check_range+0x10c/0x1c0
[   13.072970]  __kasan_check_write+0x18/0x20
[   13.072992]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.073018]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.073095]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.073117]  ? trace_hardirqs_on+0x37/0xe0
[   13.073139]  ? kasan_bitops_generic+0x92/0x1c0
[   13.073164]  kasan_bitops_generic+0x116/0x1c0
[   13.073185]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.073209]  ? __pfx_read_tsc+0x10/0x10
[   13.073229]  ? ktime_get_ts64+0x86/0x230
[   13.073254]  kunit_try_run_case+0x1a5/0x480
[   13.073275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.073294]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.073318]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.073343]  ? __kthread_parkme+0x82/0x180
[   13.073363]  ? preempt_count_sub+0x50/0x80
[   13.073400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.073421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.073445]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.073469]  kthread+0x337/0x6f0
[   13.073489]  ? trace_preempt_on+0x20/0xc0
[   13.073511]  ? __pfx_kthread+0x10/0x10
[   13.073532]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.073554]  ? calculate_sigpending+0x7b/0xa0
[   13.073578]  ? __pfx_kthread+0x10/0x10
[   13.073599]  ret_from_fork+0x116/0x1d0
[   13.073617]  ? __pfx_kthread+0x10/0x10
[   13.073637]  ret_from_fork_asm+0x1a/0x30
[   13.073668]  </TASK>
[   13.073678] 
[   13.082256] Allocated by task 279:
[   13.082397]  kasan_save_stack+0x45/0x70
[   13.082911]  kasan_save_track+0x18/0x40
[   13.083273]  kasan_save_alloc_info+0x3b/0x50
[   13.083510]  __kasan_kmalloc+0xb7/0xc0
[   13.083702]  __kmalloc_cache_noprof+0x189/0x420
[   13.083973]  kasan_bitops_generic+0x92/0x1c0
[   13.084220]  kunit_try_run_case+0x1a5/0x480
[   13.084409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.084626]  kthread+0x337/0x6f0
[   13.084822]  ret_from_fork+0x116/0x1d0
[   13.084970]  ret_from_fork_asm+0x1a/0x30
[   13.085281] 
[   13.085413] The buggy address belongs to the object at ffff888101892d40
[   13.085413]  which belongs to the cache kmalloc-16 of size 16
[   13.085924] The buggy address is located 8 bytes inside of
[   13.085924]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.086410] 
[   13.086510] The buggy address belongs to the physical page:
[   13.086773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.087403] flags: 0x200000000000000(node=0|zone=2)
[   13.087613] page_type: f5(slab)
[   13.087825] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.088222] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.088563] page dumped because: kasan: bad access detected
[   13.088832] 
[   13.088918] Memory state around the buggy address:
[   13.089178]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.089503]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.089733] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.089950]                                               ^
[   13.090139]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.091126]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.091945] ==================================================================
[   13.186830] ==================================================================
[   13.187284] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.187713] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.188163] 
[   13.188254] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.188334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.188347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.188386] Call Trace:
[   13.188428]  <TASK>
[   13.188443]  dump_stack_lvl+0x73/0xb0
[   13.188470]  print_report+0xd1/0x650
[   13.188504]  ? __virt_addr_valid+0x1db/0x2d0
[   13.188526]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.188552]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.188574]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.188629]  kasan_report+0x141/0x180
[   13.188652]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.188693]  kasan_check_range+0x10c/0x1c0
[   13.188745]  __kasan_check_write+0x18/0x20
[   13.188764]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.188800]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.188827]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.188847]  ? trace_hardirqs_on+0x37/0xe0
[   13.188869]  ? kasan_bitops_generic+0x92/0x1c0
[   13.188893]  kasan_bitops_generic+0x116/0x1c0
[   13.188912]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.188938]  ? __pfx_read_tsc+0x10/0x10
[   13.188958]  ? ktime_get_ts64+0x86/0x230
[   13.188983]  kunit_try_run_case+0x1a5/0x480
[   13.189003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.189023]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.189047]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.189072]  ? __kthread_parkme+0x82/0x180
[   13.189162]  ? preempt_count_sub+0x50/0x80
[   13.189202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.189224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.189250]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.189275]  kthread+0x337/0x6f0
[   13.189294]  ? trace_preempt_on+0x20/0xc0
[   13.189318]  ? __pfx_kthread+0x10/0x10
[   13.189339]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.189361]  ? calculate_sigpending+0x7b/0xa0
[   13.189396]  ? __pfx_kthread+0x10/0x10
[   13.189418]  ret_from_fork+0x116/0x1d0
[   13.189436]  ? __pfx_kthread+0x10/0x10
[   13.189456]  ret_from_fork_asm+0x1a/0x30
[   13.189486]  </TASK>
[   13.189496] 
[   13.199305] Allocated by task 279:
[   13.199455]  kasan_save_stack+0x45/0x70
[   13.199718]  kasan_save_track+0x18/0x40
[   13.199920]  kasan_save_alloc_info+0x3b/0x50
[   13.200241]  __kasan_kmalloc+0xb7/0xc0
[   13.200490]  __kmalloc_cache_noprof+0x189/0x420
[   13.200783]  kasan_bitops_generic+0x92/0x1c0
[   13.201066]  kunit_try_run_case+0x1a5/0x480
[   13.201399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.201645]  kthread+0x337/0x6f0
[   13.201957]  ret_from_fork+0x116/0x1d0
[   13.202353]  ret_from_fork_asm+0x1a/0x30
[   13.202523] 
[   13.202595] The buggy address belongs to the object at ffff888101892d40
[   13.202595]  which belongs to the cache kmalloc-16 of size 16
[   13.203068] The buggy address is located 8 bytes inside of
[   13.203068]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.203770] 
[   13.203870] The buggy address belongs to the physical page:
[   13.204169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.204622] flags: 0x200000000000000(node=0|zone=2)
[   13.204973] page_type: f5(slab)
[   13.205094] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.205402] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.205804] page dumped because: kasan: bad access detected
[   13.206075] 
[   13.206174] Memory state around the buggy address:
[   13.206475]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.206924]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.207433] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.207687]                                               ^
[   13.207991]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.208361]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.208766] ==================================================================
[   13.141147] ==================================================================
[   13.141508] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.142227] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.142561] 
[   13.142676] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.142735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.142747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.142769] Call Trace:
[   13.142783]  <TASK>
[   13.142798]  dump_stack_lvl+0x73/0xb0
[   13.142858]  print_report+0xd1/0x650
[   13.142881]  ? __virt_addr_valid+0x1db/0x2d0
[   13.142915]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.142941]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.142964]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.142990]  kasan_report+0x141/0x180
[   13.143013]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.143042]  kasan_check_range+0x10c/0x1c0
[   13.143066]  __kasan_check_write+0x18/0x20
[   13.143085]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.143111]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.143137]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.143157]  ? trace_hardirqs_on+0x37/0xe0
[   13.143178]  ? kasan_bitops_generic+0x92/0x1c0
[   13.143201]  kasan_bitops_generic+0x116/0x1c0
[   13.143221]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.143246]  ? __pfx_read_tsc+0x10/0x10
[   13.143266]  ? ktime_get_ts64+0x86/0x230
[   13.143290]  kunit_try_run_case+0x1a5/0x480
[   13.143310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.143329]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.143444]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.143494]  ? __kthread_parkme+0x82/0x180
[   13.143517]  ? preempt_count_sub+0x50/0x80
[   13.143539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.143560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.143585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.143608]  kthread+0x337/0x6f0
[   13.143627]  ? trace_preempt_on+0x20/0xc0
[   13.143649]  ? __pfx_kthread+0x10/0x10
[   13.143669]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.143692]  ? calculate_sigpending+0x7b/0xa0
[   13.143722]  ? __pfx_kthread+0x10/0x10
[   13.143742]  ret_from_fork+0x116/0x1d0
[   13.143761]  ? __pfx_kthread+0x10/0x10
[   13.143781]  ret_from_fork_asm+0x1a/0x30
[   13.143811]  </TASK>
[   13.143821] 
[   13.153962] Allocated by task 279:
[   13.154235]  kasan_save_stack+0x45/0x70
[   13.154469]  kasan_save_track+0x18/0x40
[   13.154701]  kasan_save_alloc_info+0x3b/0x50
[   13.154961]  __kasan_kmalloc+0xb7/0xc0
[   13.155217]  __kmalloc_cache_noprof+0x189/0x420
[   13.155389]  kasan_bitops_generic+0x92/0x1c0
[   13.155603]  kunit_try_run_case+0x1a5/0x480
[   13.155942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.156140]  kthread+0x337/0x6f0
[   13.156670]  ret_from_fork+0x116/0x1d0
[   13.156890]  ret_from_fork_asm+0x1a/0x30
[   13.157170] 
[   13.157358] The buggy address belongs to the object at ffff888101892d40
[   13.157358]  which belongs to the cache kmalloc-16 of size 16
[   13.157798] The buggy address is located 8 bytes inside of
[   13.157798]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.158644] 
[   13.158895] The buggy address belongs to the physical page:
[   13.159146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.159569] flags: 0x200000000000000(node=0|zone=2)
[   13.159803] page_type: f5(slab)
[   13.159983] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.160329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.160704] page dumped because: kasan: bad access detected
[   13.160943] 
[   13.161250] Memory state around the buggy address:
[   13.161473]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.161867]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.162280] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.162620]                                               ^
[   13.162958]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.163407]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.163896] ==================================================================
[   13.118786] ==================================================================
[   13.119540] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.120024] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.120597] 
[   13.120709] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.120756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.120768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.120790] Call Trace:
[   13.120804]  <TASK>
[   13.120819]  dump_stack_lvl+0x73/0xb0
[   13.120846]  print_report+0xd1/0x650
[   13.120868]  ? __virt_addr_valid+0x1db/0x2d0
[   13.120890]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.120915]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.120938]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.120963]  kasan_report+0x141/0x180
[   13.120985]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.121088]  kasan_check_range+0x10c/0x1c0
[   13.121131]  __kasan_check_write+0x18/0x20
[   13.121151]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.121177]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.121204]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.121225]  ? trace_hardirqs_on+0x37/0xe0
[   13.121247]  ? kasan_bitops_generic+0x92/0x1c0
[   13.121271]  kasan_bitops_generic+0x116/0x1c0
[   13.121291]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.121316]  ? __pfx_read_tsc+0x10/0x10
[   13.121336]  ? ktime_get_ts64+0x86/0x230
[   13.121360]  kunit_try_run_case+0x1a5/0x480
[   13.121389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.121409]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.121433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.121458]  ? __kthread_parkme+0x82/0x180
[   13.121478]  ? preempt_count_sub+0x50/0x80
[   13.121501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.121522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.121546]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.121569]  kthread+0x337/0x6f0
[   13.121588]  ? trace_preempt_on+0x20/0xc0
[   13.121610]  ? __pfx_kthread+0x10/0x10
[   13.121630]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.121652]  ? calculate_sigpending+0x7b/0xa0
[   13.121676]  ? __pfx_kthread+0x10/0x10
[   13.121697]  ret_from_fork+0x116/0x1d0
[   13.121723]  ? __pfx_kthread+0x10/0x10
[   13.121743]  ret_from_fork_asm+0x1a/0x30
[   13.121773]  </TASK>
[   13.121783] 
[   13.131703] Allocated by task 279:
[   13.131837]  kasan_save_stack+0x45/0x70
[   13.132138]  kasan_save_track+0x18/0x40
[   13.132441]  kasan_save_alloc_info+0x3b/0x50
[   13.132663]  __kasan_kmalloc+0xb7/0xc0
[   13.132857]  __kmalloc_cache_noprof+0x189/0x420
[   13.133085]  kasan_bitops_generic+0x92/0x1c0
[   13.133453]  kunit_try_run_case+0x1a5/0x480
[   13.133633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.133920]  kthread+0x337/0x6f0
[   13.134289]  ret_from_fork+0x116/0x1d0
[   13.134532]  ret_from_fork_asm+0x1a/0x30
[   13.134677] 
[   13.134748] The buggy address belongs to the object at ffff888101892d40
[   13.134748]  which belongs to the cache kmalloc-16 of size 16
[   13.135404] The buggy address is located 8 bytes inside of
[   13.135404]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.136206] 
[   13.136287] The buggy address belongs to the physical page:
[   13.136547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.136985] flags: 0x200000000000000(node=0|zone=2)
[   13.137269] page_type: f5(slab)
[   13.137458] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.137808] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.138042] page dumped because: kasan: bad access detected
[   13.138282] 
[   13.138412] Memory state around the buggy address:
[   13.138646]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.139052]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.139451] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.139770]                                               ^
[   13.140097]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.140346]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.140671] ==================================================================