Hay
Date
May 29, 2025, 7:10 a.m.

Environment
qemu-x86_64

[   13.143577] ==================================================================
[   13.144063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.144398] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278
[   13.144647] 
[   13.144803] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.144849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.144861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.144882] Call Trace:
[   13.144896]  <TASK>
[   13.144911]  dump_stack_lvl+0x73/0xb0
[   13.144935]  print_report+0xd1/0x650
[   13.144957]  ? __virt_addr_valid+0x1db/0x2d0
[   13.144980]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.145004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.145027]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.145051]  kasan_report+0x141/0x180
[   13.145074]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.145104]  kasan_check_range+0x10c/0x1c0
[   13.145128]  __kasan_check_write+0x18/0x20
[   13.145148]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.145172]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.145201]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.145221]  ? trace_hardirqs_on+0x37/0xe0
[   13.145242]  ? kasan_bitops_generic+0x92/0x1c0
[   13.145267]  kasan_bitops_generic+0x121/0x1c0
[   13.145288]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.145310]  ? __pfx_read_tsc+0x10/0x10
[   13.145330]  ? ktime_get_ts64+0x86/0x230
[   13.145354]  kunit_try_run_case+0x1a5/0x480
[   13.145375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.145395]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.145419]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.145444]  ? __kthread_parkme+0x82/0x180
[   13.145465]  ? preempt_count_sub+0x50/0x80
[   13.145488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.145510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.145534]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.145560]  kthread+0x337/0x6f0
[   13.145579]  ? trace_preempt_on+0x20/0xc0
[   13.145601]  ? __pfx_kthread+0x10/0x10
[   13.145634]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.145657]  ? calculate_sigpending+0x7b/0xa0
[   13.145681]  ? __pfx_kthread+0x10/0x10
[   13.145703]  ret_from_fork+0x116/0x1d0
[   13.145721]  ? __pfx_kthread+0x10/0x10
[   13.145742]  ret_from_fork_asm+0x1a/0x30
[   13.146014]  </TASK>
[   13.146025] 
[   13.155012] Allocated by task 278:
[   13.155296]  kasan_save_stack+0x45/0x70
[   13.155663]  kasan_save_track+0x18/0x40
[   13.156305]  kasan_save_alloc_info+0x3b/0x50
[   13.156626]  __kasan_kmalloc+0xb7/0xc0
[   13.157562]  __kmalloc_cache_noprof+0x189/0x420
[   13.158787]  kasan_bitops_generic+0x92/0x1c0
[   13.159061]  kunit_try_run_case+0x1a5/0x480
[   13.159251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.159507]  kthread+0x337/0x6f0
[   13.159705]  ret_from_fork+0x116/0x1d0
[   13.159876]  ret_from_fork_asm+0x1a/0x30
[   13.160099] 
[   13.160175] The buggy address belongs to the object at ffff888102856080
[   13.160175]  which belongs to the cache kmalloc-16 of size 16
[   13.160696] The buggy address is located 8 bytes inside of
[   13.160696]  allocated 9-byte region [ffff888102856080, ffff888102856089)
[   13.161652] 
[   13.161758] The buggy address belongs to the physical page:
[   13.161985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   13.162565] flags: 0x200000000000000(node=0|zone=2)
[   13.162863] page_type: f5(slab)
[   13.162994] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.163474] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.164440] page dumped because: kasan: bad access detected
[   13.164706] 
[   13.165149] Memory state around the buggy address:
[   13.165387]  ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.165897]  ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.166327] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.166988]                       ^
[   13.167189]  ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.167465]  ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.168060] ==================================================================
[   13.082386] ==================================================================
[   13.082798] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.083219] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278
[   13.083562] 
[   13.083684] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.083729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.083742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.083764] Call Trace:
[   13.083780]  <TASK>
[   13.083796]  dump_stack_lvl+0x73/0xb0
[   13.083820]  print_report+0xd1/0x650
[   13.084020]  ? __virt_addr_valid+0x1db/0x2d0
[   13.084047]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.084073]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.084096]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.084121]  kasan_report+0x141/0x180
[   13.084146]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.084175]  kasan_check_range+0x10c/0x1c0
[   13.084199]  __kasan_check_write+0x18/0x20
[   13.084220]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.084244]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.084274]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.084295]  ? trace_hardirqs_on+0x37/0xe0
[   13.084318]  ? kasan_bitops_generic+0x92/0x1c0
[   13.084342]  kasan_bitops_generic+0x121/0x1c0
[   13.084363]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.084385]  ? __pfx_read_tsc+0x10/0x10
[   13.084406]  ? ktime_get_ts64+0x86/0x230
[   13.084430]  kunit_try_run_case+0x1a5/0x480
[   13.084451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.084471]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.084496]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.084520]  ? __kthread_parkme+0x82/0x180
[   13.084542]  ? preempt_count_sub+0x50/0x80
[   13.084565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.084587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.084625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.084650]  kthread+0x337/0x6f0
[   13.084671]  ? trace_preempt_on+0x20/0xc0
[   13.084694]  ? __pfx_kthread+0x10/0x10
[   13.084715]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.084738]  ? calculate_sigpending+0x7b/0xa0
[   13.084828]  ? __pfx_kthread+0x10/0x10
[   13.084851]  ret_from_fork+0x116/0x1d0
[   13.084870]  ? __pfx_kthread+0x10/0x10
[   13.084891]  ret_from_fork_asm+0x1a/0x30
[   13.084922]  </TASK>
[   13.084934] 
[   13.094110] Allocated by task 278:
[   13.094291]  kasan_save_stack+0x45/0x70
[   13.094473]  kasan_save_track+0x18/0x40
[   13.094682]  kasan_save_alloc_info+0x3b/0x50
[   13.094837]  __kasan_kmalloc+0xb7/0xc0
[   13.094976]  __kmalloc_cache_noprof+0x189/0x420
[   13.095133]  kasan_bitops_generic+0x92/0x1c0
[   13.095350]  kunit_try_run_case+0x1a5/0x480
[   13.095641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.095912]  kthread+0x337/0x6f0
[   13.096294]  ret_from_fork+0x116/0x1d0
[   13.096464]  ret_from_fork_asm+0x1a/0x30
[   13.096622] 
[   13.096696] The buggy address belongs to the object at ffff888102856080
[   13.096696]  which belongs to the cache kmalloc-16 of size 16
[   13.097307] The buggy address is located 8 bytes inside of
[   13.097307]  allocated 9-byte region [ffff888102856080, ffff888102856089)
[   13.098076] 
[   13.098171] The buggy address belongs to the physical page:
[   13.098404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   13.098675] flags: 0x200000000000000(node=0|zone=2)
[   13.098843] page_type: f5(slab)
[   13.099059] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.099412] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.099767] page dumped because: kasan: bad access detected
[   13.100030] 
[   13.100131] Memory state around the buggy address:
[   13.100359]  ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.100653]  ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.101035] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.101299]                       ^
[   13.101434]  ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.101725]  ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.102240] ==================================================================
[   13.197388] ==================================================================
[   13.197696] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.198588] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278
[   13.199080] 
[   13.199179] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.199224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.199237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.199257] Call Trace:
[   13.199273]  <TASK>
[   13.199289]  dump_stack_lvl+0x73/0xb0
[   13.199316]  print_report+0xd1/0x650
[   13.199339]  ? __virt_addr_valid+0x1db/0x2d0
[   13.199669]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.199695]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.199719]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.199743]  kasan_report+0x141/0x180
[   13.199785]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.199814]  kasan_check_range+0x10c/0x1c0
[   13.199838]  __kasan_check_write+0x18/0x20
[   13.199858]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.199882]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.199912]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.199934]  ? trace_hardirqs_on+0x37/0xe0
[   13.199955]  ? kasan_bitops_generic+0x92/0x1c0
[   13.199980]  kasan_bitops_generic+0x121/0x1c0
[   13.200001]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.200024]  ? __pfx_read_tsc+0x10/0x10
[   13.200046]  ? ktime_get_ts64+0x86/0x230
[   13.200074]  kunit_try_run_case+0x1a5/0x480
[   13.200096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.200117]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.200143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.200169]  ? __kthread_parkme+0x82/0x180
[   13.200191]  ? preempt_count_sub+0x50/0x80
[   13.200215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.200239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.200264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.200290]  kthread+0x337/0x6f0
[   13.200312]  ? trace_preempt_on+0x20/0xc0
[   13.200335]  ? __pfx_kthread+0x10/0x10
[   13.200356]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.200378]  ? calculate_sigpending+0x7b/0xa0
[   13.200403]  ? __pfx_kthread+0x10/0x10
[   13.200425]  ret_from_fork+0x116/0x1d0
[   13.200443]  ? __pfx_kthread+0x10/0x10
[   13.200464]  ret_from_fork_asm+0x1a/0x30
[   13.200494]  </TASK>
[   13.200506] 
[   13.212719] Allocated by task 278:
[   13.213084]  kasan_save_stack+0x45/0x70
[   13.213300]  kasan_save_track+0x18/0x40
[   13.213487]  kasan_save_alloc_info+0x3b/0x50
[   13.213696]  __kasan_kmalloc+0xb7/0xc0
[   13.214295]  __kmalloc_cache_noprof+0x189/0x420
[   13.214493]  kasan_bitops_generic+0x92/0x1c0
[   13.214734]  kunit_try_run_case+0x1a5/0x480
[   13.215293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.215646]  kthread+0x337/0x6f0
[   13.215785]  ret_from_fork+0x116/0x1d0
[   13.216194]  ret_from_fork_asm+0x1a/0x30
[   13.216399] 
[   13.216674] The buggy address belongs to the object at ffff888102856080
[   13.216674]  which belongs to the cache kmalloc-16 of size 16
[   13.217516] The buggy address is located 8 bytes inside of
[   13.217516]  allocated 9-byte region [ffff888102856080, ffff888102856089)
[   13.218406] 
[   13.218492] The buggy address belongs to the physical page:
[   13.218908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   13.219461] flags: 0x200000000000000(node=0|zone=2)
[   13.219705] page_type: f5(slab)
[   13.220103] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.220428] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.221007] page dumped because: kasan: bad access detected
[   13.221260] 
[   13.221342] Memory state around the buggy address:
[   13.221572]  ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.222094]  ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.222424] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.222747]                       ^
[   13.223286]  ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.223578]  ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.224249] ==================================================================
[   13.224960] ==================================================================
[   13.225259] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.225584] Read of size 8 at addr ffff888102856088 by task kunit_try_catch/278
[   13.226037] 
[   13.226144] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.226190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.226202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.226224] Call Trace:
[   13.226237]  <TASK>
[   13.226254]  dump_stack_lvl+0x73/0xb0
[   13.226280]  print_report+0xd1/0x650
[   13.226303]  ? __virt_addr_valid+0x1db/0x2d0
[   13.226326]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.226350]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.226372]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.226397]  kasan_report+0x141/0x180
[   13.226419]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.226449]  kasan_check_range+0x10c/0x1c0
[   13.226473]  __kasan_check_read+0x15/0x20
[   13.226493]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.226517]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.226554]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.226788]  ? trace_hardirqs_on+0x37/0xe0
[   13.226830]  ? kasan_bitops_generic+0x92/0x1c0
[   13.226868]  kasan_bitops_generic+0x121/0x1c0
[   13.226890]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.226913]  ? __pfx_read_tsc+0x10/0x10
[   13.226933]  ? ktime_get_ts64+0x86/0x230
[   13.226957]  kunit_try_run_case+0x1a5/0x480
[   13.226979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.226999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.227024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.227049]  ? __kthread_parkme+0x82/0x180
[   13.227071]  ? preempt_count_sub+0x50/0x80
[   13.227094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.227116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.227140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.227165]  kthread+0x337/0x6f0
[   13.227185]  ? trace_preempt_on+0x20/0xc0
[   13.227207]  ? __pfx_kthread+0x10/0x10
[   13.227228]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.227251]  ? calculate_sigpending+0x7b/0xa0
[   13.227276]  ? __pfx_kthread+0x10/0x10
[   13.227298]  ret_from_fork+0x116/0x1d0
[   13.227317]  ? __pfx_kthread+0x10/0x10
[   13.227338]  ret_from_fork_asm+0x1a/0x30
[   13.227368]  </TASK>
[   13.227379] 
[   13.240540] Allocated by task 278:
[   13.240727]  kasan_save_stack+0x45/0x70
[   13.241080]  kasan_save_track+0x18/0x40
[   13.241292]  kasan_save_alloc_info+0x3b/0x50
[   13.241514]  __kasan_kmalloc+0xb7/0xc0
[   13.241773]  __kmalloc_cache_noprof+0x189/0x420
[   13.241989]  kasan_bitops_generic+0x92/0x1c0
[   13.242191]  kunit_try_run_case+0x1a5/0x480
[   13.242379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.242660]  kthread+0x337/0x6f0
[   13.242812]  ret_from_fork+0x116/0x1d0
[   13.243442]  ret_from_fork_asm+0x1a/0x30
[   13.243696] 
[   13.243807] The buggy address belongs to the object at ffff888102856080
[   13.243807]  which belongs to the cache kmalloc-16 of size 16
[   13.244526] The buggy address is located 8 bytes inside of
[   13.244526]  allocated 9-byte region [ffff888102856080, ffff888102856089)
[   13.245337] 
[   13.245642] The buggy address belongs to the physical page:
[   13.245911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   13.246380] flags: 0x200000000000000(node=0|zone=2)
[   13.246721] page_type: f5(slab)
[   13.247108] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.247526] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.247835] page dumped because: kasan: bad access detected
[   13.248294] 
[   13.248400] Memory state around the buggy address:
[   13.248994]  ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.249298]  ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.249627] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.250305]                       ^
[   13.250474]  ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.251020]  ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.251463] ==================================================================
[   13.169011] ==================================================================
[   13.169404] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.169999] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278
[   13.170603] 
[   13.170906] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.170957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.170970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.170991] Call Trace:
[   13.171006]  <TASK>
[   13.171036]  dump_stack_lvl+0x73/0xb0
[   13.171063]  print_report+0xd1/0x650
[   13.171086]  ? __virt_addr_valid+0x1db/0x2d0
[   13.171109]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.171133]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.171156]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.171180]  kasan_report+0x141/0x180
[   13.171203]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.171232]  kasan_check_range+0x10c/0x1c0
[   13.171256]  __kasan_check_write+0x18/0x20
[   13.171276]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.171300]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.171329]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.171349]  ? trace_hardirqs_on+0x37/0xe0
[   13.171371]  ? kasan_bitops_generic+0x92/0x1c0
[   13.171395]  kasan_bitops_generic+0x121/0x1c0
[   13.171417]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.171439]  ? __pfx_read_tsc+0x10/0x10
[   13.171461]  ? ktime_get_ts64+0x86/0x230
[   13.171485]  kunit_try_run_case+0x1a5/0x480
[   13.171508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.171528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.171553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.171577]  ? __kthread_parkme+0x82/0x180
[   13.171599]  ? preempt_count_sub+0x50/0x80
[   13.171637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.171658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.171683]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.171708]  kthread+0x337/0x6f0
[   13.171727]  ? trace_preempt_on+0x20/0xc0
[   13.171749]  ? __pfx_kthread+0x10/0x10
[   13.171780]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.171813]  ? calculate_sigpending+0x7b/0xa0
[   13.171837]  ? __pfx_kthread+0x10/0x10
[   13.171859]  ret_from_fork+0x116/0x1d0
[   13.171878]  ? __pfx_kthread+0x10/0x10
[   13.171899]  ret_from_fork_asm+0x1a/0x30
[   13.171929]  </TASK>
[   13.171940] 
[   13.185346] Allocated by task 278:
[   13.185535]  kasan_save_stack+0x45/0x70
[   13.185965]  kasan_save_track+0x18/0x40
[   13.186174]  kasan_save_alloc_info+0x3b/0x50
[   13.186384]  __kasan_kmalloc+0xb7/0xc0
[   13.186579]  __kmalloc_cache_noprof+0x189/0x420
[   13.186807]  kasan_bitops_generic+0x92/0x1c0
[   13.187007]  kunit_try_run_case+0x1a5/0x480
[   13.187221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.187472]  kthread+0x337/0x6f0
[   13.188244]  ret_from_fork+0x116/0x1d0
[   13.188427]  ret_from_fork_asm+0x1a/0x30
[   13.188921] 
[   13.189028] The buggy address belongs to the object at ffff888102856080
[   13.189028]  which belongs to the cache kmalloc-16 of size 16
[   13.189784] The buggy address is located 8 bytes inside of
[   13.189784]  allocated 9-byte region [ffff888102856080, ffff888102856089)
[   13.190577] 
[   13.190681] The buggy address belongs to the physical page:
[   13.191175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   13.191633] flags: 0x200000000000000(node=0|zone=2)
[   13.192072] page_type: f5(slab)
[   13.192246] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.192949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.193390] page dumped because: kasan: bad access detected
[   13.193649] 
[   13.193833] Memory state around the buggy address:
[   13.194075]  ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.194626]  ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.195080] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.195404]                       ^
[   13.195560]  ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.196295]  ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.196560] ==================================================================
[   13.122840] ==================================================================
[   13.123180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.123575] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278
[   13.124025] 
[   13.124139] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.124185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.124197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.124218] Call Trace:
[   13.124234]  <TASK>
[   13.124248]  dump_stack_lvl+0x73/0xb0
[   13.124273]  print_report+0xd1/0x650
[   13.124296]  ? __virt_addr_valid+0x1db/0x2d0
[   13.124318]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.124342]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.124365]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.124389]  kasan_report+0x141/0x180
[   13.124412]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.124440]  kasan_check_range+0x10c/0x1c0
[   13.124464]  __kasan_check_write+0x18/0x20
[   13.124484]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.124509]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.124538]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.124558]  ? trace_hardirqs_on+0x37/0xe0
[   13.124579]  ? kasan_bitops_generic+0x92/0x1c0
[   13.124604]  kasan_bitops_generic+0x121/0x1c0
[   13.124635]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.124656]  ? __pfx_read_tsc+0x10/0x10
[   13.124677]  ? ktime_get_ts64+0x86/0x230
[   13.124701]  kunit_try_run_case+0x1a5/0x480
[   13.124722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.124742]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.124767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.124791]  ? __kthread_parkme+0x82/0x180
[   13.124811]  ? preempt_count_sub+0x50/0x80
[   13.124835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.124857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.124882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.124907]  kthread+0x337/0x6f0
[   13.124927]  ? trace_preempt_on+0x20/0xc0
[   13.124949]  ? __pfx_kthread+0x10/0x10
[   13.124990]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.125012]  ? calculate_sigpending+0x7b/0xa0
[   13.125036]  ? __pfx_kthread+0x10/0x10
[   13.125058]  ret_from_fork+0x116/0x1d0
[   13.125077]  ? __pfx_kthread+0x10/0x10
[   13.125098]  ret_from_fork_asm+0x1a/0x30
[   13.125128]  </TASK>
[   13.125138] 
[   13.133798] Allocated by task 278:
[   13.133935]  kasan_save_stack+0x45/0x70
[   13.134085]  kasan_save_track+0x18/0x40
[   13.134229]  kasan_save_alloc_info+0x3b/0x50
[   13.134441]  __kasan_kmalloc+0xb7/0xc0
[   13.134755]  __kmalloc_cache_noprof+0x189/0x420
[   13.135220]  kasan_bitops_generic+0x92/0x1c0
[   13.135467]  kunit_try_run_case+0x1a5/0x480
[   13.135696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.136125]  kthread+0x337/0x6f0
[   13.136288]  ret_from_fork+0x116/0x1d0
[   13.136464]  ret_from_fork_asm+0x1a/0x30
[   13.136678] 
[   13.136769] The buggy address belongs to the object at ffff888102856080
[   13.136769]  which belongs to the cache kmalloc-16 of size 16
[   13.137247] The buggy address is located 8 bytes inside of
[   13.137247]  allocated 9-byte region [ffff888102856080, ffff888102856089)
[   13.137912] 
[   13.138006] The buggy address belongs to the physical page:
[   13.138220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   13.138468] flags: 0x200000000000000(node=0|zone=2)
[   13.138654] page_type: f5(slab)
[   13.138782] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.139380] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.139757] page dumped because: kasan: bad access detected
[   13.140799] 
[   13.140918] Memory state around the buggy address:
[   13.141151]  ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.141463]  ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.141770] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.142176]                       ^
[   13.142364]  ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.142676]  ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.143144] ==================================================================
[   13.252413] ==================================================================
[   13.253047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.253716] Read of size 8 at addr ffff888102856088 by task kunit_try_catch/278
[   13.254128] 
[   13.254247] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.254293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.254306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.254326] Call Trace:
[   13.254338]  <TASK>
[   13.254353]  dump_stack_lvl+0x73/0xb0
[   13.254380]  print_report+0xd1/0x650
[   13.254402]  ? __virt_addr_valid+0x1db/0x2d0
[   13.254425]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.254451]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.254476]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.254500]  kasan_report+0x141/0x180
[   13.254524]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.254557]  __asan_report_load8_noabort+0x18/0x20
[   13.254579]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.254603]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.254644]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.254665]  ? trace_hardirqs_on+0x37/0xe0
[   13.254881]  ? kasan_bitops_generic+0x92/0x1c0
[   13.254910]  kasan_bitops_generic+0x121/0x1c0
[   13.254931]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.254953]  ? __pfx_read_tsc+0x10/0x10
[   13.254975]  ? ktime_get_ts64+0x86/0x230
[   13.254998]  kunit_try_run_case+0x1a5/0x480
[   13.255020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.255040]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.255065]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.255090]  ? __kthread_parkme+0x82/0x180
[   13.255111]  ? preempt_count_sub+0x50/0x80
[   13.255135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.255156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.255181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.255206]  kthread+0x337/0x6f0
[   13.255225]  ? trace_preempt_on+0x20/0xc0
[   13.255248]  ? __pfx_kthread+0x10/0x10
[   13.255269]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.255292]  ? calculate_sigpending+0x7b/0xa0
[   13.255317]  ? __pfx_kthread+0x10/0x10
[   13.255339]  ret_from_fork+0x116/0x1d0
[   13.255359]  ? __pfx_kthread+0x10/0x10
[   13.255380]  ret_from_fork_asm+0x1a/0x30
[   13.255410]  </TASK>
[   13.255421] 
[   13.267543] Allocated by task 278:
[   13.268014]  kasan_save_stack+0x45/0x70
[   13.268302]  kasan_save_track+0x18/0x40
[   13.268546]  kasan_save_alloc_info+0x3b/0x50
[   13.269062]  __kasan_kmalloc+0xb7/0xc0
[   13.269269]  __kmalloc_cache_noprof+0x189/0x420
[   13.269451]  kasan_bitops_generic+0x92/0x1c0
[   13.269678]  kunit_try_run_case+0x1a5/0x480
[   13.269885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.270424]  kthread+0x337/0x6f0
[   13.270599]  ret_from_fork+0x116/0x1d0
[   13.270981]  ret_from_fork_asm+0x1a/0x30
[   13.271162] 
[   13.271262] The buggy address belongs to the object at ffff888102856080
[   13.271262]  which belongs to the cache kmalloc-16 of size 16
[   13.271754] The buggy address is located 8 bytes inside of
[   13.271754]  allocated 9-byte region [ffff888102856080, ffff888102856089)
[   13.272236] 
[   13.272311] The buggy address belongs to the physical page:
[   13.272559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   13.273450] flags: 0x200000000000000(node=0|zone=2)
[   13.273645] page_type: f5(slab)
[   13.273778] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.274017] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.274255] page dumped because: kasan: bad access detected
[   13.274429] 
[   13.274500] Memory state around the buggy address:
[   13.274672]  ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.274890]  ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.275103] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.275317]                       ^
[   13.275443]  ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.275789]  ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.276040] ==================================================================
[   13.060804] ==================================================================
[   13.061509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.061919] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278
[   13.062242] 
[   13.062329] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.062373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.062386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.062407] Call Trace:
[   13.062421]  <TASK>
[   13.062436]  dump_stack_lvl+0x73/0xb0
[   13.062754]  print_report+0xd1/0x650
[   13.062781]  ? __virt_addr_valid+0x1db/0x2d0
[   13.062805]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.062828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.062997]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.063027]  kasan_report+0x141/0x180
[   13.063050]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.063080]  kasan_check_range+0x10c/0x1c0
[   13.063104]  __kasan_check_write+0x18/0x20
[   13.063125]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.063149]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.063179]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.063200]  ? trace_hardirqs_on+0x37/0xe0
[   13.063223]  ? kasan_bitops_generic+0x92/0x1c0
[   13.063247]  kasan_bitops_generic+0x121/0x1c0
[   13.063268]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.063290]  ? __pfx_read_tsc+0x10/0x10
[   13.063311]  ? ktime_get_ts64+0x86/0x230
[   13.063335]  kunit_try_run_case+0x1a5/0x480
[   13.063357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.063378]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.063403]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.063428]  ? __kthread_parkme+0x82/0x180
[   13.063449]  ? preempt_count_sub+0x50/0x80
[   13.063472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.063494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.063518]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.063543]  kthread+0x337/0x6f0
[   13.063563]  ? trace_preempt_on+0x20/0xc0
[   13.063585]  ? __pfx_kthread+0x10/0x10
[   13.063606]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.063643]  ? calculate_sigpending+0x7b/0xa0
[   13.063675]  ? __pfx_kthread+0x10/0x10
[   13.063697]  ret_from_fork+0x116/0x1d0
[   13.063716]  ? __pfx_kthread+0x10/0x10
[   13.063737]  ret_from_fork_asm+0x1a/0x30
[   13.063778]  </TASK>
[   13.063789] 
[   13.073453] Allocated by task 278:
[   13.073640]  kasan_save_stack+0x45/0x70
[   13.073895]  kasan_save_track+0x18/0x40
[   13.074097]  kasan_save_alloc_info+0x3b/0x50
[   13.074292]  __kasan_kmalloc+0xb7/0xc0
[   13.074479]  __kmalloc_cache_noprof+0x189/0x420
[   13.074690]  kasan_bitops_generic+0x92/0x1c0
[   13.074901]  kunit_try_run_case+0x1a5/0x480
[   13.075204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.075448]  kthread+0x337/0x6f0
[   13.075599]  ret_from_fork+0x116/0x1d0
[   13.075795]  ret_from_fork_asm+0x1a/0x30
[   13.076164] 
[   13.076267] The buggy address belongs to the object at ffff888102856080
[   13.076267]  which belongs to the cache kmalloc-16 of size 16
[   13.076814] The buggy address is located 8 bytes inside of
[   13.076814]  allocated 9-byte region [ffff888102856080, ffff888102856089)
[   13.077265] 
[   13.077339] The buggy address belongs to the physical page:
[   13.077599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   13.078002] flags: 0x200000000000000(node=0|zone=2)
[   13.078200] page_type: f5(slab)
[   13.078372] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.078722] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.079124] page dumped because: kasan: bad access detected
[   13.079309] 
[   13.079381] Memory state around the buggy address:
[   13.079541]  ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.079875]  ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.080585] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.080983]                       ^
[   13.081149]  ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.081375]  ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.081597] ==================================================================
[   13.102736] ==================================================================
[   13.103019] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.103318] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278
[   13.103661] 
[   13.103770] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.103868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.103882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.103903] Call Trace:
[   13.103916]  <TASK>
[   13.103941]  dump_stack_lvl+0x73/0xb0
[   13.103968]  print_report+0xd1/0x650
[   13.103990]  ? __virt_addr_valid+0x1db/0x2d0
[   13.104013]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.104038]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.104060]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.104084]  kasan_report+0x141/0x180
[   13.104106]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.104135]  kasan_check_range+0x10c/0x1c0
[   13.104160]  __kasan_check_write+0x18/0x20
[   13.104181]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.104206]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.104235]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.104256]  ? trace_hardirqs_on+0x37/0xe0
[   13.104278]  ? kasan_bitops_generic+0x92/0x1c0
[   13.104302]  kasan_bitops_generic+0x121/0x1c0
[   13.104323]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.104346]  ? __pfx_read_tsc+0x10/0x10
[   13.104367]  ? ktime_get_ts64+0x86/0x230
[   13.104391]  kunit_try_run_case+0x1a5/0x480
[   13.104412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.104433]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.104458]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.104483]  ? __kthread_parkme+0x82/0x180
[   13.104504]  ? preempt_count_sub+0x50/0x80
[   13.104527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.104549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.104574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.104599]  kthread+0x337/0x6f0
[   13.104631]  ? trace_preempt_on+0x20/0xc0
[   13.104653]  ? __pfx_kthread+0x10/0x10
[   13.104674]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.104697]  ? calculate_sigpending+0x7b/0xa0
[   13.104720]  ? __pfx_kthread+0x10/0x10
[   13.104743]  ret_from_fork+0x116/0x1d0
[   13.104809]  ? __pfx_kthread+0x10/0x10
[   13.104831]  ret_from_fork_asm+0x1a/0x30
[   13.104861]  </TASK>
[   13.104872] 
[   13.113782] Allocated by task 278:
[   13.113978]  kasan_save_stack+0x45/0x70
[   13.114184]  kasan_save_track+0x18/0x40
[   13.114689]  kasan_save_alloc_info+0x3b/0x50
[   13.114969]  __kasan_kmalloc+0xb7/0xc0
[   13.115158]  __kmalloc_cache_noprof+0x189/0x420
[   13.115348]  kasan_bitops_generic+0x92/0x1c0
[   13.115504]  kunit_try_run_case+0x1a5/0x480
[   13.115733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.116015]  kthread+0x337/0x6f0
[   13.116175]  ret_from_fork+0x116/0x1d0
[   13.116335]  ret_from_fork_asm+0x1a/0x30
[   13.116539] 
[   13.116639] The buggy address belongs to the object at ffff888102856080
[   13.116639]  which belongs to the cache kmalloc-16 of size 16
[   13.117150] The buggy address is located 8 bytes inside of
[   13.117150]  allocated 9-byte region [ffff888102856080, ffff888102856089)
[   13.117554] 
[   13.117638] The buggy address belongs to the physical page:
[   13.117817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   13.118125] flags: 0x200000000000000(node=0|zone=2)
[   13.118359] page_type: f5(slab)
[   13.118527] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.119417] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.119675] page dumped because: kasan: bad access detected
[   13.120140] 
[   13.120238] Memory state around the buggy address:
[   13.120468]  ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.120865]  ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.121161] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.121452]                       ^
[   13.121628]  ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.122147]  ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.122379] ==================================================================