Hay
Date
June 3, 2025, 7:38 a.m.

Environment
qemu-x86_64

[   17.305832] ==================================================================
[   17.306356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.307643] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.308537] 
[   17.309280] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.309359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.309374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.309400] Call Trace:
[   17.309425]  <TASK>
[   17.309450]  dump_stack_lvl+0x73/0xb0
[   17.309536]  print_report+0xd1/0x650
[   17.309576]  ? __virt_addr_valid+0x1db/0x2d0
[   17.309614]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.309655]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.309689]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.309774]  kasan_report+0x141/0x180
[   17.309815]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.309868]  kasan_check_range+0x10c/0x1c0
[   17.309907]  __kasan_check_write+0x18/0x20
[   17.309941]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.309987]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.310037]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.310075]  ? kasan_bitops_generic+0x92/0x1c0
[   17.310119]  kasan_bitops_generic+0x121/0x1c0
[   17.310157]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.310211]  ? __pfx_read_tsc+0x10/0x10
[   17.310254]  ? ktime_get_ts64+0x86/0x230
[   17.310316]  kunit_try_run_case+0x1a5/0x480
[   17.310343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.310364]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.310393]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.310420]  ? __kthread_parkme+0x82/0x180
[   17.310443]  ? preempt_count_sub+0x50/0x80
[   17.310496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.310520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.310548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.310575]  kthread+0x337/0x6f0
[   17.310598]  ? trace_preempt_on+0x20/0xc0
[   17.310625]  ? __pfx_kthread+0x10/0x10
[   17.310647]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.310672]  ? calculate_sigpending+0x7b/0xa0
[   17.310845]  ? __pfx_kthread+0x10/0x10
[   17.310875]  ret_from_fork+0x116/0x1d0
[   17.310898]  ? __pfx_kthread+0x10/0x10
[   17.310921]  ret_from_fork_asm+0x1a/0x30
[   17.310957]  </TASK>
[   17.310972] 
[   17.326585] Allocated by task 278:
[   17.327141]  kasan_save_stack+0x45/0x70
[   17.328334]  kasan_save_track+0x18/0x40
[   17.328757]  kasan_save_alloc_info+0x3b/0x50
[   17.329120]  __kasan_kmalloc+0xb7/0xc0
[   17.329738]  __kmalloc_cache_noprof+0x189/0x420
[   17.330107]  kasan_bitops_generic+0x92/0x1c0
[   17.330325]  kunit_try_run_case+0x1a5/0x480
[   17.331200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.331655]  kthread+0x337/0x6f0
[   17.331985]  ret_from_fork+0x116/0x1d0
[   17.332865]  ret_from_fork_asm+0x1a/0x30
[   17.333211] 
[   17.333351] The buggy address belongs to the object at ffff8881023809a0
[   17.333351]  which belongs to the cache kmalloc-16 of size 16
[   17.333927] The buggy address is located 8 bytes inside of
[   17.333927]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.335448] 
[   17.335669] The buggy address belongs to the physical page:
[   17.335982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.337069] flags: 0x200000000000000(node=0|zone=2)
[   17.337847] page_type: f5(slab)
[   17.338099] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.338661] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.339410] page dumped because: kasan: bad access detected
[   17.339749] 
[   17.340199] Memory state around the buggy address:
[   17.341137]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.341557]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.342146] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.342680]                                   ^
[   17.343285]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.343761]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.344630] ==================================================================
[   17.433108] ==================================================================
[   17.433438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.434399] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.435027] 
[   17.435476] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.435602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.435635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.435687] Call Trace:
[   17.435722]  <TASK>
[   17.435766]  dump_stack_lvl+0x73/0xb0
[   17.435841]  print_report+0xd1/0x650
[   17.435887]  ? __virt_addr_valid+0x1db/0x2d0
[   17.435925]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.435957]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.435984]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.436015]  kasan_report+0x141/0x180
[   17.436040]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.436076]  kasan_check_range+0x10c/0x1c0
[   17.436103]  __kasan_check_write+0x18/0x20
[   17.436125]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.436156]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.436188]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.436255]  ? kasan_bitops_generic+0x92/0x1c0
[   17.436324]  kasan_bitops_generic+0x121/0x1c0
[   17.436377]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.436489]  ? __pfx_read_tsc+0x10/0x10
[   17.436518]  ? ktime_get_ts64+0x86/0x230
[   17.436561]  kunit_try_run_case+0x1a5/0x480
[   17.436605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.436629]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.436658]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.436686]  ? __kthread_parkme+0x82/0x180
[   17.436710]  ? preempt_count_sub+0x50/0x80
[   17.436737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.436761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.436789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.436817]  kthread+0x337/0x6f0
[   17.436839]  ? trace_preempt_on+0x20/0xc0
[   17.436866]  ? __pfx_kthread+0x10/0x10
[   17.436888]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.436914]  ? calculate_sigpending+0x7b/0xa0
[   17.436940]  ? __pfx_kthread+0x10/0x10
[   17.436964]  ret_from_fork+0x116/0x1d0
[   17.436986]  ? __pfx_kthread+0x10/0x10
[   17.437008]  ret_from_fork_asm+0x1a/0x30
[   17.437044]  </TASK>
[   17.437058] 
[   17.451155] Allocated by task 278:
[   17.451673]  kasan_save_stack+0x45/0x70
[   17.452133]  kasan_save_track+0x18/0x40
[   17.452567]  kasan_save_alloc_info+0x3b/0x50
[   17.452844]  __kasan_kmalloc+0xb7/0xc0
[   17.453259]  __kmalloc_cache_noprof+0x189/0x420
[   17.453486]  kasan_bitops_generic+0x92/0x1c0
[   17.453918]  kunit_try_run_case+0x1a5/0x480
[   17.454604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.454940]  kthread+0x337/0x6f0
[   17.455231]  ret_from_fork+0x116/0x1d0
[   17.456085]  ret_from_fork_asm+0x1a/0x30
[   17.456407] 
[   17.456536] The buggy address belongs to the object at ffff8881023809a0
[   17.456536]  which belongs to the cache kmalloc-16 of size 16
[   17.457496] The buggy address is located 8 bytes inside of
[   17.457496]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.458206] 
[   17.458471] The buggy address belongs to the physical page:
[   17.459050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.459528] flags: 0x200000000000000(node=0|zone=2)
[   17.459903] page_type: f5(slab)
[   17.460172] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.460648] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.461065] page dumped because: kasan: bad access detected
[   17.461523] 
[   17.461646] Memory state around the buggy address:
[   17.462040]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.462776]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.463089] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.463657]                                   ^
[   17.464057]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.464496]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.464995] ==================================================================
[   17.466340] ==================================================================
[   17.466758] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.467602] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.468098] 
[   17.468272] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.468381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.468409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.468468] Call Trace:
[   17.468513]  <TASK>
[   17.468556]  dump_stack_lvl+0x73/0xb0
[   17.468626]  print_report+0xd1/0x650
[   17.468679]  ? __virt_addr_valid+0x1db/0x2d0
[   17.468732]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.468776]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.468803]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.468834]  kasan_report+0x141/0x180
[   17.468860]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.468907]  kasan_check_range+0x10c/0x1c0
[   17.468955]  __kasan_check_write+0x18/0x20
[   17.468991]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.469039]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.469098]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.469144]  ? kasan_bitops_generic+0x92/0x1c0
[   17.469204]  kasan_bitops_generic+0x121/0x1c0
[   17.470345]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.470464]  ? __pfx_read_tsc+0x10/0x10
[   17.470523]  ? ktime_get_ts64+0x86/0x230
[   17.470584]  kunit_try_run_case+0x1a5/0x480
[   17.470640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.470690]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.470725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.470754]  ? __kthread_parkme+0x82/0x180
[   17.470779]  ? preempt_count_sub+0x50/0x80
[   17.470806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.470830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.470859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.470886]  kthread+0x337/0x6f0
[   17.470908]  ? trace_preempt_on+0x20/0xc0
[   17.470935]  ? __pfx_kthread+0x10/0x10
[   17.470959]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.470983]  ? calculate_sigpending+0x7b/0xa0
[   17.471011]  ? __pfx_kthread+0x10/0x10
[   17.471034]  ret_from_fork+0x116/0x1d0
[   17.471056]  ? __pfx_kthread+0x10/0x10
[   17.471078]  ret_from_fork_asm+0x1a/0x30
[   17.471114]  </TASK>
[   17.471127] 
[   17.482680] Allocated by task 278:
[   17.482937]  kasan_save_stack+0x45/0x70
[   17.483186]  kasan_save_track+0x18/0x40
[   17.483583]  kasan_save_alloc_info+0x3b/0x50
[   17.483969]  __kasan_kmalloc+0xb7/0xc0
[   17.484288]  __kmalloc_cache_noprof+0x189/0x420
[   17.484812]  kasan_bitops_generic+0x92/0x1c0
[   17.485195]  kunit_try_run_case+0x1a5/0x480
[   17.485578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.486012]  kthread+0x337/0x6f0
[   17.486387]  ret_from_fork+0x116/0x1d0
[   17.486672]  ret_from_fork_asm+0x1a/0x30
[   17.486933] 
[   17.487065] The buggy address belongs to the object at ffff8881023809a0
[   17.487065]  which belongs to the cache kmalloc-16 of size 16
[   17.487513] The buggy address is located 8 bytes inside of
[   17.487513]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.488004] 
[   17.488201] The buggy address belongs to the physical page:
[   17.488668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.489487] flags: 0x200000000000000(node=0|zone=2)
[   17.489925] page_type: f5(slab)
[   17.490254] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.490864] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.491368] page dumped because: kasan: bad access detected
[   17.491711] 
[   17.491898] Memory state around the buggy address:
[   17.492192]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.492728]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.493160] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.493679]                                   ^
[   17.493916]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.494194]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.494495] ==================================================================
[   17.560950] ==================================================================
[   17.561524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.562289] Read of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.562787] 
[   17.563061] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.563229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.563265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.563314] Call Trace:
[   17.563367]  <TASK>
[   17.563439]  dump_stack_lvl+0x73/0xb0
[   17.563530]  print_report+0xd1/0x650
[   17.563583]  ? __virt_addr_valid+0x1db/0x2d0
[   17.563634]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.563724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.563789]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.563827]  kasan_report+0x141/0x180
[   17.563853]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.563888]  __asan_report_load8_noabort+0x18/0x20
[   17.563911]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.563951]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.564000]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.564045]  ? kasan_bitops_generic+0x92/0x1c0
[   17.564129]  kasan_bitops_generic+0x121/0x1c0
[   17.564236]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.564293]  ? __pfx_read_tsc+0x10/0x10
[   17.564368]  ? ktime_get_ts64+0x86/0x230
[   17.564443]  kunit_try_run_case+0x1a5/0x480
[   17.564500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.564538]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.564568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.564595]  ? __kthread_parkme+0x82/0x180
[   17.564619]  ? preempt_count_sub+0x50/0x80
[   17.564645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.564668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.564695]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.564722]  kthread+0x337/0x6f0
[   17.564745]  ? trace_preempt_on+0x20/0xc0
[   17.564771]  ? __pfx_kthread+0x10/0x10
[   17.564793]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.564817]  ? calculate_sigpending+0x7b/0xa0
[   17.564844]  ? __pfx_kthread+0x10/0x10
[   17.564868]  ret_from_fork+0x116/0x1d0
[   17.564889]  ? __pfx_kthread+0x10/0x10
[   17.564911]  ret_from_fork_asm+0x1a/0x30
[   17.564945]  </TASK>
[   17.564959] 
[   17.576666] Allocated by task 278:
[   17.577094]  kasan_save_stack+0x45/0x70
[   17.577553]  kasan_save_track+0x18/0x40
[   17.577923]  kasan_save_alloc_info+0x3b/0x50
[   17.578286]  __kasan_kmalloc+0xb7/0xc0
[   17.578499]  __kmalloc_cache_noprof+0x189/0x420
[   17.578759]  kasan_bitops_generic+0x92/0x1c0
[   17.579188]  kunit_try_run_case+0x1a5/0x480
[   17.579626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.579998]  kthread+0x337/0x6f0
[   17.580398]  ret_from_fork+0x116/0x1d0
[   17.580745]  ret_from_fork_asm+0x1a/0x30
[   17.581090] 
[   17.581272] The buggy address belongs to the object at ffff8881023809a0
[   17.581272]  which belongs to the cache kmalloc-16 of size 16
[   17.582001] The buggy address is located 8 bytes inside of
[   17.582001]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.582974] 
[   17.583177] The buggy address belongs to the physical page:
[   17.583517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.584184] flags: 0x200000000000000(node=0|zone=2)
[   17.584793] page_type: f5(slab)
[   17.585540] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.585932] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.587423] page dumped because: kasan: bad access detected
[   17.587691] 
[   17.587817] Memory state around the buggy address:
[   17.588075]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.588525]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.589184] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.589939]                                   ^
[   17.590223]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.591286]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.591637] ==================================================================
[   17.266344] ==================================================================
[   17.267171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.267635] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.268401] 
[   17.268914] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.269020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.269044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.269081] Call Trace:
[   17.269120]  <TASK>
[   17.269157]  dump_stack_lvl+0x73/0xb0
[   17.269219]  print_report+0xd1/0x650
[   17.269258]  ? __virt_addr_valid+0x1db/0x2d0
[   17.269296]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.269339]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.269380]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.269426]  kasan_report+0x141/0x180
[   17.270000]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.270061]  kasan_check_range+0x10c/0x1c0
[   17.270091]  __kasan_check_write+0x18/0x20
[   17.270115]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.270147]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.270179]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.270213]  ? kasan_bitops_generic+0x92/0x1c0
[   17.270263]  kasan_bitops_generic+0x121/0x1c0
[   17.270290]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.270317]  ? __pfx_read_tsc+0x10/0x10
[   17.270344]  ? ktime_get_ts64+0x86/0x230
[   17.270373]  kunit_try_run_case+0x1a5/0x480
[   17.270399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.270420]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.270450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.270501]  ? __kthread_parkme+0x82/0x180
[   17.270525]  ? preempt_count_sub+0x50/0x80
[   17.270556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.270580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.270608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.270636]  kthread+0x337/0x6f0
[   17.270660]  ? trace_preempt_on+0x20/0xc0
[   17.270687]  ? __pfx_kthread+0x10/0x10
[   17.270727]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.270765]  ? calculate_sigpending+0x7b/0xa0
[   17.270807]  ? __pfx_kthread+0x10/0x10
[   17.270844]  ret_from_fork+0x116/0x1d0
[   17.270881]  ? __pfx_kthread+0x10/0x10
[   17.270914]  ret_from_fork_asm+0x1a/0x30
[   17.270952]  </TASK>
[   17.270967] 
[   17.287662] Allocated by task 278:
[   17.288392]  kasan_save_stack+0x45/0x70
[   17.289338]  kasan_save_track+0x18/0x40
[   17.289989]  kasan_save_alloc_info+0x3b/0x50
[   17.290288]  __kasan_kmalloc+0xb7/0xc0
[   17.290663]  __kmalloc_cache_noprof+0x189/0x420
[   17.291218]  kasan_bitops_generic+0x92/0x1c0
[   17.291576]  kunit_try_run_case+0x1a5/0x480
[   17.292258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.292621]  kthread+0x337/0x6f0
[   17.293395]  ret_from_fork+0x116/0x1d0
[   17.293594]  ret_from_fork_asm+0x1a/0x30
[   17.293864] 
[   17.294074] The buggy address belongs to the object at ffff8881023809a0
[   17.294074]  which belongs to the cache kmalloc-16 of size 16
[   17.294932] The buggy address is located 8 bytes inside of
[   17.294932]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.295953] 
[   17.296214] The buggy address belongs to the physical page:
[   17.296740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.297443] flags: 0x200000000000000(node=0|zone=2)
[   17.297983] page_type: f5(slab)
[   17.298503] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.299294] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.299690] page dumped because: kasan: bad access detected
[   17.300857] 
[   17.301012] Memory state around the buggy address:
[   17.301384]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.302278]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.302733] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.303245]                                   ^
[   17.303668]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.304735]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.305161] ==================================================================
[   17.385412] ==================================================================
[   17.385717] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.386060] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.386298] 
[   17.386444] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.386832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.386864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.386992] Call Trace:
[   17.387114]  <TASK>
[   17.387244]  dump_stack_lvl+0x73/0xb0
[   17.387319]  print_report+0xd1/0x650
[   17.387374]  ? __virt_addr_valid+0x1db/0x2d0
[   17.387420]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.387491]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.387535]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.387584]  kasan_report+0x141/0x180
[   17.387622]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.387676]  kasan_check_range+0x10c/0x1c0
[   17.387719]  __kasan_check_write+0x18/0x20
[   17.387750]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.390898]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.390990]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.391035]  ? kasan_bitops_generic+0x92/0x1c0
[   17.391093]  kasan_bitops_generic+0x121/0x1c0
[   17.391142]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.391185]  ? __pfx_read_tsc+0x10/0x10
[   17.391244]  ? ktime_get_ts64+0x86/0x230
[   17.391297]  kunit_try_run_case+0x1a5/0x480
[   17.391362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.391410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.391484]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.391544]  ? __kthread_parkme+0x82/0x180
[   17.391595]  ? preempt_count_sub+0x50/0x80
[   17.391652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.391703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.391760]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.391814]  kthread+0x337/0x6f0
[   17.391862]  ? trace_preempt_on+0x20/0xc0
[   17.391915]  ? __pfx_kthread+0x10/0x10
[   17.391964]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.392015]  ? calculate_sigpending+0x7b/0xa0
[   17.392072]  ? __pfx_kthread+0x10/0x10
[   17.392120]  ret_from_fork+0x116/0x1d0
[   17.392154]  ? __pfx_kthread+0x10/0x10
[   17.392192]  ret_from_fork_asm+0x1a/0x30
[   17.392250]  </TASK>
[   17.392271] 
[   17.412831] Allocated by task 278:
[   17.413090]  kasan_save_stack+0x45/0x70
[   17.413381]  kasan_save_track+0x18/0x40
[   17.414980]  kasan_save_alloc_info+0x3b/0x50
[   17.415332]  __kasan_kmalloc+0xb7/0xc0
[   17.416026]  __kmalloc_cache_noprof+0x189/0x420
[   17.416403]  kasan_bitops_generic+0x92/0x1c0
[   17.416658]  kunit_try_run_case+0x1a5/0x480
[   17.417300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.418372]  kthread+0x337/0x6f0
[   17.418626]  ret_from_fork+0x116/0x1d0
[   17.418902]  ret_from_fork_asm+0x1a/0x30
[   17.419511] 
[   17.419808] The buggy address belongs to the object at ffff8881023809a0
[   17.419808]  which belongs to the cache kmalloc-16 of size 16
[   17.420802] The buggy address is located 8 bytes inside of
[   17.420802]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.421404] 
[   17.421871] The buggy address belongs to the physical page:
[   17.422194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.422534] flags: 0x200000000000000(node=0|zone=2)
[   17.422880] page_type: f5(slab)
[   17.423913] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.425167] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.426047] page dumped because: kasan: bad access detected
[   17.426540] 
[   17.426929] Memory state around the buggy address:
[   17.427189]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.428551]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.429013] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.429474]                                   ^
[   17.429865]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.430516]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.431239] ==================================================================
[   17.527503] ==================================================================
[   17.527858] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.528247] Read of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.529016] 
[   17.529327] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.529439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.529477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.529529] Call Trace:
[   17.529578]  <TASK>
[   17.529623]  dump_stack_lvl+0x73/0xb0
[   17.529693]  print_report+0xd1/0x650
[   17.529750]  ? __virt_addr_valid+0x1db/0x2d0
[   17.529806]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.529872]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.529926]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.529989]  kasan_report+0x141/0x180
[   17.530043]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.530116]  kasan_check_range+0x10c/0x1c0
[   17.530172]  __kasan_check_read+0x15/0x20
[   17.530235]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.530293]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.530389]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.530465]  ? kasan_bitops_generic+0x92/0x1c0
[   17.530553]  kasan_bitops_generic+0x121/0x1c0
[   17.530646]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.530735]  ? __pfx_read_tsc+0x10/0x10
[   17.530783]  ? ktime_get_ts64+0x86/0x230
[   17.530858]  kunit_try_run_case+0x1a5/0x480
[   17.530909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.530951]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.530997]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.531044]  ? __kthread_parkme+0x82/0x180
[   17.531092]  ? preempt_count_sub+0x50/0x80
[   17.531175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.531277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.531339]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.531404]  kthread+0x337/0x6f0
[   17.531445]  ? trace_preempt_on+0x20/0xc0
[   17.531894]  ? __pfx_kthread+0x10/0x10
[   17.531979]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.532024]  ? calculate_sigpending+0x7b/0xa0
[   17.532056]  ? __pfx_kthread+0x10/0x10
[   17.532081]  ret_from_fork+0x116/0x1d0
[   17.532105]  ? __pfx_kthread+0x10/0x10
[   17.532128]  ret_from_fork_asm+0x1a/0x30
[   17.532164]  </TASK>
[   17.532178] 
[   17.545186] Allocated by task 278:
[   17.545758]  kasan_save_stack+0x45/0x70
[   17.546011]  kasan_save_track+0x18/0x40
[   17.546651]  kasan_save_alloc_info+0x3b/0x50
[   17.547074]  __kasan_kmalloc+0xb7/0xc0
[   17.547450]  __kmalloc_cache_noprof+0x189/0x420
[   17.548172]  kasan_bitops_generic+0x92/0x1c0
[   17.548647]  kunit_try_run_case+0x1a5/0x480
[   17.548852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.549505]  kthread+0x337/0x6f0
[   17.549989]  ret_from_fork+0x116/0x1d0
[   17.550304]  ret_from_fork_asm+0x1a/0x30
[   17.550804] 
[   17.550956] The buggy address belongs to the object at ffff8881023809a0
[   17.550956]  which belongs to the cache kmalloc-16 of size 16
[   17.551754] The buggy address is located 8 bytes inside of
[   17.551754]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.552434] 
[   17.552917] The buggy address belongs to the physical page:
[   17.553231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.553996] flags: 0x200000000000000(node=0|zone=2)
[   17.554223] page_type: f5(slab)
[   17.554497] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.555069] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.555397] page dumped because: kasan: bad access detected
[   17.555874] 
[   17.556005] Memory state around the buggy address:
[   17.556266]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.556845]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.557569] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.558055]                                   ^
[   17.558313]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.558917]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.559568] ==================================================================
[   17.495968] ==================================================================
[   17.497152] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.497686] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.498162] 
[   17.498422] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.498579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.498853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.498893] Call Trace:
[   17.498935]  <TASK>
[   17.498977]  dump_stack_lvl+0x73/0xb0
[   17.499039]  print_report+0xd1/0x650
[   17.499088]  ? __virt_addr_valid+0x1db/0x2d0
[   17.499136]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.499193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.499942]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.499993]  kasan_report+0x141/0x180
[   17.500024]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.500061]  kasan_check_range+0x10c/0x1c0
[   17.500090]  __kasan_check_write+0x18/0x20
[   17.500113]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.500144]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.500176]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.500210]  ? kasan_bitops_generic+0x92/0x1c0
[   17.500562]  kasan_bitops_generic+0x121/0x1c0
[   17.500622]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.500680]  ? __pfx_read_tsc+0x10/0x10
[   17.500732]  ? ktime_get_ts64+0x86/0x230
[   17.500793]  kunit_try_run_case+0x1a5/0x480
[   17.500848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.500897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.500956]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.501014]  ? __kthread_parkme+0x82/0x180
[   17.501063]  ? preempt_count_sub+0x50/0x80
[   17.501112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.501137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.501165]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.501210]  kthread+0x337/0x6f0
[   17.501267]  ? trace_preempt_on+0x20/0xc0
[   17.501294]  ? __pfx_kthread+0x10/0x10
[   17.501316]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.501341]  ? calculate_sigpending+0x7b/0xa0
[   17.501368]  ? __pfx_kthread+0x10/0x10
[   17.501391]  ret_from_fork+0x116/0x1d0
[   17.501411]  ? __pfx_kthread+0x10/0x10
[   17.501434]  ret_from_fork_asm+0x1a/0x30
[   17.501485]  </TASK>
[   17.501500] 
[   17.513812] Allocated by task 278:
[   17.514199]  kasan_save_stack+0x45/0x70
[   17.514529]  kasan_save_track+0x18/0x40
[   17.514865]  kasan_save_alloc_info+0x3b/0x50
[   17.515243]  __kasan_kmalloc+0xb7/0xc0
[   17.515485]  __kmalloc_cache_noprof+0x189/0x420
[   17.515866]  kasan_bitops_generic+0x92/0x1c0
[   17.516167]  kunit_try_run_case+0x1a5/0x480
[   17.516581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.516876]  kthread+0x337/0x6f0
[   17.517069]  ret_from_fork+0x116/0x1d0
[   17.517339]  ret_from_fork_asm+0x1a/0x30
[   17.517777] 
[   17.517994] The buggy address belongs to the object at ffff8881023809a0
[   17.517994]  which belongs to the cache kmalloc-16 of size 16
[   17.518872] The buggy address is located 8 bytes inside of
[   17.518872]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.519297] 
[   17.519442] The buggy address belongs to the physical page:
[   17.520019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.520726] flags: 0x200000000000000(node=0|zone=2)
[   17.521126] page_type: f5(slab)
[   17.521559] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.522065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.522651] page dumped because: kasan: bad access detected
[   17.522883] 
[   17.523000] Memory state around the buggy address:
[   17.523249]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.523747]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.524502] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.525078]                                   ^
[   17.525316]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.525772]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.526333] ==================================================================
[   17.345667] ==================================================================
[   17.346303] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.346894] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.347997] 
[   17.348249] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.349088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.349151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.349199] Call Trace:
[   17.349266]  <TASK>
[   17.349310]  dump_stack_lvl+0x73/0xb0
[   17.349395]  print_report+0xd1/0x650
[   17.349444]  ? __virt_addr_valid+0x1db/0x2d0
[   17.349510]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.349591]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.349641]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.349698]  kasan_report+0x141/0x180
[   17.349746]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.349792]  kasan_check_range+0x10c/0x1c0
[   17.349821]  __kasan_check_write+0x18/0x20
[   17.349844]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.349875]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.349907]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.349932]  ? kasan_bitops_generic+0x92/0x1c0
[   17.349963]  kasan_bitops_generic+0x121/0x1c0
[   17.349990]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.350019]  ? __pfx_read_tsc+0x10/0x10
[   17.350043]  ? ktime_get_ts64+0x86/0x230
[   17.350073]  kunit_try_run_case+0x1a5/0x480
[   17.350097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.350119]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.350147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.350174]  ? __kthread_parkme+0x82/0x180
[   17.350203]  ? preempt_count_sub+0x50/0x80
[   17.350284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.350327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.350396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.350427]  kthread+0x337/0x6f0
[   17.350450]  ? trace_preempt_on+0x20/0xc0
[   17.350502]  ? __pfx_kthread+0x10/0x10
[   17.350527]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.350556]  ? calculate_sigpending+0x7b/0xa0
[   17.350585]  ? __pfx_kthread+0x10/0x10
[   17.350610]  ret_from_fork+0x116/0x1d0
[   17.350634]  ? __pfx_kthread+0x10/0x10
[   17.350658]  ret_from_fork_asm+0x1a/0x30
[   17.350719]  </TASK>
[   17.350743] 
[   17.367092] Allocated by task 278:
[   17.367329]  kasan_save_stack+0x45/0x70
[   17.368644]  kasan_save_track+0x18/0x40
[   17.369191]  kasan_save_alloc_info+0x3b/0x50
[   17.369747]  __kasan_kmalloc+0xb7/0xc0
[   17.370151]  __kmalloc_cache_noprof+0x189/0x420
[   17.370608]  kasan_bitops_generic+0x92/0x1c0
[   17.371436]  kunit_try_run_case+0x1a5/0x480
[   17.372507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.372908]  kthread+0x337/0x6f0
[   17.373073]  ret_from_fork+0x116/0x1d0
[   17.373180]  ret_from_fork_asm+0x1a/0x30
[   17.373409] 
[   17.373550] The buggy address belongs to the object at ffff8881023809a0
[   17.373550]  which belongs to the cache kmalloc-16 of size 16
[   17.374768] The buggy address is located 8 bytes inside of
[   17.374768]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.375597] 
[   17.375783] The buggy address belongs to the physical page:
[   17.376104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.377240] flags: 0x200000000000000(node=0|zone=2)
[   17.377468] page_type: f5(slab)
[   17.377622] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.379095] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.379560] page dumped because: kasan: bad access detected
[   17.380251] 
[   17.380380] Memory state around the buggy address:
[   17.381540]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.381928]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.382750] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.383199]                                   ^
[   17.384107]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.384370]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.384812] ==================================================================