Hay
Date
June 20, 2025, 12:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   35.334830] ==================================================================
[   35.334966] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   35.335761] Call trace:
[   35.337683]  ret_from_fork+0x10/0x20
[   35.341698] ==================================================================

[   28.488213] ==================================================================
[   28.488655] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   28.489291] Read of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.490044] 
[   28.490276] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.490377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.490404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.490457] Call Trace:
[   28.490496]  <TASK>
[   28.490533]  dump_stack_lvl+0x73/0xb0
[   28.490590]  print_report+0xd1/0x650
[   28.490626]  ? __virt_addr_valid+0x1db/0x2d0
[   28.490663]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   28.490707]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.490754]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   28.490808]  kasan_report+0x141/0x180
[   28.490850]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   28.490918]  __asan_report_load8_noabort+0x18/0x20
[   28.490973]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   28.491027]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.491079]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.491124]  ? trace_hardirqs_on+0x37/0xe0
[   28.491207]  ? kasan_bitops_generic+0x92/0x1c0
[   28.491265]  kasan_bitops_generic+0x121/0x1c0
[   28.491317]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.491368]  ? __pfx_read_tsc+0x10/0x10
[   28.491410]  ? ktime_get_ts64+0x86/0x230
[   28.491476]  kunit_try_run_case+0x1a5/0x480
[   28.491529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.491570]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.491622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.491674]  ? __kthread_parkme+0x82/0x180
[   28.491724]  ? preempt_count_sub+0x50/0x80
[   28.491780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.491835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.491890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.491943]  kthread+0x337/0x6f0
[   28.491988]  ? trace_preempt_on+0x20/0xc0
[   28.492036]  ? __pfx_kthread+0x10/0x10
[   28.492083]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.492133]  ? calculate_sigpending+0x7b/0xa0
[   28.492221]  ? __pfx_kthread+0x10/0x10
[   28.492268]  ret_from_fork+0x116/0x1d0
[   28.492314]  ? __pfx_kthread+0x10/0x10
[   28.492361]  ret_from_fork_asm+0x1a/0x30
[   28.492434]  </TASK>
[   28.492474] 
[   28.502403] Allocated by task 290:
[   28.502770]  kasan_save_stack+0x45/0x70
[   28.503187]  kasan_save_track+0x18/0x40
[   28.503512]  kasan_save_alloc_info+0x3b/0x50
[   28.503858]  __kasan_kmalloc+0xb7/0xc0
[   28.504171]  __kmalloc_cache_noprof+0x189/0x420
[   28.504559]  kasan_bitops_generic+0x92/0x1c0
[   28.504812]  kunit_try_run_case+0x1a5/0x480
[   28.505171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.505410]  kthread+0x337/0x6f0
[   28.505713]  ret_from_fork+0x116/0x1d0
[   28.505887]  ret_from_fork_asm+0x1a/0x30
[   28.506084] 
[   28.506223] The buggy address belongs to the object at ffff8881022cf740
[   28.506223]  which belongs to the cache kmalloc-16 of size 16
[   28.506898] The buggy address is located 8 bytes inside of
[   28.506898]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.507704] 
[   28.507817] The buggy address belongs to the physical page:
[   28.508250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.508597] flags: 0x200000000000000(node=0|zone=2)
[   28.508987] page_type: f5(slab)
[   28.509202] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.509653] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.510048] page dumped because: kasan: bad access detected
[   28.510318] 
[   28.510424] Memory state around the buggy address:
[   28.510715]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.511247]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.511637] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.511895]                                               ^
[   28.512115]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.512410]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.512932] ==================================================================
[   28.459846] ==================================================================
[   28.460153] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   28.461392] Read of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.462003] 
[   28.462323] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.462439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.462479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.462559] Call Trace:
[   28.462617]  <TASK>
[   28.462663]  dump_stack_lvl+0x73/0xb0
[   28.462736]  print_report+0xd1/0x650
[   28.462763]  ? __virt_addr_valid+0x1db/0x2d0
[   28.462791]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   28.462822]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.462850]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   28.462882]  kasan_report+0x141/0x180
[   28.462906]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   28.462941]  kasan_check_range+0x10c/0x1c0
[   28.462967]  __kasan_check_read+0x15/0x20
[   28.462991]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   28.463021]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.463052]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.463079]  ? trace_hardirqs_on+0x37/0xe0
[   28.463103]  ? kasan_bitops_generic+0x92/0x1c0
[   28.463132]  kasan_bitops_generic+0x121/0x1c0
[   28.463185]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.463219]  ? __pfx_read_tsc+0x10/0x10
[   28.463244]  ? ktime_get_ts64+0x86/0x230
[   28.463275]  kunit_try_run_case+0x1a5/0x480
[   28.463304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.463329]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.463355]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.463381]  ? __kthread_parkme+0x82/0x180
[   28.463405]  ? preempt_count_sub+0x50/0x80
[   28.463431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.463478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.463504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.463529]  kthread+0x337/0x6f0
[   28.463552]  ? trace_preempt_on+0x20/0xc0
[   28.463576]  ? __pfx_kthread+0x10/0x10
[   28.463599]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.463622]  ? calculate_sigpending+0x7b/0xa0
[   28.463649]  ? __pfx_kthread+0x10/0x10
[   28.463673]  ret_from_fork+0x116/0x1d0
[   28.463694]  ? __pfx_kthread+0x10/0x10
[   28.463717]  ret_from_fork_asm+0x1a/0x30
[   28.463752]  </TASK>
[   28.463767] 
[   28.475979] Allocated by task 290:
[   28.476411]  kasan_save_stack+0x45/0x70
[   28.476837]  kasan_save_track+0x18/0x40
[   28.477226]  kasan_save_alloc_info+0x3b/0x50
[   28.477559]  __kasan_kmalloc+0xb7/0xc0
[   28.477801]  __kmalloc_cache_noprof+0x189/0x420
[   28.478022]  kasan_bitops_generic+0x92/0x1c0
[   28.478361]  kunit_try_run_case+0x1a5/0x480
[   28.478682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.478948]  kthread+0x337/0x6f0
[   28.479259]  ret_from_fork+0x116/0x1d0
[   28.479571]  ret_from_fork_asm+0x1a/0x30
[   28.479812] 
[   28.479929] The buggy address belongs to the object at ffff8881022cf740
[   28.479929]  which belongs to the cache kmalloc-16 of size 16
[   28.480625] The buggy address is located 8 bytes inside of
[   28.480625]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.481316] 
[   28.481502] The buggy address belongs to the physical page:
[   28.481776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.482076] flags: 0x200000000000000(node=0|zone=2)
[   28.482468] page_type: f5(slab)
[   28.482738] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.483293] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.483760] page dumped because: kasan: bad access detected
[   28.484071] 
[   28.484257] Memory state around the buggy address:
[   28.484577]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.484993]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.485474] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.485761]                                               ^
[   28.486172]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.486494]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.486940] ==================================================================
[   28.428458] ==================================================================
[   28.429098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   28.429764] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.430221] 
[   28.430382] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.430499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.430526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.430573] Call Trace:
[   28.430870]  <TASK>
[   28.430914]  dump_stack_lvl+0x73/0xb0
[   28.430991]  print_report+0xd1/0x650
[   28.431042]  ? __virt_addr_valid+0x1db/0x2d0
[   28.431096]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   28.431152]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.431208]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   28.431268]  kasan_report+0x141/0x180
[   28.431319]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   28.431375]  kasan_check_range+0x10c/0x1c0
[   28.431402]  __kasan_check_write+0x18/0x20
[   28.431429]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   28.431490]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.431542]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.431583]  ? trace_hardirqs_on+0x37/0xe0
[   28.431628]  ? kasan_bitops_generic+0x92/0x1c0
[   28.431687]  kasan_bitops_generic+0x121/0x1c0
[   28.431741]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.431796]  ? __pfx_read_tsc+0x10/0x10
[   28.431838]  ? ktime_get_ts64+0x86/0x230
[   28.431897]  kunit_try_run_case+0x1a5/0x480
[   28.431955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.432005]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.432058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.432112]  ? __kthread_parkme+0x82/0x180
[   28.432159]  ? preempt_count_sub+0x50/0x80
[   28.432211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.432268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.432322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.432365]  kthread+0x337/0x6f0
[   28.432389]  ? trace_preempt_on+0x20/0xc0
[   28.432415]  ? __pfx_kthread+0x10/0x10
[   28.432438]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.432479]  ? calculate_sigpending+0x7b/0xa0
[   28.432507]  ? __pfx_kthread+0x10/0x10
[   28.432532]  ret_from_fork+0x116/0x1d0
[   28.432554]  ? __pfx_kthread+0x10/0x10
[   28.432576]  ret_from_fork_asm+0x1a/0x30
[   28.432613]  </TASK>
[   28.432627] 
[   28.445578] Allocated by task 290:
[   28.446022]  kasan_save_stack+0x45/0x70
[   28.446541]  kasan_save_track+0x18/0x40
[   28.446902]  kasan_save_alloc_info+0x3b/0x50
[   28.447126]  __kasan_kmalloc+0xb7/0xc0
[   28.447479]  __kmalloc_cache_noprof+0x189/0x420
[   28.447757]  kasan_bitops_generic+0x92/0x1c0
[   28.448148]  kunit_try_run_case+0x1a5/0x480
[   28.448571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.449047]  kthread+0x337/0x6f0
[   28.449394]  ret_from_fork+0x116/0x1d0
[   28.449775]  ret_from_fork_asm+0x1a/0x30
[   28.450059] 
[   28.450169] The buggy address belongs to the object at ffff8881022cf740
[   28.450169]  which belongs to the cache kmalloc-16 of size 16
[   28.450604] The buggy address is located 8 bytes inside of
[   28.450604]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.451113] 
[   28.451888] The buggy address belongs to the physical page:
[   28.452684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.453222] flags: 0x200000000000000(node=0|zone=2)
[   28.453580] page_type: f5(slab)
[   28.453811] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.454592] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.454861] page dumped because: kasan: bad access detected
[   28.455228] 
[   28.455557] Memory state around the buggy address:
[   28.455869]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.456319]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.456723] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.457095]                                               ^
[   28.457943]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.458480]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.458829] ==================================================================
[   28.363546] ==================================================================
[   28.364790] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   28.366921] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.367501] 
[   28.367685] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.367787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.367811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.367851] Call Trace:
[   28.367891]  <TASK>
[   28.367929]  dump_stack_lvl+0x73/0xb0
[   28.367997]  print_report+0xd1/0x650
[   28.368038]  ? __virt_addr_valid+0x1db/0x2d0
[   28.368080]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   28.368128]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.368202]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   28.368253]  kasan_report+0x141/0x180
[   28.368295]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   28.368357]  kasan_check_range+0x10c/0x1c0
[   28.368400]  __kasan_check_write+0x18/0x20
[   28.368453]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   28.368503]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.368550]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.368588]  ? trace_hardirqs_on+0x37/0xe0
[   28.368626]  ? kasan_bitops_generic+0x92/0x1c0
[   28.368671]  kasan_bitops_generic+0x121/0x1c0
[   28.368714]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.368761]  ? __pfx_read_tsc+0x10/0x10
[   28.368803]  ? ktime_get_ts64+0x86/0x230
[   28.368844]  kunit_try_run_case+0x1a5/0x480
[   28.368883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.368952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.369005]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.369054]  ? __kthread_parkme+0x82/0x180
[   28.369096]  ? preempt_count_sub+0x50/0x80
[   28.369145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.369187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.369240]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.369292]  kthread+0x337/0x6f0
[   28.369334]  ? trace_preempt_on+0x20/0xc0
[   28.369374]  ? __pfx_kthread+0x10/0x10
[   28.369409]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.369466]  ? calculate_sigpending+0x7b/0xa0
[   28.369518]  ? __pfx_kthread+0x10/0x10
[   28.369563]  ret_from_fork+0x116/0x1d0
[   28.369608]  ? __pfx_kthread+0x10/0x10
[   28.369649]  ret_from_fork_asm+0x1a/0x30
[   28.369713]  </TASK>
[   28.369743] 
[   28.382434] Allocated by task 290:
[   28.382830]  kasan_save_stack+0x45/0x70
[   28.383151]  kasan_save_track+0x18/0x40
[   28.383360]  kasan_save_alloc_info+0x3b/0x50
[   28.383594]  __kasan_kmalloc+0xb7/0xc0
[   28.383789]  __kmalloc_cache_noprof+0x189/0x420
[   28.384019]  kasan_bitops_generic+0x92/0x1c0
[   28.384380]  kunit_try_run_case+0x1a5/0x480
[   28.384790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.385204]  kthread+0x337/0x6f0
[   28.385597]  ret_from_fork+0x116/0x1d0
[   28.385925]  ret_from_fork_asm+0x1a/0x30
[   28.386276] 
[   28.386614] The buggy address belongs to the object at ffff8881022cf740
[   28.386614]  which belongs to the cache kmalloc-16 of size 16
[   28.387990] The buggy address is located 8 bytes inside of
[   28.387990]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.388589] 
[   28.388706] The buggy address belongs to the physical page:
[   28.388923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.390050] flags: 0x200000000000000(node=0|zone=2)
[   28.390613] page_type: f5(slab)
[   28.391140] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.391743] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.392402] page dumped because: kasan: bad access detected
[   28.392806] 
[   28.392914] Memory state around the buggy address:
[   28.393627]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.393888]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.394539] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.394981]                                               ^
[   28.395477]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.396071]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.396602] ==================================================================
[   28.316238] ==================================================================
[   28.317050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   28.318626] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.319841] 
[   28.320128] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.320413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.320500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.320564] Call Trace:
[   28.320608]  <TASK>
[   28.320655]  dump_stack_lvl+0x73/0xb0
[   28.320728]  print_report+0xd1/0x650
[   28.320773]  ? __virt_addr_valid+0x1db/0x2d0
[   28.320819]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   28.320869]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.320920]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   28.320989]  kasan_report+0x141/0x180
[   28.321045]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   28.321117]  kasan_check_range+0x10c/0x1c0
[   28.321199]  __kasan_check_write+0x18/0x20
[   28.321243]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   28.321296]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.321366]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.321426]  ? trace_hardirqs_on+0x37/0xe0
[   28.321490]  ? kasan_bitops_generic+0x92/0x1c0
[   28.321549]  kasan_bitops_generic+0x121/0x1c0
[   28.321594]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.321640]  ? __pfx_read_tsc+0x10/0x10
[   28.321683]  ? ktime_get_ts64+0x86/0x230
[   28.321746]  kunit_try_run_case+0x1a5/0x480
[   28.321811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.321867]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.321914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.321961]  ? __kthread_parkme+0x82/0x180
[   28.322001]  ? preempt_count_sub+0x50/0x80
[   28.322058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.322104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.322190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.322254]  kthread+0x337/0x6f0
[   28.322301]  ? trace_preempt_on+0x20/0xc0
[   28.322352]  ? __pfx_kthread+0x10/0x10
[   28.322392]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.322433]  ? calculate_sigpending+0x7b/0xa0
[   28.322486]  ? __pfx_kthread+0x10/0x10
[   28.322525]  ret_from_fork+0x116/0x1d0
[   28.322557]  ? __pfx_kthread+0x10/0x10
[   28.322593]  ret_from_fork_asm+0x1a/0x30
[   28.322653]  </TASK>
[   28.322681] 
[   28.338138] Allocated by task 290:
[   28.338410]  kasan_save_stack+0x45/0x70
[   28.338650]  kasan_save_track+0x18/0x40
[   28.338829]  kasan_save_alloc_info+0x3b/0x50
[   28.339000]  __kasan_kmalloc+0xb7/0xc0
[   28.339211]  __kmalloc_cache_noprof+0x189/0x420
[   28.339399]  kasan_bitops_generic+0x92/0x1c0
[   28.339712]  kunit_try_run_case+0x1a5/0x480
[   28.340043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.341372]  kthread+0x337/0x6f0
[   28.341766]  ret_from_fork+0x116/0x1d0
[   28.342122]  ret_from_fork_asm+0x1a/0x30
[   28.343498] 
[   28.343690] The buggy address belongs to the object at ffff8881022cf740
[   28.343690]  which belongs to the cache kmalloc-16 of size 16
[   28.346632] The buggy address is located 8 bytes inside of
[   28.346632]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.347094] 
[   28.350079] The buggy address belongs to the physical page:
[   28.350591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.351208] flags: 0x200000000000000(node=0|zone=2)
[   28.352292] page_type: f5(slab)
[   28.353530] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.354019] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.354963] page dumped because: kasan: bad access detected
[   28.355258] 
[   28.355369] Memory state around the buggy address:
[   28.357097]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.358417]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.359746] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.360018]                                               ^
[   28.360395]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.360675]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.360917] ==================================================================
[   28.268191] ==================================================================
[   28.268514] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   28.269458] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.269999] 
[   28.270603] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.270706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.270728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.270766] Call Trace:
[   28.270804]  <TASK>
[   28.270838]  dump_stack_lvl+0x73/0xb0
[   28.270895]  print_report+0xd1/0x650
[   28.270929]  ? __virt_addr_valid+0x1db/0x2d0
[   28.270966]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   28.271007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.271049]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   28.271127]  kasan_report+0x141/0x180
[   28.271219]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   28.271276]  kasan_check_range+0x10c/0x1c0
[   28.271318]  __kasan_check_write+0x18/0x20
[   28.271635]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   28.271697]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.271757]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.271810]  ? trace_hardirqs_on+0x37/0xe0
[   28.271850]  ? kasan_bitops_generic+0x92/0x1c0
[   28.271901]  kasan_bitops_generic+0x121/0x1c0
[   28.271952]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.272008]  ? __pfx_read_tsc+0x10/0x10
[   28.272057]  ? ktime_get_ts64+0x86/0x230
[   28.272122]  kunit_try_run_case+0x1a5/0x480
[   28.272668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.272707]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.272746]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.272781]  ? __kthread_parkme+0x82/0x180
[   28.272814]  ? preempt_count_sub+0x50/0x80
[   28.272852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.272889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.272928]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.272973]  kthread+0x337/0x6f0
[   28.273010]  ? trace_preempt_on+0x20/0xc0
[   28.273049]  ? __pfx_kthread+0x10/0x10
[   28.273087]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.273128]  ? calculate_sigpending+0x7b/0xa0
[   28.273212]  ? __pfx_kthread+0x10/0x10
[   28.273293]  ret_from_fork+0x116/0x1d0
[   28.273329]  ? __pfx_kthread+0x10/0x10
[   28.273370]  ret_from_fork_asm+0x1a/0x30
[   28.273448]  </TASK>
[   28.273480] 
[   28.303844] Allocated by task 290:
[   28.304193]  kasan_save_stack+0x45/0x70
[   28.304632]  kasan_save_track+0x18/0x40
[   28.304818]  kasan_save_alloc_info+0x3b/0x50
[   28.304996]  __kasan_kmalloc+0xb7/0xc0
[   28.305195]  __kmalloc_cache_noprof+0x189/0x420
[   28.305397]  kasan_bitops_generic+0x92/0x1c0
[   28.305585]  kunit_try_run_case+0x1a5/0x480
[   28.305778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.305972]  kthread+0x337/0x6f0
[   28.306191]  ret_from_fork+0x116/0x1d0
[   28.306351]  ret_from_fork_asm+0x1a/0x30
[   28.306530] 
[   28.306618] The buggy address belongs to the object at ffff8881022cf740
[   28.306618]  which belongs to the cache kmalloc-16 of size 16
[   28.306991] The buggy address is located 8 bytes inside of
[   28.306991]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.307423] 
[   28.307548] The buggy address belongs to the physical page:
[   28.307763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.308058] flags: 0x200000000000000(node=0|zone=2)
[   28.308313] page_type: f5(slab)
[   28.308494] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.309036] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.309628] page dumped because: kasan: bad access detected
[   28.310060] 
[   28.310257] Memory state around the buggy address:
[   28.310646]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.311195]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.311748] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.313402]                                               ^
[   28.313694]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.313966]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.314255] ==================================================================
[   28.399005] ==================================================================
[   28.399490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   28.400489] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.400817] 
[   28.400974] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.401039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.401055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.401081] Call Trace:
[   28.401108]  <TASK>
[   28.401132]  dump_stack_lvl+0x73/0xb0
[   28.401186]  print_report+0xd1/0x650
[   28.401225]  ? __virt_addr_valid+0x1db/0x2d0
[   28.401271]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   28.401326]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.401377]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   28.401434]  kasan_report+0x141/0x180
[   28.401494]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   28.401561]  kasan_check_range+0x10c/0x1c0
[   28.401612]  __kasan_check_write+0x18/0x20
[   28.401663]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   28.401716]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.401766]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.401812]  ? trace_hardirqs_on+0x37/0xe0
[   28.401857]  ? kasan_bitops_generic+0x92/0x1c0
[   28.401918]  kasan_bitops_generic+0x121/0x1c0
[   28.401972]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.402040]  ? __pfx_read_tsc+0x10/0x10
[   28.402091]  ? ktime_get_ts64+0x86/0x230
[   28.402153]  kunit_try_run_case+0x1a5/0x480
[   28.402210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.402252]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.402296]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.402325]  ? __kthread_parkme+0x82/0x180
[   28.402349]  ? preempt_count_sub+0x50/0x80
[   28.402376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.402401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.402428]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.402476]  kthread+0x337/0x6f0
[   28.402510]  ? trace_preempt_on+0x20/0xc0
[   28.402542]  ? __pfx_kthread+0x10/0x10
[   28.402564]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.402588]  ? calculate_sigpending+0x7b/0xa0
[   28.402616]  ? __pfx_kthread+0x10/0x10
[   28.402640]  ret_from_fork+0x116/0x1d0
[   28.402661]  ? __pfx_kthread+0x10/0x10
[   28.402684]  ret_from_fork_asm+0x1a/0x30
[   28.402719]  </TASK>
[   28.402734] 
[   28.414757] Allocated by task 290:
[   28.415036]  kasan_save_stack+0x45/0x70
[   28.415510]  kasan_save_track+0x18/0x40
[   28.415827]  kasan_save_alloc_info+0x3b/0x50
[   28.416128]  __kasan_kmalloc+0xb7/0xc0
[   28.416479]  __kmalloc_cache_noprof+0x189/0x420
[   28.416825]  kasan_bitops_generic+0x92/0x1c0
[   28.417257]  kunit_try_run_case+0x1a5/0x480
[   28.417463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.417970]  kthread+0x337/0x6f0
[   28.418345]  ret_from_fork+0x116/0x1d0
[   28.418636]  ret_from_fork_asm+0x1a/0x30
[   28.418866] 
[   28.418994] The buggy address belongs to the object at ffff8881022cf740
[   28.418994]  which belongs to the cache kmalloc-16 of size 16
[   28.419962] The buggy address is located 8 bytes inside of
[   28.419962]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.420701] 
[   28.420825] The buggy address belongs to the physical page:
[   28.421038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.421751] flags: 0x200000000000000(node=0|zone=2)
[   28.422203] page_type: f5(slab)
[   28.422518] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.422882] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.423226] page dumped because: kasan: bad access detected
[   28.423453] 
[   28.423552] Memory state around the buggy address:
[   28.423783]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.424322]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.424876] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.425431]                                               ^
[   28.425752]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.426000]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.426487] ==================================================================
[   28.237794] ==================================================================
[   28.238374] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   28.239121] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.239716] 
[   28.239918] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.240026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.240053] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.240102] Call Trace:
[   28.240136]  <TASK>
[   28.240212]  dump_stack_lvl+0x73/0xb0
[   28.240285]  print_report+0xd1/0x650
[   28.240337]  ? __virt_addr_valid+0x1db/0x2d0
[   28.240395]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   28.240467]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.240528]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   28.240587]  kasan_report+0x141/0x180
[   28.240640]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   28.240713]  kasan_check_range+0x10c/0x1c0
[   28.240770]  __kasan_check_write+0x18/0x20
[   28.240824]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   28.240887]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.240944]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.240991]  ? trace_hardirqs_on+0x37/0xe0
[   28.241036]  ? kasan_bitops_generic+0x92/0x1c0
[   28.241085]  kasan_bitops_generic+0x121/0x1c0
[   28.241129]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.241218]  ? __pfx_read_tsc+0x10/0x10
[   28.241266]  ? ktime_get_ts64+0x86/0x230
[   28.241326]  kunit_try_run_case+0x1a5/0x480
[   28.241387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.241438]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.241502]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.241559]  ? __kthread_parkme+0x82/0x180
[   28.241609]  ? preempt_count_sub+0x50/0x80
[   28.241665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.241719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.241766]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.241808]  kthread+0x337/0x6f0
[   28.241849]  ? trace_preempt_on+0x20/0xc0
[   28.241893]  ? __pfx_kthread+0x10/0x10
[   28.241933]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.241971]  ? calculate_sigpending+0x7b/0xa0
[   28.242016]  ? __pfx_kthread+0x10/0x10
[   28.242073]  ret_from_fork+0x116/0x1d0
[   28.242113]  ? __pfx_kthread+0x10/0x10
[   28.242187]  ret_from_fork_asm+0x1a/0x30
[   28.242254]  </TASK>
[   28.242283] 
[   28.255449] Allocated by task 290:
[   28.256355]  kasan_save_stack+0x45/0x70
[   28.256682]  kasan_save_track+0x18/0x40
[   28.256995]  kasan_save_alloc_info+0x3b/0x50
[   28.257263]  __kasan_kmalloc+0xb7/0xc0
[   28.257562]  __kmalloc_cache_noprof+0x189/0x420
[   28.257805]  kasan_bitops_generic+0x92/0x1c0
[   28.258047]  kunit_try_run_case+0x1a5/0x480
[   28.258298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.258724]  kthread+0x337/0x6f0
[   28.258914]  ret_from_fork+0x116/0x1d0
[   28.259092]  ret_from_fork_asm+0x1a/0x30
[   28.259310] 
[   28.259421] The buggy address belongs to the object at ffff8881022cf740
[   28.259421]  which belongs to the cache kmalloc-16 of size 16
[   28.260327] The buggy address is located 8 bytes inside of
[   28.260327]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.261310] 
[   28.261485] The buggy address belongs to the physical page:
[   28.261798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.262263] flags: 0x200000000000000(node=0|zone=2)
[   28.262627] page_type: f5(slab)
[   28.262909] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.263323] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.263819] page dumped because: kasan: bad access detected
[   28.264256] 
[   28.264428] Memory state around the buggy address:
[   28.264662]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.265056]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.265614] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.266087]                                               ^
[   28.266477]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.266752]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.267006] ==================================================================
[   28.212034] ==================================================================
[   28.212890] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   28.213407] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.213772] 
[   28.213972] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.214094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.214122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.214172] Call Trace:
[   28.214214]  <TASK>
[   28.214254]  dump_stack_lvl+0x73/0xb0
[   28.214351]  print_report+0xd1/0x650
[   28.214402]  ? __virt_addr_valid+0x1db/0x2d0
[   28.214461]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   28.214536]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.214587]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   28.214639]  kasan_report+0x141/0x180
[   28.214685]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   28.214755]  kasan_check_range+0x10c/0x1c0
[   28.214809]  __kasan_check_write+0x18/0x20
[   28.214853]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   28.214908]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.214989]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.215040]  ? trace_hardirqs_on+0x37/0xe0
[   28.215083]  ? kasan_bitops_generic+0x92/0x1c0
[   28.215143]  kasan_bitops_generic+0x121/0x1c0
[   28.215187]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.215260]  ? __pfx_read_tsc+0x10/0x10
[   28.215304]  ? ktime_get_ts64+0x86/0x230
[   28.215358]  kunit_try_run_case+0x1a5/0x480
[   28.215412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.215475]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.215526]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.215565]  ? __kthread_parkme+0x82/0x180
[   28.215594]  ? preempt_count_sub+0x50/0x80
[   28.215619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.215647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.215674]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.215700]  kthread+0x337/0x6f0
[   28.215722]  ? trace_preempt_on+0x20/0xc0
[   28.215747]  ? __pfx_kthread+0x10/0x10
[   28.215769]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.215793]  ? calculate_sigpending+0x7b/0xa0
[   28.215820]  ? __pfx_kthread+0x10/0x10
[   28.215844]  ret_from_fork+0x116/0x1d0
[   28.215865]  ? __pfx_kthread+0x10/0x10
[   28.215888]  ret_from_fork_asm+0x1a/0x30
[   28.215922]  </TASK>
[   28.215936] 
[   28.226381] Allocated by task 290:
[   28.226645]  kasan_save_stack+0x45/0x70
[   28.226906]  kasan_save_track+0x18/0x40
[   28.227090]  kasan_save_alloc_info+0x3b/0x50
[   28.227469]  __kasan_kmalloc+0xb7/0xc0
[   28.227776]  __kmalloc_cache_noprof+0x189/0x420
[   28.228040]  kasan_bitops_generic+0x92/0x1c0
[   28.228365]  kunit_try_run_case+0x1a5/0x480
[   28.228535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.228935]  kthread+0x337/0x6f0
[   28.229236]  ret_from_fork+0x116/0x1d0
[   28.229407]  ret_from_fork_asm+0x1a/0x30
[   28.229607] 
[   28.229765] The buggy address belongs to the object at ffff8881022cf740
[   28.229765]  which belongs to the cache kmalloc-16 of size 16
[   28.230570] The buggy address is located 8 bytes inside of
[   28.230570]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.230964] 
[   28.231078] The buggy address belongs to the physical page:
[   28.231334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.231806] flags: 0x200000000000000(node=0|zone=2)
[   28.232257] page_type: f5(slab)
[   28.232538] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.233122] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.233404] page dumped because: kasan: bad access detected
[   28.233819] 
[   28.233980] Memory state around the buggy address:
[   28.234195]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.234496]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.234998] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.235556]                                               ^
[   28.235780]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.236041]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.236318] ==================================================================