Hay
Date
June 17, 2025, 3:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   24.872987] ==================================================================
[   24.876131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   24.879298]  kasan_report+0xdc/0x128
[   24.881399]  ret_from_fork+0x10/0x20
[   24.884145]  kunit_try_run_case+0x170/0x3f0
[   24.887104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   24.889492]  fff00000c58ac180: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.890070] ==================================================================

[   23.325748] ==================================================================
[   23.327598] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   23.328189] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281
[   23.328830] 
[   23.329091] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.329194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.329225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.329274] Call Trace:
[   23.330481]  <TASK>
[   23.330536]  dump_stack_lvl+0x73/0xb0
[   23.331935]  print_report+0xd1/0x650
[   23.332149]  ? __virt_addr_valid+0x1db/0x2d0
[   23.332223]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   23.332370]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.332453]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   23.332520]  kasan_report+0x141/0x180
[   23.332575]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   23.332640]  kasan_check_range+0x10c/0x1c0
[   23.332688]  __kasan_check_write+0x18/0x20
[   23.332737]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   23.332794]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   23.332881]  kasan_bitops_generic+0x121/0x1c0
[   23.332935]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.333550]  ? __pfx_read_tsc+0x10/0x10
[   23.333617]  ? ktime_get_ts64+0x86/0x230
[   23.333693]  kunit_try_run_case+0x1a5/0x480
[   23.333768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.333841]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.333910]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.333993]  ? __kthread_parkme+0x82/0x180
[   23.334061]  ? preempt_count_sub+0x50/0x80
[   23.334134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.334211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.334283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.334382]  kthread+0x337/0x6f0
[   23.334448]  ? trace_preempt_on+0x20/0xc0
[   23.334522]  ? __pfx_kthread+0x10/0x10
[   23.334581]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.334651]  ? calculate_sigpending+0x7b/0xa0
[   23.334723]  ? __pfx_kthread+0x10/0x10
[   23.334786]  ret_from_fork+0x41/0x80
[   23.334849]  ? __pfx_kthread+0x10/0x10
[   23.334902]  ret_from_fork_asm+0x1a/0x30
[   23.334984]  </TASK>
[   23.335015] 
[   23.356809] Allocated by task 281:
[   23.357267]  kasan_save_stack+0x45/0x70
[   23.357964]  kasan_save_track+0x18/0x40
[   23.358480]  kasan_save_alloc_info+0x3b/0x50
[   23.358811]  __kasan_kmalloc+0xb7/0xc0
[   23.359177]  __kmalloc_cache_noprof+0x189/0x420
[   23.359785]  kasan_bitops_generic+0x92/0x1c0
[   23.360572]  kunit_try_run_case+0x1a5/0x480
[   23.361045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.361605]  kthread+0x337/0x6f0
[   23.361954]  ret_from_fork+0x41/0x80
[   23.362572]  ret_from_fork_asm+0x1a/0x30
[   23.362924] 
[   23.363869] The buggy address belongs to the object at ffff8881026cd0c0
[   23.363869]  which belongs to the cache kmalloc-16 of size 16
[   23.365634] The buggy address is located 8 bytes inside of
[   23.365634]  allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9)
[   23.366487] 
[   23.366717] The buggy address belongs to the physical page:
[   23.367156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd
[   23.368697] flags: 0x200000000000000(node=0|zone=2)
[   23.369032] page_type: f5(slab)
[   23.369728] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.370868] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.371674] page dumped because: kasan: bad access detected
[   23.372838] 
[   23.373019] Memory state around the buggy address:
[   23.373745]  ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.374764]  ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.375663] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.376246]                                               ^
[   23.376759]  ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.377549]  ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.378793] ==================================================================
[   23.227363] ==================================================================
[   23.229253] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   23.230020] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281
[   23.230596] 
[   23.230880] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.231018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.231060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.231122] Call Trace:
[   23.231166]  <TASK>
[   23.231221]  dump_stack_lvl+0x73/0xb0
[   23.231424]  print_report+0xd1/0x650
[   23.231512]  ? __virt_addr_valid+0x1db/0x2d0
[   23.231585]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   23.231663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.231743]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   23.231824]  kasan_report+0x141/0x180
[   23.231961]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   23.232045]  kasan_check_range+0x10c/0x1c0
[   23.232120]  __kasan_check_write+0x18/0x20
[   23.232194]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   23.232333]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   23.232437]  kasan_bitops_generic+0x121/0x1c0
[   23.232509]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.232585]  ? __pfx_read_tsc+0x10/0x10
[   23.232659]  ? ktime_get_ts64+0x86/0x230
[   23.232719]  kunit_try_run_case+0x1a5/0x480
[   23.232761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.232796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.232833]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.232867]  ? __kthread_parkme+0x82/0x180
[   23.232900]  ? preempt_count_sub+0x50/0x80
[   23.232935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.233005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.233090]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.233135]  kthread+0x337/0x6f0
[   23.233163]  ? trace_preempt_on+0x20/0xc0
[   23.233202]  ? __pfx_kthread+0x10/0x10
[   23.233228]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.233261]  ? calculate_sigpending+0x7b/0xa0
[   23.233321]  ? __pfx_kthread+0x10/0x10
[   23.233351]  ret_from_fork+0x41/0x80
[   23.233387]  ? __pfx_kthread+0x10/0x10
[   23.233416]  ret_from_fork_asm+0x1a/0x30
[   23.233460]  </TASK>
[   23.233476] 
[   23.252153] Allocated by task 281:
[   23.252675]  kasan_save_stack+0x45/0x70
[   23.253387]  kasan_save_track+0x18/0x40
[   23.253835]  kasan_save_alloc_info+0x3b/0x50
[   23.254540]  __kasan_kmalloc+0xb7/0xc0
[   23.254872]  __kmalloc_cache_noprof+0x189/0x420
[   23.255406]  kasan_bitops_generic+0x92/0x1c0
[   23.255964]  kunit_try_run_case+0x1a5/0x480
[   23.256894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.257547]  kthread+0x337/0x6f0
[   23.257834]  ret_from_fork+0x41/0x80
[   23.258230]  ret_from_fork_asm+0x1a/0x30
[   23.258727] 
[   23.259087] The buggy address belongs to the object at ffff8881026cd0c0
[   23.259087]  which belongs to the cache kmalloc-16 of size 16
[   23.260469] The buggy address is located 8 bytes inside of
[   23.260469]  allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9)
[   23.261224] 
[   23.261627] The buggy address belongs to the physical page:
[   23.262344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd
[   23.263334] flags: 0x200000000000000(node=0|zone=2)
[   23.263717] page_type: f5(slab)
[   23.264030] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.264777] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.265814] page dumped because: kasan: bad access detected
[   23.266181] 
[   23.266378] Memory state around the buggy address:
[   23.266939]  ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.267745]  ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.268876] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.269765]                                               ^
[   23.270485]  ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.271248]  ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.271704] ==================================================================
[   23.175890] ==================================================================
[   23.177492] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   23.178198] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281
[   23.179681] 
[   23.180370] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.180444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.180463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.180491] Call Trace:
[   23.180515]  <TASK>
[   23.180540]  dump_stack_lvl+0x73/0xb0
[   23.180580]  print_report+0xd1/0x650
[   23.180616]  ? __virt_addr_valid+0x1db/0x2d0
[   23.180649]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   23.180686]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.180719]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   23.180753]  kasan_report+0x141/0x180
[   23.180786]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   23.180826]  kasan_check_range+0x10c/0x1c0
[   23.180855]  __kasan_check_write+0x18/0x20
[   23.180884]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   23.180918]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   23.180963]  kasan_bitops_generic+0x121/0x1c0
[   23.180993]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.181024]  ? __pfx_read_tsc+0x10/0x10
[   23.181056]  ? ktime_get_ts64+0x86/0x230
[   23.181093]  kunit_try_run_case+0x1a5/0x480
[   23.181130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.181163]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.181197]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.181230]  ? __kthread_parkme+0x82/0x180
[   23.181262]  ? preempt_count_sub+0x50/0x80
[   23.181429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.181483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.181521]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.181558]  kthread+0x337/0x6f0
[   23.181583]  ? trace_preempt_on+0x20/0xc0
[   23.181619]  ? __pfx_kthread+0x10/0x10
[   23.181645]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.181677]  ? calculate_sigpending+0x7b/0xa0
[   23.181707]  ? __pfx_kthread+0x10/0x10
[   23.181733]  ret_from_fork+0x41/0x80
[   23.181766]  ? __pfx_kthread+0x10/0x10
[   23.181792]  ret_from_fork_asm+0x1a/0x30
[   23.181836]  </TASK>
[   23.181853] 
[   23.204964] Allocated by task 281:
[   23.205780]  kasan_save_stack+0x45/0x70
[   23.206401]  kasan_save_track+0x18/0x40
[   23.206948]  kasan_save_alloc_info+0x3b/0x50
[   23.207686]  __kasan_kmalloc+0xb7/0xc0
[   23.208609]  __kmalloc_cache_noprof+0x189/0x420
[   23.209028]  kasan_bitops_generic+0x92/0x1c0
[   23.210034]  kunit_try_run_case+0x1a5/0x480
[   23.210514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.210939]  kthread+0x337/0x6f0
[   23.211591]  ret_from_fork+0x41/0x80
[   23.211915]  ret_from_fork_asm+0x1a/0x30
[   23.212748] 
[   23.213055] The buggy address belongs to the object at ffff8881026cd0c0
[   23.213055]  which belongs to the cache kmalloc-16 of size 16
[   23.214236] The buggy address is located 8 bytes inside of
[   23.214236]  allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9)
[   23.215487] 
[   23.215723] The buggy address belongs to the physical page:
[   23.216242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd
[   23.217314] flags: 0x200000000000000(node=0|zone=2)
[   23.217660] page_type: f5(slab)
[   23.218254] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.219180] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.219726] page dumped because: kasan: bad access detected
[   23.220801] 
[   23.221029] Memory state around the buggy address:
[   23.221609]  ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.222151]  ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.222887] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.223579]                                               ^
[   23.224549]  ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.225442]  ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.226015] ==================================================================
[   23.273687] ==================================================================
[   23.274428] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   23.275311] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281
[   23.276439] 
[   23.276694] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.276870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.276911] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.277253] Call Trace:
[   23.277329]  <TASK>
[   23.277384]  dump_stack_lvl+0x73/0xb0
[   23.277472]  print_report+0xd1/0x650
[   23.277662]  ? __virt_addr_valid+0x1db/0x2d0
[   23.277829]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   23.277930]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.278032]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   23.278214]  kasan_report+0x141/0x180
[   23.278257]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   23.278338]  kasan_check_range+0x10c/0x1c0
[   23.278414]  __kasan_check_write+0x18/0x20
[   23.278489]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   23.278569]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   23.278689]  kasan_bitops_generic+0x121/0x1c0
[   23.278792]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.278867]  ? __pfx_read_tsc+0x10/0x10
[   23.278939]  ? ktime_get_ts64+0x86/0x230
[   23.279020]  kunit_try_run_case+0x1a5/0x480
[   23.279112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.279156]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.279195]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.279231]  ? __kthread_parkme+0x82/0x180
[   23.279264]  ? preempt_count_sub+0x50/0x80
[   23.279326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.279367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.279402]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.279437]  kthread+0x337/0x6f0
[   23.279461]  ? trace_preempt_on+0x20/0xc0
[   23.279496]  ? __pfx_kthread+0x10/0x10
[   23.279521]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.279553]  ? calculate_sigpending+0x7b/0xa0
[   23.279583]  ? __pfx_kthread+0x10/0x10
[   23.279607]  ret_from_fork+0x41/0x80
[   23.279639]  ? __pfx_kthread+0x10/0x10
[   23.279664]  ret_from_fork_asm+0x1a/0x30
[   23.279708]  </TASK>
[   23.279725] 
[   23.302174] Allocated by task 281:
[   23.302589]  kasan_save_stack+0x45/0x70
[   23.303330]  kasan_save_track+0x18/0x40
[   23.303862]  kasan_save_alloc_info+0x3b/0x50
[   23.304709]  __kasan_kmalloc+0xb7/0xc0
[   23.305052]  __kmalloc_cache_noprof+0x189/0x420
[   23.305566]  kasan_bitops_generic+0x92/0x1c0
[   23.306015]  kunit_try_run_case+0x1a5/0x480
[   23.306574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.307393]  kthread+0x337/0x6f0
[   23.307934]  ret_from_fork+0x41/0x80
[   23.308718]  ret_from_fork_asm+0x1a/0x30
[   23.309432] 
[   23.309620] The buggy address belongs to the object at ffff8881026cd0c0
[   23.309620]  which belongs to the cache kmalloc-16 of size 16
[   23.310923] The buggy address is located 8 bytes inside of
[   23.310923]  allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9)
[   23.312674] 
[   23.312994] The buggy address belongs to the physical page:
[   23.313618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd
[   23.314407] flags: 0x200000000000000(node=0|zone=2)
[   23.314871] page_type: f5(slab)
[   23.315336] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.316101] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.317505] page dumped because: kasan: bad access detected
[   23.318667] 
[   23.319124] Memory state around the buggy address:
[   23.319574]  ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.319825]  ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.320611] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.322171]                                               ^
[   23.322727]  ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.323626]  ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.324838] ==================================================================
[   23.426489] ==================================================================
[   23.427336] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   23.428174] Read of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281
[   23.429238] 
[   23.429482] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.429601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.429636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.429694] Call Trace:
[   23.429744]  <TASK>
[   23.429794]  dump_stack_lvl+0x73/0xb0
[   23.429838]  print_report+0xd1/0x650
[   23.429875]  ? __virt_addr_valid+0x1db/0x2d0
[   23.429910]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   23.429972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.430054]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   23.430977]  kasan_report+0x141/0x180
[   23.431075]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   23.431171]  __asan_report_load8_noabort+0x18/0x20
[   23.431245]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   23.431345]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   23.431447]  kasan_bitops_generic+0x121/0x1c0
[   23.431517]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.431587]  ? __pfx_read_tsc+0x10/0x10
[   23.431658]  ? ktime_get_ts64+0x86/0x230
[   23.431736]  kunit_try_run_case+0x1a5/0x480
[   23.431818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.431902]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.431987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.432108]  ? __kthread_parkme+0x82/0x180
[   23.432147]  ? preempt_count_sub+0x50/0x80
[   23.432187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.432226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.432264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.432324]  kthread+0x337/0x6f0
[   23.432357]  ? trace_preempt_on+0x20/0xc0
[   23.432396]  ? __pfx_kthread+0x10/0x10
[   23.432423]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.432455]  ? calculate_sigpending+0x7b/0xa0
[   23.432489]  ? __pfx_kthread+0x10/0x10
[   23.432518]  ret_from_fork+0x41/0x80
[   23.432552]  ? __pfx_kthread+0x10/0x10
[   23.432580]  ret_from_fork_asm+0x1a/0x30
[   23.432627]  </TASK>
[   23.432642] 
[   23.455375] Allocated by task 281:
[   23.455823]  kasan_save_stack+0x45/0x70
[   23.456432]  kasan_save_track+0x18/0x40
[   23.456853]  kasan_save_alloc_info+0x3b/0x50
[   23.457237]  __kasan_kmalloc+0xb7/0xc0
[   23.457612]  __kmalloc_cache_noprof+0x189/0x420
[   23.458018]  kasan_bitops_generic+0x92/0x1c0
[   23.458553]  kunit_try_run_case+0x1a5/0x480
[   23.458993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.459428]  kthread+0x337/0x6f0
[   23.459936]  ret_from_fork+0x41/0x80
[   23.460510]  ret_from_fork_asm+0x1a/0x30
[   23.460918] 
[   23.461493] The buggy address belongs to the object at ffff8881026cd0c0
[   23.461493]  which belongs to the cache kmalloc-16 of size 16
[   23.462479] The buggy address is located 8 bytes inside of
[   23.462479]  allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9)
[   23.463937] 
[   23.464254] The buggy address belongs to the physical page:
[   23.464884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd
[   23.465721] flags: 0x200000000000000(node=0|zone=2)
[   23.466338] page_type: f5(slab)
[   23.466735] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.467660] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.468191] page dumped because: kasan: bad access detected
[   23.468818] 
[   23.469338] Memory state around the buggy address:
[   23.470162]  ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.470705]  ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.471564] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.472354]                                               ^
[   23.472931]  ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.473538]  ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.474283] ==================================================================
[   23.379856] ==================================================================
[   23.380539] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   23.381370] Read of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281
[   23.382127] 
[   23.382381] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.382527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.382569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.382686] Call Trace:
[   23.382738]  <TASK>
[   23.382789]  dump_stack_lvl+0x73/0xb0
[   23.382868]  print_report+0xd1/0x650
[   23.382981]  ? __virt_addr_valid+0x1db/0x2d0
[   23.383106]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   23.383246]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.383349]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   23.383493]  kasan_report+0x141/0x180
[   23.383576]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   23.383669]  kasan_check_range+0x10c/0x1c0
[   23.383732]  __kasan_check_read+0x15/0x20
[   23.383767]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   23.383804]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   23.383868]  kasan_bitops_generic+0x121/0x1c0
[   23.384000]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.384125]  ? __pfx_read_tsc+0x10/0x10
[   23.384251]  ? ktime_get_ts64+0x86/0x230
[   23.384359]  kunit_try_run_case+0x1a5/0x480
[   23.384450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.384520]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.384653]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.384726]  ? __kthread_parkme+0x82/0x180
[   23.384765]  ? preempt_count_sub+0x50/0x80
[   23.384802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.384838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.384873]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.384908]  kthread+0x337/0x6f0
[   23.384934]  ? trace_preempt_on+0x20/0xc0
[   23.385026]  ? __pfx_kthread+0x10/0x10
[   23.385099]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.385173]  ? calculate_sigpending+0x7b/0xa0
[   23.385247]  ? __pfx_kthread+0x10/0x10
[   23.385331]  ret_from_fork+0x41/0x80
[   23.385427]  ? __pfx_kthread+0x10/0x10
[   23.385535]  ret_from_fork_asm+0x1a/0x30
[   23.385587]  </TASK>
[   23.385603] 
[   23.404015] Allocated by task 281:
[   23.404481]  kasan_save_stack+0x45/0x70
[   23.404917]  kasan_save_track+0x18/0x40
[   23.405685]  kasan_save_alloc_info+0x3b/0x50
[   23.406492]  __kasan_kmalloc+0xb7/0xc0
[   23.406868]  __kmalloc_cache_noprof+0x189/0x420
[   23.407815]  kasan_bitops_generic+0x92/0x1c0
[   23.408702]  kunit_try_run_case+0x1a5/0x480
[   23.410362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.411011]  kthread+0x337/0x6f0
[   23.411397]  ret_from_fork+0x41/0x80
[   23.411912]  ret_from_fork_asm+0x1a/0x30
[   23.412795] 
[   23.413188] The buggy address belongs to the object at ffff8881026cd0c0
[   23.413188]  which belongs to the cache kmalloc-16 of size 16
[   23.414752] The buggy address is located 8 bytes inside of
[   23.414752]  allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9)
[   23.416205] 
[   23.416464] The buggy address belongs to the physical page:
[   23.416969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd
[   23.417667] flags: 0x200000000000000(node=0|zone=2)
[   23.418155] page_type: f5(slab)
[   23.418598] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.419338] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.420212] page dumped because: kasan: bad access detected
[   23.420815] 
[   23.421162] Memory state around the buggy address:
[   23.421680]  ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.422310]  ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.422911] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.423562]                                               ^
[   23.424186]  ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.424757]  ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.425415] ==================================================================
[   23.080864] ==================================================================
[   23.081866] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   23.082855] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281
[   23.083720] 
[   23.084334] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.084450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.084490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.084546] Call Trace:
[   23.084603]  <TASK>
[   23.084659]  dump_stack_lvl+0x73/0xb0
[   23.084751]  print_report+0xd1/0x650
[   23.084834]  ? __virt_addr_valid+0x1db/0x2d0
[   23.084910]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   23.085462]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.085547]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   23.085629]  kasan_report+0x141/0x180
[   23.085708]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   23.085790]  kasan_check_range+0x10c/0x1c0
[   23.085827]  __kasan_check_write+0x18/0x20
[   23.085861]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   23.085901]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   23.085973]  kasan_bitops_generic+0x121/0x1c0
[   23.086043]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.086104]  ? __pfx_read_tsc+0x10/0x10
[   23.086140]  ? ktime_get_ts64+0x86/0x230
[   23.086181]  kunit_try_run_case+0x1a5/0x480
[   23.086222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.086257]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.086323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.086421]  ? __kthread_parkme+0x82/0x180
[   23.086498]  ? preempt_count_sub+0x50/0x80
[   23.086559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.086599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.086636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.086672]  kthread+0x337/0x6f0
[   23.086698]  ? trace_preempt_on+0x20/0xc0
[   23.086736]  ? __pfx_kthread+0x10/0x10
[   23.086763]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.086796]  ? calculate_sigpending+0x7b/0xa0
[   23.086830]  ? __pfx_kthread+0x10/0x10
[   23.086858]  ret_from_fork+0x41/0x80
[   23.086893]  ? __pfx_kthread+0x10/0x10
[   23.086922]  ret_from_fork_asm+0x1a/0x30
[   23.087018]  </TASK>
[   23.087063] 
[   23.107476] Allocated by task 281:
[   23.107769]  kasan_save_stack+0x45/0x70
[   23.108602]  kasan_save_track+0x18/0x40
[   23.108893]  kasan_save_alloc_info+0x3b/0x50
[   23.109519]  __kasan_kmalloc+0xb7/0xc0
[   23.109922]  __kmalloc_cache_noprof+0x189/0x420
[   23.110500]  kasan_bitops_generic+0x92/0x1c0
[   23.110948]  kunit_try_run_case+0x1a5/0x480
[   23.112095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.112564]  kthread+0x337/0x6f0
[   23.112908]  ret_from_fork+0x41/0x80
[   23.113392]  ret_from_fork_asm+0x1a/0x30
[   23.113841] 
[   23.114182] The buggy address belongs to the object at ffff8881026cd0c0
[   23.114182]  which belongs to the cache kmalloc-16 of size 16
[   23.115332] The buggy address is located 8 bytes inside of
[   23.115332]  allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9)
[   23.116189] 
[   23.116599] The buggy address belongs to the physical page:
[   23.117304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd
[   23.117900] flags: 0x200000000000000(node=0|zone=2)
[   23.118370] page_type: f5(slab)
[   23.118876] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.119976] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.120802] page dumped because: kasan: bad access detected
[   23.121624] 
[   23.121872] Memory state around the buggy address:
[   23.122443]  ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.123096]  ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.124494] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.125097]                                               ^
[   23.125594]  ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.126221]  ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.126849] ==================================================================
[   23.128597] ==================================================================
[   23.129122] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   23.129695] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281
[   23.130506] 
[   23.130961] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.131376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.131413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.131476] Call Trace:
[   23.131527]  <TASK>
[   23.131577]  dump_stack_lvl+0x73/0xb0
[   23.131664]  print_report+0xd1/0x650
[   23.131746]  ? __virt_addr_valid+0x1db/0x2d0
[   23.131820]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   23.131907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.132088]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   23.132176]  kasan_report+0x141/0x180
[   23.132261]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   23.132370]  kasan_check_range+0x10c/0x1c0
[   23.132446]  __kasan_check_write+0x18/0x20
[   23.132521]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   23.132602]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   23.132707]  kasan_bitops_generic+0x121/0x1c0
[   23.132783]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.132833]  ? __pfx_read_tsc+0x10/0x10
[   23.132909]  ? ktime_get_ts64+0x86/0x230
[   23.133091]  kunit_try_run_case+0x1a5/0x480
[   23.133188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.133264]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.133367]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.133447]  ? __kthread_parkme+0x82/0x180
[   23.133525]  ? preempt_count_sub+0x50/0x80
[   23.133615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.133695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.133763]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.133805]  kthread+0x337/0x6f0
[   23.133833]  ? trace_preempt_on+0x20/0xc0
[   23.133873]  ? __pfx_kthread+0x10/0x10
[   23.133901]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.133935]  ? calculate_sigpending+0x7b/0xa0
[   23.134079]  ? __pfx_kthread+0x10/0x10
[   23.134115]  ret_from_fork+0x41/0x80
[   23.134151]  ? __pfx_kthread+0x10/0x10
[   23.134182]  ret_from_fork_asm+0x1a/0x30
[   23.134229]  </TASK>
[   23.134245] 
[   23.152083] Allocated by task 281:
[   23.152451]  kasan_save_stack+0x45/0x70
[   23.153804]  kasan_save_track+0x18/0x40
[   23.154580]  kasan_save_alloc_info+0x3b/0x50
[   23.155106]  __kasan_kmalloc+0xb7/0xc0
[   23.155543]  __kmalloc_cache_noprof+0x189/0x420
[   23.155963]  kasan_bitops_generic+0x92/0x1c0
[   23.156782]  kunit_try_run_case+0x1a5/0x480
[   23.157397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.157873]  kthread+0x337/0x6f0
[   23.158551]  ret_from_fork+0x41/0x80
[   23.158957]  ret_from_fork_asm+0x1a/0x30
[   23.159333] 
[   23.159523] The buggy address belongs to the object at ffff8881026cd0c0
[   23.159523]  which belongs to the cache kmalloc-16 of size 16
[   23.161273] The buggy address is located 8 bytes inside of
[   23.161273]  allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9)
[   23.162499] 
[   23.162687] The buggy address belongs to the physical page:
[   23.163076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd
[   23.163761] flags: 0x200000000000000(node=0|zone=2)
[   23.164752] page_type: f5(slab)
[   23.165283] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.165817] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.166607] page dumped because: kasan: bad access detected
[   23.167229] 
[   23.168099] Memory state around the buggy address:
[   23.168543]  ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.169133]  ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.171377] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.172257]                                               ^
[   23.172722]  ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.173569]  ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.174885] ==================================================================
[   23.022753] ==================================================================
[   23.023755] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   23.024666] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281
[   23.025183] 
[   23.026138] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.026270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.026328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.026389] Call Trace:
[   23.026431]  <TASK>
[   23.026469]  dump_stack_lvl+0x73/0xb0
[   23.026511]  print_report+0xd1/0x650
[   23.026550]  ? __virt_addr_valid+0x1db/0x2d0
[   23.026585]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   23.026621]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.026658]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   23.026695]  kasan_report+0x141/0x180
[   23.026730]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   23.026774]  kasan_check_range+0x10c/0x1c0
[   23.026805]  __kasan_check_write+0x18/0x20
[   23.026835]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   23.026871]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   23.026917]  kasan_bitops_generic+0x121/0x1c0
[   23.026958]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.027037]  ? __pfx_read_tsc+0x10/0x10
[   23.027148]  ? ktime_get_ts64+0x86/0x230
[   23.027203]  kunit_try_run_case+0x1a5/0x480
[   23.027244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.027279]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.027345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.027383]  ? __kthread_parkme+0x82/0x180
[   23.027418]  ? preempt_count_sub+0x50/0x80
[   23.027456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.027493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.027528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.027564]  kthread+0x337/0x6f0
[   23.027590]  ? trace_preempt_on+0x20/0xc0
[   23.027627]  ? __pfx_kthread+0x10/0x10
[   23.027654]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.027687]  ? calculate_sigpending+0x7b/0xa0
[   23.027720]  ? __pfx_kthread+0x10/0x10
[   23.027748]  ret_from_fork+0x41/0x80
[   23.027781]  ? __pfx_kthread+0x10/0x10
[   23.027808]  ret_from_fork_asm+0x1a/0x30
[   23.027853]  </TASK>
[   23.027870] 
[   23.052146] Allocated by task 281:
[   23.052585]  kasan_save_stack+0x45/0x70
[   23.052974]  kasan_save_track+0x18/0x40
[   23.054602]  kasan_save_alloc_info+0x3b/0x50
[   23.054952]  __kasan_kmalloc+0xb7/0xc0
[   23.055635]  __kmalloc_cache_noprof+0x189/0x420
[   23.056008]  kasan_bitops_generic+0x92/0x1c0
[   23.056819]  kunit_try_run_case+0x1a5/0x480
[   23.057587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.058011]  kthread+0x337/0x6f0
[   23.058814]  ret_from_fork+0x41/0x80
[   23.059779]  ret_from_fork_asm+0x1a/0x30
[   23.060177] 
[   23.061487] The buggy address belongs to the object at ffff8881026cd0c0
[   23.061487]  which belongs to the cache kmalloc-16 of size 16
[   23.062654] The buggy address is located 8 bytes inside of
[   23.062654]  allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9)
[   23.063806] 
[   23.063969] The buggy address belongs to the physical page:
[   23.064261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd
[   23.066707] flags: 0x200000000000000(node=0|zone=2)
[   23.067631] page_type: f5(slab)
[   23.067913] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.070959] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.071659] page dumped because: kasan: bad access detected
[   23.072086] 
[   23.072230] Memory state around the buggy address:
[   23.074532]  ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.074917]  ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.076567] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.077541]                                               ^
[   23.077998]  ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.078881]  ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.079600] ==================================================================