Hay
Date
June 23, 2025, 1:39 p.m.

Environment
qemu-arm64
qemu-x86_64

[   28.181735] ==================================================================
[   28.182061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   28.182419] Write of size 8 at addr fff00000c5e9de08 by task kunit_try_catch/263
[   28.182600] 
[   28.182700] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.183214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.183679] Hardware name: linux,dummy-virt (DT)
[   28.183852] Call trace:
[   28.183942]  show_stack+0x20/0x38 (C)
[   28.184562]  dump_stack_lvl+0x8c/0xd0
[   28.185134]  print_report+0x118/0x608
[   28.185271]  kasan_report+0xdc/0x128
[   28.185836]  kasan_check_range+0x100/0x1a8
[   28.186048]  __kasan_check_write+0x20/0x30
[   28.186198]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   28.186493]  kasan_bitops_generic+0x110/0x1c8
[   28.186647]  kunit_try_run_case+0x170/0x3f0
[   28.186791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.187024]  kthread+0x328/0x630
[   28.187153]  ret_from_fork+0x10/0x20
[   28.187268] 
[   28.187321] Allocated by task 263:
[   28.187536]  kasan_save_stack+0x3c/0x68
[   28.187637]  kasan_save_track+0x20/0x40
[   28.187887]  kasan_save_alloc_info+0x40/0x58
[   28.188159]  __kasan_kmalloc+0xd4/0xd8
[   28.188585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.188818]  kasan_bitops_generic+0xa0/0x1c8
[   28.188947]  kunit_try_run_case+0x170/0x3f0
[   28.189773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.190034]  kthread+0x328/0x630
[   28.190163]  ret_from_fork+0x10/0x20
[   28.190463] 
[   28.190545] The buggy address belongs to the object at fff00000c5e9de00
[   28.190545]  which belongs to the cache kmalloc-16 of size 16
[   28.190747] The buggy address is located 8 bytes inside of
[   28.190747]  allocated 9-byte region [fff00000c5e9de00, fff00000c5e9de09)
[   28.190899] 
[   28.190957] The buggy address belongs to the physical page:
[   28.191999] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.196763] 
[   28.196964] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.197696]  dump_stack_lvl+0x8c/0xd0
[   28.200372]  kasan_save_track+0x20/0x40
[   28.202324] The buggy address is located 8 bytes inside of
[   28.202324]  allocated 9-byte region [fff00000c5e9de00, fff00000c5e9de09)
[   28.204471] page dumped because: kasan: bad access detected
[   28.205623] >fff00000c5e9de00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.210076]  print_report+0x118/0x608
[   28.213020]  __kasan_kmalloc+0xd4/0xd8
[   28.214772] 
[   28.216241] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.217416] >fff00000c5e9de00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.218327] ==================================================================

[   20.314502] ==================================================================
[   20.315720] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   20.316660] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.318554] 
[   20.319179] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.319326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.319387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.319466] Call Trace:
[   20.319507]  <TASK>
[   20.319554]  dump_stack_lvl+0x73/0xb0
[   20.319670]  print_report+0xd1/0x650
[   20.319754]  ? __virt_addr_valid+0x1db/0x2d0
[   20.319792]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   20.319824]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.319859]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   20.319892]  kasan_report+0x141/0x180
[   20.319927]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   20.319966]  kasan_check_range+0x10c/0x1c0
[   20.319996]  __kasan_check_write+0x18/0x20
[   20.320024]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   20.320056]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.320089]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.320120]  ? trace_hardirqs_on+0x37/0xe0
[   20.320155]  ? kasan_bitops_generic+0x92/0x1c0
[   20.320191]  kasan_bitops_generic+0x116/0x1c0
[   20.320229]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.320282]  ? __pfx_read_tsc+0x10/0x10
[   20.320315]  ? ktime_get_ts64+0x86/0x230
[   20.320353]  kunit_try_run_case+0x1a5/0x480
[   20.320389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.320422]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.320457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.320492]  ? __kthread_parkme+0x82/0x180
[   20.320525]  ? preempt_count_sub+0x50/0x80
[   20.320564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.320618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.320701]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.320785]  kthread+0x337/0x6f0
[   20.320855]  ? trace_preempt_on+0x20/0xc0
[   20.320915]  ? __pfx_kthread+0x10/0x10
[   20.320942]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.320974]  ? calculate_sigpending+0x7b/0xa0
[   20.321007]  ? __pfx_kthread+0x10/0x10
[   20.321032]  ret_from_fork+0x41/0x80
[   20.321063]  ? __pfx_kthread+0x10/0x10
[   20.321090]  ret_from_fork_asm+0x1a/0x30
[   20.321133]  </TASK>
[   20.321148] 
[   20.341557] Allocated by task 282:
[   20.342333]  kasan_save_stack+0x45/0x70
[   20.342769]  kasan_save_track+0x18/0x40
[   20.343194]  kasan_save_alloc_info+0x3b/0x50
[   20.344039]  __kasan_kmalloc+0xb7/0xc0
[   20.344498]  __kmalloc_cache_noprof+0x189/0x420
[   20.345401]  kasan_bitops_generic+0x92/0x1c0
[   20.346117]  kunit_try_run_case+0x1a5/0x480
[   20.346594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.347238]  kthread+0x337/0x6f0
[   20.347583]  ret_from_fork+0x41/0x80
[   20.348371]  ret_from_fork_asm+0x1a/0x30
[   20.348911] 
[   20.349124] The buggy address belongs to the object at ffff8881025ebc60
[   20.349124]  which belongs to the cache kmalloc-16 of size 16
[   20.350068] The buggy address is located 8 bytes inside of
[   20.350068]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.351191] 
[   20.351581] The buggy address belongs to the physical page:
[   20.352407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.353200] flags: 0x200000000000000(node=0|zone=2)
[   20.353781] page_type: f5(slab)
[   20.354212] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.355008] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.356435] page dumped because: kasan: bad access detected
[   20.356913] 
[   20.357257] Memory state around the buggy address:
[   20.357838]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   20.358407]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.359176] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.359760]                                                           ^
[   20.360468]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.361581]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.362565] ==================================================================
[   20.364082] ==================================================================
[   20.364579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   20.365181] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.365762] 
[   20.365988] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.366166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.366208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.366263] Call Trace:
[   20.366297]  <TASK>
[   20.366331]  dump_stack_lvl+0x73/0xb0
[   20.366394]  print_report+0xd1/0x650
[   20.366454]  ? __virt_addr_valid+0x1db/0x2d0
[   20.366513]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   20.366575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.366661]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   20.366903]  kasan_report+0x141/0x180
[   20.366991]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   20.367078]  kasan_check_range+0x10c/0x1c0
[   20.367158]  __kasan_check_write+0x18/0x20
[   20.367409]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   20.367496]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.367579]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.367669]  ? trace_hardirqs_on+0x37/0xe0
[   20.367745]  ? kasan_bitops_generic+0x92/0x1c0
[   20.367871]  kasan_bitops_generic+0x116/0x1c0
[   20.367946]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.368020]  ? __pfx_read_tsc+0x10/0x10
[   20.368086]  ? ktime_get_ts64+0x86/0x230
[   20.368173]  kunit_try_run_case+0x1a5/0x480
[   20.368258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.368324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.368364]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.368402]  ? __kthread_parkme+0x82/0x180
[   20.368434]  ? preempt_count_sub+0x50/0x80
[   20.368470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.368504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.368538]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.368572]  kthread+0x337/0x6f0
[   20.368596]  ? trace_preempt_on+0x20/0xc0
[   20.368691]  ? __pfx_kthread+0x10/0x10
[   20.368750]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.368784]  ? calculate_sigpending+0x7b/0xa0
[   20.368816]  ? __pfx_kthread+0x10/0x10
[   20.368842]  ret_from_fork+0x41/0x80
[   20.368874]  ? __pfx_kthread+0x10/0x10
[   20.368899]  ret_from_fork_asm+0x1a/0x30
[   20.368941]  </TASK>
[   20.368954] 
[   20.388572] Allocated by task 282:
[   20.389126]  kasan_save_stack+0x45/0x70
[   20.391196]  kasan_save_track+0x18/0x40
[   20.392172]  kasan_save_alloc_info+0x3b/0x50
[   20.392563]  __kasan_kmalloc+0xb7/0xc0
[   20.393187]  __kmalloc_cache_noprof+0x189/0x420
[   20.394035]  kasan_bitops_generic+0x92/0x1c0
[   20.394828]  kunit_try_run_case+0x1a5/0x480
[   20.395301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.395858]  kthread+0x337/0x6f0
[   20.396217]  ret_from_fork+0x41/0x80
[   20.396598]  ret_from_fork_asm+0x1a/0x30
[   20.396975] 
[   20.397156] The buggy address belongs to the object at ffff8881025ebc60
[   20.397156]  which belongs to the cache kmalloc-16 of size 16
[   20.398348] The buggy address is located 8 bytes inside of
[   20.398348]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.399736] 
[   20.399967] The buggy address belongs to the physical page:
[   20.400822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.402177] flags: 0x200000000000000(node=0|zone=2)
[   20.402575] page_type: f5(slab)
[   20.403798] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.404652] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.405944] page dumped because: kasan: bad access detected
[   20.406516] 
[   20.407053] Memory state around the buggy address:
[   20.407373]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   20.408075]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.408689] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.409454]                                                           ^
[   20.410187]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.411258]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.411788] ==================================================================
[   20.413103] ==================================================================
[   20.413762] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   20.415008] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.415543] 
[   20.415775] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.416001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.416043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.416097] Call Trace:
[   20.416148]  <TASK>
[   20.416197]  dump_stack_lvl+0x73/0xb0
[   20.416275]  print_report+0xd1/0x650
[   20.416352]  ? __virt_addr_valid+0x1db/0x2d0
[   20.416428]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   20.416526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.416726]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   20.416810]  kasan_report+0x141/0x180
[   20.416884]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   20.416966]  kasan_check_range+0x10c/0x1c0
[   20.417034]  __kasan_check_write+0x18/0x20
[   20.417102]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   20.417177]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.417266]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.417342]  ? trace_hardirqs_on+0x37/0xe0
[   20.417418]  ? kasan_bitops_generic+0x92/0x1c0
[   20.417496]  kasan_bitops_generic+0x116/0x1c0
[   20.417567]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.417661]  ? __pfx_read_tsc+0x10/0x10
[   20.417730]  ? ktime_get_ts64+0x86/0x230
[   20.417822]  kunit_try_run_case+0x1a5/0x480
[   20.417905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.417986]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.418066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.418105]  ? __kthread_parkme+0x82/0x180
[   20.418138]  ? preempt_count_sub+0x50/0x80
[   20.418176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.418215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.418279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.418316]  kthread+0x337/0x6f0
[   20.418340]  ? trace_preempt_on+0x20/0xc0
[   20.418372]  ? __pfx_kthread+0x10/0x10
[   20.418397]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.418427]  ? calculate_sigpending+0x7b/0xa0
[   20.418457]  ? __pfx_kthread+0x10/0x10
[   20.418481]  ret_from_fork+0x41/0x80
[   20.418512]  ? __pfx_kthread+0x10/0x10
[   20.418539]  ret_from_fork_asm+0x1a/0x30
[   20.418581]  </TASK>
[   20.418597] 
[   20.439353] Allocated by task 282:
[   20.440019]  kasan_save_stack+0x45/0x70
[   20.440928]  kasan_save_track+0x18/0x40
[   20.441379]  kasan_save_alloc_info+0x3b/0x50
[   20.442039]  __kasan_kmalloc+0xb7/0xc0
[   20.442552]  __kmalloc_cache_noprof+0x189/0x420
[   20.443236]  kasan_bitops_generic+0x92/0x1c0
[   20.443793]  kunit_try_run_case+0x1a5/0x480
[   20.444157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.445124]  kthread+0x337/0x6f0
[   20.445541]  ret_from_fork+0x41/0x80
[   20.446119]  ret_from_fork_asm+0x1a/0x30
[   20.446857] 
[   20.447104] The buggy address belongs to the object at ffff8881025ebc60
[   20.447104]  which belongs to the cache kmalloc-16 of size 16
[   20.447995] The buggy address is located 8 bytes inside of
[   20.447995]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.449021] 
[   20.449652] The buggy address belongs to the physical page:
[   20.450207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.451254] flags: 0x200000000000000(node=0|zone=2)
[   20.451995] page_type: f5(slab)
[   20.452466] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.453549] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.454370] page dumped because: kasan: bad access detected
[   20.455025] 
[   20.455413] Memory state around the buggy address:
[   20.456099]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   20.456864]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.457508] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.458499]                                                           ^
[   20.459104]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.459768]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.460362] ==================================================================
[   20.512715] ==================================================================
[   20.513192] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   20.514155] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.515569] 
[   20.515805] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.515925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.515963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.516018] Call Trace:
[   20.516165]  <TASK>
[   20.516220]  dump_stack_lvl+0x73/0xb0
[   20.516376]  print_report+0xd1/0x650
[   20.516510]  ? __virt_addr_valid+0x1db/0x2d0
[   20.516781]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   20.516861]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.516935]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   20.517007]  kasan_report+0x141/0x180
[   20.517077]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   20.517122]  kasan_check_range+0x10c/0x1c0
[   20.517154]  __kasan_check_write+0x18/0x20
[   20.517184]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   20.517262]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.517323]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.517355]  ? trace_hardirqs_on+0x37/0xe0
[   20.517390]  ? kasan_bitops_generic+0x92/0x1c0
[   20.517425]  kasan_bitops_generic+0x116/0x1c0
[   20.517454]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.517486]  ? __pfx_read_tsc+0x10/0x10
[   20.517514]  ? ktime_get_ts64+0x86/0x230
[   20.517548]  kunit_try_run_case+0x1a5/0x480
[   20.517585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.517688]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.517767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.517807]  ? __kthread_parkme+0x82/0x180
[   20.517839]  ? preempt_count_sub+0x50/0x80
[   20.517877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.517914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.517950]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.517986]  kthread+0x337/0x6f0
[   20.518011]  ? trace_preempt_on+0x20/0xc0
[   20.518044]  ? __pfx_kthread+0x10/0x10
[   20.518069]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.518102]  ? calculate_sigpending+0x7b/0xa0
[   20.518133]  ? __pfx_kthread+0x10/0x10
[   20.518159]  ret_from_fork+0x41/0x80
[   20.518188]  ? __pfx_kthread+0x10/0x10
[   20.518238]  ret_from_fork_asm+0x1a/0x30
[   20.518300]  </TASK>
[   20.518315] 
[   20.542116] Allocated by task 282:
[   20.542598]  kasan_save_stack+0x45/0x70
[   20.543002]  kasan_save_track+0x18/0x40
[   20.543531]  kasan_save_alloc_info+0x3b/0x50
[   20.543894]  __kasan_kmalloc+0xb7/0xc0
[   20.544268]  __kmalloc_cache_noprof+0x189/0x420
[   20.544745]  kasan_bitops_generic+0x92/0x1c0
[   20.545168]  kunit_try_run_case+0x1a5/0x480
[   20.545955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.546999]  kthread+0x337/0x6f0
[   20.547740]  ret_from_fork+0x41/0x80
[   20.548114]  ret_from_fork_asm+0x1a/0x30
[   20.548529] 
[   20.548898] The buggy address belongs to the object at ffff8881025ebc60
[   20.548898]  which belongs to the cache kmalloc-16 of size 16
[   20.550141] The buggy address is located 8 bytes inside of
[   20.550141]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.551185] 
[   20.551454] The buggy address belongs to the physical page:
[   20.551945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.552575] flags: 0x200000000000000(node=0|zone=2)
[   20.553898] page_type: f5(slab)
[   20.554188] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.555470] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.556172] page dumped because: kasan: bad access detected
[   20.556916] 
[   20.557262] Memory state around the buggy address:
[   20.557993]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   20.558892]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.559688] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.560342]                                                           ^
[   20.561158]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.561874]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.562932] ==================================================================
[   20.650249] ==================================================================
[   20.651039] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   20.651594] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.652288] 
[   20.652556] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.652844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.652881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.652935] Call Trace:
[   20.652983]  <TASK>
[   20.653026]  dump_stack_lvl+0x73/0xb0
[   20.653099]  print_report+0xd1/0x650
[   20.653172]  ? __virt_addr_valid+0x1db/0x2d0
[   20.653289]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   20.653357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.653431]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   20.653502]  kasan_report+0x141/0x180
[   20.653575]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   20.653805]  kasan_check_range+0x10c/0x1c0
[   20.653902]  __kasan_check_write+0x18/0x20
[   20.654004]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   20.654131]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.654270]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.654348]  ? trace_hardirqs_on+0x37/0xe0
[   20.654420]  ? kasan_bitops_generic+0x92/0x1c0
[   20.654496]  kasan_bitops_generic+0x116/0x1c0
[   20.654567]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.654997]  ? __pfx_read_tsc+0x10/0x10
[   20.655114]  ? ktime_get_ts64+0x86/0x230
[   20.655196]  kunit_try_run_case+0x1a5/0x480
[   20.655293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.655352]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.655406]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.655459]  ? __kthread_parkme+0x82/0x180
[   20.655509]  ? preempt_count_sub+0x50/0x80
[   20.655565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.655743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.655803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.655855]  kthread+0x337/0x6f0
[   20.655892]  ? trace_preempt_on+0x20/0xc0
[   20.655942]  ? __pfx_kthread+0x10/0x10
[   20.655982]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.656029]  ? calculate_sigpending+0x7b/0xa0
[   20.656076]  ? __pfx_kthread+0x10/0x10
[   20.656116]  ret_from_fork+0x41/0x80
[   20.656161]  ? __pfx_kthread+0x10/0x10
[   20.656200]  ret_from_fork_asm+0x1a/0x30
[   20.656307]  </TASK>
[   20.656331] 
[   20.682158] Allocated by task 282:
[   20.682595]  kasan_save_stack+0x45/0x70
[   20.683477]  kasan_save_track+0x18/0x40
[   20.683847]  kasan_save_alloc_info+0x3b/0x50
[   20.684848]  __kasan_kmalloc+0xb7/0xc0
[   20.685741]  __kmalloc_cache_noprof+0x189/0x420
[   20.687589]  kasan_bitops_generic+0x92/0x1c0
[   20.688076]  kunit_try_run_case+0x1a5/0x480
[   20.688737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.689657]  kthread+0x337/0x6f0
[   20.689988]  ret_from_fork+0x41/0x80
[   20.690265]  ret_from_fork_asm+0x1a/0x30
[   20.690515] 
[   20.690965] The buggy address belongs to the object at ffff8881025ebc60
[   20.690965]  which belongs to the cache kmalloc-16 of size 16
[   20.693149] The buggy address is located 8 bytes inside of
[   20.693149]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.693826] 
[   20.693962] The buggy address belongs to the physical page:
[   20.694318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.695570] flags: 0x200000000000000(node=0|zone=2)
[   20.696464] page_type: f5(slab)
[   20.696811] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.697882] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.699014] page dumped because: kasan: bad access detected
[   20.699745] 
[   20.700143] Memory state around the buggy address:
[   20.701085]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   20.702059]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.702892] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.703658]                                                           ^
[   20.704490]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.705533]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.706258] ==================================================================
[   20.563784] ==================================================================
[   20.564642] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   20.566087] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.566504] 
[   20.566751] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.566872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.566910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.566963] Call Trace:
[   20.567017]  <TASK>
[   20.567066]  dump_stack_lvl+0x73/0xb0
[   20.567218]  print_report+0xd1/0x650
[   20.567305]  ? __virt_addr_valid+0x1db/0x2d0
[   20.567642]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   20.567727]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.567989]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   20.568072]  kasan_report+0x141/0x180
[   20.568152]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   20.568652]  kasan_check_range+0x10c/0x1c0
[   20.568742]  __kasan_check_write+0x18/0x20
[   20.568787]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   20.568825]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.568862]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.568893]  ? trace_hardirqs_on+0x37/0xe0
[   20.568928]  ? kasan_bitops_generic+0x92/0x1c0
[   20.568963]  kasan_bitops_generic+0x116/0x1c0
[   20.568993]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.569024]  ? __pfx_read_tsc+0x10/0x10
[   20.569054]  ? ktime_get_ts64+0x86/0x230
[   20.569089]  kunit_try_run_case+0x1a5/0x480
[   20.569127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.569161]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.569197]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.569259]  ? __kthread_parkme+0x82/0x180
[   20.569295]  ? preempt_count_sub+0x50/0x80
[   20.569332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.569367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.569401]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.569437]  kthread+0x337/0x6f0
[   20.569460]  ? trace_preempt_on+0x20/0xc0
[   20.569494]  ? __pfx_kthread+0x10/0x10
[   20.569518]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.569550]  ? calculate_sigpending+0x7b/0xa0
[   20.569582]  ? __pfx_kthread+0x10/0x10
[   20.569654]  ret_from_fork+0x41/0x80
[   20.569727]  ? __pfx_kthread+0x10/0x10
[   20.569804]  ret_from_fork_asm+0x1a/0x30
[   20.569888]  </TASK>
[   20.569926] 
[   20.591938] Allocated by task 282:
[   20.592274]  kasan_save_stack+0x45/0x70
[   20.592684]  kasan_save_track+0x18/0x40
[   20.592922]  kasan_save_alloc_info+0x3b/0x50
[   20.593178]  __kasan_kmalloc+0xb7/0xc0
[   20.594085]  __kmalloc_cache_noprof+0x189/0x420
[   20.594756]  kasan_bitops_generic+0x92/0x1c0
[   20.595133]  kunit_try_run_case+0x1a5/0x480
[   20.595570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.596249]  kthread+0x337/0x6f0
[   20.596486]  ret_from_fork+0x41/0x80
[   20.596936]  ret_from_fork_asm+0x1a/0x30
[   20.597429] 
[   20.598050] The buggy address belongs to the object at ffff8881025ebc60
[   20.598050]  which belongs to the cache kmalloc-16 of size 16
[   20.599095] The buggy address is located 8 bytes inside of
[   20.599095]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.599811] 
[   20.599945] The buggy address belongs to the physical page:
[   20.600240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.600721] flags: 0x200000000000000(node=0|zone=2)
[   20.601002] page_type: f5(slab)
[   20.601241] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.601900] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.602315] page dumped because: kasan: bad access detected
[   20.602656] 
[   20.603052] Memory state around the buggy address:
[   20.603586]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   20.604178]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.604948] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.605403]                                                           ^
[   20.605839]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.606284]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.607341] ==================================================================
[   20.461306] ==================================================================
[   20.462125] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   20.463029] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.463743] 
[   20.464575] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.464888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.464925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.464983] Call Trace:
[   20.465029]  <TASK>
[   20.465052]  dump_stack_lvl+0x73/0xb0
[   20.465088]  print_report+0xd1/0x650
[   20.465122]  ? __virt_addr_valid+0x1db/0x2d0
[   20.465158]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   20.465266]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.465366]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   20.465472]  kasan_report+0x141/0x180
[   20.465551]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   20.465971]  kasan_check_range+0x10c/0x1c0
[   20.466034]  __kasan_check_write+0x18/0x20
[   20.466075]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   20.466126]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.466165]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.466197]  ? trace_hardirqs_on+0x37/0xe0
[   20.466256]  ? kasan_bitops_generic+0x92/0x1c0
[   20.466296]  kasan_bitops_generic+0x116/0x1c0
[   20.466327]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.466359]  ? __pfx_read_tsc+0x10/0x10
[   20.466387]  ? ktime_get_ts64+0x86/0x230
[   20.466423]  kunit_try_run_case+0x1a5/0x480
[   20.466460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.466493]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.466527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.466563]  ? __kthread_parkme+0x82/0x180
[   20.466595]  ? preempt_count_sub+0x50/0x80
[   20.466697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.466759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.466795]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.466830]  kthread+0x337/0x6f0
[   20.466854]  ? trace_preempt_on+0x20/0xc0
[   20.466887]  ? __pfx_kthread+0x10/0x10
[   20.466913]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.466945]  ? calculate_sigpending+0x7b/0xa0
[   20.466977]  ? __pfx_kthread+0x10/0x10
[   20.467004]  ret_from_fork+0x41/0x80
[   20.467034]  ? __pfx_kthread+0x10/0x10
[   20.467058]  ret_from_fork_asm+0x1a/0x30
[   20.467101]  </TASK>
[   20.467115] 
[   20.488594] Allocated by task 282:
[   20.489992]  kasan_save_stack+0x45/0x70
[   20.490347]  kasan_save_track+0x18/0x40
[   20.490678]  kasan_save_alloc_info+0x3b/0x50
[   20.490930]  __kasan_kmalloc+0xb7/0xc0
[   20.491090]  __kmalloc_cache_noprof+0x189/0x420
[   20.491262]  kasan_bitops_generic+0x92/0x1c0
[   20.491428]  kunit_try_run_case+0x1a5/0x480
[   20.491594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.492686]  kthread+0x337/0x6f0
[   20.493406]  ret_from_fork+0x41/0x80
[   20.494443]  ret_from_fork_asm+0x1a/0x30
[   20.495204] 
[   20.495708] The buggy address belongs to the object at ffff8881025ebc60
[   20.495708]  which belongs to the cache kmalloc-16 of size 16
[   20.497734] The buggy address is located 8 bytes inside of
[   20.497734]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.500380] 
[   20.500944] The buggy address belongs to the physical page:
[   20.501562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.502374] flags: 0x200000000000000(node=0|zone=2)
[   20.502856] page_type: f5(slab)
[   20.503352] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.504184] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.504964] page dumped because: kasan: bad access detected
[   20.505642] 
[   20.506092] Memory state around the buggy address:
[   20.507053]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   20.507939]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.508209] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.508735]                                                           ^
[   20.509998]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.510821]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.511358] ==================================================================
[   20.608524] ==================================================================
[   20.609303] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   20.610435] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282
[   20.611321] 
[   20.611593] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   20.611853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.611890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.611945] Call Trace:
[   20.611993]  <TASK>
[   20.612036]  dump_stack_lvl+0x73/0xb0
[   20.612109]  print_report+0xd1/0x650
[   20.612181]  ? __virt_addr_valid+0x1db/0x2d0
[   20.612309]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   20.612416]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.612493]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   20.612572]  kasan_report+0x141/0x180
[   20.612824]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   20.612912]  kasan_check_range+0x10c/0x1c0
[   20.612985]  __kasan_check_write+0x18/0x20
[   20.613053]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   20.613129]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   20.613202]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.613286]  ? trace_hardirqs_on+0x37/0xe0
[   20.613358]  ? kasan_bitops_generic+0x92/0x1c0
[   20.613432]  kasan_bitops_generic+0x116/0x1c0
[   20.613487]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   20.613542]  ? __pfx_read_tsc+0x10/0x10
[   20.613627]  ? ktime_get_ts64+0x86/0x230
[   20.614067]  kunit_try_run_case+0x1a5/0x480
[   20.614159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.614281]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.614360]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.614462]  ? __kthread_parkme+0x82/0x180
[   20.614558]  ? preempt_count_sub+0x50/0x80
[   20.614780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.614858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.614935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.615010]  kthread+0x337/0x6f0
[   20.615070]  ? trace_preempt_on+0x20/0xc0
[   20.615140]  ? __pfx_kthread+0x10/0x10
[   20.615184]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.615269]  ? calculate_sigpending+0x7b/0xa0
[   20.615319]  ? __pfx_kthread+0x10/0x10
[   20.615360]  ret_from_fork+0x41/0x80
[   20.615408]  ? __pfx_kthread+0x10/0x10
[   20.615451]  ret_from_fork_asm+0x1a/0x30
[   20.615526]  </TASK>
[   20.615551] 
[   20.631879] Allocated by task 282:
[   20.632359]  kasan_save_stack+0x45/0x70
[   20.632850]  kasan_save_track+0x18/0x40
[   20.633325]  kasan_save_alloc_info+0x3b/0x50
[   20.633962]  __kasan_kmalloc+0xb7/0xc0
[   20.634449]  __kmalloc_cache_noprof+0x189/0x420
[   20.635082]  kasan_bitops_generic+0x92/0x1c0
[   20.635329]  kunit_try_run_case+0x1a5/0x480
[   20.635725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.636033]  kthread+0x337/0x6f0
[   20.636496]  ret_from_fork+0x41/0x80
[   20.637053]  ret_from_fork_asm+0x1a/0x30
[   20.637524] 
[   20.637924] The buggy address belongs to the object at ffff8881025ebc60
[   20.637924]  which belongs to the cache kmalloc-16 of size 16
[   20.639228] The buggy address is located 8 bytes inside of
[   20.639228]  allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69)
[   20.639844] 
[   20.639980] The buggy address belongs to the physical page:
[   20.640249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb
[   20.641158] flags: 0x200000000000000(node=0|zone=2)
[   20.641877] page_type: f5(slab)
[   20.642320] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   20.643003] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.643856] page dumped because: kasan: bad access detected
[   20.644381] 
[   20.644789] Memory state around the buggy address:
[   20.645159]  ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   20.646069]  ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   20.646554] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.647193]                                                           ^
[   20.647547]  ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.648349]  ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.648963] ==================================================================