Hay
Date
July 10, 2025, 6:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.284116] ==================================================================
[   19.284172] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   19.284228] Write of size 8 at addr fff00000c3eb2548 by task kunit_try_catch/261
[   19.284279] 
[   19.284313] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.284413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.284440] Hardware name: linux,dummy-virt (DT)
[   19.284473] Call trace:
[   19.284497]  show_stack+0x20/0x38 (C)
[   19.284547]  dump_stack_lvl+0x8c/0xd0
[   19.284597]  print_report+0x118/0x608
[   19.284647]  kasan_report+0xdc/0x128
[   19.284696]  kasan_check_range+0x100/0x1a8
[   19.284749]  __kasan_check_write+0x20/0x30
[   19.284797]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   19.284851]  kasan_bitops_generic+0x110/0x1c8
[   19.284902]  kunit_try_run_case+0x170/0x3f0
[   19.284952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.285008]  kthread+0x328/0x630
[   19.285052]  ret_from_fork+0x10/0x20
[   19.285102] 
[   19.285122] Allocated by task 261:
[   19.285151]  kasan_save_stack+0x3c/0x68
[   19.285194]  kasan_save_track+0x20/0x40
[   19.285236]  kasan_save_alloc_info+0x40/0x58
[   19.286723]  kunit_try_run_case+0x170/0x3f0
[   19.288279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.289018] 
[   19.289039] Memory state around the buggy address:
[   19.289072]  fff00000c3eb2400: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   19.289565]  fff00000c3eb2480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.289611] >fff00000c3eb2500: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   19.289652]                                               ^
[   19.289691]  fff00000c3eb2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.289773] ==================================================================
[   19.210757] ==================================================================
[   19.211004] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.211121] Write of size 8 at addr fff00000c3eb2548 by task kunit_try_catch/261
[   19.211183] 
[   19.211219] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.213106]  kasan_check_range+0x100/0x1a8
[   19.216185]  __kasan_kmalloc+0xd4/0xd8
[   19.217779] The buggy address belongs to the physical page:
[   19.219701]  fff00000c3eb2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.222416] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.225555]  kasan_save_alloc_info+0x40/0x58
[   19.228132] 
[   19.234715]  dump_stack_lvl+0x8c/0xd0
[   19.236838]  kasan_save_stack+0x3c/0x68
[   19.239182] 
[   19.240163] page_type: f5(slab)
[   19.241784]                                               ^
[   19.244620]  kunit_try_run_case+0x170/0x3f0
[   19.245162]  kunit_try_run_case+0x170/0x3f0
[   19.247171] page_type: f5(slab)
[   19.248246] 
[   19.248370] Memory state around the buggy address:
[   19.253558]  kthread+0x328/0x630
[   19.253999]  kasan_save_track+0x20/0x40
[   19.254352]  kasan_save_alloc_info+0x40/0x58
[   19.254419]  __kasan_kmalloc+0xd4/0xd8
[   19.254466]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.254509]  kasan_bitops_generic+0xa0/0x1c8
[   19.254550]  kunit_try_run_case+0x170/0x3f0
[   19.254590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.254637]  kthread+0x328/0x630
[   19.254672]  ret_from_fork+0x10/0x20
[   19.254712] 
[   19.254735] The buggy address belongs to the object at fff00000c3eb2540
[   19.254735]  which belongs to the cache kmalloc-16 of size 16
[   19.254794] The buggy address is located 8 bytes inside of
[   19.254794]  allocated 9-byte region [fff00000c3eb2540, fff00000c3eb2549)
[   19.255334] >fff00000c3eb2500: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   19.256609]                                               ^
[   19.258092] ==================================================================

[   14.605427] ==================================================================
[   14.605751] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.606448] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.607007] 
[   14.607144] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.607189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.607201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.607220] Call Trace:
[   14.607233]  <TASK>
[   14.607246]  dump_stack_lvl+0x73/0xb0
[   14.607276]  print_report+0xd1/0x650
[   14.607299]  ? __virt_addr_valid+0x1db/0x2d0
[   14.607322]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.607348]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.607372]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.607398]  kasan_report+0x141/0x180
[   14.607420]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.607451]  kasan_check_range+0x10c/0x1c0
[   14.607475]  __kasan_check_write+0x18/0x20
[   14.607495]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.607522]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.607552]  ? ret_from_fork_asm+0x1a/0x30
[   14.607574]  ? kthread+0x337/0x6f0
[   14.607596]  kasan_bitops_generic+0x116/0x1c0
[   14.607621]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.607647]  ? __pfx_read_tsc+0x10/0x10
[   14.607668]  ? ktime_get_ts64+0x86/0x230
[   14.607691]  kunit_try_run_case+0x1a5/0x480
[   14.607716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.607739]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.607764]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.607788]  ? __kthread_parkme+0x82/0x180
[   14.607808]  ? preempt_count_sub+0x50/0x80
[   14.607832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.607857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.607882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.607908]  kthread+0x337/0x6f0
[   14.607927]  ? trace_preempt_on+0x20/0xc0
[   14.608160]  ? __pfx_kthread+0x10/0x10
[   14.608183]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.608205]  ? calculate_sigpending+0x7b/0xa0
[   14.608230]  ? __pfx_kthread+0x10/0x10
[   14.608251]  ret_from_fork+0x116/0x1d0
[   14.608271]  ? __pfx_kthread+0x10/0x10
[   14.608292]  ret_from_fork_asm+0x1a/0x30
[   14.608322]  </TASK>
[   14.608333] 
[   14.615805] Allocated by task 278:
[   14.615983]  kasan_save_stack+0x45/0x70
[   14.616193]  kasan_save_track+0x18/0x40
[   14.616565]  kasan_save_alloc_info+0x3b/0x50
[   14.616716]  __kasan_kmalloc+0xb7/0xc0
[   14.616846]  __kmalloc_cache_noprof+0x189/0x420
[   14.617199]  kasan_bitops_generic+0x92/0x1c0
[   14.617412]  kunit_try_run_case+0x1a5/0x480
[   14.617622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.617842]  kthread+0x337/0x6f0
[   14.618025]  ret_from_fork+0x116/0x1d0
[   14.618203]  ret_from_fork_asm+0x1a/0x30
[   14.618342] 
[   14.618413] The buggy address belongs to the object at ffff888101debea0
[   14.618413]  which belongs to the cache kmalloc-16 of size 16
[   14.618814] The buggy address is located 8 bytes inside of
[   14.618814]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.619340] 
[   14.619524] The buggy address belongs to the physical page:
[   14.619775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.620095] flags: 0x200000000000000(node=0|zone=2)
[   14.620259] page_type: f5(slab)
[   14.620377] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.620790] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.621380] page dumped because: kasan: bad access detected
[   14.621639] 
[   14.621731] Memory state around the buggy address:
[   14.621903]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.622128]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.622379] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.622687]                                   ^
[   14.622896]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.623360]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.623569] ==================================================================
[   14.643397] ==================================================================
[   14.643703] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.644068] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.644399] 
[   14.644509] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.644551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.644562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.644582] Call Trace:
[   14.644596]  <TASK>
[   14.644611]  dump_stack_lvl+0x73/0xb0
[   14.644638]  print_report+0xd1/0x650
[   14.644660]  ? __virt_addr_valid+0x1db/0x2d0
[   14.644682]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.644709]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.644732]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.644759]  kasan_report+0x141/0x180
[   14.644781]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.644811]  kasan_check_range+0x10c/0x1c0
[   14.644836]  __kasan_check_write+0x18/0x20
[   14.644855]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.644882]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.644911]  ? ret_from_fork_asm+0x1a/0x30
[   14.644956]  ? kthread+0x337/0x6f0
[   14.644979]  kasan_bitops_generic+0x116/0x1c0
[   14.645003]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.645037]  ? __pfx_read_tsc+0x10/0x10
[   14.645059]  ? ktime_get_ts64+0x86/0x230
[   14.645083]  kunit_try_run_case+0x1a5/0x480
[   14.645106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.645129]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.645154]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.645177]  ? __kthread_parkme+0x82/0x180
[   14.645198]  ? preempt_count_sub+0x50/0x80
[   14.645220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.645245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.645269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.645294]  kthread+0x337/0x6f0
[   14.645313]  ? trace_preempt_on+0x20/0xc0
[   14.645335]  ? __pfx_kthread+0x10/0x10
[   14.645356]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.645378]  ? calculate_sigpending+0x7b/0xa0
[   14.645402]  ? __pfx_kthread+0x10/0x10
[   14.645423]  ret_from_fork+0x116/0x1d0
[   14.645441]  ? __pfx_kthread+0x10/0x10
[   14.645462]  ret_from_fork_asm+0x1a/0x30
[   14.645492]  </TASK>
[   14.645502] 
[   14.652832] Allocated by task 278:
[   14.652979]  kasan_save_stack+0x45/0x70
[   14.653139]  kasan_save_track+0x18/0x40
[   14.653307]  kasan_save_alloc_info+0x3b/0x50
[   14.653490]  __kasan_kmalloc+0xb7/0xc0
[   14.653655]  __kmalloc_cache_noprof+0x189/0x420
[   14.653849]  kasan_bitops_generic+0x92/0x1c0
[   14.654025]  kunit_try_run_case+0x1a5/0x480
[   14.654182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.654357]  kthread+0x337/0x6f0
[   14.654492]  ret_from_fork+0x116/0x1d0
[   14.654674]  ret_from_fork_asm+0x1a/0x30
[   14.654867] 
[   14.654983] The buggy address belongs to the object at ffff888101debea0
[   14.654983]  which belongs to the cache kmalloc-16 of size 16
[   14.655506] The buggy address is located 8 bytes inside of
[   14.655506]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.655999] 
[   14.656092] The buggy address belongs to the physical page:
[   14.656345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.656588] flags: 0x200000000000000(node=0|zone=2)
[   14.656749] page_type: f5(slab)
[   14.656912] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.657277] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.657628] page dumped because: kasan: bad access detected
[   14.657852] 
[   14.657969] Memory state around the buggy address:
[   14.658172]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.658454]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.658758] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.659062]                                   ^
[   14.659249]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.659535]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.659817] ==================================================================
[   14.660690] ==================================================================
[   14.661106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.661562] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.661899] 
[   14.662023] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.662074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.662087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.662106] Call Trace:
[   14.662120]  <TASK>
[   14.662134]  dump_stack_lvl+0x73/0xb0
[   14.662163]  print_report+0xd1/0x650
[   14.662186]  ? __virt_addr_valid+0x1db/0x2d0
[   14.662208]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.662235]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.662258]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.662285]  kasan_report+0x141/0x180
[   14.662306]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.662338]  kasan_check_range+0x10c/0x1c0
[   14.662361]  __kasan_check_write+0x18/0x20
[   14.662381]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.662407]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.662437]  ? ret_from_fork_asm+0x1a/0x30
[   14.662460]  ? kthread+0x337/0x6f0
[   14.662482]  kasan_bitops_generic+0x116/0x1c0
[   14.662507]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.662532]  ? __pfx_read_tsc+0x10/0x10
[   14.662555]  ? ktime_get_ts64+0x86/0x230
[   14.662578]  kunit_try_run_case+0x1a5/0x480
[   14.662602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.662626]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.662649]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.662673]  ? __kthread_parkme+0x82/0x180
[   14.662693]  ? preempt_count_sub+0x50/0x80
[   14.662716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.662740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.662765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.662790]  kthread+0x337/0x6f0
[   14.662808]  ? trace_preempt_on+0x20/0xc0
[   14.662831]  ? __pfx_kthread+0x10/0x10
[   14.662851]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.662873]  ? calculate_sigpending+0x7b/0xa0
[   14.662896]  ? __pfx_kthread+0x10/0x10
[   14.662938]  ret_from_fork+0x116/0x1d0
[   14.662958]  ? __pfx_kthread+0x10/0x10
[   14.662978]  ret_from_fork_asm+0x1a/0x30
[   14.663007]  </TASK>
[   14.663017] 
[   14.672651] Allocated by task 278:
[   14.672828]  kasan_save_stack+0x45/0x70
[   14.673260]  kasan_save_track+0x18/0x40
[   14.673524]  kasan_save_alloc_info+0x3b/0x50
[   14.673734]  __kasan_kmalloc+0xb7/0xc0
[   14.673913]  __kmalloc_cache_noprof+0x189/0x420
[   14.674304]  kasan_bitops_generic+0x92/0x1c0
[   14.674526]  kunit_try_run_case+0x1a5/0x480
[   14.674711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.675137]  kthread+0x337/0x6f0
[   14.675291]  ret_from_fork+0x116/0x1d0
[   14.675465]  ret_from_fork_asm+0x1a/0x30
[   14.675828] 
[   14.675941] The buggy address belongs to the object at ffff888101debea0
[   14.675941]  which belongs to the cache kmalloc-16 of size 16
[   14.676561] The buggy address is located 8 bytes inside of
[   14.676561]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.677269] 
[   14.677363] The buggy address belongs to the physical page:
[   14.677714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.678148] flags: 0x200000000000000(node=0|zone=2)
[   14.678460] page_type: f5(slab)
[   14.678593] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.679048] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.679369] page dumped because: kasan: bad access detected
[   14.679610] 
[   14.679689] Memory state around the buggy address:
[   14.679896]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.680488]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.680870] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.681282]                                   ^
[   14.681531]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.681935]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.682287] ==================================================================
[   14.580097] ==================================================================
[   14.580349] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.580699] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.581320] 
[   14.581447] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.581489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.581502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.581521] Call Trace:
[   14.581537]  <TASK>
[   14.581552]  dump_stack_lvl+0x73/0xb0
[   14.581582]  print_report+0xd1/0x650
[   14.581603]  ? __virt_addr_valid+0x1db/0x2d0
[   14.581627]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.581654]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.581678]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.581704]  kasan_report+0x141/0x180
[   14.581726]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.581757]  kasan_check_range+0x10c/0x1c0
[   14.581781]  __kasan_check_write+0x18/0x20
[   14.581801]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.581827]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.581856]  ? ret_from_fork_asm+0x1a/0x30
[   14.581879]  ? kthread+0x337/0x6f0
[   14.581902]  kasan_bitops_generic+0x116/0x1c0
[   14.581926]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.581952]  ? __pfx_read_tsc+0x10/0x10
[   14.581974]  ? ktime_get_ts64+0x86/0x230
[   14.582115]  kunit_try_run_case+0x1a5/0x480
[   14.582142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.582166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.582190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.582215]  ? __kthread_parkme+0x82/0x180
[   14.582235]  ? preempt_count_sub+0x50/0x80
[   14.582259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.582284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.582309]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.582334]  kthread+0x337/0x6f0
[   14.582353]  ? trace_preempt_on+0x20/0xc0
[   14.582376]  ? __pfx_kthread+0x10/0x10
[   14.582396]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.582418]  ? calculate_sigpending+0x7b/0xa0
[   14.582442]  ? __pfx_kthread+0x10/0x10
[   14.582463]  ret_from_fork+0x116/0x1d0
[   14.582483]  ? __pfx_kthread+0x10/0x10
[   14.582504]  ret_from_fork_asm+0x1a/0x30
[   14.582534]  </TASK>
[   14.582545] 
[   14.592746] Allocated by task 278:
[   14.593212]  kasan_save_stack+0x45/0x70
[   14.593382]  kasan_save_track+0x18/0x40
[   14.593730]  kasan_save_alloc_info+0x3b/0x50
[   14.594166]  __kasan_kmalloc+0xb7/0xc0
[   14.594323]  __kmalloc_cache_noprof+0x189/0x420
[   14.594731]  kasan_bitops_generic+0x92/0x1c0
[   14.595187]  kunit_try_run_case+0x1a5/0x480
[   14.595366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.595790]  kthread+0x337/0x6f0
[   14.596144]  ret_from_fork+0x116/0x1d0
[   14.596342]  ret_from_fork_asm+0x1a/0x30
[   14.596527] 
[   14.596614] The buggy address belongs to the object at ffff888101debea0
[   14.596614]  which belongs to the cache kmalloc-16 of size 16
[   14.597417] The buggy address is located 8 bytes inside of
[   14.597417]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.598151] 
[   14.598389] The buggy address belongs to the physical page:
[   14.598698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.599293] flags: 0x200000000000000(node=0|zone=2)
[   14.599613] page_type: f5(slab)
[   14.599768] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.600329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.600724] page dumped because: kasan: bad access detected
[   14.601234] 
[   14.601315] Memory state around the buggy address:
[   14.601697]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.602116]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.602389] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.602705]                                   ^
[   14.602909]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.603569]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.604166] ==================================================================
[   14.531553] ==================================================================
[   14.532536] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.533083] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.533388] 
[   14.533492] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.533534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.533545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.533567] Call Trace:
[   14.533582]  <TASK>
[   14.533598]  dump_stack_lvl+0x73/0xb0
[   14.533626]  print_report+0xd1/0x650
[   14.533649]  ? __virt_addr_valid+0x1db/0x2d0
[   14.533672]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.533699]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.533723]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.533750]  kasan_report+0x141/0x180
[   14.533772]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.533803]  kasan_check_range+0x10c/0x1c0
[   14.533956]  __kasan_check_write+0x18/0x20
[   14.533977]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.534004]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.534047]  ? ret_from_fork_asm+0x1a/0x30
[   14.534070]  ? kthread+0x337/0x6f0
[   14.534093]  kasan_bitops_generic+0x116/0x1c0
[   14.534118]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.534144]  ? __pfx_read_tsc+0x10/0x10
[   14.534165]  ? ktime_get_ts64+0x86/0x230
[   14.534189]  kunit_try_run_case+0x1a5/0x480
[   14.534214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.534238]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.534262]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.534286]  ? __kthread_parkme+0x82/0x180
[   14.534307]  ? preempt_count_sub+0x50/0x80
[   14.534330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.534355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.534379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.534405]  kthread+0x337/0x6f0
[   14.534424]  ? trace_preempt_on+0x20/0xc0
[   14.534448]  ? __pfx_kthread+0x10/0x10
[   14.534469]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.534491]  ? calculate_sigpending+0x7b/0xa0
[   14.534515]  ? __pfx_kthread+0x10/0x10
[   14.534536]  ret_from_fork+0x116/0x1d0
[   14.534554]  ? __pfx_kthread+0x10/0x10
[   14.534574]  ret_from_fork_asm+0x1a/0x30
[   14.534604]  </TASK>
[   14.534614] 
[   14.542726] Allocated by task 278:
[   14.542861]  kasan_save_stack+0x45/0x70
[   14.543314]  kasan_save_track+0x18/0x40
[   14.543638]  kasan_save_alloc_info+0x3b/0x50
[   14.543836]  __kasan_kmalloc+0xb7/0xc0
[   14.544092]  __kmalloc_cache_noprof+0x189/0x420
[   14.544289]  kasan_bitops_generic+0x92/0x1c0
[   14.544500]  kunit_try_run_case+0x1a5/0x480
[   14.544712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.545050]  kthread+0x337/0x6f0
[   14.545194]  ret_from_fork+0x116/0x1d0
[   14.545360]  ret_from_fork_asm+0x1a/0x30
[   14.545518] 
[   14.545611] The buggy address belongs to the object at ffff888101debea0
[   14.545611]  which belongs to the cache kmalloc-16 of size 16
[   14.546208] The buggy address is located 8 bytes inside of
[   14.546208]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.546567] 
[   14.546639] The buggy address belongs to the physical page:
[   14.546810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.547168] flags: 0x200000000000000(node=0|zone=2)
[   14.547727] page_type: f5(slab)
[   14.547902] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.548259] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.548491] page dumped because: kasan: bad access detected
[   14.548697] 
[   14.548789] Memory state around the buggy address:
[   14.549140]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.549470]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.549796] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.550245]                                   ^
[   14.550455]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.550734]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.551785] ==================================================================
[   14.508043] ==================================================================
[   14.508505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.508825] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.509146] 
[   14.509291] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.509336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.509348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.509368] Call Trace:
[   14.509382]  <TASK>
[   14.509397]  dump_stack_lvl+0x73/0xb0
[   14.509427]  print_report+0xd1/0x650
[   14.509450]  ? __virt_addr_valid+0x1db/0x2d0
[   14.509476]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.509502]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.509525]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.509553]  kasan_report+0x141/0x180
[   14.509574]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.509606]  kasan_check_range+0x10c/0x1c0
[   14.509630]  __kasan_check_write+0x18/0x20
[   14.509650]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.509676]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.509706]  ? ret_from_fork_asm+0x1a/0x30
[   14.509729]  ? kthread+0x337/0x6f0
[   14.509752]  kasan_bitops_generic+0x116/0x1c0
[   14.509777]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.509803]  ? __pfx_read_tsc+0x10/0x10
[   14.509824]  ? ktime_get_ts64+0x86/0x230
[   14.509850]  kunit_try_run_case+0x1a5/0x480
[   14.509875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.509898]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.509922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.510117]  ? __kthread_parkme+0x82/0x180
[   14.510151]  ? preempt_count_sub+0x50/0x80
[   14.510177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.510202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.510228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.510253]  kthread+0x337/0x6f0
[   14.510272]  ? trace_preempt_on+0x20/0xc0
[   14.510294]  ? __pfx_kthread+0x10/0x10
[   14.510316]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.510337]  ? calculate_sigpending+0x7b/0xa0
[   14.510361]  ? __pfx_kthread+0x10/0x10
[   14.510382]  ret_from_fork+0x116/0x1d0
[   14.510401]  ? __pfx_kthread+0x10/0x10
[   14.510421]  ret_from_fork_asm+0x1a/0x30
[   14.510452]  </TASK>
[   14.510462] 
[   14.518941] Allocated by task 278:
[   14.519153]  kasan_save_stack+0x45/0x70
[   14.519309]  kasan_save_track+0x18/0x40
[   14.519446]  kasan_save_alloc_info+0x3b/0x50
[   14.519597]  __kasan_kmalloc+0xb7/0xc0
[   14.519776]  __kmalloc_cache_noprof+0x189/0x420
[   14.520685]  kasan_bitops_generic+0x92/0x1c0
[   14.520851]  kunit_try_run_case+0x1a5/0x480
[   14.521331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.521620]  kthread+0x337/0x6f0
[   14.521781]  ret_from_fork+0x116/0x1d0
[   14.522295]  ret_from_fork_asm+0x1a/0x30
[   14.522491] 
[   14.522586] The buggy address belongs to the object at ffff888101debea0
[   14.522586]  which belongs to the cache kmalloc-16 of size 16
[   14.523584] The buggy address is located 8 bytes inside of
[   14.523584]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.524448] 
[   14.524553] The buggy address belongs to the physical page:
[   14.524787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.525461] flags: 0x200000000000000(node=0|zone=2)
[   14.525759] page_type: f5(slab)
[   14.526198] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.526670] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.527188] page dumped because: kasan: bad access detected
[   14.527635] 
[   14.527734] Memory state around the buggy address:
[   14.528127]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.528441]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.528726] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.529309]                                   ^
[   14.529640]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.530511]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.531102] ==================================================================
[   14.624939] ==================================================================
[   14.625304] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.625674] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.626318] 
[   14.626447] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.626490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.626502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.626522] Call Trace:
[   14.626537]  <TASK>
[   14.626550]  dump_stack_lvl+0x73/0xb0
[   14.626579]  print_report+0xd1/0x650
[   14.626601]  ? __virt_addr_valid+0x1db/0x2d0
[   14.626624]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.626650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.626673]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.626699]  kasan_report+0x141/0x180
[   14.626721]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.626753]  kasan_check_range+0x10c/0x1c0
[   14.626776]  __kasan_check_write+0x18/0x20
[   14.626795]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.626832]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.626861]  ? ret_from_fork_asm+0x1a/0x30
[   14.626883]  ? kthread+0x337/0x6f0
[   14.626906]  kasan_bitops_generic+0x116/0x1c0
[   14.626938]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.626965]  ? __pfx_read_tsc+0x10/0x10
[   14.626986]  ? ktime_get_ts64+0x86/0x230
[   14.627010]  kunit_try_run_case+0x1a5/0x480
[   14.627046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.627070]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.627094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.627119]  ? __kthread_parkme+0x82/0x180
[   14.627138]  ? preempt_count_sub+0x50/0x80
[   14.627161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.627186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.627210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.627235]  kthread+0x337/0x6f0
[   14.627254]  ? trace_preempt_on+0x20/0xc0
[   14.627276]  ? __pfx_kthread+0x10/0x10
[   14.627297]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.627319]  ? calculate_sigpending+0x7b/0xa0
[   14.627342]  ? __pfx_kthread+0x10/0x10
[   14.627364]  ret_from_fork+0x116/0x1d0
[   14.627382]  ? __pfx_kthread+0x10/0x10
[   14.627403]  ret_from_fork_asm+0x1a/0x30
[   14.627432]  </TASK>
[   14.627442] 
[   14.634699] Allocated by task 278:
[   14.634827]  kasan_save_stack+0x45/0x70
[   14.634970]  kasan_save_track+0x18/0x40
[   14.635401]  kasan_save_alloc_info+0x3b/0x50
[   14.636127]  __kasan_kmalloc+0xb7/0xc0
[   14.636298]  __kmalloc_cache_noprof+0x189/0x420
[   14.636474]  kasan_bitops_generic+0x92/0x1c0
[   14.636625]  kunit_try_run_case+0x1a5/0x480
[   14.636832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.637124]  kthread+0x337/0x6f0
[   14.637268]  ret_from_fork+0x116/0x1d0
[   14.637422]  ret_from_fork_asm+0x1a/0x30
[   14.637618] 
[   14.637714] The buggy address belongs to the object at ffff888101debea0
[   14.637714]  which belongs to the cache kmalloc-16 of size 16
[   14.638232] The buggy address is located 8 bytes inside of
[   14.638232]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.638612] 
[   14.638707] The buggy address belongs to the physical page:
[   14.638989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.639349] flags: 0x200000000000000(node=0|zone=2)
[   14.639547] page_type: f5(slab)
[   14.639713] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.640054] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.640363] page dumped because: kasan: bad access detected
[   14.640534] 
[   14.640603] Memory state around the buggy address:
[   14.640827]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.641167]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.641453] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.641702]                                   ^
[   14.641934]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.642242]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.642495] ==================================================================
[   14.552647] ==================================================================
[   14.553212] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.553540] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.554362] 
[   14.554478] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.554525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.554538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.554558] Call Trace:
[   14.554571]  <TASK>
[   14.554585]  dump_stack_lvl+0x73/0xb0
[   14.554615]  print_report+0xd1/0x650
[   14.554637]  ? __virt_addr_valid+0x1db/0x2d0
[   14.554659]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.554762]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.554787]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.555003]  kasan_report+0x141/0x180
[   14.555049]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.555082]  kasan_check_range+0x10c/0x1c0
[   14.555106]  __kasan_check_write+0x18/0x20
[   14.555127]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.555154]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.555183]  ? ret_from_fork_asm+0x1a/0x30
[   14.555206]  ? kthread+0x337/0x6f0
[   14.555230]  kasan_bitops_generic+0x116/0x1c0
[   14.555255]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.555281]  ? __pfx_read_tsc+0x10/0x10
[   14.555303]  ? ktime_get_ts64+0x86/0x230
[   14.555329]  kunit_try_run_case+0x1a5/0x480
[   14.555355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.555379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.555403]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.555428]  ? __kthread_parkme+0x82/0x180
[   14.555448]  ? preempt_count_sub+0x50/0x80
[   14.555472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.555497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.555523]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.555549]  kthread+0x337/0x6f0
[   14.555569]  ? trace_preempt_on+0x20/0xc0
[   14.555592]  ? __pfx_kthread+0x10/0x10
[   14.555613]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.555635]  ? calculate_sigpending+0x7b/0xa0
[   14.555659]  ? __pfx_kthread+0x10/0x10
[   14.555681]  ret_from_fork+0x116/0x1d0
[   14.555700]  ? __pfx_kthread+0x10/0x10
[   14.555721]  ret_from_fork_asm+0x1a/0x30
[   14.555752]  </TASK>
[   14.555761] 
[   14.568284] Allocated by task 278:
[   14.568481]  kasan_save_stack+0x45/0x70
[   14.568633]  kasan_save_track+0x18/0x40
[   14.568770]  kasan_save_alloc_info+0x3b/0x50
[   14.568919]  __kasan_kmalloc+0xb7/0xc0
[   14.569161]  __kmalloc_cache_noprof+0x189/0x420
[   14.569393]  kasan_bitops_generic+0x92/0x1c0
[   14.569609]  kunit_try_run_case+0x1a5/0x480
[   14.569885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.570159]  kthread+0x337/0x6f0
[   14.570337]  ret_from_fork+0x116/0x1d0
[   14.570541]  ret_from_fork_asm+0x1a/0x30
[   14.570677] 
[   14.570769] The buggy address belongs to the object at ffff888101debea0
[   14.570769]  which belongs to the cache kmalloc-16 of size 16
[   14.573235] The buggy address is located 8 bytes inside of
[   14.573235]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.573621] 
[   14.573710] The buggy address belongs to the physical page:
[   14.574179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.574542] flags: 0x200000000000000(node=0|zone=2)
[   14.574777] page_type: f5(slab)
[   14.574930] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.575928] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.576354] page dumped because: kasan: bad access detected
[   14.576554] 
[   14.576625] Memory state around the buggy address:
[   14.576813]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.577225]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.577587] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.578166]                                   ^
[   14.578394]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.578794]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.579306] ==================================================================