Hay
Date
July 23, 2025, 2:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.765637] ==================================================================
[   17.765772] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   17.765839] Read of size 8 at addr fff00000c59612a8 by task kunit_try_catch/261
[   17.765966] 
[   17.766010] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   17.766106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.766304] Hardware name: linux,dummy-virt (DT)
[   17.766534] Call trace:
[   17.766623]  show_stack+0x20/0x38 (C)
[   17.766803]  dump_stack_lvl+0x8c/0xd0
[   17.766990]  print_report+0x118/0x5d0
[   17.767048]  kasan_report+0xdc/0x128
[   17.767096]  __asan_report_load8_noabort+0x20/0x30
[   17.767302]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   17.767539]  kasan_bitops_generic+0x110/0x1c8
[   17.767641]  kunit_try_run_case+0x170/0x3f0
[   17.767795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.768058]  kthread+0x328/0x630
[   17.768153]  ret_from_fork+0x10/0x20
[   17.768694] 
[   17.768743] Allocated by task 261:
[   17.768935]  kasan_save_stack+0x3c/0x68
[   17.769227]  kasan_save_track+0x20/0x40
[   17.769299]  kasan_save_alloc_info+0x40/0x58
[   17.770365]  ret_from_fork+0x10/0x20
[   17.771609] page dumped because: kasan: bad access detected
[   17.772844]                                   ^
[   17.774999] Write of size 8 at addr fff00000c59612a8 by task kunit_try_catch/261
[   17.776555]  kasan_bitops_generic+0x110/0x1c8
[   17.778920]  kthread+0x328/0x630
[   17.779302] 
[   17.779973] page_type: f5(slab)
[   17.780575] 
[   17.780923]  fff00000c5961180: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   17.782263] ==================================================================
[   17.754714] ==================================================================
[   17.755662] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   17.755749] Write of size 8 at addr fff00000c59612a8 by task kunit_try_catch/261
[   17.755804] 
[   17.755838] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   17.755955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.756143] Hardware name: linux,dummy-virt (DT)
[   17.756516] Call trace:
[   17.756632]  show_stack+0x20/0x38 (C)
[   17.756818]  dump_stack_lvl+0x8c/0xd0
[   17.757112]  print_report+0x118/0x5d0
[   17.757228]  kasan_report+0xdc/0x128
[   17.757487]  kasan_check_range+0x100/0x1a8
[   17.757615]  __kasan_check_write+0x20/0x30
[   17.757980]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   17.758142]  kasan_bitops_generic+0x110/0x1c8
[   17.758332]  kunit_try_run_case+0x170/0x3f0
[   17.758442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.758556]  kthread+0x328/0x630
[   17.758632]  ret_from_fork+0x10/0x20
[   17.758681] 
[   17.758890] Allocated by task 261:
[   17.759098]  kasan_save_stack+0x3c/0x68
[   17.759262]  kasan_save_track+0x20/0x40
[   17.759364]  kasan_save_alloc_info+0x40/0x58
[   17.759501]  __kasan_kmalloc+0xd4/0xd8
[   17.759589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.759730]  kasan_bitops_generic+0xa0/0x1c8
[   17.759813]  kunit_try_run_case+0x170/0x3f0
[   17.760167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.760451]  kthread+0x328/0x630
[   17.760564]  ret_from_fork+0x10/0x20
[   17.760635] 
[   17.760658] The buggy address belongs to the object at fff00000c59612a0
[   17.760658]  which belongs to the cache kmalloc-16 of size 16
[   17.760963] The buggy address is located 8 bytes inside of
[   17.760963]  allocated 9-byte region [fff00000c59612a0, fff00000c59612a9)
[   17.761065] 
[   17.761142] The buggy address belongs to the physical page:
[   17.761464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105961
[   17.761649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.761848] page_type: f5(slab)
[   17.761949] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.762064] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.762148] page dumped because: kasan: bad access detected
[   17.762557] 
[   17.762672] Memory state around the buggy address:
[   17.762770]  fff00000c5961180: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   17.762918]  fff00000c5961200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.763002] >fff00000c5961280: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.763176]                                   ^
[   17.763223]  fff00000c5961300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.763344]  fff00000c5961380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.763497] ==================================================================

[   14.658284] ==================================================================
[   14.658637] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.659019] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.659866] 
[   14.659991] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.660035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.660047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.660068] Call Trace:
[   14.660084]  <TASK>
[   14.660098]  dump_stack_lvl+0x73/0xb0
[   14.660128]  print_report+0xd1/0x610
[   14.660150]  ? __virt_addr_valid+0x1db/0x2d0
[   14.660172]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.660198]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.660220]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.660245]  kasan_report+0x141/0x180
[   14.660267]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.660297]  kasan_check_range+0x10c/0x1c0
[   14.660321]  __kasan_check_write+0x18/0x20
[   14.660342]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.660369]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.660397]  ? ret_from_fork_asm+0x1a/0x30
[   14.660419]  ? kthread+0x337/0x6f0
[   14.660443]  kasan_bitops_generic+0x116/0x1c0
[   14.660466]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.660491]  ? __pfx_read_tsc+0x10/0x10
[   14.660511]  ? ktime_get_ts64+0x86/0x230
[   14.660536]  kunit_try_run_case+0x1a5/0x480
[   14.660560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.660582]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.660606]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.660629]  ? __kthread_parkme+0x82/0x180
[   14.660649]  ? preempt_count_sub+0x50/0x80
[   14.660672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.660695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.660718]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.660741]  kthread+0x337/0x6f0
[   14.660761]  ? trace_preempt_on+0x20/0xc0
[   14.660783]  ? __pfx_kthread+0x10/0x10
[   14.660804]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.660835]  ? calculate_sigpending+0x7b/0xa0
[   14.660863]  ? __pfx_kthread+0x10/0x10
[   14.660886]  ret_from_fork+0x116/0x1d0
[   14.660904]  ? __pfx_kthread+0x10/0x10
[   14.660925]  ret_from_fork_asm+0x1a/0x30
[   14.660955]  </TASK>
[   14.660965] 
[   14.668714] Allocated by task 278:
[   14.668888]  kasan_save_stack+0x45/0x70
[   14.669076]  kasan_save_track+0x18/0x40
[   14.669240]  kasan_save_alloc_info+0x3b/0x50
[   14.669391]  __kasan_kmalloc+0xb7/0xc0
[   14.669526]  __kmalloc_cache_noprof+0x189/0x420
[   14.669684]  kasan_bitops_generic+0x92/0x1c0
[   14.669843]  kunit_try_run_case+0x1a5/0x480
[   14.669991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.670167]  kthread+0x337/0x6f0
[   14.670287]  ret_from_fork+0x116/0x1d0
[   14.670478]  ret_from_fork_asm+0x1a/0x30
[   14.670673] 
[   14.670767] The buggy address belongs to the object at ffff8881025ca080
[   14.670767]  which belongs to the cache kmalloc-16 of size 16
[   14.671666] The buggy address is located 8 bytes inside of
[   14.671666]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.672060] 
[   14.672132] The buggy address belongs to the physical page:
[   14.672305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.672544] flags: 0x200000000000000(node=0|zone=2)
[   14.672706] page_type: f5(slab)
[   14.672899] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.673435] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.673774] page dumped because: kasan: bad access detected
[   14.674040] 
[   14.674165] Memory state around the buggy address:
[   14.674397]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.674717]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.675019] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.675328]                       ^
[   14.675508]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.675784]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.676071] ==================================================================
[   14.677063] ==================================================================
[   14.677364] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.677717] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.678004] 
[   14.678089] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.678140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.678151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.678172] Call Trace:
[   14.678184]  <TASK>
[   14.678197]  dump_stack_lvl+0x73/0xb0
[   14.678224]  print_report+0xd1/0x610
[   14.678246]  ? __virt_addr_valid+0x1db/0x2d0
[   14.678267]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.678292]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.678315]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.678340]  kasan_report+0x141/0x180
[   14.678361]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.678392]  kasan_check_range+0x10c/0x1c0
[   14.678415]  __kasan_check_write+0x18/0x20
[   14.678434]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.678459]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.678486]  ? ret_from_fork_asm+0x1a/0x30
[   14.678508]  ? kthread+0x337/0x6f0
[   14.678531]  kasan_bitops_generic+0x116/0x1c0
[   14.678554]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.678579]  ? __pfx_read_tsc+0x10/0x10
[   14.678599]  ? ktime_get_ts64+0x86/0x230
[   14.678623]  kunit_try_run_case+0x1a5/0x480
[   14.678646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.678669]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.678692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.678715]  ? __kthread_parkme+0x82/0x180
[   14.678735]  ? preempt_count_sub+0x50/0x80
[   14.678757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.678781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.678804]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.678839]  kthread+0x337/0x6f0
[   14.678858]  ? trace_preempt_on+0x20/0xc0
[   14.678881]  ? __pfx_kthread+0x10/0x10
[   14.678901]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.678923]  ? calculate_sigpending+0x7b/0xa0
[   14.678946]  ? __pfx_kthread+0x10/0x10
[   14.678968]  ret_from_fork+0x116/0x1d0
[   14.678985]  ? __pfx_kthread+0x10/0x10
[   14.679006]  ret_from_fork_asm+0x1a/0x30
[   14.679035]  </TASK>
[   14.679045] 
[   14.687038] Allocated by task 278:
[   14.687390]  kasan_save_stack+0x45/0x70
[   14.687586]  kasan_save_track+0x18/0x40
[   14.687773]  kasan_save_alloc_info+0x3b/0x50
[   14.687978]  __kasan_kmalloc+0xb7/0xc0
[   14.688265]  __kmalloc_cache_noprof+0x189/0x420
[   14.688485]  kasan_bitops_generic+0x92/0x1c0
[   14.688664]  kunit_try_run_case+0x1a5/0x480
[   14.688807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.688994]  kthread+0x337/0x6f0
[   14.689167]  ret_from_fork+0x116/0x1d0
[   14.689357]  ret_from_fork_asm+0x1a/0x30
[   14.689557] 
[   14.689649] The buggy address belongs to the object at ffff8881025ca080
[   14.689649]  which belongs to the cache kmalloc-16 of size 16
[   14.690292] The buggy address is located 8 bytes inside of
[   14.690292]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.690751] 
[   14.690832] The buggy address belongs to the physical page:
[   14.691052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.691326] flags: 0x200000000000000(node=0|zone=2)
[   14.691557] page_type: f5(slab)
[   14.691726] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.692059] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.692432] page dumped because: kasan: bad access detected
[   14.692648] 
[   14.692743] Memory state around the buggy address:
[   14.692958]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.693286]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.693543] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.693759]                       ^
[   14.693893]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.694112]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.694422] ==================================================================
[   14.732343] ==================================================================
[   14.732628] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.733014] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.733393] 
[   14.733492] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.733535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.733548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.733569] Call Trace:
[   14.733586]  <TASK>
[   14.733600]  dump_stack_lvl+0x73/0xb0
[   14.733628]  print_report+0xd1/0x610
[   14.733649]  ? __virt_addr_valid+0x1db/0x2d0
[   14.733671]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.733696]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.733718]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.733744]  kasan_report+0x141/0x180
[   14.733765]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.733795]  kasan_check_range+0x10c/0x1c0
[   14.733830]  __kasan_check_write+0x18/0x20
[   14.733848]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.733874]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.733901]  ? ret_from_fork_asm+0x1a/0x30
[   14.733923]  ? kthread+0x337/0x6f0
[   14.733947]  kasan_bitops_generic+0x116/0x1c0
[   14.733969]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.733994]  ? __pfx_read_tsc+0x10/0x10
[   14.734014]  ? ktime_get_ts64+0x86/0x230
[   14.734038]  kunit_try_run_case+0x1a5/0x480
[   14.734061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.734083]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.734106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.734129]  ? __kthread_parkme+0x82/0x180
[   14.734149]  ? preempt_count_sub+0x50/0x80
[   14.734171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.734195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.734218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.734241]  kthread+0x337/0x6f0
[   14.734260]  ? trace_preempt_on+0x20/0xc0
[   14.734282]  ? __pfx_kthread+0x10/0x10
[   14.734302]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.734323]  ? calculate_sigpending+0x7b/0xa0
[   14.734347]  ? __pfx_kthread+0x10/0x10
[   14.734367]  ret_from_fork+0x116/0x1d0
[   14.734386]  ? __pfx_kthread+0x10/0x10
[   14.734405]  ret_from_fork_asm+0x1a/0x30
[   14.734435]  </TASK>
[   14.734444] 
[   14.742579] Allocated by task 278:
[   14.742766]  kasan_save_stack+0x45/0x70
[   14.742979]  kasan_save_track+0x18/0x40
[   14.743172]  kasan_save_alloc_info+0x3b/0x50
[   14.743365]  __kasan_kmalloc+0xb7/0xc0
[   14.743518]  __kmalloc_cache_noprof+0x189/0x420
[   14.743747]  kasan_bitops_generic+0x92/0x1c0
[   14.743965]  kunit_try_run_case+0x1a5/0x480
[   14.744180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.744398]  kthread+0x337/0x6f0
[   14.744523]  ret_from_fork+0x116/0x1d0
[   14.744657]  ret_from_fork_asm+0x1a/0x30
[   14.744797] 
[   14.744906] The buggy address belongs to the object at ffff8881025ca080
[   14.744906]  which belongs to the cache kmalloc-16 of size 16
[   14.745431] The buggy address is located 8 bytes inside of
[   14.745431]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.745962] 
[   14.746035] The buggy address belongs to the physical page:
[   14.746435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.746742] flags: 0x200000000000000(node=0|zone=2)
[   14.746963] page_type: f5(slab)
[   14.747088] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.747505] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.747853] page dumped because: kasan: bad access detected
[   14.748106] 
[   14.748217] Memory state around the buggy address:
[   14.748452]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.748745]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.749038] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.749367]                       ^
[   14.749547]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.749826]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.750089] ==================================================================
[   14.592181] ==================================================================
[   14.592574] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.592854] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.593082] 
[   14.593172] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.593216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.593227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.593250] Call Trace:
[   14.593262]  <TASK>
[   14.593276]  dump_stack_lvl+0x73/0xb0
[   14.593305]  print_report+0xd1/0x610
[   14.593327]  ? __virt_addr_valid+0x1db/0x2d0
[   14.593350]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.593374]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.593397]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.593422]  kasan_report+0x141/0x180
[   14.593443]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.593472]  kasan_check_range+0x10c/0x1c0
[   14.593496]  __kasan_check_write+0x18/0x20
[   14.593515]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.593540]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.593567]  ? ret_from_fork_asm+0x1a/0x30
[   14.593589]  ? kthread+0x337/0x6f0
[   14.593613]  kasan_bitops_generic+0x116/0x1c0
[   14.593636]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.593661]  ? __pfx_read_tsc+0x10/0x10
[   14.593682]  ? ktime_get_ts64+0x86/0x230
[   14.593706]  kunit_try_run_case+0x1a5/0x480
[   14.593731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.593753]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.593778]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.593801]  ? __kthread_parkme+0x82/0x180
[   14.593832]  ? preempt_count_sub+0x50/0x80
[   14.593855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.593878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.593901]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.593925]  kthread+0x337/0x6f0
[   14.593944]  ? trace_preempt_on+0x20/0xc0
[   14.593967]  ? __pfx_kthread+0x10/0x10
[   14.593987]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.594008]  ? calculate_sigpending+0x7b/0xa0
[   14.594031]  ? __pfx_kthread+0x10/0x10
[   14.594051]  ret_from_fork+0x116/0x1d0
[   14.594071]  ? __pfx_kthread+0x10/0x10
[   14.594090]  ret_from_fork_asm+0x1a/0x30
[   14.594119]  </TASK>
[   14.594130] 
[   14.603526] Allocated by task 278:
[   14.603720]  kasan_save_stack+0x45/0x70
[   14.603973]  kasan_save_track+0x18/0x40
[   14.604269]  kasan_save_alloc_info+0x3b/0x50
[   14.604490]  __kasan_kmalloc+0xb7/0xc0
[   14.604703]  __kmalloc_cache_noprof+0x189/0x420
[   14.605003]  kasan_bitops_generic+0x92/0x1c0
[   14.605232]  kunit_try_run_case+0x1a5/0x480
[   14.605412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.605671]  kthread+0x337/0x6f0
[   14.605915]  ret_from_fork+0x116/0x1d0
[   14.606229]  ret_from_fork_asm+0x1a/0x30
[   14.606373] 
[   14.606473] The buggy address belongs to the object at ffff8881025ca080
[   14.606473]  which belongs to the cache kmalloc-16 of size 16
[   14.607234] The buggy address is located 8 bytes inside of
[   14.607234]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.607723] 
[   14.607830] The buggy address belongs to the physical page:
[   14.608234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.608604] flags: 0x200000000000000(node=0|zone=2)
[   14.608864] page_type: f5(slab)
[   14.609042] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.609375] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.609684] page dumped because: kasan: bad access detected
[   14.609962] 
[   14.610058] Memory state around the buggy address:
[   14.610261]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.610638]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.610933] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.611331]                       ^
[   14.611506]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.611788]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.612158] ==================================================================
[   14.695484] ==================================================================
[   14.695850] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.696397] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.696731] 
[   14.696856] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.696898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.696911] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.696932] Call Trace:
[   14.696945]  <TASK>
[   14.696960]  dump_stack_lvl+0x73/0xb0
[   14.696986]  print_report+0xd1/0x610
[   14.697007]  ? __virt_addr_valid+0x1db/0x2d0
[   14.697029]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.697054]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.697076]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.697113]  kasan_report+0x141/0x180
[   14.697135]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.697164]  kasan_check_range+0x10c/0x1c0
[   14.697188]  __kasan_check_write+0x18/0x20
[   14.697207]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.697232]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.697259]  ? ret_from_fork_asm+0x1a/0x30
[   14.697280]  ? kthread+0x337/0x6f0
[   14.697304]  kasan_bitops_generic+0x116/0x1c0
[   14.697328]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.697353]  ? __pfx_read_tsc+0x10/0x10
[   14.697373]  ? ktime_get_ts64+0x86/0x230
[   14.697396]  kunit_try_run_case+0x1a5/0x480
[   14.697420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.697442]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.697466]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.697490]  ? __kthread_parkme+0x82/0x180
[   14.697510]  ? preempt_count_sub+0x50/0x80
[   14.697533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.697557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.697580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.697603]  kthread+0x337/0x6f0
[   14.697622]  ? trace_preempt_on+0x20/0xc0
[   14.697643]  ? __pfx_kthread+0x10/0x10
[   14.697664]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.697685]  ? calculate_sigpending+0x7b/0xa0
[   14.697708]  ? __pfx_kthread+0x10/0x10
[   14.697728]  ret_from_fork+0x116/0x1d0
[   14.697747]  ? __pfx_kthread+0x10/0x10
[   14.697767]  ret_from_fork_asm+0x1a/0x30
[   14.697796]  </TASK>
[   14.697806] 
[   14.705555] Allocated by task 278:
[   14.705731]  kasan_save_stack+0x45/0x70
[   14.705942]  kasan_save_track+0x18/0x40
[   14.706116]  kasan_save_alloc_info+0x3b/0x50
[   14.706300]  __kasan_kmalloc+0xb7/0xc0
[   14.706461]  __kmalloc_cache_noprof+0x189/0x420
[   14.706663]  kasan_bitops_generic+0x92/0x1c0
[   14.706850]  kunit_try_run_case+0x1a5/0x480
[   14.707053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.707303]  kthread+0x337/0x6f0
[   14.707468]  ret_from_fork+0x116/0x1d0
[   14.707602]  ret_from_fork_asm+0x1a/0x30
[   14.707743] 
[   14.707826] The buggy address belongs to the object at ffff8881025ca080
[   14.707826]  which belongs to the cache kmalloc-16 of size 16
[   14.708544] The buggy address is located 8 bytes inside of
[   14.708544]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.709042] 
[   14.709115] The buggy address belongs to the physical page:
[   14.709289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.709616] flags: 0x200000000000000(node=0|zone=2)
[   14.709941] page_type: f5(slab)
[   14.710108] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.710538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.710767] page dumped because: kasan: bad access detected
[   14.710952] 
[   14.711023] Memory state around the buggy address:
[   14.711232]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.711552]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.711878] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.712168]                       ^
[   14.712292]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.712508]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.712958] ==================================================================
[   14.613017] ==================================================================
[   14.613311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.614209] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.614567] 
[   14.614679] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.614724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.614756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.614777] Call Trace:
[   14.614791]  <TASK>
[   14.614832]  dump_stack_lvl+0x73/0xb0
[   14.614860]  print_report+0xd1/0x610
[   14.614882]  ? __virt_addr_valid+0x1db/0x2d0
[   14.614903]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.614929]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.614951]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.614977]  kasan_report+0x141/0x180
[   14.614998]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.615029]  kasan_check_range+0x10c/0x1c0
[   14.615053]  __kasan_check_write+0x18/0x20
[   14.615072]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.615108]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.615136]  ? ret_from_fork_asm+0x1a/0x30
[   14.615159]  ? kthread+0x337/0x6f0
[   14.615182]  kasan_bitops_generic+0x116/0x1c0
[   14.615226]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.615251]  ? __pfx_read_tsc+0x10/0x10
[   14.615271]  ? ktime_get_ts64+0x86/0x230
[   14.615295]  kunit_try_run_case+0x1a5/0x480
[   14.615319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.615341]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.615365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.615389]  ? __kthread_parkme+0x82/0x180
[   14.615424]  ? preempt_count_sub+0x50/0x80
[   14.615447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.615472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.615495]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.615519]  kthread+0x337/0x6f0
[   14.615537]  ? trace_preempt_on+0x20/0xc0
[   14.615561]  ? __pfx_kthread+0x10/0x10
[   14.615581]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.615603]  ? calculate_sigpending+0x7b/0xa0
[   14.615626]  ? __pfx_kthread+0x10/0x10
[   14.615647]  ret_from_fork+0x116/0x1d0
[   14.615665]  ? __pfx_kthread+0x10/0x10
[   14.615686]  ret_from_fork_asm+0x1a/0x30
[   14.615715]  </TASK>
[   14.615726] 
[   14.626482] Allocated by task 278:
[   14.626855]  kasan_save_stack+0x45/0x70
[   14.627070]  kasan_save_track+0x18/0x40
[   14.627338]  kasan_save_alloc_info+0x3b/0x50
[   14.627548]  __kasan_kmalloc+0xb7/0xc0
[   14.627730]  __kmalloc_cache_noprof+0x189/0x420
[   14.627956]  kasan_bitops_generic+0x92/0x1c0
[   14.628480]  kunit_try_run_case+0x1a5/0x480
[   14.628684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.629026]  kthread+0x337/0x6f0
[   14.629371]  ret_from_fork+0x116/0x1d0
[   14.629623]  ret_from_fork_asm+0x1a/0x30
[   14.629923] 
[   14.630025] The buggy address belongs to the object at ffff8881025ca080
[   14.630025]  which belongs to the cache kmalloc-16 of size 16
[   14.630780] The buggy address is located 8 bytes inside of
[   14.630780]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.631536] 
[   14.631829] The buggy address belongs to the physical page:
[   14.632090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.632505] flags: 0x200000000000000(node=0|zone=2)
[   14.632730] page_type: f5(slab)
[   14.633072] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.633442] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.633866] page dumped because: kasan: bad access detected
[   14.634182] 
[   14.634261] Memory state around the buggy address:
[   14.634669]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.634998]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.635526] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.635942]                       ^
[   14.636226]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.636638]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.637019] ==================================================================
[   14.713967] ==================================================================
[   14.714361] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.714709] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.715021] 
[   14.715145] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.715187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.715199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.715220] Call Trace:
[   14.715235]  <TASK>
[   14.715249]  dump_stack_lvl+0x73/0xb0
[   14.715276]  print_report+0xd1/0x610
[   14.715298]  ? __virt_addr_valid+0x1db/0x2d0
[   14.715319]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.715344]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.715366]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.715392]  kasan_report+0x141/0x180
[   14.715414]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.715447]  kasan_check_range+0x10c/0x1c0
[   14.715471]  __kasan_check_write+0x18/0x20
[   14.715491]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.715517]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.715545]  ? ret_from_fork_asm+0x1a/0x30
[   14.715567]  ? kthread+0x337/0x6f0
[   14.715591]  kasan_bitops_generic+0x116/0x1c0
[   14.715616]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.715640]  ? __pfx_read_tsc+0x10/0x10
[   14.715660]  ? ktime_get_ts64+0x86/0x230
[   14.715683]  kunit_try_run_case+0x1a5/0x480
[   14.715707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.715729]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.715752]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.715776]  ? __kthread_parkme+0x82/0x180
[   14.715795]  ? preempt_count_sub+0x50/0x80
[   14.715829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.715852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.715875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.715899]  kthread+0x337/0x6f0
[   14.715917]  ? trace_preempt_on+0x20/0xc0
[   14.715940]  ? __pfx_kthread+0x10/0x10
[   14.715960]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.715981]  ? calculate_sigpending+0x7b/0xa0
[   14.716003]  ? __pfx_kthread+0x10/0x10
[   14.716025]  ret_from_fork+0x116/0x1d0
[   14.716043]  ? __pfx_kthread+0x10/0x10
[   14.716063]  ret_from_fork_asm+0x1a/0x30
[   14.716093]  </TASK>
[   14.716102] 
[   14.723713] Allocated by task 278:
[   14.723902]  kasan_save_stack+0x45/0x70
[   14.724075]  kasan_save_track+0x18/0x40
[   14.724254]  kasan_save_alloc_info+0x3b/0x50
[   14.724457]  __kasan_kmalloc+0xb7/0xc0
[   14.724628]  __kmalloc_cache_noprof+0x189/0x420
[   14.724841]  kasan_bitops_generic+0x92/0x1c0
[   14.725037]  kunit_try_run_case+0x1a5/0x480
[   14.725246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.725492]  kthread+0x337/0x6f0
[   14.725646]  ret_from_fork+0x116/0x1d0
[   14.725839]  ret_from_fork_asm+0x1a/0x30
[   14.726020] 
[   14.726105] The buggy address belongs to the object at ffff8881025ca080
[   14.726105]  which belongs to the cache kmalloc-16 of size 16
[   14.726484] The buggy address is located 8 bytes inside of
[   14.726484]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.726864] 
[   14.726974] The buggy address belongs to the physical page:
[   14.727228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.727662] flags: 0x200000000000000(node=0|zone=2)
[   14.727908] page_type: f5(slab)
[   14.728078] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.728412] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.728641] page dumped because: kasan: bad access detected
[   14.728821] 
[   14.728897] Memory state around the buggy address:
[   14.729162]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.729489]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.729820] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.730115]                       ^
[   14.730253]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.730526]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.730790] ==================================================================
[   14.639075] ==================================================================
[   14.639517] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.639935] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.640450] 
[   14.640630] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.640675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.640792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.640827] Call Trace:
[   14.640842]  <TASK>
[   14.640863]  dump_stack_lvl+0x73/0xb0
[   14.640892]  print_report+0xd1/0x610
[   14.640913]  ? __virt_addr_valid+0x1db/0x2d0
[   14.640936]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.640961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.640982]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.641008]  kasan_report+0x141/0x180
[   14.641029]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.641059]  kasan_check_range+0x10c/0x1c0
[   14.641082]  __kasan_check_write+0x18/0x20
[   14.641113]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.641139]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.641166]  ? ret_from_fork_asm+0x1a/0x30
[   14.641187]  ? kthread+0x337/0x6f0
[   14.641212]  kasan_bitops_generic+0x116/0x1c0
[   14.641236]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.641261]  ? __pfx_read_tsc+0x10/0x10
[   14.641281]  ? ktime_get_ts64+0x86/0x230
[   14.641304]  kunit_try_run_case+0x1a5/0x480
[   14.641329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.641352]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.641375]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.641398]  ? __kthread_parkme+0x82/0x180
[   14.641418]  ? preempt_count_sub+0x50/0x80
[   14.641441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.641464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.641488]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.641511]  kthread+0x337/0x6f0
[   14.641530]  ? trace_preempt_on+0x20/0xc0
[   14.641553]  ? __pfx_kthread+0x10/0x10
[   14.641574]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.641595]  ? calculate_sigpending+0x7b/0xa0
[   14.641620]  ? __pfx_kthread+0x10/0x10
[   14.641641]  ret_from_fork+0x116/0x1d0
[   14.641659]  ? __pfx_kthread+0x10/0x10
[   14.641680]  ret_from_fork_asm+0x1a/0x30
[   14.641709]  </TASK>
[   14.641720] 
[   14.650325] Allocated by task 278:
[   14.650511]  kasan_save_stack+0x45/0x70
[   14.650691]  kasan_save_track+0x18/0x40
[   14.650839]  kasan_save_alloc_info+0x3b/0x50
[   14.651032]  __kasan_kmalloc+0xb7/0xc0
[   14.651347]  __kmalloc_cache_noprof+0x189/0x420
[   14.651569]  kasan_bitops_generic+0x92/0x1c0
[   14.651762]  kunit_try_run_case+0x1a5/0x480
[   14.651950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.652203]  kthread+0x337/0x6f0
[   14.652349]  ret_from_fork+0x116/0x1d0
[   14.652516]  ret_from_fork_asm+0x1a/0x30
[   14.652684] 
[   14.652780] The buggy address belongs to the object at ffff8881025ca080
[   14.652780]  which belongs to the cache kmalloc-16 of size 16
[   14.653249] The buggy address is located 8 bytes inside of
[   14.653249]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.653690] 
[   14.653776] The buggy address belongs to the physical page:
[   14.654048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.654494] flags: 0x200000000000000(node=0|zone=2)
[   14.654677] page_type: f5(slab)
[   14.654799] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.655041] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.655269] page dumped because: kasan: bad access detected
[   14.655479] 
[   14.655573] Memory state around the buggy address:
[   14.655797]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.656177]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.656492] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.656807]                       ^
[   14.656993]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.657259]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.657475] ==================================================================