Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x86

[   47.042863] ==================================================================
[   47.050101] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.059055] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   47.066454] 
[   47.067955] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   47.067963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.067964] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   47.067968] Call Trace:
[   47.067969]  <TASK>
[   47.067971]  dump_stack_lvl+0x73/0xb0
[   47.067974]  print_report+0xd1/0x650
[   47.067978]  ? __virt_addr_valid+0x1db/0x2d0
[   47.067982]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.067986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.067990]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.067994]  kasan_report+0x141/0x180
[   47.067999]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.068004]  kasan_check_range+0x10c/0x1c0
[   47.068008]  __kasan_check_write+0x18/0x20
[   47.068012]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.068016]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   47.068021]  ? __kmalloc_cache_noprof+0x189/0x420
[   47.068024]  ? trace_hardirqs_on+0x37/0xe0
[   47.068028]  ? kasan_bitops_generic+0x92/0x1c0
[   47.068033]  kasan_bitops_generic+0x121/0x1c0
[   47.068036]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   47.068040]  ? ktime_get_ts64+0x83/0x230
[   47.068044]  kunit_try_run_case+0x1a2/0x480
[   47.068049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.068053]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   47.068057]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   47.068062]  ? __kthread_parkme+0x82/0x180
[   47.068066]  ? preempt_count_sub+0x50/0x80
[   47.068071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.068075]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.068079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.068083]  kthread+0x334/0x6f0
[   47.068087]  ? trace_preempt_on+0x20/0xc0
[   47.068091]  ? __pfx_kthread+0x10/0x10
[   47.068095]  ? _raw_spin_unlock_irq+0x47/0x80
[   47.068100]  ? calculate_sigpending+0x7b/0xa0
[   47.068103]  ? __pfx_kthread+0x10/0x10
[   47.068108]  ret_from_fork+0x3e/0x80
[   47.068112]  ? __pfx_kthread+0x10/0x10
[   47.068116]  ret_from_fork_asm+0x1a/0x30
[   47.068122]  </TASK>
[   47.068123] 
[   47.262874] Allocated by task 304:
[   47.266281]  kasan_save_stack+0x45/0x70
[   47.270119]  kasan_save_track+0x18/0x40
[   47.273960]  kasan_save_alloc_info+0x3b/0x50
[   47.278232]  __kasan_kmalloc+0xb7/0xc0
[   47.281984]  __kmalloc_cache_noprof+0x189/0x420
[   47.286518]  kasan_bitops_generic+0x92/0x1c0
[   47.290789]  kunit_try_run_case+0x1a2/0x480
[   47.294976]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.300382]  kthread+0x334/0x6f0
[   47.303617]  ret_from_fork+0x3e/0x80
[   47.307195]  ret_from_fork_asm+0x1a/0x30
[   47.311121] 
[   47.312621] The buggy address belongs to the object at ffff888104ed9160
[   47.312621]  which belongs to the cache kmalloc-16 of size 16
[   47.324960] The buggy address is located 8 bytes inside of
[   47.324960]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   47.337206] 
[   47.338710] The buggy address belongs to the physical page:
[   47.344304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   47.352312] flags: 0x200000000000000(node=0|zone=2)
[   47.357189] page_type: f5(slab)
[   47.360337] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   47.368075] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   47.375814] page dumped because: kasan: bad access detected
[   47.381387] 
[   47.382885] Memory state around the buggy address:
[   47.387709]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   47.394951]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   47.402178] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   47.409395]                                                           ^
[   47.416007]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.423229]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.430456] ==================================================================
[   49.017530] ==================================================================
[   49.024763] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.033744] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   49.041142] 
[   49.042642] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   49.042650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.042652] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   49.042655] Call Trace:
[   49.042656]  <TASK>
[   49.042658]  dump_stack_lvl+0x73/0xb0
[   49.042662]  print_report+0xd1/0x650
[   49.042685]  ? __virt_addr_valid+0x1db/0x2d0
[   49.042689]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.042694]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.042698]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.042703]  kasan_report+0x141/0x180
[   49.042720]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.042725]  kasan_check_range+0x10c/0x1c0
[   49.042742]  __kasan_check_write+0x18/0x20
[   49.042745]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.042750]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   49.042754]  ? __kmalloc_cache_noprof+0x189/0x420
[   49.042758]  ? trace_hardirqs_on+0x37/0xe0
[   49.042762]  ? kasan_bitops_generic+0x92/0x1c0
[   49.042766]  kasan_bitops_generic+0x121/0x1c0
[   49.042769]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   49.042773]  ? ktime_get_ts64+0x83/0x230
[   49.042778]  kunit_try_run_case+0x1a2/0x480
[   49.042782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.042786]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   49.042791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   49.042795]  ? __kthread_parkme+0x82/0x180
[   49.042799]  ? preempt_count_sub+0x50/0x80
[   49.042804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.042808]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.042812]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.042816]  kthread+0x334/0x6f0
[   49.042820]  ? trace_preempt_on+0x20/0xc0
[   49.042824]  ? __pfx_kthread+0x10/0x10
[   49.042829]  ? _raw_spin_unlock_irq+0x47/0x80
[   49.042833]  ? calculate_sigpending+0x7b/0xa0
[   49.042836]  ? __pfx_kthread+0x10/0x10
[   49.042841]  ret_from_fork+0x3e/0x80
[   49.042845]  ? __pfx_kthread+0x10/0x10
[   49.042849]  ret_from_fork_asm+0x1a/0x30
[   49.042855]  </TASK>
[   49.042856] 
[   49.237656] Allocated by task 304:
[   49.241089]  kasan_save_stack+0x45/0x70
[   49.244927]  kasan_save_track+0x18/0x40
[   49.248768]  kasan_save_alloc_info+0x3b/0x50
[   49.253040]  __kasan_kmalloc+0xb7/0xc0
[   49.256794]  __kmalloc_cache_noprof+0x189/0x420
[   49.261326]  kasan_bitops_generic+0x92/0x1c0
[   49.265597]  kunit_try_run_case+0x1a2/0x480
[   49.269782]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.275184]  kthread+0x334/0x6f0
[   49.278423]  ret_from_fork+0x3e/0x80
[   49.282002]  ret_from_fork_asm+0x1a/0x30
[   49.285930] 
[   49.287429] The buggy address belongs to the object at ffff888104ed9160
[   49.287429]  which belongs to the cache kmalloc-16 of size 16
[   49.299768] The buggy address is located 8 bytes inside of
[   49.299768]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   49.312023] 
[   49.313521] The buggy address belongs to the physical page:
[   49.319095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   49.327101] flags: 0x200000000000000(node=0|zone=2)
[   49.331981] page_type: f5(slab)
[   49.335127] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   49.342866] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   49.350606] page dumped because: kasan: bad access detected
[   49.356178] 
[   49.357700] Memory state around the buggy address:
[   49.362538]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   49.369759]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   49.376985] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   49.384203]                                                           ^
[   49.390817]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.398034]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.405256] ==================================================================
[   47.832694] ==================================================================
[   47.839961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   47.848915] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   47.856308] 
[   47.857808] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   47.857815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.857817] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   47.857821] Call Trace:
[   47.857822]  <TASK>
[   47.857824]  dump_stack_lvl+0x73/0xb0
[   47.857827]  print_report+0xd1/0x650
[   47.857832]  ? __virt_addr_valid+0x1db/0x2d0
[   47.857835]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   47.857839]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.857844]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   47.857848]  kasan_report+0x141/0x180
[   47.857852]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   47.857857]  kasan_check_range+0x10c/0x1c0
[   47.857862]  __kasan_check_write+0x18/0x20
[   47.857866]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   47.857870]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   47.857874]  ? __kmalloc_cache_noprof+0x189/0x420
[   47.857878]  ? trace_hardirqs_on+0x37/0xe0
[   47.857882]  ? kasan_bitops_generic+0x92/0x1c0
[   47.857886]  kasan_bitops_generic+0x121/0x1c0
[   47.857890]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   47.857893]  ? ktime_get_ts64+0x83/0x230
[   47.857898]  kunit_try_run_case+0x1a2/0x480
[   47.857902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.857906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   47.857911]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   47.857915]  ? __kthread_parkme+0x82/0x180
[   47.857919]  ? preempt_count_sub+0x50/0x80
[   47.857924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.857928]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.857932]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.857936]  kthread+0x334/0x6f0
[   47.857940]  ? trace_preempt_on+0x20/0xc0
[   47.857944]  ? __pfx_kthread+0x10/0x10
[   47.857948]  ? _raw_spin_unlock_irq+0x47/0x80
[   47.857952]  ? calculate_sigpending+0x7b/0xa0
[   47.857956]  ? __pfx_kthread+0x10/0x10
[   47.857961]  ret_from_fork+0x3e/0x80
[   47.857965]  ? __pfx_kthread+0x10/0x10
[   47.857969]  ret_from_fork_asm+0x1a/0x30
[   47.857974]  </TASK>
[   47.857976] 
[   48.052779] Allocated by task 304:
[   48.056187]  kasan_save_stack+0x45/0x70
[   48.060023]  kasan_save_track+0x18/0x40
[   48.063864]  kasan_save_alloc_info+0x3b/0x50
[   48.068137]  __kasan_kmalloc+0xb7/0xc0
[   48.071890]  __kmalloc_cache_noprof+0x189/0x420
[   48.076421]  kasan_bitops_generic+0x92/0x1c0
[   48.080702]  kunit_try_run_case+0x1a2/0x480
[   48.084941]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.090347]  kthread+0x334/0x6f0
[   48.093581]  ret_from_fork+0x3e/0x80
[   48.097158]  ret_from_fork_asm+0x1a/0x30
[   48.101085] 
[   48.102583] The buggy address belongs to the object at ffff888104ed9160
[   48.102583]  which belongs to the cache kmalloc-16 of size 16
[   48.114918] The buggy address is located 8 bytes inside of
[   48.114918]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   48.127170] 
[   48.128662] The buggy address belongs to the physical page:
[   48.134260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   48.142259] flags: 0x200000000000000(node=0|zone=2)
[   48.147138] page_type: f5(slab)
[   48.150285] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   48.158034] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   48.165778] page dumped because: kasan: bad access detected
[   48.171351] 
[   48.172849] Memory state around the buggy address:
[   48.177645]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   48.184872]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   48.192090] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.199310]                                                           ^
[   48.205923]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.213148]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.220369] ==================================================================
[   48.622437] ==================================================================
[   48.629706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.638706] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   48.646124] 
[   48.647625] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   48.647632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.647634] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   48.647637] Call Trace:
[   48.647639]  <TASK>
[   48.647640]  dump_stack_lvl+0x73/0xb0
[   48.647644]  print_report+0xd1/0x650
[   48.647648]  ? __virt_addr_valid+0x1db/0x2d0
[   48.647652]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.647656]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.647660]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.647684]  kasan_report+0x141/0x180
[   48.647688]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.647694]  kasan_check_range+0x10c/0x1c0
[   48.647699]  __kasan_check_write+0x18/0x20
[   48.647703]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.647720]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.647725]  ? __kmalloc_cache_noprof+0x189/0x420
[   48.647728]  ? trace_hardirqs_on+0x37/0xe0
[   48.647745]  ? kasan_bitops_generic+0x92/0x1c0
[   48.647749]  kasan_bitops_generic+0x121/0x1c0
[   48.647752]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.647756]  ? ktime_get_ts64+0x83/0x230
[   48.647761]  kunit_try_run_case+0x1a2/0x480
[   48.647765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.647769]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   48.647773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   48.647778]  ? __kthread_parkme+0x82/0x180
[   48.647782]  ? preempt_count_sub+0x50/0x80
[   48.647786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.647791]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.647794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.647798]  kthread+0x334/0x6f0
[   48.647802]  ? trace_preempt_on+0x20/0xc0
[   48.647807]  ? __pfx_kthread+0x10/0x10
[   48.647811]  ? _raw_spin_unlock_irq+0x47/0x80
[   48.647815]  ? calculate_sigpending+0x7b/0xa0
[   48.647818]  ? __pfx_kthread+0x10/0x10
[   48.647823]  ret_from_fork+0x3e/0x80
[   48.647827]  ? __pfx_kthread+0x10/0x10
[   48.647831]  ret_from_fork_asm+0x1a/0x30
[   48.647836]  </TASK>
[   48.647838] 
[   48.842743] Allocated by task 304:
[   48.846149]  kasan_save_stack+0x45/0x70
[   48.849989]  kasan_save_track+0x18/0x40
[   48.853830]  kasan_save_alloc_info+0x3b/0x50
[   48.858102]  __kasan_kmalloc+0xb7/0xc0
[   48.861854]  __kmalloc_cache_noprof+0x189/0x420
[   48.866385]  kasan_bitops_generic+0x92/0x1c0
[   48.870657]  kunit_try_run_case+0x1a2/0x480
[   48.874880]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.880288]  kthread+0x334/0x6f0
[   48.883520]  ret_from_fork+0x3e/0x80
[   48.887100]  ret_from_fork_asm+0x1a/0x30
[   48.891025] 
[   48.892525] The buggy address belongs to the object at ffff888104ed9160
[   48.892525]  which belongs to the cache kmalloc-16 of size 16
[   48.904863] The buggy address is located 8 bytes inside of
[   48.904863]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   48.917120] 
[   48.918618] The buggy address belongs to the physical page:
[   48.924191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   48.932198] flags: 0x200000000000000(node=0|zone=2)
[   48.937076] page_type: f5(slab)
[   48.940222] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   48.947963] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   48.955701] page dumped because: kasan: bad access detected
[   48.961300] 
[   48.962798] Memory state around the buggy address:
[   48.967592]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   48.974811]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   48.982036] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.989257]                                                           ^
[   48.995870]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.003087]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.010308] ==================================================================
[   46.648053] ==================================================================
[   46.655285] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.664243] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   46.671637] 
[   46.673138] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   46.673145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.673147] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   46.673151] Call Trace:
[   46.673152]  <TASK>
[   46.673154]  dump_stack_lvl+0x73/0xb0
[   46.673157]  print_report+0xd1/0x650
[   46.673161]  ? __virt_addr_valid+0x1db/0x2d0
[   46.673165]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.673169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.673173]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.673178]  kasan_report+0x141/0x180
[   46.673182]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.673187]  kasan_check_range+0x10c/0x1c0
[   46.673192]  __kasan_check_write+0x18/0x20
[   46.673195]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.673199]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   46.673204]  ? __kmalloc_cache_noprof+0x189/0x420
[   46.673207]  ? trace_hardirqs_on+0x37/0xe0
[   46.673212]  ? kasan_bitops_generic+0x92/0x1c0
[   46.673216]  kasan_bitops_generic+0x121/0x1c0
[   46.673219]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   46.673223]  ? ktime_get_ts64+0x83/0x230
[   46.673228]  kunit_try_run_case+0x1a2/0x480
[   46.673232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.673236]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   46.673241]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   46.673245]  ? __kthread_parkme+0x82/0x180
[   46.673249]  ? preempt_count_sub+0x50/0x80
[   46.673254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.673258]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.673262]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.673266]  kthread+0x334/0x6f0
[   46.673270]  ? trace_preempt_on+0x20/0xc0
[   46.673274]  ? __pfx_kthread+0x10/0x10
[   46.673278]  ? _raw_spin_unlock_irq+0x47/0x80
[   46.673283]  ? calculate_sigpending+0x7b/0xa0
[   46.673286]  ? __pfx_kthread+0x10/0x10
[   46.673291]  ret_from_fork+0x3e/0x80
[   46.673294]  ? __pfx_kthread+0x10/0x10
[   46.673299]  ret_from_fork_asm+0x1a/0x30
[   46.673304]  </TASK>
[   46.673306] 
[   46.868154] Allocated by task 304:
[   46.871560]  kasan_save_stack+0x45/0x70
[   46.875399]  kasan_save_track+0x18/0x40
[   46.879236]  kasan_save_alloc_info+0x3b/0x50
[   46.883510]  __kasan_kmalloc+0xb7/0xc0
[   46.887262]  __kmalloc_cache_noprof+0x189/0x420
[   46.891794]  kasan_bitops_generic+0x92/0x1c0
[   46.896067]  kunit_try_run_case+0x1a2/0x480
[   46.900253]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.905651]  kthread+0x334/0x6f0
[   46.908884]  ret_from_fork+0x3e/0x80
[   46.912464]  ret_from_fork_asm+0x1a/0x30
[   46.916389] 
[   46.917887] The buggy address belongs to the object at ffff888104ed9160
[   46.917887]  which belongs to the cache kmalloc-16 of size 16
[   46.930222] The buggy address is located 8 bytes inside of
[   46.930222]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   46.942475] 
[   46.943973] The buggy address belongs to the physical page:
[   46.949547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   46.957547] flags: 0x200000000000000(node=0|zone=2)
[   46.962426] page_type: f5(slab)
[   46.965573] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   46.973318] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.981059] page dumped because: kasan: bad access detected
[   46.986629] 
[   46.988130] Memory state around the buggy address:
[   46.992921]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   47.000142]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   47.007368] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   47.014588]                                                           ^
[   47.021199]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.028417]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.035639] ==================================================================
[   48.227592] ==================================================================
[   48.234808] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.243768] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   48.251169] 
[   48.252668] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   48.252695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.252697] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   48.252701] Call Trace:
[   48.252702]  <TASK>
[   48.252704]  dump_stack_lvl+0x73/0xb0
[   48.252708]  print_report+0xd1/0x650
[   48.252712]  ? __virt_addr_valid+0x1db/0x2d0
[   48.252728]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.252733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.252737]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.252741]  kasan_report+0x141/0x180
[   48.252746]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.252751]  kasan_check_range+0x10c/0x1c0
[   48.252756]  __kasan_check_write+0x18/0x20
[   48.252760]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.252764]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.252768]  ? __kmalloc_cache_noprof+0x189/0x420
[   48.252772]  ? trace_hardirqs_on+0x37/0xe0
[   48.252776]  ? kasan_bitops_generic+0x92/0x1c0
[   48.252781]  kasan_bitops_generic+0x121/0x1c0
[   48.252784]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.252788]  ? ktime_get_ts64+0x83/0x230
[   48.252793]  kunit_try_run_case+0x1a2/0x480
[   48.252797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.252801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   48.252806]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   48.252811]  ? __kthread_parkme+0x82/0x180
[   48.252815]  ? preempt_count_sub+0x50/0x80
[   48.252820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.252824]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.252828]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.252832]  kthread+0x334/0x6f0
[   48.252836]  ? trace_preempt_on+0x20/0xc0
[   48.252841]  ? __pfx_kthread+0x10/0x10
[   48.252845]  ? _raw_spin_unlock_irq+0x47/0x80
[   48.252849]  ? calculate_sigpending+0x7b/0xa0
[   48.252853]  ? __pfx_kthread+0x10/0x10
[   48.252858]  ret_from_fork+0x3e/0x80
[   48.252862]  ? __pfx_kthread+0x10/0x10
[   48.252866]  ret_from_fork_asm+0x1a/0x30
[   48.252872]  </TASK>
[   48.252873] 
[   48.447624] Allocated by task 304:
[   48.451028]  kasan_save_stack+0x45/0x70
[   48.454870]  kasan_save_track+0x18/0x40
[   48.458734]  kasan_save_alloc_info+0x3b/0x50
[   48.463007]  __kasan_kmalloc+0xb7/0xc0
[   48.466758]  __kmalloc_cache_noprof+0x189/0x420
[   48.471291]  kasan_bitops_generic+0x92/0x1c0
[   48.475565]  kunit_try_run_case+0x1a2/0x480
[   48.479749]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.485150]  kthread+0x334/0x6f0
[   48.488389]  ret_from_fork+0x3e/0x80
[   48.491968]  ret_from_fork_asm+0x1a/0x30
[   48.495893] 
[   48.497386] The buggy address belongs to the object at ffff888104ed9160
[   48.497386]  which belongs to the cache kmalloc-16 of size 16
[   48.509735] The buggy address is located 8 bytes inside of
[   48.509735]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   48.521989] 
[   48.523489] The buggy address belongs to the physical page:
[   48.529061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   48.537067] flags: 0x200000000000000(node=0|zone=2)
[   48.541948] page_type: f5(slab)
[   48.545094] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   48.552831] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   48.560571] page dumped because: kasan: bad access detected
[   48.566143] 
[   48.567641] Memory state around the buggy address:
[   48.572436]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   48.579655]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   48.586909] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.594128]                                                           ^
[   48.600764]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.607986]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.615211] ==================================================================
[   49.412479] ==================================================================
[   49.419761] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.428737] Read of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   49.436044] 
[   49.437547] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   49.437555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.437557] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   49.437560] Call Trace:
[   49.437562]  <TASK>
[   49.437563]  dump_stack_lvl+0x73/0xb0
[   49.437567]  print_report+0xd1/0x650
[   49.437571]  ? __virt_addr_valid+0x1db/0x2d0
[   49.437574]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.437579]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.437583]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.437587]  kasan_report+0x141/0x180
[   49.437592]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.437597]  kasan_check_range+0x10c/0x1c0
[   49.437602]  __kasan_check_read+0x15/0x20
[   49.437605]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.437610]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   49.437614]  ? __kmalloc_cache_noprof+0x189/0x420
[   49.437618]  ? trace_hardirqs_on+0x37/0xe0
[   49.437622]  ? kasan_bitops_generic+0x92/0x1c0
[   49.437626]  kasan_bitops_generic+0x121/0x1c0
[   49.437630]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   49.437634]  ? ktime_get_ts64+0x83/0x230
[   49.437639]  kunit_try_run_case+0x1a2/0x480
[   49.437643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.437647]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   49.437652]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   49.437657]  ? __kthread_parkme+0x82/0x180
[   49.437661]  ? preempt_count_sub+0x50/0x80
[   49.437665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.437689]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.437693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.437698]  kthread+0x334/0x6f0
[   49.437702]  ? trace_preempt_on+0x20/0xc0
[   49.437706]  ? __pfx_kthread+0x10/0x10
[   49.437711]  ? _raw_spin_unlock_irq+0x47/0x80
[   49.437715]  ? calculate_sigpending+0x7b/0xa0
[   49.437733]  ? __pfx_kthread+0x10/0x10
[   49.437738]  ret_from_fork+0x3e/0x80
[   49.437742]  ? __pfx_kthread+0x10/0x10
[   49.437746]  ret_from_fork_asm+0x1a/0x30
[   49.437752]  </TASK>
[   49.437753] 
[   49.632465] Allocated by task 304:
[   49.635874]  kasan_save_stack+0x45/0x70
[   49.639760]  kasan_save_track+0x18/0x40
[   49.643604]  kasan_save_alloc_info+0x3b/0x50
[   49.647876]  __kasan_kmalloc+0xb7/0xc0
[   49.651629]  __kmalloc_cache_noprof+0x189/0x420
[   49.656168]  kasan_bitops_generic+0x92/0x1c0
[   49.660441]  kunit_try_run_case+0x1a2/0x480
[   49.664626]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.670027]  kthread+0x334/0x6f0
[   49.673258]  ret_from_fork+0x3e/0x80
[   49.676839]  ret_from_fork_asm+0x1a/0x30
[   49.680772] 
[   49.682272] The buggy address belongs to the object at ffff888104ed9160
[   49.682272]  which belongs to the cache kmalloc-16 of size 16
[   49.694614] The buggy address is located 8 bytes inside of
[   49.694614]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   49.706868] 
[   49.708367] The buggy address belongs to the physical page:
[   49.713937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   49.721938] flags: 0x200000000000000(node=0|zone=2)
[   49.726816] page_type: f5(slab)
[   49.729963] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   49.737711] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   49.745476] page dumped because: kasan: bad access detected
[   49.751047] 
[   49.752548] Memory state around the buggy address:
[   49.757339]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   49.764559]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   49.771787] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   49.779012]                                                           ^
[   49.785628]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.792853]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.800073] ==================================================================
[   49.807298] ==================================================================
[   49.814529] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   49.823489] Read of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   49.830802] 
[   49.832303] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   49.832310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.832312] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   49.832315] Call Trace:
[   49.832317]  <TASK>
[   49.832319]  dump_stack_lvl+0x73/0xb0
[   49.832322]  print_report+0xd1/0x650
[   49.832326]  ? __virt_addr_valid+0x1db/0x2d0
[   49.832330]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   49.832334]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.832338]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   49.832343]  kasan_report+0x141/0x180
[   49.832347]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   49.832352]  __asan_report_load8_noabort+0x18/0x20
[   49.832356]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   49.832360]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   49.832365]  ? __kmalloc_cache_noprof+0x189/0x420
[   49.832368]  ? trace_hardirqs_on+0x37/0xe0
[   49.832372]  ? kasan_bitops_generic+0x92/0x1c0
[   49.832377]  kasan_bitops_generic+0x121/0x1c0
[   49.832380]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   49.832384]  ? ktime_get_ts64+0x83/0x230
[   49.832389]  kunit_try_run_case+0x1a2/0x480
[   49.832393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.832397]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   49.832402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   49.832406]  ? __kthread_parkme+0x82/0x180
[   49.832410]  ? preempt_count_sub+0x50/0x80
[   49.832415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.832419]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.832423]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.832427]  kthread+0x334/0x6f0
[   49.832431]  ? trace_preempt_on+0x20/0xc0
[   49.832436]  ? __pfx_kthread+0x10/0x10
[   49.832440]  ? _raw_spin_unlock_irq+0x47/0x80
[   49.832444]  ? calculate_sigpending+0x7b/0xa0
[   49.832448]  ? __pfx_kthread+0x10/0x10
[   49.832452]  ret_from_fork+0x3e/0x80
[   49.832456]  ? __pfx_kthread+0x10/0x10
[   49.832461]  ret_from_fork_asm+0x1a/0x30
[   49.832466]  </TASK>
[   49.832468] 
[   50.023853] Allocated by task 304:
[   50.027259]  kasan_save_stack+0x45/0x70
[   50.031098]  kasan_save_track+0x18/0x40
[   50.034937]  kasan_save_alloc_info+0x3b/0x50
[   50.039210]  __kasan_kmalloc+0xb7/0xc0
[   50.042971]  __kmalloc_cache_noprof+0x189/0x420
[   50.047512]  kasan_bitops_generic+0x92/0x1c0
[   50.051784]  kunit_try_run_case+0x1a2/0x480
[   50.055971]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.061377]  kthread+0x334/0x6f0
[   50.064609]  ret_from_fork+0x3e/0x80
[   50.068189]  ret_from_fork_asm+0x1a/0x30
[   50.072115] 
[   50.073614] The buggy address belongs to the object at ffff888104ed9160
[   50.073614]  which belongs to the cache kmalloc-16 of size 16
[   50.085956] The buggy address is located 8 bytes inside of
[   50.085956]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   50.098209] 
[   50.099710] The buggy address belongs to the physical page:
[   50.105323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   50.113323] flags: 0x200000000000000(node=0|zone=2)
[   50.118204] page_type: f5(slab)
[   50.121349] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   50.129098] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   50.136843] page dumped because: kasan: bad access detected
[   50.142416] 
[   50.143916] Memory state around the buggy address:
[   50.148709]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   50.155954]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   50.163182] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   50.170409]                                                           ^
[   50.177021]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.184238]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.191459] ==================================================================
[   47.437740] ==================================================================
[   47.444963] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.453915] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   47.461307] 
[   47.462808] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   47.462816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.462818] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   47.462822] Call Trace:
[   47.462823]  <TASK>
[   47.462825]  dump_stack_lvl+0x73/0xb0
[   47.462828]  print_report+0xd1/0x650
[   47.462833]  ? __virt_addr_valid+0x1db/0x2d0
[   47.462836]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.462841]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.462845]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.462849]  kasan_report+0x141/0x180
[   47.462854]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.462859]  kasan_check_range+0x10c/0x1c0
[   47.462864]  __kasan_check_write+0x18/0x20
[   47.462868]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.462872]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   47.462877]  ? __kmalloc_cache_noprof+0x189/0x420
[   47.462880]  ? trace_hardirqs_on+0x37/0xe0
[   47.462884]  ? kasan_bitops_generic+0x92/0x1c0
[   47.462889]  kasan_bitops_generic+0x121/0x1c0
[   47.462892]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   47.462896]  ? ktime_get_ts64+0x83/0x230
[   47.462901]  kunit_try_run_case+0x1a2/0x480
[   47.462905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.462910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   47.462914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   47.462919]  ? __kthread_parkme+0x82/0x180
[   47.462923]  ? preempt_count_sub+0x50/0x80
[   47.462928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.462933]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.462937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.462941]  kthread+0x334/0x6f0
[   47.462945]  ? trace_preempt_on+0x20/0xc0
[   47.462949]  ? __pfx_kthread+0x10/0x10
[   47.462954]  ? _raw_spin_unlock_irq+0x47/0x80
[   47.462958]  ? calculate_sigpending+0x7b/0xa0
[   47.462962]  ? __pfx_kthread+0x10/0x10
[   47.462966]  ret_from_fork+0x3e/0x80
[   47.462970]  ? __pfx_kthread+0x10/0x10
[   47.462975]  ret_from_fork_asm+0x1a/0x30
[   47.462981]  </TASK>
[   47.462982] 
[   47.657789] Allocated by task 304:
[   47.661196]  kasan_save_stack+0x45/0x70
[   47.665044]  kasan_save_track+0x18/0x40
[   47.668890]  kasan_save_alloc_info+0x3b/0x50
[   47.673164]  __kasan_kmalloc+0xb7/0xc0
[   47.676915]  __kmalloc_cache_noprof+0x189/0x420
[   47.681446]  kasan_bitops_generic+0x92/0x1c0
[   47.685762]  kunit_try_run_case+0x1a2/0x480
[   47.689948]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.695348]  kthread+0x334/0x6f0
[   47.698581]  ret_from_fork+0x3e/0x80
[   47.702158]  ret_from_fork_asm+0x1a/0x30
[   47.706086] 
[   47.707586] The buggy address belongs to the object at ffff888104ed9160
[   47.707586]  which belongs to the cache kmalloc-16 of size 16
[   47.719925] The buggy address is located 8 bytes inside of
[   47.719925]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   47.732173] 
[   47.733702] The buggy address belongs to the physical page:
[   47.739320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   47.747319] flags: 0x200000000000000(node=0|zone=2)
[   47.752198] page_type: f5(slab)
[   47.755345] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   47.763086] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   47.770830] page dumped because: kasan: bad access detected
[   47.776404] 
[   47.777904] Memory state around the buggy address:
[   47.782702]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   47.789949]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   47.797167] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   47.804387]                                                           ^
[   47.811001]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.818221]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.825447] ==================================================================