Hay
Date
June 5, 2025, 7:08 a.m.

Environment
qemu-x86_64

[   13.728771] ==================================================================
[   13.729165] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.729485] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.729832] 
[   13.729975] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.730023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.730035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.730056] Call Trace:
[   13.730069]  <TASK>
[   13.730082]  dump_stack_lvl+0x73/0xb0
[   13.730106]  print_report+0xd1/0x650
[   13.730128]  ? __virt_addr_valid+0x1db/0x2d0
[   13.730150]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.730178]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.730200]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.730228]  kasan_report+0x141/0x180
[   13.730249]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.730281]  kasan_check_range+0x10c/0x1c0
[   13.730305]  __kasan_check_write+0x18/0x20
[   13.730324]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.730352]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.730380]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.730404]  ? trace_hardirqs_on+0x37/0xe0
[   13.730425]  ? kasan_bitops_generic+0x92/0x1c0
[   13.730452]  kasan_bitops_generic+0x121/0x1c0
[   13.730475]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.730500]  ? __pfx_read_tsc+0x10/0x10
[   13.730521]  ? ktime_get_ts64+0x86/0x230
[   13.730543]  kunit_try_run_case+0x1a5/0x480
[   13.730563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.730582]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.730607]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.730651]  ? __kthread_parkme+0x82/0x180
[   13.730671]  ? preempt_count_sub+0x50/0x80
[   13.730694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.730714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.730738]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.730763]  kthread+0x337/0x6f0
[   13.730781]  ? trace_preempt_on+0x20/0xc0
[   13.730803]  ? __pfx_kthread+0x10/0x10
[   13.730823]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.730844]  ? calculate_sigpending+0x7b/0xa0
[   13.730869]  ? __pfx_kthread+0x10/0x10
[   13.730889]  ret_from_fork+0x116/0x1d0
[   13.730915]  ? __pfx_kthread+0x10/0x10
[   13.730981]  ret_from_fork_asm+0x1a/0x30
[   13.731012]  </TASK>
[   13.731023] 
[   13.743162] Allocated by task 278:
[   13.743303]  kasan_save_stack+0x45/0x70
[   13.744103]  kasan_save_track+0x18/0x40
[   13.744409]  kasan_save_alloc_info+0x3b/0x50
[   13.744573]  __kasan_kmalloc+0xb7/0xc0
[   13.745293]  __kmalloc_cache_noprof+0x189/0x420
[   13.746632]  kasan_bitops_generic+0x92/0x1c0
[   13.747131]  kunit_try_run_case+0x1a5/0x480
[   13.747284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.747476]  kthread+0x337/0x6f0
[   13.748208]  ret_from_fork+0x116/0x1d0
[   13.748709]  ret_from_fork_asm+0x1a/0x30
[   13.748882] 
[   13.749002] The buggy address belongs to the object at ffff888102ae9140
[   13.749002]  which belongs to the cache kmalloc-16 of size 16
[   13.749713] The buggy address is located 8 bytes inside of
[   13.749713]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.750386] 
[   13.750489] The buggy address belongs to the physical page:
[   13.750997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.751306] flags: 0x200000000000000(node=0|zone=2)
[   13.751554] page_type: f5(slab)
[   13.751705] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.752220] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.752658] page dumped because: kasan: bad access detected
[   13.752854] 
[   13.752955] Memory state around the buggy address:
[   13.753297]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.753845]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.754309] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.754606]                                               ^
[   13.754845]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.755276]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.755576] ==================================================================
[   13.776147] ==================================================================
[   13.776483] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.777076] Read of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.777402] 
[   13.777501] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.777542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.777553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.777572] Call Trace:
[   13.777587]  <TASK>
[   13.777601]  dump_stack_lvl+0x73/0xb0
[   13.777624]  print_report+0xd1/0x650
[   13.777645]  ? __virt_addr_valid+0x1db/0x2d0
[   13.777668]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.777695]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.777717]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.777745]  kasan_report+0x141/0x180
[   13.777783]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.777815]  kasan_check_range+0x10c/0x1c0
[   13.777839]  __kasan_check_read+0x15/0x20
[   13.777858]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.777886]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.777925]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.777948]  ? trace_hardirqs_on+0x37/0xe0
[   13.777970]  ? kasan_bitops_generic+0x92/0x1c0
[   13.777997]  kasan_bitops_generic+0x121/0x1c0
[   13.778021]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.778046]  ? __pfx_read_tsc+0x10/0x10
[   13.778066]  ? ktime_get_ts64+0x86/0x230
[   13.778090]  kunit_try_run_case+0x1a5/0x480
[   13.778111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.778130]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.778155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.778180]  ? __kthread_parkme+0x82/0x180
[   13.778200]  ? preempt_count_sub+0x50/0x80
[   13.778223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.778243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.778268]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.778292]  kthread+0x337/0x6f0
[   13.778311]  ? trace_preempt_on+0x20/0xc0
[   13.778332]  ? __pfx_kthread+0x10/0x10
[   13.778353]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.778375]  ? calculate_sigpending+0x7b/0xa0
[   13.778399]  ? __pfx_kthread+0x10/0x10
[   13.778420]  ret_from_fork+0x116/0x1d0
[   13.778438]  ? __pfx_kthread+0x10/0x10
[   13.778459]  ret_from_fork_asm+0x1a/0x30
[   13.778488]  </TASK>
[   13.778498] 
[   13.786850] Allocated by task 278:
[   13.786998]  kasan_save_stack+0x45/0x70
[   13.787143]  kasan_save_track+0x18/0x40
[   13.787278]  kasan_save_alloc_info+0x3b/0x50
[   13.787535]  __kasan_kmalloc+0xb7/0xc0
[   13.787778]  __kmalloc_cache_noprof+0x189/0x420
[   13.788014]  kasan_bitops_generic+0x92/0x1c0
[   13.788221]  kunit_try_run_case+0x1a5/0x480
[   13.788423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.788646]  kthread+0x337/0x6f0
[   13.788767]  ret_from_fork+0x116/0x1d0
[   13.788906]  ret_from_fork_asm+0x1a/0x30
[   13.789048] 
[   13.789118] The buggy address belongs to the object at ffff888102ae9140
[   13.789118]  which belongs to the cache kmalloc-16 of size 16
[   13.789966] The buggy address is located 8 bytes inside of
[   13.789966]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.790502] 
[   13.790600] The buggy address belongs to the physical page:
[   13.791249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.791626] flags: 0x200000000000000(node=0|zone=2)
[   13.791860] page_type: f5(slab)
[   13.792121] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.792373] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.792617] page dumped because: kasan: bad access detected
[   13.792882] 
[   13.793050] Memory state around the buggy address:
[   13.793277]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.793565]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.793887] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.794292]                                               ^
[   13.794504]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.794821]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.795046] ==================================================================
[   13.756265] ==================================================================
[   13.756563] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.757162] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.757462] 
[   13.757578] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.757622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.757633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.757655] Call Trace:
[   13.757668]  <TASK>
[   13.757682]  dump_stack_lvl+0x73/0xb0
[   13.757708]  print_report+0xd1/0x650
[   13.757730]  ? __virt_addr_valid+0x1db/0x2d0
[   13.757754]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.757782]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.757823]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.757851]  kasan_report+0x141/0x180
[   13.757873]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.757916]  kasan_check_range+0x10c/0x1c0
[   13.757939]  __kasan_check_write+0x18/0x20
[   13.757959]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.757986]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.758015]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.758038]  ? trace_hardirqs_on+0x37/0xe0
[   13.758059]  ? kasan_bitops_generic+0x92/0x1c0
[   13.758085]  kasan_bitops_generic+0x121/0x1c0
[   13.758158]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.758186]  ? __pfx_read_tsc+0x10/0x10
[   13.758207]  ? ktime_get_ts64+0x86/0x230
[   13.758230]  kunit_try_run_case+0x1a5/0x480
[   13.758251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.758270]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.758295]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.758318]  ? __kthread_parkme+0x82/0x180
[   13.758338]  ? preempt_count_sub+0x50/0x80
[   13.758361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.758382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.758406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.758430]  kthread+0x337/0x6f0
[   13.758449]  ? trace_preempt_on+0x20/0xc0
[   13.758470]  ? __pfx_kthread+0x10/0x10
[   13.758490]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.758511]  ? calculate_sigpending+0x7b/0xa0
[   13.758535]  ? __pfx_kthread+0x10/0x10
[   13.758555]  ret_from_fork+0x116/0x1d0
[   13.758574]  ? __pfx_kthread+0x10/0x10
[   13.758593]  ret_from_fork_asm+0x1a/0x30
[   13.758623]  </TASK>
[   13.758653] 
[   13.767546] Allocated by task 278:
[   13.767834]  kasan_save_stack+0x45/0x70
[   13.768155]  kasan_save_track+0x18/0x40
[   13.768346]  kasan_save_alloc_info+0x3b/0x50
[   13.768538]  __kasan_kmalloc+0xb7/0xc0
[   13.768771]  __kmalloc_cache_noprof+0x189/0x420
[   13.768985]  kasan_bitops_generic+0x92/0x1c0
[   13.769170]  kunit_try_run_case+0x1a5/0x480
[   13.769316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.769493]  kthread+0x337/0x6f0
[   13.769622]  ret_from_fork+0x116/0x1d0
[   13.769806]  ret_from_fork_asm+0x1a/0x30
[   13.770146] 
[   13.770243] The buggy address belongs to the object at ffff888102ae9140
[   13.770243]  which belongs to the cache kmalloc-16 of size 16
[   13.770855] The buggy address is located 8 bytes inside of
[   13.770855]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.771301] 
[   13.771408] The buggy address belongs to the physical page:
[   13.771694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.772255] flags: 0x200000000000000(node=0|zone=2)
[   13.772447] page_type: f5(slab)
[   13.772615] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.773048] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.773351] page dumped because: kasan: bad access detected
[   13.773550] 
[   13.773620] Memory state around the buggy address:
[   13.773772]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.774074]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.774392] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.774823]                                               ^
[   13.775177]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.775475]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.775772] ==================================================================
[   13.663478] ==================================================================
[   13.664055] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.664465] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.664781] 
[   13.664864] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.664917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.664930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.664951] Call Trace:
[   13.664963]  <TASK>
[   13.664976]  dump_stack_lvl+0x73/0xb0
[   13.664999]  print_report+0xd1/0x650
[   13.665021]  ? __virt_addr_valid+0x1db/0x2d0
[   13.665048]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.665075]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.665098]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.665125]  kasan_report+0x141/0x180
[   13.665148]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.665179]  kasan_check_range+0x10c/0x1c0
[   13.665203]  __kasan_check_write+0x18/0x20
[   13.665221]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.665249]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.665277]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.665301]  ? trace_hardirqs_on+0x37/0xe0
[   13.665321]  ? kasan_bitops_generic+0x92/0x1c0
[   13.665348]  kasan_bitops_generic+0x121/0x1c0
[   13.665371]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.665396]  ? __pfx_read_tsc+0x10/0x10
[   13.665415]  ? ktime_get_ts64+0x86/0x230
[   13.665439]  kunit_try_run_case+0x1a5/0x480
[   13.665459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.665478]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.665503]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.665526]  ? __kthread_parkme+0x82/0x180
[   13.665546]  ? preempt_count_sub+0x50/0x80
[   13.665569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.665589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.665614]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.665688]  kthread+0x337/0x6f0
[   13.665709]  ? trace_preempt_on+0x20/0xc0
[   13.665731]  ? __pfx_kthread+0x10/0x10
[   13.665750]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.665773]  ? calculate_sigpending+0x7b/0xa0
[   13.665796]  ? __pfx_kthread+0x10/0x10
[   13.665818]  ret_from_fork+0x116/0x1d0
[   13.665835]  ? __pfx_kthread+0x10/0x10
[   13.665855]  ret_from_fork_asm+0x1a/0x30
[   13.665884]  </TASK>
[   13.665904] 
[   13.674486] Allocated by task 278:
[   13.674673]  kasan_save_stack+0x45/0x70
[   13.675042]  kasan_save_track+0x18/0x40
[   13.675240]  kasan_save_alloc_info+0x3b/0x50
[   13.675428]  __kasan_kmalloc+0xb7/0xc0
[   13.675560]  __kmalloc_cache_noprof+0x189/0x420
[   13.675715]  kasan_bitops_generic+0x92/0x1c0
[   13.675862]  kunit_try_run_case+0x1a5/0x480
[   13.676021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.676279]  kthread+0x337/0x6f0
[   13.676448]  ret_from_fork+0x116/0x1d0
[   13.676638]  ret_from_fork_asm+0x1a/0x30
[   13.677544] 
[   13.677676] The buggy address belongs to the object at ffff888102ae9140
[   13.677676]  which belongs to the cache kmalloc-16 of size 16
[   13.678215] The buggy address is located 8 bytes inside of
[   13.678215]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.678565] 
[   13.678638] The buggy address belongs to the physical page:
[   13.678809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.679551] flags: 0x200000000000000(node=0|zone=2)
[   13.680064] page_type: f5(slab)
[   13.680222] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.680527] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.681066] page dumped because: kasan: bad access detected
[   13.681242] 
[   13.681310] Memory state around the buggy address:
[   13.681506]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.682230]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.682532] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.682807]                                               ^
[   13.683106]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.683326]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.683647] ==================================================================
[   13.643628] ==================================================================
[   13.644073] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.644372] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.644757] 
[   13.644862] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.644920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.644932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.644952] Call Trace:
[   13.644964]  <TASK>
[   13.644976]  dump_stack_lvl+0x73/0xb0
[   13.644999]  print_report+0xd1/0x650
[   13.645021]  ? __virt_addr_valid+0x1db/0x2d0
[   13.645049]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.645077]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.645098]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.645169]  kasan_report+0x141/0x180
[   13.645193]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.645224]  kasan_check_range+0x10c/0x1c0
[   13.645248]  __kasan_check_write+0x18/0x20
[   13.645267]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.645294]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.645322]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.645347]  ? trace_hardirqs_on+0x37/0xe0
[   13.645367]  ? kasan_bitops_generic+0x92/0x1c0
[   13.645394]  kasan_bitops_generic+0x121/0x1c0
[   13.645417]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.645442]  ? __pfx_read_tsc+0x10/0x10
[   13.645462]  ? ktime_get_ts64+0x86/0x230
[   13.645484]  kunit_try_run_case+0x1a5/0x480
[   13.645504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.645524]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.645549]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.645572]  ? __kthread_parkme+0x82/0x180
[   13.645592]  ? preempt_count_sub+0x50/0x80
[   13.645615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.645636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.645660]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.645684]  kthread+0x337/0x6f0
[   13.645702]  ? trace_preempt_on+0x20/0xc0
[   13.645724]  ? __pfx_kthread+0x10/0x10
[   13.645745]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.645766]  ? calculate_sigpending+0x7b/0xa0
[   13.645789]  ? __pfx_kthread+0x10/0x10
[   13.645810]  ret_from_fork+0x116/0x1d0
[   13.645828]  ? __pfx_kthread+0x10/0x10
[   13.645848]  ret_from_fork_asm+0x1a/0x30
[   13.645876]  </TASK>
[   13.645887] 
[   13.655358] Allocated by task 278:
[   13.655510]  kasan_save_stack+0x45/0x70
[   13.655702]  kasan_save_track+0x18/0x40
[   13.655911]  kasan_save_alloc_info+0x3b/0x50
[   13.656112]  __kasan_kmalloc+0xb7/0xc0
[   13.656290]  __kmalloc_cache_noprof+0x189/0x420
[   13.656487]  kasan_bitops_generic+0x92/0x1c0
[   13.656777]  kunit_try_run_case+0x1a5/0x480
[   13.657005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.657252]  kthread+0x337/0x6f0
[   13.657405]  ret_from_fork+0x116/0x1d0
[   13.657559]  ret_from_fork_asm+0x1a/0x30
[   13.657783] 
[   13.657882] The buggy address belongs to the object at ffff888102ae9140
[   13.657882]  which belongs to the cache kmalloc-16 of size 16
[   13.658404] The buggy address is located 8 bytes inside of
[   13.658404]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.658906] 
[   13.659016] The buggy address belongs to the physical page:
[   13.659296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.659603] flags: 0x200000000000000(node=0|zone=2)
[   13.659834] page_type: f5(slab)
[   13.659990] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.660321] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.660615] page dumped because: kasan: bad access detected
[   13.660862] 
[   13.660961] Memory state around the buggy address:
[   13.661312]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.661553]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.661768] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.662034]                                               ^
[   13.662526]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.662784]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.663010] ==================================================================
[   13.795423] ==================================================================
[   13.795756] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.796357] Read of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.796838] 
[   13.796960] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.797003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.797014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.797035] Call Trace:
[   13.797055]  <TASK>
[   13.797069]  dump_stack_lvl+0x73/0xb0
[   13.797094]  print_report+0xd1/0x650
[   13.797116]  ? __virt_addr_valid+0x1db/0x2d0
[   13.797139]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.797166]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.797189]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.797217]  kasan_report+0x141/0x180
[   13.797239]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.797271]  __asan_report_load8_noabort+0x18/0x20
[   13.797292]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.797319]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.797348]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.797372]  ? trace_hardirqs_on+0x37/0xe0
[   13.797393]  ? kasan_bitops_generic+0x92/0x1c0
[   13.797420]  kasan_bitops_generic+0x121/0x1c0
[   13.797444]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.797519]  ? __pfx_read_tsc+0x10/0x10
[   13.797540]  ? ktime_get_ts64+0x86/0x230
[   13.797564]  kunit_try_run_case+0x1a5/0x480
[   13.797585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.797603]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.797629]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.797654]  ? __kthread_parkme+0x82/0x180
[   13.797674]  ? preempt_count_sub+0x50/0x80
[   13.797697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.797718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.797742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.797766]  kthread+0x337/0x6f0
[   13.797786]  ? trace_preempt_on+0x20/0xc0
[   13.797809]  ? __pfx_kthread+0x10/0x10
[   13.797830]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.797852]  ? calculate_sigpending+0x7b/0xa0
[   13.797876]  ? __pfx_kthread+0x10/0x10
[   13.797921]  ret_from_fork+0x116/0x1d0
[   13.797939]  ? __pfx_kthread+0x10/0x10
[   13.797971]  ret_from_fork_asm+0x1a/0x30
[   13.798001]  </TASK>
[   13.798012] 
[   13.806955] Allocated by task 278:
[   13.807141]  kasan_save_stack+0x45/0x70
[   13.807343]  kasan_save_track+0x18/0x40
[   13.807507]  kasan_save_alloc_info+0x3b/0x50
[   13.807661]  __kasan_kmalloc+0xb7/0xc0
[   13.807792]  __kmalloc_cache_noprof+0x189/0x420
[   13.809232]  kasan_bitops_generic+0x92/0x1c0
[   13.809430]  kunit_try_run_case+0x1a5/0x480
[   13.809688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.810051]  kthread+0x337/0x6f0
[   13.810210]  ret_from_fork+0x116/0x1d0
[   13.810404]  ret_from_fork_asm+0x1a/0x30
[   13.810575] 
[   13.810699] The buggy address belongs to the object at ffff888102ae9140
[   13.810699]  which belongs to the cache kmalloc-16 of size 16
[   13.811274] The buggy address is located 8 bytes inside of
[   13.811274]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.811784] 
[   13.811911] The buggy address belongs to the physical page:
[   13.812216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.812524] flags: 0x200000000000000(node=0|zone=2)
[   13.812802] page_type: f5(slab)
[   13.812995] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.813298] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.813843] page dumped because: kasan: bad access detected
[   13.814174] 
[   13.814273] Memory state around the buggy address:
[   13.814472]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.814804]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.815213] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.815496]                                               ^
[   13.815791]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.816148]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.816481] ==================================================================
[   13.623162] ==================================================================
[   13.623490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.623862] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.624227] 
[   13.624325] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.624367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.624378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.624398] Call Trace:
[   13.624412]  <TASK>
[   13.624425]  dump_stack_lvl+0x73/0xb0
[   13.624449]  print_report+0xd1/0x650
[   13.624471]  ? __virt_addr_valid+0x1db/0x2d0
[   13.624493]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.624520]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.624543]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.624571]  kasan_report+0x141/0x180
[   13.624593]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.624625]  kasan_check_range+0x10c/0x1c0
[   13.624880]  __kasan_check_write+0x18/0x20
[   13.624918]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.625178]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.625214]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.625238]  ? trace_hardirqs_on+0x37/0xe0
[   13.625259]  ? kasan_bitops_generic+0x92/0x1c0
[   13.625287]  kasan_bitops_generic+0x121/0x1c0
[   13.625311]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.625336]  ? __pfx_read_tsc+0x10/0x10
[   13.625357]  ? ktime_get_ts64+0x86/0x230
[   13.625379]  kunit_try_run_case+0x1a5/0x480
[   13.625400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.625419]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.625443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.625467]  ? __kthread_parkme+0x82/0x180
[   13.625487]  ? preempt_count_sub+0x50/0x80
[   13.625511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.625532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.625555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.625579]  kthread+0x337/0x6f0
[   13.625599]  ? trace_preempt_on+0x20/0xc0
[   13.625620]  ? __pfx_kthread+0x10/0x10
[   13.625654]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.625676]  ? calculate_sigpending+0x7b/0xa0
[   13.625700]  ? __pfx_kthread+0x10/0x10
[   13.625721]  ret_from_fork+0x116/0x1d0
[   13.625739]  ? __pfx_kthread+0x10/0x10
[   13.625759]  ret_from_fork_asm+0x1a/0x30
[   13.625788]  </TASK>
[   13.625797] 
[   13.634837] Allocated by task 278:
[   13.635142]  kasan_save_stack+0x45/0x70
[   13.635310]  kasan_save_track+0x18/0x40
[   13.635446]  kasan_save_alloc_info+0x3b/0x50
[   13.635594]  __kasan_kmalloc+0xb7/0xc0
[   13.635781]  __kmalloc_cache_noprof+0x189/0x420
[   13.636018]  kasan_bitops_generic+0x92/0x1c0
[   13.636338]  kunit_try_run_case+0x1a5/0x480
[   13.636595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.636850]  kthread+0x337/0x6f0
[   13.637078]  ret_from_fork+0x116/0x1d0
[   13.637221]  ret_from_fork_asm+0x1a/0x30
[   13.637361] 
[   13.637431] The buggy address belongs to the object at ffff888102ae9140
[   13.637431]  which belongs to the cache kmalloc-16 of size 16
[   13.637836] The buggy address is located 8 bytes inside of
[   13.637836]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.638379] 
[   13.638473] The buggy address belongs to the physical page:
[   13.638938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.639412] flags: 0x200000000000000(node=0|zone=2)
[   13.639585] page_type: f5(slab)
[   13.639745] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.640258] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.640485] page dumped because: kasan: bad access detected
[   13.640905] 
[   13.641147] Memory state around the buggy address:
[   13.641382]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.641744]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.642124] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.642369]                                               ^
[   13.642542]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.642831]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.643167] ==================================================================
[   13.703841] ==================================================================
[   13.704195] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.704557] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.704831] 
[   13.706264] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.706313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.706326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.706346] Call Trace:
[   13.706360]  <TASK>
[   13.706373]  dump_stack_lvl+0x73/0xb0
[   13.706400]  print_report+0xd1/0x650
[   13.706423]  ? __virt_addr_valid+0x1db/0x2d0
[   13.706446]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.706473]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.706496]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.706524]  kasan_report+0x141/0x180
[   13.706546]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.706578]  kasan_check_range+0x10c/0x1c0
[   13.706883]  __kasan_check_write+0x18/0x20
[   13.706916]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.707006]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.707035]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.707060]  ? trace_hardirqs_on+0x37/0xe0
[   13.707080]  ? kasan_bitops_generic+0x92/0x1c0
[   13.707108]  kasan_bitops_generic+0x121/0x1c0
[   13.707132]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.707156]  ? __pfx_read_tsc+0x10/0x10
[   13.707177]  ? ktime_get_ts64+0x86/0x230
[   13.707200]  kunit_try_run_case+0x1a5/0x480
[   13.707220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.707240]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.707265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.707290]  ? __kthread_parkme+0x82/0x180
[   13.707310]  ? preempt_count_sub+0x50/0x80
[   13.707332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.707353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.707377]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.707401]  kthread+0x337/0x6f0
[   13.707420]  ? trace_preempt_on+0x20/0xc0
[   13.707441]  ? __pfx_kthread+0x10/0x10
[   13.707461]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.707483]  ? calculate_sigpending+0x7b/0xa0
[   13.707507]  ? __pfx_kthread+0x10/0x10
[   13.707527]  ret_from_fork+0x116/0x1d0
[   13.707545]  ? __pfx_kthread+0x10/0x10
[   13.707565]  ret_from_fork_asm+0x1a/0x30
[   13.707594]  </TASK>
[   13.707604] 
[   13.719051] Allocated by task 278:
[   13.719222]  kasan_save_stack+0x45/0x70
[   13.719406]  kasan_save_track+0x18/0x40
[   13.719603]  kasan_save_alloc_info+0x3b/0x50
[   13.719801]  __kasan_kmalloc+0xb7/0xc0
[   13.720594]  __kmalloc_cache_noprof+0x189/0x420
[   13.720923]  kasan_bitops_generic+0x92/0x1c0
[   13.721467]  kunit_try_run_case+0x1a5/0x480
[   13.721754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.722168]  kthread+0x337/0x6f0
[   13.722343]  ret_from_fork+0x116/0x1d0
[   13.722661]  ret_from_fork_asm+0x1a/0x30
[   13.723005] 
[   13.723099] The buggy address belongs to the object at ffff888102ae9140
[   13.723099]  which belongs to the cache kmalloc-16 of size 16
[   13.723569] The buggy address is located 8 bytes inside of
[   13.723569]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.724157] 
[   13.724254] The buggy address belongs to the physical page:
[   13.724467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.724815] flags: 0x200000000000000(node=0|zone=2)
[   13.725127] page_type: f5(slab)
[   13.725291] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.725550] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.725917] page dumped because: kasan: bad access detected
[   13.726303] 
[   13.726400] Memory state around the buggy address:
[   13.726592]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.726946]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.727229] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.727507]                                               ^
[   13.727739]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.728006]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.728328] ==================================================================
[   13.684113] ==================================================================
[   13.684434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.684815] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.685172] 
[   13.685280] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.685322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.685333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.685353] Call Trace:
[   13.685366]  <TASK>
[   13.685378]  dump_stack_lvl+0x73/0xb0
[   13.685402]  print_report+0xd1/0x650
[   13.685423]  ? __virt_addr_valid+0x1db/0x2d0
[   13.685447]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.685474]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.685497]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.685525]  kasan_report+0x141/0x180
[   13.685547]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.685579]  kasan_check_range+0x10c/0x1c0
[   13.685602]  __kasan_check_write+0x18/0x20
[   13.685622]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.685650]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.685730]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.685755]  ? trace_hardirqs_on+0x37/0xe0
[   13.685777]  ? kasan_bitops_generic+0x92/0x1c0
[   13.685804]  kasan_bitops_generic+0x121/0x1c0
[   13.685828]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.685853]  ? __pfx_read_tsc+0x10/0x10
[   13.685874]  ? ktime_get_ts64+0x86/0x230
[   13.685910]  kunit_try_run_case+0x1a5/0x480
[   13.685933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.685986]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.686012]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.686036]  ? __kthread_parkme+0x82/0x180
[   13.686056]  ? preempt_count_sub+0x50/0x80
[   13.686080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.686101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.686125]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.686149]  kthread+0x337/0x6f0
[   13.686168]  ? trace_preempt_on+0x20/0xc0
[   13.686190]  ? __pfx_kthread+0x10/0x10
[   13.686209]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.686231]  ? calculate_sigpending+0x7b/0xa0
[   13.686255]  ? __pfx_kthread+0x10/0x10
[   13.686276]  ret_from_fork+0x116/0x1d0
[   13.686294]  ? __pfx_kthread+0x10/0x10
[   13.686314]  ret_from_fork_asm+0x1a/0x30
[   13.686343]  </TASK>
[   13.686353] 
[   13.695127] Allocated by task 278:
[   13.695259]  kasan_save_stack+0x45/0x70
[   13.695460]  kasan_save_track+0x18/0x40
[   13.695662]  kasan_save_alloc_info+0x3b/0x50
[   13.695874]  __kasan_kmalloc+0xb7/0xc0
[   13.696094]  __kmalloc_cache_noprof+0x189/0x420
[   13.696310]  kasan_bitops_generic+0x92/0x1c0
[   13.696495]  kunit_try_run_case+0x1a5/0x480
[   13.696696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.697159]  kthread+0x337/0x6f0
[   13.697326]  ret_from_fork+0x116/0x1d0
[   13.697486]  ret_from_fork_asm+0x1a/0x30
[   13.697702] 
[   13.697775] The buggy address belongs to the object at ffff888102ae9140
[   13.697775]  which belongs to the cache kmalloc-16 of size 16
[   13.698187] The buggy address is located 8 bytes inside of
[   13.698187]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.698543] 
[   13.698618] The buggy address belongs to the physical page:
[   13.698916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.699558] flags: 0x200000000000000(node=0|zone=2)
[   13.699864] page_type: f5(slab)
[   13.699996] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.700229] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.700453] page dumped because: kasan: bad access detected
[   13.700624] 
[   13.700787] Memory state around the buggy address:
[   13.701166]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.701492]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.702200] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.702525]                                               ^
[   13.702965]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.703239]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.703499] ==================================================================