Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-x86_64

[   16.183407] ==================================================================
[   16.184158] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.184597] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.184904] 
[   16.184987] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.185042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.185056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.185079] Call Trace:
[   16.185102]  <TASK>
[   16.185121]  dump_stack_lvl+0x73/0xb0
[   16.185152]  print_report+0xd1/0x650
[   16.185176]  ? __virt_addr_valid+0x1db/0x2d0
[   16.185199]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.185221]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.185245]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.185268]  kasan_report+0x141/0x180
[   16.185291]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.185318]  kasan_check_range+0x10c/0x1c0
[   16.185338]  __kasan_check_write+0x18/0x20
[   16.185357]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.185381]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.185406]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.185427]  ? trace_hardirqs_on+0x37/0xe0
[   16.185451]  ? kasan_bitops_generic+0x92/0x1c0
[   16.185474]  kasan_bitops_generic+0x121/0x1c0
[   16.185493]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.185514]  ? __pfx_read_tsc+0x10/0x10
[   16.185534]  ? ktime_get_ts64+0x86/0x230
[   16.185576]  kunit_try_run_case+0x1a5/0x480
[   16.185896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.185922]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.185964]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.185988]  ? __kthread_parkme+0x82/0x180
[   16.186010]  ? preempt_count_sub+0x50/0x80
[   16.186036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.186059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.186083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.186106]  kthread+0x337/0x6f0
[   16.186123]  ? trace_preempt_on+0x20/0xc0
[   16.186145]  ? __pfx_kthread+0x10/0x10
[   16.186163]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.186184]  ? calculate_sigpending+0x7b/0xa0
[   16.186205]  ? __pfx_kthread+0x10/0x10
[   16.186224]  ret_from_fork+0x41/0x80
[   16.186245]  ? __pfx_kthread+0x10/0x10
[   16.186262]  ret_from_fork_asm+0x1a/0x30
[   16.186293]  </TASK>
[   16.186306] 
[   16.194385] Allocated by task 281:
[   16.194489]  kasan_save_stack+0x45/0x70
[   16.194611]  kasan_save_track+0x18/0x40
[   16.194862]  kasan_save_alloc_info+0x3b/0x50
[   16.195090]  __kasan_kmalloc+0xb7/0xc0
[   16.195418]  __kmalloc_cache_noprof+0x189/0x420
[   16.195744]  kasan_bitops_generic+0x92/0x1c0
[   16.196151]  kunit_try_run_case+0x1a5/0x480
[   16.196272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.196487]  kthread+0x337/0x6f0
[   16.196831]  ret_from_fork+0x41/0x80
[   16.196927]  ret_from_fork_asm+0x1a/0x30
[   16.197020] 
[   16.197073] The buggy address belongs to the object at ffff888102497640
[   16.197073]  which belongs to the cache kmalloc-16 of size 16
[   16.197272] The buggy address is located 8 bytes inside of
[   16.197272]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.197890] 
[   16.198026] The buggy address belongs to the physical page:
[   16.198391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.198813] flags: 0x200000000000000(node=0|zone=2)
[   16.199258] page_type: f5(slab)
[   16.199360] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.199515] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.200203] page dumped because: kasan: bad access detected
[   16.200718] 
[   16.200960] Memory state around the buggy address:
[   16.201199]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.201465]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.201682] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.202103]                                               ^
[   16.202369]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.202583]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.202936] ==================================================================
[   16.302865] ==================================================================
[   16.303408] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.303608] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.303750] 
[   16.303833] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.304179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.304210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.304236] Call Trace:
[   16.304261]  <TASK>
[   16.304283]  dump_stack_lvl+0x73/0xb0
[   16.304348]  print_report+0xd1/0x650
[   16.304384]  ? __virt_addr_valid+0x1db/0x2d0
[   16.304409]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.304433]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.304456]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.304481]  kasan_report+0x141/0x180
[   16.304506]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.304535]  kasan_check_range+0x10c/0x1c0
[   16.304556]  __kasan_check_write+0x18/0x20
[   16.304593]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.304701]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.304734]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.304758]  ? trace_hardirqs_on+0x37/0xe0
[   16.304783]  ? kasan_bitops_generic+0x92/0x1c0
[   16.304807]  kasan_bitops_generic+0x121/0x1c0
[   16.304828]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.304850]  ? __pfx_read_tsc+0x10/0x10
[   16.304871]  ? ktime_get_ts64+0x86/0x230
[   16.304898]  kunit_try_run_case+0x1a5/0x480
[   16.304925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.304949]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.304975]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.304998]  ? __kthread_parkme+0x82/0x180
[   16.305021]  ? preempt_count_sub+0x50/0x80
[   16.305074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.305103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.305128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.305151]  kthread+0x337/0x6f0
[   16.305169]  ? trace_preempt_on+0x20/0xc0
[   16.305192]  ? __pfx_kthread+0x10/0x10
[   16.305229]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.305252]  ? calculate_sigpending+0x7b/0xa0
[   16.305274]  ? __pfx_kthread+0x10/0x10
[   16.305294]  ret_from_fork+0x41/0x80
[   16.305315]  ? __pfx_kthread+0x10/0x10
[   16.305333]  ret_from_fork_asm+0x1a/0x30
[   16.305366]  </TASK>
[   16.305381] 
[   16.312976] Allocated by task 281:
[   16.313312]  kasan_save_stack+0x45/0x70
[   16.313636]  kasan_save_track+0x18/0x40
[   16.313899]  kasan_save_alloc_info+0x3b/0x50
[   16.314237]  __kasan_kmalloc+0xb7/0xc0
[   16.314333]  __kmalloc_cache_noprof+0x189/0x420
[   16.314436]  kasan_bitops_generic+0x92/0x1c0
[   16.314531]  kunit_try_run_case+0x1a5/0x480
[   16.315250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.315824]  kthread+0x337/0x6f0
[   16.316106]  ret_from_fork+0x41/0x80
[   16.316359]  ret_from_fork_asm+0x1a/0x30
[   16.316532] 
[   16.316605] The buggy address belongs to the object at ffff888102497640
[   16.316605]  which belongs to the cache kmalloc-16 of size 16
[   16.317134] The buggy address is located 8 bytes inside of
[   16.317134]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.317342] 
[   16.317400] The buggy address belongs to the physical page:
[   16.317510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.318259] flags: 0x200000000000000(node=0|zone=2)
[   16.318582] page_type: f5(slab)
[   16.318812] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.319548] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.319843] page dumped because: kasan: bad access detected
[   16.319960] 
[   16.320015] Memory state around the buggy address:
[   16.320124]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.320664]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.321086] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.321944]                                               ^
[   16.322142]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.322462]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.323049] ==================================================================
[   16.158250] ==================================================================
[   16.159112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.159390] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.159605] 
[   16.159686] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.159743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.159757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.159782] Call Trace:
[   16.159807]  <TASK>
[   16.159828]  dump_stack_lvl+0x73/0xb0
[   16.159861]  print_report+0xd1/0x650
[   16.159885]  ? __virt_addr_valid+0x1db/0x2d0
[   16.159909]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.159933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.159955]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.159980]  kasan_report+0x141/0x180
[   16.160003]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.160032]  kasan_check_range+0x10c/0x1c0
[   16.160054]  __kasan_check_write+0x18/0x20
[   16.160075]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.160102]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.160128]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.160151]  ? trace_hardirqs_on+0x37/0xe0
[   16.160178]  ? kasan_bitops_generic+0x92/0x1c0
[   16.160204]  kasan_bitops_generic+0x121/0x1c0
[   16.160226]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.160249]  ? __pfx_read_tsc+0x10/0x10
[   16.160271]  ? ktime_get_ts64+0x86/0x230
[   16.160299]  kunit_try_run_case+0x1a5/0x480
[   16.160327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.160351]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.160376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.160400]  ? __kthread_parkme+0x82/0x180
[   16.160424]  ? preempt_count_sub+0x50/0x80
[   16.160453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.160479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.160504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.160530]  kthread+0x337/0x6f0
[   16.160549]  ? trace_preempt_on+0x20/0xc0
[   16.161331]  ? __pfx_kthread+0x10/0x10
[   16.161357]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.161384]  ? calculate_sigpending+0x7b/0xa0
[   16.161409]  ? __pfx_kthread+0x10/0x10
[   16.161430]  ret_from_fork+0x41/0x80
[   16.161456]  ? __pfx_kthread+0x10/0x10
[   16.161477]  ret_from_fork_asm+0x1a/0x30
[   16.161512]  </TASK>
[   16.161527] 
[   16.170455] Allocated by task 281:
[   16.170593]  kasan_save_stack+0x45/0x70
[   16.172328]  kasan_save_track+0x18/0x40
[   16.172473]  kasan_save_alloc_info+0x3b/0x50
[   16.173195]  __kasan_kmalloc+0xb7/0xc0
[   16.173418]  __kmalloc_cache_noprof+0x189/0x420
[   16.173549]  kasan_bitops_generic+0x92/0x1c0
[   16.174096]  kunit_try_run_case+0x1a5/0x480
[   16.174220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.174624]  kthread+0x337/0x6f0
[   16.174759]  ret_from_fork+0x41/0x80
[   16.174933]  ret_from_fork_asm+0x1a/0x30
[   16.175218] 
[   16.175358] The buggy address belongs to the object at ffff888102497640
[   16.175358]  which belongs to the cache kmalloc-16 of size 16
[   16.175859] The buggy address is located 8 bytes inside of
[   16.175859]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.176575] 
[   16.176654] The buggy address belongs to the physical page:
[   16.177647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.177921] flags: 0x200000000000000(node=0|zone=2)
[   16.178075] page_type: f5(slab)
[   16.178199] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.178407] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.178639] page dumped because: kasan: bad access detected
[   16.179418] 
[   16.179506] Memory state around the buggy address:
[   16.179856]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.180592]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.181071] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.181367]                                               ^
[   16.181952]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.182192]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.182521] ==================================================================
[   16.227052] ==================================================================
[   16.227593] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.228168] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.228444] 
[   16.228828] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.228889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.228904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.228928] Call Trace:
[   16.228951]  <TASK>
[   16.228972]  dump_stack_lvl+0x73/0xb0
[   16.229006]  print_report+0xd1/0x650
[   16.229032]  ? __virt_addr_valid+0x1db/0x2d0
[   16.229054]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.229077]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.229100]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.229124]  kasan_report+0x141/0x180
[   16.229146]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.229174]  kasan_check_range+0x10c/0x1c0
[   16.229196]  __kasan_check_write+0x18/0x20
[   16.229227]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.229251]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.229276]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.229297]  ? trace_hardirqs_on+0x37/0xe0
[   16.229321]  ? kasan_bitops_generic+0x92/0x1c0
[   16.229344]  kasan_bitops_generic+0x121/0x1c0
[   16.229363]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.229385]  ? __pfx_read_tsc+0x10/0x10
[   16.229405]  ? ktime_get_ts64+0x86/0x230
[   16.229431]  kunit_try_run_case+0x1a5/0x480
[   16.229455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.229478]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.229502]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.229526]  ? __kthread_parkme+0x82/0x180
[   16.229548]  ? preempt_count_sub+0x50/0x80
[   16.229593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.229618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.229642]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.229666]  kthread+0x337/0x6f0
[   16.229684]  ? trace_preempt_on+0x20/0xc0
[   16.229706]  ? __pfx_kthread+0x10/0x10
[   16.229725]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.229746]  ? calculate_sigpending+0x7b/0xa0
[   16.229769]  ? __pfx_kthread+0x10/0x10
[   16.229787]  ret_from_fork+0x41/0x80
[   16.229810]  ? __pfx_kthread+0x10/0x10
[   16.229828]  ret_from_fork_asm+0x1a/0x30
[   16.229859]  </TASK>
[   16.229872] 
[   16.240592] Allocated by task 281:
[   16.241218]  kasan_save_stack+0x45/0x70
[   16.241371]  kasan_save_track+0x18/0x40
[   16.241465]  kasan_save_alloc_info+0x3b/0x50
[   16.242031]  __kasan_kmalloc+0xb7/0xc0
[   16.242321]  __kmalloc_cache_noprof+0x189/0x420
[   16.242697]  kasan_bitops_generic+0x92/0x1c0
[   16.242916]  kunit_try_run_case+0x1a5/0x480
[   16.243238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.243381]  kthread+0x337/0x6f0
[   16.243661]  ret_from_fork+0x41/0x80
[   16.243837]  ret_from_fork_asm+0x1a/0x30
[   16.243935] 
[   16.244040] The buggy address belongs to the object at ffff888102497640
[   16.244040]  which belongs to the cache kmalloc-16 of size 16
[   16.244401] The buggy address is located 8 bytes inside of
[   16.244401]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.245611] 
[   16.245845] The buggy address belongs to the physical page:
[   16.246106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.246307] flags: 0x200000000000000(node=0|zone=2)
[   16.246421] page_type: f5(slab)
[   16.246541] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.247028] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.247626] page dumped because: kasan: bad access detected
[   16.247734] 
[   16.248174] Memory state around the buggy address:
[   16.248360]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.249378]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.249763] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.249957]                                               ^
[   16.250253]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.250514]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.250938] ==================================================================
[   16.276060] ==================================================================
[   16.276321] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.276596] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.278933] 
[   16.279056] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.279118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.279143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.279169] Call Trace:
[   16.279193]  <TASK>
[   16.279224]  dump_stack_lvl+0x73/0xb0
[   16.279267]  print_report+0xd1/0x650
[   16.279294]  ? __virt_addr_valid+0x1db/0x2d0
[   16.279319]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.279344]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.279367]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.279392]  kasan_report+0x141/0x180
[   16.279414]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.279442]  kasan_check_range+0x10c/0x1c0
[   16.279462]  __kasan_check_write+0x18/0x20
[   16.279482]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.279508]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.279536]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.279576]  ? trace_hardirqs_on+0x37/0xe0
[   16.279607]  ? kasan_bitops_generic+0x92/0x1c0
[   16.279634]  kasan_bitops_generic+0x121/0x1c0
[   16.279657]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.279681]  ? __pfx_read_tsc+0x10/0x10
[   16.279704]  ? ktime_get_ts64+0x86/0x230
[   16.279733]  kunit_try_run_case+0x1a5/0x480
[   16.279761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.279785]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.279811]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.279837]  ? __kthread_parkme+0x82/0x180
[   16.279861]  ? preempt_count_sub+0x50/0x80
[   16.279889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.279916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.279941]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.279966]  kthread+0x337/0x6f0
[   16.279985]  ? trace_preempt_on+0x20/0xc0
[   16.280010]  ? __pfx_kthread+0x10/0x10
[   16.280030]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.280053]  ? calculate_sigpending+0x7b/0xa0
[   16.280077]  ? __pfx_kthread+0x10/0x10
[   16.280098]  ret_from_fork+0x41/0x80
[   16.280120]  ? __pfx_kthread+0x10/0x10
[   16.280140]  ret_from_fork_asm+0x1a/0x30
[   16.280175]  </TASK>
[   16.280188] 
[   16.290016] Allocated by task 281:
[   16.290126]  kasan_save_stack+0x45/0x70
[   16.290396]  kasan_save_track+0x18/0x40
[   16.290662]  kasan_save_alloc_info+0x3b/0x50
[   16.290872]  __kasan_kmalloc+0xb7/0xc0
[   16.291191]  __kmalloc_cache_noprof+0x189/0x420
[   16.291822]  kasan_bitops_generic+0x92/0x1c0
[   16.292264]  kunit_try_run_case+0x1a5/0x480
[   16.292437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.294369]  kthread+0x337/0x6f0
[   16.294587]  ret_from_fork+0x41/0x80
[   16.294916]  ret_from_fork_asm+0x1a/0x30
[   16.295102] 
[   16.295212] The buggy address belongs to the object at ffff888102497640
[   16.295212]  which belongs to the cache kmalloc-16 of size 16
[   16.296131] The buggy address is located 8 bytes inside of
[   16.296131]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.296910] 
[   16.297146] The buggy address belongs to the physical page:
[   16.297284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.297894] flags: 0x200000000000000(node=0|zone=2)
[   16.298235] page_type: f5(slab)
[   16.298345] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.298814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.299284] page dumped because: kasan: bad access detected
[   16.300041] 
[   16.300256] Memory state around the buggy address:
[   16.300551]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.300754]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.301151] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.301550]                                               ^
[   16.301832]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.302204]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.302421] ==================================================================
[   16.323495] ==================================================================
[   16.324079] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.324582] Read of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.325012] 
[   16.325137] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.325212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.325226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.325250] Call Trace:
[   16.325274]  <TASK>
[   16.325309]  dump_stack_lvl+0x73/0xb0
[   16.325344]  print_report+0xd1/0x650
[   16.325370]  ? __virt_addr_valid+0x1db/0x2d0
[   16.325393]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.325416]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.325439]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.325463]  kasan_report+0x141/0x180
[   16.325503]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.325535]  kasan_check_range+0x10c/0x1c0
[   16.325555]  __kasan_check_read+0x15/0x20
[   16.325681]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.325710]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.325736]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.325759]  ? trace_hardirqs_on+0x37/0xe0
[   16.325783]  ? kasan_bitops_generic+0x92/0x1c0
[   16.325807]  kasan_bitops_generic+0x121/0x1c0
[   16.325827]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.325849]  ? __pfx_read_tsc+0x10/0x10
[   16.325886]  ? ktime_get_ts64+0x86/0x230
[   16.325915]  kunit_try_run_case+0x1a5/0x480
[   16.325942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.325965]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.325990]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.326013]  ? __kthread_parkme+0x82/0x180
[   16.326036]  ? preempt_count_sub+0x50/0x80
[   16.326064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.326089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.326112]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.326135]  kthread+0x337/0x6f0
[   16.326153]  ? trace_preempt_on+0x20/0xc0
[   16.326176]  ? __pfx_kthread+0x10/0x10
[   16.326195]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.326216]  ? calculate_sigpending+0x7b/0xa0
[   16.326238]  ? __pfx_kthread+0x10/0x10
[   16.326256]  ret_from_fork+0x41/0x80
[   16.326278]  ? __pfx_kthread+0x10/0x10
[   16.326296]  ret_from_fork_asm+0x1a/0x30
[   16.326328]  </TASK>
[   16.326341] 
[   16.333777] Allocated by task 281:
[   16.333966]  kasan_save_stack+0x45/0x70
[   16.334172]  kasan_save_track+0x18/0x40
[   16.334373]  kasan_save_alloc_info+0x3b/0x50
[   16.334566]  __kasan_kmalloc+0xb7/0xc0
[   16.335053]  __kmalloc_cache_noprof+0x189/0x420
[   16.335234]  kasan_bitops_generic+0x92/0x1c0
[   16.335464]  kunit_try_run_case+0x1a5/0x480
[   16.335595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.336005]  kthread+0x337/0x6f0
[   16.336091]  ret_from_fork+0x41/0x80
[   16.336236]  ret_from_fork_asm+0x1a/0x30
[   16.336476] 
[   16.336595] The buggy address belongs to the object at ffff888102497640
[   16.336595]  which belongs to the cache kmalloc-16 of size 16
[   16.337039] The buggy address is located 8 bytes inside of
[   16.337039]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.337238] 
[   16.337356] The buggy address belongs to the physical page:
[   16.337734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.338031] flags: 0x200000000000000(node=0|zone=2)
[   16.338229] page_type: f5(slab)
[   16.338318] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.338459] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.338978] page dumped because: kasan: bad access detected
[   16.339333] 
[   16.339447] Memory state around the buggy address:
[   16.339758]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.340025]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.340288] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.340413]                                               ^
[   16.340517]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.340991]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.341390] ==================================================================
[   16.341951] ==================================================================
[   16.342225] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.342532] Read of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.343042] 
[   16.343146] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.343209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.343224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.343250] Call Trace:
[   16.343274]  <TASK>
[   16.343295]  dump_stack_lvl+0x73/0xb0
[   16.343344]  print_report+0xd1/0x650
[   16.343369]  ? __virt_addr_valid+0x1db/0x2d0
[   16.343399]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.343423]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.343446]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.343470]  kasan_report+0x141/0x180
[   16.343494]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.343522]  __asan_report_load8_noabort+0x18/0x20
[   16.343543]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.343579]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.343743]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.343767]  ? trace_hardirqs_on+0x37/0xe0
[   16.343792]  ? kasan_bitops_generic+0x92/0x1c0
[   16.343816]  kasan_bitops_generic+0x121/0x1c0
[   16.343836]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.343858]  ? __pfx_read_tsc+0x10/0x10
[   16.343897]  ? ktime_get_ts64+0x86/0x230
[   16.343925]  kunit_try_run_case+0x1a5/0x480
[   16.343959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.343983]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.344007]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.344031]  ? __kthread_parkme+0x82/0x180
[   16.344053]  ? preempt_count_sub+0x50/0x80
[   16.344078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.344103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.344127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.344167]  kthread+0x337/0x6f0
[   16.344187]  ? trace_preempt_on+0x20/0xc0
[   16.344211]  ? __pfx_kthread+0x10/0x10
[   16.344230]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.344250]  ? calculate_sigpending+0x7b/0xa0
[   16.344271]  ? __pfx_kthread+0x10/0x10
[   16.344308]  ret_from_fork+0x41/0x80
[   16.344330]  ? __pfx_kthread+0x10/0x10
[   16.344348]  ret_from_fork_asm+0x1a/0x30
[   16.344380]  </TASK>
[   16.344392] 
[   16.351190] Allocated by task 281:
[   16.351434]  kasan_save_stack+0x45/0x70
[   16.352743]  kasan_save_track+0x18/0x40
[   16.353027]  kasan_save_alloc_info+0x3b/0x50
[   16.353302]  __kasan_kmalloc+0xb7/0xc0
[   16.353427]  __kmalloc_cache_noprof+0x189/0x420
[   16.353578]  kasan_bitops_generic+0x92/0x1c0
[   16.354082]  kunit_try_run_case+0x1a5/0x480
[   16.354202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.354357]  kthread+0x337/0x6f0
[   16.354462]  ret_from_fork+0x41/0x80
[   16.354581]  ret_from_fork_asm+0x1a/0x30
[   16.355184] 
[   16.355274] The buggy address belongs to the object at ffff888102497640
[   16.355274]  which belongs to the cache kmalloc-16 of size 16
[   16.355585] The buggy address is located 8 bytes inside of
[   16.355585]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.355784] 
[   16.355840] The buggy address belongs to the physical page:
[   16.355945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.356602] flags: 0x200000000000000(node=0|zone=2)
[   16.357004] page_type: f5(slab)
[   16.357156] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.357480] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.357624] page dumped because: kasan: bad access detected
[   16.357966] 
[   16.358068] Memory state around the buggy address:
[   16.358329]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.358645]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.359260] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.359423]                                               ^
[   16.359533]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.359698]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360163] ==================================================================
[   16.251805] ==================================================================
[   16.252615] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.252863] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.253052] 
[   16.253151] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.253205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.253219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.253241] Call Trace:
[   16.253265]  <TASK>
[   16.253286]  dump_stack_lvl+0x73/0xb0
[   16.253316]  print_report+0xd1/0x650
[   16.253339]  ? __virt_addr_valid+0x1db/0x2d0
[   16.253361]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.253385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.253408]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.253431]  kasan_report+0x141/0x180
[   16.253452]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.253479]  kasan_check_range+0x10c/0x1c0
[   16.253499]  __kasan_check_write+0x18/0x20
[   16.253518]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.253541]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.253577]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.253601]  ? trace_hardirqs_on+0x37/0xe0
[   16.253624]  ? kasan_bitops_generic+0x92/0x1c0
[   16.253648]  kasan_bitops_generic+0x121/0x1c0
[   16.253669]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.253690]  ? __pfx_read_tsc+0x10/0x10
[   16.253710]  ? ktime_get_ts64+0x86/0x230
[   16.254924]  kunit_try_run_case+0x1a5/0x480
[   16.254960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.254984]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.255010]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.255032]  ? __kthread_parkme+0x82/0x180
[   16.255055]  ? preempt_count_sub+0x50/0x80
[   16.255080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.255105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.255128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.255162]  kthread+0x337/0x6f0
[   16.255180]  ? trace_preempt_on+0x20/0xc0
[   16.255204]  ? __pfx_kthread+0x10/0x10
[   16.255223]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.255247]  ? calculate_sigpending+0x7b/0xa0
[   16.255271]  ? __pfx_kthread+0x10/0x10
[   16.255292]  ret_from_fork+0x41/0x80
[   16.255315]  ? __pfx_kthread+0x10/0x10
[   16.255335]  ret_from_fork_asm+0x1a/0x30
[   16.255370]  </TASK>
[   16.255384] 
[   16.266229] Allocated by task 281:
[   16.266356]  kasan_save_stack+0x45/0x70
[   16.266497]  kasan_save_track+0x18/0x40
[   16.266639]  kasan_save_alloc_info+0x3b/0x50
[   16.268206]  __kasan_kmalloc+0xb7/0xc0
[   16.268328]  __kmalloc_cache_noprof+0x189/0x420
[   16.268774]  kasan_bitops_generic+0x92/0x1c0
[   16.268968]  kunit_try_run_case+0x1a5/0x480
[   16.269165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.269397]  kthread+0x337/0x6f0
[   16.269535]  ret_from_fork+0x41/0x80
[   16.270085]  ret_from_fork_asm+0x1a/0x30
[   16.270244] 
[   16.270301] The buggy address belongs to the object at ffff888102497640
[   16.270301]  which belongs to the cache kmalloc-16 of size 16
[   16.271189] The buggy address is located 8 bytes inside of
[   16.271189]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.271423] 
[   16.271483] The buggy address belongs to the physical page:
[   16.271621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.272621] flags: 0x200000000000000(node=0|zone=2)
[   16.272737] page_type: f5(slab)
[   16.272824] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.273062] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.273391] page dumped because: kasan: bad access detected
[   16.273523] 
[   16.273634] Memory state around the buggy address:
[   16.274235]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.274498]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.274898] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.275079]                                               ^
[   16.275235]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.275409]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.275590] ==================================================================
[   16.203593] ==================================================================
[   16.204186] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.204585] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.204978] 
[   16.205064] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.205121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.205136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.205159] Call Trace:
[   16.205184]  <TASK>
[   16.205203]  dump_stack_lvl+0x73/0xb0
[   16.205258]  print_report+0xd1/0x650
[   16.205289]  ? __virt_addr_valid+0x1db/0x2d0
[   16.205312]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.205336]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.205358]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.205381]  kasan_report+0x141/0x180
[   16.205404]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.205432]  kasan_check_range+0x10c/0x1c0
[   16.205451]  __kasan_check_write+0x18/0x20
[   16.205470]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.205494]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.205517]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.205539]  ? trace_hardirqs_on+0x37/0xe0
[   16.205573]  ? kasan_bitops_generic+0x92/0x1c0
[   16.205600]  kasan_bitops_generic+0x121/0x1c0
[   16.205620]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.205642]  ? __pfx_read_tsc+0x10/0x10
[   16.205661]  ? ktime_get_ts64+0x86/0x230
[   16.205687]  kunit_try_run_case+0x1a5/0x480
[   16.205712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.205734]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.205771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.205793]  ? __kthread_parkme+0x82/0x180
[   16.205815]  ? preempt_count_sub+0x50/0x80
[   16.205841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.205864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.205887]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.205910]  kthread+0x337/0x6f0
[   16.205927]  ? trace_preempt_on+0x20/0xc0
[   16.205949]  ? __pfx_kthread+0x10/0x10
[   16.205967]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.205987]  ? calculate_sigpending+0x7b/0xa0
[   16.206009]  ? __pfx_kthread+0x10/0x10
[   16.206026]  ret_from_fork+0x41/0x80
[   16.206047]  ? __pfx_kthread+0x10/0x10
[   16.206141]  ret_from_fork_asm+0x1a/0x30
[   16.206179]  </TASK>
[   16.206192] 
[   16.214200] Allocated by task 281:
[   16.214460]  kasan_save_stack+0x45/0x70
[   16.214614]  kasan_save_track+0x18/0x40
[   16.215342]  kasan_save_alloc_info+0x3b/0x50
[   16.215550]  __kasan_kmalloc+0xb7/0xc0
[   16.215800]  __kmalloc_cache_noprof+0x189/0x420
[   16.215902]  kasan_bitops_generic+0x92/0x1c0
[   16.215998]  kunit_try_run_case+0x1a5/0x480
[   16.216094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.216202]  kthread+0x337/0x6f0
[   16.216281]  ret_from_fork+0x41/0x80
[   16.216451]  ret_from_fork_asm+0x1a/0x30
[   16.217298] 
[   16.217446] The buggy address belongs to the object at ffff888102497640
[   16.217446]  which belongs to the cache kmalloc-16 of size 16
[   16.219577] The buggy address is located 8 bytes inside of
[   16.219577]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.220395] 
[   16.220800] The buggy address belongs to the physical page:
[   16.221070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.221273] flags: 0x200000000000000(node=0|zone=2)
[   16.221408] page_type: f5(slab)
[   16.221522] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.222548] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.222971] page dumped because: kasan: bad access detected
[   16.223294] 
[   16.223405] Memory state around the buggy address:
[   16.223606]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.223960]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.224851] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.225012]                                               ^
[   16.225280]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.225548]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.226366] ==================================================================