Hay
Date
July 8, 2025, 4:38 p.m.

Environment
qemu-x86_64

[   13.560702] ==================================================================
[   13.561261] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.561698] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.561940] 
[   13.562084] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.562131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.562155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.562179] Call Trace:
[   13.562198]  <TASK>
[   13.562229]  dump_stack_lvl+0x73/0xb0
[   13.562256]  print_report+0xd1/0x650
[   13.562280]  ? __virt_addr_valid+0x1db/0x2d0
[   13.562315]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.562340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.562363]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.562400]  kasan_report+0x141/0x180
[   13.562423]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.562453]  kasan_check_range+0x10c/0x1c0
[   13.562485]  __kasan_check_write+0x18/0x20
[   13.562531]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.562556]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.562593]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.562615]  ? trace_hardirqs_on+0x37/0xe0
[   13.562648]  ? kasan_bitops_generic+0x92/0x1c0
[   13.562674]  kasan_bitops_generic+0x121/0x1c0
[   13.562708]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.562731]  ? trace_hardirqs_on+0x37/0xe0
[   13.562754]  ? __pfx_read_tsc+0x10/0x10
[   13.562775]  ? ktime_get_ts64+0x86/0x230
[   13.562798]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.562823]  kunit_try_run_case+0x1a5/0x480
[   13.562847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.562868]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.562904]  ? __kthread_parkme+0x82/0x180
[   13.562927]  ? preempt_count_sub+0x50/0x80
[   13.562952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.562983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.563007]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.563032]  kthread+0x337/0x6f0
[   13.563060]  ? trace_preempt_on+0x20/0xc0
[   13.563083]  ? __pfx_kthread+0x10/0x10
[   13.563102]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.563126]  ? calculate_sigpending+0x7b/0xa0
[   13.563157]  ? __pfx_kthread+0x10/0x10
[   13.563176]  ret_from_fork+0x41/0x80
[   13.563198]  ? __pfx_kthread+0x10/0x10
[   13.563227]  ret_from_fork_asm+0x1a/0x30
[   13.563257]  </TASK>
[   13.563269] 
[   13.571836] Allocated by task 281:
[   13.572021]  kasan_save_stack+0x45/0x70
[   13.572253]  kasan_save_track+0x18/0x40
[   13.572460]  kasan_save_alloc_info+0x3b/0x50
[   13.572675]  __kasan_kmalloc+0xb7/0xc0
[   13.572836]  __kmalloc_cache_noprof+0x189/0x420
[   13.573083]  kasan_bitops_generic+0x92/0x1c0
[   13.573298]  kunit_try_run_case+0x1a5/0x480
[   13.573460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.573667]  kthread+0x337/0x6f0
[   13.573791]  ret_from_fork+0x41/0x80
[   13.573958]  ret_from_fork_asm+0x1a/0x30
[   13.574174] 
[   13.574288] The buggy address belongs to the object at ffff888102171600
[   13.574288]  which belongs to the cache kmalloc-16 of size 16
[   13.574819] The buggy address is located 8 bytes inside of
[   13.574819]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.575205] 
[   13.575308] The buggy address belongs to the physical page:
[   13.575569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.575991] flags: 0x200000000000000(node=0|zone=2)
[   13.576227] page_type: f5(slab)
[   13.576415] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.576769] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.577067] page dumped because: kasan: bad access detected
[   13.577339] 
[   13.577422] Memory state around the buggy address:
[   13.577672]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.578016]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.578287] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.578523]                       ^
[   13.578666]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.579022]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.579341] ==================================================================
[   13.700390] ==================================================================
[   13.701205] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.701547] Read of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.701926] 
[   13.702036] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.702079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.702092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.702137] Call Trace:
[   13.702152]  <TASK>
[   13.702167]  dump_stack_lvl+0x73/0xb0
[   13.702193]  print_report+0xd1/0x650
[   13.702216]  ? __virt_addr_valid+0x1db/0x2d0
[   13.702237]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.702261]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.702284]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.702309]  kasan_report+0x141/0x180
[   13.702354]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.702382]  kasan_check_range+0x10c/0x1c0
[   13.702404]  __kasan_check_read+0x15/0x20
[   13.702424]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.702449]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.702474]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.702513]  ? trace_hardirqs_on+0x37/0xe0
[   13.702536]  ? kasan_bitops_generic+0x92/0x1c0
[   13.702561]  kasan_bitops_generic+0x121/0x1c0
[   13.702581]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.702613]  ? trace_hardirqs_on+0x37/0xe0
[   13.702636]  ? __pfx_read_tsc+0x10/0x10
[   13.702656]  ? ktime_get_ts64+0x86/0x230
[   13.702677]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.702702]  kunit_try_run_case+0x1a5/0x480
[   13.702723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.702744]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.702769]  ? __kthread_parkme+0x82/0x180
[   13.702791]  ? preempt_count_sub+0x50/0x80
[   13.702816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.702837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.702861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.702917]  kthread+0x337/0x6f0
[   13.702934]  ? trace_preempt_on+0x20/0xc0
[   13.702957]  ? __pfx_kthread+0x10/0x10
[   13.702975]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.702998]  ? calculate_sigpending+0x7b/0xa0
[   13.703020]  ? __pfx_kthread+0x10/0x10
[   13.703039]  ret_from_fork+0x41/0x80
[   13.703059]  ? __pfx_kthread+0x10/0x10
[   13.703077]  ret_from_fork_asm+0x1a/0x30
[   13.703127]  </TASK>
[   13.703138] 
[   13.714506] Allocated by task 281:
[   13.714899]  kasan_save_stack+0x45/0x70
[   13.715059]  kasan_save_track+0x18/0x40
[   13.715200]  kasan_save_alloc_info+0x3b/0x50
[   13.715349]  __kasan_kmalloc+0xb7/0xc0
[   13.715490]  __kmalloc_cache_noprof+0x189/0x420
[   13.715684]  kasan_bitops_generic+0x92/0x1c0
[   13.716048]  kunit_try_run_case+0x1a5/0x480
[   13.716282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.716921]  kthread+0x337/0x6f0
[   13.717105]  ret_from_fork+0x41/0x80
[   13.717245]  ret_from_fork_asm+0x1a/0x30
[   13.717606] 
[   13.717711] The buggy address belongs to the object at ffff888102171600
[   13.717711]  which belongs to the cache kmalloc-16 of size 16
[   13.718294] The buggy address is located 8 bytes inside of
[   13.718294]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.719083] 
[   13.719183] The buggy address belongs to the physical page:
[   13.719383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.719939] flags: 0x200000000000000(node=0|zone=2)
[   13.720241] page_type: f5(slab)
[   13.720444] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.720857] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.721162] page dumped because: kasan: bad access detected
[   13.721380] 
[   13.721455] Memory state around the buggy address:
[   13.721684]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.722228]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.722582] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.722977]                       ^
[   13.723114]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.723593]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.723976] ==================================================================
[   13.724587] ==================================================================
[   13.725270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.725714] Read of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.726024] 
[   13.726133] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.726177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.726190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.726212] Call Trace:
[   13.726227]  <TASK>
[   13.726241]  dump_stack_lvl+0x73/0xb0
[   13.726267]  print_report+0xd1/0x650
[   13.726292]  ? __virt_addr_valid+0x1db/0x2d0
[   13.726314]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.726340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.726363]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.726388]  kasan_report+0x141/0x180
[   13.726412]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.726441]  __asan_report_load8_noabort+0x18/0x20
[   13.726464]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.726489]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.726515]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.726537]  ? trace_hardirqs_on+0x37/0xe0
[   13.726559]  ? kasan_bitops_generic+0x92/0x1c0
[   13.726584]  kasan_bitops_generic+0x121/0x1c0
[   13.726605]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.726626]  ? trace_hardirqs_on+0x37/0xe0
[   13.726649]  ? __pfx_read_tsc+0x10/0x10
[   13.726669]  ? ktime_get_ts64+0x86/0x230
[   13.726692]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.726715]  kunit_try_run_case+0x1a5/0x480
[   13.726739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.726760]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.726786]  ? __kthread_parkme+0x82/0x180
[   13.726808]  ? preempt_count_sub+0x50/0x80
[   13.726833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.726855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.726892]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.726916]  kthread+0x337/0x6f0
[   13.726934]  ? trace_preempt_on+0x20/0xc0
[   13.726957]  ? __pfx_kthread+0x10/0x10
[   13.726976]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.726998]  ? calculate_sigpending+0x7b/0xa0
[   13.727020]  ? __pfx_kthread+0x10/0x10
[   13.727039]  ret_from_fork+0x41/0x80
[   13.727060]  ? __pfx_kthread+0x10/0x10
[   13.727078]  ret_from_fork_asm+0x1a/0x30
[   13.727108]  </TASK>
[   13.727119] 
[   13.735180] Allocated by task 281:
[   13.735352]  kasan_save_stack+0x45/0x70
[   13.735556]  kasan_save_track+0x18/0x40
[   13.735742]  kasan_save_alloc_info+0x3b/0x50
[   13.735937]  __kasan_kmalloc+0xb7/0xc0
[   13.736107]  __kmalloc_cache_noprof+0x189/0x420
[   13.736331]  kasan_bitops_generic+0x92/0x1c0
[   13.736520]  kunit_try_run_case+0x1a5/0x480
[   13.736693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.736934]  kthread+0x337/0x6f0
[   13.737076]  ret_from_fork+0x41/0x80
[   13.737262]  ret_from_fork_asm+0x1a/0x30
[   13.737459] 
[   13.737562] The buggy address belongs to the object at ffff888102171600
[   13.737562]  which belongs to the cache kmalloc-16 of size 16
[   13.738031] The buggy address is located 8 bytes inside of
[   13.738031]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.738524] 
[   13.738617] The buggy address belongs to the physical page:
[   13.738791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.739131] flags: 0x200000000000000(node=0|zone=2)
[   13.739374] page_type: f5(slab)
[   13.739556] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.739813] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.740132] page dumped because: kasan: bad access detected
[   13.740390] 
[   13.740486] Memory state around the buggy address:
[   13.740715]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.740989]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.741272] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.741611]                       ^
[   13.741766]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.742063]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.742278] ==================================================================
[   13.540572] ==================================================================
[   13.541006] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.541340] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.542090] 
[   13.542234] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.542283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.542308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.542332] Call Trace:
[   13.542351]  <TASK>
[   13.542370]  dump_stack_lvl+0x73/0xb0
[   13.542407]  print_report+0xd1/0x650
[   13.542432]  ? __virt_addr_valid+0x1db/0x2d0
[   13.542456]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.542493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.542538]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.542572]  kasan_report+0x141/0x180
[   13.542596]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.542626]  kasan_check_range+0x10c/0x1c0
[   13.542658]  __kasan_check_write+0x18/0x20
[   13.542679]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.542703]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.542730]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.542752]  ? trace_hardirqs_on+0x37/0xe0
[   13.542776]  ? kasan_bitops_generic+0x92/0x1c0
[   13.542801]  kasan_bitops_generic+0x121/0x1c0
[   13.542821]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.542843]  ? trace_hardirqs_on+0x37/0xe0
[   13.542865]  ? __pfx_read_tsc+0x10/0x10
[   13.542895]  ? ktime_get_ts64+0x86/0x230
[   13.542918]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.542952]  kunit_try_run_case+0x1a5/0x480
[   13.542975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.542996]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.543032]  ? __kthread_parkme+0x82/0x180
[   13.543055]  ? preempt_count_sub+0x50/0x80
[   13.543081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.543110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.543135]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.543159]  kthread+0x337/0x6f0
[   13.543187]  ? trace_preempt_on+0x20/0xc0
[   13.543211]  ? __pfx_kthread+0x10/0x10
[   13.543229]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.543252]  ? calculate_sigpending+0x7b/0xa0
[   13.543275]  ? __pfx_kthread+0x10/0x10
[   13.543293]  ret_from_fork+0x41/0x80
[   13.543314]  ? __pfx_kthread+0x10/0x10
[   13.543333]  ret_from_fork_asm+0x1a/0x30
[   13.543364]  </TASK>
[   13.543376] 
[   13.551892] Allocated by task 281:
[   13.552031]  kasan_save_stack+0x45/0x70
[   13.552244]  kasan_save_track+0x18/0x40
[   13.552445]  kasan_save_alloc_info+0x3b/0x50
[   13.552706]  __kasan_kmalloc+0xb7/0xc0
[   13.552908]  __kmalloc_cache_noprof+0x189/0x420
[   13.553109]  kasan_bitops_generic+0x92/0x1c0
[   13.553325]  kunit_try_run_case+0x1a5/0x480
[   13.553566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.553819]  kthread+0x337/0x6f0
[   13.553995]  ret_from_fork+0x41/0x80
[   13.554184]  ret_from_fork_asm+0x1a/0x30
[   13.554376] 
[   13.554477] The buggy address belongs to the object at ffff888102171600
[   13.554477]  which belongs to the cache kmalloc-16 of size 16
[   13.555001] The buggy address is located 8 bytes inside of
[   13.555001]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.555356] 
[   13.555433] The buggy address belongs to the physical page:
[   13.555720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.556091] flags: 0x200000000000000(node=0|zone=2)
[   13.556336] page_type: f5(slab)
[   13.556530] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.556922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.557287] page dumped because: kasan: bad access detected
[   13.557463] 
[   13.557561] Memory state around the buggy address:
[   13.557721]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.558009]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.558364] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.558757]                       ^
[   13.558948]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.559300]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.559629] ==================================================================
[   13.677648] ==================================================================
[   13.678069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.678438] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.678752] 
[   13.678841] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.678897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.678922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.678945] Call Trace:
[   13.678960]  <TASK>
[   13.678988]  dump_stack_lvl+0x73/0xb0
[   13.679015]  print_report+0xd1/0x650
[   13.679038]  ? __virt_addr_valid+0x1db/0x2d0
[   13.679060]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.679084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.679108]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.679133]  kasan_report+0x141/0x180
[   13.679158]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.679186]  kasan_check_range+0x10c/0x1c0
[   13.679209]  __kasan_check_write+0x18/0x20
[   13.679229]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.679254]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.679279]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.679309]  ? trace_hardirqs_on+0x37/0xe0
[   13.679332]  ? kasan_bitops_generic+0x92/0x1c0
[   13.679356]  kasan_bitops_generic+0x121/0x1c0
[   13.679396]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.679416]  ? trace_hardirqs_on+0x37/0xe0
[   13.679438]  ? __pfx_read_tsc+0x10/0x10
[   13.679469]  ? ktime_get_ts64+0x86/0x230
[   13.679492]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.679526]  kunit_try_run_case+0x1a5/0x480
[   13.679548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.679569]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.679602]  ? __kthread_parkme+0x82/0x180
[   13.679624]  ? preempt_count_sub+0x50/0x80
[   13.679650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.679671]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.679695]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.679719]  kthread+0x337/0x6f0
[   13.679737]  ? trace_preempt_on+0x20/0xc0
[   13.679769]  ? __pfx_kthread+0x10/0x10
[   13.679788]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.679811]  ? calculate_sigpending+0x7b/0xa0
[   13.679844]  ? __pfx_kthread+0x10/0x10
[   13.679863]  ret_from_fork+0x41/0x80
[   13.679893]  ? __pfx_kthread+0x10/0x10
[   13.679911]  ret_from_fork_asm+0x1a/0x30
[   13.679942]  </TASK>
[   13.679953] 
[   13.689101] Allocated by task 281:
[   13.689728]  kasan_save_stack+0x45/0x70
[   13.690235]  kasan_save_track+0x18/0x40
[   13.690532]  kasan_save_alloc_info+0x3b/0x50
[   13.690739]  __kasan_kmalloc+0xb7/0xc0
[   13.691026]  __kmalloc_cache_noprof+0x189/0x420
[   13.691278]  kasan_bitops_generic+0x92/0x1c0
[   13.691554]  kunit_try_run_case+0x1a5/0x480
[   13.691860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.692104]  kthread+0x337/0x6f0
[   13.692388]  ret_from_fork+0x41/0x80
[   13.692724]  ret_from_fork_asm+0x1a/0x30
[   13.692943] 
[   13.693033] The buggy address belongs to the object at ffff888102171600
[   13.693033]  which belongs to the cache kmalloc-16 of size 16
[   13.693729] The buggy address is located 8 bytes inside of
[   13.693729]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.694362] 
[   13.694473] The buggy address belongs to the physical page:
[   13.694864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.695339] flags: 0x200000000000000(node=0|zone=2)
[   13.695675] page_type: f5(slab)
[   13.695855] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.696369] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.696927] page dumped because: kasan: bad access detected
[   13.697264] 
[   13.697367] Memory state around the buggy address:
[   13.697742]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.698046]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.698412] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.698831]                       ^
[   13.699030]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.699443]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.699839] ==================================================================
[   13.604774] ==================================================================
[   13.605118] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.605695] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.606020] 
[   13.606129] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.606175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.606188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.606210] Call Trace:
[   13.606226]  <TASK>
[   13.606243]  dump_stack_lvl+0x73/0xb0
[   13.606271]  print_report+0xd1/0x650
[   13.606295]  ? __virt_addr_valid+0x1db/0x2d0
[   13.606318]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.606343]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.606366]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.606391]  kasan_report+0x141/0x180
[   13.606416]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.606449]  kasan_check_range+0x10c/0x1c0
[   13.606471]  __kasan_check_write+0x18/0x20
[   13.606491]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.606518]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.606543]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.606565]  ? trace_hardirqs_on+0x37/0xe0
[   13.606587]  ? kasan_bitops_generic+0x92/0x1c0
[   13.606612]  kasan_bitops_generic+0x121/0x1c0
[   13.606646]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.606667]  ? trace_hardirqs_on+0x37/0xe0
[   13.606689]  ? __pfx_read_tsc+0x10/0x10
[   13.606710]  ? ktime_get_ts64+0x86/0x230
[   13.606744]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.606769]  kunit_try_run_case+0x1a5/0x480
[   13.606792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.606814]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.606846]  ? __kthread_parkme+0x82/0x180
[   13.606869]  ? preempt_count_sub+0x50/0x80
[   13.606911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.606931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.606955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.606979]  kthread+0x337/0x6f0
[   13.606996]  ? trace_preempt_on+0x20/0xc0
[   13.607020]  ? __pfx_kthread+0x10/0x10
[   13.607038]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.607070]  ? calculate_sigpending+0x7b/0xa0
[   13.607092]  ? __pfx_kthread+0x10/0x10
[   13.607111]  ret_from_fork+0x41/0x80
[   13.607143]  ? __pfx_kthread+0x10/0x10
[   13.607162]  ret_from_fork_asm+0x1a/0x30
[   13.607192]  </TASK>
[   13.607203] 
[   13.615645] Allocated by task 281:
[   13.615830]  kasan_save_stack+0x45/0x70
[   13.616009]  kasan_save_track+0x18/0x40
[   13.616149]  kasan_save_alloc_info+0x3b/0x50
[   13.616374]  __kasan_kmalloc+0xb7/0xc0
[   13.616634]  __kmalloc_cache_noprof+0x189/0x420
[   13.616897]  kasan_bitops_generic+0x92/0x1c0
[   13.617133]  kunit_try_run_case+0x1a5/0x480
[   13.617279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.617455]  kthread+0x337/0x6f0
[   13.617576]  ret_from_fork+0x41/0x80
[   13.617761]  ret_from_fork_asm+0x1a/0x30
[   13.617968] 
[   13.618071] The buggy address belongs to the object at ffff888102171600
[   13.618071]  which belongs to the cache kmalloc-16 of size 16
[   13.618484] The buggy address is located 8 bytes inside of
[   13.618484]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.619055] 
[   13.619167] The buggy address belongs to the physical page:
[   13.619395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.619641] flags: 0x200000000000000(node=0|zone=2)
[   13.620067] page_type: f5(slab)
[   13.620241] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.620612] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.620989] page dumped because: kasan: bad access detected
[   13.621262] 
[   13.621334] Memory state around the buggy address:
[   13.621496]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.621837]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.622172] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.622465]                       ^
[   13.622694]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.623020]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.623322] ==================================================================
[   13.580634] ==================================================================
[   13.581037] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.581346] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.581636] 
[   13.581770] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.581829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.581842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.581885] Call Trace:
[   13.581903]  <TASK>
[   13.581921]  dump_stack_lvl+0x73/0xb0
[   13.581960]  print_report+0xd1/0x650
[   13.581985]  ? __virt_addr_valid+0x1db/0x2d0
[   13.582008]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.582044]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.582067]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.582101]  kasan_report+0x141/0x180
[   13.582125]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.582164]  kasan_check_range+0x10c/0x1c0
[   13.582186]  __kasan_check_write+0x18/0x20
[   13.582207]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.582232]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.582267]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.582290]  ? trace_hardirqs_on+0x37/0xe0
[   13.582327]  ? kasan_bitops_generic+0x92/0x1c0
[   13.582352]  kasan_bitops_generic+0x121/0x1c0
[   13.582372]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.582402]  ? trace_hardirqs_on+0x37/0xe0
[   13.582425]  ? __pfx_read_tsc+0x10/0x10
[   13.582445]  ? ktime_get_ts64+0x86/0x230
[   13.582479]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.582522]  kunit_try_run_case+0x1a5/0x480
[   13.582545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.582566]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.582593]  ? __kthread_parkme+0x82/0x180
[   13.582616]  ? preempt_count_sub+0x50/0x80
[   13.582642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.582662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.582687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.582711]  kthread+0x337/0x6f0
[   13.582728]  ? trace_preempt_on+0x20/0xc0
[   13.582751]  ? __pfx_kthread+0x10/0x10
[   13.582770]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.582793]  ? calculate_sigpending+0x7b/0xa0
[   13.582814]  ? __pfx_kthread+0x10/0x10
[   13.582841]  ret_from_fork+0x41/0x80
[   13.582862]  ? __pfx_kthread+0x10/0x10
[   13.582896]  ret_from_fork_asm+0x1a/0x30
[   13.582926]  </TASK>
[   13.582938] 
[   13.591453] Allocated by task 281:
[   13.591687]  kasan_save_stack+0x45/0x70
[   13.591892]  kasan_save_track+0x18/0x40
[   13.592062]  kasan_save_alloc_info+0x3b/0x50
[   13.592264]  __kasan_kmalloc+0xb7/0xc0
[   13.592440]  __kmalloc_cache_noprof+0x189/0x420
[   13.593548]  kasan_bitops_generic+0x92/0x1c0
[   13.593968]  kunit_try_run_case+0x1a5/0x480
[   13.594178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.594426]  kthread+0x337/0x6f0
[   13.594818]  ret_from_fork+0x41/0x80
[   13.595027]  ret_from_fork_asm+0x1a/0x30
[   13.595219] 
[   13.595316] The buggy address belongs to the object at ffff888102171600
[   13.595316]  which belongs to the cache kmalloc-16 of size 16
[   13.596305] The buggy address is located 8 bytes inside of
[   13.596305]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.597353] 
[   13.597618] The buggy address belongs to the physical page:
[   13.598075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.598611] flags: 0x200000000000000(node=0|zone=2)
[   13.598841] page_type: f5(slab)
[   13.599012] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.599327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.600016] page dumped because: kasan: bad access detected
[   13.600478] 
[   13.600766] Memory state around the buggy address:
[   13.601012]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.601309]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.601964] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.602410]                       ^
[   13.602743]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.603056]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.603356] ==================================================================
[   13.624014] ==================================================================
[   13.624295] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.624776] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.625119] 
[   13.625335] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.625379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.625391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.625413] Call Trace:
[   13.625427]  <TASK>
[   13.625442]  dump_stack_lvl+0x73/0xb0
[   13.625469]  print_report+0xd1/0x650
[   13.625492]  ? __virt_addr_valid+0x1db/0x2d0
[   13.625522]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.625546]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.625570]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.625595]  kasan_report+0x141/0x180
[   13.625619]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.625661]  kasan_check_range+0x10c/0x1c0
[   13.625683]  __kasan_check_write+0x18/0x20
[   13.625704]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.625742]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.625767]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.625789]  ? trace_hardirqs_on+0x37/0xe0
[   13.625811]  ? kasan_bitops_generic+0x92/0x1c0
[   13.625835]  kasan_bitops_generic+0x121/0x1c0
[   13.625857]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.625886]  ? trace_hardirqs_on+0x37/0xe0
[   13.625908]  ? __pfx_read_tsc+0x10/0x10
[   13.625928]  ? ktime_get_ts64+0x86/0x230
[   13.625951]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.625975]  kunit_try_run_case+0x1a5/0x480
[   13.625997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.626018]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.626043]  ? __kthread_parkme+0x82/0x180
[   13.626065]  ? preempt_count_sub+0x50/0x80
[   13.626102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.626123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.626146]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.626181]  kthread+0x337/0x6f0
[   13.626199]  ? trace_preempt_on+0x20/0xc0
[   13.626221]  ? __pfx_kthread+0x10/0x10
[   13.626240]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.626263]  ? calculate_sigpending+0x7b/0xa0
[   13.626284]  ? __pfx_kthread+0x10/0x10
[   13.626304]  ret_from_fork+0x41/0x80
[   13.626324]  ? __pfx_kthread+0x10/0x10
[   13.626343]  ret_from_fork_asm+0x1a/0x30
[   13.626373]  </TASK>
[   13.626383] 
[   13.638370] Allocated by task 281:
[   13.638730]  kasan_save_stack+0x45/0x70
[   13.639106]  kasan_save_track+0x18/0x40
[   13.639613]  kasan_save_alloc_info+0x3b/0x50
[   13.639802]  __kasan_kmalloc+0xb7/0xc0
[   13.639947]  __kmalloc_cache_noprof+0x189/0x420
[   13.640712]  kasan_bitops_generic+0x92/0x1c0
[   13.641103]  kunit_try_run_case+0x1a5/0x480
[   13.641351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.641588]  kthread+0x337/0x6f0
[   13.642177]  ret_from_fork+0x41/0x80
[   13.642661]  ret_from_fork_asm+0x1a/0x30
[   13.643033] 
[   13.643252] The buggy address belongs to the object at ffff888102171600
[   13.643252]  which belongs to the cache kmalloc-16 of size 16
[   13.644028] The buggy address is located 8 bytes inside of
[   13.644028]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.645107] 
[   13.645188] The buggy address belongs to the physical page:
[   13.645361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.646056] flags: 0x200000000000000(node=0|zone=2)
[   13.646619] page_type: f5(slab)
[   13.647039] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.647811] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.648309] page dumped because: kasan: bad access detected
[   13.648489] 
[   13.648813] Memory state around the buggy address:
[   13.649324]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.650058]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.650480] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.651220]                       ^
[   13.651604]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.652168]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.652591] ==================================================================
[   13.653660] ==================================================================
[   13.654754] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.655798] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.656427] 
[   13.656633] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.656680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.656693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.656716] Call Trace:
[   13.656729]  <TASK>
[   13.656745]  dump_stack_lvl+0x73/0xb0
[   13.656770]  print_report+0xd1/0x650
[   13.656794]  ? __virt_addr_valid+0x1db/0x2d0
[   13.656816]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.656841]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.656864]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.656901]  kasan_report+0x141/0x180
[   13.656924]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.656954]  kasan_check_range+0x10c/0x1c0
[   13.656975]  __kasan_check_write+0x18/0x20
[   13.656995]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.657020]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.657046]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.657068]  ? trace_hardirqs_on+0x37/0xe0
[   13.657091]  ? kasan_bitops_generic+0x92/0x1c0
[   13.657116]  kasan_bitops_generic+0x121/0x1c0
[   13.657136]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.657156]  ? trace_hardirqs_on+0x37/0xe0
[   13.657179]  ? __pfx_read_tsc+0x10/0x10
[   13.657199]  ? ktime_get_ts64+0x86/0x230
[   13.657221]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.657245]  kunit_try_run_case+0x1a5/0x480
[   13.657267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.657288]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.657314]  ? __kthread_parkme+0x82/0x180
[   13.657336]  ? preempt_count_sub+0x50/0x80
[   13.657362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.657382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.657406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.657430]  kthread+0x337/0x6f0
[   13.657447]  ? trace_preempt_on+0x20/0xc0
[   13.657470]  ? __pfx_kthread+0x10/0x10
[   13.657488]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.657525]  ? calculate_sigpending+0x7b/0xa0
[   13.657548]  ? __pfx_kthread+0x10/0x10
[   13.657567]  ret_from_fork+0x41/0x80
[   13.657587]  ? __pfx_kthread+0x10/0x10
[   13.657606]  ret_from_fork_asm+0x1a/0x30
[   13.657636]  </TASK>
[   13.657647] 
[   13.667676] Allocated by task 281:
[   13.668029]  kasan_save_stack+0x45/0x70
[   13.668367]  kasan_save_track+0x18/0x40
[   13.668585]  kasan_save_alloc_info+0x3b/0x50
[   13.669010]  __kasan_kmalloc+0xb7/0xc0
[   13.669324]  __kmalloc_cache_noprof+0x189/0x420
[   13.669505]  kasan_bitops_generic+0x92/0x1c0
[   13.669721]  kunit_try_run_case+0x1a5/0x480
[   13.669948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.670187]  kthread+0x337/0x6f0
[   13.670345]  ret_from_fork+0x41/0x80
[   13.670514]  ret_from_fork_asm+0x1a/0x30
[   13.670690] 
[   13.670784] The buggy address belongs to the object at ffff888102171600
[   13.670784]  which belongs to the cache kmalloc-16 of size 16
[   13.671890] The buggy address is located 8 bytes inside of
[   13.671890]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.672263] 
[   13.672340] The buggy address belongs to the physical page:
[   13.672838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.673369] flags: 0x200000000000000(node=0|zone=2)
[   13.673549] page_type: f5(slab)
[   13.673792] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.674124] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.674430] page dumped because: kasan: bad access detected
[   13.674740] 
[   13.674892] Memory state around the buggy address:
[   13.675095]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.675409]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.675769] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.676079]                       ^
[   13.676269]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.676634]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.676939] ==================================================================