Hay
Date
July 22, 2025, 2:40 p.m.

Environment
qemu-x86_64

[   13.371553] ==================================================================
[   13.372241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.372740] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.373194] 
[   13.373303] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.373348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.373359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.373380] Call Trace:
[   13.373405]  <TASK>
[   13.373422]  dump_stack_lvl+0x73/0xb0
[   13.373447]  print_report+0xd1/0x610
[   13.373469]  ? __virt_addr_valid+0x1db/0x2d0
[   13.373490]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.373512]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.373534]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.373557]  kasan_report+0x141/0x180
[   13.373579]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.373608]  kasan_check_range+0x10c/0x1c0
[   13.373628]  __kasan_check_write+0x18/0x20
[   13.373647]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.373682]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.373706]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.373727]  ? trace_hardirqs_on+0x37/0xe0
[   13.373749]  ? kasan_bitops_generic+0x92/0x1c0
[   13.373773]  kasan_bitops_generic+0x121/0x1c0
[   13.373792]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.373813]  ? __pfx_read_tsc+0x10/0x10
[   13.373833]  ? ktime_get_ts64+0x86/0x230
[   13.373859]  kunit_try_run_case+0x1a5/0x480
[   13.373879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.373897]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.373920]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.373944]  ? __kthread_parkme+0x82/0x180
[   13.373966]  ? preempt_count_sub+0x50/0x80
[   13.373993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.374014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.374039]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.374062]  kthread+0x337/0x6f0
[   13.374079]  ? trace_preempt_on+0x20/0xc0
[   13.374101]  ? __pfx_kthread+0x10/0x10
[   13.374118]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.374140]  ? calculate_sigpending+0x7b/0xa0
[   13.374161]  ? __pfx_kthread+0x10/0x10
[   13.374179]  ret_from_fork+0x41/0x80
[   13.374199]  ? __pfx_kthread+0x10/0x10
[   13.374217]  ret_from_fork_asm+0x1a/0x30
[   13.374259]  </TASK>
[   13.374270] 
[   13.382908] Allocated by task 281:
[   13.383044]  kasan_save_stack+0x45/0x70
[   13.383192]  kasan_save_track+0x18/0x40
[   13.383337]  kasan_save_alloc_info+0x3b/0x50
[   13.383523]  __kasan_kmalloc+0xb7/0xc0
[   13.383706]  __kmalloc_cache_noprof+0x189/0x420
[   13.383918]  kasan_bitops_generic+0x92/0x1c0
[   13.384405]  kunit_try_run_case+0x1a5/0x480
[   13.384870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.385139]  kthread+0x337/0x6f0
[   13.385277]  ret_from_fork+0x41/0x80
[   13.385529]  ret_from_fork_asm+0x1a/0x30
[   13.385829] 
[   13.385931] The buggy address belongs to the object at ffff888102219660
[   13.385931]  which belongs to the cache kmalloc-16 of size 16
[   13.386428] The buggy address is located 8 bytes inside of
[   13.386428]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.386925] 
[   13.387025] The buggy address belongs to the physical page:
[   13.387275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.387558] flags: 0x200000000000000(node=0|zone=2)
[   13.387862] page_type: f5(slab)
[   13.388026] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.388308] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.388793] page dumped because: kasan: bad access detected
[   13.389034] 
[   13.389126] Memory state around the buggy address:
[   13.389314]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.389689]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.389907] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.390118]                                                           ^
[   13.391318]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.392824]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.393858] ==================================================================
[   13.481474] ==================================================================
[   13.482027] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.482446] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.482809] 
[   13.482906] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.482967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.482978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.482998] Call Trace:
[   13.483016]  <TASK>
[   13.483031]  dump_stack_lvl+0x73/0xb0
[   13.483056]  print_report+0xd1/0x610
[   13.483079]  ? __virt_addr_valid+0x1db/0x2d0
[   13.483301]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.483333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.483368]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.483690]  kasan_report+0x141/0x180
[   13.483715]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.483744]  kasan_check_range+0x10c/0x1c0
[   13.483764]  __kasan_check_write+0x18/0x20
[   13.483784]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.483807]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.483832]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.483852]  ? trace_hardirqs_on+0x37/0xe0
[   13.483875]  ? kasan_bitops_generic+0x92/0x1c0
[   13.483899]  kasan_bitops_generic+0x121/0x1c0
[   13.483919]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.483940]  ? __pfx_read_tsc+0x10/0x10
[   13.483960]  ? ktime_get_ts64+0x86/0x230
[   13.483985]  kunit_try_run_case+0x1a5/0x480
[   13.484007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.484025]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.484046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.484070]  ? __kthread_parkme+0x82/0x180
[   13.484425]  ? preempt_count_sub+0x50/0x80
[   13.484453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.484475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.484517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.484541]  kthread+0x337/0x6f0
[   13.484558]  ? trace_preempt_on+0x20/0xc0
[   13.484581]  ? __pfx_kthread+0x10/0x10
[   13.484710]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.484739]  ? calculate_sigpending+0x7b/0xa0
[   13.484761]  ? __pfx_kthread+0x10/0x10
[   13.484780]  ret_from_fork+0x41/0x80
[   13.484801]  ? __pfx_kthread+0x10/0x10
[   13.484819]  ret_from_fork_asm+0x1a/0x30
[   13.484851]  </TASK>
[   13.484862] 
[   13.497273] Allocated by task 281:
[   13.497670]  kasan_save_stack+0x45/0x70
[   13.497870]  kasan_save_track+0x18/0x40
[   13.498055]  kasan_save_alloc_info+0x3b/0x50
[   13.498265]  __kasan_kmalloc+0xb7/0xc0
[   13.498814]  __kmalloc_cache_noprof+0x189/0x420
[   13.499016]  kasan_bitops_generic+0x92/0x1c0
[   13.499235]  kunit_try_run_case+0x1a5/0x480
[   13.499430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.499638]  kthread+0x337/0x6f0
[   13.499858]  ret_from_fork+0x41/0x80
[   13.500029]  ret_from_fork_asm+0x1a/0x30
[   13.500233] 
[   13.500321] The buggy address belongs to the object at ffff888102219660
[   13.500321]  which belongs to the cache kmalloc-16 of size 16
[   13.500860] The buggy address is located 8 bytes inside of
[   13.500860]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.501351] 
[   13.501465] The buggy address belongs to the physical page:
[   13.501745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.501992] flags: 0x200000000000000(node=0|zone=2)
[   13.502198] page_type: f5(slab)
[   13.502373] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.502723] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.502947] page dumped because: kasan: bad access detected
[   13.503417] 
[   13.503610] Memory state around the buggy address:
[   13.504069]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.504316]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.504628] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.504997]                                                           ^
[   13.505277]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.505537]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.505785] ==================================================================
[   13.506264] ==================================================================
[   13.506818] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.507181] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.507492] 
[   13.507605] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.507650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.507661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.507683] Call Trace:
[   13.507700]  <TASK>
[   13.507715]  dump_stack_lvl+0x73/0xb0
[   13.507740]  print_report+0xd1/0x610
[   13.507762]  ? __virt_addr_valid+0x1db/0x2d0
[   13.507783]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.507806]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.507828]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.507851]  kasan_report+0x141/0x180
[   13.507874]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.507902]  kasan_check_range+0x10c/0x1c0
[   13.507921]  __kasan_check_write+0x18/0x20
[   13.507941]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.507964]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.507988]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.508007]  ? trace_hardirqs_on+0x37/0xe0
[   13.508029]  ? kasan_bitops_generic+0x92/0x1c0
[   13.508053]  kasan_bitops_generic+0x121/0x1c0
[   13.508072]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.508094]  ? __pfx_read_tsc+0x10/0x10
[   13.508114]  ? ktime_get_ts64+0x86/0x230
[   13.508139]  kunit_try_run_case+0x1a5/0x480
[   13.508159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.508178]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.508198]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.508232]  ? __kthread_parkme+0x82/0x180
[   13.508254]  ? preempt_count_sub+0x50/0x80
[   13.508281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.508302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.508325]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.508349]  kthread+0x337/0x6f0
[   13.508366]  ? trace_preempt_on+0x20/0xc0
[   13.508388]  ? __pfx_kthread+0x10/0x10
[   13.508406]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.508428]  ? calculate_sigpending+0x7b/0xa0
[   13.508449]  ? __pfx_kthread+0x10/0x10
[   13.508467]  ret_from_fork+0x41/0x80
[   13.508488]  ? __pfx_kthread+0x10/0x10
[   13.508505]  ret_from_fork_asm+0x1a/0x30
[   13.508537]  </TASK>
[   13.508547] 
[   13.517114] Allocated by task 281:
[   13.517296]  kasan_save_stack+0x45/0x70
[   13.517507]  kasan_save_track+0x18/0x40
[   13.517644]  kasan_save_alloc_info+0x3b/0x50
[   13.517791]  __kasan_kmalloc+0xb7/0xc0
[   13.517969]  __kmalloc_cache_noprof+0x189/0x420
[   13.518187]  kasan_bitops_generic+0x92/0x1c0
[   13.518405]  kunit_try_run_case+0x1a5/0x480
[   13.518654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.519053]  kthread+0x337/0x6f0
[   13.519220]  ret_from_fork+0x41/0x80
[   13.519432]  ret_from_fork_asm+0x1a/0x30
[   13.519574] 
[   13.519709] The buggy address belongs to the object at ffff888102219660
[   13.519709]  which belongs to the cache kmalloc-16 of size 16
[   13.520216] The buggy address is located 8 bytes inside of
[   13.520216]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.520779] 
[   13.520862] The buggy address belongs to the physical page:
[   13.521083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.521417] flags: 0x200000000000000(node=0|zone=2)
[   13.521589] page_type: f5(slab)
[   13.521800] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.522126] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.522551] page dumped because: kasan: bad access detected
[   13.522809] 
[   13.522903] Memory state around the buggy address:
[   13.523106]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.523433]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.523890] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.524177]                                                           ^
[   13.524487]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.524846]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.525140] ==================================================================
[   13.574140] ==================================================================
[   13.574659] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.575050] Read of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.575313] 
[   13.575420] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.575468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.575479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.575503] Call Trace:
[   13.575514]  <TASK>
[   13.575544]  dump_stack_lvl+0x73/0xb0
[   13.575570]  print_report+0xd1/0x610
[   13.575593]  ? __virt_addr_valid+0x1db/0x2d0
[   13.575614]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.575639]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.575662]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.575687]  kasan_report+0x141/0x180
[   13.575710]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.575740]  __asan_report_load8_noabort+0x18/0x20
[   13.575761]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.575796]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.575822]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.575845]  ? trace_hardirqs_on+0x37/0xe0
[   13.575871]  ? kasan_bitops_generic+0x92/0x1c0
[   13.575897]  kasan_bitops_generic+0x121/0x1c0
[   13.575918]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.575941]  ? __pfx_read_tsc+0x10/0x10
[   13.575961]  ? ktime_get_ts64+0x86/0x230
[   13.575987]  kunit_try_run_case+0x1a5/0x480
[   13.576008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.576027]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.576049]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.576074]  ? __kthread_parkme+0x82/0x180
[   13.576095]  ? preempt_count_sub+0x50/0x80
[   13.576122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.576143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.576167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.576192]  kthread+0x337/0x6f0
[   13.576209]  ? trace_preempt_on+0x20/0xc0
[   13.576242]  ? __pfx_kthread+0x10/0x10
[   13.576260]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.576283]  ? calculate_sigpending+0x7b/0xa0
[   13.576305]  ? __pfx_kthread+0x10/0x10
[   13.576324]  ret_from_fork+0x41/0x80
[   13.576345]  ? __pfx_kthread+0x10/0x10
[   13.576363]  ret_from_fork_asm+0x1a/0x30
[   13.576395]  </TASK>
[   13.576405] 
[   13.585160] Allocated by task 281:
[   13.585340]  kasan_save_stack+0x45/0x70
[   13.585543]  kasan_save_track+0x18/0x40
[   13.585787]  kasan_save_alloc_info+0x3b/0x50
[   13.585964]  __kasan_kmalloc+0xb7/0xc0
[   13.586143]  __kmalloc_cache_noprof+0x189/0x420
[   13.586367]  kasan_bitops_generic+0x92/0x1c0
[   13.586560]  kunit_try_run_case+0x1a5/0x480
[   13.586791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.586966]  kthread+0x337/0x6f0
[   13.587085]  ret_from_fork+0x41/0x80
[   13.587214]  ret_from_fork_asm+0x1a/0x30
[   13.587431] 
[   13.587530] The buggy address belongs to the object at ffff888102219660
[   13.587530]  which belongs to the cache kmalloc-16 of size 16
[   13.588230] The buggy address is located 8 bytes inside of
[   13.588230]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.588596] 
[   13.588774] The buggy address belongs to the physical page:
[   13.589327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.589627] flags: 0x200000000000000(node=0|zone=2)
[   13.590014] page_type: f5(slab)
[   13.590139] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.590452] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.590834] page dumped because: kasan: bad access detected
[   13.591164] 
[   13.591241] Memory state around the buggy address:
[   13.591556]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.591860]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.592147] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.592482]                                                           ^
[   13.592680]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.592894]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.593110] ==================================================================
[   13.395027] ==================================================================
[   13.395578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.395859] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.396082] 
[   13.396170] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.396213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.396235] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.396257] Call Trace:
[   13.396274]  <TASK>
[   13.396289]  dump_stack_lvl+0x73/0xb0
[   13.396314]  print_report+0xd1/0x610
[   13.396336]  ? __virt_addr_valid+0x1db/0x2d0
[   13.396356]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.396379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.396401]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.396425]  kasan_report+0x141/0x180
[   13.396447]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.396474]  kasan_check_range+0x10c/0x1c0
[   13.396493]  __kasan_check_write+0x18/0x20
[   13.396513]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.396536]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.396562]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.396583]  ? trace_hardirqs_on+0x37/0xe0
[   13.396605]  ? kasan_bitops_generic+0x92/0x1c0
[   13.396628]  kasan_bitops_generic+0x121/0x1c0
[   13.396647]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.396668]  ? __pfx_read_tsc+0x10/0x10
[   13.396688]  ? ktime_get_ts64+0x86/0x230
[   13.396713]  kunit_try_run_case+0x1a5/0x480
[   13.396733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.396750]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.396771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.396794]  ? __kthread_parkme+0x82/0x180
[   13.396816]  ? preempt_count_sub+0x50/0x80
[   13.396843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.396863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.396886]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.396909]  kthread+0x337/0x6f0
[   13.396931]  ? trace_preempt_on+0x20/0xc0
[   13.396952]  ? __pfx_kthread+0x10/0x10
[   13.396970]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.396991]  ? calculate_sigpending+0x7b/0xa0
[   13.397012]  ? __pfx_kthread+0x10/0x10
[   13.397030]  ret_from_fork+0x41/0x80
[   13.397050]  ? __pfx_kthread+0x10/0x10
[   13.397067]  ret_from_fork_asm+0x1a/0x30
[   13.397097]  </TASK>
[   13.397107] 
[   13.414134] Allocated by task 281:
[   13.414510]  kasan_save_stack+0x45/0x70
[   13.414917]  kasan_save_track+0x18/0x40
[   13.415306]  kasan_save_alloc_info+0x3b/0x50
[   13.415621]  __kasan_kmalloc+0xb7/0xc0
[   13.416036]  __kmalloc_cache_noprof+0x189/0x420
[   13.416380]  kasan_bitops_generic+0x92/0x1c0
[   13.416660]  kunit_try_run_case+0x1a5/0x480
[   13.417115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.417307]  kthread+0x337/0x6f0
[   13.417454]  ret_from_fork+0x41/0x80
[   13.417823]  ret_from_fork_asm+0x1a/0x30
[   13.418439] 
[   13.418617] The buggy address belongs to the object at ffff888102219660
[   13.418617]  which belongs to the cache kmalloc-16 of size 16
[   13.419876] The buggy address is located 8 bytes inside of
[   13.419876]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.420373] 
[   13.420544] The buggy address belongs to the physical page:
[   13.421106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.421965] flags: 0x200000000000000(node=0|zone=2)
[   13.422445] page_type: f5(slab)
[   13.422732] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.423431] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.423663] page dumped because: kasan: bad access detected
[   13.423881] 
[   13.423950] Memory state around the buggy address:
[   13.424104]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.424491]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.425162] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.425544]                                                           ^
[   13.425960]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.426608]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.427268] ==================================================================
[   13.545522] ==================================================================
[   13.546179] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.546553] Read of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.547077] 
[   13.547171] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.547214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.547236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.547257] Call Trace:
[   13.547273]  <TASK>
[   13.547287]  dump_stack_lvl+0x73/0xb0
[   13.547314]  print_report+0xd1/0x610
[   13.547336]  ? __virt_addr_valid+0x1db/0x2d0
[   13.547368]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.547391]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.547413]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.547437]  kasan_report+0x141/0x180
[   13.547459]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.547488]  kasan_check_range+0x10c/0x1c0
[   13.547508]  __kasan_check_read+0x15/0x20
[   13.547528]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.547553]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.547578]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.547598]  ? trace_hardirqs_on+0x37/0xe0
[   13.547620]  ? kasan_bitops_generic+0x92/0x1c0
[   13.547644]  kasan_bitops_generic+0x121/0x1c0
[   13.547703]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.547726]  ? __pfx_read_tsc+0x10/0x10
[   13.547746]  ? ktime_get_ts64+0x86/0x230
[   13.547772]  kunit_try_run_case+0x1a5/0x480
[   13.547793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.547812]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.547832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.547857]  ? __kthread_parkme+0x82/0x180
[   13.547878]  ? preempt_count_sub+0x50/0x80
[   13.547904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.547924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.547947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.547970]  kthread+0x337/0x6f0
[   13.547987]  ? trace_preempt_on+0x20/0xc0
[   13.548009]  ? __pfx_kthread+0x10/0x10
[   13.548027]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.548050]  ? calculate_sigpending+0x7b/0xa0
[   13.548071]  ? __pfx_kthread+0x10/0x10
[   13.548089]  ret_from_fork+0x41/0x80
[   13.548110]  ? __pfx_kthread+0x10/0x10
[   13.548128]  ret_from_fork_asm+0x1a/0x30
[   13.548159]  </TASK>
[   13.548171] 
[   13.564245] Allocated by task 281:
[   13.564647]  kasan_save_stack+0x45/0x70
[   13.565107]  kasan_save_track+0x18/0x40
[   13.565457]  kasan_save_alloc_info+0x3b/0x50
[   13.565967]  __kasan_kmalloc+0xb7/0xc0
[   13.566140]  __kmalloc_cache_noprof+0x189/0x420
[   13.566506]  kasan_bitops_generic+0x92/0x1c0
[   13.566949]  kunit_try_run_case+0x1a5/0x480
[   13.567427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.567764]  kthread+0x337/0x6f0
[   13.567881]  ret_from_fork+0x41/0x80
[   13.568010]  ret_from_fork_asm+0x1a/0x30
[   13.568145] 
[   13.568213] The buggy address belongs to the object at ffff888102219660
[   13.568213]  which belongs to the cache kmalloc-16 of size 16
[   13.568679] The buggy address is located 8 bytes inside of
[   13.568679]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.569154] 
[   13.569258] The buggy address belongs to the physical page:
[   13.569562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.569800] flags: 0x200000000000000(node=0|zone=2)
[   13.569957] page_type: f5(slab)
[   13.570095] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.570668] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.570946] page dumped because: kasan: bad access detected
[   13.571108] 
[   13.571172] Memory state around the buggy address:
[   13.571598]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.571912]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.572157] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.572373]                                                           ^
[   13.572819]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.573247]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.573509] ==================================================================
[   13.456868] ==================================================================
[   13.457824] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.458698] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.459478] 
[   13.459575] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.459621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.459632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.459653] Call Trace:
[   13.459666]  <TASK>
[   13.459682]  dump_stack_lvl+0x73/0xb0
[   13.459708]  print_report+0xd1/0x610
[   13.459730]  ? __virt_addr_valid+0x1db/0x2d0
[   13.459751]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.459774]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.459796]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.459819]  kasan_report+0x141/0x180
[   13.459841]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.459870]  kasan_check_range+0x10c/0x1c0
[   13.459889]  __kasan_check_write+0x18/0x20
[   13.459908]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.459931]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.459956]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.459977]  ? trace_hardirqs_on+0x37/0xe0
[   13.459999]  ? kasan_bitops_generic+0x92/0x1c0
[   13.460024]  kasan_bitops_generic+0x121/0x1c0
[   13.460044]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.460066]  ? __pfx_read_tsc+0x10/0x10
[   13.460085]  ? ktime_get_ts64+0x86/0x230
[   13.460111]  kunit_try_run_case+0x1a5/0x480
[   13.460131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.460149]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.460170]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.460194]  ? __kthread_parkme+0x82/0x180
[   13.460216]  ? preempt_count_sub+0x50/0x80
[   13.460260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.460283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.460306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.460329]  kthread+0x337/0x6f0
[   13.460346]  ? trace_preempt_on+0x20/0xc0
[   13.460368]  ? __pfx_kthread+0x10/0x10
[   13.460386]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.460410]  ? calculate_sigpending+0x7b/0xa0
[   13.460431]  ? __pfx_kthread+0x10/0x10
[   13.460449]  ret_from_fork+0x41/0x80
[   13.460470]  ? __pfx_kthread+0x10/0x10
[   13.460488]  ret_from_fork_asm+0x1a/0x30
[   13.460519]  </TASK>
[   13.460529] 
[   13.473174] Allocated by task 281:
[   13.473410]  kasan_save_stack+0x45/0x70
[   13.473594]  kasan_save_track+0x18/0x40
[   13.473731]  kasan_save_alloc_info+0x3b/0x50
[   13.473876]  __kasan_kmalloc+0xb7/0xc0
[   13.474009]  __kmalloc_cache_noprof+0x189/0x420
[   13.474160]  kasan_bitops_generic+0x92/0x1c0
[   13.474422]  kunit_try_run_case+0x1a5/0x480
[   13.474630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.475038]  kthread+0x337/0x6f0
[   13.475213]  ret_from_fork+0x41/0x80
[   13.475462]  ret_from_fork_asm+0x1a/0x30
[   13.475606] 
[   13.475728] The buggy address belongs to the object at ffff888102219660
[   13.475728]  which belongs to the cache kmalloc-16 of size 16
[   13.476261] The buggy address is located 8 bytes inside of
[   13.476261]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.476734] 
[   13.476843] The buggy address belongs to the physical page:
[   13.477099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.477472] flags: 0x200000000000000(node=0|zone=2)
[   13.477703] page_type: f5(slab)
[   13.477873] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.478158] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.478524] page dumped because: kasan: bad access detected
[   13.478752] 
[   13.478845] Memory state around the buggy address:
[   13.479032]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.479255]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.479787] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.480084]                                                           ^
[   13.480377]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.480744]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.480972] ==================================================================
[   13.427946] ==================================================================
[   13.428905] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.429515] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.430196] 
[   13.430400] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.430448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.430459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.430479] Call Trace:
[   13.430491]  <TASK>
[   13.430506]  dump_stack_lvl+0x73/0xb0
[   13.430532]  print_report+0xd1/0x610
[   13.430555]  ? __virt_addr_valid+0x1db/0x2d0
[   13.430575]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.430597]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.430620]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.430644]  kasan_report+0x141/0x180
[   13.430716]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.430748]  kasan_check_range+0x10c/0x1c0
[   13.430768]  __kasan_check_write+0x18/0x20
[   13.430788]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.430811]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.430836]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.430856]  ? trace_hardirqs_on+0x37/0xe0
[   13.430878]  ? kasan_bitops_generic+0x92/0x1c0
[   13.430902]  kasan_bitops_generic+0x121/0x1c0
[   13.430922]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.430943]  ? __pfx_read_tsc+0x10/0x10
[   13.430962]  ? ktime_get_ts64+0x86/0x230
[   13.430987]  kunit_try_run_case+0x1a5/0x480
[   13.431008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.431026]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.431046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.431070]  ? __kthread_parkme+0x82/0x180
[   13.431092]  ? preempt_count_sub+0x50/0x80
[   13.431117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.431137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.431159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.431182]  kthread+0x337/0x6f0
[   13.431198]  ? trace_preempt_on+0x20/0xc0
[   13.431220]  ? __pfx_kthread+0x10/0x10
[   13.431249]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.431270]  ? calculate_sigpending+0x7b/0xa0
[   13.431292]  ? __pfx_kthread+0x10/0x10
[   13.431309]  ret_from_fork+0x41/0x80
[   13.431330]  ? __pfx_kthread+0x10/0x10
[   13.431347]  ret_from_fork_asm+0x1a/0x30
[   13.431378]  </TASK>
[   13.431388] 
[   13.446017] Allocated by task 281:
[   13.446425]  kasan_save_stack+0x45/0x70
[   13.446815]  kasan_save_track+0x18/0x40
[   13.446964]  kasan_save_alloc_info+0x3b/0x50
[   13.447110]  __kasan_kmalloc+0xb7/0xc0
[   13.447254]  __kmalloc_cache_noprof+0x189/0x420
[   13.447411]  kasan_bitops_generic+0x92/0x1c0
[   13.447554]  kunit_try_run_case+0x1a5/0x480
[   13.447872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.448085]  kthread+0x337/0x6f0
[   13.448236]  ret_from_fork+0x41/0x80
[   13.448475]  ret_from_fork_asm+0x1a/0x30
[   13.448677] 
[   13.448745] The buggy address belongs to the object at ffff888102219660
[   13.448745]  which belongs to the cache kmalloc-16 of size 16
[   13.449139] The buggy address is located 8 bytes inside of
[   13.449139]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.449873] 
[   13.449952] The buggy address belongs to the physical page:
[   13.450423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.450839] flags: 0x200000000000000(node=0|zone=2)
[   13.451122] page_type: f5(slab)
[   13.451280] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.451556] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.452573] page dumped because: kasan: bad access detected
[   13.452932] 
[   13.453032] Memory state around the buggy address:
[   13.453246]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.454050]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.454364] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.454839]                                                           ^
[   13.455067]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.455408]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.455754] ==================================================================
[   13.525560] ==================================================================
[   13.525969] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.526357] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.526694] 
[   13.526803] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.526845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.526855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.526876] Call Trace:
[   13.526889]  <TASK>
[   13.526905]  dump_stack_lvl+0x73/0xb0
[   13.526942]  print_report+0xd1/0x610
[   13.526966]  ? __virt_addr_valid+0x1db/0x2d0
[   13.526987]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.527010]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.527033]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.527057]  kasan_report+0x141/0x180
[   13.527079]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.527107]  kasan_check_range+0x10c/0x1c0
[   13.527127]  __kasan_check_write+0x18/0x20
[   13.527147]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.527170]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.527195]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.527215]  ? trace_hardirqs_on+0x37/0xe0
[   13.527248]  ? kasan_bitops_generic+0x92/0x1c0
[   13.527272]  kasan_bitops_generic+0x121/0x1c0
[   13.527291]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.527313]  ? __pfx_read_tsc+0x10/0x10
[   13.527333]  ? ktime_get_ts64+0x86/0x230
[   13.527397]  kunit_try_run_case+0x1a5/0x480
[   13.527422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.527441]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.527462]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.527486]  ? __kthread_parkme+0x82/0x180
[   13.527507]  ? preempt_count_sub+0x50/0x80
[   13.527534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.527555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.527579]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.527602]  kthread+0x337/0x6f0
[   13.527619]  ? trace_preempt_on+0x20/0xc0
[   13.527642]  ? __pfx_kthread+0x10/0x10
[   13.527690]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.527715]  ? calculate_sigpending+0x7b/0xa0
[   13.527736]  ? __pfx_kthread+0x10/0x10
[   13.527754]  ret_from_fork+0x41/0x80
[   13.527775]  ? __pfx_kthread+0x10/0x10
[   13.527792]  ret_from_fork_asm+0x1a/0x30
[   13.527823]  </TASK>
[   13.527834] 
[   13.536022] Allocated by task 281:
[   13.536209]  kasan_save_stack+0x45/0x70
[   13.536462]  kasan_save_track+0x18/0x40
[   13.536760]  kasan_save_alloc_info+0x3b/0x50
[   13.537016]  __kasan_kmalloc+0xb7/0xc0
[   13.537209]  __kmalloc_cache_noprof+0x189/0x420
[   13.537460]  kasan_bitops_generic+0x92/0x1c0
[   13.537865]  kunit_try_run_case+0x1a5/0x480
[   13.538049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.538238]  kthread+0x337/0x6f0
[   13.538359]  ret_from_fork+0x41/0x80
[   13.538489]  ret_from_fork_asm+0x1a/0x30
[   13.538627] 
[   13.538696] The buggy address belongs to the object at ffff888102219660
[   13.538696]  which belongs to the cache kmalloc-16 of size 16
[   13.539049] The buggy address is located 8 bytes inside of
[   13.539049]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.539501] 
[   13.539595] The buggy address belongs to the physical page:
[   13.539844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.540475] flags: 0x200000000000000(node=0|zone=2)
[   13.540964] page_type: f5(slab)
[   13.541087] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.541331] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.541557] page dumped because: kasan: bad access detected
[   13.541727] 
[   13.541795] Memory state around the buggy address:
[   13.541950]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.542165]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.542792] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.543114]                                                           ^
[   13.543463]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.543786]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.544108] ==================================================================