Hay
Date
July 4, 2025, 11:11 p.m.

Environment
qemu-x86_64

[   14.398793] ==================================================================
[   14.399626] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.400535] Read of size 8 at addr ffff88810298e128 by task kunit_try_catch/278
[   14.401324] 
[   14.401535] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.401585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.401599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.401622] Call Trace:
[   14.401643]  <TASK>
[   14.401664]  dump_stack_lvl+0x73/0xb0
[   14.401697]  print_report+0xd1/0x650
[   14.401721]  ? __virt_addr_valid+0x1db/0x2d0
[   14.401743]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.401770]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.401792]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.401820]  kasan_report+0x141/0x180
[   14.401842]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.401872]  kasan_check_range+0x10c/0x1c0
[   14.401895]  __kasan_check_read+0x15/0x20
[   14.401914]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.401941]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.401968]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.401992]  ? trace_hardirqs_on+0x37/0xe0
[   14.402015]  ? kasan_bitops_generic+0x92/0x1c0
[   14.402041]  kasan_bitops_generic+0x121/0x1c0
[   14.402064]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.402088]  ? __pfx_read_tsc+0x10/0x10
[   14.402109]  ? ktime_get_ts64+0x86/0x230
[   14.402132]  kunit_try_run_case+0x1a5/0x480
[   14.402157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.402177]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.402202]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.402234]  ? __kthread_parkme+0x82/0x180
[   14.402269]  ? preempt_count_sub+0x50/0x80
[   14.402292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.402315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.402348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.402370]  kthread+0x337/0x6f0
[   14.402390]  ? trace_preempt_on+0x20/0xc0
[   14.402411]  ? __pfx_kthread+0x10/0x10
[   14.402431]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.402452]  ? calculate_sigpending+0x7b/0xa0
[   14.402475]  ? __pfx_kthread+0x10/0x10
[   14.402495]  ret_from_fork+0x116/0x1d0
[   14.402513]  ? __pfx_kthread+0x10/0x10
[   14.402533]  ret_from_fork_asm+0x1a/0x30
[   14.402563]  </TASK>
[   14.402574] 
[   14.414274] Allocated by task 278:
[   14.414582]  kasan_save_stack+0x45/0x70
[   14.414787]  kasan_save_track+0x18/0x40
[   14.415028]  kasan_save_alloc_info+0x3b/0x50
[   14.415183]  __kasan_kmalloc+0xb7/0xc0
[   14.415382]  __kmalloc_cache_noprof+0x189/0x420
[   14.415772]  kasan_bitops_generic+0x92/0x1c0
[   14.415954]  kunit_try_run_case+0x1a5/0x480
[   14.416102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.416467]  kthread+0x337/0x6f0
[   14.416649]  ret_from_fork+0x116/0x1d0
[   14.416902]  ret_from_fork_asm+0x1a/0x30
[   14.417079] 
[   14.417155] The buggy address belongs to the object at ffff88810298e120
[   14.417155]  which belongs to the cache kmalloc-16 of size 16
[   14.417812] The buggy address is located 8 bytes inside of
[   14.417812]  allocated 9-byte region [ffff88810298e120, ffff88810298e129)
[   14.418178] 
[   14.418286] The buggy address belongs to the physical page:
[   14.418623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e
[   14.418993] flags: 0x200000000000000(node=0|zone=2)
[   14.419242] page_type: f5(slab)
[   14.419410] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.419747] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.419978] page dumped because: kasan: bad access detected
[   14.420199] 
[   14.420326] Memory state around the buggy address:
[   14.420799]  ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.421176]  ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.421550] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.421818]                                   ^
[   14.422086]  ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.422488]  ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.422723] ==================================================================
[   14.262741] ==================================================================
[   14.263893] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.264300] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278
[   14.264611] 
[   14.264705] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.264754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.264767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.264801] Call Trace:
[   14.264821]  <TASK>
[   14.264841]  dump_stack_lvl+0x73/0xb0
[   14.264872]  print_report+0xd1/0x650
[   14.264895]  ? __virt_addr_valid+0x1db/0x2d0
[   14.264919]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.264945]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.264966]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.264992]  kasan_report+0x141/0x180
[   14.265013]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.265043]  kasan_check_range+0x10c/0x1c0
[   14.265066]  __kasan_check_write+0x18/0x20
[   14.265085]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.265111]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.265136]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.265161]  ? trace_hardirqs_on+0x37/0xe0
[   14.265183]  ? kasan_bitops_generic+0x92/0x1c0
[   14.265209]  kasan_bitops_generic+0x121/0x1c0
[   14.265244]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.265279]  ? __pfx_read_tsc+0x10/0x10
[   14.265300]  ? ktime_get_ts64+0x86/0x230
[   14.265323]  kunit_try_run_case+0x1a5/0x480
[   14.265348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.265369]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.265392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.265414]  ? __kthread_parkme+0x82/0x180
[   14.265434]  ? preempt_count_sub+0x50/0x80
[   14.265458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.265481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.265502]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.265524]  kthread+0x337/0x6f0
[   14.265543]  ? trace_preempt_on+0x20/0xc0
[   14.265564]  ? __pfx_kthread+0x10/0x10
[   14.265583]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.265603]  ? calculate_sigpending+0x7b/0xa0
[   14.265627]  ? __pfx_kthread+0x10/0x10
[   14.265647]  ret_from_fork+0x116/0x1d0
[   14.265665]  ? __pfx_kthread+0x10/0x10
[   14.265684]  ret_from_fork_asm+0x1a/0x30
[   14.265715]  </TASK>
[   14.265727] 
[   14.274811] Allocated by task 278:
[   14.274997]  kasan_save_stack+0x45/0x70
[   14.275210]  kasan_save_track+0x18/0x40
[   14.275391]  kasan_save_alloc_info+0x3b/0x50
[   14.275540]  __kasan_kmalloc+0xb7/0xc0
[   14.275672]  __kmalloc_cache_noprof+0x189/0x420
[   14.276023]  kasan_bitops_generic+0x92/0x1c0
[   14.276242]  kunit_try_run_case+0x1a5/0x480
[   14.276465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.276643]  kthread+0x337/0x6f0
[   14.276770]  ret_from_fork+0x116/0x1d0
[   14.276933]  ret_from_fork_asm+0x1a/0x30
[   14.277135] 
[   14.277242] The buggy address belongs to the object at ffff88810298e120
[   14.277242]  which belongs to the cache kmalloc-16 of size 16
[   14.277770] The buggy address is located 8 bytes inside of
[   14.277770]  allocated 9-byte region [ffff88810298e120, ffff88810298e129)
[   14.278247] 
[   14.278356] The buggy address belongs to the physical page:
[   14.278592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e
[   14.278918] flags: 0x200000000000000(node=0|zone=2)
[   14.279118] page_type: f5(slab)
[   14.279261] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.279612] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.279947] page dumped because: kasan: bad access detected
[   14.280150] 
[   14.280251] Memory state around the buggy address:
[   14.280438]  ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.280734]  ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.281023] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.281391]                                   ^
[   14.281582]  ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.281819]  ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.282033] ==================================================================
[   14.368746] ==================================================================
[   14.369048] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.370093] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278
[   14.370428] 
[   14.370548] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.370599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.370611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.370633] Call Trace:
[   14.370653]  <TASK>
[   14.370673]  dump_stack_lvl+0x73/0xb0
[   14.370706]  print_report+0xd1/0x650
[   14.370729]  ? __virt_addr_valid+0x1db/0x2d0
[   14.370752]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.370778]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.370800]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.370826]  kasan_report+0x141/0x180
[   14.370847]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.370877]  kasan_check_range+0x10c/0x1c0
[   14.370900]  __kasan_check_write+0x18/0x20
[   14.370919]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.370949]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.370976]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.371000]  ? trace_hardirqs_on+0x37/0xe0
[   14.371021]  ? kasan_bitops_generic+0x92/0x1c0
[   14.371048]  kasan_bitops_generic+0x121/0x1c0
[   14.371071]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.371094]  ? __pfx_read_tsc+0x10/0x10
[   14.371115]  ? ktime_get_ts64+0x86/0x230
[   14.371137]  kunit_try_run_case+0x1a5/0x480
[   14.371161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.371183]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.371205]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.371242]  ? __kthread_parkme+0x82/0x180
[   14.371263]  ? preempt_count_sub+0x50/0x80
[   14.371286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.371308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.371329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.371352]  kthread+0x337/0x6f0
[   14.371370]  ? trace_preempt_on+0x20/0xc0
[   14.371390]  ? __pfx_kthread+0x10/0x10
[   14.371410]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.371430]  ? calculate_sigpending+0x7b/0xa0
[   14.371453]  ? __pfx_kthread+0x10/0x10
[   14.371473]  ret_from_fork+0x116/0x1d0
[   14.371491]  ? __pfx_kthread+0x10/0x10
[   14.371511]  ret_from_fork_asm+0x1a/0x30
[   14.371542]  </TASK>
[   14.371554] 
[   14.384294] Allocated by task 278:
[   14.384659]  kasan_save_stack+0x45/0x70
[   14.385037]  kasan_save_track+0x18/0x40
[   14.385421]  kasan_save_alloc_info+0x3b/0x50
[   14.385797]  __kasan_kmalloc+0xb7/0xc0
[   14.386131]  __kmalloc_cache_noprof+0x189/0x420
[   14.386569]  kasan_bitops_generic+0x92/0x1c0
[   14.386944]  kunit_try_run_case+0x1a5/0x480
[   14.387361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.387816]  kthread+0x337/0x6f0
[   14.388103]  ret_from_fork+0x116/0x1d0
[   14.388338]  ret_from_fork_asm+0x1a/0x30
[   14.388706] 
[   14.388873] The buggy address belongs to the object at ffff88810298e120
[   14.388873]  which belongs to the cache kmalloc-16 of size 16
[   14.389682] The buggy address is located 8 bytes inside of
[   14.389682]  allocated 9-byte region [ffff88810298e120, ffff88810298e129)
[   14.390612] 
[   14.390696] The buggy address belongs to the physical page:
[   14.390871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e
[   14.391118] flags: 0x200000000000000(node=0|zone=2)
[   14.391489] page_type: f5(slab)
[   14.391844] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.392687] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.393429] page dumped because: kasan: bad access detected
[   14.393938] 
[   14.394104] Memory state around the buggy address:
[   14.394599]  ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.395232]  ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.395507] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.396130]                                   ^
[   14.396561]  ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.397064]  ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.397518] ==================================================================
[   14.323799] ==================================================================
[   14.324156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.324809] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278
[   14.325585] 
[   14.325812] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.325868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.325882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.325905] Call Trace:
[   14.326013]  <TASK>
[   14.326039]  dump_stack_lvl+0x73/0xb0
[   14.326076]  print_report+0xd1/0x650
[   14.326100]  ? __virt_addr_valid+0x1db/0x2d0
[   14.326124]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.326149]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.326171]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.326197]  kasan_report+0x141/0x180
[   14.326229]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.326274]  kasan_check_range+0x10c/0x1c0
[   14.326297]  __kasan_check_write+0x18/0x20
[   14.326315]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.326341]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.326367]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.326392]  ? trace_hardirqs_on+0x37/0xe0
[   14.326414]  ? kasan_bitops_generic+0x92/0x1c0
[   14.326440]  kasan_bitops_generic+0x121/0x1c0
[   14.326462]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.326485]  ? __pfx_read_tsc+0x10/0x10
[   14.326506]  ? ktime_get_ts64+0x86/0x230
[   14.326529]  kunit_try_run_case+0x1a5/0x480
[   14.326553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.326575]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.326598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.326619]  ? __kthread_parkme+0x82/0x180
[   14.326639]  ? preempt_count_sub+0x50/0x80
[   14.326662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.326685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.326707]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.326728]  kthread+0x337/0x6f0
[   14.326747]  ? trace_preempt_on+0x20/0xc0
[   14.326769]  ? __pfx_kthread+0x10/0x10
[   14.326789]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.326808]  ? calculate_sigpending+0x7b/0xa0
[   14.326832]  ? __pfx_kthread+0x10/0x10
[   14.326853]  ret_from_fork+0x116/0x1d0
[   14.326871]  ? __pfx_kthread+0x10/0x10
[   14.326890]  ret_from_fork_asm+0x1a/0x30
[   14.326921]  </TASK>
[   14.326933] 
[   14.338122] Allocated by task 278:
[   14.338530]  kasan_save_stack+0x45/0x70
[   14.338840]  kasan_save_track+0x18/0x40
[   14.339125]  kasan_save_alloc_info+0x3b/0x50
[   14.339512]  __kasan_kmalloc+0xb7/0xc0
[   14.339789]  __kmalloc_cache_noprof+0x189/0x420
[   14.340057]  kasan_bitops_generic+0x92/0x1c0
[   14.340253]  kunit_try_run_case+0x1a5/0x480
[   14.340627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.340893]  kthread+0x337/0x6f0
[   14.341057]  ret_from_fork+0x116/0x1d0
[   14.341522]  ret_from_fork_asm+0x1a/0x30
[   14.341735] 
[   14.341965] The buggy address belongs to the object at ffff88810298e120
[   14.341965]  which belongs to the cache kmalloc-16 of size 16
[   14.342629] The buggy address is located 8 bytes inside of
[   14.342629]  allocated 9-byte region [ffff88810298e120, ffff88810298e129)
[   14.343215] 
[   14.343388] The buggy address belongs to the physical page:
[   14.343841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e
[   14.344202] flags: 0x200000000000000(node=0|zone=2)
[   14.344588] page_type: f5(slab)
[   14.344859] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.345272] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.345697] page dumped because: kasan: bad access detected
[   14.346013] 
[   14.346095] Memory state around the buggy address:
[   14.346539]  ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.346931]  ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.347238] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.347673]                                   ^
[   14.347972]  ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.348403]  ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.348816] ==================================================================
[   14.302401] ==================================================================
[   14.302687] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.303076] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278
[   14.303525] 
[   14.303617] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.303664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.303676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.303699] Call Trace:
[   14.303720]  <TASK>
[   14.303740]  dump_stack_lvl+0x73/0xb0
[   14.303772]  print_report+0xd1/0x650
[   14.303795]  ? __virt_addr_valid+0x1db/0x2d0
[   14.303819]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.303845]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.303867]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.303894]  kasan_report+0x141/0x180
[   14.303915]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.303946]  kasan_check_range+0x10c/0x1c0
[   14.303968]  __kasan_check_write+0x18/0x20
[   14.303988]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.304015]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.304042]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.304065]  ? trace_hardirqs_on+0x37/0xe0
[   14.304087]  ? kasan_bitops_generic+0x92/0x1c0
[   14.304112]  kasan_bitops_generic+0x121/0x1c0
[   14.304140]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.304165]  ? __pfx_read_tsc+0x10/0x10
[   14.304186]  ? ktime_get_ts64+0x86/0x230
[   14.304210]  kunit_try_run_case+0x1a5/0x480
[   14.304248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.304775]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.304814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.304836]  ? __kthread_parkme+0x82/0x180
[   14.304857]  ? preempt_count_sub+0x50/0x80
[   14.304880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.304903]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.304927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.304948]  kthread+0x337/0x6f0
[   14.304968]  ? trace_preempt_on+0x20/0xc0
[   14.304989]  ? __pfx_kthread+0x10/0x10
[   14.305009]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.305029]  ? calculate_sigpending+0x7b/0xa0
[   14.305053]  ? __pfx_kthread+0x10/0x10
[   14.305073]  ret_from_fork+0x116/0x1d0
[   14.305093]  ? __pfx_kthread+0x10/0x10
[   14.305112]  ret_from_fork_asm+0x1a/0x30
[   14.305143]  </TASK>
[   14.305154] 
[   14.313701] Allocated by task 278:
[   14.313918]  kasan_save_stack+0x45/0x70
[   14.314118]  kasan_save_track+0x18/0x40
[   14.314342]  kasan_save_alloc_info+0x3b/0x50
[   14.314545]  __kasan_kmalloc+0xb7/0xc0
[   14.314690]  __kmalloc_cache_noprof+0x189/0x420
[   14.314846]  kasan_bitops_generic+0x92/0x1c0
[   14.314994]  kunit_try_run_case+0x1a5/0x480
[   14.315154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.315412]  kthread+0x337/0x6f0
[   14.315617]  ret_from_fork+0x116/0x1d0
[   14.315801]  ret_from_fork_asm+0x1a/0x30
[   14.316134] 
[   14.316206] The buggy address belongs to the object at ffff88810298e120
[   14.316206]  which belongs to the cache kmalloc-16 of size 16
[   14.316780] The buggy address is located 8 bytes inside of
[   14.316780]  allocated 9-byte region [ffff88810298e120, ffff88810298e129)
[   14.317144] 
[   14.317229] The buggy address belongs to the physical page:
[   14.317487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e
[   14.317849] flags: 0x200000000000000(node=0|zone=2)
[   14.318186] page_type: f5(slab)
[   14.318499] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.318877] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.319102] page dumped because: kasan: bad access detected
[   14.319379] 
[   14.319476] Memory state around the buggy address:
[   14.319696]  ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.320008]  ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.320377] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.320591]                                   ^
[   14.320734]  ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.320949]  ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.321208] ==================================================================
[   14.349755] ==================================================================
[   14.350424] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.350809] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278
[   14.351063] 
[   14.351184] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.351248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.351274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.351298] Call Trace:
[   14.351319]  <TASK>
[   14.351339]  dump_stack_lvl+0x73/0xb0
[   14.351370]  print_report+0xd1/0x650
[   14.351393]  ? __virt_addr_valid+0x1db/0x2d0
[   14.351416]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.351441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.351462]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.351488]  kasan_report+0x141/0x180
[   14.351510]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.351540]  kasan_check_range+0x10c/0x1c0
[   14.351562]  __kasan_check_write+0x18/0x20
[   14.351580]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.351607]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.351632]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.351656]  ? trace_hardirqs_on+0x37/0xe0
[   14.351678]  ? kasan_bitops_generic+0x92/0x1c0
[   14.351704]  kasan_bitops_generic+0x121/0x1c0
[   14.351727]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.351751]  ? __pfx_read_tsc+0x10/0x10
[   14.351771]  ? ktime_get_ts64+0x86/0x230
[   14.351794]  kunit_try_run_case+0x1a5/0x480
[   14.351817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.351839]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.351861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.351883]  ? __kthread_parkme+0x82/0x180
[   14.351902]  ? preempt_count_sub+0x50/0x80
[   14.351926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.351947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.351969]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.351991]  kthread+0x337/0x6f0
[   14.352009]  ? trace_preempt_on+0x20/0xc0
[   14.352030]  ? __pfx_kthread+0x10/0x10
[   14.352049]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.352068]  ? calculate_sigpending+0x7b/0xa0
[   14.352091]  ? __pfx_kthread+0x10/0x10
[   14.352112]  ret_from_fork+0x116/0x1d0
[   14.352129]  ? __pfx_kthread+0x10/0x10
[   14.352148]  ret_from_fork_asm+0x1a/0x30
[   14.352178]  </TASK>
[   14.352189] 
[   14.360140] Allocated by task 278:
[   14.360348]  kasan_save_stack+0x45/0x70
[   14.360554]  kasan_save_track+0x18/0x40
[   14.360758]  kasan_save_alloc_info+0x3b/0x50
[   14.360928]  __kasan_kmalloc+0xb7/0xc0
[   14.361114]  __kmalloc_cache_noprof+0x189/0x420
[   14.361297]  kasan_bitops_generic+0x92/0x1c0
[   14.361526]  kunit_try_run_case+0x1a5/0x480
[   14.361718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.361890]  kthread+0x337/0x6f0
[   14.362061]  ret_from_fork+0x116/0x1d0
[   14.362258]  ret_from_fork_asm+0x1a/0x30
[   14.362551] 
[   14.362641] The buggy address belongs to the object at ffff88810298e120
[   14.362641]  which belongs to the cache kmalloc-16 of size 16
[   14.363271] The buggy address is located 8 bytes inside of
[   14.363271]  allocated 9-byte region [ffff88810298e120, ffff88810298e129)
[   14.363775] 
[   14.363879] The buggy address belongs to the physical page:
[   14.364069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e
[   14.364324] flags: 0x200000000000000(node=0|zone=2)
[   14.364491] page_type: f5(slab)
[   14.364613] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.364927] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.365273] page dumped because: kasan: bad access detected
[   14.365531] 
[   14.365622] Memory state around the buggy address:
[   14.365844]  ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.366085]  ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.366467] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.366781]                                   ^
[   14.366956]  ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.367171]  ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.367659] ==================================================================
[   14.237668] ==================================================================
[   14.238330] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.238874] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278
[   14.239256] 
[   14.239741] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.239797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.239810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.239833] Call Trace:
[   14.239855]  <TASK>
[   14.239876]  dump_stack_lvl+0x73/0xb0
[   14.239912]  print_report+0xd1/0x650
[   14.239936]  ? __virt_addr_valid+0x1db/0x2d0
[   14.239958]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.239985]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.240009]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.240035]  kasan_report+0x141/0x180
[   14.240055]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.240087]  kasan_check_range+0x10c/0x1c0
[   14.240110]  __kasan_check_write+0x18/0x20
[   14.240128]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.240154]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.240180]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.240204]  ? trace_hardirqs_on+0x37/0xe0
[   14.240239]  ? kasan_bitops_generic+0x92/0x1c0
[   14.240278]  kasan_bitops_generic+0x121/0x1c0
[   14.240301]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.240325]  ? __pfx_read_tsc+0x10/0x10
[   14.240345]  ? ktime_get_ts64+0x86/0x230
[   14.240369]  kunit_try_run_case+0x1a5/0x480
[   14.240392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.240413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.240436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.240458]  ? __kthread_parkme+0x82/0x180
[   14.240479]  ? preempt_count_sub+0x50/0x80
[   14.240501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.240523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.240545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.240566]  kthread+0x337/0x6f0
[   14.240585]  ? trace_preempt_on+0x20/0xc0
[   14.240607]  ? __pfx_kthread+0x10/0x10
[   14.240627]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.240648]  ? calculate_sigpending+0x7b/0xa0
[   14.240672]  ? __pfx_kthread+0x10/0x10
[   14.240693]  ret_from_fork+0x116/0x1d0
[   14.240710]  ? __pfx_kthread+0x10/0x10
[   14.240729]  ret_from_fork_asm+0x1a/0x30
[   14.240760]  </TASK>
[   14.240772] 
[   14.252934] Allocated by task 278:
[   14.253245]  kasan_save_stack+0x45/0x70
[   14.253580]  kasan_save_track+0x18/0x40
[   14.253769]  kasan_save_alloc_info+0x3b/0x50
[   14.253955]  __kasan_kmalloc+0xb7/0xc0
[   14.254140]  __kmalloc_cache_noprof+0x189/0x420
[   14.254380]  kasan_bitops_generic+0x92/0x1c0
[   14.254940]  kunit_try_run_case+0x1a5/0x480
[   14.255236]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.255596]  kthread+0x337/0x6f0
[   14.255869]  ret_from_fork+0x116/0x1d0
[   14.256120]  ret_from_fork_asm+0x1a/0x30
[   14.256487] 
[   14.256580] The buggy address belongs to the object at ffff88810298e120
[   14.256580]  which belongs to the cache kmalloc-16 of size 16
[   14.257297] The buggy address is located 8 bytes inside of
[   14.257297]  allocated 9-byte region [ffff88810298e120, ffff88810298e129)
[   14.257779] 
[   14.257874] The buggy address belongs to the physical page:
[   14.258117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e
[   14.258441] flags: 0x200000000000000(node=0|zone=2)
[   14.258606] page_type: f5(slab)
[   14.258889] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.259248] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.259547] page dumped because: kasan: bad access detected
[   14.259811] 
[   14.259920] Memory state around the buggy address:
[   14.260138]  ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.260433]  ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.260734] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.261037]                                   ^
[   14.261244]  ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.261459]  ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.261875] ==================================================================
[   14.282751] ==================================================================
[   14.283779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.284130] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278
[   14.284570] 
[   14.284690] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.284738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.284751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.284774] Call Trace:
[   14.284803]  <TASK>
[   14.284824]  dump_stack_lvl+0x73/0xb0
[   14.284855]  print_report+0xd1/0x650
[   14.284877]  ? __virt_addr_valid+0x1db/0x2d0
[   14.284901]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.284927]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.284948]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.284974]  kasan_report+0x141/0x180
[   14.284995]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.285025]  kasan_check_range+0x10c/0x1c0
[   14.285048]  __kasan_check_write+0x18/0x20
[   14.285067]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.285093]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.285120]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.285143]  ? trace_hardirqs_on+0x37/0xe0
[   14.285165]  ? kasan_bitops_generic+0x92/0x1c0
[   14.285192]  kasan_bitops_generic+0x121/0x1c0
[   14.285214]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.285251]  ? __pfx_read_tsc+0x10/0x10
[   14.285346]  ? ktime_get_ts64+0x86/0x230
[   14.285370]  kunit_try_run_case+0x1a5/0x480
[   14.285395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.285416]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.285439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.285461]  ? __kthread_parkme+0x82/0x180
[   14.285481]  ? preempt_count_sub+0x50/0x80
[   14.285503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.285526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.285547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.285569]  kthread+0x337/0x6f0
[   14.285588]  ? trace_preempt_on+0x20/0xc0
[   14.285618]  ? __pfx_kthread+0x10/0x10
[   14.285638]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.285658]  ? calculate_sigpending+0x7b/0xa0
[   14.285682]  ? __pfx_kthread+0x10/0x10
[   14.285702]  ret_from_fork+0x116/0x1d0
[   14.285720]  ? __pfx_kthread+0x10/0x10
[   14.285740]  ret_from_fork_asm+0x1a/0x30
[   14.285770]  </TASK>
[   14.285781] 
[   14.293744] Allocated by task 278:
[   14.293899]  kasan_save_stack+0x45/0x70
[   14.294100]  kasan_save_track+0x18/0x40
[   14.294303]  kasan_save_alloc_info+0x3b/0x50
[   14.294630]  __kasan_kmalloc+0xb7/0xc0
[   14.294882]  __kmalloc_cache_noprof+0x189/0x420
[   14.295039]  kasan_bitops_generic+0x92/0x1c0
[   14.295274]  kunit_try_run_case+0x1a5/0x480
[   14.295482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.295716]  kthread+0x337/0x6f0
[   14.295837]  ret_from_fork+0x116/0x1d0
[   14.295975]  ret_from_fork_asm+0x1a/0x30
[   14.296154] 
[   14.296260] The buggy address belongs to the object at ffff88810298e120
[   14.296260]  which belongs to the cache kmalloc-16 of size 16
[   14.297068] The buggy address is located 8 bytes inside of
[   14.297068]  allocated 9-byte region [ffff88810298e120, ffff88810298e129)
[   14.297452] 
[   14.297525] The buggy address belongs to the physical page:
[   14.297701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e
[   14.297965] flags: 0x200000000000000(node=0|zone=2)
[   14.298202] page_type: f5(slab)
[   14.298501] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.298839] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.299151] page dumped because: kasan: bad access detected
[   14.299530] 
[   14.299622] Memory state around the buggy address:
[   14.299780]  ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.299996]  ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.300230] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.300563]                                   ^
[   14.300780]  ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.301103]  ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.301658] ==================================================================
[   14.423587] ==================================================================
[   14.424002] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.425004] Read of size 8 at addr ffff88810298e128 by task kunit_try_catch/278
[   14.425256] 
[   14.425351] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.425401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.425413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.425435] Call Trace:
[   14.425457]  <TASK>
[   14.425478]  dump_stack_lvl+0x73/0xb0
[   14.425513]  print_report+0xd1/0x650
[   14.425536]  ? __virt_addr_valid+0x1db/0x2d0
[   14.425559]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.425585]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.425606]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.425633]  kasan_report+0x141/0x180
[   14.425654]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.425686]  __asan_report_load8_noabort+0x18/0x20
[   14.425710]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.425737]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.425763]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.425787]  ? trace_hardirqs_on+0x37/0xe0
[   14.425809]  ? kasan_bitops_generic+0x92/0x1c0
[   14.425836]  kasan_bitops_generic+0x121/0x1c0
[   14.425857]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.425881]  ? __pfx_read_tsc+0x10/0x10
[   14.425903]  ? ktime_get_ts64+0x86/0x230
[   14.425927]  kunit_try_run_case+0x1a5/0x480
[   14.425951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.425972]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.425996]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.426018]  ? __kthread_parkme+0x82/0x180
[   14.426039]  ? preempt_count_sub+0x50/0x80
[   14.426062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.426085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.426107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.426129]  kthread+0x337/0x6f0
[   14.426147]  ? trace_preempt_on+0x20/0xc0
[   14.426168]  ? __pfx_kthread+0x10/0x10
[   14.426188]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.426208]  ? calculate_sigpending+0x7b/0xa0
[   14.426242]  ? __pfx_kthread+0x10/0x10
[   14.426274]  ret_from_fork+0x116/0x1d0
[   14.426294]  ? __pfx_kthread+0x10/0x10
[   14.426314]  ret_from_fork_asm+0x1a/0x30
[   14.426358]  </TASK>
[   14.426369] 
[   14.437699] Allocated by task 278:
[   14.437983]  kasan_save_stack+0x45/0x70
[   14.438331]  kasan_save_track+0x18/0x40
[   14.438653]  kasan_save_alloc_info+0x3b/0x50
[   14.438869]  __kasan_kmalloc+0xb7/0xc0
[   14.439043]  __kmalloc_cache_noprof+0x189/0x420
[   14.439255]  kasan_bitops_generic+0x92/0x1c0
[   14.439688]  kunit_try_run_case+0x1a5/0x480
[   14.439882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.440116]  kthread+0x337/0x6f0
[   14.440576]  ret_from_fork+0x116/0x1d0
[   14.440864]  ret_from_fork_asm+0x1a/0x30
[   14.441301] 
[   14.441544] The buggy address belongs to the object at ffff88810298e120
[   14.441544]  which belongs to the cache kmalloc-16 of size 16
[   14.442054] The buggy address is located 8 bytes inside of
[   14.442054]  allocated 9-byte region [ffff88810298e120, ffff88810298e129)
[   14.442956] 
[   14.443203] The buggy address belongs to the physical page:
[   14.443530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e
[   14.443865] flags: 0x200000000000000(node=0|zone=2)
[   14.444087] page_type: f5(slab)
[   14.444255] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.444574] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.444890] page dumped because: kasan: bad access detected
[   14.445117] 
[   14.445205] Memory state around the buggy address:
[   14.445971]  ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   14.446775]  ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.447445] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.448171]                                   ^
[   14.448683]  ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.449004]  ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.449944] ==================================================================