Hay
Date
July 5, 2025, 11:11 p.m.

Environment
qemu-x86_64

[   16.080910] ==================================================================
[   16.081505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.082027] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   16.082492] 
[   16.082664] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.082743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.082759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.082785] Call Trace:
[   16.082821]  <TASK>
[   16.082841]  dump_stack_lvl+0x73/0xb0
[   16.082875]  print_report+0xd1/0x650
[   16.082901]  ? __virt_addr_valid+0x1db/0x2d0
[   16.082958]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.083019]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.083059]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.083100]  kasan_report+0x141/0x180
[   16.083135]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.083171]  kasan_check_range+0x10c/0x1c0
[   16.083210]  __kasan_check_write+0x18/0x20
[   16.083232]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.083263]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.083295]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.083323]  ? trace_hardirqs_on+0x37/0xe0
[   16.083348]  ? kasan_bitops_generic+0x92/0x1c0
[   16.083379]  kasan_bitops_generic+0x121/0x1c0
[   16.083405]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.083465]  ? __pfx_read_tsc+0x10/0x10
[   16.083489]  ? ktime_get_ts64+0x86/0x230
[   16.083518]  kunit_try_run_case+0x1a5/0x480
[   16.083557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.083583]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.083628]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.083653]  ? __kthread_parkme+0x82/0x180
[   16.083692]  ? preempt_count_sub+0x50/0x80
[   16.083735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.083761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.083815]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.083841]  kthread+0x337/0x6f0
[   16.083879]  ? trace_preempt_on+0x20/0xc0
[   16.083915]  ? __pfx_kthread+0x10/0x10
[   16.083938]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.083963]  ? calculate_sigpending+0x7b/0xa0
[   16.084003]  ? __pfx_kthread+0x10/0x10
[   16.084027]  ret_from_fork+0x116/0x1d0
[   16.084050]  ? __pfx_kthread+0x10/0x10
[   16.084073]  ret_from_fork_asm+0x1a/0x30
[   16.084116]  </TASK>
[   16.084130] 
[   16.094543] Allocated by task 279:
[   16.094705]  kasan_save_stack+0x45/0x70
[   16.094941]  kasan_save_track+0x18/0x40
[   16.095209]  kasan_save_alloc_info+0x3b/0x50
[   16.095582]  __kasan_kmalloc+0xb7/0xc0
[   16.095730]  __kmalloc_cache_noprof+0x189/0x420
[   16.095914]  kasan_bitops_generic+0x92/0x1c0
[   16.096395]  kunit_try_run_case+0x1a5/0x480
[   16.096684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.097030]  kthread+0x337/0x6f0
[   16.097280]  ret_from_fork+0x116/0x1d0
[   16.097480]  ret_from_fork_asm+0x1a/0x30
[   16.097637] 
[   16.097718] The buggy address belongs to the object at ffff88810216f120
[   16.097718]  which belongs to the cache kmalloc-16 of size 16
[   16.098386] The buggy address is located 8 bytes inside of
[   16.098386]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   16.099284] 
[   16.099399] The buggy address belongs to the physical page:
[   16.099651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   16.099931] flags: 0x200000000000000(node=0|zone=2)
[   16.100119] page_type: f5(slab)
[   16.100256] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.100512] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.100899] page dumped because: kasan: bad access detected
[   16.101263] 
[   16.101395] Memory state around the buggy address:
[   16.101739]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   16.102398]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.102820] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.103110]                                   ^
[   16.103361]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.103714]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.104148] ==================================================================
[   16.105412] ==================================================================
[   16.105840] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.107008] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   16.107452] 
[   16.107592] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.107681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.107696] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.107735] Call Trace:
[   16.107756]  <TASK>
[   16.107777]  dump_stack_lvl+0x73/0xb0
[   16.107859]  print_report+0xd1/0x650
[   16.107887]  ? __virt_addr_valid+0x1db/0x2d0
[   16.107915]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.107959]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.107984]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.108046]  kasan_report+0x141/0x180
[   16.108072]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.108131]  kasan_check_range+0x10c/0x1c0
[   16.108158]  __kasan_check_write+0x18/0x20
[   16.108193]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.108223]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.108255]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.108304]  ? trace_hardirqs_on+0x37/0xe0
[   16.108345]  ? kasan_bitops_generic+0x92/0x1c0
[   16.108388]  kasan_bitops_generic+0x121/0x1c0
[   16.108415]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.108443]  ? __pfx_read_tsc+0x10/0x10
[   16.108482]  ? ktime_get_ts64+0x86/0x230
[   16.108509]  kunit_try_run_case+0x1a5/0x480
[   16.108550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.108576]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.108603]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.108630]  ? __kthread_parkme+0x82/0x180
[   16.108655]  ? preempt_count_sub+0x50/0x80
[   16.108682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.108710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.108735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.108761]  kthread+0x337/0x6f0
[   16.108784]  ? trace_preempt_on+0x20/0xc0
[   16.108819]  ? __pfx_kthread+0x10/0x10
[   16.108843]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.108867]  ? calculate_sigpending+0x7b/0xa0
[   16.108894]  ? __pfx_kthread+0x10/0x10
[   16.108919]  ret_from_fork+0x116/0x1d0
[   16.108941]  ? __pfx_kthread+0x10/0x10
[   16.108964]  ret_from_fork_asm+0x1a/0x30
[   16.109000]  </TASK>
[   16.109015] 
[   16.120044] Allocated by task 279:
[   16.120305]  kasan_save_stack+0x45/0x70
[   16.120562]  kasan_save_track+0x18/0x40
[   16.120804]  kasan_save_alloc_info+0x3b/0x50
[   16.121102]  __kasan_kmalloc+0xb7/0xc0
[   16.121343]  __kmalloc_cache_noprof+0x189/0x420
[   16.121641]  kasan_bitops_generic+0x92/0x1c0
[   16.121856]  kunit_try_run_case+0x1a5/0x480
[   16.122126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.122467]  kthread+0x337/0x6f0
[   16.122611]  ret_from_fork+0x116/0x1d0
[   16.122765]  ret_from_fork_asm+0x1a/0x30
[   16.123099] 
[   16.123249] The buggy address belongs to the object at ffff88810216f120
[   16.123249]  which belongs to the cache kmalloc-16 of size 16
[   16.126349] The buggy address is located 8 bytes inside of
[   16.126349]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   16.127848] 
[   16.127953] The buggy address belongs to the physical page:
[   16.128907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   16.130411] flags: 0x200000000000000(node=0|zone=2)
[   16.130807] page_type: f5(slab)
[   16.130960] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.132188] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.133310] page dumped because: kasan: bad access detected
[   16.133540] 
[   16.133626] Memory state around the buggy address:
[   16.134158]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   16.134672]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.135032] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.135377]                                   ^
[   16.135616]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.136349]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.136635] ==================================================================
[   16.137731] ==================================================================
[   16.138201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.138583] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   16.138976] 
[   16.139139] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.139193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.139208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.139235] Call Trace:
[   16.139257]  <TASK>
[   16.139278]  dump_stack_lvl+0x73/0xb0
[   16.139313]  print_report+0xd1/0x650
[   16.139339]  ? __virt_addr_valid+0x1db/0x2d0
[   16.139366]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.139398]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.139423]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.139453]  kasan_report+0x141/0x180
[   16.139477]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.139513]  kasan_check_range+0x10c/0x1c0
[   16.139539]  __kasan_check_write+0x18/0x20
[   16.139561]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.139591]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.139625]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.139653]  ? trace_hardirqs_on+0x37/0xe0
[   16.139678]  ? kasan_bitops_generic+0x92/0x1c0
[   16.139709]  kasan_bitops_generic+0x121/0x1c0
[   16.139735]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.139762]  ? __pfx_read_tsc+0x10/0x10
[   16.139798]  ? ktime_get_ts64+0x86/0x230
[   16.139825]  kunit_try_run_case+0x1a5/0x480
[   16.139853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.139878]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.139905]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.139931]  ? __kthread_parkme+0x82/0x180
[   16.139955]  ? preempt_count_sub+0x50/0x80
[   16.139982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.140007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.140032]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.140059]  kthread+0x337/0x6f0
[   16.140104]  ? trace_preempt_on+0x20/0xc0
[   16.140129]  ? __pfx_kthread+0x10/0x10
[   16.140151]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.140175]  ? calculate_sigpending+0x7b/0xa0
[   16.140202]  ? __pfx_kthread+0x10/0x10
[   16.140225]  ret_from_fork+0x116/0x1d0
[   16.140246]  ? __pfx_kthread+0x10/0x10
[   16.140270]  ret_from_fork_asm+0x1a/0x30
[   16.140306]  </TASK>
[   16.140320] 
[   16.152362] Allocated by task 279:
[   16.152858]  kasan_save_stack+0x45/0x70
[   16.153348]  kasan_save_track+0x18/0x40
[   16.153571]  kasan_save_alloc_info+0x3b/0x50
[   16.153811]  __kasan_kmalloc+0xb7/0xc0
[   16.154013]  __kmalloc_cache_noprof+0x189/0x420
[   16.154662]  kasan_bitops_generic+0x92/0x1c0
[   16.154981]  kunit_try_run_case+0x1a5/0x480
[   16.155446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.155922]  kthread+0x337/0x6f0
[   16.156410]  ret_from_fork+0x116/0x1d0
[   16.156639]  ret_from_fork_asm+0x1a/0x30
[   16.156866] 
[   16.156970] The buggy address belongs to the object at ffff88810216f120
[   16.156970]  which belongs to the cache kmalloc-16 of size 16
[   16.158034] The buggy address is located 8 bytes inside of
[   16.158034]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   16.158742] 
[   16.158867] The buggy address belongs to the physical page:
[   16.159435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   16.159966] flags: 0x200000000000000(node=0|zone=2)
[   16.160447] page_type: f5(slab)
[   16.160776] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.161409] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.161915] page dumped because: kasan: bad access detected
[   16.162443] 
[   16.162561] Memory state around the buggy address:
[   16.162810]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   16.163494]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.163979] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.164666]                                   ^
[   16.164932]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.165501]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.165997] ==================================================================
[   16.200608] ==================================================================
[   16.201016] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.201586] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   16.201978] 
[   16.202096] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.202149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.202163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.202189] Call Trace:
[   16.202209]  <TASK>
[   16.202229]  dump_stack_lvl+0x73/0xb0
[   16.202265]  print_report+0xd1/0x650
[   16.202291]  ? __virt_addr_valid+0x1db/0x2d0
[   16.202318]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.202349]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.202375]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.202406]  kasan_report+0x141/0x180
[   16.202431]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.202466]  kasan_check_range+0x10c/0x1c0
[   16.202493]  __kasan_check_write+0x18/0x20
[   16.202516]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.202547]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.202579]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.202606]  ? trace_hardirqs_on+0x37/0xe0
[   16.202632]  ? kasan_bitops_generic+0x92/0x1c0
[   16.202663]  kasan_bitops_generic+0x121/0x1c0
[   16.202691]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.202719]  ? __pfx_read_tsc+0x10/0x10
[   16.202743]  ? ktime_get_ts64+0x86/0x230
[   16.202770]  kunit_try_run_case+0x1a5/0x480
[   16.202810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.202834]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.202862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.202888]  ? __kthread_parkme+0x82/0x180
[   16.202912]  ? preempt_count_sub+0x50/0x80
[   16.202939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.202966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.202992]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.203017]  kthread+0x337/0x6f0
[   16.203039]  ? trace_preempt_on+0x20/0xc0
[   16.203064]  ? __pfx_kthread+0x10/0x10
[   16.203101]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.203125]  ? calculate_sigpending+0x7b/0xa0
[   16.203153]  ? __pfx_kthread+0x10/0x10
[   16.203179]  ret_from_fork+0x116/0x1d0
[   16.203200]  ? __pfx_kthread+0x10/0x10
[   16.203224]  ret_from_fork_asm+0x1a/0x30
[   16.203259]  </TASK>
[   16.203274] 
[   16.212199] Allocated by task 279:
[   16.212419]  kasan_save_stack+0x45/0x70
[   16.212682]  kasan_save_track+0x18/0x40
[   16.212922]  kasan_save_alloc_info+0x3b/0x50
[   16.213253]  __kasan_kmalloc+0xb7/0xc0
[   16.213473]  __kmalloc_cache_noprof+0x189/0x420
[   16.213686]  kasan_bitops_generic+0x92/0x1c0
[   16.213910]  kunit_try_run_case+0x1a5/0x480
[   16.214077]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.214274]  kthread+0x337/0x6f0
[   16.214410]  ret_from_fork+0x116/0x1d0
[   16.214624]  ret_from_fork_asm+0x1a/0x30
[   16.214856] 
[   16.214985] The buggy address belongs to the object at ffff88810216f120
[   16.214985]  which belongs to the cache kmalloc-16 of size 16
[   16.215648] The buggy address is located 8 bytes inside of
[   16.215648]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   16.216057] 
[   16.216271] The buggy address belongs to the physical page:
[   16.216563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   16.216994] flags: 0x200000000000000(node=0|zone=2)
[   16.217499] page_type: f5(slab)
[   16.217666] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.218030] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.218442] page dumped because: kasan: bad access detected
[   16.218699] 
[   16.218799] Memory state around the buggy address:
[   16.218978]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   16.219501]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.219846] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.220089]                                   ^
[   16.220260]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.221002]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.221375] ==================================================================
[   16.027743] ==================================================================
[   16.028360] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.029017] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   16.029536] 
[   16.029730] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.029825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.029870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.029898] Call Trace:
[   16.029919]  <TASK>
[   16.029951]  dump_stack_lvl+0x73/0xb0
[   16.029989]  print_report+0xd1/0x650
[   16.030015]  ? __virt_addr_valid+0x1db/0x2d0
[   16.030041]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.030072]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.030097]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.030129]  kasan_report+0x141/0x180
[   16.030154]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.030190]  kasan_check_range+0x10c/0x1c0
[   16.030217]  __kasan_check_write+0x18/0x20
[   16.030272]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.030304]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.030348]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.030376]  ? trace_hardirqs_on+0x37/0xe0
[   16.030402]  ? kasan_bitops_generic+0x92/0x1c0
[   16.030471]  kasan_bitops_generic+0x121/0x1c0
[   16.030498]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.030527]  ? __pfx_read_tsc+0x10/0x10
[   16.030564]  ? ktime_get_ts64+0x86/0x230
[   16.030592]  kunit_try_run_case+0x1a5/0x480
[   16.030620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.030646]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.030674]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.030699]  ? __kthread_parkme+0x82/0x180
[   16.030723]  ? preempt_count_sub+0x50/0x80
[   16.030750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.030777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.030818]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.030843]  kthread+0x337/0x6f0
[   16.030866]  ? trace_preempt_on+0x20/0xc0
[   16.030891]  ? __pfx_kthread+0x10/0x10
[   16.030914]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.030937]  ? calculate_sigpending+0x7b/0xa0
[   16.030965]  ? __pfx_kthread+0x10/0x10
[   16.030990]  ret_from_fork+0x116/0x1d0
[   16.031012]  ? __pfx_kthread+0x10/0x10
[   16.031036]  ret_from_fork_asm+0x1a/0x30
[   16.031072]  </TASK>
[   16.031086] 
[   16.044911] Allocated by task 279:
[   16.045213]  kasan_save_stack+0x45/0x70
[   16.045672]  kasan_save_track+0x18/0x40
[   16.045901]  kasan_save_alloc_info+0x3b/0x50
[   16.046102]  __kasan_kmalloc+0xb7/0xc0
[   16.046377]  __kmalloc_cache_noprof+0x189/0x420
[   16.046689]  kasan_bitops_generic+0x92/0x1c0
[   16.046992]  kunit_try_run_case+0x1a5/0x480
[   16.047305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.047611]  kthread+0x337/0x6f0
[   16.047756]  ret_from_fork+0x116/0x1d0
[   16.048043]  ret_from_fork_asm+0x1a/0x30
[   16.048329] 
[   16.048419] The buggy address belongs to the object at ffff88810216f120
[   16.048419]  which belongs to the cache kmalloc-16 of size 16
[   16.049063] The buggy address is located 8 bytes inside of
[   16.049063]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   16.049673] 
[   16.049841] The buggy address belongs to the physical page:
[   16.050149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   16.050569] flags: 0x200000000000000(node=0|zone=2)
[   16.050889] page_type: f5(slab)
[   16.051130] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.051538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.051961] page dumped because: kasan: bad access detected
[   16.052366] 
[   16.052513] Memory state around the buggy address:
[   16.052805]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   16.053180]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.053573] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.053935]                                   ^
[   16.054104]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.054367]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.054844] ==================================================================
[   16.167614] ==================================================================
[   16.168209] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.168708] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   16.169075] 
[   16.169617] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.169682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.169699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.169726] Call Trace:
[   16.169748]  <TASK>
[   16.169819]  dump_stack_lvl+0x73/0xb0
[   16.169863]  print_report+0xd1/0x650
[   16.169890]  ? __virt_addr_valid+0x1db/0x2d0
[   16.169915]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.169948]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.169974]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.170008]  kasan_report+0x141/0x180
[   16.170033]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.170072]  kasan_check_range+0x10c/0x1c0
[   16.170118]  __kasan_check_write+0x18/0x20
[   16.170141]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.170172]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.170204]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.170232]  ? trace_hardirqs_on+0x37/0xe0
[   16.170257]  ? kasan_bitops_generic+0x92/0x1c0
[   16.170289]  kasan_bitops_generic+0x121/0x1c0
[   16.170316]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.170343]  ? __pfx_read_tsc+0x10/0x10
[   16.170368]  ? ktime_get_ts64+0x86/0x230
[   16.170395]  kunit_try_run_case+0x1a5/0x480
[   16.170423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.170448]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.170475]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.170502]  ? __kthread_parkme+0x82/0x180
[   16.170526]  ? preempt_count_sub+0x50/0x80
[   16.170552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.170579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.170605]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.170631]  kthread+0x337/0x6f0
[   16.170654]  ? trace_preempt_on+0x20/0xc0
[   16.170678]  ? __pfx_kthread+0x10/0x10
[   16.170701]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.170725]  ? calculate_sigpending+0x7b/0xa0
[   16.170752]  ? __pfx_kthread+0x10/0x10
[   16.170776]  ret_from_fork+0x116/0x1d0
[   16.170808]  ? __pfx_kthread+0x10/0x10
[   16.170832]  ret_from_fork_asm+0x1a/0x30
[   16.170868]  </TASK>
[   16.170881] 
[   16.184905] Allocated by task 279:
[   16.185364]  kasan_save_stack+0x45/0x70
[   16.185721]  kasan_save_track+0x18/0x40
[   16.186012]  kasan_save_alloc_info+0x3b/0x50
[   16.186663]  __kasan_kmalloc+0xb7/0xc0
[   16.186934]  __kmalloc_cache_noprof+0x189/0x420
[   16.187396]  kasan_bitops_generic+0x92/0x1c0
[   16.187649]  kunit_try_run_case+0x1a5/0x480
[   16.187886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.188508]  kthread+0x337/0x6f0
[   16.188762]  ret_from_fork+0x116/0x1d0
[   16.189103]  ret_from_fork_asm+0x1a/0x30
[   16.189566] 
[   16.189831] The buggy address belongs to the object at ffff88810216f120
[   16.189831]  which belongs to the cache kmalloc-16 of size 16
[   16.190671] The buggy address is located 8 bytes inside of
[   16.190671]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   16.191548] 
[   16.191823] The buggy address belongs to the physical page:
[   16.192274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   16.192679] flags: 0x200000000000000(node=0|zone=2)
[   16.192944] page_type: f5(slab)
[   16.193317] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.194051] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.194563] page dumped because: kasan: bad access detected
[   16.194978] 
[   16.195277] Memory state around the buggy address:
[   16.195532]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   16.195892]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.196657] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.197401]                                   ^
[   16.197731]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.198408]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.198932] ==================================================================
[   16.222131] ==================================================================
[   16.222544] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.223586] Read of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   16.223994] 
[   16.224141] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.224194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.224209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.224234] Call Trace:
[   16.224256]  <TASK>
[   16.224275]  dump_stack_lvl+0x73/0xb0
[   16.224310]  print_report+0xd1/0x650
[   16.224336]  ? __virt_addr_valid+0x1db/0x2d0
[   16.224362]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.224393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.224419]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.224450]  kasan_report+0x141/0x180
[   16.224474]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.224511]  kasan_check_range+0x10c/0x1c0
[   16.224538]  __kasan_check_read+0x15/0x20
[   16.224559]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.224590]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.224623]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.224651]  ? trace_hardirqs_on+0x37/0xe0
[   16.224675]  ? kasan_bitops_generic+0x92/0x1c0
[   16.224706]  kasan_bitops_generic+0x121/0x1c0
[   16.224733]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.224762]  ? __pfx_read_tsc+0x10/0x10
[   16.224785]  ? ktime_get_ts64+0x86/0x230
[   16.224828]  kunit_try_run_case+0x1a5/0x480
[   16.224855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.224880]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.224908]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.224934]  ? __kthread_parkme+0x82/0x180
[   16.224956]  ? preempt_count_sub+0x50/0x80
[   16.224984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.225011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.225036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.225063]  kthread+0x337/0x6f0
[   16.225098]  ? trace_preempt_on+0x20/0xc0
[   16.225123]  ? __pfx_kthread+0x10/0x10
[   16.225147]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.225171]  ? calculate_sigpending+0x7b/0xa0
[   16.225197]  ? __pfx_kthread+0x10/0x10
[   16.225222]  ret_from_fork+0x116/0x1d0
[   16.225244]  ? __pfx_kthread+0x10/0x10
[   16.225267]  ret_from_fork_asm+0x1a/0x30
[   16.225303]  </TASK>
[   16.225316] 
[   16.234192] Allocated by task 279:
[   16.234769]  kasan_save_stack+0x45/0x70
[   16.234944]  kasan_save_track+0x18/0x40
[   16.235096]  kasan_save_alloc_info+0x3b/0x50
[   16.235333]  __kasan_kmalloc+0xb7/0xc0
[   16.235613]  __kmalloc_cache_noprof+0x189/0x420
[   16.235933]  kasan_bitops_generic+0x92/0x1c0
[   16.236175]  kunit_try_run_case+0x1a5/0x480
[   16.236340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.236536]  kthread+0x337/0x6f0
[   16.236671]  ret_from_fork+0x116/0x1d0
[   16.237109]  ret_from_fork_asm+0x1a/0x30
[   16.237363] 
[   16.237475] The buggy address belongs to the object at ffff88810216f120
[   16.237475]  which belongs to the cache kmalloc-16 of size 16
[   16.238052] The buggy address is located 8 bytes inside of
[   16.238052]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   16.239798] 
[   16.239902] The buggy address belongs to the physical page:
[   16.240409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   16.241581] flags: 0x200000000000000(node=0|zone=2)
[   16.242225] page_type: f5(slab)
[   16.242676] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.243677] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.244354] page dumped because: kasan: bad access detected
[   16.244566] 
[   16.244651] Memory state around the buggy address:
[   16.245378]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   16.246327]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.247296] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.248058]                                   ^
[   16.248727]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.249453]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.249706] ==================================================================
[   16.056060] ==================================================================
[   16.056754] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.057330] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   16.057730] 
[   16.057899] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.057953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.057967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.057994] Call Trace:
[   16.058010]  <TASK>
[   16.058029]  dump_stack_lvl+0x73/0xb0
[   16.058064]  print_report+0xd1/0x650
[   16.058108]  ? __virt_addr_valid+0x1db/0x2d0
[   16.058135]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.058166]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.058229]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.058261]  kasan_report+0x141/0x180
[   16.058299]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.058336]  kasan_check_range+0x10c/0x1c0
[   16.058384]  __kasan_check_write+0x18/0x20
[   16.058416]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.058448]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.058493]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.058522]  ? trace_hardirqs_on+0x37/0xe0
[   16.058578]  ? kasan_bitops_generic+0x92/0x1c0
[   16.058610]  kasan_bitops_generic+0x121/0x1c0
[   16.058650]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.058679]  ? __pfx_read_tsc+0x10/0x10
[   16.058703]  ? ktime_get_ts64+0x86/0x230
[   16.058731]  kunit_try_run_case+0x1a5/0x480
[   16.058759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.058784]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.058844]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.058888]  ? __kthread_parkme+0x82/0x180
[   16.058912]  ? preempt_count_sub+0x50/0x80
[   16.058952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.058979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.059018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.059045]  kthread+0x337/0x6f0
[   16.059068]  ? trace_preempt_on+0x20/0xc0
[   16.059103]  ? __pfx_kthread+0x10/0x10
[   16.059128]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.059152]  ? calculate_sigpending+0x7b/0xa0
[   16.059180]  ? __pfx_kthread+0x10/0x10
[   16.059205]  ret_from_fork+0x116/0x1d0
[   16.059227]  ? __pfx_kthread+0x10/0x10
[   16.059250]  ret_from_fork_asm+0x1a/0x30
[   16.059286]  </TASK>
[   16.059300] 
[   16.069843] Allocated by task 279:
[   16.070081]  kasan_save_stack+0x45/0x70
[   16.070413]  kasan_save_track+0x18/0x40
[   16.070646]  kasan_save_alloc_info+0x3b/0x50
[   16.070936]  __kasan_kmalloc+0xb7/0xc0
[   16.071245]  __kmalloc_cache_noprof+0x189/0x420
[   16.071476]  kasan_bitops_generic+0x92/0x1c0
[   16.071774]  kunit_try_run_case+0x1a5/0x480
[   16.072043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.072404]  kthread+0x337/0x6f0
[   16.072622]  ret_from_fork+0x116/0x1d0
[   16.072876]  ret_from_fork_asm+0x1a/0x30
[   16.073103] 
[   16.073212] The buggy address belongs to the object at ffff88810216f120
[   16.073212]  which belongs to the cache kmalloc-16 of size 16
[   16.073955] The buggy address is located 8 bytes inside of
[   16.073955]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   16.074686] 
[   16.074773] The buggy address belongs to the physical page:
[   16.075049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   16.075474] flags: 0x200000000000000(node=0|zone=2)
[   16.075754] page_type: f5(slab)
[   16.075906] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.076403] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.076876] page dumped because: kasan: bad access detected
[   16.077290] 
[   16.077378] Memory state around the buggy address:
[   16.077557]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   16.077813]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.078117] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.078541]                                   ^
[   16.078896]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.079446]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.080019] ==================================================================
[   16.250260] ==================================================================
[   16.251003] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.252025] Read of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   16.252830] 
[   16.252941] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.252993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.253007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.253032] Call Trace:
[   16.253052]  <TASK>
[   16.253104]  dump_stack_lvl+0x73/0xb0
[   16.253139]  print_report+0xd1/0x650
[   16.253165]  ? __virt_addr_valid+0x1db/0x2d0
[   16.253216]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.253246]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.253289]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.253321]  kasan_report+0x141/0x180
[   16.253354]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.253390]  __asan_report_load8_noabort+0x18/0x20
[   16.253417]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.253448]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.253479]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.253508]  ? trace_hardirqs_on+0x37/0xe0
[   16.253533]  ? kasan_bitops_generic+0x92/0x1c0
[   16.253564]  kasan_bitops_generic+0x121/0x1c0
[   16.253591]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.253619]  ? __pfx_read_tsc+0x10/0x10
[   16.253643]  ? ktime_get_ts64+0x86/0x230
[   16.253671]  kunit_try_run_case+0x1a5/0x480
[   16.253703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.253729]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.253756]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.253782]  ? __kthread_parkme+0x82/0x180
[   16.253820]  ? preempt_count_sub+0x50/0x80
[   16.253849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.253877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.253904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.253931]  kthread+0x337/0x6f0
[   16.253954]  ? trace_preempt_on+0x20/0xc0
[   16.253979]  ? __pfx_kthread+0x10/0x10
[   16.254002]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.254026]  ? calculate_sigpending+0x7b/0xa0
[   16.254054]  ? __pfx_kthread+0x10/0x10
[   16.254101]  ret_from_fork+0x116/0x1d0
[   16.254124]  ? __pfx_kthread+0x10/0x10
[   16.254147]  ret_from_fork_asm+0x1a/0x30
[   16.254183]  </TASK>
[   16.254200] 
[   16.267728] Allocated by task 279:
[   16.267918]  kasan_save_stack+0x45/0x70
[   16.268437]  kasan_save_track+0x18/0x40
[   16.268689]  kasan_save_alloc_info+0x3b/0x50
[   16.268932]  __kasan_kmalloc+0xb7/0xc0
[   16.269416]  __kmalloc_cache_noprof+0x189/0x420
[   16.269934]  kasan_bitops_generic+0x92/0x1c0
[   16.270427]  kunit_try_run_case+0x1a5/0x480
[   16.270666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.270953]  kthread+0x337/0x6f0
[   16.271379]  ret_from_fork+0x116/0x1d0
[   16.271728]  ret_from_fork_asm+0x1a/0x30
[   16.272375] 
[   16.272492] The buggy address belongs to the object at ffff88810216f120
[   16.272492]  which belongs to the cache kmalloc-16 of size 16
[   16.273082] The buggy address is located 8 bytes inside of
[   16.273082]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   16.273652] 
[   16.273760] The buggy address belongs to the physical page:
[   16.274523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   16.275340] flags: 0x200000000000000(node=0|zone=2)
[   16.275853] page_type: f5(slab)
[   16.276354] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.276755] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.277362] page dumped because: kasan: bad access detected
[   16.277832] 
[   16.278149] Memory state around the buggy address:
[   16.278752]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   16.279641]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.280191] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.280552]                                   ^
[   16.280783]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.281091]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.281444] ==================================================================