Hay
Date
July 10, 2025, 11:10 p.m.

Environment
qemu-x86_64

[   14.897945] ==================================================================
[   14.898285] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.899020] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.899341] 
[   14.899494] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.899537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.899548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.899568] Call Trace:
[   14.899581]  <TASK>
[   14.899594]  dump_stack_lvl+0x73/0xb0
[   14.899623]  print_report+0xd1/0x650
[   14.899644]  ? __virt_addr_valid+0x1db/0x2d0
[   14.899667]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.899696]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.899720]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.899748]  kasan_report+0x141/0x180
[   14.899770]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.899804]  kasan_check_range+0x10c/0x1c0
[   14.899827]  __kasan_check_write+0x18/0x20
[   14.899846]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.899876]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.899906]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.899930]  ? trace_hardirqs_on+0x37/0xe0
[   14.899951]  ? kasan_bitops_generic+0x92/0x1c0
[   14.899979]  kasan_bitops_generic+0x121/0x1c0
[   14.900003]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.900028]  ? __pfx_read_tsc+0x10/0x10
[   14.900049]  ? ktime_get_ts64+0x86/0x230
[   14.900073]  kunit_try_run_case+0x1a5/0x480
[   14.900096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.900119]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.900142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.900171]  ? __kthread_parkme+0x82/0x180
[   14.900192]  ? preempt_count_sub+0x50/0x80
[   14.900215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.900239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.900266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.900291]  kthread+0x337/0x6f0
[   14.900309]  ? trace_preempt_on+0x20/0xc0
[   14.900332]  ? __pfx_kthread+0x10/0x10
[   14.900363]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.900384]  ? calculate_sigpending+0x7b/0xa0
[   14.900408]  ? __pfx_kthread+0x10/0x10
[   14.900430]  ret_from_fork+0x116/0x1d0
[   14.900448]  ? __pfx_kthread+0x10/0x10
[   14.900469]  ret_from_fork_asm+0x1a/0x30
[   14.900499]  </TASK>
[   14.900509] 
[   14.909774] Allocated by task 279:
[   14.909971]  kasan_save_stack+0x45/0x70
[   14.910190]  kasan_save_track+0x18/0x40
[   14.910423]  kasan_save_alloc_info+0x3b/0x50
[   14.910648]  __kasan_kmalloc+0xb7/0xc0
[   14.910801]  __kmalloc_cache_noprof+0x189/0x420
[   14.910950]  kasan_bitops_generic+0x92/0x1c0
[   14.911094]  kunit_try_run_case+0x1a5/0x480
[   14.911235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.911502]  kthread+0x337/0x6f0
[   14.911687]  ret_from_fork+0x116/0x1d0
[   14.911873]  ret_from_fork_asm+0x1a/0x30
[   14.912090] 
[   14.912213] The buggy address belongs to the object at ffff888102749de0
[   14.912213]  which belongs to the cache kmalloc-16 of size 16
[   14.913003] The buggy address is located 8 bytes inside of
[   14.913003]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.913505] 
[   14.913604] The buggy address belongs to the physical page:
[   14.913823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.914085] flags: 0x200000000000000(node=0|zone=2)
[   14.914328] page_type: f5(slab)
[   14.914620] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.914941] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.915252] page dumped because: kasan: bad access detected
[   14.915524] 
[   14.915634] Memory state around the buggy address:
[   14.915790]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.916065]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.916411] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.916645]                                                           ^
[   14.916957]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.917218]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.917609] ==================================================================
[   14.978657] ==================================================================
[   14.979024] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.979551] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.979905] 
[   14.980068] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.980149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.980161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.980211] Call Trace:
[   14.980240]  <TASK>
[   14.980254]  dump_stack_lvl+0x73/0xb0
[   14.980296]  print_report+0xd1/0x650
[   14.980318]  ? __virt_addr_valid+0x1db/0x2d0
[   14.980341]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.980381]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.980423]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.980453]  kasan_report+0x141/0x180
[   14.980475]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.980509]  kasan_check_range+0x10c/0x1c0
[   14.980532]  __kasan_check_write+0x18/0x20
[   14.980552]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.980580]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.980611]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.980635]  ? trace_hardirqs_on+0x37/0xe0
[   14.980657]  ? kasan_bitops_generic+0x92/0x1c0
[   14.980713]  kasan_bitops_generic+0x121/0x1c0
[   14.980737]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.980775]  ? __pfx_read_tsc+0x10/0x10
[   14.980797]  ? ktime_get_ts64+0x86/0x230
[   14.980821]  kunit_try_run_case+0x1a5/0x480
[   14.980844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.980868]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.980892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.980916]  ? __kthread_parkme+0x82/0x180
[   14.980936]  ? preempt_count_sub+0x50/0x80
[   14.980961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.981014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.981038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.981063]  kthread+0x337/0x6f0
[   14.981093]  ? trace_preempt_on+0x20/0xc0
[   14.981115]  ? __pfx_kthread+0x10/0x10
[   14.981161]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.981183]  ? calculate_sigpending+0x7b/0xa0
[   14.981207]  ? __pfx_kthread+0x10/0x10
[   14.981239]  ret_from_fork+0x116/0x1d0
[   14.981257]  ? __pfx_kthread+0x10/0x10
[   14.981303]  ret_from_fork_asm+0x1a/0x30
[   14.981334]  </TASK>
[   14.981343] 
[   14.990538] Allocated by task 279:
[   14.990726]  kasan_save_stack+0x45/0x70
[   14.990925]  kasan_save_track+0x18/0x40
[   14.991117]  kasan_save_alloc_info+0x3b/0x50
[   14.991322]  __kasan_kmalloc+0xb7/0xc0
[   14.991465]  __kmalloc_cache_noprof+0x189/0x420
[   14.991847]  kasan_bitops_generic+0x92/0x1c0
[   14.992080]  kunit_try_run_case+0x1a5/0x480
[   14.992332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.992733]  kthread+0x337/0x6f0
[   14.992924]  ret_from_fork+0x116/0x1d0
[   14.993059]  ret_from_fork_asm+0x1a/0x30
[   14.993253] 
[   14.993346] The buggy address belongs to the object at ffff888102749de0
[   14.993346]  which belongs to the cache kmalloc-16 of size 16
[   14.993973] The buggy address is located 8 bytes inside of
[   14.993973]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.994973] 
[   14.995108] The buggy address belongs to the physical page:
[   14.995433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.996610] flags: 0x200000000000000(node=0|zone=2)
[   14.997202] page_type: f5(slab)
[   14.997342] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.998746] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.999529] page dumped because: kasan: bad access detected
[   15.000086] 
[   15.000174] Memory state around the buggy address:
[   15.000334]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.000713]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.000930] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   15.001146]                                                           ^
[   15.001692]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.001910]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.002117] ==================================================================
[   15.024461] ==================================================================
[   15.024775] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.025134] Read of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   15.025460] 
[   15.025570] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.025609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.025621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.025640] Call Trace:
[   15.025653]  <TASK>
[   15.025665]  dump_stack_lvl+0x73/0xb0
[   15.025693]  print_report+0xd1/0x650
[   15.025714]  ? __virt_addr_valid+0x1db/0x2d0
[   15.025736]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.025765]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.025788]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.025817]  kasan_report+0x141/0x180
[   15.025839]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.025873]  kasan_check_range+0x10c/0x1c0
[   15.025897]  __kasan_check_read+0x15/0x20
[   15.025916]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.025945]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.025976]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.025999]  ? trace_hardirqs_on+0x37/0xe0
[   15.026021]  ? kasan_bitops_generic+0x92/0x1c0
[   15.026048]  kasan_bitops_generic+0x121/0x1c0
[   15.026071]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.026097]  ? __pfx_read_tsc+0x10/0x10
[   15.026117]  ? ktime_get_ts64+0x86/0x230
[   15.026140]  kunit_try_run_case+0x1a5/0x480
[   15.026163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.026187]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.026210]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.026234]  ? __kthread_parkme+0x82/0x180
[   15.026253]  ? preempt_count_sub+0x50/0x80
[   15.026277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.026302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.026326]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.026361]  kthread+0x337/0x6f0
[   15.026381]  ? trace_preempt_on+0x20/0xc0
[   15.026422]  ? __pfx_kthread+0x10/0x10
[   15.026445]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.026468]  ? calculate_sigpending+0x7b/0xa0
[   15.026492]  ? __pfx_kthread+0x10/0x10
[   15.026514]  ret_from_fork+0x116/0x1d0
[   15.026532]  ? __pfx_kthread+0x10/0x10
[   15.026553]  ret_from_fork_asm+0x1a/0x30
[   15.026584]  </TASK>
[   15.026593] 
[   15.034377] Allocated by task 279:
[   15.034573]  kasan_save_stack+0x45/0x70
[   15.034752]  kasan_save_track+0x18/0x40
[   15.034931]  kasan_save_alloc_info+0x3b/0x50
[   15.035096]  __kasan_kmalloc+0xb7/0xc0
[   15.035285]  __kmalloc_cache_noprof+0x189/0x420
[   15.035519]  kasan_bitops_generic+0x92/0x1c0
[   15.035671]  kunit_try_run_case+0x1a5/0x480
[   15.035881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.036144]  kthread+0x337/0x6f0
[   15.036332]  ret_from_fork+0x116/0x1d0
[   15.036547]  ret_from_fork_asm+0x1a/0x30
[   15.036716] 
[   15.036810] The buggy address belongs to the object at ffff888102749de0
[   15.036810]  which belongs to the cache kmalloc-16 of size 16
[   15.037198] The buggy address is located 8 bytes inside of
[   15.037198]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   15.037575] 
[   15.037670] The buggy address belongs to the physical page:
[   15.037921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   15.038270] flags: 0x200000000000000(node=0|zone=2)
[   15.038534] page_type: f5(slab)
[   15.038688] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.038920] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.039146] page dumped because: kasan: bad access detected
[   15.039366] 
[   15.039483] Memory state around the buggy address:
[   15.039707]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.040036]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.040377] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   15.040712]                                                           ^
[   15.041003]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.041285]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.041541] ==================================================================
[   15.003013] ==================================================================
[   15.003782] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.004711] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   15.005230] 
[   15.005721] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.005771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.005791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.005812] Call Trace:
[   15.005826]  <TASK>
[   15.005848]  dump_stack_lvl+0x73/0xb0
[   15.005879]  print_report+0xd1/0x650
[   15.005901]  ? __virt_addr_valid+0x1db/0x2d0
[   15.005922]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.005951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.005974]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.006004]  kasan_report+0x141/0x180
[   15.006025]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.006058]  kasan_check_range+0x10c/0x1c0
[   15.006082]  __kasan_check_write+0x18/0x20
[   15.006102]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.006131]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.006161]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.006186]  ? trace_hardirqs_on+0x37/0xe0
[   15.006207]  ? kasan_bitops_generic+0x92/0x1c0
[   15.006235]  kasan_bitops_generic+0x121/0x1c0
[   15.006259]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.006284]  ? __pfx_read_tsc+0x10/0x10
[   15.006305]  ? ktime_get_ts64+0x86/0x230
[   15.006328]  kunit_try_run_case+0x1a5/0x480
[   15.006367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.006390]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.006438]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.006462]  ? __kthread_parkme+0x82/0x180
[   15.006483]  ? preempt_count_sub+0x50/0x80
[   15.006506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.006531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.006557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.006582]  kthread+0x337/0x6f0
[   15.006600]  ? trace_preempt_on+0x20/0xc0
[   15.006622]  ? __pfx_kthread+0x10/0x10
[   15.006642]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.006664]  ? calculate_sigpending+0x7b/0xa0
[   15.006688]  ? __pfx_kthread+0x10/0x10
[   15.006710]  ret_from_fork+0x116/0x1d0
[   15.006727]  ? __pfx_kthread+0x10/0x10
[   15.006747]  ret_from_fork_asm+0x1a/0x30
[   15.006778]  </TASK>
[   15.006789] 
[   15.014486] Allocated by task 279:
[   15.014632]  kasan_save_stack+0x45/0x70
[   15.014777]  kasan_save_track+0x18/0x40
[   15.014968]  kasan_save_alloc_info+0x3b/0x50
[   15.015180]  __kasan_kmalloc+0xb7/0xc0
[   15.015358]  __kmalloc_cache_noprof+0x189/0x420
[   15.015541]  kasan_bitops_generic+0x92/0x1c0
[   15.015757]  kunit_try_run_case+0x1a5/0x480
[   15.015964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.016229]  kthread+0x337/0x6f0
[   15.016359]  ret_from_fork+0x116/0x1d0
[   15.016516]  ret_from_fork_asm+0x1a/0x30
[   15.016657] 
[   15.016726] The buggy address belongs to the object at ffff888102749de0
[   15.016726]  which belongs to the cache kmalloc-16 of size 16
[   15.017244] The buggy address is located 8 bytes inside of
[   15.017244]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   15.017790] 
[   15.017887] The buggy address belongs to the physical page:
[   15.018064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   15.018300] flags: 0x200000000000000(node=0|zone=2)
[   15.018528] page_type: f5(slab)
[   15.018697] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.019039] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.019380] page dumped because: kasan: bad access detected
[   15.019644] 
[   15.019730] Memory state around the buggy address:
[   15.019929]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.020195]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.020511] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   15.020796]                                                           ^
[   15.021063]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.021335]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.021650] ==================================================================
[   14.919152] ==================================================================
[   14.919529] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.919835] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.920059] 
[   14.920140] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.920187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.920199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.920217] Call Trace:
[   14.920230]  <TASK>
[   14.920244]  dump_stack_lvl+0x73/0xb0
[   14.920270]  print_report+0xd1/0x650
[   14.920292]  ? __virt_addr_valid+0x1db/0x2d0
[   14.920313]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.920341]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.920375]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.920405]  kasan_report+0x141/0x180
[   14.920440]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.920473]  kasan_check_range+0x10c/0x1c0
[   14.920497]  __kasan_check_write+0x18/0x20
[   14.920541]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.920570]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.920616]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.920640]  ? trace_hardirqs_on+0x37/0xe0
[   14.920676]  ? kasan_bitops_generic+0x92/0x1c0
[   14.920717]  kasan_bitops_generic+0x121/0x1c0
[   14.920767]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.920806]  ? __pfx_read_tsc+0x10/0x10
[   14.920841]  ? ktime_get_ts64+0x86/0x230
[   14.920878]  kunit_try_run_case+0x1a5/0x480
[   14.920917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.920940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.920963]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.920987]  ? __kthread_parkme+0x82/0x180
[   14.921008]  ? preempt_count_sub+0x50/0x80
[   14.921031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.921055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.921079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.921105]  kthread+0x337/0x6f0
[   14.921123]  ? trace_preempt_on+0x20/0xc0
[   14.921146]  ? __pfx_kthread+0x10/0x10
[   14.921182]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.921217]  ? calculate_sigpending+0x7b/0xa0
[   14.921241]  ? __pfx_kthread+0x10/0x10
[   14.921276]  ret_from_fork+0x116/0x1d0
[   14.921307]  ? __pfx_kthread+0x10/0x10
[   14.921327]  ret_from_fork_asm+0x1a/0x30
[   14.921381]  </TASK>
[   14.921392] 
[   14.930204] Allocated by task 279:
[   14.930383]  kasan_save_stack+0x45/0x70
[   14.930577]  kasan_save_track+0x18/0x40
[   14.930788]  kasan_save_alloc_info+0x3b/0x50
[   14.930952]  __kasan_kmalloc+0xb7/0xc0
[   14.931086]  __kmalloc_cache_noprof+0x189/0x420
[   14.931266]  kasan_bitops_generic+0x92/0x1c0
[   14.931562]  kunit_try_run_case+0x1a5/0x480
[   14.931794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.932079]  kthread+0x337/0x6f0
[   14.932258]  ret_from_fork+0x116/0x1d0
[   14.932550]  ret_from_fork_asm+0x1a/0x30
[   14.932748] 
[   14.932840] The buggy address belongs to the object at ffff888102749de0
[   14.932840]  which belongs to the cache kmalloc-16 of size 16
[   14.933266] The buggy address is located 8 bytes inside of
[   14.933266]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.933991] 
[   14.934100] The buggy address belongs to the physical page:
[   14.934306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.934764] flags: 0x200000000000000(node=0|zone=2)
[   14.934998] page_type: f5(slab)
[   14.935161] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.935452] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.935812] page dumped because: kasan: bad access detected
[   14.936007] 
[   14.936099] Memory state around the buggy address:
[   14.936344]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.936704]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.936954] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.937285]                                                           ^
[   14.937605]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.937913]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.938200] ==================================================================
[   14.958017] ==================================================================
[   14.958609] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.959023] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.959314] 
[   14.959511] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.959563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.959575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.959604] Call Trace:
[   14.959620]  <TASK>
[   14.959633]  dump_stack_lvl+0x73/0xb0
[   14.959660]  print_report+0xd1/0x650
[   14.959682]  ? __virt_addr_valid+0x1db/0x2d0
[   14.959704]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.959762]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.959786]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.959826]  kasan_report+0x141/0x180
[   14.959849]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.959909]  kasan_check_range+0x10c/0x1c0
[   14.959933]  __kasan_check_write+0x18/0x20
[   14.959962]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.959993]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.960048]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.960073]  ? trace_hardirqs_on+0x37/0xe0
[   14.960104]  ? kasan_bitops_generic+0x92/0x1c0
[   14.960132]  kasan_bitops_generic+0x121/0x1c0
[   14.960184]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.960209]  ? __pfx_read_tsc+0x10/0x10
[   14.960241]  ? ktime_get_ts64+0x86/0x230
[   14.960264]  kunit_try_run_case+0x1a5/0x480
[   14.960289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.960312]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.960334]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.960367]  ? __kthread_parkme+0x82/0x180
[   14.960388]  ? preempt_count_sub+0x50/0x80
[   14.960430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.960455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.960479]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.960532]  kthread+0x337/0x6f0
[   14.960552]  ? trace_preempt_on+0x20/0xc0
[   14.960575]  ? __pfx_kthread+0x10/0x10
[   14.960606]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.960628]  ? calculate_sigpending+0x7b/0xa0
[   14.960652]  ? __pfx_kthread+0x10/0x10
[   14.960699]  ret_from_fork+0x116/0x1d0
[   14.960717]  ? __pfx_kthread+0x10/0x10
[   14.960738]  ret_from_fork_asm+0x1a/0x30
[   14.960778]  </TASK>
[   14.960787] 
[   14.969684] Allocated by task 279:
[   14.969888]  kasan_save_stack+0x45/0x70
[   14.970111]  kasan_save_track+0x18/0x40
[   14.970332]  kasan_save_alloc_info+0x3b/0x50
[   14.970577]  __kasan_kmalloc+0xb7/0xc0
[   14.970750]  __kmalloc_cache_noprof+0x189/0x420
[   14.970934]  kasan_bitops_generic+0x92/0x1c0
[   14.971143]  kunit_try_run_case+0x1a5/0x480
[   14.971386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.971738]  kthread+0x337/0x6f0
[   14.971860]  ret_from_fork+0x116/0x1d0
[   14.972089]  ret_from_fork_asm+0x1a/0x30
[   14.972368] 
[   14.972491] The buggy address belongs to the object at ffff888102749de0
[   14.972491]  which belongs to the cache kmalloc-16 of size 16
[   14.973072] The buggy address is located 8 bytes inside of
[   14.973072]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.973712] 
[   14.973810] The buggy address belongs to the physical page:
[   14.974060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.974332] flags: 0x200000000000000(node=0|zone=2)
[   14.974525] page_type: f5(slab)
[   14.974660] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.975007] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.975377] page dumped because: kasan: bad access detected
[   14.975702] 
[   14.975832] Memory state around the buggy address:
[   14.976074]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.976427]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.976804] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.977107]                                                           ^
[   14.977315]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.977704]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.978067] ==================================================================
[   14.938779] ==================================================================
[   14.939194] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.939643] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.939951] 
[   14.940074] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.940117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.940135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.940155] Call Trace:
[   14.940170]  <TASK>
[   14.940201]  dump_stack_lvl+0x73/0xb0
[   14.940229]  print_report+0xd1/0x650
[   14.940250]  ? __virt_addr_valid+0x1db/0x2d0
[   14.940272]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.940324]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.940358]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.940388]  kasan_report+0x141/0x180
[   14.940409]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.940467]  kasan_check_range+0x10c/0x1c0
[   14.940491]  __kasan_check_write+0x18/0x20
[   14.940511]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.940541]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.940571]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.940596]  ? trace_hardirqs_on+0x37/0xe0
[   14.940634]  ? kasan_bitops_generic+0x92/0x1c0
[   14.940676]  kasan_bitops_generic+0x121/0x1c0
[   14.940713]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.940751]  ? __pfx_read_tsc+0x10/0x10
[   14.940772]  ? ktime_get_ts64+0x86/0x230
[   14.940795]  kunit_try_run_case+0x1a5/0x480
[   14.940819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.940842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.940865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.940888]  ? __kthread_parkme+0x82/0x180
[   14.940908]  ? preempt_count_sub+0x50/0x80
[   14.940931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.940955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.940979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.941004]  kthread+0x337/0x6f0
[   14.941023]  ? trace_preempt_on+0x20/0xc0
[   14.941044]  ? __pfx_kthread+0x10/0x10
[   14.941065]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.941087]  ? calculate_sigpending+0x7b/0xa0
[   14.941110]  ? __pfx_kthread+0x10/0x10
[   14.941132]  ret_from_fork+0x116/0x1d0
[   14.941150]  ? __pfx_kthread+0x10/0x10
[   14.941170]  ret_from_fork_asm+0x1a/0x30
[   14.941201]  </TASK>
[   14.941210] 
[   14.949363] Allocated by task 279:
[   14.949491]  kasan_save_stack+0x45/0x70
[   14.949635]  kasan_save_track+0x18/0x40
[   14.949825]  kasan_save_alloc_info+0x3b/0x50
[   14.950037]  __kasan_kmalloc+0xb7/0xc0
[   14.950226]  __kmalloc_cache_noprof+0x189/0x420
[   14.950525]  kasan_bitops_generic+0x92/0x1c0
[   14.950740]  kunit_try_run_case+0x1a5/0x480
[   14.950948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.951230]  kthread+0x337/0x6f0
[   14.951446]  ret_from_fork+0x116/0x1d0
[   14.951629]  ret_from_fork_asm+0x1a/0x30
[   14.951768] 
[   14.951839] The buggy address belongs to the object at ffff888102749de0
[   14.951839]  which belongs to the cache kmalloc-16 of size 16
[   14.952182] The buggy address is located 8 bytes inside of
[   14.952182]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.952836] 
[   14.952996] The buggy address belongs to the physical page:
[   14.953298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.953677] flags: 0x200000000000000(node=0|zone=2)
[   14.953906] page_type: f5(slab)
[   14.954066] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.954431] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.954785] page dumped because: kasan: bad access detected
[   14.955050] 
[   14.955165] Memory state around the buggy address:
[   14.955423]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.955758]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.956072] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.956492]                                                           ^
[   14.956777]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.957124]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.957484] ==================================================================
[   14.879008] ==================================================================
[   14.879443] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.880076] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   14.880467] 
[   14.880583] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.880623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.880635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.880654] Call Trace:
[   14.880668]  <TASK>
[   14.880682]  dump_stack_lvl+0x73/0xb0
[   14.880708]  print_report+0xd1/0x650
[   14.880729]  ? __virt_addr_valid+0x1db/0x2d0
[   14.880751]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.880779]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.880803]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.880831]  kasan_report+0x141/0x180
[   14.880853]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.880886]  kasan_check_range+0x10c/0x1c0
[   14.880910]  __kasan_check_write+0x18/0x20
[   14.880929]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.880958]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.880988]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.881012]  ? trace_hardirqs_on+0x37/0xe0
[   14.881034]  ? kasan_bitops_generic+0x92/0x1c0
[   14.881063]  kasan_bitops_generic+0x121/0x1c0
[   14.881086]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.881111]  ? __pfx_read_tsc+0x10/0x10
[   14.881132]  ? ktime_get_ts64+0x86/0x230
[   14.881154]  kunit_try_run_case+0x1a5/0x480
[   14.881178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.881201]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.881247]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.881271]  ? __kthread_parkme+0x82/0x180
[   14.881291]  ? preempt_count_sub+0x50/0x80
[   14.881330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.881379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.881404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.881440]  kthread+0x337/0x6f0
[   14.881459]  ? trace_preempt_on+0x20/0xc0
[   14.881481]  ? __pfx_kthread+0x10/0x10
[   14.881501]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.881523]  ? calculate_sigpending+0x7b/0xa0
[   14.881546]  ? __pfx_kthread+0x10/0x10
[   14.881568]  ret_from_fork+0x116/0x1d0
[   14.881586]  ? __pfx_kthread+0x10/0x10
[   14.881606]  ret_from_fork_asm+0x1a/0x30
[   14.881637]  </TASK>
[   14.881646] 
[   14.890002] Allocated by task 279:
[   14.890176]  kasan_save_stack+0x45/0x70
[   14.890393]  kasan_save_track+0x18/0x40
[   14.890607]  kasan_save_alloc_info+0x3b/0x50
[   14.890814]  __kasan_kmalloc+0xb7/0xc0
[   14.890997]  __kmalloc_cache_noprof+0x189/0x420
[   14.891220]  kasan_bitops_generic+0x92/0x1c0
[   14.891463]  kunit_try_run_case+0x1a5/0x480
[   14.891671]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.891864]  kthread+0x337/0x6f0
[   14.891986]  ret_from_fork+0x116/0x1d0
[   14.892130]  ret_from_fork_asm+0x1a/0x30
[   14.892334] 
[   14.892449] The buggy address belongs to the object at ffff888102749de0
[   14.892449]  which belongs to the cache kmalloc-16 of size 16
[   14.892966] The buggy address is located 8 bytes inside of
[   14.892966]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   14.893465] 
[   14.893561] The buggy address belongs to the physical page:
[   14.893797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   14.894141] flags: 0x200000000000000(node=0|zone=2)
[   14.894393] page_type: f5(slab)
[   14.894564] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.894916] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.895210] page dumped because: kasan: bad access detected
[   14.895495] 
[   14.895593] Memory state around the buggy address:
[   14.895794]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.896110]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.896445] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.896739]                                                           ^
[   14.896970]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.897186]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.897425] ==================================================================
[   15.042186] ==================================================================
[   15.042589] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.042881] Read of size 8 at addr ffff888102749de8 by task kunit_try_catch/279
[   15.043210] 
[   15.043314] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.043361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.043374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.043392] Call Trace:
[   15.043424]  <TASK>
[   15.043438]  dump_stack_lvl+0x73/0xb0
[   15.043464]  print_report+0xd1/0x650
[   15.043485]  ? __virt_addr_valid+0x1db/0x2d0
[   15.043509]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.043537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.043562]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.043590]  kasan_report+0x141/0x180
[   15.043612]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.043645]  __asan_report_load8_noabort+0x18/0x20
[   15.043671]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.043700]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.043731]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.043754]  ? trace_hardirqs_on+0x37/0xe0
[   15.043776]  ? kasan_bitops_generic+0x92/0x1c0
[   15.043804]  kasan_bitops_generic+0x121/0x1c0
[   15.043828]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.043854]  ? __pfx_read_tsc+0x10/0x10
[   15.043875]  ? ktime_get_ts64+0x86/0x230
[   15.043898]  kunit_try_run_case+0x1a5/0x480
[   15.043922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.043945]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.043967]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.043991]  ? __kthread_parkme+0x82/0x180
[   15.044011]  ? preempt_count_sub+0x50/0x80
[   15.044034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.044059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.044084]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.044109]  kthread+0x337/0x6f0
[   15.044127]  ? trace_preempt_on+0x20/0xc0
[   15.044149]  ? __pfx_kthread+0x10/0x10
[   15.044174]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.044196]  ? calculate_sigpending+0x7b/0xa0
[   15.044220]  ? __pfx_kthread+0x10/0x10
[   15.044241]  ret_from_fork+0x116/0x1d0
[   15.044259]  ? __pfx_kthread+0x10/0x10
[   15.044280]  ret_from_fork_asm+0x1a/0x30
[   15.044310]  </TASK>
[   15.044320] 
[   15.055007] Allocated by task 279:
[   15.055247]  kasan_save_stack+0x45/0x70
[   15.055447]  kasan_save_track+0x18/0x40
[   15.055627]  kasan_save_alloc_info+0x3b/0x50
[   15.055844]  __kasan_kmalloc+0xb7/0xc0
[   15.056015]  __kmalloc_cache_noprof+0x189/0x420
[   15.056605]  kasan_bitops_generic+0x92/0x1c0
[   15.057084]  kunit_try_run_case+0x1a5/0x480
[   15.057592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.058056]  kthread+0x337/0x6f0
[   15.058187]  ret_from_fork+0x116/0x1d0
[   15.058319]  ret_from_fork_asm+0x1a/0x30
[   15.058942] 
[   15.059201] The buggy address belongs to the object at ffff888102749de0
[   15.059201]  which belongs to the cache kmalloc-16 of size 16
[   15.060445] The buggy address is located 8 bytes inside of
[   15.060445]  allocated 9-byte region [ffff888102749de0, ffff888102749de9)
[   15.060854] 
[   15.060929] The buggy address belongs to the physical page:
[   15.061099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749
[   15.061335] flags: 0x200000000000000(node=0|zone=2)
[   15.061816] page_type: f5(slab)
[   15.062109] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.062831] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.063610] page dumped because: kasan: bad access detected
[   15.064186] 
[   15.064449] Memory state around the buggy address:
[   15.065003]  ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.065563]  ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.065785] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   15.065998]                                                           ^
[   15.066196]  ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.066547]  ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.067157] ==================================================================