Hay
Date
July 11, 2025, 11:09 p.m.

Environment
qemu-x86_64

[   14.737380] ==================================================================
[   14.737709] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.738530] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278
[   14.738989] 
[   14.739098] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.739138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.739150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.739170] Call Trace:
[   14.739183]  <TASK>
[   14.739196]  dump_stack_lvl+0x73/0xb0
[   14.739226]  print_report+0xd1/0x650
[   14.739248]  ? __virt_addr_valid+0x1db/0x2d0
[   14.739272]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.739302]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.739325]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.739355]  kasan_report+0x141/0x180
[   14.739378]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.739415]  kasan_check_range+0x10c/0x1c0
[   14.739439]  __kasan_check_write+0x18/0x20
[   14.739459]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.739488]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.739520]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.739545]  ? trace_hardirqs_on+0x37/0xe0
[   14.739567]  ? kasan_bitops_generic+0x92/0x1c0
[   14.739595]  kasan_bitops_generic+0x121/0x1c0
[   14.739619]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.739646]  ? __pfx_read_tsc+0x10/0x10
[   14.739666]  ? ktime_get_ts64+0x86/0x230
[   14.739690]  kunit_try_run_case+0x1a5/0x480
[   14.739715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.739738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.739764]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.739788]  ? __kthread_parkme+0x82/0x180
[   14.739809]  ? preempt_count_sub+0x50/0x80
[   14.739833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.739857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.739882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.739907]  kthread+0x337/0x6f0
[   14.739937]  ? trace_preempt_on+0x20/0xc0
[   14.739959]  ? __pfx_kthread+0x10/0x10
[   14.739980]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.740002]  ? calculate_sigpending+0x7b/0xa0
[   14.740026]  ? __pfx_kthread+0x10/0x10
[   14.740048]  ret_from_fork+0x116/0x1d0
[   14.740066]  ? __pfx_kthread+0x10/0x10
[   14.740087]  ret_from_fork_asm+0x1a/0x30
[   14.740119]  </TASK>
[   14.740129] 
[   14.748121] Allocated by task 278:
[   14.748250]  kasan_save_stack+0x45/0x70
[   14.748672]  kasan_save_track+0x18/0x40
[   14.748970]  kasan_save_alloc_info+0x3b/0x50
[   14.749193]  __kasan_kmalloc+0xb7/0xc0
[   14.749381]  __kmalloc_cache_noprof+0x189/0x420
[   14.749593]  kasan_bitops_generic+0x92/0x1c0
[   14.749742]  kunit_try_run_case+0x1a5/0x480
[   14.749887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.750071]  kthread+0x337/0x6f0
[   14.750265]  ret_from_fork+0x116/0x1d0
[   14.750447]  ret_from_fork_asm+0x1a/0x30
[   14.750646] 
[   14.750739] The buggy address belongs to the object at ffff888102321e80
[   14.750739]  which belongs to the cache kmalloc-16 of size 16
[   14.751232] The buggy address is located 8 bytes inside of
[   14.751232]  allocated 9-byte region [ffff888102321e80, ffff888102321e89)
[   14.751583] 
[   14.751654] The buggy address belongs to the physical page:
[   14.752048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321
[   14.752401] flags: 0x200000000000000(node=0|zone=2)
[   14.752626] page_type: f5(slab)
[   14.752827] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.753161] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.753438] page dumped because: kasan: bad access detected
[   14.753661] 
[   14.753761] Memory state around the buggy address:
[   14.753972]  ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   14.754253]  ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.754545] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.754812]                       ^
[   14.754989]  ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.755228]  ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.755543] ==================================================================
[   14.688463] ==================================================================
[   14.688700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.689790] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278
[   14.690420] 
[   14.690596] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.690639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.690651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.690671] Call Trace:
[   14.690685]  <TASK>
[   14.690701]  dump_stack_lvl+0x73/0xb0
[   14.690752]  print_report+0xd1/0x650
[   14.690775]  ? __virt_addr_valid+0x1db/0x2d0
[   14.690798]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.690827]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.690850]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.690879]  kasan_report+0x141/0x180
[   14.690901]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.690944]  kasan_check_range+0x10c/0x1c0
[   14.690968]  __kasan_check_write+0x18/0x20
[   14.690987]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.691017]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.691047]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.691071]  ? trace_hardirqs_on+0x37/0xe0
[   14.691093]  ? kasan_bitops_generic+0x92/0x1c0
[   14.691121]  kasan_bitops_generic+0x121/0x1c0
[   14.691145]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.691172]  ? __pfx_read_tsc+0x10/0x10
[   14.691192]  ? ktime_get_ts64+0x86/0x230
[   14.691217]  kunit_try_run_case+0x1a5/0x480
[   14.691242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.691264]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.691288]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.691313]  ? __kthread_parkme+0x82/0x180
[   14.691335]  ? preempt_count_sub+0x50/0x80
[   14.691359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.691383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.691408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.691434]  kthread+0x337/0x6f0
[   14.691453]  ? trace_preempt_on+0x20/0xc0
[   14.691475]  ? __pfx_kthread+0x10/0x10
[   14.691496]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.691517]  ? calculate_sigpending+0x7b/0xa0
[   14.691541]  ? __pfx_kthread+0x10/0x10
[   14.691562]  ret_from_fork+0x116/0x1d0
[   14.691581]  ? __pfx_kthread+0x10/0x10
[   14.691601]  ret_from_fork_asm+0x1a/0x30
[   14.691633]  </TASK>
[   14.691642] 
[   14.704755] Allocated by task 278:
[   14.705077]  kasan_save_stack+0x45/0x70
[   14.705436]  kasan_save_track+0x18/0x40
[   14.705780]  kasan_save_alloc_info+0x3b/0x50
[   14.705944]  __kasan_kmalloc+0xb7/0xc0
[   14.706287]  __kmalloc_cache_noprof+0x189/0x420
[   14.706696]  kasan_bitops_generic+0x92/0x1c0
[   14.706967]  kunit_try_run_case+0x1a5/0x480
[   14.707116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.707293]  kthread+0x337/0x6f0
[   14.707413]  ret_from_fork+0x116/0x1d0
[   14.707545]  ret_from_fork_asm+0x1a/0x30
[   14.707683] 
[   14.707759] The buggy address belongs to the object at ffff888102321e80
[   14.707759]  which belongs to the cache kmalloc-16 of size 16
[   14.708506] The buggy address is located 8 bytes inside of
[   14.708506]  allocated 9-byte region [ffff888102321e80, ffff888102321e89)
[   14.709527] 
[   14.709683] The buggy address belongs to the physical page:
[   14.710183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321
[   14.710877] flags: 0x200000000000000(node=0|zone=2)
[   14.711310] page_type: f5(slab)
[   14.711594] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.712274] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.713042] page dumped because: kasan: bad access detected
[   14.713470] 
[   14.713539] Memory state around the buggy address:
[   14.713694]  ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   14.713938]  ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.714154] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.714364]                       ^
[   14.714486]  ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.714703]  ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.715284] ==================================================================
[   14.756405] ==================================================================
[   14.756759] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.757229] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278
[   14.757516] 
[   14.757622] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.757663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.757675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.757695] Call Trace:
[   14.757709]  <TASK>
[   14.757726]  dump_stack_lvl+0x73/0xb0
[   14.757768]  print_report+0xd1/0x650
[   14.757791]  ? __virt_addr_valid+0x1db/0x2d0
[   14.757814]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.757843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.757867]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.757897]  kasan_report+0x141/0x180
[   14.757934]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.757971]  kasan_check_range+0x10c/0x1c0
[   14.757996]  __kasan_check_write+0x18/0x20
[   14.758015]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.758046]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.758077]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.758101]  ? trace_hardirqs_on+0x37/0xe0
[   14.758123]  ? kasan_bitops_generic+0x92/0x1c0
[   14.758151]  kasan_bitops_generic+0x121/0x1c0
[   14.758176]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.758202]  ? __pfx_read_tsc+0x10/0x10
[   14.758222]  ? ktime_get_ts64+0x86/0x230
[   14.758246]  kunit_try_run_case+0x1a5/0x480
[   14.758270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.758293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.758317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.758341]  ? __kthread_parkme+0x82/0x180
[   14.758362]  ? preempt_count_sub+0x50/0x80
[   14.758387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.758411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.758437]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.758462]  kthread+0x337/0x6f0
[   14.758481]  ? trace_preempt_on+0x20/0xc0
[   14.758508]  ? __pfx_kthread+0x10/0x10
[   14.758529]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.758551]  ? calculate_sigpending+0x7b/0xa0
[   14.758575]  ? __pfx_kthread+0x10/0x10
[   14.758597]  ret_from_fork+0x116/0x1d0
[   14.758615]  ? __pfx_kthread+0x10/0x10
[   14.758635]  ret_from_fork_asm+0x1a/0x30
[   14.758668]  </TASK>
[   14.758677] 
[   14.766528] Allocated by task 278:
[   14.766700]  kasan_save_stack+0x45/0x70
[   14.767060]  kasan_save_track+0x18/0x40
[   14.767197]  kasan_save_alloc_info+0x3b/0x50
[   14.767347]  __kasan_kmalloc+0xb7/0xc0
[   14.767480]  __kmalloc_cache_noprof+0x189/0x420
[   14.767634]  kasan_bitops_generic+0x92/0x1c0
[   14.767868]  kunit_try_run_case+0x1a5/0x480
[   14.768088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.768342]  kthread+0x337/0x6f0
[   14.768514]  ret_from_fork+0x116/0x1d0
[   14.768708]  ret_from_fork_asm+0x1a/0x30
[   14.769114] 
[   14.769213] The buggy address belongs to the object at ffff888102321e80
[   14.769213]  which belongs to the cache kmalloc-16 of size 16
[   14.769692] The buggy address is located 8 bytes inside of
[   14.769692]  allocated 9-byte region [ffff888102321e80, ffff888102321e89)
[   14.770052] 
[   14.770121] The buggy address belongs to the physical page:
[   14.770334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321
[   14.770682] flags: 0x200000000000000(node=0|zone=2)
[   14.771116] page_type: f5(slab)
[   14.771282] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.771585] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.771810] page dumped because: kasan: bad access detected
[   14.771990] 
[   14.772057] Memory state around the buggy address:
[   14.772209]  ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   14.772621]  ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.773202] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.773531]                       ^
[   14.773715]  ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.774050]  ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.774303] ==================================================================
[   14.631405] ==================================================================
[   14.632099] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.632551] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278
[   14.633183] 
[   14.633359] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.633401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.633412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.633431] Call Trace:
[   14.633442]  <TASK>
[   14.633457]  dump_stack_lvl+0x73/0xb0
[   14.633485]  print_report+0xd1/0x650
[   14.633507]  ? __virt_addr_valid+0x1db/0x2d0
[   14.633529]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.633558]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.633581]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.633611]  kasan_report+0x141/0x180
[   14.633633]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.633667]  kasan_check_range+0x10c/0x1c0
[   14.633691]  __kasan_check_write+0x18/0x20
[   14.633710]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.633761]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.633792]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.633816]  ? trace_hardirqs_on+0x37/0xe0
[   14.633838]  ? kasan_bitops_generic+0x92/0x1c0
[   14.633866]  kasan_bitops_generic+0x121/0x1c0
[   14.633890]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.633917]  ? __pfx_read_tsc+0x10/0x10
[   14.633946]  ? ktime_get_ts64+0x86/0x230
[   14.633970]  kunit_try_run_case+0x1a5/0x480
[   14.633994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.634016]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.634040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.634063]  ? __kthread_parkme+0x82/0x180
[   14.634085]  ? preempt_count_sub+0x50/0x80
[   14.634109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.634133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.634157]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.634182]  kthread+0x337/0x6f0
[   14.634200]  ? trace_preempt_on+0x20/0xc0
[   14.634223]  ? __pfx_kthread+0x10/0x10
[   14.634242]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.634264]  ? calculate_sigpending+0x7b/0xa0
[   14.634287]  ? __pfx_kthread+0x10/0x10
[   14.634309]  ret_from_fork+0x116/0x1d0
[   14.634326]  ? __pfx_kthread+0x10/0x10
[   14.634347]  ret_from_fork_asm+0x1a/0x30
[   14.634379]  </TASK>
[   14.634389] 
[   14.647411] Allocated by task 278:
[   14.647610]  kasan_save_stack+0x45/0x70
[   14.647809]  kasan_save_track+0x18/0x40
[   14.648166]  kasan_save_alloc_info+0x3b/0x50
[   14.648547]  __kasan_kmalloc+0xb7/0xc0
[   14.648897]  __kmalloc_cache_noprof+0x189/0x420
[   14.649085]  kasan_bitops_generic+0x92/0x1c0
[   14.649235]  kunit_try_run_case+0x1a5/0x480
[   14.649379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.649554]  kthread+0x337/0x6f0
[   14.649673]  ret_from_fork+0x116/0x1d0
[   14.649964]  ret_from_fork_asm+0x1a/0x30
[   14.650324] 
[   14.650475] The buggy address belongs to the object at ffff888102321e80
[   14.650475]  which belongs to the cache kmalloc-16 of size 16
[   14.651500] The buggy address is located 8 bytes inside of
[   14.651500]  allocated 9-byte region [ffff888102321e80, ffff888102321e89)
[   14.652521] 
[   14.652678] The buggy address belongs to the physical page:
[   14.653188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321
[   14.653874] flags: 0x200000000000000(node=0|zone=2)
[   14.654307] page_type: f5(slab)
[   14.654432] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.654666] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.655239] page dumped because: kasan: bad access detected
[   14.655705] 
[   14.655880] Memory state around the buggy address:
[   14.656315]  ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   14.656945]  ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.657242] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.657453]                       ^
[   14.657575]  ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.657902]  ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.658499] ==================================================================
[   14.716220] ==================================================================
[   14.717179] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.718024] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278
[   14.718783] 
[   14.719006] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.719046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.719057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.719076] Call Trace:
[   14.719091]  <TASK>
[   14.719106]  dump_stack_lvl+0x73/0xb0
[   14.719133]  print_report+0xd1/0x650
[   14.719155]  ? __virt_addr_valid+0x1db/0x2d0
[   14.719177]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.719206]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.719229]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.719259]  kasan_report+0x141/0x180
[   14.719281]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.719317]  kasan_check_range+0x10c/0x1c0
[   14.719341]  __kasan_check_write+0x18/0x20
[   14.719360]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.719392]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.719423]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.719447]  ? trace_hardirqs_on+0x37/0xe0
[   14.719469]  ? kasan_bitops_generic+0x92/0x1c0
[   14.719497]  kasan_bitops_generic+0x121/0x1c0
[   14.719521]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.719547]  ? __pfx_read_tsc+0x10/0x10
[   14.719568]  ? ktime_get_ts64+0x86/0x230
[   14.719591]  kunit_try_run_case+0x1a5/0x480
[   14.719615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.719638]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.719661]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.719685]  ? __kthread_parkme+0x82/0x180
[   14.719705]  ? preempt_count_sub+0x50/0x80
[   14.719729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.719767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.719792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.719818]  kthread+0x337/0x6f0
[   14.719837]  ? trace_preempt_on+0x20/0xc0
[   14.719859]  ? __pfx_kthread+0x10/0x10
[   14.719880]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.719901]  ? calculate_sigpending+0x7b/0xa0
[   14.719936]  ? __pfx_kthread+0x10/0x10
[   14.719958]  ret_from_fork+0x116/0x1d0
[   14.719976]  ? __pfx_kthread+0x10/0x10
[   14.719997]  ret_from_fork_asm+0x1a/0x30
[   14.720029]  </TASK>
[   14.720039] 
[   14.729772] Allocated by task 278:
[   14.729959]  kasan_save_stack+0x45/0x70
[   14.730157]  kasan_save_track+0x18/0x40
[   14.730352]  kasan_save_alloc_info+0x3b/0x50
[   14.730543]  __kasan_kmalloc+0xb7/0xc0
[   14.730733]  __kmalloc_cache_noprof+0x189/0x420
[   14.730942]  kasan_bitops_generic+0x92/0x1c0
[   14.731127]  kunit_try_run_case+0x1a5/0x480
[   14.731331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.731565]  kthread+0x337/0x6f0
[   14.731728]  ret_from_fork+0x116/0x1d0
[   14.731885]  ret_from_fork_asm+0x1a/0x30
[   14.732079] 
[   14.732159] The buggy address belongs to the object at ffff888102321e80
[   14.732159]  which belongs to the cache kmalloc-16 of size 16
[   14.732632] The buggy address is located 8 bytes inside of
[   14.732632]  allocated 9-byte region [ffff888102321e80, ffff888102321e89)
[   14.733092] 
[   14.733219] The buggy address belongs to the physical page:
[   14.733410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321
[   14.733680] flags: 0x200000000000000(node=0|zone=2)
[   14.733905] page_type: f5(slab)
[   14.734080] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.734387] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.734765] page dumped because: kasan: bad access detected
[   14.735028] 
[   14.735116] Memory state around the buggy address:
[   14.735303]  ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   14.735517]  ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.735731] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.735975]                       ^
[   14.736153]  ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.736467]  ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.736811] ==================================================================
[   14.794010] ==================================================================
[   14.794299] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.794579] Read of size 8 at addr ffff888102321e88 by task kunit_try_catch/278
[   14.794827] 
[   14.794947] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.794991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.795003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.795022] Call Trace:
[   14.795036]  <TASK>
[   14.795051]  dump_stack_lvl+0x73/0xb0
[   14.795078]  print_report+0xd1/0x650
[   14.795099]  ? __virt_addr_valid+0x1db/0x2d0
[   14.795121]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.795150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.795174]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.795204]  kasan_report+0x141/0x180
[   14.795239]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.795274]  __asan_report_load8_noabort+0x18/0x20
[   14.795299]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.795329]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.795360]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.795384]  ? trace_hardirqs_on+0x37/0xe0
[   14.795405]  ? kasan_bitops_generic+0x92/0x1c0
[   14.795434]  kasan_bitops_generic+0x121/0x1c0
[   14.795457]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.795484]  ? __pfx_read_tsc+0x10/0x10
[   14.795506]  ? ktime_get_ts64+0x86/0x230
[   14.795530]  kunit_try_run_case+0x1a5/0x480
[   14.795554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.795577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.795601]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.795625]  ? __kthread_parkme+0x82/0x180
[   14.795645]  ? preempt_count_sub+0x50/0x80
[   14.795669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.795694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.795719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.795745]  kthread+0x337/0x6f0
[   14.795773]  ? trace_preempt_on+0x20/0xc0
[   14.795795]  ? __pfx_kthread+0x10/0x10
[   14.795815]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.795837]  ? calculate_sigpending+0x7b/0xa0
[   14.795860]  ? __pfx_kthread+0x10/0x10
[   14.795881]  ret_from_fork+0x116/0x1d0
[   14.795900]  ? __pfx_kthread+0x10/0x10
[   14.795930]  ret_from_fork_asm+0x1a/0x30
[   14.795961]  </TASK>
[   14.795970] 
[   14.804095] Allocated by task 278:
[   14.804224]  kasan_save_stack+0x45/0x70
[   14.804364]  kasan_save_track+0x18/0x40
[   14.804498]  kasan_save_alloc_info+0x3b/0x50
[   14.804646]  __kasan_kmalloc+0xb7/0xc0
[   14.804777]  __kmalloc_cache_noprof+0x189/0x420
[   14.804942]  kasan_bitops_generic+0x92/0x1c0
[   14.805159]  kunit_try_run_case+0x1a5/0x480
[   14.805365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.805624]  kthread+0x337/0x6f0
[   14.805792]  ret_from_fork+0x116/0x1d0
[   14.805989]  ret_from_fork_asm+0x1a/0x30
[   14.806339] 
[   14.806413] The buggy address belongs to the object at ffff888102321e80
[   14.806413]  which belongs to the cache kmalloc-16 of size 16
[   14.806933] The buggy address is located 8 bytes inside of
[   14.806933]  allocated 9-byte region [ffff888102321e80, ffff888102321e89)
[   14.807381] 
[   14.807457] The buggy address belongs to the physical page:
[   14.807675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321
[   14.808041] flags: 0x200000000000000(node=0|zone=2)
[   14.808244] page_type: f5(slab)
[   14.808407] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.808658] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.809245] page dumped because: kasan: bad access detected
[   14.809481] 
[   14.809549] Memory state around the buggy address:
[   14.809701]  ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   14.810050]  ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.810359] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.810609]                       ^
[   14.810732]  ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.810960]  ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.811176] ==================================================================
[   14.659679] ==================================================================
[   14.660522] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.661328] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278
[   14.661982] 
[   14.662151] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.662192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.662203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.662222] Call Trace:
[   14.662235]  <TASK>
[   14.662248]  dump_stack_lvl+0x73/0xb0
[   14.662276]  print_report+0xd1/0x650
[   14.662298]  ? __virt_addr_valid+0x1db/0x2d0
[   14.662321]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.662350]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.662373]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.662404]  kasan_report+0x141/0x180
[   14.662426]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.662462]  kasan_check_range+0x10c/0x1c0
[   14.662486]  __kasan_check_write+0x18/0x20
[   14.662511]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.662540]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.662570]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.662595]  ? trace_hardirqs_on+0x37/0xe0
[   14.662617]  ? kasan_bitops_generic+0x92/0x1c0
[   14.662645]  kasan_bitops_generic+0x121/0x1c0
[   14.662669]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.662694]  ? __pfx_read_tsc+0x10/0x10
[   14.662715]  ? ktime_get_ts64+0x86/0x230
[   14.662748]  kunit_try_run_case+0x1a5/0x480
[   14.662772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.662796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.662820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.662844]  ? __kthread_parkme+0x82/0x180
[   14.662864]  ? preempt_count_sub+0x50/0x80
[   14.662888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.662913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.662961]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.662986]  kthread+0x337/0x6f0
[   14.663005]  ? trace_preempt_on+0x20/0xc0
[   14.663028]  ? __pfx_kthread+0x10/0x10
[   14.663048]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.663069]  ? calculate_sigpending+0x7b/0xa0
[   14.663094]  ? __pfx_kthread+0x10/0x10
[   14.663115]  ret_from_fork+0x116/0x1d0
[   14.663133]  ? __pfx_kthread+0x10/0x10
[   14.663153]  ret_from_fork_asm+0x1a/0x30
[   14.663184]  </TASK>
[   14.663193] 
[   14.676029] Allocated by task 278:
[   14.676160]  kasan_save_stack+0x45/0x70
[   14.676303]  kasan_save_track+0x18/0x40
[   14.676437]  kasan_save_alloc_info+0x3b/0x50
[   14.676586]  __kasan_kmalloc+0xb7/0xc0
[   14.676717]  __kmalloc_cache_noprof+0x189/0x420
[   14.677135]  kasan_bitops_generic+0x92/0x1c0
[   14.677505]  kunit_try_run_case+0x1a5/0x480
[   14.677892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.678359]  kthread+0x337/0x6f0
[   14.678658]  ret_from_fork+0x116/0x1d0
[   14.679041]  ret_from_fork_asm+0x1a/0x30
[   14.679387] 
[   14.679541] The buggy address belongs to the object at ffff888102321e80
[   14.679541]  which belongs to the cache kmalloc-16 of size 16
[   14.680569] The buggy address is located 8 bytes inside of
[   14.680569]  allocated 9-byte region [ffff888102321e80, ffff888102321e89)
[   14.681535] 
[   14.681608] The buggy address belongs to the physical page:
[   14.681883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321
[   14.682537] flags: 0x200000000000000(node=0|zone=2)
[   14.683007] page_type: f5(slab)
[   14.683244] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.683476] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.683701] page dumped because: kasan: bad access detected
[   14.683878] 
[   14.684007] Memory state around the buggy address:
[   14.684407]  ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   14.685022]  ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.685634] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.686248]                       ^
[   14.686559]  ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.687186]  ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.687799] ==================================================================
[   14.602245] ==================================================================
[   14.603020] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.603544] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278
[   14.603843] 
[   14.604025] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.604068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.604080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.604100] Call Trace:
[   14.604116]  <TASK>
[   14.604131]  dump_stack_lvl+0x73/0xb0
[   14.604159]  print_report+0xd1/0x650
[   14.604181]  ? __virt_addr_valid+0x1db/0x2d0
[   14.604204]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.604232]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.604257]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.604286]  kasan_report+0x141/0x180
[   14.604308]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.604343]  kasan_check_range+0x10c/0x1c0
[   14.604367]  __kasan_check_write+0x18/0x20
[   14.604386]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.604416]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.604447]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.604471]  ? trace_hardirqs_on+0x37/0xe0
[   14.604493]  ? kasan_bitops_generic+0x92/0x1c0
[   14.604521]  kasan_bitops_generic+0x121/0x1c0
[   14.604545]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.604571]  ? __pfx_read_tsc+0x10/0x10
[   14.604592]  ? ktime_get_ts64+0x86/0x230
[   14.604616]  kunit_try_run_case+0x1a5/0x480
[   14.604639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.604662]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.604686]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.604711]  ? __kthread_parkme+0x82/0x180
[   14.604752]  ? preempt_count_sub+0x50/0x80
[   14.604778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.604802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.604827]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.604852]  kthread+0x337/0x6f0
[   14.604872]  ? trace_preempt_on+0x20/0xc0
[   14.604894]  ? __pfx_kthread+0x10/0x10
[   14.604914]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.604946]  ? calculate_sigpending+0x7b/0xa0
[   14.604970]  ? __pfx_kthread+0x10/0x10
[   14.604992]  ret_from_fork+0x116/0x1d0
[   14.605010]  ? __pfx_kthread+0x10/0x10
[   14.605030]  ret_from_fork_asm+0x1a/0x30
[   14.605062]  </TASK>
[   14.605072] 
[   14.618411] Allocated by task 278:
[   14.618554]  kasan_save_stack+0x45/0x70
[   14.618704]  kasan_save_track+0x18/0x40
[   14.619070]  kasan_save_alloc_info+0x3b/0x50
[   14.619450]  __kasan_kmalloc+0xb7/0xc0
[   14.619803]  __kmalloc_cache_noprof+0x189/0x420
[   14.620209]  kasan_bitops_generic+0x92/0x1c0
[   14.620597]  kunit_try_run_case+0x1a5/0x480
[   14.621071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.621533]  kthread+0x337/0x6f0
[   14.621855]  ret_from_fork+0x116/0x1d0
[   14.622091]  ret_from_fork_asm+0x1a/0x30
[   14.622232] 
[   14.622302] The buggy address belongs to the object at ffff888102321e80
[   14.622302]  which belongs to the cache kmalloc-16 of size 16
[   14.622656] The buggy address is located 8 bytes inside of
[   14.622656]  allocated 9-byte region [ffff888102321e80, ffff888102321e89)
[   14.623576] 
[   14.623750] The buggy address belongs to the physical page:
[   14.624220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321
[   14.624899] flags: 0x200000000000000(node=0|zone=2)
[   14.625339] page_type: f5(slab)
[   14.625633] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.626284] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.626940] page dumped because: kasan: bad access detected
[   14.627200] 
[   14.627268] Memory state around the buggy address:
[   14.627424]  ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   14.627637]  ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.628101] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.628706]                       ^
[   14.629046]  ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.629642]  ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.630254] ==================================================================
[   14.775136] ==================================================================
[   14.775489] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.775850] Read of size 8 at addr ffff888102321e88 by task kunit_try_catch/278
[   14.776273] 
[   14.776390] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.776431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.776442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.776461] Call Trace:
[   14.776474]  <TASK>
[   14.776487]  dump_stack_lvl+0x73/0xb0
[   14.776517]  print_report+0xd1/0x650
[   14.776539]  ? __virt_addr_valid+0x1db/0x2d0
[   14.776562]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.776592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.776616]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.776646]  kasan_report+0x141/0x180
[   14.776667]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.776702]  kasan_check_range+0x10c/0x1c0
[   14.776726]  __kasan_check_read+0x15/0x20
[   14.776745]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.776775]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.776805]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.776829]  ? trace_hardirqs_on+0x37/0xe0
[   14.776851]  ? kasan_bitops_generic+0x92/0x1c0
[   14.776879]  kasan_bitops_generic+0x121/0x1c0
[   14.776903]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.776941]  ? __pfx_read_tsc+0x10/0x10
[   14.776961]  ? ktime_get_ts64+0x86/0x230
[   14.776985]  kunit_try_run_case+0x1a5/0x480
[   14.777019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.777044]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.777068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.777093]  ? __kthread_parkme+0x82/0x180
[   14.777113]  ? preempt_count_sub+0x50/0x80
[   14.777137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.777162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.777187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.777212]  kthread+0x337/0x6f0
[   14.777230]  ? trace_preempt_on+0x20/0xc0
[   14.777253]  ? __pfx_kthread+0x10/0x10
[   14.777273]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.777296]  ? calculate_sigpending+0x7b/0xa0
[   14.777319]  ? __pfx_kthread+0x10/0x10
[   14.777340]  ret_from_fork+0x116/0x1d0
[   14.777358]  ? __pfx_kthread+0x10/0x10
[   14.777378]  ret_from_fork_asm+0x1a/0x30
[   14.777410]  </TASK>
[   14.777419] 
[   14.785701] Allocated by task 278:
[   14.785881]  kasan_save_stack+0x45/0x70
[   14.786095]  kasan_save_track+0x18/0x40
[   14.786289]  kasan_save_alloc_info+0x3b/0x50
[   14.786498]  __kasan_kmalloc+0xb7/0xc0
[   14.786728]  __kmalloc_cache_noprof+0x189/0x420
[   14.786891]  kasan_bitops_generic+0x92/0x1c0
[   14.787196]  kunit_try_run_case+0x1a5/0x480
[   14.787390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.787593]  kthread+0x337/0x6f0
[   14.787714]  ret_from_fork+0x116/0x1d0
[   14.787845]  ret_from_fork_asm+0x1a/0x30
[   14.787995] 
[   14.788064] The buggy address belongs to the object at ffff888102321e80
[   14.788064]  which belongs to the cache kmalloc-16 of size 16
[   14.788584] The buggy address is located 8 bytes inside of
[   14.788584]  allocated 9-byte region [ffff888102321e80, ffff888102321e89)
[   14.789230] 
[   14.789303] The buggy address belongs to the physical page:
[   14.789472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321
[   14.789784] flags: 0x200000000000000(node=0|zone=2)
[   14.790029] page_type: f5(slab)
[   14.790200] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.790529] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.790828] page dumped because: kasan: bad access detected
[   14.791080] 
[   14.791167] Memory state around the buggy address:
[   14.791361]  ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   14.791613]  ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.792013] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.792309]                       ^
[   14.792428]  ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.792641]  ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.793219] ==================================================================