Hay
Date
July 19, 2025, 11:11 a.m.

Environment
qemu-x86_64

[   14.331197] ==================================================================
[   14.331511] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.331843] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.332402] 
[   14.332527] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.332571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.332582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.332603] Call Trace:
[   14.332620]  <TASK>
[   14.332634]  dump_stack_lvl+0x73/0xb0
[   14.332662]  print_report+0xd1/0x610
[   14.332683]  ? __virt_addr_valid+0x1db/0x2d0
[   14.332704]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.332732]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.332755]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.332783]  kasan_report+0x141/0x180
[   14.332803]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.332836]  kasan_check_range+0x10c/0x1c0
[   14.332859]  __kasan_check_write+0x18/0x20
[   14.332878]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.332906]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.332934]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.332957]  ? trace_hardirqs_on+0x37/0xe0
[   14.332979]  ? kasan_bitops_generic+0x92/0x1c0
[   14.333006]  kasan_bitops_generic+0x121/0x1c0
[   14.333029]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.333053]  ? __pfx_read_tsc+0x10/0x10
[   14.333074]  ? ktime_get_ts64+0x86/0x230
[   14.333097]  kunit_try_run_case+0x1a5/0x480
[   14.333466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.333508]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.333533]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.333557]  ? __kthread_parkme+0x82/0x180
[   14.333577]  ? preempt_count_sub+0x50/0x80
[   14.333601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.333625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.333649]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.333673]  kthread+0x337/0x6f0
[   14.333691]  ? trace_preempt_on+0x20/0xc0
[   14.333713]  ? __pfx_kthread+0x10/0x10
[   14.333733]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.333754]  ? calculate_sigpending+0x7b/0xa0
[   14.333778]  ? __pfx_kthread+0x10/0x10
[   14.333798]  ret_from_fork+0x116/0x1d0
[   14.333817]  ? __pfx_kthread+0x10/0x10
[   14.333837]  ret_from_fork_asm+0x1a/0x30
[   14.333867]  </TASK>
[   14.333877] 
[   14.345593] Allocated by task 279:
[   14.345969]  kasan_save_stack+0x45/0x70
[   14.346325]  kasan_save_track+0x18/0x40
[   14.346670]  kasan_save_alloc_info+0x3b/0x50
[   14.346868]  __kasan_kmalloc+0xb7/0xc0
[   14.347036]  __kmalloc_cache_noprof+0x189/0x420
[   14.347457]  kasan_bitops_generic+0x92/0x1c0
[   14.347867]  kunit_try_run_case+0x1a5/0x480
[   14.348196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.348601]  kthread+0x337/0x6f0
[   14.348761]  ret_from_fork+0x116/0x1d0
[   14.348927]  ret_from_fork_asm+0x1a/0x30
[   14.349095] 
[   14.349483] The buggy address belongs to the object at ffff888101642a40
[   14.349483]  which belongs to the cache kmalloc-16 of size 16
[   14.350239] The buggy address is located 8 bytes inside of
[   14.350239]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.350906] 
[   14.351002] The buggy address belongs to the physical page:
[   14.351542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.351955] flags: 0x200000000000000(node=0|zone=2)
[   14.352323] page_type: f5(slab)
[   14.352662] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.352955] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.353435] page dumped because: kasan: bad access detected
[   14.353872] 
[   14.354132] Memory state around the buggy address:
[   14.354450]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.354755]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.355020] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.355718]                                               ^
[   14.356006]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.356607]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.357102] ==================================================================
[   14.377584] ==================================================================
[   14.377930] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.378386] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.378668] 
[   14.378755] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.378799] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.378811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.378832] Call Trace:
[   14.378844]  <TASK>
[   14.378860]  dump_stack_lvl+0x73/0xb0
[   14.378888]  print_report+0xd1/0x610
[   14.378909]  ? __virt_addr_valid+0x1db/0x2d0
[   14.378931]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.378958]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.378981]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.379008]  kasan_report+0x141/0x180
[   14.379029]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.379063]  kasan_check_range+0x10c/0x1c0
[   14.379086]  __kasan_check_write+0x18/0x20
[   14.379104]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.379132]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.379161]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.379184]  ? trace_hardirqs_on+0x37/0xe0
[   14.379206]  ? kasan_bitops_generic+0x92/0x1c0
[   14.379232]  kasan_bitops_generic+0x121/0x1c0
[   14.379255]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.379279]  ? __pfx_read_tsc+0x10/0x10
[   14.379299]  ? ktime_get_ts64+0x86/0x230
[   14.379322]  kunit_try_run_case+0x1a5/0x480
[   14.379346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.379368]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.379391]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.379414]  ? __kthread_parkme+0x82/0x180
[   14.379434]  ? preempt_count_sub+0x50/0x80
[   14.379458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.379481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.379516]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.379540]  kthread+0x337/0x6f0
[   14.379559]  ? trace_preempt_on+0x20/0xc0
[   14.379580]  ? __pfx_kthread+0x10/0x10
[   14.379599]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.379620]  ? calculate_sigpending+0x7b/0xa0
[   14.379645]  ? __pfx_kthread+0x10/0x10
[   14.379665]  ret_from_fork+0x116/0x1d0
[   14.379684]  ? __pfx_kthread+0x10/0x10
[   14.379703]  ret_from_fork_asm+0x1a/0x30
[   14.379733]  </TASK>
[   14.379743] 
[   14.387914] Allocated by task 279:
[   14.388079]  kasan_save_stack+0x45/0x70
[   14.388343]  kasan_save_track+0x18/0x40
[   14.388542]  kasan_save_alloc_info+0x3b/0x50
[   14.388709]  __kasan_kmalloc+0xb7/0xc0
[   14.388895]  __kmalloc_cache_noprof+0x189/0x420
[   14.389090]  kasan_bitops_generic+0x92/0x1c0
[   14.389244]  kunit_try_run_case+0x1a5/0x480
[   14.389390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.389576]  kthread+0x337/0x6f0
[   14.389697]  ret_from_fork+0x116/0x1d0
[   14.389828]  ret_from_fork_asm+0x1a/0x30
[   14.389967] 
[   14.390037] The buggy address belongs to the object at ffff888101642a40
[   14.390037]  which belongs to the cache kmalloc-16 of size 16
[   14.390400] The buggy address is located 8 bytes inside of
[   14.390400]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.390928] 
[   14.391127] The buggy address belongs to the physical page:
[   14.391594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.391947] flags: 0x200000000000000(node=0|zone=2)
[   14.392175] page_type: f5(slab)
[   14.392318] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.392560] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.392788] page dumped because: kasan: bad access detected
[   14.392959] 
[   14.393026] Memory state around the buggy address:
[   14.393180]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.393397]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.393978] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.394467]                                               ^
[   14.394730]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.395045]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.395649] ==================================================================
[   14.264962] ==================================================================
[   14.265385] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.265773] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.266255] 
[   14.266372] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.266418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.266429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.266451] Call Trace:
[   14.266471]  <TASK>
[   14.266490]  dump_stack_lvl+0x73/0xb0
[   14.266534]  print_report+0xd1/0x610
[   14.266555]  ? __virt_addr_valid+0x1db/0x2d0
[   14.266578]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.266606]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.266629]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.266657]  kasan_report+0x141/0x180
[   14.266678]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.266711]  kasan_check_range+0x10c/0x1c0
[   14.266734]  __kasan_check_write+0x18/0x20
[   14.266753]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.266781]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.266810]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.266834]  ? trace_hardirqs_on+0x37/0xe0
[   14.266857]  ? kasan_bitops_generic+0x92/0x1c0
[   14.266884]  kasan_bitops_generic+0x121/0x1c0
[   14.266907]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.266932]  ? __pfx_read_tsc+0x10/0x10
[   14.266952]  ? ktime_get_ts64+0x86/0x230
[   14.266976]  kunit_try_run_case+0x1a5/0x480
[   14.267000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.267023]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.267110]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.267135]  ? __kthread_parkme+0x82/0x180
[   14.267156]  ? preempt_count_sub+0x50/0x80
[   14.267179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.267203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.267227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.267251]  kthread+0x337/0x6f0
[   14.267270]  ? trace_preempt_on+0x20/0xc0
[   14.267291]  ? __pfx_kthread+0x10/0x10
[   14.267311]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.267332]  ? calculate_sigpending+0x7b/0xa0
[   14.267356]  ? __pfx_kthread+0x10/0x10
[   14.267376]  ret_from_fork+0x116/0x1d0
[   14.267395]  ? __pfx_kthread+0x10/0x10
[   14.267415]  ret_from_fork_asm+0x1a/0x30
[   14.267446]  </TASK>
[   14.267456] 
[   14.275567] Allocated by task 279:
[   14.275749]  kasan_save_stack+0x45/0x70
[   14.275953]  kasan_save_track+0x18/0x40
[   14.276142]  kasan_save_alloc_info+0x3b/0x50
[   14.276350]  __kasan_kmalloc+0xb7/0xc0
[   14.276549]  __kmalloc_cache_noprof+0x189/0x420
[   14.277164]  kasan_bitops_generic+0x92/0x1c0
[   14.277599]  kunit_try_run_case+0x1a5/0x480
[   14.277808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.278072]  kthread+0x337/0x6f0
[   14.278302]  ret_from_fork+0x116/0x1d0
[   14.278575]  ret_from_fork_asm+0x1a/0x30
[   14.278775] 
[   14.278872] The buggy address belongs to the object at ffff888101642a40
[   14.278872]  which belongs to the cache kmalloc-16 of size 16
[   14.279486] The buggy address is located 8 bytes inside of
[   14.279486]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.279928] 
[   14.280027] The buggy address belongs to the physical page:
[   14.280701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.281177] flags: 0x200000000000000(node=0|zone=2)
[   14.281352] page_type: f5(slab)
[   14.281474] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.281716] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.281936] page dumped because: kasan: bad access detected
[   14.282101] 
[   14.282168] Memory state around the buggy address:
[   14.283856]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.284525]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.285413] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.285828]                                               ^
[   14.286265]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.286693]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.287185] ==================================================================
[   14.401443] ==================================================================
[   14.401787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.402153] Read of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.402489] 
[   14.402615] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.402661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.402672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.402694] Call Trace:
[   14.402707]  <TASK>
[   14.402724]  dump_stack_lvl+0x73/0xb0
[   14.402751]  print_report+0xd1/0x610
[   14.402772]  ? __virt_addr_valid+0x1db/0x2d0
[   14.402796]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.402824]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.402846]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.402874]  kasan_report+0x141/0x180
[   14.402894]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.402927]  kasan_check_range+0x10c/0x1c0
[   14.402949]  __kasan_check_read+0x15/0x20
[   14.402968]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.402995]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.403024]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.403047]  ? trace_hardirqs_on+0x37/0xe0
[   14.403069]  ? kasan_bitops_generic+0x92/0x1c0
[   14.403096]  kasan_bitops_generic+0x121/0x1c0
[   14.403118]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.403144]  ? __pfx_read_tsc+0x10/0x10
[   14.403164]  ? ktime_get_ts64+0x86/0x230
[   14.403188]  kunit_try_run_case+0x1a5/0x480
[   14.403211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.403233]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.403257]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.403291]  ? __kthread_parkme+0x82/0x180
[   14.403311]  ? preempt_count_sub+0x50/0x80
[   14.403335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.403359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.403383]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.403407]  kthread+0x337/0x6f0
[   14.403425]  ? trace_preempt_on+0x20/0xc0
[   14.403447]  ? __pfx_kthread+0x10/0x10
[   14.403467]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.403488]  ? calculate_sigpending+0x7b/0xa0
[   14.403524]  ? __pfx_kthread+0x10/0x10
[   14.403544]  ret_from_fork+0x116/0x1d0
[   14.403563]  ? __pfx_kthread+0x10/0x10
[   14.403582]  ret_from_fork_asm+0x1a/0x30
[   14.403612]  </TASK>
[   14.403623] 
[   14.413478] Allocated by task 279:
[   14.413737]  kasan_save_stack+0x45/0x70
[   14.414165]  kasan_save_track+0x18/0x40
[   14.414393]  kasan_save_alloc_info+0x3b/0x50
[   14.414604]  __kasan_kmalloc+0xb7/0xc0
[   14.414778]  __kmalloc_cache_noprof+0x189/0x420
[   14.414973]  kasan_bitops_generic+0x92/0x1c0
[   14.415156]  kunit_try_run_case+0x1a5/0x480
[   14.415338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.415896]  kthread+0x337/0x6f0
[   14.416216]  ret_from_fork+0x116/0x1d0
[   14.416572]  ret_from_fork_asm+0x1a/0x30
[   14.416904] 
[   14.417132] The buggy address belongs to the object at ffff888101642a40
[   14.417132]  which belongs to the cache kmalloc-16 of size 16
[   14.417901] The buggy address is located 8 bytes inside of
[   14.417901]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.418880] 
[   14.419112] The buggy address belongs to the physical page:
[   14.419703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.420142] flags: 0x200000000000000(node=0|zone=2)
[   14.420514] page_type: f5(slab)
[   14.420682] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.420987] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.421686] page dumped because: kasan: bad access detected
[   14.421986] 
[   14.422228] Memory state around the buggy address:
[   14.422696]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.423175]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.423468] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.423709]                                               ^
[   14.423969]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.424216]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.424580] ==================================================================
[   14.288312] ==================================================================
[   14.288663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.289431] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.289746] 
[   14.289863] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.289909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.289921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.289942] Call Trace:
[   14.289961]  <TASK>
[   14.289979]  dump_stack_lvl+0x73/0xb0
[   14.290010]  print_report+0xd1/0x610
[   14.290033]  ? __virt_addr_valid+0x1db/0x2d0
[   14.290055]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.290083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.290105]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.290134]  kasan_report+0x141/0x180
[   14.290154]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.290187]  kasan_check_range+0x10c/0x1c0
[   14.290216]  __kasan_check_write+0x18/0x20
[   14.290235]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.290263]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.290291]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.290316]  ? trace_hardirqs_on+0x37/0xe0
[   14.290338]  ? kasan_bitops_generic+0x92/0x1c0
[   14.290365]  kasan_bitops_generic+0x121/0x1c0
[   14.290388]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.290413]  ? __pfx_read_tsc+0x10/0x10
[   14.290433]  ? ktime_get_ts64+0x86/0x230
[   14.290457]  kunit_try_run_case+0x1a5/0x480
[   14.290480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.290513]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.290538]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.290562]  ? __kthread_parkme+0x82/0x180
[   14.290583]  ? preempt_count_sub+0x50/0x80
[   14.290608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.290631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.290656]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.290682]  kthread+0x337/0x6f0
[   14.290702]  ? trace_preempt_on+0x20/0xc0
[   14.290724]  ? __pfx_kthread+0x10/0x10
[   14.290744]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.290764]  ? calculate_sigpending+0x7b/0xa0
[   14.290789]  ? __pfx_kthread+0x10/0x10
[   14.290811]  ret_from_fork+0x116/0x1d0
[   14.290829]  ? __pfx_kthread+0x10/0x10
[   14.290849]  ret_from_fork_asm+0x1a/0x30
[   14.290879]  </TASK>
[   14.290889] 
[   14.302866] Allocated by task 279:
[   14.303021]  kasan_save_stack+0x45/0x70
[   14.303250]  kasan_save_track+0x18/0x40
[   14.303533]  kasan_save_alloc_info+0x3b/0x50
[   14.303681]  __kasan_kmalloc+0xb7/0xc0
[   14.303888]  __kmalloc_cache_noprof+0x189/0x420
[   14.304151]  kasan_bitops_generic+0x92/0x1c0
[   14.304369]  kunit_try_run_case+0x1a5/0x480
[   14.304595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.304855]  kthread+0x337/0x6f0
[   14.305003]  ret_from_fork+0x116/0x1d0
[   14.305168]  ret_from_fork_asm+0x1a/0x30
[   14.305311] 
[   14.305382] The buggy address belongs to the object at ffff888101642a40
[   14.305382]  which belongs to the cache kmalloc-16 of size 16
[   14.305880] The buggy address is located 8 bytes inside of
[   14.305880]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.306585] 
[   14.306693] The buggy address belongs to the physical page:
[   14.306952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.307490] flags: 0x200000000000000(node=0|zone=2)
[   14.307690] page_type: f5(slab)
[   14.307814] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.308073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.308477] page dumped because: kasan: bad access detected
[   14.308784] 
[   14.308877] Memory state around the buggy address:
[   14.309319]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.309619]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.309891] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.310395]                                               ^
[   14.310607]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.310929]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.311357] ==================================================================
[   14.311829] ==================================================================
[   14.312199] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.312568] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.312815] 
[   14.312928] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.312973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.312983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.313005] Call Trace:
[   14.313026]  <TASK>
[   14.313043]  dump_stack_lvl+0x73/0xb0
[   14.313071]  print_report+0xd1/0x610
[   14.313092]  ? __virt_addr_valid+0x1db/0x2d0
[   14.313114]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.313142]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.313164]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.313191]  kasan_report+0x141/0x180
[   14.313213]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.313247]  kasan_check_range+0x10c/0x1c0
[   14.313270]  __kasan_check_write+0x18/0x20
[   14.313288]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.313317]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.313345]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.313369]  ? trace_hardirqs_on+0x37/0xe0
[   14.313392]  ? kasan_bitops_generic+0x92/0x1c0
[   14.313418]  kasan_bitops_generic+0x121/0x1c0
[   14.313441]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.313466]  ? __pfx_read_tsc+0x10/0x10
[   14.313487]  ? ktime_get_ts64+0x86/0x230
[   14.313520]  kunit_try_run_case+0x1a5/0x480
[   14.313544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.313565]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.313590]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.313612]  ? __kthread_parkme+0x82/0x180
[   14.313632]  ? preempt_count_sub+0x50/0x80
[   14.313656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.313679]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.313704]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.313726]  kthread+0x337/0x6f0
[   14.313745]  ? trace_preempt_on+0x20/0xc0
[   14.313766]  ? __pfx_kthread+0x10/0x10
[   14.313785]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.313806]  ? calculate_sigpending+0x7b/0xa0
[   14.313830]  ? __pfx_kthread+0x10/0x10
[   14.313851]  ret_from_fork+0x116/0x1d0
[   14.313870]  ? __pfx_kthread+0x10/0x10
[   14.313889]  ret_from_fork_asm+0x1a/0x30
[   14.313920]  </TASK>
[   14.313929] 
[   14.322764] Allocated by task 279:
[   14.322923]  kasan_save_stack+0x45/0x70
[   14.323225]  kasan_save_track+0x18/0x40
[   14.323388]  kasan_save_alloc_info+0x3b/0x50
[   14.323550]  __kasan_kmalloc+0xb7/0xc0
[   14.323705]  __kmalloc_cache_noprof+0x189/0x420
[   14.323924]  kasan_bitops_generic+0x92/0x1c0
[   14.324139]  kunit_try_run_case+0x1a5/0x480
[   14.324359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.324605]  kthread+0x337/0x6f0
[   14.324771]  ret_from_fork+0x116/0x1d0
[   14.324963]  ret_from_fork_asm+0x1a/0x30
[   14.325123] 
[   14.325298] The buggy address belongs to the object at ffff888101642a40
[   14.325298]  which belongs to the cache kmalloc-16 of size 16
[   14.325695] The buggy address is located 8 bytes inside of
[   14.325695]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.326050] 
[   14.326143] The buggy address belongs to the physical page:
[   14.326398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.326974] flags: 0x200000000000000(node=0|zone=2)
[   14.327464] page_type: f5(slab)
[   14.327647] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.327984] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.328211] page dumped because: kasan: bad access detected
[   14.328537] 
[   14.328631] Memory state around the buggy address:
[   14.328853]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.329231]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.329524] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.329829]                                               ^
[   14.330034]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.330396]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.330683] ==================================================================
[   14.358143] ==================================================================
[   14.358473] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.359189] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.359539] 
[   14.359657] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.359703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.359715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.359736] Call Trace:
[   14.359755]  <TASK>
[   14.359772]  dump_stack_lvl+0x73/0xb0
[   14.359801]  print_report+0xd1/0x610
[   14.359822]  ? __virt_addr_valid+0x1db/0x2d0
[   14.359844]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.359871]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.359894]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.359922]  kasan_report+0x141/0x180
[   14.359943]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.359976]  kasan_check_range+0x10c/0x1c0
[   14.359998]  __kasan_check_write+0x18/0x20
[   14.360016]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.360044]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.360073]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.360096]  ? trace_hardirqs_on+0x37/0xe0
[   14.360119]  ? kasan_bitops_generic+0x92/0x1c0
[   14.360146]  kasan_bitops_generic+0x121/0x1c0
[   14.360183]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.360207]  ? __pfx_read_tsc+0x10/0x10
[   14.360228]  ? ktime_get_ts64+0x86/0x230
[   14.360251]  kunit_try_run_case+0x1a5/0x480
[   14.360274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.360298]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.360321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.360346]  ? __kthread_parkme+0x82/0x180
[   14.360365]  ? preempt_count_sub+0x50/0x80
[   14.360388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.360412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.360435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.360459]  kthread+0x337/0x6f0
[   14.360478]  ? trace_preempt_on+0x20/0xc0
[   14.360509]  ? __pfx_kthread+0x10/0x10
[   14.360529]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.360550]  ? calculate_sigpending+0x7b/0xa0
[   14.360575]  ? __pfx_kthread+0x10/0x10
[   14.360595]  ret_from_fork+0x116/0x1d0
[   14.360613]  ? __pfx_kthread+0x10/0x10
[   14.360633]  ret_from_fork_asm+0x1a/0x30
[   14.360663]  </TASK>
[   14.360673] 
[   14.368800] Allocated by task 279:
[   14.368937]  kasan_save_stack+0x45/0x70
[   14.369135]  kasan_save_track+0x18/0x40
[   14.369329]  kasan_save_alloc_info+0x3b/0x50
[   14.369662]  __kasan_kmalloc+0xb7/0xc0
[   14.369850]  __kmalloc_cache_noprof+0x189/0x420
[   14.370014]  kasan_bitops_generic+0x92/0x1c0
[   14.370163]  kunit_try_run_case+0x1a5/0x480
[   14.370312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.370629]  kthread+0x337/0x6f0
[   14.370798]  ret_from_fork+0x116/0x1d0
[   14.370988]  ret_from_fork_asm+0x1a/0x30
[   14.371186] 
[   14.371283] The buggy address belongs to the object at ffff888101642a40
[   14.371283]  which belongs to the cache kmalloc-16 of size 16
[   14.371811] The buggy address is located 8 bytes inside of
[   14.371811]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.372301] 
[   14.372371] The buggy address belongs to the physical page:
[   14.372551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.372789] flags: 0x200000000000000(node=0|zone=2)
[   14.372951] page_type: f5(slab)
[   14.373072] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.373742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.374070] page dumped because: kasan: bad access detected
[   14.374548] 
[   14.374645] Memory state around the buggy address:
[   14.374866]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.375185]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.375459] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.375682]                                               ^
[   14.375855]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.376089]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.376718] ==================================================================
[   14.243786] ==================================================================
[   14.244072] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.244974] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.245574] 
[   14.245687] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.245733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.245744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.245765] Call Trace:
[   14.245784]  <TASK>
[   14.245802]  dump_stack_lvl+0x73/0xb0
[   14.245831]  print_report+0xd1/0x610
[   14.245853]  ? __virt_addr_valid+0x1db/0x2d0
[   14.245875]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.245903]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.245925]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.245955]  kasan_report+0x141/0x180
[   14.245976]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.246009]  kasan_check_range+0x10c/0x1c0
[   14.246032]  __kasan_check_write+0x18/0x20
[   14.246122]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.246152]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.246203]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.246229]  ? trace_hardirqs_on+0x37/0xe0
[   14.246251]  ? kasan_bitops_generic+0x92/0x1c0
[   14.246277]  kasan_bitops_generic+0x121/0x1c0
[   14.246300]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.246325]  ? __pfx_read_tsc+0x10/0x10
[   14.246345]  ? ktime_get_ts64+0x86/0x230
[   14.246371]  kunit_try_run_case+0x1a5/0x480
[   14.246396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.246418]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.246443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.246466]  ? __kthread_parkme+0x82/0x180
[   14.246486]  ? preempt_count_sub+0x50/0x80
[   14.246521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.246545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.246568]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.246592]  kthread+0x337/0x6f0
[   14.246611]  ? trace_preempt_on+0x20/0xc0
[   14.246632]  ? __pfx_kthread+0x10/0x10
[   14.246652]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.246673]  ? calculate_sigpending+0x7b/0xa0
[   14.246697]  ? __pfx_kthread+0x10/0x10
[   14.246718]  ret_from_fork+0x116/0x1d0
[   14.246737]  ? __pfx_kthread+0x10/0x10
[   14.246756]  ret_from_fork_asm+0x1a/0x30
[   14.246787]  </TASK>
[   14.246797] 
[   14.255438] Allocated by task 279:
[   14.255636]  kasan_save_stack+0x45/0x70
[   14.255791]  kasan_save_track+0x18/0x40
[   14.255926]  kasan_save_alloc_info+0x3b/0x50
[   14.256075]  __kasan_kmalloc+0xb7/0xc0
[   14.256206]  __kmalloc_cache_noprof+0x189/0x420
[   14.256361]  kasan_bitops_generic+0x92/0x1c0
[   14.256520]  kunit_try_run_case+0x1a5/0x480
[   14.256666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.256840]  kthread+0x337/0x6f0
[   14.256960]  ret_from_fork+0x116/0x1d0
[   14.257092]  ret_from_fork_asm+0x1a/0x30
[   14.257233] 
[   14.257303] The buggy address belongs to the object at ffff888101642a40
[   14.257303]  which belongs to the cache kmalloc-16 of size 16
[   14.257850] The buggy address is located 8 bytes inside of
[   14.257850]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.258986] 
[   14.259224] The buggy address belongs to the physical page:
[   14.259482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.259850] flags: 0x200000000000000(node=0|zone=2)
[   14.260137] page_type: f5(slab)
[   14.260323] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.260569] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.260801] page dumped because: kasan: bad access detected
[   14.260972] 
[   14.261040] Memory state around the buggy address:
[   14.262205]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.262565]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.262882] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.263455]                                               ^
[   14.263736]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.264060]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.264550] ==================================================================
[   14.427408] ==================================================================
[   14.427763] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.428178] Read of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.428760] 
[   14.428858] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.428909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.428920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.428942] Call Trace:
[   14.428960]  <TASK>
[   14.428977]  dump_stack_lvl+0x73/0xb0
[   14.429009]  print_report+0xd1/0x610
[   14.429030]  ? __virt_addr_valid+0x1db/0x2d0
[   14.429052]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.429080]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.429103]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.429131]  kasan_report+0x141/0x180
[   14.429151]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.429184]  __asan_report_load8_noabort+0x18/0x20
[   14.429207]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.429235]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.429281]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.429305]  ? trace_hardirqs_on+0x37/0xe0
[   14.429328]  ? kasan_bitops_generic+0x92/0x1c0
[   14.429354]  kasan_bitops_generic+0x121/0x1c0
[   14.429377]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.429402]  ? __pfx_read_tsc+0x10/0x10
[   14.429422]  ? ktime_get_ts64+0x86/0x230
[   14.429446]  kunit_try_run_case+0x1a5/0x480
[   14.429470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.429491]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.429528]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.429551]  ? __kthread_parkme+0x82/0x180
[   14.429571]  ? preempt_count_sub+0x50/0x80
[   14.429595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.429619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.429642]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.429665]  kthread+0x337/0x6f0
[   14.429683]  ? trace_preempt_on+0x20/0xc0
[   14.429705]  ? __pfx_kthread+0x10/0x10
[   14.429724]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.429745]  ? calculate_sigpending+0x7b/0xa0
[   14.429769]  ? __pfx_kthread+0x10/0x10
[   14.429789]  ret_from_fork+0x116/0x1d0
[   14.429807]  ? __pfx_kthread+0x10/0x10
[   14.429827]  ret_from_fork_asm+0x1a/0x30
[   14.429858]  </TASK>
[   14.429867] 
[   14.437870] Allocated by task 279:
[   14.438000]  kasan_save_stack+0x45/0x70
[   14.438254]  kasan_save_track+0x18/0x40
[   14.438447]  kasan_save_alloc_info+0x3b/0x50
[   14.438666]  __kasan_kmalloc+0xb7/0xc0
[   14.438853]  __kmalloc_cache_noprof+0x189/0x420
[   14.439037]  kasan_bitops_generic+0x92/0x1c0
[   14.439246]  kunit_try_run_case+0x1a5/0x480
[   14.439452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.439723]  kthread+0x337/0x6f0
[   14.439857]  ret_from_fork+0x116/0x1d0
[   14.439995]  ret_from_fork_asm+0x1a/0x30
[   14.440188] 
[   14.440357] The buggy address belongs to the object at ffff888101642a40
[   14.440357]  which belongs to the cache kmalloc-16 of size 16
[   14.440729] The buggy address is located 8 bytes inside of
[   14.440729]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.441080] 
[   14.441164] The buggy address belongs to the physical page:
[   14.441419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.441775] flags: 0x200000000000000(node=0|zone=2)
[   14.442007] page_type: f5(slab)
[   14.442170] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.442656] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.442952] page dumped because: kasan: bad access detected
[   14.443122] 
[   14.443188] Memory state around the buggy address:
[   14.443342]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.443995]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.444513] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.444778]                                               ^
[   14.445014]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.445313]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.445569] ==================================================================