Hay
Date
July 19, 2025, 11:12 p.m.

Environment
qemu-x86_64

[   14.327228] ==================================================================
[   14.327807] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.328231] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278
[   14.328692] 
[   14.328801] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.328844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.328856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.328876] Call Trace:
[   14.328888]  <TASK>
[   14.328900]  dump_stack_lvl+0x73/0xb0
[   14.328926]  print_report+0xd1/0x610
[   14.328947]  ? __virt_addr_valid+0x1db/0x2d0
[   14.328974]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.328999]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.329030]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.329056]  kasan_report+0x141/0x180
[   14.329077]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.329108]  kasan_check_range+0x10c/0x1c0
[   14.329130]  __kasan_check_write+0x18/0x20
[   14.329148]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.329174]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.329200]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.329223]  ? trace_hardirqs_on+0x37/0xe0
[   14.329243]  ? kasan_bitops_generic+0x92/0x1c0
[   14.329269]  kasan_bitops_generic+0x121/0x1c0
[   14.329291]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.329315]  ? __pfx_read_tsc+0x10/0x10
[   14.329334]  ? ktime_get_ts64+0x86/0x230
[   14.329358]  kunit_try_run_case+0x1a5/0x480
[   14.329436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.329458]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.329480]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.329503]  ? __kthread_parkme+0x82/0x180
[   14.329522]  ? preempt_count_sub+0x50/0x80
[   14.329544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.329567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.329589]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.329612]  kthread+0x337/0x6f0
[   14.329629]  ? trace_preempt_on+0x20/0xc0
[   14.329650]  ? __pfx_kthread+0x10/0x10
[   14.329670]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.329690]  ? calculate_sigpending+0x7b/0xa0
[   14.329712]  ? __pfx_kthread+0x10/0x10
[   14.329733]  ret_from_fork+0x116/0x1d0
[   14.329751]  ? __pfx_kthread+0x10/0x10
[   14.329770]  ret_from_fork_asm+0x1a/0x30
[   14.329800]  </TASK>
[   14.329810] 
[   14.337987] Allocated by task 278:
[   14.338125]  kasan_save_stack+0x45/0x70
[   14.338381]  kasan_save_track+0x18/0x40
[   14.338676]  kasan_save_alloc_info+0x3b/0x50
[   14.338906]  __kasan_kmalloc+0xb7/0xc0
[   14.339082]  __kmalloc_cache_noprof+0x189/0x420
[   14.339287]  kasan_bitops_generic+0x92/0x1c0
[   14.339433]  kunit_try_run_case+0x1a5/0x480
[   14.339834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.340120]  kthread+0x337/0x6f0
[   14.340282]  ret_from_fork+0x116/0x1d0
[   14.340540]  ret_from_fork_asm+0x1a/0x30
[   14.340690] 
[   14.340763] The buggy address belongs to the object at ffff888101df6d60
[   14.340763]  which belongs to the cache kmalloc-16 of size 16
[   14.341195] The buggy address is located 8 bytes inside of
[   14.341195]  allocated 9-byte region [ffff888101df6d60, ffff888101df6d69)
[   14.341713] 
[   14.341808] The buggy address belongs to the physical page:
[   14.342111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6
[   14.342353] flags: 0x200000000000000(node=0|zone=2)
[   14.342514] page_type: f5(slab)
[   14.342732] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.343102] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.343574] page dumped because: kasan: bad access detected
[   14.343843] 
[   14.343938] Memory state around the buggy address:
[   14.344152]  ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.344684]  ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.344993] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.345300]                                                           ^
[   14.345630]  ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.345911]  ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.346200] ==================================================================
[   14.369243] ==================================================================
[   14.369623] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.369958] Read of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278
[   14.370301] 
[   14.370459] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.370502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.370514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.370534] Call Trace:
[   14.370548]  <TASK>
[   14.370563]  dump_stack_lvl+0x73/0xb0
[   14.370588]  print_report+0xd1/0x610
[   14.370609]  ? __virt_addr_valid+0x1db/0x2d0
[   14.370629]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.370654]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.370676]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.370701]  kasan_report+0x141/0x180
[   14.370722]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.370753]  __asan_report_load8_noabort+0x18/0x20
[   14.370776]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.370802]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.370830]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.370853]  ? trace_hardirqs_on+0x37/0xe0
[   14.370874]  ? kasan_bitops_generic+0x92/0x1c0
[   14.370900]  kasan_bitops_generic+0x121/0x1c0
[   14.370922]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.370946]  ? __pfx_read_tsc+0x10/0x10
[   14.370965]  ? ktime_get_ts64+0x86/0x230
[   14.370988]  kunit_try_run_case+0x1a5/0x480
[   14.371084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.371106]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.371128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.371150]  ? __kthread_parkme+0x82/0x180
[   14.371170]  ? preempt_count_sub+0x50/0x80
[   14.371192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.371215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.371237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.371259]  kthread+0x337/0x6f0
[   14.371278]  ? trace_preempt_on+0x20/0xc0
[   14.371299]  ? __pfx_kthread+0x10/0x10
[   14.371319]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.371339]  ? calculate_sigpending+0x7b/0xa0
[   14.371361]  ? __pfx_kthread+0x10/0x10
[   14.371398]  ret_from_fork+0x116/0x1d0
[   14.371416]  ? __pfx_kthread+0x10/0x10
[   14.371435]  ret_from_fork_asm+0x1a/0x30
[   14.371465]  </TASK>
[   14.371474] 
[   14.379125] Allocated by task 278:
[   14.379252]  kasan_save_stack+0x45/0x70
[   14.379506]  kasan_save_track+0x18/0x40
[   14.379709]  kasan_save_alloc_info+0x3b/0x50
[   14.379922]  __kasan_kmalloc+0xb7/0xc0
[   14.380124]  __kmalloc_cache_noprof+0x189/0x420
[   14.380350]  kasan_bitops_generic+0x92/0x1c0
[   14.380585]  kunit_try_run_case+0x1a5/0x480
[   14.380757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.381001]  kthread+0x337/0x6f0
[   14.381142]  ret_from_fork+0x116/0x1d0
[   14.381330]  ret_from_fork_asm+0x1a/0x30
[   14.381722] 
[   14.381821] The buggy address belongs to the object at ffff888101df6d60
[   14.381821]  which belongs to the cache kmalloc-16 of size 16
[   14.382313] The buggy address is located 8 bytes inside of
[   14.382313]  allocated 9-byte region [ffff888101df6d60, ffff888101df6d69)
[   14.382938] 
[   14.383054] The buggy address belongs to the physical page:
[   14.383273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6
[   14.383612] flags: 0x200000000000000(node=0|zone=2)
[   14.383774] page_type: f5(slab)
[   14.383892] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.384137] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.384367] page dumped because: kasan: bad access detected
[   14.384650] 
[   14.384789] Memory state around the buggy address:
[   14.385030]  ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.385352]  ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.385706] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.385951]                                                           ^
[   14.386161]  ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.386546]  ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.386887] ==================================================================
[   14.305742] ==================================================================
[   14.306070] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.306460] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278
[   14.306755] 
[   14.306852] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.306892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.306902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.306922] Call Trace:
[   14.306934]  <TASK>
[   14.306947]  dump_stack_lvl+0x73/0xb0
[   14.306970]  print_report+0xd1/0x610
[   14.306991]  ? __virt_addr_valid+0x1db/0x2d0
[   14.307023]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.307049]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.307070]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.307096]  kasan_report+0x141/0x180
[   14.307117]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.307147]  kasan_check_range+0x10c/0x1c0
[   14.307169]  __kasan_check_write+0x18/0x20
[   14.307187]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.307213]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.307240]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.307262]  ? trace_hardirqs_on+0x37/0xe0
[   14.307282]  ? kasan_bitops_generic+0x92/0x1c0
[   14.307308]  kasan_bitops_generic+0x121/0x1c0
[   14.307331]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.307354]  ? __pfx_read_tsc+0x10/0x10
[   14.307373]  ? ktime_get_ts64+0x86/0x230
[   14.307395]  kunit_try_run_case+0x1a5/0x480
[   14.307417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.307439]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.307460]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.307482]  ? __kthread_parkme+0x82/0x180
[   14.307501]  ? preempt_count_sub+0x50/0x80
[   14.307523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.307546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.307568]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.307591]  kthread+0x337/0x6f0
[   14.307608]  ? trace_preempt_on+0x20/0xc0
[   14.307629]  ? __pfx_kthread+0x10/0x10
[   14.307649]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.307669]  ? calculate_sigpending+0x7b/0xa0
[   14.307692]  ? __pfx_kthread+0x10/0x10
[   14.307712]  ret_from_fork+0x116/0x1d0
[   14.307729]  ? __pfx_kthread+0x10/0x10
[   14.307748]  ret_from_fork_asm+0x1a/0x30
[   14.307777]  </TASK>
[   14.307786] 
[   14.316682] Allocated by task 278:
[   14.316862]  kasan_save_stack+0x45/0x70
[   14.317080]  kasan_save_track+0x18/0x40
[   14.317271]  kasan_save_alloc_info+0x3b/0x50
[   14.317640]  __kasan_kmalloc+0xb7/0xc0
[   14.317834]  __kmalloc_cache_noprof+0x189/0x420
[   14.318075]  kasan_bitops_generic+0x92/0x1c0
[   14.318288]  kunit_try_run_case+0x1a5/0x480
[   14.318521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.318767]  kthread+0x337/0x6f0
[   14.318989]  ret_from_fork+0x116/0x1d0
[   14.319191]  ret_from_fork_asm+0x1a/0x30
[   14.319441] 
[   14.319615] The buggy address belongs to the object at ffff888101df6d60
[   14.319615]  which belongs to the cache kmalloc-16 of size 16
[   14.320078] The buggy address is located 8 bytes inside of
[   14.320078]  allocated 9-byte region [ffff888101df6d60, ffff888101df6d69)
[   14.320698] 
[   14.320778] The buggy address belongs to the physical page:
[   14.321031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6
[   14.321344] flags: 0x200000000000000(node=0|zone=2)
[   14.321625] page_type: f5(slab)
[   14.321766] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.322088] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.322330] page dumped because: kasan: bad access detected
[   14.322758] 
[   14.322871] Memory state around the buggy address:
[   14.323125]  ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.325051]  ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.325357] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.325571]                                                           ^
[   14.325769]  ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.325982]  ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.326756] ==================================================================
[   14.265514] ==================================================================
[   14.266206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.266658] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278
[   14.267107] 
[   14.267203] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.267244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.267256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.267276] Call Trace:
[   14.267289]  <TASK>
[   14.267304]  dump_stack_lvl+0x73/0xb0
[   14.267331]  print_report+0xd1/0x610
[   14.267352]  ? __virt_addr_valid+0x1db/0x2d0
[   14.267583]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.267610]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.267632]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.267658]  kasan_report+0x141/0x180
[   14.267678]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.267709]  kasan_check_range+0x10c/0x1c0
[   14.267731]  __kasan_check_write+0x18/0x20
[   14.267749]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.267775]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.267802]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.267824]  ? trace_hardirqs_on+0x37/0xe0
[   14.267846]  ? kasan_bitops_generic+0x92/0x1c0
[   14.267873]  kasan_bitops_generic+0x121/0x1c0
[   14.267895]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.267918]  ? __pfx_read_tsc+0x10/0x10
[   14.267939]  ? ktime_get_ts64+0x86/0x230
[   14.267962]  kunit_try_run_case+0x1a5/0x480
[   14.267984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.268019]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.268041]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.268063]  ? __kthread_parkme+0x82/0x180
[   14.268081]  ? preempt_count_sub+0x50/0x80
[   14.268103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.268126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.268148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.268170]  kthread+0x337/0x6f0
[   14.268189]  ? trace_preempt_on+0x20/0xc0
[   14.268209]  ? __pfx_kthread+0x10/0x10
[   14.268229]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.268249]  ? calculate_sigpending+0x7b/0xa0
[   14.268272]  ? __pfx_kthread+0x10/0x10
[   14.268292]  ret_from_fork+0x116/0x1d0
[   14.268310]  ? __pfx_kthread+0x10/0x10
[   14.268328]  ret_from_fork_asm+0x1a/0x30
[   14.268358]  </TASK>
[   14.268367] 
[   14.277371] Allocated by task 278:
[   14.277508]  kasan_save_stack+0x45/0x70
[   14.277651]  kasan_save_track+0x18/0x40
[   14.277786]  kasan_save_alloc_info+0x3b/0x50
[   14.278000]  __kasan_kmalloc+0xb7/0xc0
[   14.278251]  __kmalloc_cache_noprof+0x189/0x420
[   14.278559]  kasan_bitops_generic+0x92/0x1c0
[   14.278766]  kunit_try_run_case+0x1a5/0x480
[   14.278932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.279116]  kthread+0x337/0x6f0
[   14.279237]  ret_from_fork+0x116/0x1d0
[   14.279459]  ret_from_fork_asm+0x1a/0x30
[   14.279667] 
[   14.279763] The buggy address belongs to the object at ffff888101df6d60
[   14.279763]  which belongs to the cache kmalloc-16 of size 16
[   14.280313] The buggy address is located 8 bytes inside of
[   14.280313]  allocated 9-byte region [ffff888101df6d60, ffff888101df6d69)
[   14.281157] 
[   14.281265] The buggy address belongs to the physical page:
[   14.281593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6
[   14.281840] flags: 0x200000000000000(node=0|zone=2)
[   14.282001] page_type: f5(slab)
[   14.282134] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.282637] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.282978] page dumped because: kasan: bad access detected
[   14.283242] 
[   14.283336] Memory state around the buggy address:
[   14.283848]  ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.284170]  ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.284515] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.284804]                                                           ^
[   14.285026]  ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.285241]  ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.285480] ==================================================================
[   14.238255] ==================================================================
[   14.238761] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.239177] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278
[   14.239916] 
[   14.240130] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.240174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.240185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.240206] Call Trace:
[   14.240218]  <TASK>
[   14.240232]  dump_stack_lvl+0x73/0xb0
[   14.240260]  print_report+0xd1/0x610
[   14.240370]  ? __virt_addr_valid+0x1db/0x2d0
[   14.240397]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.240424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.240454]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.240481]  kasan_report+0x141/0x180
[   14.240502]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.240533]  kasan_check_range+0x10c/0x1c0
[   14.240555]  __kasan_check_write+0x18/0x20
[   14.240574]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.240600]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.240627]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.240648]  ? trace_hardirqs_on+0x37/0xe0
[   14.240669]  ? kasan_bitops_generic+0x92/0x1c0
[   14.240695]  kasan_bitops_generic+0x121/0x1c0
[   14.240717]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.240741]  ? __pfx_read_tsc+0x10/0x10
[   14.240760]  ? ktime_get_ts64+0x86/0x230
[   14.240782]  kunit_try_run_case+0x1a5/0x480
[   14.240805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.240829]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.240852]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.240874]  ? __kthread_parkme+0x82/0x180
[   14.240893]  ? preempt_count_sub+0x50/0x80
[   14.240915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.240938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.240961]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.240990]  kthread+0x337/0x6f0
[   14.241021]  ? trace_preempt_on+0x20/0xc0
[   14.241042]  ? __pfx_kthread+0x10/0x10
[   14.241062]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.241082]  ? calculate_sigpending+0x7b/0xa0
[   14.241106]  ? __pfx_kthread+0x10/0x10
[   14.241127]  ret_from_fork+0x116/0x1d0
[   14.241144]  ? __pfx_kthread+0x10/0x10
[   14.241164]  ret_from_fork_asm+0x1a/0x30
[   14.241193]  </TASK>
[   14.241202] 
[   14.253349] Allocated by task 278:
[   14.253750]  kasan_save_stack+0x45/0x70
[   14.253948]  kasan_save_track+0x18/0x40
[   14.254235]  kasan_save_alloc_info+0x3b/0x50
[   14.254812]  __kasan_kmalloc+0xb7/0xc0
[   14.255016]  __kmalloc_cache_noprof+0x189/0x420
[   14.255209]  kasan_bitops_generic+0x92/0x1c0
[   14.255623]  kunit_try_run_case+0x1a5/0x480
[   14.255847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.256088]  kthread+0x337/0x6f0
[   14.256248]  ret_from_fork+0x116/0x1d0
[   14.256742]  ret_from_fork_asm+0x1a/0x30
[   14.256944] 
[   14.257038] The buggy address belongs to the object at ffff888101df6d60
[   14.257038]  which belongs to the cache kmalloc-16 of size 16
[   14.257886] The buggy address is located 8 bytes inside of
[   14.257886]  allocated 9-byte region [ffff888101df6d60, ffff888101df6d69)
[   14.258795] 
[   14.258900] The buggy address belongs to the physical page:
[   14.259157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6
[   14.259676] flags: 0x200000000000000(node=0|zone=2)
[   14.259917] page_type: f5(slab)
[   14.260061] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.260681] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.261114] page dumped because: kasan: bad access detected
[   14.261472] 
[   14.261589] Memory state around the buggy address:
[   14.262017]  ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.262521]  ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.262907] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.263240]                                                           ^
[   14.263677]  ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.264094]  ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.264793] ==================================================================
[   14.177939] ==================================================================
[   14.178199] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.179127] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278
[   14.179726] 
[   14.179839] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.179882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.179894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.179915] Call Trace:
[   14.179927]  <TASK>
[   14.179941]  dump_stack_lvl+0x73/0xb0
[   14.179968]  print_report+0xd1/0x610
[   14.179989]  ? __virt_addr_valid+0x1db/0x2d0
[   14.180021]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.180046]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.180068]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.180094]  kasan_report+0x141/0x180
[   14.180116]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.180146]  kasan_check_range+0x10c/0x1c0
[   14.180169]  __kasan_check_write+0x18/0x20
[   14.180187]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.180212]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.180239]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.180262]  ? trace_hardirqs_on+0x37/0xe0
[   14.180281]  ? kasan_bitops_generic+0x92/0x1c0
[   14.180307]  kasan_bitops_generic+0x121/0x1c0
[   14.180329]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.180353]  ? __pfx_read_tsc+0x10/0x10
[   14.180372]  ? ktime_get_ts64+0x86/0x230
[   14.180395]  kunit_try_run_case+0x1a5/0x480
[   14.180417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.180439]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.180461]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.180483]  ? __kthread_parkme+0x82/0x180
[   14.180502]  ? preempt_count_sub+0x50/0x80
[   14.180524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.180547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.180632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.180658]  kthread+0x337/0x6f0
[   14.180677]  ? trace_preempt_on+0x20/0xc0
[   14.180698]  ? __pfx_kthread+0x10/0x10
[   14.180717]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.180738]  ? calculate_sigpending+0x7b/0xa0
[   14.180761]  ? __pfx_kthread+0x10/0x10
[   14.180782]  ret_from_fork+0x116/0x1d0
[   14.180801]  ? __pfx_kthread+0x10/0x10
[   14.180821]  ret_from_fork_asm+0x1a/0x30
[   14.180850]  </TASK>
[   14.180859] 
[   14.195276] Allocated by task 278:
[   14.195861]  kasan_save_stack+0x45/0x70
[   14.196050]  kasan_save_track+0x18/0x40
[   14.196231]  kasan_save_alloc_info+0x3b/0x50
[   14.196660]  __kasan_kmalloc+0xb7/0xc0
[   14.196857]  __kmalloc_cache_noprof+0x189/0x420
[   14.197086]  kasan_bitops_generic+0x92/0x1c0
[   14.197280]  kunit_try_run_case+0x1a5/0x480
[   14.197937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.198398]  kthread+0x337/0x6f0
[   14.198672]  ret_from_fork+0x116/0x1d0
[   14.198859]  ret_from_fork_asm+0x1a/0x30
[   14.199051] 
[   14.199142] The buggy address belongs to the object at ffff888101df6d60
[   14.199142]  which belongs to the cache kmalloc-16 of size 16
[   14.200504] The buggy address is located 8 bytes inside of
[   14.200504]  allocated 9-byte region [ffff888101df6d60, ffff888101df6d69)
[   14.201417] 
[   14.201667] The buggy address belongs to the physical page:
[   14.202054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6
[   14.202608] flags: 0x200000000000000(node=0|zone=2)
[   14.202845] page_type: f5(slab)
[   14.203013] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.203327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.204195] page dumped because: kasan: bad access detected
[   14.204389] 
[   14.204462] Memory state around the buggy address:
[   14.204618]  ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.204833]  ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.205073] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.205283]                                                           ^
[   14.205582]  ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.205912]  ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.207015] ==================================================================
[   14.208227] ==================================================================
[   14.209392] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.210679] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278
[   14.211554] 
[   14.211908] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.211957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.211969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.211989] Call Trace:
[   14.212013]  <TASK>
[   14.212026]  dump_stack_lvl+0x73/0xb0
[   14.212189]  print_report+0xd1/0x610
[   14.212220]  ? __virt_addr_valid+0x1db/0x2d0
[   14.212243]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.212268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.212289]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.212316]  kasan_report+0x141/0x180
[   14.212336]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.212367]  kasan_check_range+0x10c/0x1c0
[   14.212413]  __kasan_check_write+0x18/0x20
[   14.212432]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.212458]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.212484]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.212507]  ? trace_hardirqs_on+0x37/0xe0
[   14.212529]  ? kasan_bitops_generic+0x92/0x1c0
[   14.212555]  kasan_bitops_generic+0x121/0x1c0
[   14.212578]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.212602]  ? __pfx_read_tsc+0x10/0x10
[   14.212622]  ? ktime_get_ts64+0x86/0x230
[   14.212644]  kunit_try_run_case+0x1a5/0x480
[   14.212668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.212689]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.212712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.212734]  ? __kthread_parkme+0x82/0x180
[   14.212753]  ? preempt_count_sub+0x50/0x80
[   14.212775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.212798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.212820]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.212860]  kthread+0x337/0x6f0
[   14.212891]  ? trace_preempt_on+0x20/0xc0
[   14.212912]  ? __pfx_kthread+0x10/0x10
[   14.212932]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.212952]  ? calculate_sigpending+0x7b/0xa0
[   14.212978]  ? __pfx_kthread+0x10/0x10
[   14.212999]  ret_from_fork+0x116/0x1d0
[   14.213027]  ? __pfx_kthread+0x10/0x10
[   14.213046]  ret_from_fork_asm+0x1a/0x30
[   14.213076]  </TASK>
[   14.213086] 
[   14.226098] Allocated by task 278:
[   14.226293]  kasan_save_stack+0x45/0x70
[   14.226697]  kasan_save_track+0x18/0x40
[   14.227084]  kasan_save_alloc_info+0x3b/0x50
[   14.227448]  __kasan_kmalloc+0xb7/0xc0
[   14.227801]  __kmalloc_cache_noprof+0x189/0x420
[   14.228128]  kasan_bitops_generic+0x92/0x1c0
[   14.228517]  kunit_try_run_case+0x1a5/0x480
[   14.228837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.229179]  kthread+0x337/0x6f0
[   14.229357]  ret_from_fork+0x116/0x1d0
[   14.229842]  ret_from_fork_asm+0x1a/0x30
[   14.229993] 
[   14.230218] The buggy address belongs to the object at ffff888101df6d60
[   14.230218]  which belongs to the cache kmalloc-16 of size 16
[   14.230876] The buggy address is located 8 bytes inside of
[   14.230876]  allocated 9-byte region [ffff888101df6d60, ffff888101df6d69)
[   14.231383] 
[   14.231725] The buggy address belongs to the physical page:
[   14.231971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6
[   14.232450] flags: 0x200000000000000(node=0|zone=2)
[   14.232818] page_type: f5(slab)
[   14.232952] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.233486] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.233885] page dumped because: kasan: bad access detected
[   14.234212] 
[   14.234316] Memory state around the buggy address:
[   14.234832]  ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.235226]  ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.235729] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.236052]                                                           ^
[   14.236334]  ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.237066]  ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.237592] ==================================================================
[   14.346769] ==================================================================
[   14.347076] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.347512] Read of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278
[   14.347815] 
[   14.347916] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.347955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.347966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.347986] Call Trace:
[   14.347999]  <TASK>
[   14.348024]  dump_stack_lvl+0x73/0xb0
[   14.348050]  print_report+0xd1/0x610
[   14.348071]  ? __virt_addr_valid+0x1db/0x2d0
[   14.348091]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.348118]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.348139]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.348165]  kasan_report+0x141/0x180
[   14.348186]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.348217]  kasan_check_range+0x10c/0x1c0
[   14.348238]  __kasan_check_read+0x15/0x20
[   14.348257]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.348283]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.348309]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.348332]  ? trace_hardirqs_on+0x37/0xe0
[   14.348351]  ? kasan_bitops_generic+0x92/0x1c0
[   14.348378]  kasan_bitops_generic+0x121/0x1c0
[   14.348401]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.348436]  ? __pfx_read_tsc+0x10/0x10
[   14.348456]  ? ktime_get_ts64+0x86/0x230
[   14.348478]  kunit_try_run_case+0x1a5/0x480
[   14.348500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.348522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.348544]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.348566]  ? __kthread_parkme+0x82/0x180
[   14.348585]  ? preempt_count_sub+0x50/0x80
[   14.348607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.348630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.348652]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.348675]  kthread+0x337/0x6f0
[   14.348693]  ? trace_preempt_on+0x20/0xc0
[   14.348714]  ? __pfx_kthread+0x10/0x10
[   14.348734]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.348754]  ? calculate_sigpending+0x7b/0xa0
[   14.348776]  ? __pfx_kthread+0x10/0x10
[   14.348796]  ret_from_fork+0x116/0x1d0
[   14.348814]  ? __pfx_kthread+0x10/0x10
[   14.348834]  ret_from_fork_asm+0x1a/0x30
[   14.348864]  </TASK>
[   14.348872] 
[   14.357215] Allocated by task 278:
[   14.357401]  kasan_save_stack+0x45/0x70
[   14.357618]  kasan_save_track+0x18/0x40
[   14.357753]  kasan_save_alloc_info+0x3b/0x50
[   14.357900]  __kasan_kmalloc+0xb7/0xc0
[   14.358042]  __kmalloc_cache_noprof+0x189/0x420
[   14.358197]  kasan_bitops_generic+0x92/0x1c0
[   14.358345]  kunit_try_run_case+0x1a5/0x480
[   14.358549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.359360]  kthread+0x337/0x6f0
[   14.359549]  ret_from_fork+0x116/0x1d0
[   14.359736]  ret_from_fork_asm+0x1a/0x30
[   14.359931] 
[   14.360036] The buggy address belongs to the object at ffff888101df6d60
[   14.360036]  which belongs to the cache kmalloc-16 of size 16
[   14.360546] The buggy address is located 8 bytes inside of
[   14.360546]  allocated 9-byte region [ffff888101df6d60, ffff888101df6d69)
[   14.361436] 
[   14.361618] The buggy address belongs to the physical page:
[   14.361858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6
[   14.362174] flags: 0x200000000000000(node=0|zone=2)
[   14.363492] page_type: f5(slab)
[   14.363644] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.363877] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.364117] page dumped because: kasan: bad access detected
[   14.364357] 
[   14.365118] Memory state around the buggy address:
[   14.365338]  ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.366186]  ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.367420] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.367719]                                                           ^
[   14.367925]  ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.368171]  ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.368558] ==================================================================
[   14.285975] ==================================================================
[   14.286732] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.287125] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278
[   14.287505] 
[   14.287603] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.287644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.287655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.287675] Call Trace:
[   14.287687]  <TASK>
[   14.287700]  dump_stack_lvl+0x73/0xb0
[   14.287726]  print_report+0xd1/0x610
[   14.287746]  ? __virt_addr_valid+0x1db/0x2d0
[   14.287767]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.287793]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.287814]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.287840]  kasan_report+0x141/0x180
[   14.287860]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.287892]  kasan_check_range+0x10c/0x1c0
[   14.287915]  __kasan_check_write+0x18/0x20
[   14.287933]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.287958]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.287985]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.288021]  ? trace_hardirqs_on+0x37/0xe0
[   14.288042]  ? kasan_bitops_generic+0x92/0x1c0
[   14.288068]  kasan_bitops_generic+0x121/0x1c0
[   14.288090]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.288113]  ? __pfx_read_tsc+0x10/0x10
[   14.288133]  ? ktime_get_ts64+0x86/0x230
[   14.288156]  kunit_try_run_case+0x1a5/0x480
[   14.288178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.288199]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.288221]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.288242]  ? __kthread_parkme+0x82/0x180
[   14.288262]  ? preempt_count_sub+0x50/0x80
[   14.288284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.288307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.288329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.288352]  kthread+0x337/0x6f0
[   14.288370]  ? trace_preempt_on+0x20/0xc0
[   14.288391]  ? __pfx_kthread+0x10/0x10
[   14.288410]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.288492]  ? calculate_sigpending+0x7b/0xa0
[   14.288514]  ? __pfx_kthread+0x10/0x10
[   14.288535]  ret_from_fork+0x116/0x1d0
[   14.288552]  ? __pfx_kthread+0x10/0x10
[   14.288572]  ret_from_fork_asm+0x1a/0x30
[   14.288601]  </TASK>
[   14.288612] 
[   14.297242] Allocated by task 278:
[   14.297374]  kasan_save_stack+0x45/0x70
[   14.297578]  kasan_save_track+0x18/0x40
[   14.297767]  kasan_save_alloc_info+0x3b/0x50
[   14.298088]  __kasan_kmalloc+0xb7/0xc0
[   14.298235]  __kmalloc_cache_noprof+0x189/0x420
[   14.298492]  kasan_bitops_generic+0x92/0x1c0
[   14.298704]  kunit_try_run_case+0x1a5/0x480
[   14.298914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.299140]  kthread+0x337/0x6f0
[   14.299310]  ret_from_fork+0x116/0x1d0
[   14.299540]  ret_from_fork_asm+0x1a/0x30
[   14.299684] 
[   14.299752] The buggy address belongs to the object at ffff888101df6d60
[   14.299752]  which belongs to the cache kmalloc-16 of size 16
[   14.300116] The buggy address is located 8 bytes inside of
[   14.300116]  allocated 9-byte region [ffff888101df6d60, ffff888101df6d69)
[   14.300473] 
[   14.300575] The buggy address belongs to the physical page:
[   14.301026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6
[   14.301377] flags: 0x200000000000000(node=0|zone=2)
[   14.301604] page_type: f5(slab)
[   14.301770] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.302079] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.302301] page dumped because: kasan: bad access detected
[   14.302469] 
[   14.302536] Memory state around the buggy address:
[   14.302687]  ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.303092]  ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.303419] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.303892]                                                           ^
[   14.304199]  ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.304916]  ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.305204] ==================================================================