Hay
Date
July 3, 2025, 6:13 p.m.

Environment
qemu-x86_64

[   13.657081] ==================================================================
[   13.659014] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.659886] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.660983] 
[   13.661260] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.661327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.661339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.661361] Call Trace:
[   13.661376]  <TASK>
[   13.661390]  dump_stack_lvl+0x73/0xb0
[   13.661421]  print_report+0xd1/0x650
[   13.661443]  ? __virt_addr_valid+0x1db/0x2d0
[   13.661466]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.661492]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.661513]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.661540]  kasan_report+0x141/0x180
[   13.661561]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.661591]  kasan_check_range+0x10c/0x1c0
[   13.661614]  __kasan_check_write+0x18/0x20
[   13.661633]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.661659]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.661686]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.661710]  ? trace_hardirqs_on+0x37/0xe0
[   13.661737]  ? kasan_bitops_generic+0x92/0x1c0
[   13.661764]  kasan_bitops_generic+0x121/0x1c0
[   13.661787]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.661811]  ? __pfx_read_tsc+0x10/0x10
[   13.661834]  ? ktime_get_ts64+0x86/0x230
[   13.661858]  kunit_try_run_case+0x1a5/0x480
[   13.661881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.661902]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.661925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.661947]  ? __kthread_parkme+0x82/0x180
[   13.661967]  ? preempt_count_sub+0x50/0x80
[   13.661990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.662013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.662036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.662058]  kthread+0x337/0x6f0
[   13.662078]  ? trace_preempt_on+0x20/0xc0
[   13.662121]  ? __pfx_kthread+0x10/0x10
[   13.662209]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.662234]  ? calculate_sigpending+0x7b/0xa0
[   13.662257]  ? __pfx_kthread+0x10/0x10
[   13.662278]  ret_from_fork+0x116/0x1d0
[   13.662297]  ? __pfx_kthread+0x10/0x10
[   13.662317]  ret_from_fork_asm+0x1a/0x30
[   13.662364]  </TASK>
[   13.662375] 
[   13.681859] Allocated by task 279:
[   13.682466]  kasan_save_stack+0x45/0x70
[   13.682765]  kasan_save_track+0x18/0x40
[   13.682912]  kasan_save_alloc_info+0x3b/0x50
[   13.683061]  __kasan_kmalloc+0xb7/0xc0
[   13.683265]  __kmalloc_cache_noprof+0x189/0x420
[   13.683419]  kasan_bitops_generic+0x92/0x1c0
[   13.683564]  kunit_try_run_case+0x1a5/0x480
[   13.683705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.684236]  kthread+0x337/0x6f0
[   13.684375]  ret_from_fork+0x116/0x1d0
[   13.684509]  ret_from_fork_asm+0x1a/0x30
[   13.684648] 
[   13.684721] The buggy address belongs to the object at ffff888101745ee0
[   13.684721]  which belongs to the cache kmalloc-16 of size 16
[   13.685065] The buggy address is located 8 bytes inside of
[   13.685065]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.687067] 
[   13.687752] The buggy address belongs to the physical page:
[   13.688319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.688810] flags: 0x200000000000000(node=0|zone=2)
[   13.689690] page_type: f5(slab)
[   13.690224] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.690756] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.690989] page dumped because: kasan: bad access detected
[   13.691179] 
[   13.691843] Memory state around the buggy address:
[   13.692491]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.693390]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.694351] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.694580]                                                           ^
[   13.694785]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.695004]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.695605] ==================================================================
[   13.759279] ==================================================================
[   13.759567] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.759849] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.760075] 
[   13.760268] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.760313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.760352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.760388] Call Trace:
[   13.760402]  <TASK>
[   13.760416]  dump_stack_lvl+0x73/0xb0
[   13.760458]  print_report+0xd1/0x650
[   13.760482]  ? __virt_addr_valid+0x1db/0x2d0
[   13.760503]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.760529]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.760551]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.760578]  kasan_report+0x141/0x180
[   13.760600]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.760631]  kasan_check_range+0x10c/0x1c0
[   13.760653]  __kasan_check_write+0x18/0x20
[   13.760672]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.760699]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.760725]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.760749]  ? trace_hardirqs_on+0x37/0xe0
[   13.760775]  ? kasan_bitops_generic+0x92/0x1c0
[   13.760802]  kasan_bitops_generic+0x121/0x1c0
[   13.760824]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.760868]  ? __pfx_read_tsc+0x10/0x10
[   13.760888]  ? ktime_get_ts64+0x86/0x230
[   13.760912]  kunit_try_run_case+0x1a5/0x480
[   13.760934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.760956]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.760979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.761000]  ? __kthread_parkme+0x82/0x180
[   13.761019]  ? preempt_count_sub+0x50/0x80
[   13.761059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.761082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.761119]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.761142]  kthread+0x337/0x6f0
[   13.761176]  ? trace_preempt_on+0x20/0xc0
[   13.761203]  ? __pfx_kthread+0x10/0x10
[   13.761223]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.761243]  ? calculate_sigpending+0x7b/0xa0
[   13.761266]  ? __pfx_kthread+0x10/0x10
[   13.761287]  ret_from_fork+0x116/0x1d0
[   13.761305]  ? __pfx_kthread+0x10/0x10
[   13.761325]  ret_from_fork_asm+0x1a/0x30
[   13.761355]  </TASK>
[   13.761366] 
[   13.774013] Allocated by task 279:
[   13.774294]  kasan_save_stack+0x45/0x70
[   13.774737]  kasan_save_track+0x18/0x40
[   13.774936]  kasan_save_alloc_info+0x3b/0x50
[   13.775093]  __kasan_kmalloc+0xb7/0xc0
[   13.775289]  __kmalloc_cache_noprof+0x189/0x420
[   13.775495]  kasan_bitops_generic+0x92/0x1c0
[   13.775808]  kunit_try_run_case+0x1a5/0x480
[   13.775989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.776232]  kthread+0x337/0x6f0
[   13.776494]  ret_from_fork+0x116/0x1d0
[   13.776673]  ret_from_fork_asm+0x1a/0x30
[   13.776876] 
[   13.776962] The buggy address belongs to the object at ffff888101745ee0
[   13.776962]  which belongs to the cache kmalloc-16 of size 16
[   13.778756] The buggy address is located 8 bytes inside of
[   13.778756]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.779565] 
[   13.779652] The buggy address belongs to the physical page:
[   13.779832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.780076] flags: 0x200000000000000(node=0|zone=2)
[   13.780255] page_type: f5(slab)
[   13.780386] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.780621] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.780851] page dumped because: kasan: bad access detected
[   13.781026] 
[   13.782135] Memory state around the buggy address:
[   13.783192]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.784898]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.785887] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.786638]                                                           ^
[   13.786855]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.787076]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.787342] ==================================================================
[   13.789215] ==================================================================
[   13.789950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.790380] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.791115] 
[   13.791360] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.791408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.791420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.791441] Call Trace:
[   13.791455]  <TASK>
[   13.791469]  dump_stack_lvl+0x73/0xb0
[   13.791495]  print_report+0xd1/0x650
[   13.791518]  ? __virt_addr_valid+0x1db/0x2d0
[   13.791540]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.791567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.791588]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.791614]  kasan_report+0x141/0x180
[   13.791635]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.791667]  kasan_check_range+0x10c/0x1c0
[   13.791690]  __kasan_check_write+0x18/0x20
[   13.791709]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.791735]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.791764]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.791788]  ? trace_hardirqs_on+0x37/0xe0
[   13.791814]  ? kasan_bitops_generic+0x92/0x1c0
[   13.791842]  kasan_bitops_generic+0x121/0x1c0
[   13.791864]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.791889]  ? __pfx_read_tsc+0x10/0x10
[   13.791909]  ? ktime_get_ts64+0x86/0x230
[   13.791931]  kunit_try_run_case+0x1a5/0x480
[   13.791953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.791974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.791996]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.792018]  ? __kthread_parkme+0x82/0x180
[   13.792037]  ? preempt_count_sub+0x50/0x80
[   13.792059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.792082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.792120]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.792142]  kthread+0x337/0x6f0
[   13.792161]  ? trace_preempt_on+0x20/0xc0
[   13.792187]  ? __pfx_kthread+0x10/0x10
[   13.792206]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.792226]  ? calculate_sigpending+0x7b/0xa0
[   13.792249]  ? __pfx_kthread+0x10/0x10
[   13.792269]  ret_from_fork+0x116/0x1d0
[   13.792286]  ? __pfx_kthread+0x10/0x10
[   13.792307]  ret_from_fork_asm+0x1a/0x30
[   13.792344]  </TASK>
[   13.792355] 
[   13.804848] Allocated by task 279:
[   13.804987]  kasan_save_stack+0x45/0x70
[   13.805152]  kasan_save_track+0x18/0x40
[   13.805290]  kasan_save_alloc_info+0x3b/0x50
[   13.805474]  __kasan_kmalloc+0xb7/0xc0
[   13.805660]  __kmalloc_cache_noprof+0x189/0x420
[   13.805869]  kasan_bitops_generic+0x92/0x1c0
[   13.806021]  kunit_try_run_case+0x1a5/0x480
[   13.806242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.806535]  kthread+0x337/0x6f0
[   13.806696]  ret_from_fork+0x116/0x1d0
[   13.806830]  ret_from_fork_asm+0x1a/0x30
[   13.807026] 
[   13.807135] The buggy address belongs to the object at ffff888101745ee0
[   13.807135]  which belongs to the cache kmalloc-16 of size 16
[   13.807665] The buggy address is located 8 bytes inside of
[   13.807665]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.808032] 
[   13.808129] The buggy address belongs to the physical page:
[   13.808379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.808869] flags: 0x200000000000000(node=0|zone=2)
[   13.809039] page_type: f5(slab)
[   13.809176] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.809733] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.810150] page dumped because: kasan: bad access detected
[   13.810379] 
[   13.810456] Memory state around the buggy address:
[   13.810674]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.810929]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.811267] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.811573]                                                           ^
[   13.811867]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.812132]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.812526] ==================================================================
[   13.813118] ==================================================================
[   13.813516] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.813908] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.814211] 
[   13.814315] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.814356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.814368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.814389] Call Trace:
[   13.814404]  <TASK>
[   13.814419]  dump_stack_lvl+0x73/0xb0
[   13.814444]  print_report+0xd1/0x650
[   13.814466]  ? __virt_addr_valid+0x1db/0x2d0
[   13.814488]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.814513]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.814535]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.814562]  kasan_report+0x141/0x180
[   13.814584]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.814614]  kasan_check_range+0x10c/0x1c0
[   13.814637]  __kasan_check_write+0x18/0x20
[   13.814654]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.814681]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.814707]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.814731]  ? trace_hardirqs_on+0x37/0xe0
[   13.814756]  ? kasan_bitops_generic+0x92/0x1c0
[   13.814783]  kasan_bitops_generic+0x121/0x1c0
[   13.814807]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.814830]  ? __pfx_read_tsc+0x10/0x10
[   13.814851]  ? ktime_get_ts64+0x86/0x230
[   13.814875]  kunit_try_run_case+0x1a5/0x480
[   13.814897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.814918]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.814940]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.814961]  ? __kthread_parkme+0x82/0x180
[   13.814981]  ? preempt_count_sub+0x50/0x80
[   13.815003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.815025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.815047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.815069]  kthread+0x337/0x6f0
[   13.815087]  ? trace_preempt_on+0x20/0xc0
[   13.815125]  ? __pfx_kthread+0x10/0x10
[   13.815147]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.815169]  ? calculate_sigpending+0x7b/0xa0
[   13.815192]  ? __pfx_kthread+0x10/0x10
[   13.815217]  ret_from_fork+0x116/0x1d0
[   13.815234]  ? __pfx_kthread+0x10/0x10
[   13.815255]  ret_from_fork_asm+0x1a/0x30
[   13.815285]  </TASK>
[   13.815296] 
[   13.823196] Allocated by task 279:
[   13.823399]  kasan_save_stack+0x45/0x70
[   13.823544]  kasan_save_track+0x18/0x40
[   13.823680]  kasan_save_alloc_info+0x3b/0x50
[   13.823884]  __kasan_kmalloc+0xb7/0xc0
[   13.824073]  __kmalloc_cache_noprof+0x189/0x420
[   13.824308]  kasan_bitops_generic+0x92/0x1c0
[   13.824528]  kunit_try_run_case+0x1a5/0x480
[   13.824727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.824960]  kthread+0x337/0x6f0
[   13.825115]  ret_from_fork+0x116/0x1d0
[   13.825287]  ret_from_fork_asm+0x1a/0x30
[   13.825560] 
[   13.825636] The buggy address belongs to the object at ffff888101745ee0
[   13.825636]  which belongs to the cache kmalloc-16 of size 16
[   13.826107] The buggy address is located 8 bytes inside of
[   13.826107]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.826537] 
[   13.826636] The buggy address belongs to the physical page:
[   13.826878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.827126] flags: 0x200000000000000(node=0|zone=2)
[   13.827416] page_type: f5(slab)
[   13.827587] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.827929] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.828246] page dumped because: kasan: bad access detected
[   13.828493] 
[   13.828581] Memory state around the buggy address:
[   13.828773]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.829048]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.829303] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.829683]                                                           ^
[   13.829913]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.830210]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.830518] ==================================================================
[   13.727838] ==================================================================
[   13.728076] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.729365] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.729951] 
[   13.730270] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.730339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.730352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.730373] Call Trace:
[   13.730390]  <TASK>
[   13.730404]  dump_stack_lvl+0x73/0xb0
[   13.730432]  print_report+0xd1/0x650
[   13.730455]  ? __virt_addr_valid+0x1db/0x2d0
[   13.730477]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.730502]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.730526]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.730554]  kasan_report+0x141/0x180
[   13.730576]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.730607]  kasan_check_range+0x10c/0x1c0
[   13.730630]  __kasan_check_write+0x18/0x20
[   13.730648]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.730674]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.730701]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.730726]  ? trace_hardirqs_on+0x37/0xe0
[   13.730752]  ? kasan_bitops_generic+0x92/0x1c0
[   13.730778]  kasan_bitops_generic+0x121/0x1c0
[   13.730800]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.730824]  ? __pfx_read_tsc+0x10/0x10
[   13.730845]  ? ktime_get_ts64+0x86/0x230
[   13.730868]  kunit_try_run_case+0x1a5/0x480
[   13.730891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.730913]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.730934]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.730956]  ? __kthread_parkme+0x82/0x180
[   13.730975]  ? preempt_count_sub+0x50/0x80
[   13.730999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.731022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.731045]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.731067]  kthread+0x337/0x6f0
[   13.731085]  ? trace_preempt_on+0x20/0xc0
[   13.731351]  ? __pfx_kthread+0x10/0x10
[   13.731374]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.731396]  ? calculate_sigpending+0x7b/0xa0
[   13.731419]  ? __pfx_kthread+0x10/0x10
[   13.731440]  ret_from_fork+0x116/0x1d0
[   13.731458]  ? __pfx_kthread+0x10/0x10
[   13.731479]  ret_from_fork_asm+0x1a/0x30
[   13.731511]  </TASK>
[   13.731522] 
[   13.743720] Allocated by task 279:
[   13.744265]  kasan_save_stack+0x45/0x70
[   13.744599]  kasan_save_track+0x18/0x40
[   13.744892]  kasan_save_alloc_info+0x3b/0x50
[   13.745382]  __kasan_kmalloc+0xb7/0xc0
[   13.745592]  __kmalloc_cache_noprof+0x189/0x420
[   13.746040]  kasan_bitops_generic+0x92/0x1c0
[   13.746463]  kunit_try_run_case+0x1a5/0x480
[   13.746763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.747124]  kthread+0x337/0x6f0
[   13.747529]  ret_from_fork+0x116/0x1d0
[   13.747731]  ret_from_fork_asm+0x1a/0x30
[   13.747907] 
[   13.748005] The buggy address belongs to the object at ffff888101745ee0
[   13.748005]  which belongs to the cache kmalloc-16 of size 16
[   13.748540] The buggy address is located 8 bytes inside of
[   13.748540]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.749016] 
[   13.749740] The buggy address belongs to the physical page:
[   13.750229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.750736] flags: 0x200000000000000(node=0|zone=2)
[   13.751091] page_type: f5(slab)
[   13.751498] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.751939] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.752672] page dumped because: kasan: bad access detected
[   13.753042] 
[   13.753464] Memory state around the buggy address:
[   13.753688]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.754002]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.754623] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.755105]                                                           ^
[   13.755612]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.756030]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.756531] ==================================================================
[   13.848828] ==================================================================
[   13.849294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.849689] Read of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.849941] 
[   13.850041] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.850081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.850092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.850126] Call Trace:
[   13.850139]  <TASK>
[   13.850152]  dump_stack_lvl+0x73/0xb0
[   13.850177]  print_report+0xd1/0x650
[   13.850198]  ? __virt_addr_valid+0x1db/0x2d0
[   13.850219]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.850245]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.850265]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.850292]  kasan_report+0x141/0x180
[   13.850313]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.850343]  __asan_report_load8_noabort+0x18/0x20
[   13.850367]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.850393]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.850420]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.850442]  ? trace_hardirqs_on+0x37/0xe0
[   13.850468]  ? kasan_bitops_generic+0x92/0x1c0
[   13.850494]  kasan_bitops_generic+0x121/0x1c0
[   13.850516]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.850540]  ? __pfx_read_tsc+0x10/0x10
[   13.850559]  ? ktime_get_ts64+0x86/0x230
[   13.850581]  kunit_try_run_case+0x1a5/0x480
[   13.850605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.850626]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.850649]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.850671]  ? __kthread_parkme+0x82/0x180
[   13.850690]  ? preempt_count_sub+0x50/0x80
[   13.850712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.850735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.850757]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.850779]  kthread+0x337/0x6f0
[   13.850797]  ? trace_preempt_on+0x20/0xc0
[   13.850822]  ? __pfx_kthread+0x10/0x10
[   13.850842]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.850862]  ? calculate_sigpending+0x7b/0xa0
[   13.850884]  ? __pfx_kthread+0x10/0x10
[   13.850905]  ret_from_fork+0x116/0x1d0
[   13.850923]  ? __pfx_kthread+0x10/0x10
[   13.850942]  ret_from_fork_asm+0x1a/0x30
[   13.850971]  </TASK>
[   13.850981] 
[   13.858595] Allocated by task 279:
[   13.858772]  kasan_save_stack+0x45/0x70
[   13.858969]  kasan_save_track+0x18/0x40
[   13.859169]  kasan_save_alloc_info+0x3b/0x50
[   13.859456]  __kasan_kmalloc+0xb7/0xc0
[   13.859643]  __kmalloc_cache_noprof+0x189/0x420
[   13.859867]  kasan_bitops_generic+0x92/0x1c0
[   13.860077]  kunit_try_run_case+0x1a5/0x480
[   13.860296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.860806]  kthread+0x337/0x6f0
[   13.860968]  ret_from_fork+0x116/0x1d0
[   13.861132]  ret_from_fork_asm+0x1a/0x30
[   13.861298] 
[   13.861462] The buggy address belongs to the object at ffff888101745ee0
[   13.861462]  which belongs to the cache kmalloc-16 of size 16
[   13.861921] The buggy address is located 8 bytes inside of
[   13.861921]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.862448] 
[   13.862524] The buggy address belongs to the physical page:
[   13.862699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.862939] flags: 0x200000000000000(node=0|zone=2)
[   13.863121] page_type: f5(slab)
[   13.863248] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.863570] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.863908] page dumped because: kasan: bad access detected
[   13.864172] 
[   13.864267] Memory state around the buggy address:
[   13.864492]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.865075]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.865371] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.865670]                                                           ^
[   13.865944]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.866243]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.866530] ==================================================================
[   13.629919] ==================================================================
[   13.630298] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.630706] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.631021] 
[   13.631137] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.631178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.631189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.631215] Call Trace:
[   13.631229]  <TASK>
[   13.631378]  dump_stack_lvl+0x73/0xb0
[   13.631410]  print_report+0xd1/0x650
[   13.631433]  ? __virt_addr_valid+0x1db/0x2d0
[   13.631455]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.631481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.631503]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.631531]  kasan_report+0x141/0x180
[   13.631554]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.631589]  kasan_check_range+0x10c/0x1c0
[   13.631612]  __kasan_check_write+0x18/0x20
[   13.631630]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.631658]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.631687]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.631712]  ? trace_hardirqs_on+0x37/0xe0
[   13.631738]  ? kasan_bitops_generic+0x92/0x1c0
[   13.631765]  kasan_bitops_generic+0x121/0x1c0
[   13.631789]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.631814]  ? __pfx_read_tsc+0x10/0x10
[   13.631834]  ? ktime_get_ts64+0x86/0x230
[   13.631857]  kunit_try_run_case+0x1a5/0x480
[   13.631879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.631901]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.631924]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.631945]  ? __kthread_parkme+0x82/0x180
[   13.631965]  ? preempt_count_sub+0x50/0x80
[   13.631987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.632010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.632032]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.632054]  kthread+0x337/0x6f0
[   13.632072]  ? trace_preempt_on+0x20/0xc0
[   13.632118]  ? __pfx_kthread+0x10/0x10
[   13.632139]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.632159]  ? calculate_sigpending+0x7b/0xa0
[   13.632182]  ? __pfx_kthread+0x10/0x10
[   13.632203]  ret_from_fork+0x116/0x1d0
[   13.632221]  ? __pfx_kthread+0x10/0x10
[   13.632241]  ret_from_fork_asm+0x1a/0x30
[   13.632271]  </TASK>
[   13.632281] 
[   13.642836] Allocated by task 279:
[   13.643019]  kasan_save_stack+0x45/0x70
[   13.643573]  kasan_save_track+0x18/0x40
[   13.643765]  kasan_save_alloc_info+0x3b/0x50
[   13.643981]  __kasan_kmalloc+0xb7/0xc0
[   13.644229]  __kmalloc_cache_noprof+0x189/0x420
[   13.644454]  kasan_bitops_generic+0x92/0x1c0
[   13.644633]  kunit_try_run_case+0x1a5/0x480
[   13.644782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.644959]  kthread+0x337/0x6f0
[   13.645139]  ret_from_fork+0x116/0x1d0
[   13.645381]  ret_from_fork_asm+0x1a/0x30
[   13.645994] 
[   13.647801] The buggy address belongs to the object at ffff888101745ee0
[   13.647801]  which belongs to the cache kmalloc-16 of size 16
[   13.648310] The buggy address is located 8 bytes inside of
[   13.648310]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.648667] 
[   13.648741] The buggy address belongs to the physical page:
[   13.648917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.650572] flags: 0x200000000000000(node=0|zone=2)
[   13.650748] page_type: f5(slab)
[   13.650873] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.651122] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.651374] page dumped because: kasan: bad access detected
[   13.651553] 
[   13.651626] Memory state around the buggy address:
[   13.651785]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.652004]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.653299] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.653822]                                                           ^
[   13.654029]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.655386]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.656687] ==================================================================
[   13.831230] ==================================================================
[   13.831529] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.831906] Read of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.832238] 
[   13.832360] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.832400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.832410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.832430] Call Trace:
[   13.832442]  <TASK>
[   13.832455]  dump_stack_lvl+0x73/0xb0
[   13.832481]  print_report+0xd1/0x650
[   13.832502]  ? __virt_addr_valid+0x1db/0x2d0
[   13.832524]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.832550]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.832571]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.832596]  kasan_report+0x141/0x180
[   13.832618]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.832648]  kasan_check_range+0x10c/0x1c0
[   13.832670]  __kasan_check_read+0x15/0x20
[   13.832689]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.832715]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.832742]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.832765]  ? trace_hardirqs_on+0x37/0xe0
[   13.832792]  ? kasan_bitops_generic+0x92/0x1c0
[   13.832817]  kasan_bitops_generic+0x121/0x1c0
[   13.832840]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.832863]  ? __pfx_read_tsc+0x10/0x10
[   13.832884]  ? ktime_get_ts64+0x86/0x230
[   13.832906]  kunit_try_run_case+0x1a5/0x480
[   13.832929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.832950]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.832973]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.832994]  ? __kthread_parkme+0x82/0x180
[   13.833014]  ? preempt_count_sub+0x50/0x80
[   13.833037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.833060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.833082]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.833117]  kthread+0x337/0x6f0
[   13.833137]  ? trace_preempt_on+0x20/0xc0
[   13.833162]  ? __pfx_kthread+0x10/0x10
[   13.833182]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.833202]  ? calculate_sigpending+0x7b/0xa0
[   13.833225]  ? __pfx_kthread+0x10/0x10
[   13.833246]  ret_from_fork+0x116/0x1d0
[   13.833264]  ? __pfx_kthread+0x10/0x10
[   13.833284]  ret_from_fork_asm+0x1a/0x30
[   13.833313]  </TASK>
[   13.833335] 
[   13.841108] Allocated by task 279:
[   13.841285]  kasan_save_stack+0x45/0x70
[   13.841490]  kasan_save_track+0x18/0x40
[   13.841676]  kasan_save_alloc_info+0x3b/0x50
[   13.841828]  __kasan_kmalloc+0xb7/0xc0
[   13.841961]  __kmalloc_cache_noprof+0x189/0x420
[   13.842137]  kasan_bitops_generic+0x92/0x1c0
[   13.842345]  kunit_try_run_case+0x1a5/0x480
[   13.842566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.842818]  kthread+0x337/0x6f0
[   13.842984]  ret_from_fork+0x116/0x1d0
[   13.843159]  ret_from_fork_asm+0x1a/0x30
[   13.843371] 
[   13.843454] The buggy address belongs to the object at ffff888101745ee0
[   13.843454]  which belongs to the cache kmalloc-16 of size 16
[   13.843931] The buggy address is located 8 bytes inside of
[   13.843931]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.844419] 
[   13.844496] The buggy address belongs to the physical page:
[   13.844717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.845015] flags: 0x200000000000000(node=0|zone=2)
[   13.845230] page_type: f5(slab)
[   13.845425] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.845720] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.846026] page dumped because: kasan: bad access detected
[   13.846256] 
[   13.846370] Memory state around the buggy address:
[   13.846565]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.846815]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.847032] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.847331]                                                           ^
[   13.847658]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.848117]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.848376] ==================================================================
[   13.696466] ==================================================================
[   13.697039] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.697741] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.698065] 
[   13.698198] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.698243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.698254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.698276] Call Trace:
[   13.698292]  <TASK>
[   13.698308]  dump_stack_lvl+0x73/0xb0
[   13.698845]  print_report+0xd1/0x650
[   13.698873]  ? __virt_addr_valid+0x1db/0x2d0
[   13.698898]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.698924]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.698947]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.698973]  kasan_report+0x141/0x180
[   13.698994]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.699025]  kasan_check_range+0x10c/0x1c0
[   13.699048]  __kasan_check_write+0x18/0x20
[   13.699067]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.699112]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.699139]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.699230]  ? trace_hardirqs_on+0x37/0xe0
[   13.699259]  ? kasan_bitops_generic+0x92/0x1c0
[   13.699285]  kasan_bitops_generic+0x121/0x1c0
[   13.699309]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.699332]  ? __pfx_read_tsc+0x10/0x10
[   13.699353]  ? ktime_get_ts64+0x86/0x230
[   13.699376]  kunit_try_run_case+0x1a5/0x480
[   13.699399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.699421]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.699444]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.699466]  ? __kthread_parkme+0x82/0x180
[   13.699486]  ? preempt_count_sub+0x50/0x80
[   13.699508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.699532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.699553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.699575]  kthread+0x337/0x6f0
[   13.699596]  ? trace_preempt_on+0x20/0xc0
[   13.699621]  ? __pfx_kthread+0x10/0x10
[   13.699641]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.699662]  ? calculate_sigpending+0x7b/0xa0
[   13.699685]  ? __pfx_kthread+0x10/0x10
[   13.699706]  ret_from_fork+0x116/0x1d0
[   13.699724]  ? __pfx_kthread+0x10/0x10
[   13.699744]  ret_from_fork_asm+0x1a/0x30
[   13.699773]  </TASK>
[   13.699785] 
[   13.715009] Allocated by task 279:
[   13.715478]  kasan_save_stack+0x45/0x70
[   13.715656]  kasan_save_track+0x18/0x40
[   13.715853]  kasan_save_alloc_info+0x3b/0x50
[   13.716054]  __kasan_kmalloc+0xb7/0xc0
[   13.716242]  __kmalloc_cache_noprof+0x189/0x420
[   13.716457]  kasan_bitops_generic+0x92/0x1c0
[   13.716655]  kunit_try_run_case+0x1a5/0x480
[   13.716853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.717093]  kthread+0x337/0x6f0
[   13.718070]  ret_from_fork+0x116/0x1d0
[   13.718526]  ret_from_fork_asm+0x1a/0x30
[   13.718728] 
[   13.718809] The buggy address belongs to the object at ffff888101745ee0
[   13.718809]  which belongs to the cache kmalloc-16 of size 16
[   13.719922] The buggy address is located 8 bytes inside of
[   13.719922]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.720806] 
[   13.720920] The buggy address belongs to the physical page:
[   13.721407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.721890] flags: 0x200000000000000(node=0|zone=2)
[   13.722133] page_type: f5(slab)
[   13.722578] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.722987] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.723713] page dumped because: kasan: bad access detected
[   13.724079] 
[   13.724406] Memory state around the buggy address:
[   13.724647]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.725262]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.725673] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.726217]                                                           ^
[   13.726693]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.727001]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.727347] ==================================================================