Hay
Date
July 10, 2025, 6:10 p.m.

Environment
qemu-x86_64

[   14.789842] ==================================================================
[   14.790180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.790586] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.791079] 
[   14.791278] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.791322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.791334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.791354] Call Trace:
[   14.791368]  <TASK>
[   14.791383]  dump_stack_lvl+0x73/0xb0
[   14.791411]  print_report+0xd1/0x650
[   14.791432]  ? __virt_addr_valid+0x1db/0x2d0
[   14.791455]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.791484]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.791508]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.791537]  kasan_report+0x141/0x180
[   14.791559]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.791592]  kasan_check_range+0x10c/0x1c0
[   14.791616]  __kasan_check_write+0x18/0x20
[   14.791634]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.791664]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.791695]  ? ret_from_fork_asm+0x1a/0x30
[   14.791717]  ? kthread+0x337/0x6f0
[   14.791739]  kasan_bitops_generic+0x121/0x1c0
[   14.791763]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.791789]  ? __pfx_read_tsc+0x10/0x10
[   14.791809]  ? ktime_get_ts64+0x86/0x230
[   14.791833]  kunit_try_run_case+0x1a5/0x480
[   14.791857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.791880]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.791905]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.791929]  ? __kthread_parkme+0x82/0x180
[   14.791955]  ? preempt_count_sub+0x50/0x80
[   14.791979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.792002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.792027]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.792065]  kthread+0x337/0x6f0
[   14.792084]  ? trace_preempt_on+0x20/0xc0
[   14.792106]  ? __pfx_kthread+0x10/0x10
[   14.792127]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.792148]  ? calculate_sigpending+0x7b/0xa0
[   14.792171]  ? __pfx_kthread+0x10/0x10
[   14.792193]  ret_from_fork+0x116/0x1d0
[   14.792220]  ? __pfx_kthread+0x10/0x10
[   14.792240]  ret_from_fork_asm+0x1a/0x30
[   14.792270]  </TASK>
[   14.792279] 
[   14.800571] Allocated by task 278:
[   14.800703]  kasan_save_stack+0x45/0x70
[   14.800843]  kasan_save_track+0x18/0x40
[   14.800978]  kasan_save_alloc_info+0x3b/0x50
[   14.801136]  __kasan_kmalloc+0xb7/0xc0
[   14.801267]  __kmalloc_cache_noprof+0x189/0x420
[   14.801583]  kasan_bitops_generic+0x92/0x1c0
[   14.801793]  kunit_try_run_case+0x1a5/0x480
[   14.801996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.802262]  kthread+0x337/0x6f0
[   14.802434]  ret_from_fork+0x116/0x1d0
[   14.802625]  ret_from_fork_asm+0x1a/0x30
[   14.802784] 
[   14.802854] The buggy address belongs to the object at ffff888101debea0
[   14.802854]  which belongs to the cache kmalloc-16 of size 16
[   14.803216] The buggy address is located 8 bytes inside of
[   14.803216]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.803999] 
[   14.804114] The buggy address belongs to the physical page:
[   14.804363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.804709] flags: 0x200000000000000(node=0|zone=2)
[   14.804943] page_type: f5(slab)
[   14.805100] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.805328] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.805551] page dumped because: kasan: bad access detected
[   14.805721] 
[   14.805790] Memory state around the buggy address:
[   14.805972]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.806311]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.806632] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.806953]                                   ^
[   14.807182]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.807563]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.807772] ==================================================================
[   14.828999] ==================================================================
[   14.830098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.831333] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.831565] 
[   14.831647] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.831688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.831702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.831722] Call Trace:
[   14.831738]  <TASK>
[   14.831753]  dump_stack_lvl+0x73/0xb0
[   14.831783]  print_report+0xd1/0x650
[   14.831806]  ? __virt_addr_valid+0x1db/0x2d0
[   14.831828]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.831857]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.831881]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.831910]  kasan_report+0x141/0x180
[   14.832577]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.832614]  kasan_check_range+0x10c/0x1c0
[   14.832643]  __kasan_check_write+0x18/0x20
[   14.832664]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.832694]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.832726]  ? ret_from_fork_asm+0x1a/0x30
[   14.832750]  ? kthread+0x337/0x6f0
[   14.832773]  kasan_bitops_generic+0x121/0x1c0
[   14.832798]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.832826]  ? __pfx_read_tsc+0x10/0x10
[   14.832848]  ? ktime_get_ts64+0x86/0x230
[   14.832871]  kunit_try_run_case+0x1a5/0x480
[   14.832895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.832944]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.832970]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.832994]  ? __kthread_parkme+0x82/0x180
[   14.833014]  ? preempt_count_sub+0x50/0x80
[   14.833050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.833074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.833098]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.833124]  kthread+0x337/0x6f0
[   14.833142]  ? trace_preempt_on+0x20/0xc0
[   14.833166]  ? __pfx_kthread+0x10/0x10
[   14.833186]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.833208]  ? calculate_sigpending+0x7b/0xa0
[   14.833232]  ? __pfx_kthread+0x10/0x10
[   14.833252]  ret_from_fork+0x116/0x1d0
[   14.833271]  ? __pfx_kthread+0x10/0x10
[   14.833291]  ret_from_fork_asm+0x1a/0x30
[   14.833321]  </TASK>
[   14.833331] 
[   14.843862] Allocated by task 278:
[   14.843998]  kasan_save_stack+0x45/0x70
[   14.844629]  kasan_save_track+0x18/0x40
[   14.844844]  kasan_save_alloc_info+0x3b/0x50
[   14.845186]  __kasan_kmalloc+0xb7/0xc0
[   14.845519]  __kmalloc_cache_noprof+0x189/0x420
[   14.845723]  kasan_bitops_generic+0x92/0x1c0
[   14.845916]  kunit_try_run_case+0x1a5/0x480
[   14.846396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.846624]  kthread+0x337/0x6f0
[   14.846774]  ret_from_fork+0x116/0x1d0
[   14.847213]  ret_from_fork_asm+0x1a/0x30
[   14.847471] 
[   14.847722] The buggy address belongs to the object at ffff888101debea0
[   14.847722]  which belongs to the cache kmalloc-16 of size 16
[   14.848779] The buggy address is located 8 bytes inside of
[   14.848779]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.849632] 
[   14.849879] The buggy address belongs to the physical page:
[   14.850291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.850625] flags: 0x200000000000000(node=0|zone=2)
[   14.850846] page_type: f5(slab)
[   14.851303] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.851839] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.852373] page dumped because: kasan: bad access detected
[   14.852608] 
[   14.852698] Memory state around the buggy address:
[   14.852902]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.853496]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.853803] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.854461]                                   ^
[   14.854749]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.855391]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.855694] ==================================================================
[   14.772402] ==================================================================
[   14.772641] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.772925] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.773279] 
[   14.773363] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.773404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.773416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.773436] Call Trace:
[   14.773451]  <TASK>
[   14.773464]  dump_stack_lvl+0x73/0xb0
[   14.773492]  print_report+0xd1/0x650
[   14.773514]  ? __virt_addr_valid+0x1db/0x2d0
[   14.773537]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.773567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.773591]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.773619]  kasan_report+0x141/0x180
[   14.773641]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.773674]  kasan_check_range+0x10c/0x1c0
[   14.773697]  __kasan_check_write+0x18/0x20
[   14.773717]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.773746]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.773777]  ? ret_from_fork_asm+0x1a/0x30
[   14.773799]  ? kthread+0x337/0x6f0
[   14.773822]  kasan_bitops_generic+0x121/0x1c0
[   14.773846]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.773871]  ? __pfx_read_tsc+0x10/0x10
[   14.773892]  ? ktime_get_ts64+0x86/0x230
[   14.773916]  kunit_try_run_case+0x1a5/0x480
[   14.773954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.773977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.774001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.774024]  ? __kthread_parkme+0x82/0x180
[   14.774054]  ? preempt_count_sub+0x50/0x80
[   14.774078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.774102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.774127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.774152]  kthread+0x337/0x6f0
[   14.774170]  ? trace_preempt_on+0x20/0xc0
[   14.774194]  ? __pfx_kthread+0x10/0x10
[   14.774214]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.774235]  ? calculate_sigpending+0x7b/0xa0
[   14.774259]  ? __pfx_kthread+0x10/0x10
[   14.774279]  ret_from_fork+0x116/0x1d0
[   14.774298]  ? __pfx_kthread+0x10/0x10
[   14.774319]  ret_from_fork_asm+0x1a/0x30
[   14.774349]  </TASK>
[   14.774359] 
[   14.781899] Allocated by task 278:
[   14.782078]  kasan_save_stack+0x45/0x70
[   14.782282]  kasan_save_track+0x18/0x40
[   14.782470]  kasan_save_alloc_info+0x3b/0x50
[   14.782633]  __kasan_kmalloc+0xb7/0xc0
[   14.782765]  __kmalloc_cache_noprof+0x189/0x420
[   14.782919]  kasan_bitops_generic+0x92/0x1c0
[   14.783078]  kunit_try_run_case+0x1a5/0x480
[   14.783431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.783685]  kthread+0x337/0x6f0
[   14.783852]  ret_from_fork+0x116/0x1d0
[   14.784055]  ret_from_fork_asm+0x1a/0x30
[   14.784277] 
[   14.784373] The buggy address belongs to the object at ffff888101debea0
[   14.784373]  which belongs to the cache kmalloc-16 of size 16
[   14.784867] The buggy address is located 8 bytes inside of
[   14.784867]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.785289] 
[   14.785382] The buggy address belongs to the physical page:
[   14.785633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.786017] flags: 0x200000000000000(node=0|zone=2)
[   14.786224] page_type: f5(slab)
[   14.786366] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.786671] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.787005] page dumped because: kasan: bad access detected
[   14.787200] 
[   14.787268] Memory state around the buggy address:
[   14.787420]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.787635]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.787899] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.788509]                                   ^
[   14.788946]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.789197]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.789416] ==================================================================
[   14.684342] ==================================================================
[   14.684700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.685138] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.685878] 
[   14.686117] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.686167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.686179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.686199] Call Trace:
[   14.686214]  <TASK>
[   14.686227]  dump_stack_lvl+0x73/0xb0
[   14.686257]  print_report+0xd1/0x650
[   14.686279]  ? __virt_addr_valid+0x1db/0x2d0
[   14.686303]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.686333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.686356]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.686385]  kasan_report+0x141/0x180
[   14.686407]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.686439]  kasan_check_range+0x10c/0x1c0
[   14.686463]  __kasan_check_write+0x18/0x20
[   14.686483]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.686512]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.686543]  ? ret_from_fork_asm+0x1a/0x30
[   14.686565]  ? kthread+0x337/0x6f0
[   14.686587]  kasan_bitops_generic+0x121/0x1c0
[   14.686611]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.686636]  ? __pfx_read_tsc+0x10/0x10
[   14.686657]  ? ktime_get_ts64+0x86/0x230
[   14.686681]  kunit_try_run_case+0x1a5/0x480
[   14.686705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.686728]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.686751]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.686775]  ? __kthread_parkme+0x82/0x180
[   14.686794]  ? preempt_count_sub+0x50/0x80
[   14.686818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.686842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.686866]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.686891]  kthread+0x337/0x6f0
[   14.686910]  ? trace_preempt_on+0x20/0xc0
[   14.686965]  ? __pfx_kthread+0x10/0x10
[   14.686986]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.687008]  ? calculate_sigpending+0x7b/0xa0
[   14.687047]  ? __pfx_kthread+0x10/0x10
[   14.687069]  ret_from_fork+0x116/0x1d0
[   14.687088]  ? __pfx_kthread+0x10/0x10
[   14.687109]  ret_from_fork_asm+0x1a/0x30
[   14.687139]  </TASK>
[   14.687149] 
[   14.701459] Allocated by task 278:
[   14.701798]  kasan_save_stack+0x45/0x70
[   14.702236]  kasan_save_track+0x18/0x40
[   14.702599]  kasan_save_alloc_info+0x3b/0x50
[   14.703005]  __kasan_kmalloc+0xb7/0xc0
[   14.703359]  __kmalloc_cache_noprof+0x189/0x420
[   14.703780]  kasan_bitops_generic+0x92/0x1c0
[   14.704203]  kunit_try_run_case+0x1a5/0x480
[   14.704348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.704517]  kthread+0x337/0x6f0
[   14.704633]  ret_from_fork+0x116/0x1d0
[   14.704762]  ret_from_fork_asm+0x1a/0x30
[   14.704897] 
[   14.705057] The buggy address belongs to the object at ffff888101debea0
[   14.705057]  which belongs to the cache kmalloc-16 of size 16
[   14.706160] The buggy address is located 8 bytes inside of
[   14.706160]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.707263] 
[   14.707438] The buggy address belongs to the physical page:
[   14.707954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.708640] flags: 0x200000000000000(node=0|zone=2)
[   14.709116] page_type: f5(slab)
[   14.709427] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.710091] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.710321] page dumped because: kasan: bad access detected
[   14.710485] 
[   14.710552] Memory state around the buggy address:
[   14.710701]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.710908]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.711541] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.712174]                                   ^
[   14.712578]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.713231]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.713959] ==================================================================
[   14.808281] ==================================================================
[   14.808613] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.809026] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.809378] 
[   14.809460] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.809501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.809512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.809531] Call Trace:
[   14.809545]  <TASK>
[   14.809559]  dump_stack_lvl+0x73/0xb0
[   14.809722]  print_report+0xd1/0x650
[   14.809750]  ? __virt_addr_valid+0x1db/0x2d0
[   14.809773]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.809802]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.809826]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.809856]  kasan_report+0x141/0x180
[   14.809878]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.809911]  kasan_check_range+0x10c/0x1c0
[   14.809949]  __kasan_check_write+0x18/0x20
[   14.809969]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.809999]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.810043]  ? ret_from_fork_asm+0x1a/0x30
[   14.810066]  ? kthread+0x337/0x6f0
[   14.810089]  kasan_bitops_generic+0x121/0x1c0
[   14.810114]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.810139]  ? __pfx_read_tsc+0x10/0x10
[   14.810160]  ? ktime_get_ts64+0x86/0x230
[   14.810183]  kunit_try_run_case+0x1a5/0x480
[   14.810207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.810231]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.810255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.810279]  ? __kthread_parkme+0x82/0x180
[   14.810299]  ? preempt_count_sub+0x50/0x80
[   14.810322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.810347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.810372]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.810397]  kthread+0x337/0x6f0
[   14.810415]  ? trace_preempt_on+0x20/0xc0
[   14.810437]  ? __pfx_kthread+0x10/0x10
[   14.810457]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.810480]  ? calculate_sigpending+0x7b/0xa0
[   14.810504]  ? __pfx_kthread+0x10/0x10
[   14.810525]  ret_from_fork+0x116/0x1d0
[   14.810544]  ? __pfx_kthread+0x10/0x10
[   14.810564]  ret_from_fork_asm+0x1a/0x30
[   14.810594]  </TASK>
[   14.810605] 
[   14.818534] Allocated by task 278:
[   14.818664]  kasan_save_stack+0x45/0x70
[   14.818806]  kasan_save_track+0x18/0x40
[   14.818941]  kasan_save_alloc_info+0x3b/0x50
[   14.819165]  __kasan_kmalloc+0xb7/0xc0
[   14.819421]  __kmalloc_cache_noprof+0x189/0x420
[   14.819639]  kasan_bitops_generic+0x92/0x1c0
[   14.820021]  kunit_try_run_case+0x1a5/0x480
[   14.820241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.820443]  kthread+0x337/0x6f0
[   14.820613]  ret_from_fork+0x116/0x1d0
[   14.820772]  ret_from_fork_asm+0x1a/0x30
[   14.820984] 
[   14.821069] The buggy address belongs to the object at ffff888101debea0
[   14.821069]  which belongs to the cache kmalloc-16 of size 16
[   14.821523] The buggy address is located 8 bytes inside of
[   14.821523]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.821978] 
[   14.822102] The buggy address belongs to the physical page:
[   14.822327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.822636] flags: 0x200000000000000(node=0|zone=2)
[   14.822813] page_type: f5(slab)
[   14.823007] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.823307] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.823557] page dumped because: kasan: bad access detected
[   14.823726] 
[   14.823793] Memory state around the buggy address:
[   14.823948]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.824173]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.824386] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.824709]                                   ^
[   14.824918]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.825248]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.825567] ==================================================================
[   14.743223] ==================================================================
[   14.743478] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.743754] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.744472] 
[   14.744648] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.744689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.744700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.744720] Call Trace:
[   14.744736]  <TASK>
[   14.744750]  dump_stack_lvl+0x73/0xb0
[   14.744779]  print_report+0xd1/0x650
[   14.744800]  ? __virt_addr_valid+0x1db/0x2d0
[   14.744822]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.744851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.744874]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.744903]  kasan_report+0x141/0x180
[   14.744925]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.744958]  kasan_check_range+0x10c/0x1c0
[   14.744981]  __kasan_check_write+0x18/0x20
[   14.745000]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.745042]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.745073]  ? ret_from_fork_asm+0x1a/0x30
[   14.745095]  ? kthread+0x337/0x6f0
[   14.745117]  kasan_bitops_generic+0x121/0x1c0
[   14.745142]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.745180]  ? __pfx_read_tsc+0x10/0x10
[   14.745201]  ? ktime_get_ts64+0x86/0x230
[   14.745225]  kunit_try_run_case+0x1a5/0x480
[   14.745248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.745271]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.745295]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.745319]  ? __kthread_parkme+0x82/0x180
[   14.745339]  ? preempt_count_sub+0x50/0x80
[   14.745362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.745386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.745411]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.745436]  kthread+0x337/0x6f0
[   14.745454]  ? trace_preempt_on+0x20/0xc0
[   14.745477]  ? __pfx_kthread+0x10/0x10
[   14.745496]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.745519]  ? calculate_sigpending+0x7b/0xa0
[   14.745542]  ? __pfx_kthread+0x10/0x10
[   14.745563]  ret_from_fork+0x116/0x1d0
[   14.745582]  ? __pfx_kthread+0x10/0x10
[   14.745602]  ret_from_fork_asm+0x1a/0x30
[   14.745632]  </TASK>
[   14.745641] 
[   14.758487] Allocated by task 278:
[   14.758792]  kasan_save_stack+0x45/0x70
[   14.759186]  kasan_save_track+0x18/0x40
[   14.759554]  kasan_save_alloc_info+0x3b/0x50
[   14.759937]  __kasan_kmalloc+0xb7/0xc0
[   14.760291]  __kmalloc_cache_noprof+0x189/0x420
[   14.760697]  kasan_bitops_generic+0x92/0x1c0
[   14.761113]  kunit_try_run_case+0x1a5/0x480
[   14.761554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.762058]  kthread+0x337/0x6f0
[   14.762438]  ret_from_fork+0x116/0x1d0
[   14.762701]  ret_from_fork_asm+0x1a/0x30
[   14.763108] 
[   14.763256] The buggy address belongs to the object at ffff888101debea0
[   14.763256]  which belongs to the cache kmalloc-16 of size 16
[   14.763607] The buggy address is located 8 bytes inside of
[   14.763607]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.763997] 
[   14.764172] The buggy address belongs to the physical page:
[   14.764631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.765455] flags: 0x200000000000000(node=0|zone=2)
[   14.765880] page_type: f5(slab)
[   14.766192] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.766824] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.767577] page dumped because: kasan: bad access detected
[   14.768083] 
[   14.768257] Memory state around the buggy address:
[   14.768508]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.768722]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.768942] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.769543]                                   ^
[   14.769936]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.770764]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.771584] ==================================================================
[   14.884018] ==================================================================
[   14.884341] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.884705] Read of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.885356] 
[   14.885580] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.885629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.885737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.885762] Call Trace:
[   14.885779]  <TASK>
[   14.885795]  dump_stack_lvl+0x73/0xb0
[   14.885824]  print_report+0xd1/0x650
[   14.885847]  ? __virt_addr_valid+0x1db/0x2d0
[   14.885870]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.885932]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.885956]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.885986]  kasan_report+0x141/0x180
[   14.886008]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.886051]  __asan_report_load8_noabort+0x18/0x20
[   14.886078]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.886109]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.886141]  ? ret_from_fork_asm+0x1a/0x30
[   14.886163]  ? kthread+0x337/0x6f0
[   14.886187]  kasan_bitops_generic+0x121/0x1c0
[   14.886211]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.886237]  ? __pfx_read_tsc+0x10/0x10
[   14.886259]  ? ktime_get_ts64+0x86/0x230
[   14.886282]  kunit_try_run_case+0x1a5/0x480
[   14.886308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.886331]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.886355]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.886380]  ? __kthread_parkme+0x82/0x180
[   14.886400]  ? preempt_count_sub+0x50/0x80
[   14.886423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.886447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.886472]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.886497]  kthread+0x337/0x6f0
[   14.886516]  ? trace_preempt_on+0x20/0xc0
[   14.886538]  ? __pfx_kthread+0x10/0x10
[   14.886559]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.886580]  ? calculate_sigpending+0x7b/0xa0
[   14.886604]  ? __pfx_kthread+0x10/0x10
[   14.886625]  ret_from_fork+0x116/0x1d0
[   14.886643]  ? __pfx_kthread+0x10/0x10
[   14.886664]  ret_from_fork_asm+0x1a/0x30
[   14.886694]  </TASK>
[   14.886705] 
[   14.894247] Allocated by task 278:
[   14.894413]  kasan_save_stack+0x45/0x70
[   14.894605]  kasan_save_track+0x18/0x40
[   14.894743]  kasan_save_alloc_info+0x3b/0x50
[   14.894958]  __kasan_kmalloc+0xb7/0xc0
[   14.895158]  __kmalloc_cache_noprof+0x189/0x420
[   14.895341]  kasan_bitops_generic+0x92/0x1c0
[   14.895493]  kunit_try_run_case+0x1a5/0x480
[   14.895692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.895949]  kthread+0x337/0x6f0
[   14.896100]  ret_from_fork+0x116/0x1d0
[   14.896234]  ret_from_fork_asm+0x1a/0x30
[   14.896374] 
[   14.896444] The buggy address belongs to the object at ffff888101debea0
[   14.896444]  which belongs to the cache kmalloc-16 of size 16
[   14.896886] The buggy address is located 8 bytes inside of
[   14.896886]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.897409] 
[   14.897503] The buggy address belongs to the physical page:
[   14.897761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.898054] flags: 0x200000000000000(node=0|zone=2)
[   14.898217] page_type: f5(slab)
[   14.898336] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.898565] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.899305] page dumped because: kasan: bad access detected
[   14.899547] 
[   14.899634] Memory state around the buggy address:
[   14.899838]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.900104]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.900319] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.900709]                                   ^
[   14.901160]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.901472]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.901781] ==================================================================
[   14.715081] ==================================================================
[   14.715766] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.716699] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.717311] 
[   14.717398] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.717458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.717469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.717489] Call Trace:
[   14.717501]  <TASK>
[   14.717527]  dump_stack_lvl+0x73/0xb0
[   14.717555]  print_report+0xd1/0x650
[   14.717577]  ? __virt_addr_valid+0x1db/0x2d0
[   14.717600]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.717629]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.717652]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.717681]  kasan_report+0x141/0x180
[   14.717703]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.717745]  kasan_check_range+0x10c/0x1c0
[   14.717768]  __kasan_check_write+0x18/0x20
[   14.717788]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.717827]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.717858]  ? ret_from_fork_asm+0x1a/0x30
[   14.717880]  ? kthread+0x337/0x6f0
[   14.717912]  kasan_bitops_generic+0x121/0x1c0
[   14.717936]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.717961]  ? __pfx_read_tsc+0x10/0x10
[   14.718005]  ? ktime_get_ts64+0x86/0x230
[   14.718037]  kunit_try_run_case+0x1a5/0x480
[   14.718061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.718084]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.718109]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.718133]  ? __kthread_parkme+0x82/0x180
[   14.718153]  ? preempt_count_sub+0x50/0x80
[   14.718177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.718202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.718227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.718252]  kthread+0x337/0x6f0
[   14.718271]  ? trace_preempt_on+0x20/0xc0
[   14.718294]  ? __pfx_kthread+0x10/0x10
[   14.718314]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.718337]  ? calculate_sigpending+0x7b/0xa0
[   14.718362]  ? __pfx_kthread+0x10/0x10
[   14.718383]  ret_from_fork+0x116/0x1d0
[   14.718402]  ? __pfx_kthread+0x10/0x10
[   14.718422]  ret_from_fork_asm+0x1a/0x30
[   14.718452]  </TASK>
[   14.718463] 
[   14.729986] Allocated by task 278:
[   14.730344]  kasan_save_stack+0x45/0x70
[   14.730718]  kasan_save_track+0x18/0x40
[   14.731139]  kasan_save_alloc_info+0x3b/0x50
[   14.731542]  __kasan_kmalloc+0xb7/0xc0
[   14.731903]  __kmalloc_cache_noprof+0x189/0x420
[   14.732266]  kasan_bitops_generic+0x92/0x1c0
[   14.732417]  kunit_try_run_case+0x1a5/0x480
[   14.732562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.732736]  kthread+0x337/0x6f0
[   14.732856]  ret_from_fork+0x116/0x1d0
[   14.733141]  ret_from_fork_asm+0x1a/0x30
[   14.733503] 
[   14.733671] The buggy address belongs to the object at ffff888101debea0
[   14.733671]  which belongs to the cache kmalloc-16 of size 16
[   14.734760] The buggy address is located 8 bytes inside of
[   14.734760]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.735814] 
[   14.736022] The buggy address belongs to the physical page:
[   14.736543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.737285] flags: 0x200000000000000(node=0|zone=2)
[   14.737627] page_type: f5(slab)
[   14.737747] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.738007] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.738418] page dumped because: kasan: bad access detected
[   14.738589] 
[   14.738657] Memory state around the buggy address:
[   14.738812]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.739227]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.739841] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.740462]                                   ^
[   14.740862]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.741570]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.742254] ==================================================================
[   14.856292] ==================================================================
[   14.856611] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.857672] Read of size 8 at addr ffff888101debea8 by task kunit_try_catch/278
[   14.858155] 
[   14.858366] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.858412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.858425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.858539] Call Trace:
[   14.858558]  <TASK>
[   14.858573]  dump_stack_lvl+0x73/0xb0
[   14.858604]  print_report+0xd1/0x650
[   14.858627]  ? __virt_addr_valid+0x1db/0x2d0
[   14.858651]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.858715]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.858739]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.858768]  kasan_report+0x141/0x180
[   14.858790]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.858824]  kasan_check_range+0x10c/0x1c0
[   14.858848]  __kasan_check_read+0x15/0x20
[   14.858866]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.858896]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.858927]  ? ret_from_fork_asm+0x1a/0x30
[   14.858949]  ? kthread+0x337/0x6f0
[   14.858972]  kasan_bitops_generic+0x121/0x1c0
[   14.858997]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.859022]  ? __pfx_read_tsc+0x10/0x10
[   14.859054]  ? ktime_get_ts64+0x86/0x230
[   14.859077]  kunit_try_run_case+0x1a5/0x480
[   14.859101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.859124]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.859147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.859171]  ? __kthread_parkme+0x82/0x180
[   14.859192]  ? preempt_count_sub+0x50/0x80
[   14.859215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.859240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.859264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.859290]  kthread+0x337/0x6f0
[   14.859308]  ? trace_preempt_on+0x20/0xc0
[   14.859332]  ? __pfx_kthread+0x10/0x10
[   14.859352]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.859373]  ? calculate_sigpending+0x7b/0xa0
[   14.859397]  ? __pfx_kthread+0x10/0x10
[   14.859418]  ret_from_fork+0x116/0x1d0
[   14.859438]  ? __pfx_kthread+0x10/0x10
[   14.859458]  ret_from_fork_asm+0x1a/0x30
[   14.859490]  </TASK>
[   14.859502] 
[   14.871163] Allocated by task 278:
[   14.871341]  kasan_save_stack+0x45/0x70
[   14.871536]  kasan_save_track+0x18/0x40
[   14.871718]  kasan_save_alloc_info+0x3b/0x50
[   14.871911]  __kasan_kmalloc+0xb7/0xc0
[   14.872357]  __kmalloc_cache_noprof+0x189/0x420
[   14.872721]  kasan_bitops_generic+0x92/0x1c0
[   14.873137]  kunit_try_run_case+0x1a5/0x480
[   14.873468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.873713]  kthread+0x337/0x6f0
[   14.873865]  ret_from_fork+0x116/0x1d0
[   14.874290]  ret_from_fork_asm+0x1a/0x30
[   14.874602] 
[   14.874816] The buggy address belongs to the object at ffff888101debea0
[   14.874816]  which belongs to the cache kmalloc-16 of size 16
[   14.875571] The buggy address is located 8 bytes inside of
[   14.875571]  allocated 9-byte region [ffff888101debea0, ffff888101debea9)
[   14.876387] 
[   14.876483] The buggy address belongs to the physical page:
[   14.876894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb
[   14.877436] flags: 0x200000000000000(node=0|zone=2)
[   14.877784] page_type: f5(slab)
[   14.878125] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.878526] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.878833] page dumped because: kasan: bad access detected
[   14.879298] 
[   14.879520] Memory state around the buggy address:
[   14.879854]  ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.880493]  ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.880786] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.881391]                                   ^
[   14.881666]  ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.882344]  ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.882778] ==================================================================