Hay
Date
July 20, 2025, 8:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.508488] ==================================================================
[   17.508552] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   17.508607] Write of size 8 at addr fff00000c43b3ca8 by task kunit_try_catch/262
[   17.508679] 
[   17.508714] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.508800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.508850] Hardware name: linux,dummy-virt (DT)
[   17.509269] Call trace:
[   17.509304]  show_stack+0x20/0x38 (C)
[   17.509672]  dump_stack_lvl+0x8c/0xd0
[   17.509773]  print_report+0x118/0x5d0
[   17.509834]  kasan_report+0xdc/0x128
[   17.510183]  kasan_check_range+0x100/0x1a8
[   17.510317]  __kasan_check_write+0x20/0x30
[   17.510385]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   17.510450]  kasan_bitops_generic+0x110/0x1c8
[   17.510502]  kunit_try_run_case+0x170/0x3f0
[   17.510552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.510606]  kthread+0x328/0x630
[   17.510651]  ret_from_fork+0x10/0x20
[   17.510713] 
[   17.510744] Allocated by task 262:
[   17.510784]  kasan_save_stack+0x3c/0x68
[   17.510847]  kasan_save_track+0x20/0x40
[   17.510894]  kasan_save_alloc_info+0x40/0x58
[   17.510947]  __kasan_kmalloc+0xd4/0xd8
[   17.510988]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.511040]  kasan_bitops_generic+0xa0/0x1c8
[   17.511088]  kunit_try_run_case+0x170/0x3f0
[   17.511144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.511200]  kthread+0x328/0x630
[   17.511244]  ret_from_fork+0x10/0x20
[   17.511283] 
[   17.511307] The buggy address belongs to the object at fff00000c43b3ca0
[   17.511307]  which belongs to the cache kmalloc-16 of size 16
[   17.511377] The buggy address is located 8 bytes inside of
[   17.511377]  allocated 9-byte region [fff00000c43b3ca0, fff00000c43b3ca9)
[   17.511441] 
[   17.511466] The buggy address belongs to the physical page:
[   17.511508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043b3
[   17.511572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.511622] page_type: f5(slab)
[   17.511663] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.511724] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.511768] page dumped because: kasan: bad access detected
[   17.511804] 
[   17.511841] Memory state around the buggy address:
[   17.511884]  fff00000c43b3b80: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   17.511930]  fff00000c43b3c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.511981] >fff00000c43b3c80: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.512028]                                   ^
[   17.512072]  fff00000c43b3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.512113]  fff00000c43b3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.512154] ==================================================================
[   17.516131] ==================================================================
[   17.516229] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   17.516554] Read of size 8 at addr fff00000c43b3ca8 by task kunit_try_catch/262
[   17.516655] 
[   17.516689] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.516773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.517060] Hardware name: linux,dummy-virt (DT)
[   17.517141] Call trace:
[   17.517271]  show_stack+0x20/0x38 (C)
[   17.517348]  dump_stack_lvl+0x8c/0xd0
[   17.517661]  print_report+0x118/0x5d0
[   17.517755]  kasan_report+0xdc/0x128
[   17.517880]  __asan_report_load8_noabort+0x20/0x30
[   17.517978]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   17.518328]  kasan_bitops_generic+0x110/0x1c8
[   17.518452]  kunit_try_run_case+0x170/0x3f0
[   17.518543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.518703]  kthread+0x328/0x630
[   17.518749]  ret_from_fork+0x10/0x20
[   17.519064] 
[   17.519156] Allocated by task 262:
[   17.519465]  kasan_save_stack+0x3c/0x68
[   17.519547]  kasan_save_track+0x20/0x40
[   17.519610]  kasan_save_alloc_info+0x40/0x58
[   17.519762]  __kasan_kmalloc+0xd4/0xd8
[   17.519805]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.520043]  kasan_bitops_generic+0xa0/0x1c8
[   17.520218]  kunit_try_run_case+0x170/0x3f0
[   17.520466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.520623]  kthread+0x328/0x630
[   17.520730]  ret_from_fork+0x10/0x20
[   17.520808] 
[   17.520946] The buggy address belongs to the object at fff00000c43b3ca0
[   17.520946]  which belongs to the cache kmalloc-16 of size 16
[   17.521013] The buggy address is located 8 bytes inside of
[   17.521013]  allocated 9-byte region [fff00000c43b3ca0, fff00000c43b3ca9)
[   17.521305] 
[   17.521369] The buggy address belongs to the physical page:
[   17.521736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043b3
[   17.521846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.521958] page_type: f5(slab)
[   17.522097] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.522209] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.522316] page dumped because: kasan: bad access detected
[   17.522366] 
[   17.522395] Memory state around the buggy address:
[   17.522756]  fff00000c43b3c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.524580] ==================================================================

[   14.992890] ==================================================================
[   14.994146] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.995054] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   14.995903] 
[   14.996091] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.996141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.996153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.996176] Call Trace:
[   14.996189]  <TASK>
[   14.996208]  dump_stack_lvl+0x73/0xb0
[   14.996241]  print_report+0xd1/0x610
[   14.996265]  ? __virt_addr_valid+0x1db/0x2d0
[   14.996289]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.996315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.996338]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.996364]  kasan_report+0x141/0x180
[   14.996386]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.996418]  kasan_check_range+0x10c/0x1c0
[   14.996441]  __kasan_check_write+0x18/0x20
[   14.996460]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.996519]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.996545]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.996570]  ? trace_hardirqs_on+0x37/0xe0
[   14.996593]  ? kasan_bitops_generic+0x92/0x1c0
[   14.996620]  kasan_bitops_generic+0x116/0x1c0
[   14.996643]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.996669]  ? __pfx_read_tsc+0x10/0x10
[   14.996690]  ? ktime_get_ts64+0x86/0x230
[   14.996715]  kunit_try_run_case+0x1a5/0x480
[   14.996740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.996770]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.996795]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.996818]  ? __kthread_parkme+0x82/0x180
[   14.996839]  ? preempt_count_sub+0x50/0x80
[   14.996863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.996887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.996910]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.996934]  kthread+0x337/0x6f0
[   14.996953]  ? trace_preempt_on+0x20/0xc0
[   14.996975]  ? __pfx_kthread+0x10/0x10
[   14.996995]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.997016]  ? calculate_sigpending+0x7b/0xa0
[   14.997039]  ? __pfx_kthread+0x10/0x10
[   14.997061]  ret_from_fork+0x116/0x1d0
[   14.997079]  ? __pfx_kthread+0x10/0x10
[   14.997100]  ret_from_fork_asm+0x1a/0x30
[   14.997130]  </TASK>
[   14.997142] 
[   15.009961] Allocated by task 279:
[   15.010376]  kasan_save_stack+0x45/0x70
[   15.010771]  kasan_save_track+0x18/0x40
[   15.011155]  kasan_save_alloc_info+0x3b/0x50
[   15.011501]  __kasan_kmalloc+0xb7/0xc0
[   15.011635]  __kmalloc_cache_noprof+0x189/0x420
[   15.011829]  kasan_bitops_generic+0x92/0x1c0
[   15.012207]  kunit_try_run_case+0x1a5/0x480
[   15.012596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.013224]  kthread+0x337/0x6f0
[   15.013552]  ret_from_fork+0x116/0x1d0
[   15.013957]  ret_from_fork_asm+0x1a/0x30
[   15.014264] 
[   15.014337] The buggy address belongs to the object at ffff888102641aa0
[   15.014337]  which belongs to the cache kmalloc-16 of size 16
[   15.014708] The buggy address is located 8 bytes inside of
[   15.014708]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.015194] 
[   15.015357] The buggy address belongs to the physical page:
[   15.015856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.016555] flags: 0x200000000000000(node=0|zone=2)
[   15.017011] page_type: f5(slab)
[   15.017312] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.018030] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.018310] page dumped because: kasan: bad access detected
[   15.018490] 
[   15.018562] Memory state around the buggy address:
[   15.018717]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.018983]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.019266] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.019684]                                   ^
[   15.019867]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.020197]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.020564] ==================================================================
[   15.021236] ==================================================================
[   15.021656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.022067] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.022348] 
[   15.022436] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.022492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.022503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.022526] Call Trace:
[   15.022542]  <TASK>
[   15.022557]  dump_stack_lvl+0x73/0xb0
[   15.022588]  print_report+0xd1/0x610
[   15.022611]  ? __virt_addr_valid+0x1db/0x2d0
[   15.022634]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.022660]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.022682]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.022709]  kasan_report+0x141/0x180
[   15.022730]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.022761]  kasan_check_range+0x10c/0x1c0
[   15.022785]  __kasan_check_write+0x18/0x20
[   15.022804]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.022829]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.022856]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.022880]  ? trace_hardirqs_on+0x37/0xe0
[   15.022902]  ? kasan_bitops_generic+0x92/0x1c0
[   15.022930]  kasan_bitops_generic+0x116/0x1c0
[   15.022954]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.022979]  ? __pfx_read_tsc+0x10/0x10
[   15.023000]  ? ktime_get_ts64+0x86/0x230
[   15.023024]  kunit_try_run_case+0x1a5/0x480
[   15.023049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.023071]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.023095]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.023120]  ? __kthread_parkme+0x82/0x180
[   15.023140]  ? preempt_count_sub+0x50/0x80
[   15.023164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.023188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.023225]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.023249]  kthread+0x337/0x6f0
[   15.023269]  ? trace_preempt_on+0x20/0xc0
[   15.023292]  ? __pfx_kthread+0x10/0x10
[   15.023312]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.023334]  ? calculate_sigpending+0x7b/0xa0
[   15.023359]  ? __pfx_kthread+0x10/0x10
[   15.023380]  ret_from_fork+0x116/0x1d0
[   15.023400]  ? __pfx_kthread+0x10/0x10
[   15.023421]  ret_from_fork_asm+0x1a/0x30
[   15.023452]  </TASK>
[   15.023463] 
[   15.031043] Allocated by task 279:
[   15.031262]  kasan_save_stack+0x45/0x70
[   15.031478]  kasan_save_track+0x18/0x40
[   15.031674]  kasan_save_alloc_info+0x3b/0x50
[   15.032001]  __kasan_kmalloc+0xb7/0xc0
[   15.032214]  __kmalloc_cache_noprof+0x189/0x420
[   15.032381]  kasan_bitops_generic+0x92/0x1c0
[   15.032546]  kunit_try_run_case+0x1a5/0x480
[   15.032697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.033107]  kthread+0x337/0x6f0
[   15.033282]  ret_from_fork+0x116/0x1d0
[   15.033488]  ret_from_fork_asm+0x1a/0x30
[   15.033690] 
[   15.033793] The buggy address belongs to the object at ffff888102641aa0
[   15.033793]  which belongs to the cache kmalloc-16 of size 16
[   15.034297] The buggy address is located 8 bytes inside of
[   15.034297]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.034806] 
[   15.034904] The buggy address belongs to the physical page:
[   15.035115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.035452] flags: 0x200000000000000(node=0|zone=2)
[   15.035681] page_type: f5(slab)
[   15.035865] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.036168] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.036489] page dumped because: kasan: bad access detected
[   15.036675] 
[   15.036747] Memory state around the buggy address:
[   15.037201]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.037490]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.037750] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.038063]                                   ^
[   15.038265]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.038526]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.038770] ==================================================================
[   15.078607] ==================================================================
[   15.078950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.079321] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.079621] 
[   15.079742] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.079789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.079801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.079823] Call Trace:
[   15.079842]  <TASK>
[   15.079857]  dump_stack_lvl+0x73/0xb0
[   15.079888]  print_report+0xd1/0x610
[   15.079912]  ? __virt_addr_valid+0x1db/0x2d0
[   15.079936]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.079962]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.079985]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.080011]  kasan_report+0x141/0x180
[   15.080034]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.080065]  kasan_check_range+0x10c/0x1c0
[   15.080088]  __kasan_check_write+0x18/0x20
[   15.080108]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.080134]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.080161]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.080185]  ? trace_hardirqs_on+0x37/0xe0
[   15.080209]  ? kasan_bitops_generic+0x92/0x1c0
[   15.080236]  kasan_bitops_generic+0x116/0x1c0
[   15.080260]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.080286]  ? __pfx_read_tsc+0x10/0x10
[   15.080308]  ? ktime_get_ts64+0x86/0x230
[   15.080333]  kunit_try_run_case+0x1a5/0x480
[   15.080359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.080383]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.080408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.080432]  ? __kthread_parkme+0x82/0x180
[   15.080453]  ? preempt_count_sub+0x50/0x80
[   15.080488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.080513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.080538]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.080562]  kthread+0x337/0x6f0
[   15.080581]  ? trace_preempt_on+0x20/0xc0
[   15.080603]  ? __pfx_kthread+0x10/0x10
[   15.080624]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.080646]  ? calculate_sigpending+0x7b/0xa0
[   15.080671]  ? __pfx_kthread+0x10/0x10
[   15.080693]  ret_from_fork+0x116/0x1d0
[   15.080711]  ? __pfx_kthread+0x10/0x10
[   15.080732]  ret_from_fork_asm+0x1a/0x30
[   15.080763]  </TASK>
[   15.080773] 
[   15.089117] Allocated by task 279:
[   15.089310]  kasan_save_stack+0x45/0x70
[   15.089497]  kasan_save_track+0x18/0x40
[   15.089693]  kasan_save_alloc_info+0x3b/0x50
[   15.089848]  __kasan_kmalloc+0xb7/0xc0
[   15.089985]  __kmalloc_cache_noprof+0x189/0x420
[   15.090157]  kasan_bitops_generic+0x92/0x1c0
[   15.090312]  kunit_try_run_case+0x1a5/0x480
[   15.090542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.090801]  kthread+0x337/0x6f0
[   15.090974]  ret_from_fork+0x116/0x1d0
[   15.091167]  ret_from_fork_asm+0x1a/0x30
[   15.091519] 
[   15.091617] The buggy address belongs to the object at ffff888102641aa0
[   15.091617]  which belongs to the cache kmalloc-16 of size 16
[   15.092131] The buggy address is located 8 bytes inside of
[   15.092131]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.092618] 
[   15.092716] The buggy address belongs to the physical page:
[   15.093078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.093369] flags: 0x200000000000000(node=0|zone=2)
[   15.093598] page_type: f5(slab)
[   15.093756] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.094077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.094389] page dumped because: kasan: bad access detected
[   15.094614] 
[   15.094701] Memory state around the buggy address:
[   15.095003]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.095319]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.095624] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.095940]                                   ^
[   15.096116]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.096421]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.096732] ==================================================================
[   15.116780] ==================================================================
[   15.117456] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.117751] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.118120] 
[   15.118236] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.118282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.118293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.118315] Call Trace:
[   15.118333]  <TASK>
[   15.118348]  dump_stack_lvl+0x73/0xb0
[   15.118379]  print_report+0xd1/0x610
[   15.118403]  ? __virt_addr_valid+0x1db/0x2d0
[   15.118427]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.118453]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.118488]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.118514]  kasan_report+0x141/0x180
[   15.118537]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.118567]  kasan_check_range+0x10c/0x1c0
[   15.118590]  __kasan_check_write+0x18/0x20
[   15.118610]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.118636]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.118662]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.118687]  ? trace_hardirqs_on+0x37/0xe0
[   15.118709]  ? kasan_bitops_generic+0x92/0x1c0
[   15.118737]  kasan_bitops_generic+0x116/0x1c0
[   15.118760]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.118798]  ? __pfx_read_tsc+0x10/0x10
[   15.118820]  ? ktime_get_ts64+0x86/0x230
[   15.118845]  kunit_try_run_case+0x1a5/0x480
[   15.118869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.118892]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.118918]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.118941]  ? __kthread_parkme+0x82/0x180
[   15.118962]  ? preempt_count_sub+0x50/0x80
[   15.118987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.119011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.119035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.119058]  kthread+0x337/0x6f0
[   15.119077]  ? trace_preempt_on+0x20/0xc0
[   15.119100]  ? __pfx_kthread+0x10/0x10
[   15.119122]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.119143]  ? calculate_sigpending+0x7b/0xa0
[   15.119167]  ? __pfx_kthread+0x10/0x10
[   15.119188]  ret_from_fork+0x116/0x1d0
[   15.119207]  ? __pfx_kthread+0x10/0x10
[   15.119227]  ret_from_fork_asm+0x1a/0x30
[   15.119259]  </TASK>
[   15.119269] 
[   15.127437] Allocated by task 279:
[   15.127578]  kasan_save_stack+0x45/0x70
[   15.127756]  kasan_save_track+0x18/0x40
[   15.127962]  kasan_save_alloc_info+0x3b/0x50
[   15.128179]  __kasan_kmalloc+0xb7/0xc0
[   15.128372]  __kmalloc_cache_noprof+0x189/0x420
[   15.128608]  kasan_bitops_generic+0x92/0x1c0
[   15.128888]  kunit_try_run_case+0x1a5/0x480
[   15.129085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.129309]  kthread+0x337/0x6f0
[   15.129480]  ret_from_fork+0x116/0x1d0
[   15.129639]  ret_from_fork_asm+0x1a/0x30
[   15.129848] 
[   15.129921] The buggy address belongs to the object at ffff888102641aa0
[   15.129921]  which belongs to the cache kmalloc-16 of size 16
[   15.130423] The buggy address is located 8 bytes inside of
[   15.130423]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.130936] 
[   15.131011] The buggy address belongs to the physical page:
[   15.131192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.131439] flags: 0x200000000000000(node=0|zone=2)
[   15.131691] page_type: f5(slab)
[   15.131860] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.132210] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.132450] page dumped because: kasan: bad access detected
[   15.132636] 
[   15.132708] Memory state around the buggy address:
[   15.132999]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.133326]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.133663] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.134262]                                   ^
[   15.134458]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.134772]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.135047] ==================================================================
[   15.058622] ==================================================================
[   15.059669] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.060132] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.060441] 
[   15.060571] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.060617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.060630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.060651] Call Trace:
[   15.060662]  <TASK>
[   15.060677]  dump_stack_lvl+0x73/0xb0
[   15.060707]  print_report+0xd1/0x610
[   15.060730]  ? __virt_addr_valid+0x1db/0x2d0
[   15.060753]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.060779]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.060810]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.060835]  kasan_report+0x141/0x180
[   15.060857]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.060887]  kasan_check_range+0x10c/0x1c0
[   15.060911]  __kasan_check_write+0x18/0x20
[   15.060930]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.060956]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.060982]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.061006]  ? trace_hardirqs_on+0x37/0xe0
[   15.061030]  ? kasan_bitops_generic+0x92/0x1c0
[   15.061057]  kasan_bitops_generic+0x116/0x1c0
[   15.061081]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.061105]  ? __pfx_read_tsc+0x10/0x10
[   15.061127]  ? ktime_get_ts64+0x86/0x230
[   15.061152]  kunit_try_run_case+0x1a5/0x480
[   15.061176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.061199]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.061223]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.061246]  ? __kthread_parkme+0x82/0x180
[   15.061267]  ? preempt_count_sub+0x50/0x80
[   15.061291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.061316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.061339]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.061363]  kthread+0x337/0x6f0
[   15.061382]  ? trace_preempt_on+0x20/0xc0
[   15.061404]  ? __pfx_kthread+0x10/0x10
[   15.061425]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.061446]  ? calculate_sigpending+0x7b/0xa0
[   15.061482]  ? __pfx_kthread+0x10/0x10
[   15.061504]  ret_from_fork+0x116/0x1d0
[   15.061523]  ? __pfx_kthread+0x10/0x10
[   15.061544]  ret_from_fork_asm+0x1a/0x30
[   15.061575]  </TASK>
[   15.061586] 
[   15.069853] Allocated by task 279:
[   15.069987]  kasan_save_stack+0x45/0x70
[   15.070152]  kasan_save_track+0x18/0x40
[   15.070350]  kasan_save_alloc_info+0x3b/0x50
[   15.070581]  __kasan_kmalloc+0xb7/0xc0
[   15.070775]  __kmalloc_cache_noprof+0x189/0x420
[   15.071102]  kasan_bitops_generic+0x92/0x1c0
[   15.071298]  kunit_try_run_case+0x1a5/0x480
[   15.071490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.071723]  kthread+0x337/0x6f0
[   15.072001]  ret_from_fork+0x116/0x1d0
[   15.072149]  ret_from_fork_asm+0x1a/0x30
[   15.072352] 
[   15.072435] The buggy address belongs to the object at ffff888102641aa0
[   15.072435]  which belongs to the cache kmalloc-16 of size 16
[   15.072999] The buggy address is located 8 bytes inside of
[   15.072999]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.073445] 
[   15.073551] The buggy address belongs to the physical page:
[   15.073761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.074010] flags: 0x200000000000000(node=0|zone=2)
[   15.074189] page_type: f5(slab)
[   15.074315] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.074602] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.074944] page dumped because: kasan: bad access detected
[   15.075201] 
[   15.075310] Memory state around the buggy address:
[   15.075551]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.075911]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.076230] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.076451]                                   ^
[   15.076613]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.077194]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.077540] ==================================================================
[   15.097787] ==================================================================
[   15.098201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.098489] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.098900] 
[   15.099015] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.099061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.099072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.099095] Call Trace:
[   15.099113]  <TASK>
[   15.099130]  dump_stack_lvl+0x73/0xb0
[   15.099160]  print_report+0xd1/0x610
[   15.099183]  ? __virt_addr_valid+0x1db/0x2d0
[   15.099207]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.099233]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.099255]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.099281]  kasan_report+0x141/0x180
[   15.099303]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.099333]  kasan_check_range+0x10c/0x1c0
[   15.099357]  __kasan_check_write+0x18/0x20
[   15.099379]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.099405]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.099432]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.099456]  ? trace_hardirqs_on+0x37/0xe0
[   15.099490]  ? kasan_bitops_generic+0x92/0x1c0
[   15.099518]  kasan_bitops_generic+0x116/0x1c0
[   15.099542]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.099568]  ? __pfx_read_tsc+0x10/0x10
[   15.099591]  ? ktime_get_ts64+0x86/0x230
[   15.099615]  kunit_try_run_case+0x1a5/0x480
[   15.099640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.099662]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.099687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.099711]  ? __kthread_parkme+0x82/0x180
[   15.099732]  ? preempt_count_sub+0x50/0x80
[   15.099755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.099779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.099802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.099826]  kthread+0x337/0x6f0
[   15.099846]  ? trace_preempt_on+0x20/0xc0
[   15.099867]  ? __pfx_kthread+0x10/0x10
[   15.099888]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.099909]  ? calculate_sigpending+0x7b/0xa0
[   15.099933]  ? __pfx_kthread+0x10/0x10
[   15.099954]  ret_from_fork+0x116/0x1d0
[   15.099973]  ? __pfx_kthread+0x10/0x10
[   15.099993]  ret_from_fork_asm+0x1a/0x30
[   15.100025]  </TASK>
[   15.100035] 
[   15.108162] Allocated by task 279:
[   15.108300]  kasan_save_stack+0x45/0x70
[   15.108449]  kasan_save_track+0x18/0x40
[   15.108598]  kasan_save_alloc_info+0x3b/0x50
[   15.108754]  __kasan_kmalloc+0xb7/0xc0
[   15.108996]  __kmalloc_cache_noprof+0x189/0x420
[   15.109222]  kasan_bitops_generic+0x92/0x1c0
[   15.109439]  kunit_try_run_case+0x1a5/0x480
[   15.109669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.110100]  kthread+0x337/0x6f0
[   15.110307]  ret_from_fork+0x116/0x1d0
[   15.110517]  ret_from_fork_asm+0x1a/0x30
[   15.110724] 
[   15.110831] The buggy address belongs to the object at ffff888102641aa0
[   15.110831]  which belongs to the cache kmalloc-16 of size 16
[   15.111397] The buggy address is located 8 bytes inside of
[   15.111397]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.111956] 
[   15.112036] The buggy address belongs to the physical page:
[   15.112259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.112535] flags: 0x200000000000000(node=0|zone=2)
[   15.112777] page_type: f5(slab)
[   15.112950] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.113271] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.113516] page dumped because: kasan: bad access detected
[   15.113694] 
[   15.113765] Memory state around the buggy address:
[   15.114037]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.114371]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.114715] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.115062]                                   ^
[   15.115382]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.115643]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.115867] ==================================================================
[   15.135963] ==================================================================
[   15.136607] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.136882] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.137118] 
[   15.137205] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.137251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.137263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.137285] Call Trace:
[   15.137303]  <TASK>
[   15.137318]  dump_stack_lvl+0x73/0xb0
[   15.137347]  print_report+0xd1/0x610
[   15.137371]  ? __virt_addr_valid+0x1db/0x2d0
[   15.137394]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.137420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.137444]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.137481]  kasan_report+0x141/0x180
[   15.137504]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.137537]  kasan_check_range+0x10c/0x1c0
[   15.137562]  __kasan_check_write+0x18/0x20
[   15.137582]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.137607]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.137634]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.137659]  ? trace_hardirqs_on+0x37/0xe0
[   15.137683]  ? kasan_bitops_generic+0x92/0x1c0
[   15.137711]  kasan_bitops_generic+0x116/0x1c0
[   15.137735]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.137760]  ? __pfx_read_tsc+0x10/0x10
[   15.137782]  ? ktime_get_ts64+0x86/0x230
[   15.137806]  kunit_try_run_case+0x1a5/0x480
[   15.137831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.137854]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.137879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.137902]  ? __kthread_parkme+0x82/0x180
[   15.137923]  ? preempt_count_sub+0x50/0x80
[   15.137947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.137972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.137999]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.138023]  kthread+0x337/0x6f0
[   15.138042]  ? trace_preempt_on+0x20/0xc0
[   15.138065]  ? __pfx_kthread+0x10/0x10
[   15.138085]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.138115]  ? calculate_sigpending+0x7b/0xa0
[   15.138139]  ? __pfx_kthread+0x10/0x10
[   15.138161]  ret_from_fork+0x116/0x1d0
[   15.138180]  ? __pfx_kthread+0x10/0x10
[   15.138201]  ret_from_fork_asm+0x1a/0x30
[   15.138231]  </TASK>
[   15.138242] 
[   15.146815] Allocated by task 279:
[   15.146983]  kasan_save_stack+0x45/0x70
[   15.147166]  kasan_save_track+0x18/0x40
[   15.147358]  kasan_save_alloc_info+0x3b/0x50
[   15.147549]  __kasan_kmalloc+0xb7/0xc0
[   15.147739]  __kmalloc_cache_noprof+0x189/0x420
[   15.147983]  kasan_bitops_generic+0x92/0x1c0
[   15.148180]  kunit_try_run_case+0x1a5/0x480
[   15.148381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.148614]  kthread+0x337/0x6f0
[   15.148768]  ret_from_fork+0x116/0x1d0
[   15.148942]  ret_from_fork_asm+0x1a/0x30
[   15.149137] 
[   15.149213] The buggy address belongs to the object at ffff888102641aa0
[   15.149213]  which belongs to the cache kmalloc-16 of size 16
[   15.149695] The buggy address is located 8 bytes inside of
[   15.149695]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.150371] 
[   15.150478] The buggy address belongs to the physical page:
[   15.150704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.151079] flags: 0x200000000000000(node=0|zone=2)
[   15.151264] page_type: f5(slab)
[   15.151389] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.151695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.152327] page dumped because: kasan: bad access detected
[   15.152516] 
[   15.152588] Memory state around the buggy address:
[   15.152770]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.153095]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.153426] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.153718]                                   ^
[   15.154065]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.154317]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.154644] ==================================================================
[   15.039347] ==================================================================
[   15.039711] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.040464] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.040772] 
[   15.040901] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.040946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.040958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.040979] Call Trace:
[   15.040994]  <TASK>
[   15.041008]  dump_stack_lvl+0x73/0xb0
[   15.041039]  print_report+0xd1/0x610
[   15.041062]  ? __virt_addr_valid+0x1db/0x2d0
[   15.041085]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.041112]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.041134]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.041160]  kasan_report+0x141/0x180
[   15.041182]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.041212]  kasan_check_range+0x10c/0x1c0
[   15.041236]  __kasan_check_write+0x18/0x20
[   15.041255]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.041281]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.041308]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.041332]  ? trace_hardirqs_on+0x37/0xe0
[   15.041355]  ? kasan_bitops_generic+0x92/0x1c0
[   15.041382]  kasan_bitops_generic+0x116/0x1c0
[   15.041406]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.041431]  ? __pfx_read_tsc+0x10/0x10
[   15.041453]  ? ktime_get_ts64+0x86/0x230
[   15.041490]  kunit_try_run_case+0x1a5/0x480
[   15.041515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.041538]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.041563]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.041587]  ? __kthread_parkme+0x82/0x180
[   15.041608]  ? preempt_count_sub+0x50/0x80
[   15.041633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.041658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.041681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.041706]  kthread+0x337/0x6f0
[   15.041726]  ? trace_preempt_on+0x20/0xc0
[   15.041749]  ? __pfx_kthread+0x10/0x10
[   15.041771]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.041792]  ? calculate_sigpending+0x7b/0xa0
[   15.041817]  ? __pfx_kthread+0x10/0x10
[   15.041839]  ret_from_fork+0x116/0x1d0
[   15.041858]  ? __pfx_kthread+0x10/0x10
[   15.041878]  ret_from_fork_asm+0x1a/0x30
[   15.041909]  </TASK>
[   15.041919] 
[   15.049673] Allocated by task 279:
[   15.049807]  kasan_save_stack+0x45/0x70
[   15.049954]  kasan_save_track+0x18/0x40
[   15.050093]  kasan_save_alloc_info+0x3b/0x50
[   15.050263]  __kasan_kmalloc+0xb7/0xc0
[   15.050588]  __kmalloc_cache_noprof+0x189/0x420
[   15.050896]  kasan_bitops_generic+0x92/0x1c0
[   15.051113]  kunit_try_run_case+0x1a5/0x480
[   15.051330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.051599]  kthread+0x337/0x6f0
[   15.051772]  ret_from_fork+0x116/0x1d0
[   15.051962]  ret_from_fork_asm+0x1a/0x30
[   15.052162] 
[   15.052257] The buggy address belongs to the object at ffff888102641aa0
[   15.052257]  which belongs to the cache kmalloc-16 of size 16
[   15.052742] The buggy address is located 8 bytes inside of
[   15.052742]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.053217] 
[   15.053291] The buggy address belongs to the physical page:
[   15.053479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.053907] flags: 0x200000000000000(node=0|zone=2)
[   15.054158] page_type: f5(slab)
[   15.054338] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.054636] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.055099] page dumped because: kasan: bad access detected
[   15.055349] 
[   15.055419] Memory state around the buggy address:
[   15.055660]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.055992]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.056221] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.056430]                                   ^
[   15.056648]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.057215]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.057491] ==================================================================