Hay
Date
June 17, 2025, 6:35 a.m.

Environment
qemu-x86_64

[   21.683947] ==================================================================
[   21.685261] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.685930] Read of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.686480] 
[   21.686731] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.686874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.686913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.686972] Call Trace:
[   21.687020]  <TASK>
[   21.687098]  dump_stack_lvl+0x73/0xb0
[   21.687184]  print_report+0xd1/0x650
[   21.687259]  ? __virt_addr_valid+0x1db/0x2d0
[   21.687334]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.687413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.687482]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.687574]  kasan_report+0x141/0x180
[   21.687649]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.687718]  __asan_report_load8_noabort+0x18/0x20
[   21.687758]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.687801]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.687868]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.687907]  ? trace_hardirqs_on+0x37/0xe0
[   21.687939]  ? kasan_bitops_generic+0x92/0x1c0
[   21.687978]  kasan_bitops_generic+0x121/0x1c0
[   21.688012]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.688048]  ? __pfx_read_tsc+0x10/0x10
[   21.688079]  ? ktime_get_ts64+0x86/0x230
[   21.688116]  kunit_try_run_case+0x1a5/0x480
[   21.688152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.688185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.688223]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.688282]  ? __kthread_parkme+0x82/0x180
[   21.688311]  ? preempt_count_sub+0x50/0x80
[   21.688345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.688381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.688414]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.688447]  kthread+0x337/0x6f0
[   21.688476]  ? trace_preempt_on+0x20/0xc0
[   21.688507]  ? __pfx_kthread+0x10/0x10
[   21.688536]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.688569]  ? calculate_sigpending+0x7b/0xa0
[   21.688604]  ? __pfx_kthread+0x10/0x10
[   21.688634]  ret_from_fork+0x116/0x1d0
[   21.688660]  ? __pfx_kthread+0x10/0x10
[   21.688687]  ret_from_fork_asm+0x1a/0x30
[   21.688730]  </TASK>
[   21.688744] 
[   21.704595] Allocated by task 288:
[   21.705055]  kasan_save_stack+0x45/0x70
[   21.705565]  kasan_save_track+0x18/0x40
[   21.706059]  kasan_save_alloc_info+0x3b/0x50
[   21.706531]  __kasan_kmalloc+0xb7/0xc0
[   21.707010]  __kmalloc_cache_noprof+0x189/0x420
[   21.707567]  kasan_bitops_generic+0x92/0x1c0
[   21.708092]  kunit_try_run_case+0x1a5/0x480
[   21.708503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.709117]  kthread+0x337/0x6f0
[   21.709505]  ret_from_fork+0x116/0x1d0
[   21.709918]  ret_from_fork_asm+0x1a/0x30
[   21.710344] 
[   21.710504] The buggy address belongs to the object at ffff888102264580
[   21.710504]  which belongs to the cache kmalloc-16 of size 16
[   21.711547] The buggy address is located 8 bytes inside of
[   21.711547]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.712614] 
[   21.712827] The buggy address belongs to the physical page:
[   21.713398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.714040] flags: 0x200000000000000(node=0|zone=2)
[   21.714401] page_type: f5(slab)
[   21.714653] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.715377] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.716085] page dumped because: kasan: bad access detected
[   21.716682] 
[   21.716932] Memory state around the buggy address:
[   21.717497]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.718166]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.719022] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.719727]                       ^
[   21.720178]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.721164]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.721786] ==================================================================
[   21.512496] ==================================================================
[   21.512923] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.513866] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.514764] 
[   21.515122] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.515277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.515321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.515399] Call Trace:
[   21.515453]  <TASK>
[   21.515523]  dump_stack_lvl+0x73/0xb0
[   21.515623]  print_report+0xd1/0x650
[   21.515696]  ? __virt_addr_valid+0x1db/0x2d0
[   21.515772]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.515873]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.515992]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.516099]  kasan_report+0x141/0x180
[   21.516203]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.516343]  kasan_check_range+0x10c/0x1c0
[   21.516423]  __kasan_check_write+0x18/0x20
[   21.516514]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.516629]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.516702]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.516740]  ? trace_hardirqs_on+0x37/0xe0
[   21.516770]  ? kasan_bitops_generic+0x92/0x1c0
[   21.516812]  kasan_bitops_generic+0x121/0x1c0
[   21.516905]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.516983]  ? __pfx_read_tsc+0x10/0x10
[   21.517075]  ? ktime_get_ts64+0x86/0x230
[   21.517184]  kunit_try_run_case+0x1a5/0x480
[   21.517328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.517430]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.517503]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.517574]  ? __kthread_parkme+0x82/0x180
[   21.517605]  ? preempt_count_sub+0x50/0x80
[   21.517640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.517676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.517709]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.517742]  kthread+0x337/0x6f0
[   21.517768]  ? trace_preempt_on+0x20/0xc0
[   21.517800]  ? __pfx_kthread+0x10/0x10
[   21.517853]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.517901]  ? calculate_sigpending+0x7b/0xa0
[   21.517940]  ? __pfx_kthread+0x10/0x10
[   21.517974]  ret_from_fork+0x116/0x1d0
[   21.518003]  ? __pfx_kthread+0x10/0x10
[   21.518034]  ret_from_fork_asm+0x1a/0x30
[   21.518078]  </TASK>
[   21.518092] 
[   21.537928] Allocated by task 288:
[   21.539278]  kasan_save_stack+0x45/0x70
[   21.539592]  kasan_save_track+0x18/0x40
[   21.539997]  kasan_save_alloc_info+0x3b/0x50
[   21.540638]  __kasan_kmalloc+0xb7/0xc0
[   21.541018]  __kmalloc_cache_noprof+0x189/0x420
[   21.541437]  kasan_bitops_generic+0x92/0x1c0
[   21.541855]  kunit_try_run_case+0x1a5/0x480
[   21.542220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.542655]  kthread+0x337/0x6f0
[   21.543180]  ret_from_fork+0x116/0x1d0
[   21.543479]  ret_from_fork_asm+0x1a/0x30
[   21.543859] 
[   21.544032] The buggy address belongs to the object at ffff888102264580
[   21.544032]  which belongs to the cache kmalloc-16 of size 16
[   21.545176] The buggy address is located 8 bytes inside of
[   21.545176]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.546261] 
[   21.546423] The buggy address belongs to the physical page:
[   21.546999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.547917] flags: 0x200000000000000(node=0|zone=2)
[   21.548387] page_type: f5(slab)
[   21.548765] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.549601] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.550189] page dumped because: kasan: bad access detected
[   21.550752] 
[   21.551033] Memory state around the buggy address:
[   21.551501]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.552050]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.552865] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.553482]                       ^
[   21.553959]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.554502]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.555045] ==================================================================
[   21.599916] ==================================================================
[   21.600449] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.602157] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.603457] 
[   21.603637] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.603707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.603726] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.603756] Call Trace:
[   21.603779]  <TASK>
[   21.603799]  dump_stack_lvl+0x73/0xb0
[   21.603871]  print_report+0xd1/0x650
[   21.603950]  ? __virt_addr_valid+0x1db/0x2d0
[   21.604062]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.604153]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.604227]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.604318]  kasan_report+0x141/0x180
[   21.604392]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.604630]  kasan_check_range+0x10c/0x1c0
[   21.604702]  __kasan_check_write+0x18/0x20
[   21.604734]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.604775]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.604816]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.604879]  ? trace_hardirqs_on+0x37/0xe0
[   21.604913]  ? kasan_bitops_generic+0x92/0x1c0
[   21.604951]  kasan_bitops_generic+0x121/0x1c0
[   21.604984]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.605020]  ? __pfx_read_tsc+0x10/0x10
[   21.605050]  ? ktime_get_ts64+0x86/0x230
[   21.605084]  kunit_try_run_case+0x1a5/0x480
[   21.605119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.605152]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.605179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.605241]  ? __kthread_parkme+0x82/0x180
[   21.605289]  ? preempt_count_sub+0x50/0x80
[   21.605326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.605360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.605393]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.605425]  kthread+0x337/0x6f0
[   21.605454]  ? trace_preempt_on+0x20/0xc0
[   21.605485]  ? __pfx_kthread+0x10/0x10
[   21.605514]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.605549]  ? calculate_sigpending+0x7b/0xa0
[   21.605583]  ? __pfx_kthread+0x10/0x10
[   21.605612]  ret_from_fork+0x116/0x1d0
[   21.605638]  ? __pfx_kthread+0x10/0x10
[   21.605665]  ret_from_fork_asm+0x1a/0x30
[   21.605704]  </TASK>
[   21.605718] 
[   21.622638] Allocated by task 288:
[   21.623006]  kasan_save_stack+0x45/0x70
[   21.623441]  kasan_save_track+0x18/0x40
[   21.623903]  kasan_save_alloc_info+0x3b/0x50
[   21.624302]  __kasan_kmalloc+0xb7/0xc0
[   21.624580]  __kmalloc_cache_noprof+0x189/0x420
[   21.624958]  kasan_bitops_generic+0x92/0x1c0
[   21.625493]  kunit_try_run_case+0x1a5/0x480
[   21.625988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.626547]  kthread+0x337/0x6f0
[   21.626942]  ret_from_fork+0x116/0x1d0
[   21.627409]  ret_from_fork_asm+0x1a/0x30
[   21.627810] 
[   21.628070] The buggy address belongs to the object at ffff888102264580
[   21.628070]  which belongs to the cache kmalloc-16 of size 16
[   21.629021] The buggy address is located 8 bytes inside of
[   21.629021]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.629723] 
[   21.629982] The buggy address belongs to the physical page:
[   21.630527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.631324] flags: 0x200000000000000(node=0|zone=2)
[   21.631766] page_type: f5(slab)
[   21.632161] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.632730] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.633391] page dumped because: kasan: bad access detected
[   21.633917] 
[   21.634125] Memory state around the buggy address:
[   21.634600]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.635038]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.635696] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.637120]                       ^
[   21.638911]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.639819]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.640641] ==================================================================
[   21.340012] ==================================================================
[   21.341801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.343607] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.344134] 
[   21.344332] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.344458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.344496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.344553] Call Trace:
[   21.344601]  <TASK>
[   21.344650]  dump_stack_lvl+0x73/0xb0
[   21.344726]  print_report+0xd1/0x650
[   21.344798]  ? __virt_addr_valid+0x1db/0x2d0
[   21.344895]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.344974]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.345045]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.345126]  kasan_report+0x141/0x180
[   21.345197]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.345580]  kasan_check_range+0x10c/0x1c0
[   21.345791]  __kasan_check_write+0x18/0x20
[   21.345887]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.345976]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.346060]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.346140]  ? trace_hardirqs_on+0x37/0xe0
[   21.346213]  ? kasan_bitops_generic+0x92/0x1c0
[   21.346302]  kasan_bitops_generic+0x121/0x1c0
[   21.346386]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.346453]  ? __pfx_read_tsc+0x10/0x10
[   21.346488]  ? ktime_get_ts64+0x86/0x230
[   21.346525]  kunit_try_run_case+0x1a5/0x480
[   21.346560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.346594]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.346623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.346661]  ? __kthread_parkme+0x82/0x180
[   21.346690]  ? preempt_count_sub+0x50/0x80
[   21.346723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.346758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.346792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.346825]  kthread+0x337/0x6f0
[   21.346884]  ? trace_preempt_on+0x20/0xc0
[   21.346919]  ? __pfx_kthread+0x10/0x10
[   21.346949]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.346983]  ? calculate_sigpending+0x7b/0xa0
[   21.347018]  ? __pfx_kthread+0x10/0x10
[   21.347048]  ret_from_fork+0x116/0x1d0
[   21.347073]  ? __pfx_kthread+0x10/0x10
[   21.347103]  ret_from_fork_asm+0x1a/0x30
[   21.347145]  </TASK>
[   21.347161] 
[   21.365952] Allocated by task 288:
[   21.366508]  kasan_save_stack+0x45/0x70
[   21.366936]  kasan_save_track+0x18/0x40
[   21.367319]  kasan_save_alloc_info+0x3b/0x50
[   21.367720]  __kasan_kmalloc+0xb7/0xc0
[   21.368171]  __kmalloc_cache_noprof+0x189/0x420
[   21.369042]  kasan_bitops_generic+0x92/0x1c0
[   21.369726]  kunit_try_run_case+0x1a5/0x480
[   21.370117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.370688]  kthread+0x337/0x6f0
[   21.371137]  ret_from_fork+0x116/0x1d0
[   21.371468]  ret_from_fork_asm+0x1a/0x30
[   21.372018] 
[   21.372225] The buggy address belongs to the object at ffff888102264580
[   21.372225]  which belongs to the cache kmalloc-16 of size 16
[   21.373180] The buggy address is located 8 bytes inside of
[   21.373180]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.374024] 
[   21.374181] The buggy address belongs to the physical page:
[   21.374679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.375162] flags: 0x200000000000000(node=0|zone=2)
[   21.375714] page_type: f5(slab)
[   21.375994] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.376935] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.377938] page dumped because: kasan: bad access detected
[   21.378542] 
[   21.378945] Memory state around the buggy address:
[   21.379342]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.379979]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.380608] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.381200]                       ^
[   21.381534]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.382096]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.382777] ==================================================================
[   21.384124] ==================================================================
[   21.384654] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.385444] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.386189] 
[   21.386479] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.386602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.386638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.386694] Call Trace:
[   21.386737]  <TASK>
[   21.386782]  dump_stack_lvl+0x73/0xb0
[   21.386877]  print_report+0xd1/0x650
[   21.386952]  ? __virt_addr_valid+0x1db/0x2d0
[   21.387021]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.387089]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.387155]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.387264]  kasan_report+0x141/0x180
[   21.387334]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.387430]  kasan_check_range+0x10c/0x1c0
[   21.387558]  __kasan_check_write+0x18/0x20
[   21.387632]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.387717]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.387805]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.387969]  ? trace_hardirqs_on+0x37/0xe0
[   21.388080]  ? kasan_bitops_generic+0x92/0x1c0
[   21.388169]  kasan_bitops_generic+0x121/0x1c0
[   21.388292]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.388375]  ? __pfx_read_tsc+0x10/0x10
[   21.388442]  ? ktime_get_ts64+0x86/0x230
[   21.388526]  kunit_try_run_case+0x1a5/0x480
[   21.388600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.388674]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.388750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.388842]  ? __kthread_parkme+0x82/0x180
[   21.388912]  ? preempt_count_sub+0x50/0x80
[   21.388987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.389061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.389103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.389137]  kthread+0x337/0x6f0
[   21.389165]  ? trace_preempt_on+0x20/0xc0
[   21.389196]  ? __pfx_kthread+0x10/0x10
[   21.389272]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.389311]  ? calculate_sigpending+0x7b/0xa0
[   21.389349]  ? __pfx_kthread+0x10/0x10
[   21.389379]  ret_from_fork+0x116/0x1d0
[   21.389405]  ? __pfx_kthread+0x10/0x10
[   21.389433]  ret_from_fork_asm+0x1a/0x30
[   21.389476]  </TASK>
[   21.389490] 
[   21.409688] Allocated by task 288:
[   21.409990]  kasan_save_stack+0x45/0x70
[   21.410433]  kasan_save_track+0x18/0x40
[   21.410859]  kasan_save_alloc_info+0x3b/0x50
[   21.411302]  __kasan_kmalloc+0xb7/0xc0
[   21.411610]  __kmalloc_cache_noprof+0x189/0x420
[   21.412088]  kasan_bitops_generic+0x92/0x1c0
[   21.412574]  kunit_try_run_case+0x1a5/0x480
[   21.413047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.413589]  kthread+0x337/0x6f0
[   21.413870]  ret_from_fork+0x116/0x1d0
[   21.414324]  ret_from_fork_asm+0x1a/0x30
[   21.414728] 
[   21.414928] The buggy address belongs to the object at ffff888102264580
[   21.414928]  which belongs to the cache kmalloc-16 of size 16
[   21.415785] The buggy address is located 8 bytes inside of
[   21.415785]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.416790] 
[   21.417048] The buggy address belongs to the physical page:
[   21.417511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.418151] flags: 0x200000000000000(node=0|zone=2)
[   21.418683] page_type: f5(slab)
[   21.419077] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.419727] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.420298] page dumped because: kasan: bad access detected
[   21.420676] 
[   21.420905] Memory state around the buggy address:
[   21.421385]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.422055]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.422672] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.423114]                       ^
[   21.423522]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.424171]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.424747] ==================================================================
[   21.556544] ==================================================================
[   21.557048] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.558670] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.560239] 
[   21.560684] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.560864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.560898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.560956] Call Trace:
[   21.560993]  <TASK>
[   21.561040]  dump_stack_lvl+0x73/0xb0
[   21.561117]  print_report+0xd1/0x650
[   21.561154]  ? __virt_addr_valid+0x1db/0x2d0
[   21.561185]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.561271]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.561309]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.561350]  kasan_report+0x141/0x180
[   21.561380]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.561424]  kasan_check_range+0x10c/0x1c0
[   21.561457]  __kasan_check_write+0x18/0x20
[   21.561484]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.561523]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.561563]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.561599]  ? trace_hardirqs_on+0x37/0xe0
[   21.561632]  ? kasan_bitops_generic+0x92/0x1c0
[   21.561669]  kasan_bitops_generic+0x121/0x1c0
[   21.561703]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.561740]  ? __pfx_read_tsc+0x10/0x10
[   21.561769]  ? ktime_get_ts64+0x86/0x230
[   21.561802]  kunit_try_run_case+0x1a5/0x480
[   21.561860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.561897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.561925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.561961]  ? __kthread_parkme+0x82/0x180
[   21.561988]  ? preempt_count_sub+0x50/0x80
[   21.562021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.562054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.562086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.562119]  kthread+0x337/0x6f0
[   21.562145]  ? trace_preempt_on+0x20/0xc0
[   21.562177]  ? __pfx_kthread+0x10/0x10
[   21.562206]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.562265]  ? calculate_sigpending+0x7b/0xa0
[   21.562304]  ? __pfx_kthread+0x10/0x10
[   21.562334]  ret_from_fork+0x116/0x1d0
[   21.562359]  ? __pfx_kthread+0x10/0x10
[   21.562388]  ret_from_fork_asm+0x1a/0x30
[   21.562428]  </TASK>
[   21.562442] 
[   21.581714] Allocated by task 288:
[   21.581988]  kasan_save_stack+0x45/0x70
[   21.582494]  kasan_save_track+0x18/0x40
[   21.582890]  kasan_save_alloc_info+0x3b/0x50
[   21.583454]  __kasan_kmalloc+0xb7/0xc0
[   21.583930]  __kmalloc_cache_noprof+0x189/0x420
[   21.584498]  kasan_bitops_generic+0x92/0x1c0
[   21.584810]  kunit_try_run_case+0x1a5/0x480
[   21.585261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.585757]  kthread+0x337/0x6f0
[   21.586119]  ret_from_fork+0x116/0x1d0
[   21.586616]  ret_from_fork_asm+0x1a/0x30
[   21.587059] 
[   21.587364] The buggy address belongs to the object at ffff888102264580
[   21.587364]  which belongs to the cache kmalloc-16 of size 16
[   21.589177] The buggy address is located 8 bytes inside of
[   21.589177]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.590006] 
[   21.590212] The buggy address belongs to the physical page:
[   21.590682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.591477] flags: 0x200000000000000(node=0|zone=2)
[   21.591935] page_type: f5(slab)
[   21.592195] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.592741] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.593495] page dumped because: kasan: bad access detected
[   21.593990] 
[   21.594310] Memory state around the buggy address:
[   21.594704]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.595160]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.595892] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.596694]                       ^
[   21.597052]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.597610]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.598398] ==================================================================
[   21.463647] ==================================================================
[   21.464443] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.465274] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.466628] 
[   21.466826] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.466969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.467009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.467067] Call Trace:
[   21.467117]  <TASK>
[   21.467166]  dump_stack_lvl+0x73/0xb0
[   21.467250]  print_report+0xd1/0x650
[   21.467329]  ? __virt_addr_valid+0x1db/0x2d0
[   21.467401]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.467487]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.467572]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.467659]  kasan_report+0x141/0x180
[   21.467738]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.467850]  kasan_check_range+0x10c/0x1c0
[   21.467932]  __kasan_check_write+0x18/0x20
[   21.468007]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.468091]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.468162]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.468318]  ? trace_hardirqs_on+0x37/0xe0
[   21.468388]  ? kasan_bitops_generic+0x92/0x1c0
[   21.468470]  kasan_bitops_generic+0x121/0x1c0
[   21.468545]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.468622]  ? __pfx_read_tsc+0x10/0x10
[   21.468688]  ? ktime_get_ts64+0x86/0x230
[   21.468765]  kunit_try_run_case+0x1a5/0x480
[   21.468858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.468931]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.468997]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.469074]  ? __kthread_parkme+0x82/0x180
[   21.469142]  ? preempt_count_sub+0x50/0x80
[   21.469203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.469265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.469337]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.469408]  kthread+0x337/0x6f0
[   21.469474]  ? trace_preempt_on+0x20/0xc0
[   21.469549]  ? __pfx_kthread+0x10/0x10
[   21.469623]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.469696]  ? calculate_sigpending+0x7b/0xa0
[   21.469769]  ? __pfx_kthread+0x10/0x10
[   21.470040]  ret_from_fork+0x116/0x1d0
[   21.470277]  ? __pfx_kthread+0x10/0x10
[   21.470998]  ret_from_fork_asm+0x1a/0x30
[   21.471090]  </TASK>
[   21.471126] 
[   21.490895] Allocated by task 288:
[   21.493205]  kasan_save_stack+0x45/0x70
[   21.493921]  kasan_save_track+0x18/0x40
[   21.494697]  kasan_save_alloc_info+0x3b/0x50
[   21.495570]  __kasan_kmalloc+0xb7/0xc0
[   21.496239]  __kmalloc_cache_noprof+0x189/0x420
[   21.497030]  kasan_bitops_generic+0x92/0x1c0
[   21.497809]  kunit_try_run_case+0x1a5/0x480
[   21.498244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.498685]  kthread+0x337/0x6f0
[   21.499052]  ret_from_fork+0x116/0x1d0
[   21.499939]  ret_from_fork_asm+0x1a/0x30
[   21.500423] 
[   21.500639] The buggy address belongs to the object at ffff888102264580
[   21.500639]  which belongs to the cache kmalloc-16 of size 16
[   21.501664] The buggy address is located 8 bytes inside of
[   21.501664]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.502576] 
[   21.502851] The buggy address belongs to the physical page:
[   21.503340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.503925] flags: 0x200000000000000(node=0|zone=2)
[   21.504404] page_type: f5(slab)
[   21.504703] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.505336] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.505970] page dumped because: kasan: bad access detected
[   21.506462] 
[   21.506717] Memory state around the buggy address:
[   21.507153]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.507788]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.508451] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.508971]                       ^
[   21.509417]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.509909]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.510515] ==================================================================
[   21.641514] ==================================================================
[   21.642715] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.644206] Read of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.645133] 
[   21.645495] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.645618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.645656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.645713] Call Trace:
[   21.645790]  <TASK>
[   21.645853]  dump_stack_lvl+0x73/0xb0
[   21.645936]  print_report+0xd1/0x650
[   21.646014]  ? __virt_addr_valid+0x1db/0x2d0
[   21.646078]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.646121]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.646152]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.646191]  kasan_report+0x141/0x180
[   21.646252]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.646310]  kasan_check_range+0x10c/0x1c0
[   21.646347]  __kasan_check_read+0x15/0x20
[   21.646374]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.646412]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.646453]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.646486]  ? trace_hardirqs_on+0x37/0xe0
[   21.646517]  ? kasan_bitops_generic+0x92/0x1c0
[   21.646555]  kasan_bitops_generic+0x121/0x1c0
[   21.646592]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.646627]  ? __pfx_read_tsc+0x10/0x10
[   21.646655]  ? ktime_get_ts64+0x86/0x230
[   21.646689]  kunit_try_run_case+0x1a5/0x480
[   21.646721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.646753]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.646781]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.646817]  ? __kthread_parkme+0x82/0x180
[   21.646869]  ? preempt_count_sub+0x50/0x80
[   21.646906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.646941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.646974]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.647005]  kthread+0x337/0x6f0
[   21.647032]  ? trace_preempt_on+0x20/0xc0
[   21.647062]  ? __pfx_kthread+0x10/0x10
[   21.647092]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.647126]  ? calculate_sigpending+0x7b/0xa0
[   21.647159]  ? __pfx_kthread+0x10/0x10
[   21.647188]  ret_from_fork+0x116/0x1d0
[   21.647216]  ? __pfx_kthread+0x10/0x10
[   21.647272]  ret_from_fork_asm+0x1a/0x30
[   21.647315]  </TASK>
[   21.647328] 
[   21.664363] Allocated by task 288:
[   21.664624]  kasan_save_stack+0x45/0x70
[   21.664965]  kasan_save_track+0x18/0x40
[   21.665568]  kasan_save_alloc_info+0x3b/0x50
[   21.666160]  __kasan_kmalloc+0xb7/0xc0
[   21.666642]  __kmalloc_cache_noprof+0x189/0x420
[   21.667110]  kasan_bitops_generic+0x92/0x1c0
[   21.667641]  kunit_try_run_case+0x1a5/0x480
[   21.668155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.668553]  kthread+0x337/0x6f0
[   21.668808]  ret_from_fork+0x116/0x1d0
[   21.669323]  ret_from_fork_asm+0x1a/0x30
[   21.669701] 
[   21.669970] The buggy address belongs to the object at ffff888102264580
[   21.669970]  which belongs to the cache kmalloc-16 of size 16
[   21.671164] The buggy address is located 8 bytes inside of
[   21.671164]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.672134] 
[   21.672428] The buggy address belongs to the physical page:
[   21.673086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.673869] flags: 0x200000000000000(node=0|zone=2)
[   21.674202] page_type: f5(slab)
[   21.674585] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.675382] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.676043] page dumped because: kasan: bad access detected
[   21.676491] 
[   21.676646] Memory state around the buggy address:
[   21.677026]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.677719]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.679013] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.679975]                       ^
[   21.680524]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.681456]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.682031] ==================================================================
[   21.425821] ==================================================================
[   21.426638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.427167] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.428112] 
[   21.428429] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.428557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.428595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.428652] Call Trace:
[   21.428698]  <TASK>
[   21.428804]  dump_stack_lvl+0x73/0xb0
[   21.428907]  print_report+0xd1/0x650
[   21.428975]  ? __virt_addr_valid+0x1db/0x2d0
[   21.429044]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.429118]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.429186]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.429302]  kasan_report+0x141/0x180
[   21.429379]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.429471]  kasan_check_range+0x10c/0x1c0
[   21.429548]  __kasan_check_write+0x18/0x20
[   21.429614]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.429695]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.429779]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.429865]  ? trace_hardirqs_on+0x37/0xe0
[   21.429933]  ? kasan_bitops_generic+0x92/0x1c0
[   21.430014]  kasan_bitops_generic+0x121/0x1c0
[   21.430137]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.430260]  ? __pfx_read_tsc+0x10/0x10
[   21.430371]  ? ktime_get_ts64+0x86/0x230
[   21.430451]  kunit_try_run_case+0x1a5/0x480
[   21.430527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.430599]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.430668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.430793]  ? __kthread_parkme+0x82/0x180
[   21.430879]  ? preempt_count_sub+0x50/0x80
[   21.430961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.431072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.431155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.431265]  kthread+0x337/0x6f0
[   21.431338]  ? trace_preempt_on+0x20/0xc0
[   21.431408]  ? __pfx_kthread+0x10/0x10
[   21.431518]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.431608]  ? calculate_sigpending+0x7b/0xa0
[   21.431690]  ? __pfx_kthread+0x10/0x10
[   21.431796]  ret_from_fork+0x116/0x1d0
[   21.431887]  ? __pfx_kthread+0x10/0x10
[   21.431954]  ret_from_fork_asm+0x1a/0x30
[   21.432036]  </TASK>
[   21.432055] 
[   21.448414] Allocated by task 288:
[   21.448755]  kasan_save_stack+0x45/0x70
[   21.449157]  kasan_save_track+0x18/0x40
[   21.449564]  kasan_save_alloc_info+0x3b/0x50
[   21.449951]  __kasan_kmalloc+0xb7/0xc0
[   21.450272]  __kmalloc_cache_noprof+0x189/0x420
[   21.450594]  kasan_bitops_generic+0x92/0x1c0
[   21.450944]  kunit_try_run_case+0x1a5/0x480
[   21.451419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.451947]  kthread+0x337/0x6f0
[   21.452343]  ret_from_fork+0x116/0x1d0
[   21.452732]  ret_from_fork_asm+0x1a/0x30
[   21.453159] 
[   21.453395] The buggy address belongs to the object at ffff888102264580
[   21.453395]  which belongs to the cache kmalloc-16 of size 16
[   21.454193] The buggy address is located 8 bytes inside of
[   21.454193]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.454937] 
[   21.455143] The buggy address belongs to the physical page:
[   21.455667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.456397] flags: 0x200000000000000(node=0|zone=2)
[   21.456856] page_type: f5(slab)
[   21.457257] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.457703] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.458338] page dumped because: kasan: bad access detected
[   21.458754] 
[   21.458969] Memory state around the buggy address:
[   21.459439]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.459977]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.460539] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.460960]                       ^
[   21.461254]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.461673]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.462298] ==================================================================