Hay
Date
June 23, 2025, 7:07 a.m.

Environment
qemu-x86_64

[   24.227104] ==================================================================
[   24.227702] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   24.228435] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.228710] 
[   24.228869] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.228946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.228964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.228987] Call Trace:
[   24.229005]  <TASK>
[   24.229023]  dump_stack_lvl+0x73/0xb0
[   24.229052]  print_report+0xd1/0x650
[   24.229070]  ? __virt_addr_valid+0x1db/0x2d0
[   24.229091]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   24.229127]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.229170]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   24.229215]  kasan_report+0x141/0x180
[   24.229254]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   24.229305]  kasan_check_range+0x10c/0x1c0
[   24.229336]  __kasan_check_write+0x18/0x20
[   24.229364]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   24.229415]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.229450]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.229480]  ? trace_hardirqs_on+0x37/0xe0
[   24.229510]  ? kasan_bitops_generic+0x92/0x1c0
[   24.229546]  kasan_bitops_generic+0x121/0x1c0
[   24.229577]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.229620]  ? __pfx_read_tsc+0x10/0x10
[   24.229651]  ? ktime_get_ts64+0x86/0x230
[   24.229701]  kunit_try_run_case+0x1a5/0x480
[   24.229743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.229781]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.229821]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.229854]  ? __kthread_parkme+0x82/0x180
[   24.229886]  ? preempt_count_sub+0x50/0x80
[   24.229927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.229969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.230018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.230095]  kthread+0x337/0x6f0
[   24.230131]  ? trace_preempt_on+0x20/0xc0
[   24.230160]  ? __pfx_kthread+0x10/0x10
[   24.230189]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.230218]  ? calculate_sigpending+0x7b/0xa0
[   24.230247]  ? __pfx_kthread+0x10/0x10
[   24.230274]  ret_from_fork+0x116/0x1d0
[   24.230302]  ? __pfx_kthread+0x10/0x10
[   24.230329]  ret_from_fork_asm+0x1a/0x30
[   24.230398]  </TASK>
[   24.230418] 
[   24.239462] Allocated by task 290:
[   24.239698]  kasan_save_stack+0x45/0x70
[   24.239945]  kasan_save_track+0x18/0x40
[   24.240276]  kasan_save_alloc_info+0x3b/0x50
[   24.240521]  __kasan_kmalloc+0xb7/0xc0
[   24.240790]  __kmalloc_cache_noprof+0x189/0x420
[   24.241055]  kasan_bitops_generic+0x92/0x1c0
[   24.241280]  kunit_try_run_case+0x1a5/0x480
[   24.241534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.241717]  kthread+0x337/0x6f0
[   24.241859]  ret_from_fork+0x116/0x1d0
[   24.242135]  ret_from_fork_asm+0x1a/0x30
[   24.242444] 
[   24.242605] The buggy address belongs to the object at ffff888101bb7fa0
[   24.242605]  which belongs to the cache kmalloc-16 of size 16
[   24.243473] The buggy address is located 8 bytes inside of
[   24.243473]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.243817] 
[   24.243902] The buggy address belongs to the physical page:
[   24.244249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.244794] flags: 0x200000000000000(node=0|zone=2)
[   24.245178] page_type: f5(slab)
[   24.245351] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.245596] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.245880] page dumped because: kasan: bad access detected
[   24.246277] 
[   24.246467] Memory state around the buggy address:
[   24.246828]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.247220]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.247448] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.247650]                                   ^
[   24.247803]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.248257]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.248755] ==================================================================
[   24.353668] ==================================================================
[   24.354118] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   24.354447] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.354689] 
[   24.354798] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.354912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.354939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.354978] Call Trace:
[   24.355005]  <TASK>
[   24.355034]  dump_stack_lvl+0x73/0xb0
[   24.355082]  print_report+0xd1/0x650
[   24.355121]  ? __virt_addr_valid+0x1db/0x2d0
[   24.355160]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   24.355206]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.355250]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   24.355297]  kasan_report+0x141/0x180
[   24.355336]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   24.355396]  kasan_check_range+0x10c/0x1c0
[   24.355432]  __kasan_check_write+0x18/0x20
[   24.355463]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   24.355502]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.355544]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.355579]  ? trace_hardirqs_on+0x37/0xe0
[   24.355608]  ? kasan_bitops_generic+0x92/0x1c0
[   24.355651]  kasan_bitops_generic+0x121/0x1c0
[   24.355689]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.355731]  ? __pfx_read_tsc+0x10/0x10
[   24.355767]  ? ktime_get_ts64+0x86/0x230
[   24.355810]  kunit_try_run_case+0x1a5/0x480
[   24.355887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.355927]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.355967]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.356008]  ? __kthread_parkme+0x82/0x180
[   24.356045]  ? preempt_count_sub+0x50/0x80
[   24.356088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.356130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.356164]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.356196]  kthread+0x337/0x6f0
[   24.356224]  ? trace_preempt_on+0x20/0xc0
[   24.356259]  ? __pfx_kthread+0x10/0x10
[   24.356290]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.356327]  ? calculate_sigpending+0x7b/0xa0
[   24.356366]  ? __pfx_kthread+0x10/0x10
[   24.356419]  ret_from_fork+0x116/0x1d0
[   24.356455]  ? __pfx_kthread+0x10/0x10
[   24.356493]  ret_from_fork_asm+0x1a/0x30
[   24.356552]  </TASK>
[   24.356573] 
[   24.366048] Allocated by task 290:
[   24.366273]  kasan_save_stack+0x45/0x70
[   24.366452]  kasan_save_track+0x18/0x40
[   24.366610]  kasan_save_alloc_info+0x3b/0x50
[   24.366936]  __kasan_kmalloc+0xb7/0xc0
[   24.367183]  __kmalloc_cache_noprof+0x189/0x420
[   24.367501]  kasan_bitops_generic+0x92/0x1c0
[   24.367680]  kunit_try_run_case+0x1a5/0x480
[   24.367980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.368185]  kthread+0x337/0x6f0
[   24.368427]  ret_from_fork+0x116/0x1d0
[   24.368619]  ret_from_fork_asm+0x1a/0x30
[   24.368794] 
[   24.368906] The buggy address belongs to the object at ffff888101bb7fa0
[   24.368906]  which belongs to the cache kmalloc-16 of size 16
[   24.369492] The buggy address is located 8 bytes inside of
[   24.369492]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.370105] 
[   24.370205] The buggy address belongs to the physical page:
[   24.370395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.370634] flags: 0x200000000000000(node=0|zone=2)
[   24.370810] page_type: f5(slab)
[   24.370974] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.371395] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.371819] page dumped because: kasan: bad access detected
[   24.372173] 
[   24.372301] Memory state around the buggy address:
[   24.372601]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.373057]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.373477] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.373817]                                   ^
[   24.374082]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.374308]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.374776] ==================================================================
[   24.196522] ==================================================================
[   24.196881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   24.197706] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.198262] 
[   24.198396] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.198479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.198615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.198675] Call Trace:
[   24.198702]  <TASK>
[   24.198862]  dump_stack_lvl+0x73/0xb0
[   24.198924]  print_report+0xd1/0x650
[   24.198966]  ? __virt_addr_valid+0x1db/0x2d0
[   24.199002]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   24.199079]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.199133]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   24.199178]  kasan_report+0x141/0x180
[   24.199212]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   24.199262]  kasan_check_range+0x10c/0x1c0
[   24.199541]  __kasan_check_write+0x18/0x20
[   24.199751]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   24.199792]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.199817]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.199855]  ? trace_hardirqs_on+0x37/0xe0
[   24.199876]  ? kasan_bitops_generic+0x92/0x1c0
[   24.199900]  kasan_bitops_generic+0x121/0x1c0
[   24.199919]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.199940]  ? __pfx_read_tsc+0x10/0x10
[   24.199957]  ? ktime_get_ts64+0x86/0x230
[   24.199978]  kunit_try_run_case+0x1a5/0x480
[   24.199998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.200018]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.200037]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.200087]  ? __kthread_parkme+0x82/0x180
[   24.200117]  ? preempt_count_sub+0x50/0x80
[   24.200147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.200179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.200207]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.200228]  kthread+0x337/0x6f0
[   24.200244]  ? trace_preempt_on+0x20/0xc0
[   24.200264]  ? __pfx_kthread+0x10/0x10
[   24.200282]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.200299]  ? calculate_sigpending+0x7b/0xa0
[   24.200319]  ? __pfx_kthread+0x10/0x10
[   24.200337]  ret_from_fork+0x116/0x1d0
[   24.200353]  ? __pfx_kthread+0x10/0x10
[   24.200370]  ret_from_fork_asm+0x1a/0x30
[   24.200416]  </TASK>
[   24.200427] 
[   24.212200] Allocated by task 290:
[   24.212350]  kasan_save_stack+0x45/0x70
[   24.212666]  kasan_save_track+0x18/0x40
[   24.213009]  kasan_save_alloc_info+0x3b/0x50
[   24.213456]  __kasan_kmalloc+0xb7/0xc0
[   24.214139]  __kmalloc_cache_noprof+0x189/0x420
[   24.214570]  kasan_bitops_generic+0x92/0x1c0
[   24.214747]  kunit_try_run_case+0x1a5/0x480
[   24.214916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.215103]  kthread+0x337/0x6f0
[   24.215234]  ret_from_fork+0x116/0x1d0
[   24.215387]  ret_from_fork_asm+0x1a/0x30
[   24.215672] 
[   24.215810] The buggy address belongs to the object at ffff888101bb7fa0
[   24.215810]  which belongs to the cache kmalloc-16 of size 16
[   24.216563] The buggy address is located 8 bytes inside of
[   24.216563]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.218030] 
[   24.218326] The buggy address belongs to the physical page:
[   24.218772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.219341] flags: 0x200000000000000(node=0|zone=2)
[   24.219765] page_type: f5(slab)
[   24.220241] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.220628] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.221487] page dumped because: kasan: bad access detected
[   24.221775] 
[   24.221965] Memory state around the buggy address:
[   24.222594]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.223168]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.223403] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.223910]                                   ^
[   24.224350]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.225051]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.225615] ==================================================================
[   24.303623] ==================================================================
[   24.304710] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   24.305264] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.305679] 
[   24.305919] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.306029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.306056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.306096] Call Trace:
[   24.306123]  <TASK>
[   24.306153]  dump_stack_lvl+0x73/0xb0
[   24.306206]  print_report+0xd1/0x650
[   24.306243]  ? __virt_addr_valid+0x1db/0x2d0
[   24.306283]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   24.306367]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.306447]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   24.306498]  kasan_report+0x141/0x180
[   24.306542]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   24.306601]  kasan_check_range+0x10c/0x1c0
[   24.306647]  __kasan_check_write+0x18/0x20
[   24.306684]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   24.306714]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.306739]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.306762]  ? trace_hardirqs_on+0x37/0xe0
[   24.306782]  ? kasan_bitops_generic+0x92/0x1c0
[   24.306805]  kasan_bitops_generic+0x121/0x1c0
[   24.306837]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.306878]  ? __pfx_read_tsc+0x10/0x10
[   24.306897]  ? ktime_get_ts64+0x86/0x230
[   24.306920]  kunit_try_run_case+0x1a5/0x480
[   24.306943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.306961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.306979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.306999]  ? __kthread_parkme+0x82/0x180
[   24.307016]  ? preempt_count_sub+0x50/0x80
[   24.307035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.307055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.307074]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.307093]  kthread+0x337/0x6f0
[   24.307110]  ? trace_preempt_on+0x20/0xc0
[   24.307128]  ? __pfx_kthread+0x10/0x10
[   24.307145]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.307163]  ? calculate_sigpending+0x7b/0xa0
[   24.307182]  ? __pfx_kthread+0x10/0x10
[   24.307200]  ret_from_fork+0x116/0x1d0
[   24.307216]  ? __pfx_kthread+0x10/0x10
[   24.307233]  ret_from_fork_asm+0x1a/0x30
[   24.307260]  </TASK>
[   24.307271] 
[   24.319107] Allocated by task 290:
[   24.319281]  kasan_save_stack+0x45/0x70
[   24.319475]  kasan_save_track+0x18/0x40
[   24.319642]  kasan_save_alloc_info+0x3b/0x50
[   24.319828]  __kasan_kmalloc+0xb7/0xc0
[   24.320625]  __kmalloc_cache_noprof+0x189/0x420
[   24.320787]  kasan_bitops_generic+0x92/0x1c0
[   24.321012]  kunit_try_run_case+0x1a5/0x480
[   24.321246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.321496]  kthread+0x337/0x6f0
[   24.321684]  ret_from_fork+0x116/0x1d0
[   24.321904]  ret_from_fork_asm+0x1a/0x30
[   24.322131] 
[   24.322277] The buggy address belongs to the object at ffff888101bb7fa0
[   24.322277]  which belongs to the cache kmalloc-16 of size 16
[   24.322778] The buggy address is located 8 bytes inside of
[   24.322778]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.323179] 
[   24.323356] The buggy address belongs to the physical page:
[   24.323797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.324400] flags: 0x200000000000000(node=0|zone=2)
[   24.324791] page_type: f5(slab)
[   24.325096] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.325602] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.326085] page dumped because: kasan: bad access detected
[   24.326316] 
[   24.326494] Memory state around the buggy address:
[   24.326857]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.327097]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.327613] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.328144]                                   ^
[   24.328420]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.328793]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.329296] ==================================================================
[   24.404673] ==================================================================
[   24.405646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   24.406466] Read of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.406829] 
[   24.407473] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.407667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.407681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.407698] Call Trace:
[   24.407712]  <TASK>
[   24.407727]  dump_stack_lvl+0x73/0xb0
[   24.407756]  print_report+0xd1/0x650
[   24.407775]  ? __virt_addr_valid+0x1db/0x2d0
[   24.407793]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   24.407816]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.407858]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   24.407882]  kasan_report+0x141/0x180
[   24.407900]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   24.407926]  __asan_report_load8_noabort+0x18/0x20
[   24.407946]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   24.407968]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.407991]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.408011]  ? trace_hardirqs_on+0x37/0xe0
[   24.408029]  ? kasan_bitops_generic+0x92/0x1c0
[   24.408051]  kasan_bitops_generic+0x121/0x1c0
[   24.408070]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.408091]  ? __pfx_read_tsc+0x10/0x10
[   24.408108]  ? ktime_get_ts64+0x86/0x230
[   24.408128]  kunit_try_run_case+0x1a5/0x480
[   24.408149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.408167]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.408185]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.408204]  ? __kthread_parkme+0x82/0x180
[   24.408221]  ? preempt_count_sub+0x50/0x80
[   24.408240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.408260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.408279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.408298]  kthread+0x337/0x6f0
[   24.408314]  ? trace_preempt_on+0x20/0xc0
[   24.408332]  ? __pfx_kthread+0x10/0x10
[   24.408349]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.408367]  ? calculate_sigpending+0x7b/0xa0
[   24.408404]  ? __pfx_kthread+0x10/0x10
[   24.408424]  ret_from_fork+0x116/0x1d0
[   24.408440]  ? __pfx_kthread+0x10/0x10
[   24.408457]  ret_from_fork_asm+0x1a/0x30
[   24.408484]  </TASK>
[   24.408495] 
[   24.420305] Allocated by task 290:
[   24.420563]  kasan_save_stack+0x45/0x70
[   24.420836]  kasan_save_track+0x18/0x40
[   24.421534]  kasan_save_alloc_info+0x3b/0x50
[   24.421705]  __kasan_kmalloc+0xb7/0xc0
[   24.422206]  __kmalloc_cache_noprof+0x189/0x420
[   24.422586]  kasan_bitops_generic+0x92/0x1c0
[   24.423096]  kunit_try_run_case+0x1a5/0x480
[   24.423330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.423570]  kthread+0x337/0x6f0
[   24.423788]  ret_from_fork+0x116/0x1d0
[   24.424285]  ret_from_fork_asm+0x1a/0x30
[   24.424605] 
[   24.424756] The buggy address belongs to the object at ffff888101bb7fa0
[   24.424756]  which belongs to the cache kmalloc-16 of size 16
[   24.425594] The buggy address is located 8 bytes inside of
[   24.425594]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.426561] 
[   24.426698] The buggy address belongs to the physical page:
[   24.426996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.427641] flags: 0x200000000000000(node=0|zone=2)
[   24.428029] page_type: f5(slab)
[   24.428176] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.428581] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.429268] page dumped because: kasan: bad access detected
[   24.429513] 
[   24.429613] Memory state around the buggy address:
[   24.430034]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.430588]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.431142] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.431621]                                   ^
[   24.431757]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.432346]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.432682] ==================================================================
[   24.249529] ==================================================================
[   24.249857] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   24.250476] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.250817] 
[   24.250998] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.251097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.251126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.251158] Call Trace:
[   24.251195]  <TASK>
[   24.251222]  dump_stack_lvl+0x73/0xb0
[   24.251274]  print_report+0xd1/0x650
[   24.251314]  ? __virt_addr_valid+0x1db/0x2d0
[   24.251352]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   24.251408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.251451]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   24.251492]  kasan_report+0x141/0x180
[   24.251528]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   24.251587]  kasan_check_range+0x10c/0x1c0
[   24.251629]  __kasan_check_write+0x18/0x20
[   24.251687]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   24.251731]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.251793]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.251834]  ? trace_hardirqs_on+0x37/0xe0
[   24.251876]  ? kasan_bitops_generic+0x92/0x1c0
[   24.251922]  kasan_bitops_generic+0x121/0x1c0
[   24.251967]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.252010]  ? __pfx_read_tsc+0x10/0x10
[   24.252066]  ? ktime_get_ts64+0x86/0x230
[   24.252109]  kunit_try_run_case+0x1a5/0x480
[   24.252167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.252206]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.252247]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.252284]  ? __kthread_parkme+0x82/0x180
[   24.252318]  ? preempt_count_sub+0x50/0x80
[   24.252357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.252421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.252476]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.252509]  kthread+0x337/0x6f0
[   24.252528]  ? trace_preempt_on+0x20/0xc0
[   24.252548]  ? __pfx_kthread+0x10/0x10
[   24.252566]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.252584]  ? calculate_sigpending+0x7b/0xa0
[   24.252604]  ? __pfx_kthread+0x10/0x10
[   24.252622]  ret_from_fork+0x116/0x1d0
[   24.252639]  ? __pfx_kthread+0x10/0x10
[   24.252656]  ret_from_fork_asm+0x1a/0x30
[   24.252683]  </TASK>
[   24.252694] 
[   24.262109] Allocated by task 290:
[   24.262423]  kasan_save_stack+0x45/0x70
[   24.262717]  kasan_save_track+0x18/0x40
[   24.263046]  kasan_save_alloc_info+0x3b/0x50
[   24.263227]  __kasan_kmalloc+0xb7/0xc0
[   24.263373]  __kmalloc_cache_noprof+0x189/0x420
[   24.263644]  kasan_bitops_generic+0x92/0x1c0
[   24.263946]  kunit_try_run_case+0x1a5/0x480
[   24.264287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.264562]  kthread+0x337/0x6f0
[   24.264676]  ret_from_fork+0x116/0x1d0
[   24.264922]  ret_from_fork_asm+0x1a/0x30
[   24.265312] 
[   24.265468] The buggy address belongs to the object at ffff888101bb7fa0
[   24.265468]  which belongs to the cache kmalloc-16 of size 16
[   24.266173] The buggy address is located 8 bytes inside of
[   24.266173]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.266765] 
[   24.266968] The buggy address belongs to the physical page:
[   24.267261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.267630] flags: 0x200000000000000(node=0|zone=2)
[   24.267853] page_type: f5(slab)
[   24.268149] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.268406] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.268629] page dumped because: kasan: bad access detected
[   24.268800] 
[   24.268881] Memory state around the buggy address:
[   24.269039]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.269252]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.269621] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.270182]                                   ^
[   24.270536]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.271083]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.271547] ==================================================================
[   24.329917] ==================================================================
[   24.330357] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   24.330715] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.331259] 
[   24.331452] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.331535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.331559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.331594] Call Trace:
[   24.331620]  <TASK>
[   24.331647]  dump_stack_lvl+0x73/0xb0
[   24.331698]  print_report+0xd1/0x650
[   24.331730]  ? __virt_addr_valid+0x1db/0x2d0
[   24.331764]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   24.331803]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.331902]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   24.331960]  kasan_report+0x141/0x180
[   24.332002]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   24.332075]  kasan_check_range+0x10c/0x1c0
[   24.332117]  __kasan_check_write+0x18/0x20
[   24.332170]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   24.332215]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.332286]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.332343]  ? trace_hardirqs_on+0x37/0xe0
[   24.332396]  ? kasan_bitops_generic+0x92/0x1c0
[   24.332441]  kasan_bitops_generic+0x121/0x1c0
[   24.332474]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.332496]  ? __pfx_read_tsc+0x10/0x10
[   24.332515]  ? ktime_get_ts64+0x86/0x230
[   24.332535]  kunit_try_run_case+0x1a5/0x480
[   24.332556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.332574]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.332593]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.332621]  ? __kthread_parkme+0x82/0x180
[   24.332651]  ? preempt_count_sub+0x50/0x80
[   24.332691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.332731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.332771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.332809]  kthread+0x337/0x6f0
[   24.332875]  ? trace_preempt_on+0x20/0xc0
[   24.332913]  ? __pfx_kthread+0x10/0x10
[   24.332964]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.333005]  ? calculate_sigpending+0x7b/0xa0
[   24.333047]  ? __pfx_kthread+0x10/0x10
[   24.333088]  ret_from_fork+0x116/0x1d0
[   24.333122]  ? __pfx_kthread+0x10/0x10
[   24.333144]  ret_from_fork_asm+0x1a/0x30
[   24.333171]  </TASK>
[   24.333183] 
[   24.342654] Allocated by task 290:
[   24.342967]  kasan_save_stack+0x45/0x70
[   24.343262]  kasan_save_track+0x18/0x40
[   24.343471]  kasan_save_alloc_info+0x3b/0x50
[   24.343710]  __kasan_kmalloc+0xb7/0xc0
[   24.343983]  __kmalloc_cache_noprof+0x189/0x420
[   24.344274]  kasan_bitops_generic+0x92/0x1c0
[   24.344572]  kunit_try_run_case+0x1a5/0x480
[   24.344847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.345168]  kthread+0x337/0x6f0
[   24.345440]  ret_from_fork+0x116/0x1d0
[   24.345630]  ret_from_fork_asm+0x1a/0x30
[   24.345768] 
[   24.345950] The buggy address belongs to the object at ffff888101bb7fa0
[   24.345950]  which belongs to the cache kmalloc-16 of size 16
[   24.346488] The buggy address is located 8 bytes inside of
[   24.346488]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.346888] 
[   24.346982] The buggy address belongs to the physical page:
[   24.347164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.347422] flags: 0x200000000000000(node=0|zone=2)
[   24.347769] page_type: f5(slab)
[   24.348048] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.348558] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.349056] page dumped because: kasan: bad access detected
[   24.349452] 
[   24.349602] Memory state around the buggy address:
[   24.349951]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.350435]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.350805] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.351172]                                   ^
[   24.351371]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.352874]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.353100] ==================================================================
[   24.274220] ==================================================================
[   24.274535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   24.275645] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.275898] 
[   24.276002] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.276081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.276105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.276140] Call Trace:
[   24.276165]  <TASK>
[   24.276193]  dump_stack_lvl+0x73/0xb0
[   24.276244]  print_report+0xd1/0x650
[   24.276285]  ? __virt_addr_valid+0x1db/0x2d0
[   24.276326]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   24.276372]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.276432]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   24.276480]  kasan_report+0x141/0x180
[   24.276520]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   24.276576]  kasan_check_range+0x10c/0x1c0
[   24.276620]  __kasan_check_write+0x18/0x20
[   24.276660]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   24.276708]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.276756]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.276799]  ? trace_hardirqs_on+0x37/0xe0
[   24.276837]  ? kasan_bitops_generic+0x92/0x1c0
[   24.276886]  kasan_bitops_generic+0x121/0x1c0
[   24.276928]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.276971]  ? __pfx_read_tsc+0x10/0x10
[   24.277008]  ? ktime_get_ts64+0x86/0x230
[   24.277051]  kunit_try_run_case+0x1a5/0x480
[   24.277093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.277134]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.277173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.277215]  ? __kthread_parkme+0x82/0x180
[   24.277253]  ? preempt_count_sub+0x50/0x80
[   24.277291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.277324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.277361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.277414]  kthread+0x337/0x6f0
[   24.277450]  ? trace_preempt_on+0x20/0xc0
[   24.277491]  ? __pfx_kthread+0x10/0x10
[   24.277530]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.277566]  ? calculate_sigpending+0x7b/0xa0
[   24.277608]  ? __pfx_kthread+0x10/0x10
[   24.277650]  ret_from_fork+0x116/0x1d0
[   24.277676]  ? __pfx_kthread+0x10/0x10
[   24.277720]  ret_from_fork_asm+0x1a/0x30
[   24.277790]  </TASK>
[   24.277815] 
[   24.291495] Allocated by task 290:
[   24.291650]  kasan_save_stack+0x45/0x70
[   24.292020]  kasan_save_track+0x18/0x40
[   24.292362]  kasan_save_alloc_info+0x3b/0x50
[   24.292726]  __kasan_kmalloc+0xb7/0xc0
[   24.293083]  __kmalloc_cache_noprof+0x189/0x420
[   24.293398]  kasan_bitops_generic+0x92/0x1c0
[   24.293715]  kunit_try_run_case+0x1a5/0x480
[   24.294018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.294455]  kthread+0x337/0x6f0
[   24.294737]  ret_from_fork+0x116/0x1d0
[   24.294937]  ret_from_fork_asm+0x1a/0x30
[   24.295097] 
[   24.295182] The buggy address belongs to the object at ffff888101bb7fa0
[   24.295182]  which belongs to the cache kmalloc-16 of size 16
[   24.296170] The buggy address is located 8 bytes inside of
[   24.296170]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.297021] 
[   24.297171] The buggy address belongs to the physical page:
[   24.297348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.297947] flags: 0x200000000000000(node=0|zone=2)
[   24.298419] page_type: f5(slab)
[   24.298614] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.298927] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.299473] page dumped because: kasan: bad access detected
[   24.299858] 
[   24.300033] Memory state around the buggy address:
[   24.300224]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.300457]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.301064] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.301557]                                   ^
[   24.301944]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.302186]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.302558] ==================================================================
[   24.375692] ==================================================================
[   24.376040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   24.376434] Read of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.376654] 
[   24.376758] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.376861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.376887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.376923] Call Trace:
[   24.376951]  <TASK>
[   24.376979]  dump_stack_lvl+0x73/0xb0
[   24.377029]  print_report+0xd1/0x650
[   24.377068]  ? __virt_addr_valid+0x1db/0x2d0
[   24.377109]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   24.377155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.377200]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   24.377248]  kasan_report+0x141/0x180
[   24.377281]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   24.377323]  kasan_check_range+0x10c/0x1c0
[   24.377356]  __kasan_check_read+0x15/0x20
[   24.377402]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   24.377443]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   24.377489]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.377530]  ? trace_hardirqs_on+0x37/0xe0
[   24.377568]  ? kasan_bitops_generic+0x92/0x1c0
[   24.377616]  kasan_bitops_generic+0x121/0x1c0
[   24.377658]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.377701]  ? __pfx_read_tsc+0x10/0x10
[   24.377739]  ? ktime_get_ts64+0x86/0x230
[   24.377784]  kunit_try_run_case+0x1a5/0x480
[   24.377857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.377900]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.377941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.377985]  ? __kthread_parkme+0x82/0x180
[   24.378033]  ? preempt_count_sub+0x50/0x80
[   24.378081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.378129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.378174]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.378220]  kthread+0x337/0x6f0
[   24.378259]  ? trace_preempt_on+0x20/0xc0
[   24.378303]  ? __pfx_kthread+0x10/0x10
[   24.378344]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.378397]  ? calculate_sigpending+0x7b/0xa0
[   24.378441]  ? __pfx_kthread+0x10/0x10
[   24.378473]  ret_from_fork+0x116/0x1d0
[   24.378502]  ? __pfx_kthread+0x10/0x10
[   24.378534]  ret_from_fork_asm+0x1a/0x30
[   24.378591]  </TASK>
[   24.378612] 
[   24.391567] Allocated by task 290:
[   24.391751]  kasan_save_stack+0x45/0x70
[   24.391890]  kasan_save_track+0x18/0x40
[   24.392528]  kasan_save_alloc_info+0x3b/0x50
[   24.392692]  __kasan_kmalloc+0xb7/0xc0
[   24.393231]  __kmalloc_cache_noprof+0x189/0x420
[   24.393496]  kasan_bitops_generic+0x92/0x1c0
[   24.394056]  kunit_try_run_case+0x1a5/0x480
[   24.394222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.394793]  kthread+0x337/0x6f0
[   24.395247]  ret_from_fork+0x116/0x1d0
[   24.395442]  ret_from_fork_asm+0x1a/0x30
[   24.395622] 
[   24.395716] The buggy address belongs to the object at ffff888101bb7fa0
[   24.395716]  which belongs to the cache kmalloc-16 of size 16
[   24.396704] The buggy address is located 8 bytes inside of
[   24.396704]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.397442] 
[   24.397588] The buggy address belongs to the physical page:
[   24.398261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.398562] flags: 0x200000000000000(node=0|zone=2)
[   24.398879] page_type: f5(slab)
[   24.399196] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.399511] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.399797] page dumped because: kasan: bad access detected
[   24.400764] 
[   24.400892] Memory state around the buggy address:
[   24.401072]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.401334]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.401864] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.402270]                                   ^
[   24.402523]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.402861]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.403715] ==================================================================