Hay
Date
July 4, 2025, 11:10 a.m.

Environment
qemu-x86_64

[   27.405659] ==================================================================
[   27.406031] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.406873] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.407564] 
[   27.407862] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.407931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.407944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.407968] Call Trace:
[   27.407989]  <TASK>
[   27.408010]  dump_stack_lvl+0x73/0xb0
[   27.408041]  print_report+0xd1/0x650
[   27.408064]  ? __virt_addr_valid+0x1db/0x2d0
[   27.408087]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.408114]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.408139]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.408167]  kasan_report+0x141/0x180
[   27.408189]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.408220]  kasan_check_range+0x10c/0x1c0
[   27.408253]  __kasan_check_write+0x18/0x20
[   27.408276]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.408304]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.408331]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.408356]  ? kasan_bitops_generic+0x92/0x1c0
[   27.408383]  kasan_bitops_generic+0x121/0x1c0
[   27.408420]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.408444]  ? __pfx_read_tsc+0x10/0x10
[   27.408466]  ? ktime_get_ts64+0x86/0x230
[   27.408492]  kunit_try_run_case+0x1a5/0x480
[   27.408518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.408542]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.408567]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.408592]  ? __kthread_parkme+0x82/0x180
[   27.408613]  ? preempt_count_sub+0x50/0x80
[   27.408637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.408662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.408687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.408712]  kthread+0x337/0x6f0
[   27.408733]  ? trace_preempt_on+0x20/0xc0
[   27.408757]  ? __pfx_kthread+0x10/0x10
[   27.408779]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.408801]  ? calculate_sigpending+0x7b/0xa0
[   27.408825]  ? __pfx_kthread+0x10/0x10
[   27.408847]  ret_from_fork+0x116/0x1d0
[   27.408867]  ? __pfx_kthread+0x10/0x10
[   27.408902]  ret_from_fork_asm+0x1a/0x30
[   27.408936]  </TASK>
[   27.408948] 
[   27.421018] Allocated by task 310:
[   27.421386]  kasan_save_stack+0x45/0x70
[   27.421607]  kasan_save_track+0x18/0x40
[   27.421765]  kasan_save_alloc_info+0x3b/0x50
[   27.422262]  __kasan_kmalloc+0xb7/0xc0
[   27.422466]  __kmalloc_cache_noprof+0x189/0x420
[   27.422801]  kasan_bitops_generic+0x92/0x1c0
[   27.423060]  kunit_try_run_case+0x1a5/0x480
[   27.423553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.423805]  kthread+0x337/0x6f0
[   27.423947]  ret_from_fork+0x116/0x1d0
[   27.424143]  ret_from_fork_asm+0x1a/0x30
[   27.424366] 
[   27.424476] The buggy address belongs to the object at ffff88810527f2e0
[   27.424476]  which belongs to the cache kmalloc-16 of size 16
[   27.424930] The buggy address is located 8 bytes inside of
[   27.424930]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.425452] 
[   27.425554] The buggy address belongs to the physical page:
[   27.425806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.426079] flags: 0x200000000000000(node=0|zone=2)
[   27.426438] page_type: f5(slab)
[   27.426589] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.426871] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.427274] page dumped because: kasan: bad access detected
[   27.427509] 
[   27.427604] Memory state around the buggy address:
[   27.427789]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.428105]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.428375] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.428675]                                                           ^
[   27.428989]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.429206]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.429517] ==================================================================
[   27.430001] ==================================================================
[   27.430522] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.430999] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.431351] 
[   27.431471] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.431522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.431535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.431558] Call Trace:
[   27.431577]  <TASK>
[   27.431597]  dump_stack_lvl+0x73/0xb0
[   27.431625]  print_report+0xd1/0x650
[   27.431648]  ? __virt_addr_valid+0x1db/0x2d0
[   27.431674]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.431700]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.431726]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.431754]  kasan_report+0x141/0x180
[   27.431777]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.431809]  kasan_check_range+0x10c/0x1c0
[   27.431833]  __kasan_check_write+0x18/0x20
[   27.431856]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.432230]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.432275]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.432301]  ? kasan_bitops_generic+0x92/0x1c0
[   27.432329]  kasan_bitops_generic+0x121/0x1c0
[   27.432354]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.432380]  ? __pfx_read_tsc+0x10/0x10
[   27.432416]  ? ktime_get_ts64+0x86/0x230
[   27.432442]  kunit_try_run_case+0x1a5/0x480
[   27.432468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.432546]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.432576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.432602]  ? __kthread_parkme+0x82/0x180
[   27.432625]  ? preempt_count_sub+0x50/0x80
[   27.432650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.432676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.432701]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.432727]  kthread+0x337/0x6f0
[   27.432747]  ? trace_preempt_on+0x20/0xc0
[   27.432773]  ? __pfx_kthread+0x10/0x10
[   27.432796]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.432819]  ? calculate_sigpending+0x7b/0xa0
[   27.432845]  ? __pfx_kthread+0x10/0x10
[   27.432867]  ret_from_fork+0x116/0x1d0
[   27.432887]  ? __pfx_kthread+0x10/0x10
[   27.432908]  ret_from_fork_asm+0x1a/0x30
[   27.432941]  </TASK>
[   27.432954] 
[   27.441702] Allocated by task 310:
[   27.441922]  kasan_save_stack+0x45/0x70
[   27.442095]  kasan_save_track+0x18/0x40
[   27.442428]  kasan_save_alloc_info+0x3b/0x50
[   27.442606]  __kasan_kmalloc+0xb7/0xc0
[   27.442748]  __kmalloc_cache_noprof+0x189/0x420
[   27.442904]  kasan_bitops_generic+0x92/0x1c0
[   27.443081]  kunit_try_run_case+0x1a5/0x480
[   27.443297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.443565]  kthread+0x337/0x6f0
[   27.443754]  ret_from_fork+0x116/0x1d0
[   27.443897]  ret_from_fork_asm+0x1a/0x30
[   27.444210] 
[   27.444316] The buggy address belongs to the object at ffff88810527f2e0
[   27.444316]  which belongs to the cache kmalloc-16 of size 16
[   27.444770] The buggy address is located 8 bytes inside of
[   27.444770]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.445360] 
[   27.445493] The buggy address belongs to the physical page:
[   27.445768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.446284] flags: 0x200000000000000(node=0|zone=2)
[   27.446549] page_type: f5(slab)
[   27.446732] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.447058] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.447382] page dumped because: kasan: bad access detected
[   27.447741] 
[   27.447828] Memory state around the buggy address:
[   27.448048]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.448287]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.448578] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.448910]                                                           ^
[   27.449442]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.449771]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.450310] ==================================================================
[   27.577113] ==================================================================
[   27.577832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.578360] Read of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.578937] 
[   27.579038] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.579097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.579112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.579138] Call Trace:
[   27.579162]  <TASK>
[   27.579184]  dump_stack_lvl+0x73/0xb0
[   27.579217]  print_report+0xd1/0x650
[   27.579241]  ? __virt_addr_valid+0x1db/0x2d0
[   27.579267]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.579296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.579324]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.579353]  kasan_report+0x141/0x180
[   27.579376]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.579421]  __asan_report_load8_noabort+0x18/0x20
[   27.579448]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.579477]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.579507]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.579533]  ? kasan_bitops_generic+0x92/0x1c0
[   27.579562]  kasan_bitops_generic+0x121/0x1c0
[   27.579587]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.579614]  ? __pfx_read_tsc+0x10/0x10
[   27.579639]  ? ktime_get_ts64+0x86/0x230
[   27.579667]  kunit_try_run_case+0x1a5/0x480
[   27.579696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.579722]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.579749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.579777]  ? __kthread_parkme+0x82/0x180
[   27.579800]  ? preempt_count_sub+0x50/0x80
[   27.579826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.579854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.579897]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.579925]  kthread+0x337/0x6f0
[   27.579947]  ? trace_preempt_on+0x20/0xc0
[   27.579973]  ? __pfx_kthread+0x10/0x10
[   27.579996]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.580021]  ? calculate_sigpending+0x7b/0xa0
[   27.580047]  ? __pfx_kthread+0x10/0x10
[   27.580071]  ret_from_fork+0x116/0x1d0
[   27.580092]  ? __pfx_kthread+0x10/0x10
[   27.580115]  ret_from_fork_asm+0x1a/0x30
[   27.580159]  </TASK>
[   27.580173] 
[   27.588900] Allocated by task 310:
[   27.589049]  kasan_save_stack+0x45/0x70
[   27.589206]  kasan_save_track+0x18/0x40
[   27.589423]  kasan_save_alloc_info+0x3b/0x50
[   27.589645]  __kasan_kmalloc+0xb7/0xc0
[   27.589877]  __kmalloc_cache_noprof+0x189/0x420
[   27.590177]  kasan_bitops_generic+0x92/0x1c0
[   27.590380]  kunit_try_run_case+0x1a5/0x480
[   27.590549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.590737]  kthread+0x337/0x6f0
[   27.590865]  ret_from_fork+0x116/0x1d0
[   27.591152]  ret_from_fork_asm+0x1a/0x30
[   27.591496] 
[   27.591600] The buggy address belongs to the object at ffff88810527f2e0
[   27.591600]  which belongs to the cache kmalloc-16 of size 16
[   27.592213] The buggy address is located 8 bytes inside of
[   27.592213]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.592699] 
[   27.592777] The buggy address belongs to the physical page:
[   27.592965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.593226] flags: 0x200000000000000(node=0|zone=2)
[   27.593414] page_type: f5(slab)
[   27.593600] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.594144] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.594582] page dumped because: kasan: bad access detected
[   27.594918] 
[   27.595035] Memory state around the buggy address:
[   27.595254]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.595731]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.596052] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.596494]                                                           ^
[   27.596797]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.597099]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.597329] ==================================================================
[   27.450855] ==================================================================
[   27.451441] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.451775] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.452036] 
[   27.452156] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.452210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.452233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.452258] Call Trace:
[   27.452277]  <TASK>
[   27.452295]  dump_stack_lvl+0x73/0xb0
[   27.452324]  print_report+0xd1/0x650
[   27.452348]  ? __virt_addr_valid+0x1db/0x2d0
[   27.452374]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.452413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.452441]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.452470]  kasan_report+0x141/0x180
[   27.452494]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.452527]  kasan_check_range+0x10c/0x1c0
[   27.452611]  __kasan_check_write+0x18/0x20
[   27.452636]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.452665]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.452695]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.452722]  ? kasan_bitops_generic+0x92/0x1c0
[   27.452753]  kasan_bitops_generic+0x121/0x1c0
[   27.452777]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.452804]  ? __pfx_read_tsc+0x10/0x10
[   27.452827]  ? ktime_get_ts64+0x86/0x230
[   27.452855]  kunit_try_run_case+0x1a5/0x480
[   27.452881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.452908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.452935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.452963]  ? __kthread_parkme+0x82/0x180
[   27.452987]  ? preempt_count_sub+0x50/0x80
[   27.453013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.453041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.453068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.453094]  kthread+0x337/0x6f0
[   27.453134]  ? trace_preempt_on+0x20/0xc0
[   27.453328]  ? __pfx_kthread+0x10/0x10
[   27.453362]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.453388]  ? calculate_sigpending+0x7b/0xa0
[   27.453429]  ? __pfx_kthread+0x10/0x10
[   27.453453]  ret_from_fork+0x116/0x1d0
[   27.453475]  ? __pfx_kthread+0x10/0x10
[   27.453498]  ret_from_fork_asm+0x1a/0x30
[   27.453531]  </TASK>
[   27.453544] 
[   27.462518] Allocated by task 310:
[   27.462890]  kasan_save_stack+0x45/0x70
[   27.463341]  kasan_save_track+0x18/0x40
[   27.463508]  kasan_save_alloc_info+0x3b/0x50
[   27.463667]  __kasan_kmalloc+0xb7/0xc0
[   27.463811]  __kmalloc_cache_noprof+0x189/0x420
[   27.464329]  kasan_bitops_generic+0x92/0x1c0
[   27.464582]  kunit_try_run_case+0x1a5/0x480
[   27.464806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.465244]  kthread+0x337/0x6f0
[   27.465434]  ret_from_fork+0x116/0x1d0
[   27.465614]  ret_from_fork_asm+0x1a/0x30
[   27.465795] 
[   27.465868] The buggy address belongs to the object at ffff88810527f2e0
[   27.465868]  which belongs to the cache kmalloc-16 of size 16
[   27.466611] The buggy address is located 8 bytes inside of
[   27.466611]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.467129] 
[   27.467252] The buggy address belongs to the physical page:
[   27.467523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.467877] flags: 0x200000000000000(node=0|zone=2)
[   27.468204] page_type: f5(slab)
[   27.468371] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.468710] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.468968] page dumped because: kasan: bad access detected
[   27.469148] 
[   27.469218] Memory state around the buggy address:
[   27.469382]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.469688]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.470490] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.470854]                                                           ^
[   27.471249]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.471568]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.471845] ==================================================================
[   27.472599] ==================================================================
[   27.472944] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.473385] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.473651] 
[   27.473751] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.473804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.473817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.473843] Call Trace:
[   27.473863]  <TASK>
[   27.473892]  dump_stack_lvl+0x73/0xb0
[   27.473923]  print_report+0xd1/0x650
[   27.473948]  ? __virt_addr_valid+0x1db/0x2d0
[   27.473977]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.474007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.474036]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.474066]  kasan_report+0x141/0x180
[   27.474093]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.474128]  kasan_check_range+0x10c/0x1c0
[   27.474164]  __kasan_check_write+0x18/0x20
[   27.474190]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.474221]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.474251]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.474279]  ? kasan_bitops_generic+0x92/0x1c0
[   27.474308]  kasan_bitops_generic+0x121/0x1c0
[   27.474334]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.474361]  ? __pfx_read_tsc+0x10/0x10
[   27.474384]  ? ktime_get_ts64+0x86/0x230
[   27.474427]  kunit_try_run_case+0x1a5/0x480
[   27.474455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.474481]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.474507]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.474535]  ? __kthread_parkme+0x82/0x180
[   27.474557]  ? preempt_count_sub+0x50/0x80
[   27.474584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.474611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.474637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.474664]  kthread+0x337/0x6f0
[   27.474685]  ? trace_preempt_on+0x20/0xc0
[   27.474711]  ? __pfx_kthread+0x10/0x10
[   27.474735]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.474760]  ? calculate_sigpending+0x7b/0xa0
[   27.474789]  ? __pfx_kthread+0x10/0x10
[   27.474812]  ret_from_fork+0x116/0x1d0
[   27.474834]  ? __pfx_kthread+0x10/0x10
[   27.474857]  ret_from_fork_asm+0x1a/0x30
[   27.474891]  </TASK>
[   27.474904] 
[   27.484238] Allocated by task 310:
[   27.484447]  kasan_save_stack+0x45/0x70
[   27.484668]  kasan_save_track+0x18/0x40
[   27.484874]  kasan_save_alloc_info+0x3b/0x50
[   27.485458]  __kasan_kmalloc+0xb7/0xc0
[   27.485612]  __kmalloc_cache_noprof+0x189/0x420
[   27.485777]  kasan_bitops_generic+0x92/0x1c0
[   27.485933]  kunit_try_run_case+0x1a5/0x480
[   27.486367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.486668]  kthread+0x337/0x6f0
[   27.486855]  ret_from_fork+0x116/0x1d0
[   27.487064]  ret_from_fork_asm+0x1a/0x30
[   27.487277] 
[   27.487371] The buggy address belongs to the object at ffff88810527f2e0
[   27.487371]  which belongs to the cache kmalloc-16 of size 16
[   27.487977] The buggy address is located 8 bytes inside of
[   27.487977]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.488679] 
[   27.488768] The buggy address belongs to the physical page:
[   27.489128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.489630] flags: 0x200000000000000(node=0|zone=2)
[   27.489915] page_type: f5(slab)
[   27.490052] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.490525] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.490858] page dumped because: kasan: bad access detected
[   27.491117] 
[   27.491223] Memory state around the buggy address:
[   27.491460]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.491727]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.492004] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.492419]                                                           ^
[   27.492635]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.493344]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.493685] ==================================================================
[   27.494143] ==================================================================
[   27.494542] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.495106] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.495430] 
[   27.495532] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.495591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.495605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.495630] Call Trace:
[   27.495654]  <TASK>
[   27.495678]  dump_stack_lvl+0x73/0xb0
[   27.495711]  print_report+0xd1/0x650
[   27.495738]  ? __virt_addr_valid+0x1db/0x2d0
[   27.495765]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.495794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.495823]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.495853]  kasan_report+0x141/0x180
[   27.495876]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.495910]  kasan_check_range+0x10c/0x1c0
[   27.495936]  __kasan_check_write+0x18/0x20
[   27.495961]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.495991]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.496020]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.496048]  ? kasan_bitops_generic+0x92/0x1c0
[   27.496077]  kasan_bitops_generic+0x121/0x1c0
[   27.496102]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.496128]  ? __pfx_read_tsc+0x10/0x10
[   27.496153]  ? ktime_get_ts64+0x86/0x230
[   27.496180]  kunit_try_run_case+0x1a5/0x480
[   27.496209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.496244]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.496272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.496300]  ? __kthread_parkme+0x82/0x180
[   27.496323]  ? preempt_count_sub+0x50/0x80
[   27.496349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.496376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.496414]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.496441]  kthread+0x337/0x6f0
[   27.496463]  ? trace_preempt_on+0x20/0xc0
[   27.496488]  ? __pfx_kthread+0x10/0x10
[   27.496512]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.496538]  ? calculate_sigpending+0x7b/0xa0
[   27.496565]  ? __pfx_kthread+0x10/0x10
[   27.496590]  ret_from_fork+0x116/0x1d0
[   27.496612]  ? __pfx_kthread+0x10/0x10
[   27.496636]  ret_from_fork_asm+0x1a/0x30
[   27.496672]  </TASK>
[   27.496686] 
[   27.506569] Allocated by task 310:
[   27.506768]  kasan_save_stack+0x45/0x70
[   27.506996]  kasan_save_track+0x18/0x40
[   27.507290]  kasan_save_alloc_info+0x3b/0x50
[   27.507532]  __kasan_kmalloc+0xb7/0xc0
[   27.507715]  __kmalloc_cache_noprof+0x189/0x420
[   27.507879]  kasan_bitops_generic+0x92/0x1c0
[   27.508033]  kunit_try_run_case+0x1a5/0x480
[   27.508212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.508622]  kthread+0x337/0x6f0
[   27.508811]  ret_from_fork+0x116/0x1d0
[   27.508979]  ret_from_fork_asm+0x1a/0x30
[   27.509128] 
[   27.509201] The buggy address belongs to the object at ffff88810527f2e0
[   27.509201]  which belongs to the cache kmalloc-16 of size 16
[   27.510377] The buggy address is located 8 bytes inside of
[   27.510377]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.510841] 
[   27.510921] The buggy address belongs to the physical page:
[   27.511109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.511432] flags: 0x200000000000000(node=0|zone=2)
[   27.511768] page_type: f5(slab)
[   27.512029] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.512701] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.513299] page dumped because: kasan: bad access detected
[   27.513502] 
[   27.513577] Memory state around the buggy address:
[   27.513747]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.513983]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.514308] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.515207]                                                           ^
[   27.515587]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.515907]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.516149] ==================================================================
[   27.542204] ==================================================================
[   27.543027] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.543713] Read of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.544438] 
[   27.544692] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.544756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.544771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.544805] Call Trace:
[   27.544828]  <TASK>
[   27.544850]  dump_stack_lvl+0x73/0xb0
[   27.544884]  print_report+0xd1/0x650
[   27.544908]  ? __virt_addr_valid+0x1db/0x2d0
[   27.544935]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.544964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.544993]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.545023]  kasan_report+0x141/0x180
[   27.545047]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.545083]  kasan_check_range+0x10c/0x1c0
[   27.545109]  __kasan_check_read+0x15/0x20
[   27.545133]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.545278]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.545311]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.545339]  ? kasan_bitops_generic+0x92/0x1c0
[   27.545368]  kasan_bitops_generic+0x121/0x1c0
[   27.545444]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.545473]  ? __pfx_read_tsc+0x10/0x10
[   27.545498]  ? ktime_get_ts64+0x86/0x230
[   27.545526]  kunit_try_run_case+0x1a5/0x480
[   27.545554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.545579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.545607]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.545634]  ? __kthread_parkme+0x82/0x180
[   27.545656]  ? preempt_count_sub+0x50/0x80
[   27.545683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.545711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.545739]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.545766]  kthread+0x337/0x6f0
[   27.545788]  ? trace_preempt_on+0x20/0xc0
[   27.545815]  ? __pfx_kthread+0x10/0x10
[   27.545838]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.545864]  ? calculate_sigpending+0x7b/0xa0
[   27.545890]  ? __pfx_kthread+0x10/0x10
[   27.545915]  ret_from_fork+0x116/0x1d0
[   27.545936]  ? __pfx_kthread+0x10/0x10
[   27.545960]  ret_from_fork_asm+0x1a/0x30
[   27.545995]  </TASK>
[   27.546009] 
[   27.560537] Allocated by task 310:
[   27.560749]  kasan_save_stack+0x45/0x70
[   27.561426]  kasan_save_track+0x18/0x40
[   27.561689]  kasan_save_alloc_info+0x3b/0x50
[   27.562006]  __kasan_kmalloc+0xb7/0xc0
[   27.562673]  __kmalloc_cache_noprof+0x189/0x420
[   27.563091]  kasan_bitops_generic+0x92/0x1c0
[   27.563537]  kunit_try_run_case+0x1a5/0x480
[   27.563911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.564365]  kthread+0x337/0x6f0
[   27.564563]  ret_from_fork+0x116/0x1d0
[   27.564754]  ret_from_fork_asm+0x1a/0x30
[   27.565316] 
[   27.565490] The buggy address belongs to the object at ffff88810527f2e0
[   27.565490]  which belongs to the cache kmalloc-16 of size 16
[   27.566636] The buggy address is located 8 bytes inside of
[   27.566636]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.567870] 
[   27.568091] The buggy address belongs to the physical page:
[   27.568696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.569512] flags: 0x200000000000000(node=0|zone=2)
[   27.569781] page_type: f5(slab)
[   27.570403] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.570754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.571478] page dumped because: kasan: bad access detected
[   27.572144] 
[   27.572241] Memory state around the buggy address:
[   27.572830]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.573414]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.574010] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.574589]                                                           ^
[   27.575095]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.575610]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.576183] ==================================================================
[   27.516764] ==================================================================
[   27.517134] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.517592] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.517966] 
[   27.518070] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.518128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.518142] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.518168] Call Trace:
[   27.518191]  <TASK>
[   27.518215]  dump_stack_lvl+0x73/0xb0
[   27.518246]  print_report+0xd1/0x650
[   27.518271]  ? __virt_addr_valid+0x1db/0x2d0
[   27.518300]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.518330]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.518360]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.518403]  kasan_report+0x141/0x180
[   27.518427]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.518463]  kasan_check_range+0x10c/0x1c0
[   27.518489]  __kasan_check_write+0x18/0x20
[   27.518514]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.518544]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.518575]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.518604]  ? kasan_bitops_generic+0x92/0x1c0
[   27.518633]  kasan_bitops_generic+0x121/0x1c0
[   27.518660]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.518687]  ? __pfx_read_tsc+0x10/0x10
[   27.518712]  ? ktime_get_ts64+0x86/0x230
[   27.518740]  kunit_try_run_case+0x1a5/0x480
[   27.518770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.518796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.518825]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.518853]  ? __kthread_parkme+0x82/0x180
[   27.518877]  ? preempt_count_sub+0x50/0x80
[   27.519205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.519240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.519270]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.519298]  kthread+0x337/0x6f0
[   27.519322]  ? trace_preempt_on+0x20/0xc0
[   27.519351]  ? __pfx_kthread+0x10/0x10
[   27.519375]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.519415]  ? calculate_sigpending+0x7b/0xa0
[   27.519443]  ? __pfx_kthread+0x10/0x10
[   27.519469]  ret_from_fork+0x116/0x1d0
[   27.519491]  ? __pfx_kthread+0x10/0x10
[   27.519515]  ret_from_fork_asm+0x1a/0x30
[   27.519552]  </TASK>
[   27.519567] 
[   27.529526] Allocated by task 310:
[   27.529753]  kasan_save_stack+0x45/0x70
[   27.530124]  kasan_save_track+0x18/0x40
[   27.530439]  kasan_save_alloc_info+0x3b/0x50
[   27.530646]  __kasan_kmalloc+0xb7/0xc0
[   27.530838]  __kmalloc_cache_noprof+0x189/0x420
[   27.531063]  kasan_bitops_generic+0x92/0x1c0
[   27.531337]  kunit_try_run_case+0x1a5/0x480
[   27.531550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.531817]  kthread+0x337/0x6f0
[   27.532005]  ret_from_fork+0x116/0x1d0
[   27.532210]  ret_from_fork_asm+0x1a/0x30
[   27.532422] 
[   27.532515] The buggy address belongs to the object at ffff88810527f2e0
[   27.532515]  which belongs to the cache kmalloc-16 of size 16
[   27.533064] The buggy address is located 8 bytes inside of
[   27.533064]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.533665] 
[   27.534143] The buggy address belongs to the physical page:
[   27.534476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.534779] flags: 0x200000000000000(node=0|zone=2)
[   27.534972] page_type: f5(slab)
[   27.535108] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.535368] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.535756] page dumped because: kasan: bad access detected
[   27.536445] 
[   27.536539] Memory state around the buggy address:
[   27.536716]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.537438]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.537811] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.539133]                                                           ^
[   27.539382]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.540229]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.540609] ==================================================================
[   27.372112] ==================================================================
[   27.372483] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.372830] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.373402] 
[   27.373532] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.373589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.373603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.373627] Call Trace:
[   27.373648]  <TASK>
[   27.373667]  dump_stack_lvl+0x73/0xb0
[   27.373698]  print_report+0xd1/0x650
[   27.373721]  ? __virt_addr_valid+0x1db/0x2d0
[   27.373746]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.373773]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.373800]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.373828]  kasan_report+0x141/0x180
[   27.373850]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.373882]  kasan_check_range+0x10c/0x1c0
[   27.373906]  __kasan_check_write+0x18/0x20
[   27.373930]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.373958]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.373986]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.374010]  ? kasan_bitops_generic+0x92/0x1c0
[   27.374064]  kasan_bitops_generic+0x121/0x1c0
[   27.374088]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.374113]  ? __pfx_read_tsc+0x10/0x10
[   27.374210]  ? ktime_get_ts64+0x86/0x230
[   27.374242]  kunit_try_run_case+0x1a5/0x480
[   27.374270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.374294]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.374321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.374347]  ? __kthread_parkme+0x82/0x180
[   27.374369]  ? preempt_count_sub+0x50/0x80
[   27.374404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.374431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.374456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.374483]  kthread+0x337/0x6f0
[   27.374504]  ? trace_preempt_on+0x20/0xc0
[   27.374530]  ? __pfx_kthread+0x10/0x10
[   27.374552]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.374575]  ? calculate_sigpending+0x7b/0xa0
[   27.374601]  ? __pfx_kthread+0x10/0x10
[   27.374624]  ret_from_fork+0x116/0x1d0
[   27.374645]  ? __pfx_kthread+0x10/0x10
[   27.374666]  ret_from_fork_asm+0x1a/0x30
[   27.374699]  </TASK>
[   27.374711] 
[   27.391365] Allocated by task 310:
[   27.391571]  kasan_save_stack+0x45/0x70
[   27.391791]  kasan_save_track+0x18/0x40
[   27.392321]  kasan_save_alloc_info+0x3b/0x50
[   27.392622]  __kasan_kmalloc+0xb7/0xc0
[   27.392816]  __kmalloc_cache_noprof+0x189/0x420
[   27.393332]  kasan_bitops_generic+0x92/0x1c0
[   27.393671]  kunit_try_run_case+0x1a5/0x480
[   27.393961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.394183]  kthread+0x337/0x6f0
[   27.394622]  ret_from_fork+0x116/0x1d0
[   27.394811]  ret_from_fork_asm+0x1a/0x30
[   27.395084] 
[   27.395167] The buggy address belongs to the object at ffff88810527f2e0
[   27.395167]  which belongs to the cache kmalloc-16 of size 16
[   27.396269] The buggy address is located 8 bytes inside of
[   27.396269]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.396977] 
[   27.397146] The buggy address belongs to the physical page:
[   27.397554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.398448] flags: 0x200000000000000(node=0|zone=2)
[   27.398883] page_type: f5(slab)
[   27.399485] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.399795] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.400519] page dumped because: kasan: bad access detected
[   27.401215] 
[   27.401378] Memory state around the buggy address:
[   27.401759]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.402053]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.402958] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.403698]                                                           ^
[   27.404444]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.404670]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.404884] ==================================================================