Hay
Date
July 8, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.646058] ==================================================================
[   33.646113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   33.646773]  kasan_report+0xdc/0x128
[   33.647270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.647741]  kunit_try_run_case+0x170/0x3f0
[   33.647990] The buggy address is located 8 bytes inside of
[   33.647990]  allocated 9-byte region [fff00000c79816e0, fff00000c79816e9)
[   33.649449] ==================================================================

[   25.758161] ==================================================================
[   25.758495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.759108] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309
[   25.759453] 
[   25.759549] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.759602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.759615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.759638] Call Trace:
[   25.759653]  <TASK>
[   25.759683]  dump_stack_lvl+0x73/0xb0
[   25.759718]  print_report+0xd1/0x610
[   25.759754]  ? __virt_addr_valid+0x1db/0x2d0
[   25.759781]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.759812]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.759863]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.759894]  kasan_report+0x141/0x180
[   25.759931]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.759966]  kasan_check_range+0x10c/0x1c0
[   25.759994]  __kasan_check_write+0x18/0x20
[   25.760022]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.760053]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.760085]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.760114]  ? trace_hardirqs_on+0x37/0xe0
[   25.760139]  ? kasan_bitops_generic+0x92/0x1c0
[   25.760170]  kasan_bitops_generic+0x121/0x1c0
[   25.760197]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.760225]  ? __pfx_read_tsc+0x10/0x10
[   25.760262]  ? ktime_get_ts64+0x86/0x230
[   25.760290]  kunit_try_run_case+0x1a5/0x480
[   25.760314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.760337]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.760360]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.760391]  ? __kthread_parkme+0x82/0x180
[   25.760414]  ? preempt_count_sub+0x50/0x80
[   25.760440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.760464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.760492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.760520]  kthread+0x337/0x6f0
[   25.760543]  ? trace_preempt_on+0x20/0xc0
[   25.760568]  ? __pfx_kthread+0x10/0x10
[   25.760592]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.760620]  ? calculate_sigpending+0x7b/0xa0
[   25.760649]  ? __pfx_kthread+0x10/0x10
[   25.760674]  ret_from_fork+0x116/0x1d0
[   25.760696]  ? __pfx_kthread+0x10/0x10
[   25.760721]  ret_from_fork_asm+0x1a/0x30
[   25.760757]  </TASK>
[   25.760769] 
[   25.770161] Allocated by task 309:
[   25.770369]  kasan_save_stack+0x45/0x70
[   25.770603]  kasan_save_track+0x18/0x40
[   25.770773]  kasan_save_alloc_info+0x3b/0x50
[   25.771105]  __kasan_kmalloc+0xb7/0xc0
[   25.771312]  __kmalloc_cache_noprof+0x189/0x420
[   25.771469]  kasan_bitops_generic+0x92/0x1c0
[   25.771617]  kunit_try_run_case+0x1a5/0x480
[   25.771792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.772055]  kthread+0x337/0x6f0
[   25.772234]  ret_from_fork+0x116/0x1d0
[   25.772415]  ret_from_fork_asm+0x1a/0x30
[   25.772553] 
[   25.772619] The buggy address belongs to the object at ffff88810598a260
[   25.772619]  which belongs to the cache kmalloc-16 of size 16
[   25.773519] The buggy address is located 8 bytes inside of
[   25.773519]  allocated 9-byte region [ffff88810598a260, ffff88810598a269)
[   25.774055] 
[   25.774164] The buggy address belongs to the physical page:
[   25.774411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a
[   25.774720] flags: 0x200000000000000(node=0|zone=2)
[   25.775048] page_type: f5(slab)
[   25.775202] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.775540] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.775800] page dumped because: kasan: bad access detected
[   25.776079] 
[   25.776164] Memory state around the buggy address:
[   25.776369]  ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.776667]  ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.776983] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.777284]                                                           ^
[   25.777562]  ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.777892]  ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.778182] ==================================================================
[   25.651258] ==================================================================
[   25.651578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.652497] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309
[   25.653225] 
[   25.653363] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.653418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.653431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.653455] Call Trace:
[   25.653477]  <TASK>
[   25.653497]  dump_stack_lvl+0x73/0xb0
[   25.653532]  print_report+0xd1/0x610
[   25.653557]  ? __virt_addr_valid+0x1db/0x2d0
[   25.653584]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.653614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.653645]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.653676]  kasan_report+0x141/0x180
[   25.653700]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.653736]  kasan_check_range+0x10c/0x1c0
[   25.653762]  __kasan_check_write+0x18/0x20
[   25.653790]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.653821]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.653852]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.653910]  ? trace_hardirqs_on+0x37/0xe0
[   25.653936]  ? kasan_bitops_generic+0x92/0x1c0
[   25.653967]  kasan_bitops_generic+0x121/0x1c0
[   25.653994]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.654023]  ? __pfx_read_tsc+0x10/0x10
[   25.654050]  ? ktime_get_ts64+0x86/0x230
[   25.654078]  kunit_try_run_case+0x1a5/0x480
[   25.654103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.654125]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.654148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.654179]  ? __kthread_parkme+0x82/0x180
[   25.654204]  ? preempt_count_sub+0x50/0x80
[   25.654230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.654265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.654293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.654322]  kthread+0x337/0x6f0
[   25.654345]  ? trace_preempt_on+0x20/0xc0
[   25.654370]  ? __pfx_kthread+0x10/0x10
[   25.654394]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.654424]  ? calculate_sigpending+0x7b/0xa0
[   25.654453]  ? __pfx_kthread+0x10/0x10
[   25.654480]  ret_from_fork+0x116/0x1d0
[   25.654502]  ? __pfx_kthread+0x10/0x10
[   25.654526]  ret_from_fork_asm+0x1a/0x30
[   25.654562]  </TASK>
[   25.654574] 
[   25.662254] Allocated by task 309:
[   25.662424]  kasan_save_stack+0x45/0x70
[   25.662616]  kasan_save_track+0x18/0x40
[   25.662802]  kasan_save_alloc_info+0x3b/0x50
[   25.662982]  __kasan_kmalloc+0xb7/0xc0
[   25.663176]  __kmalloc_cache_noprof+0x189/0x420
[   25.663341]  kasan_bitops_generic+0x92/0x1c0
[   25.663541]  kunit_try_run_case+0x1a5/0x480
[   25.663738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.664007]  kthread+0x337/0x6f0
[   25.664124]  ret_from_fork+0x116/0x1d0
[   25.664260]  ret_from_fork_asm+0x1a/0x30
[   25.664393] 
[   25.664457] The buggy address belongs to the object at ffff88810598a260
[   25.664457]  which belongs to the cache kmalloc-16 of size 16
[   25.664925] The buggy address is located 8 bytes inside of
[   25.664925]  allocated 9-byte region [ffff88810598a260, ffff88810598a269)
[   25.665674] 
[   25.665742] The buggy address belongs to the physical page:
[   25.665903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a
[   25.666131] flags: 0x200000000000000(node=0|zone=2)
[   25.666418] page_type: f5(slab)
[   25.666584] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.667051] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.667415] page dumped because: kasan: bad access detected
[   25.667642] 
[   25.667740] Memory state around the buggy address:
[   25.667973]  ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.668254]  ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.668464] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.668709]                                                           ^
[   25.668988]  ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.669453]  ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.669687] ==================================================================
[   25.800720] ==================================================================
[   25.801029] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.801406] Read of size 8 at addr ffff88810598a268 by task kunit_try_catch/309
[   25.801692] 
[   25.801803] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.801855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.801867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.801890] Call Trace:
[   25.801909]  <TASK>
[   25.801928]  dump_stack_lvl+0x73/0xb0
[   25.801959]  print_report+0xd1/0x610
[   25.801984]  ? __virt_addr_valid+0x1db/0x2d0
[   25.802011]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.802041]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.802071]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.802101]  kasan_report+0x141/0x180
[   25.802125]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.802160]  kasan_check_range+0x10c/0x1c0
[   25.802187]  __kasan_check_read+0x15/0x20
[   25.802213]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.802676]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.802721]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.802749]  ? trace_hardirqs_on+0x37/0xe0
[   25.802791]  ? kasan_bitops_generic+0x92/0x1c0
[   25.802823]  kasan_bitops_generic+0x121/0x1c0
[   25.802851]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.802879]  ? __pfx_read_tsc+0x10/0x10
[   25.802904]  ? ktime_get_ts64+0x86/0x230
[   25.802933]  kunit_try_run_case+0x1a5/0x480
[   25.802957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.802979]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.803003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.803033]  ? __kthread_parkme+0x82/0x180
[   25.803055]  ? preempt_count_sub+0x50/0x80
[   25.803081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.803106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.803134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.803163]  kthread+0x337/0x6f0
[   25.803186]  ? trace_preempt_on+0x20/0xc0
[   25.803211]  ? __pfx_kthread+0x10/0x10
[   25.803235]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.803278]  ? calculate_sigpending+0x7b/0xa0
[   25.803307]  ? __pfx_kthread+0x10/0x10
[   25.803332]  ret_from_fork+0x116/0x1d0
[   25.803354]  ? __pfx_kthread+0x10/0x10
[   25.803378]  ret_from_fork_asm+0x1a/0x30
[   25.803414]  </TASK>
[   25.803427] 
[   25.812661] Allocated by task 309:
[   25.812809]  kasan_save_stack+0x45/0x70
[   25.813253]  kasan_save_track+0x18/0x40
[   25.813528]  kasan_save_alloc_info+0x3b/0x50
[   25.813732]  __kasan_kmalloc+0xb7/0xc0
[   25.814048]  __kmalloc_cache_noprof+0x189/0x420
[   25.814349]  kasan_bitops_generic+0x92/0x1c0
[   25.814677]  kunit_try_run_case+0x1a5/0x480
[   25.814985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.815228]  kthread+0x337/0x6f0
[   25.815401]  ret_from_fork+0x116/0x1d0
[   25.815576]  ret_from_fork_asm+0x1a/0x30
[   25.815756] 
[   25.815823] The buggy address belongs to the object at ffff88810598a260
[   25.815823]  which belongs to the cache kmalloc-16 of size 16
[   25.816563] The buggy address is located 8 bytes inside of
[   25.816563]  allocated 9-byte region [ffff88810598a260, ffff88810598a269)
[   25.817209] 
[   25.817317] The buggy address belongs to the physical page:
[   25.817508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a
[   25.817990] flags: 0x200000000000000(node=0|zone=2)
[   25.818166] page_type: f5(slab)
[   25.818339] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.818669] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.818967] page dumped because: kasan: bad access detected
[   25.819184] 
[   25.819281] Memory state around the buggy address:
[   25.819501]  ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.819742]  ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.820052] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.820585]                                                           ^
[   25.821185]  ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.821519]  ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.821812] ==================================================================
[   25.779190] ==================================================================
[   25.779758] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.780155] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309
[   25.780468] 
[   25.780596] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.780648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.780660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.780683] Call Trace:
[   25.780712]  <TASK>
[   25.780731]  dump_stack_lvl+0x73/0xb0
[   25.780764]  print_report+0xd1/0x610
[   25.780801]  ? __virt_addr_valid+0x1db/0x2d0
[   25.780837]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.780877]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.780908]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.780949]  kasan_report+0x141/0x180
[   25.780974]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.781009]  kasan_check_range+0x10c/0x1c0
[   25.781037]  __kasan_check_write+0x18/0x20
[   25.781065]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.781104]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.781136]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.781174]  ? trace_hardirqs_on+0x37/0xe0
[   25.781203]  ? kasan_bitops_generic+0x92/0x1c0
[   25.781234]  kasan_bitops_generic+0x121/0x1c0
[   25.781281]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.781310]  ? __pfx_read_tsc+0x10/0x10
[   25.781336]  ? ktime_get_ts64+0x86/0x230
[   25.781375]  kunit_try_run_case+0x1a5/0x480
[   25.781399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.781421]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.781444]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.781475]  ? __kthread_parkme+0x82/0x180
[   25.781498]  ? preempt_count_sub+0x50/0x80
[   25.781525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.781549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.781586]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.781615]  kthread+0x337/0x6f0
[   25.781638]  ? trace_preempt_on+0x20/0xc0
[   25.781674]  ? __pfx_kthread+0x10/0x10
[   25.781698]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.781727]  ? calculate_sigpending+0x7b/0xa0
[   25.781756]  ? __pfx_kthread+0x10/0x10
[   25.781781]  ret_from_fork+0x116/0x1d0
[   25.781812]  ? __pfx_kthread+0x10/0x10
[   25.781845]  ret_from_fork_asm+0x1a/0x30
[   25.781891]  </TASK>
[   25.781904] 
[   25.790141] Allocated by task 309:
[   25.790294]  kasan_save_stack+0x45/0x70
[   25.790512]  kasan_save_track+0x18/0x40
[   25.790699]  kasan_save_alloc_info+0x3b/0x50
[   25.790903]  __kasan_kmalloc+0xb7/0xc0
[   25.791087]  __kmalloc_cache_noprof+0x189/0x420
[   25.791320]  kasan_bitops_generic+0x92/0x1c0
[   25.791496]  kunit_try_run_case+0x1a5/0x480
[   25.791636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.791965]  kthread+0x337/0x6f0
[   25.792133]  ret_from_fork+0x116/0x1d0
[   25.792309]  ret_from_fork_asm+0x1a/0x30
[   25.792515] 
[   25.792604] The buggy address belongs to the object at ffff88810598a260
[   25.792604]  which belongs to the cache kmalloc-16 of size 16
[   25.793233] The buggy address is located 8 bytes inside of
[   25.793233]  allocated 9-byte region [ffff88810598a260, ffff88810598a269)
[   25.793715] 
[   25.793828] The buggy address belongs to the physical page:
[   25.794107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a
[   25.794449] flags: 0x200000000000000(node=0|zone=2)
[   25.794681] page_type: f5(slab)
[   25.794833] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.795168] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.795446] page dumped because: kasan: bad access detected
[   25.795615] 
[   25.795678] Memory state around the buggy address:
[   25.795831]  ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.796046]  ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.797061] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.797944]                                                           ^
[   25.798683]  ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.799552]  ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.800114] ==================================================================
[   25.823550] ==================================================================
[   25.823812] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.824085] Read of size 8 at addr ffff88810598a268 by task kunit_try_catch/309
[   25.824313] 
[   25.824398] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.824451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.824463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.824486] Call Trace:
[   25.824506]  <TASK>
[   25.824803]  dump_stack_lvl+0x73/0xb0
[   25.824857]  print_report+0xd1/0x610
[   25.825108]  ? __virt_addr_valid+0x1db/0x2d0
[   25.825137]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.825168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.825204]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.825248]  kasan_report+0x141/0x180
[   25.825273]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.825308]  __asan_report_load8_noabort+0x18/0x20
[   25.825336]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.825367]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.825398]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.825426]  ? trace_hardirqs_on+0x37/0xe0
[   25.825451]  ? kasan_bitops_generic+0x92/0x1c0
[   25.825481]  kasan_bitops_generic+0x121/0x1c0
[   25.825508]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.825536]  ? __pfx_read_tsc+0x10/0x10
[   25.825562]  ? ktime_get_ts64+0x86/0x230
[   25.825591]  kunit_try_run_case+0x1a5/0x480
[   25.825615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.825638]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.825662]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.825692]  ? __kthread_parkme+0x82/0x180
[   25.825715]  ? preempt_count_sub+0x50/0x80
[   25.825741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.825764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.825793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.825821]  kthread+0x337/0x6f0
[   25.825844]  ? trace_preempt_on+0x20/0xc0
[   25.825871]  ? __pfx_kthread+0x10/0x10
[   25.825895]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.825923]  ? calculate_sigpending+0x7b/0xa0
[   25.825951]  ? __pfx_kthread+0x10/0x10
[   25.825975]  ret_from_fork+0x116/0x1d0
[   25.825997]  ? __pfx_kthread+0x10/0x10
[   25.826020]  ret_from_fork_asm+0x1a/0x30
[   25.826055]  </TASK>
[   25.826067] 
[   25.839535] Allocated by task 309:
[   25.839710]  kasan_save_stack+0x45/0x70
[   25.839909]  kasan_save_track+0x18/0x40
[   25.840320]  kasan_save_alloc_info+0x3b/0x50
[   25.840628]  __kasan_kmalloc+0xb7/0xc0
[   25.840778]  __kmalloc_cache_noprof+0x189/0x420
[   25.841186]  kasan_bitops_generic+0x92/0x1c0
[   25.841411]  kunit_try_run_case+0x1a5/0x480
[   25.841742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.842108]  kthread+0x337/0x6f0
[   25.842256]  ret_from_fork+0x116/0x1d0
[   25.842611]  ret_from_fork_asm+0x1a/0x30
[   25.842777] 
[   25.842972] The buggy address belongs to the object at ffff88810598a260
[   25.842972]  which belongs to the cache kmalloc-16 of size 16
[   25.843528] The buggy address is located 8 bytes inside of
[   25.843528]  allocated 9-byte region [ffff88810598a260, ffff88810598a269)
[   25.843915] 
[   25.844035] The buggy address belongs to the physical page:
[   25.844305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a
[   25.844577] flags: 0x200000000000000(node=0|zone=2)
[   25.844835] page_type: f5(slab)
[   25.844987] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.845260] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.845762] page dumped because: kasan: bad access detected
[   25.846029] 
[   25.846279] Memory state around the buggy address:
[   25.846620]  ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.847130]  ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.847537] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.847937]                                                           ^
[   25.848294]  ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.848644]  ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.849031] ==================================================================
[   25.688908] ==================================================================
[   25.689280] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.689689] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309
[   25.690475] 
[   25.690738] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.690791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.690804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.690860] Call Trace:
[   25.690880]  <TASK>
[   25.690898]  dump_stack_lvl+0x73/0xb0
[   25.690949]  print_report+0xd1/0x610
[   25.690975]  ? __virt_addr_valid+0x1db/0x2d0
[   25.691002]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.691033]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.691064]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.691095]  kasan_report+0x141/0x180
[   25.691138]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.691173]  kasan_check_range+0x10c/0x1c0
[   25.691200]  __kasan_check_write+0x18/0x20
[   25.691228]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.691273]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.691321]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.691349]  ? trace_hardirqs_on+0x37/0xe0
[   25.691373]  ? kasan_bitops_generic+0x92/0x1c0
[   25.691404]  kasan_bitops_generic+0x121/0x1c0
[   25.691431]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.691460]  ? __pfx_read_tsc+0x10/0x10
[   25.691485]  ? ktime_get_ts64+0x86/0x230
[   25.691513]  kunit_try_run_case+0x1a5/0x480
[   25.691537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.691560]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.691583]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.691614]  ? __kthread_parkme+0x82/0x180
[   25.691636]  ? preempt_count_sub+0x50/0x80
[   25.691662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.691686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.691715]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.691743]  kthread+0x337/0x6f0
[   25.691766]  ? trace_preempt_on+0x20/0xc0
[   25.691791]  ? __pfx_kthread+0x10/0x10
[   25.691815]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.691844]  ? calculate_sigpending+0x7b/0xa0
[   25.691872]  ? __pfx_kthread+0x10/0x10
[   25.691898]  ret_from_fork+0x116/0x1d0
[   25.691919]  ? __pfx_kthread+0x10/0x10
[   25.691943]  ret_from_fork_asm+0x1a/0x30
[   25.691979]  </TASK>
[   25.691990] 
[   25.700339] Allocated by task 309:
[   25.700498]  kasan_save_stack+0x45/0x70
[   25.700698]  kasan_save_track+0x18/0x40
[   25.700932]  kasan_save_alloc_info+0x3b/0x50
[   25.702257]  __kasan_kmalloc+0xb7/0xc0
[   25.702420]  __kmalloc_cache_noprof+0x189/0x420
[   25.702573]  kasan_bitops_generic+0x92/0x1c0
[   25.703526]  kunit_try_run_case+0x1a5/0x480
[   25.703764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.704023]  kthread+0x337/0x6f0
[   25.704173]  ret_from_fork+0x116/0x1d0
[   25.704362]  ret_from_fork_asm+0x1a/0x30
[   25.704541] 
[   25.704615] The buggy address belongs to the object at ffff88810598a260
[   25.704615]  which belongs to the cache kmalloc-16 of size 16
[   25.705101] The buggy address is located 8 bytes inside of
[   25.705101]  allocated 9-byte region [ffff88810598a260, ffff88810598a269)
[   25.705593] 
[   25.705689] The buggy address belongs to the physical page:
[   25.705933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a
[   25.706260] flags: 0x200000000000000(node=0|zone=2)
[   25.706440] page_type: f5(slab)
[   25.706556] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.706782] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.707053] page dumped because: kasan: bad access detected
[   25.707316] 
[   25.707406] Memory state around the buggy address:
[   25.707634]  ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.707972]  ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.708310] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.708623]                                                           ^
[   25.708942]  ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.709202]  ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.709452] ==================================================================
[   25.733563] ==================================================================
[   25.733986] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.734375] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309
[   25.734694] 
[   25.734789] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.734840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.734852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.734875] Call Trace:
[   25.734895]  <TASK>
[   25.734914]  dump_stack_lvl+0x73/0xb0
[   25.734946]  print_report+0xd1/0x610
[   25.734971]  ? __virt_addr_valid+0x1db/0x2d0
[   25.734996]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.735028]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.735059]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.735090]  kasan_report+0x141/0x180
[   25.735114]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.735150]  kasan_check_range+0x10c/0x1c0
[   25.735177]  __kasan_check_write+0x18/0x20
[   25.735204]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.735235]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.735278]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.735305]  ? trace_hardirqs_on+0x37/0xe0
[   25.735330]  ? kasan_bitops_generic+0x92/0x1c0
[   25.735361]  kasan_bitops_generic+0x121/0x1c0
[   25.735389]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.735418]  ? __pfx_read_tsc+0x10/0x10
[   25.735444]  ? ktime_get_ts64+0x86/0x230
[   25.735472]  kunit_try_run_case+0x1a5/0x480
[   25.735496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.735518]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.735542]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.735573]  ? __kthread_parkme+0x82/0x180
[   25.735595]  ? preempt_count_sub+0x50/0x80
[   25.735620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.735644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.735672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.735701]  kthread+0x337/0x6f0
[   25.735724]  ? trace_preempt_on+0x20/0xc0
[   25.735749]  ? __pfx_kthread+0x10/0x10
[   25.735773]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.735802]  ? calculate_sigpending+0x7b/0xa0
[   25.735850]  ? __pfx_kthread+0x10/0x10
[   25.735876]  ret_from_fork+0x116/0x1d0
[   25.735898]  ? __pfx_kthread+0x10/0x10
[   25.735922]  ret_from_fork_asm+0x1a/0x30
[   25.735958]  </TASK>
[   25.735971] 
[   25.743733] Allocated by task 309:
[   25.743863]  kasan_save_stack+0x45/0x70
[   25.744320]  kasan_save_track+0x18/0x40
[   25.744535]  kasan_save_alloc_info+0x3b/0x50
[   25.744733]  __kasan_kmalloc+0xb7/0xc0
[   25.745425]  __kmalloc_cache_noprof+0x189/0x420
[   25.745840]  kasan_bitops_generic+0x92/0x1c0
[   25.746359]  kunit_try_run_case+0x1a5/0x480
[   25.746770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.747164]  kthread+0x337/0x6f0
[   25.747350]  ret_from_fork+0x116/0x1d0
[   25.747529]  ret_from_fork_asm+0x1a/0x30
[   25.747709] 
[   25.747794] The buggy address belongs to the object at ffff88810598a260
[   25.747794]  which belongs to the cache kmalloc-16 of size 16
[   25.748263] The buggy address is located 8 bytes inside of
[   25.748263]  allocated 9-byte region [ffff88810598a260, ffff88810598a269)
[   25.748721] 
[   25.748805] The buggy address belongs to the physical page:
[   25.749013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a
[   25.749812] flags: 0x200000000000000(node=0|zone=2)
[   25.750232] page_type: f5(slab)
[   25.750625] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.751145] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.751664] page dumped because: kasan: bad access detected
[   25.752104] 
[   25.752334] Memory state around the buggy address:
[   25.752824]  ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.753294]  ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.753604] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.754213]                                                           ^
[   25.754634]  ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.755423]  ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.755899] ==================================================================
[   25.670460] ==================================================================
[   25.670914] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.671304] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309
[   25.671543] 
[   25.671627] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.671678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.671691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.671713] Call Trace:
[   25.671728]  <TASK>
[   25.671745]  dump_stack_lvl+0x73/0xb0
[   25.671776]  print_report+0xd1/0x610
[   25.671800]  ? __virt_addr_valid+0x1db/0x2d0
[   25.671827]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.671879]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.671909]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.671940]  kasan_report+0x141/0x180
[   25.671964]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.672002]  kasan_check_range+0x10c/0x1c0
[   25.672029]  __kasan_check_write+0x18/0x20
[   25.672057]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.672088]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.672119]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.672147]  ? trace_hardirqs_on+0x37/0xe0
[   25.672172]  ? kasan_bitops_generic+0x92/0x1c0
[   25.672203]  kasan_bitops_generic+0x121/0x1c0
[   25.672230]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.672269]  ? __pfx_read_tsc+0x10/0x10
[   25.672295]  ? ktime_get_ts64+0x86/0x230
[   25.672323]  kunit_try_run_case+0x1a5/0x480
[   25.672347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.672386]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.672410]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.672453]  ? __kthread_parkme+0x82/0x180
[   25.672475]  ? preempt_count_sub+0x50/0x80
[   25.672501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.672525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.672553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.672582]  kthread+0x337/0x6f0
[   25.672604]  ? trace_preempt_on+0x20/0xc0
[   25.672631]  ? __pfx_kthread+0x10/0x10
[   25.672655]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.672683]  ? calculate_sigpending+0x7b/0xa0
[   25.672712]  ? __pfx_kthread+0x10/0x10
[   25.672737]  ret_from_fork+0x116/0x1d0
[   25.672758]  ? __pfx_kthread+0x10/0x10
[   25.672782]  ret_from_fork_asm+0x1a/0x30
[   25.672818]  </TASK>
[   25.672841] 
[   25.680687] Allocated by task 309:
[   25.680813]  kasan_save_stack+0x45/0x70
[   25.681024]  kasan_save_track+0x18/0x40
[   25.681207]  kasan_save_alloc_info+0x3b/0x50
[   25.681420]  __kasan_kmalloc+0xb7/0xc0
[   25.681603]  __kmalloc_cache_noprof+0x189/0x420
[   25.681814]  kasan_bitops_generic+0x92/0x1c0
[   25.681980]  kunit_try_run_case+0x1a5/0x480
[   25.682187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.682391]  kthread+0x337/0x6f0
[   25.682506]  ret_from_fork+0x116/0x1d0
[   25.682628]  ret_from_fork_asm+0x1a/0x30
[   25.682759] 
[   25.682835] The buggy address belongs to the object at ffff88810598a260
[   25.682835]  which belongs to the cache kmalloc-16 of size 16
[   25.683346] The buggy address is located 8 bytes inside of
[   25.683346]  allocated 9-byte region [ffff88810598a260, ffff88810598a269)
[   25.683870] 
[   25.683960] The buggy address belongs to the physical page:
[   25.684177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a
[   25.684415] flags: 0x200000000000000(node=0|zone=2)
[   25.684590] page_type: f5(slab)
[   25.684771] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.685338] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.685607] page dumped because: kasan: bad access detected
[   25.685839] 
[   25.685939] Memory state around the buggy address:
[   25.686101]  ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.686313]  ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.686517] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.686818]                                                           ^
[   25.687099]  ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.687412]  ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.687784] ==================================================================
[   25.710000] ==================================================================
[   25.710360] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.710767] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309
[   25.711040] 
[   25.711152] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.711202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.711215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.711608] Call Trace:
[   25.711637]  <TASK>
[   25.711658]  dump_stack_lvl+0x73/0xb0
[   25.711691]  print_report+0xd1/0x610
[   25.711715]  ? __virt_addr_valid+0x1db/0x2d0
[   25.711742]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.711772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.711827]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.711858]  kasan_report+0x141/0x180
[   25.711882]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.711918]  kasan_check_range+0x10c/0x1c0
[   25.711945]  __kasan_check_write+0x18/0x20
[   25.711974]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.712006]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.712038]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.712065]  ? trace_hardirqs_on+0x37/0xe0
[   25.712091]  ? kasan_bitops_generic+0x92/0x1c0
[   25.712121]  kasan_bitops_generic+0x121/0x1c0
[   25.712149]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.712179]  ? __pfx_read_tsc+0x10/0x10
[   25.712205]  ? ktime_get_ts64+0x86/0x230
[   25.712233]  kunit_try_run_case+0x1a5/0x480
[   25.712268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.712290]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.712314]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.712345]  ? __kthread_parkme+0x82/0x180
[   25.712368]  ? preempt_count_sub+0x50/0x80
[   25.712395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.712418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.712447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.712476]  kthread+0x337/0x6f0
[   25.712498]  ? trace_preempt_on+0x20/0xc0
[   25.712523]  ? __pfx_kthread+0x10/0x10
[   25.712548]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.712576]  ? calculate_sigpending+0x7b/0xa0
[   25.712604]  ? __pfx_kthread+0x10/0x10
[   25.712629]  ret_from_fork+0x116/0x1d0
[   25.712651]  ? __pfx_kthread+0x10/0x10
[   25.712675]  ret_from_fork_asm+0x1a/0x30
[   25.712711]  </TASK>
[   25.712723] 
[   25.722808] Allocated by task 309:
[   25.723263]  kasan_save_stack+0x45/0x70
[   25.723511]  kasan_save_track+0x18/0x40
[   25.723754]  kasan_save_alloc_info+0x3b/0x50
[   25.724120]  __kasan_kmalloc+0xb7/0xc0
[   25.724283]  __kmalloc_cache_noprof+0x189/0x420
[   25.724641]  kasan_bitops_generic+0x92/0x1c0
[   25.724854]  kunit_try_run_case+0x1a5/0x480
[   25.725035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.725286]  kthread+0x337/0x6f0
[   25.725449]  ret_from_fork+0x116/0x1d0
[   25.725634]  ret_from_fork_asm+0x1a/0x30
[   25.726142] 
[   25.726249] The buggy address belongs to the object at ffff88810598a260
[   25.726249]  which belongs to the cache kmalloc-16 of size 16
[   25.726704] The buggy address is located 8 bytes inside of
[   25.726704]  allocated 9-byte region [ffff88810598a260, ffff88810598a269)
[   25.727427] 
[   25.727524] The buggy address belongs to the physical page:
[   25.727973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a
[   25.728376] flags: 0x200000000000000(node=0|zone=2)
[   25.728553] page_type: f5(slab)
[   25.728782] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.729160] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.729485] page dumped because: kasan: bad access detected
[   25.729710] 
[   25.729778] Memory state around the buggy address:
[   25.729967]  ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.730574]  ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.730981] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.731250]                                                           ^
[   25.731623]  ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.732032]  ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.732347] ==================================================================