Hay
Date
July 9, 2025, 1:08 p.m.

Environment
qemu-x86_64

[   26.332102] ==================================================================
[   26.332401] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.332705] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.333083] 
[   26.333207] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.333254] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.333268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.333289] Call Trace:
[   26.333302]  <TASK>
[   26.333317]  dump_stack_lvl+0x73/0xb0
[   26.333357]  print_report+0xd1/0x610
[   26.333378]  ? __virt_addr_valid+0x1db/0x2d0
[   26.333401]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.333438]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.333463]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.333490]  kasan_report+0x141/0x180
[   26.333512]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.333542]  kasan_check_range+0x10c/0x1c0
[   26.333565]  __kasan_check_write+0x18/0x20
[   26.333588]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.333614]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.333641]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.333664]  ? trace_hardirqs_on+0x37/0xe0
[   26.333685]  ? kasan_bitops_generic+0x92/0x1c0
[   26.333720]  kasan_bitops_generic+0x121/0x1c0
[   26.333744]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.333786]  ? __pfx_read_tsc+0x10/0x10
[   26.333817]  ? ktime_get_ts64+0x86/0x230
[   26.333842]  kunit_try_run_case+0x1a5/0x480
[   26.333863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.333895]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.333920]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.333944]  ? __kthread_parkme+0x82/0x180
[   26.333964]  ? preempt_count_sub+0x50/0x80
[   26.333987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.334009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.334034]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.334058]  kthread+0x337/0x6f0
[   26.334078]  ? trace_preempt_on+0x20/0xc0
[   26.334100]  ? __pfx_kthread+0x10/0x10
[   26.334120]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.334142]  ? calculate_sigpending+0x7b/0xa0
[   26.334166]  ? __pfx_kthread+0x10/0x10
[   26.334187]  ret_from_fork+0x116/0x1d0
[   26.334206]  ? __pfx_kthread+0x10/0x10
[   26.334226]  ret_from_fork_asm+0x1a/0x30
[   26.334257]  </TASK>
[   26.334269] 
[   26.342233] Allocated by task 311:
[   26.342409]  kasan_save_stack+0x45/0x70
[   26.342565]  kasan_save_track+0x18/0x40
[   26.342706]  kasan_save_alloc_info+0x3b/0x50
[   26.342908]  __kasan_kmalloc+0xb7/0xc0
[   26.343104]  __kmalloc_cache_noprof+0x189/0x420
[   26.343318]  kasan_bitops_generic+0x92/0x1c0
[   26.343517]  kunit_try_run_case+0x1a5/0x480
[   26.343703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.343902]  kthread+0x337/0x6f0
[   26.344067]  ret_from_fork+0x116/0x1d0
[   26.344249]  ret_from_fork_asm+0x1a/0x30
[   26.344457] 
[   26.344555] The buggy address belongs to the object at ffff8881058a8240
[   26.344555]  which belongs to the cache kmalloc-16 of size 16
[   26.345073] The buggy address is located 8 bytes inside of
[   26.345073]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.345548] 
[   26.345614] The buggy address belongs to the physical page:
[   26.345810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.346041] flags: 0x200000000000000(node=0|zone=2)
[   26.346193] page_type: f5(slab)
[   26.346351] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.346750] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.347146] page dumped because: kasan: bad access detected
[   26.347437] 
[   26.347526] Memory state around the buggy address:
[   26.347742]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.347971]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.348177] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.348453]                                               ^
[   26.348712]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.349055]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.349390] ==================================================================
[   26.424212] ==================================================================
[   26.424548] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.424980] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.425214] 
[   26.425292] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.425339] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.425352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.425372] Call Trace:
[   26.425385]  <TASK>
[   26.425401]  dump_stack_lvl+0x73/0xb0
[   26.425431]  print_report+0xd1/0x610
[   26.425452]  ? __virt_addr_valid+0x1db/0x2d0
[   26.425475]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.425501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.425527]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.425555]  kasan_report+0x141/0x180
[   26.425576]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.425607]  kasan_check_range+0x10c/0x1c0
[   26.425630]  __kasan_check_write+0x18/0x20
[   26.425653]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.425680]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.425719]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.425742]  ? trace_hardirqs_on+0x37/0xe0
[   26.425763]  ? kasan_bitops_generic+0x92/0x1c0
[   26.425790]  kasan_bitops_generic+0x121/0x1c0
[   26.425813]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.425838]  ? __pfx_read_tsc+0x10/0x10
[   26.425860]  ? ktime_get_ts64+0x86/0x230
[   26.425884]  kunit_try_run_case+0x1a5/0x480
[   26.425906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.425926]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.425949]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.425974]  ? __kthread_parkme+0x82/0x180
[   26.425994]  ? preempt_count_sub+0x50/0x80
[   26.426017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.426039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.426064]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.426090]  kthread+0x337/0x6f0
[   26.426110]  ? trace_preempt_on+0x20/0xc0
[   26.426134]  ? __pfx_kthread+0x10/0x10
[   26.426156]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.426178]  ? calculate_sigpending+0x7b/0xa0
[   26.426202]  ? __pfx_kthread+0x10/0x10
[   26.426224]  ret_from_fork+0x116/0x1d0
[   26.426243]  ? __pfx_kthread+0x10/0x10
[   26.426263]  ret_from_fork_asm+0x1a/0x30
[   26.426295]  </TASK>
[   26.426306] 
[   26.433873] Allocated by task 311:
[   26.434017]  kasan_save_stack+0x45/0x70
[   26.434205]  kasan_save_track+0x18/0x40
[   26.434389]  kasan_save_alloc_info+0x3b/0x50
[   26.434576]  __kasan_kmalloc+0xb7/0xc0
[   26.434712]  __kmalloc_cache_noprof+0x189/0x420
[   26.434919]  kasan_bitops_generic+0x92/0x1c0
[   26.435124]  kunit_try_run_case+0x1a5/0x480
[   26.435326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.435570]  kthread+0x337/0x6f0
[   26.435728]  ret_from_fork+0x116/0x1d0
[   26.435934]  ret_from_fork_asm+0x1a/0x30
[   26.436107] 
[   26.436171] The buggy address belongs to the object at ffff8881058a8240
[   26.436171]  which belongs to the cache kmalloc-16 of size 16
[   26.436658] The buggy address is located 8 bytes inside of
[   26.436658]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.438717] 
[   26.439095] The buggy address belongs to the physical page:
[   26.439583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.440231] flags: 0x200000000000000(node=0|zone=2)
[   26.441074] page_type: f5(slab)
[   26.441518] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.441767] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.442904] page dumped because: kasan: bad access detected
[   26.443487] 
[   26.443563] Memory state around the buggy address:
[   26.443728]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.444384]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.445088] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.445457]                                               ^
[   26.445957]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.446298]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.446945] ==================================================================
[   26.402417] ==================================================================
[   26.402751] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.403269] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.403594] 
[   26.403703] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.403750] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.403781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.403801] Call Trace:
[   26.403819]  <TASK>
[   26.403835]  dump_stack_lvl+0x73/0xb0
[   26.403862]  print_report+0xd1/0x610
[   26.403884]  ? __virt_addr_valid+0x1db/0x2d0
[   26.403906]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.403933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.403958]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.403984]  kasan_report+0x141/0x180
[   26.404006]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.404036]  kasan_check_range+0x10c/0x1c0
[   26.404059]  __kasan_check_write+0x18/0x20
[   26.404082]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.404109]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.404137]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.404159]  ? trace_hardirqs_on+0x37/0xe0
[   26.404181]  ? kasan_bitops_generic+0x92/0x1c0
[   26.404208]  kasan_bitops_generic+0x121/0x1c0
[   26.404231]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.404255]  ? __pfx_read_tsc+0x10/0x10
[   26.404276]  ? ktime_get_ts64+0x86/0x230
[   26.404300]  kunit_try_run_case+0x1a5/0x480
[   26.404321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.404342]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.404365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.404389]  ? __kthread_parkme+0x82/0x180
[   26.404409]  ? preempt_count_sub+0x50/0x80
[   26.404432]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.404453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.404478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.404503]  kthread+0x337/0x6f0
[   26.404522]  ? trace_preempt_on+0x20/0xc0
[   26.404544]  ? __pfx_kthread+0x10/0x10
[   26.404565]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.404586]  ? calculate_sigpending+0x7b/0xa0
[   26.404609]  ? __pfx_kthread+0x10/0x10
[   26.404631]  ret_from_fork+0x116/0x1d0
[   26.404650]  ? __pfx_kthread+0x10/0x10
[   26.404670]  ret_from_fork_asm+0x1a/0x30
[   26.405243]  </TASK>
[   26.405264] 
[   26.415898] Allocated by task 311:
[   26.416083]  kasan_save_stack+0x45/0x70
[   26.416283]  kasan_save_track+0x18/0x40
[   26.416449]  kasan_save_alloc_info+0x3b/0x50
[   26.416627]  __kasan_kmalloc+0xb7/0xc0
[   26.416790]  __kmalloc_cache_noprof+0x189/0x420
[   26.416954]  kasan_bitops_generic+0x92/0x1c0
[   26.417160]  kunit_try_run_case+0x1a5/0x480
[   26.417357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.417608]  kthread+0x337/0x6f0
[   26.417810]  ret_from_fork+0x116/0x1d0
[   26.417960]  ret_from_fork_asm+0x1a/0x30
[   26.418136] 
[   26.418225] The buggy address belongs to the object at ffff8881058a8240
[   26.418225]  which belongs to the cache kmalloc-16 of size 16
[   26.418594] The buggy address is located 8 bytes inside of
[   26.418594]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.419063] 
[   26.419153] The buggy address belongs to the physical page:
[   26.419398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.419665] flags: 0x200000000000000(node=0|zone=2)
[   26.419859] page_type: f5(slab)
[   26.419979] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.420313] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.420648] page dumped because: kasan: bad access detected
[   26.420934] 
[   26.421020] Memory state around the buggy address:
[   26.421185]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.421474]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.421780] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.422059]                                               ^
[   26.422250]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.422502]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.422836] ==================================================================
[   26.469008] ==================================================================
[   26.469638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.470212] Read of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.470511] 
[   26.470590] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.470639] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.470652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.470672] Call Trace:
[   26.470686]  <TASK>
[   26.470712]  dump_stack_lvl+0x73/0xb0
[   26.470740]  print_report+0xd1/0x610
[   26.470761]  ? __virt_addr_valid+0x1db/0x2d0
[   26.470784]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.470812]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.470838]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.470865]  kasan_report+0x141/0x180
[   26.470887]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.470918]  __asan_report_load8_noabort+0x18/0x20
[   26.470942]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.470980]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.471007]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.471042]  ? trace_hardirqs_on+0x37/0xe0
[   26.471064]  ? kasan_bitops_generic+0x92/0x1c0
[   26.471091]  kasan_bitops_generic+0x121/0x1c0
[   26.471113]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.471138]  ? __pfx_read_tsc+0x10/0x10
[   26.471159]  ? ktime_get_ts64+0x86/0x230
[   26.471185]  kunit_try_run_case+0x1a5/0x480
[   26.471208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.471248]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.471272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.471307]  ? __kthread_parkme+0x82/0x180
[   26.471327]  ? preempt_count_sub+0x50/0x80
[   26.471350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.471372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.471397]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.471423]  kthread+0x337/0x6f0
[   26.471442]  ? trace_preempt_on+0x20/0xc0
[   26.471463]  ? __pfx_kthread+0x10/0x10
[   26.471484]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.471506]  ? calculate_sigpending+0x7b/0xa0
[   26.471530]  ? __pfx_kthread+0x10/0x10
[   26.471551]  ret_from_fork+0x116/0x1d0
[   26.471570]  ? __pfx_kthread+0x10/0x10
[   26.471591]  ret_from_fork_asm+0x1a/0x30
[   26.471622]  </TASK>
[   26.471633] 
[   26.480143] Allocated by task 311:
[   26.480484]  kasan_save_stack+0x45/0x70
[   26.480946]  kasan_save_track+0x18/0x40
[   26.481118]  kasan_save_alloc_info+0x3b/0x50
[   26.481833]  __kasan_kmalloc+0xb7/0xc0
[   26.482162]  __kmalloc_cache_noprof+0x189/0x420
[   26.482640]  kasan_bitops_generic+0x92/0x1c0
[   26.482840]  kunit_try_run_case+0x1a5/0x480
[   26.483228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.483729]  kthread+0x337/0x6f0
[   26.484710]  ret_from_fork+0x116/0x1d0
[   26.485133]  ret_from_fork_asm+0x1a/0x30
[   26.485384] 
[   26.485450] The buggy address belongs to the object at ffff8881058a8240
[   26.485450]  which belongs to the cache kmalloc-16 of size 16
[   26.485838] The buggy address is located 8 bytes inside of
[   26.485838]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.486290] 
[   26.486356] The buggy address belongs to the physical page:
[   26.486608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.486863] flags: 0x200000000000000(node=0|zone=2)
[   26.487061] page_type: f5(slab)
[   26.487258] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.487596] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.488008] page dumped because: kasan: bad access detected
[   26.488234] 
[   26.488297] Memory state around the buggy address:
[   26.488444]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.488662]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.489041] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.489331]                                               ^
[   26.489567]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.489890]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.490297] ==================================================================
[   26.385616] ==================================================================
[   26.386117] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.386485] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.386825] 
[   26.386933] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.386992] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.387005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.387038] Call Trace:
[   26.387050]  <TASK>
[   26.387065]  dump_stack_lvl+0x73/0xb0
[   26.387094]  print_report+0xd1/0x610
[   26.387123]  ? __virt_addr_valid+0x1db/0x2d0
[   26.387146]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.387182]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.387208]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.387234]  kasan_report+0x141/0x180
[   26.387265]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.387298]  kasan_check_range+0x10c/0x1c0
[   26.387323]  __kasan_check_write+0x18/0x20
[   26.387356]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.387382]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.387418]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.387442]  ? trace_hardirqs_on+0x37/0xe0
[   26.387463]  ? kasan_bitops_generic+0x92/0x1c0
[   26.387502]  kasan_bitops_generic+0x121/0x1c0
[   26.387525]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.387549]  ? __pfx_read_tsc+0x10/0x10
[   26.387580]  ? ktime_get_ts64+0x86/0x230
[   26.387605]  kunit_try_run_case+0x1a5/0x480
[   26.387627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.387647]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.387670]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.387702]  ? __kthread_parkme+0x82/0x180
[   26.387722]  ? preempt_count_sub+0x50/0x80
[   26.387745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.387785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.387811]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.387839]  kthread+0x337/0x6f0
[   26.387859]  ? trace_preempt_on+0x20/0xc0
[   26.387881]  ? __pfx_kthread+0x10/0x10
[   26.387902]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.387924]  ? calculate_sigpending+0x7b/0xa0
[   26.387948]  ? __pfx_kthread+0x10/0x10
[   26.387969]  ret_from_fork+0x116/0x1d0
[   26.387988]  ? __pfx_kthread+0x10/0x10
[   26.388009]  ret_from_fork_asm+0x1a/0x30
[   26.388040]  </TASK>
[   26.388051] 
[   26.395276] Allocated by task 311:
[   26.395426]  kasan_save_stack+0x45/0x70
[   26.395595]  kasan_save_track+0x18/0x40
[   26.395818]  kasan_save_alloc_info+0x3b/0x50
[   26.396000]  __kasan_kmalloc+0xb7/0xc0
[   26.396148]  __kmalloc_cache_noprof+0x189/0x420
[   26.396340]  kasan_bitops_generic+0x92/0x1c0
[   26.396521]  kunit_try_run_case+0x1a5/0x480
[   26.396703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.396963]  kthread+0x337/0x6f0
[   26.397110]  ret_from_fork+0x116/0x1d0
[   26.397250]  ret_from_fork_asm+0x1a/0x30
[   26.397431] 
[   26.397507] The buggy address belongs to the object at ffff8881058a8240
[   26.397507]  which belongs to the cache kmalloc-16 of size 16
[   26.398004] The buggy address is located 8 bytes inside of
[   26.398004]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.398462] 
[   26.398531] The buggy address belongs to the physical page:
[   26.398798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.399124] flags: 0x200000000000000(node=0|zone=2)
[   26.399319] page_type: f5(slab)
[   26.399465] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.399758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.400096] page dumped because: kasan: bad access detected
[   26.400287] 
[   26.400351] Memory state around the buggy address:
[   26.400565]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.400853]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.401157] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.401426]                                               ^
[   26.401598]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.401838]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.402046] ==================================================================
[   26.367852] ==================================================================
[   26.368233] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.368638] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.368980] 
[   26.369087] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.369133] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.369147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.369178] Call Trace:
[   26.369192]  <TASK>
[   26.369205]  dump_stack_lvl+0x73/0xb0
[   26.369234]  print_report+0xd1/0x610
[   26.369264]  ? __virt_addr_valid+0x1db/0x2d0
[   26.369287]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.369323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.369350]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.369376]  kasan_report+0x141/0x180
[   26.369407]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.369438]  kasan_check_range+0x10c/0x1c0
[   26.369460]  __kasan_check_write+0x18/0x20
[   26.369494]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.369521]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.369558]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.369582]  ? trace_hardirqs_on+0x37/0xe0
[   26.369603]  ? kasan_bitops_generic+0x92/0x1c0
[   26.369629]  kasan_bitops_generic+0x121/0x1c0
[   26.369652]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.369676]  ? __pfx_read_tsc+0x10/0x10
[   26.369705]  ? ktime_get_ts64+0x86/0x230
[   26.369730]  kunit_try_run_case+0x1a5/0x480
[   26.369751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.369791]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.369814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.369838]  ? __kthread_parkme+0x82/0x180
[   26.369867]  ? preempt_count_sub+0x50/0x80
[   26.369891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.369912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.369947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.369972]  kthread+0x337/0x6f0
[   26.369991]  ? trace_preempt_on+0x20/0xc0
[   26.370013]  ? __pfx_kthread+0x10/0x10
[   26.370034]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.370056]  ? calculate_sigpending+0x7b/0xa0
[   26.370080]  ? __pfx_kthread+0x10/0x10
[   26.370101]  ret_from_fork+0x116/0x1d0
[   26.370120]  ? __pfx_kthread+0x10/0x10
[   26.370140]  ret_from_fork_asm+0x1a/0x30
[   26.370171]  </TASK>
[   26.370182] 
[   26.378121] Allocated by task 311:
[   26.378289]  kasan_save_stack+0x45/0x70
[   26.378472]  kasan_save_track+0x18/0x40
[   26.378651]  kasan_save_alloc_info+0x3b/0x50
[   26.378870]  __kasan_kmalloc+0xb7/0xc0
[   26.379065]  __kmalloc_cache_noprof+0x189/0x420
[   26.379238]  kasan_bitops_generic+0x92/0x1c0
[   26.379379]  kunit_try_run_case+0x1a5/0x480
[   26.379515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.379683]  kthread+0x337/0x6f0
[   26.379832]  ret_from_fork+0x116/0x1d0
[   26.379958]  ret_from_fork_asm+0x1a/0x30
[   26.380090] 
[   26.380192] The buggy address belongs to the object at ffff8881058a8240
[   26.380192]  which belongs to the cache kmalloc-16 of size 16
[   26.380723] The buggy address is located 8 bytes inside of
[   26.380723]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.381253] 
[   26.381342] The buggy address belongs to the physical page:
[   26.381536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.381801] flags: 0x200000000000000(node=0|zone=2)
[   26.381955] page_type: f5(slab)
[   26.382069] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.382293] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.382586] page dumped because: kasan: bad access detected
[   26.382886] 
[   26.382989] Memory state around the buggy address:
[   26.383247]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.383599]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.383980] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.384289]                                               ^
[   26.384534]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.384893]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.385164] ==================================================================
[   26.312298] ==================================================================
[   26.312629] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.314746] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.315049] 
[   26.315179] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.315230] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.315243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.315264] Call Trace:
[   26.315280]  <TASK>
[   26.315297]  dump_stack_lvl+0x73/0xb0
[   26.315339]  print_report+0xd1/0x610
[   26.315361]  ? __virt_addr_valid+0x1db/0x2d0
[   26.315384]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.315422]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.315447]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.315474]  kasan_report+0x141/0x180
[   26.315504]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.315535]  kasan_check_range+0x10c/0x1c0
[   26.315568]  __kasan_check_write+0x18/0x20
[   26.315591]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.315618]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.315645]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.315668]  ? trace_hardirqs_on+0x37/0xe0
[   26.315699]  ? kasan_bitops_generic+0x92/0x1c0
[   26.315728]  kasan_bitops_generic+0x121/0x1c0
[   26.315752]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.315798]  ? __pfx_read_tsc+0x10/0x10
[   26.315834]  ? ktime_get_ts64+0x86/0x230
[   26.315859]  kunit_try_run_case+0x1a5/0x480
[   26.315881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.315915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.315938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.315962]  ? __kthread_parkme+0x82/0x180
[   26.315982]  ? preempt_count_sub+0x50/0x80
[   26.316016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.316038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.316074]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.316100]  kthread+0x337/0x6f0
[   26.316120]  ? trace_preempt_on+0x20/0xc0
[   26.316144]  ? __pfx_kthread+0x10/0x10
[   26.316165]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.316187]  ? calculate_sigpending+0x7b/0xa0
[   26.316211]  ? __pfx_kthread+0x10/0x10
[   26.316233]  ret_from_fork+0x116/0x1d0
[   26.316252]  ? __pfx_kthread+0x10/0x10
[   26.316272]  ret_from_fork_asm+0x1a/0x30
[   26.316302]  </TASK>
[   26.316314] 
[   26.324255] Allocated by task 311:
[   26.324422]  kasan_save_stack+0x45/0x70
[   26.324603]  kasan_save_track+0x18/0x40
[   26.324836]  kasan_save_alloc_info+0x3b/0x50
[   26.324980]  __kasan_kmalloc+0xb7/0xc0
[   26.325116]  __kmalloc_cache_noprof+0x189/0x420
[   26.325351]  kasan_bitops_generic+0x92/0x1c0
[   26.325578]  kunit_try_run_case+0x1a5/0x480
[   26.325798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.325998]  kthread+0x337/0x6f0
[   26.326159]  ret_from_fork+0x116/0x1d0
[   26.326334]  ret_from_fork_asm+0x1a/0x30
[   26.326520] 
[   26.326624] The buggy address belongs to the object at ffff8881058a8240
[   26.326624]  which belongs to the cache kmalloc-16 of size 16
[   26.327121] The buggy address is located 8 bytes inside of
[   26.327121]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.327616] 
[   26.327710] The buggy address belongs to the physical page:
[   26.328000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.328248] flags: 0x200000000000000(node=0|zone=2)
[   26.328405] page_type: f5(slab)
[   26.328518] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.328798] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.329146] page dumped because: kasan: bad access detected
[   26.329386] 
[   26.329472] Memory state around the buggy address:
[   26.329682]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.329972]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.330186] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.330420]                                               ^
[   26.330690]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.331036]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.331368] ==================================================================
[   26.447560] ==================================================================
[   26.447902] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.448680] Read of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.449304] 
[   26.449404] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.449465] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.449479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.449499] Call Trace:
[   26.449526]  <TASK>
[   26.449551]  dump_stack_lvl+0x73/0xb0
[   26.449581]  print_report+0xd1/0x610
[   26.449603]  ? __virt_addr_valid+0x1db/0x2d0
[   26.449637]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.449663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.449689]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.449725]  kasan_report+0x141/0x180
[   26.449747]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.449787]  kasan_check_range+0x10c/0x1c0
[   26.449811]  __kasan_check_read+0x15/0x20
[   26.449833]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.449861]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.449889]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.449912]  ? trace_hardirqs_on+0x37/0xe0
[   26.449934]  ? kasan_bitops_generic+0x92/0x1c0
[   26.449960]  kasan_bitops_generic+0x121/0x1c0
[   26.449983]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.450008]  ? __pfx_read_tsc+0x10/0x10
[   26.450028]  ? ktime_get_ts64+0x86/0x230
[   26.450053]  kunit_try_run_case+0x1a5/0x480
[   26.450075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.450095]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.450118]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.450142]  ? __kthread_parkme+0x82/0x180
[   26.450163]  ? preempt_count_sub+0x50/0x80
[   26.450186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.450208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.450234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.450260]  kthread+0x337/0x6f0
[   26.450280]  ? trace_preempt_on+0x20/0xc0
[   26.450304]  ? __pfx_kthread+0x10/0x10
[   26.450326]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.450348]  ? calculate_sigpending+0x7b/0xa0
[   26.450372]  ? __pfx_kthread+0x10/0x10
[   26.450393]  ret_from_fork+0x116/0x1d0
[   26.450412]  ? __pfx_kthread+0x10/0x10
[   26.450433]  ret_from_fork_asm+0x1a/0x30
[   26.450463]  </TASK>
[   26.450474] 
[   26.460920] Allocated by task 311:
[   26.461058]  kasan_save_stack+0x45/0x70
[   26.461193]  kasan_save_track+0x18/0x40
[   26.461366]  kasan_save_alloc_info+0x3b/0x50
[   26.461594]  __kasan_kmalloc+0xb7/0xc0
[   26.461779]  __kmalloc_cache_noprof+0x189/0x420
[   26.462189]  kasan_bitops_generic+0x92/0x1c0
[   26.462391]  kunit_try_run_case+0x1a5/0x480
[   26.462539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.462836]  kthread+0x337/0x6f0
[   26.462961]  ret_from_fork+0x116/0x1d0
[   26.463086]  ret_from_fork_asm+0x1a/0x30
[   26.463218] 
[   26.463307] The buggy address belongs to the object at ffff8881058a8240
[   26.463307]  which belongs to the cache kmalloc-16 of size 16
[   26.463992] The buggy address is located 8 bytes inside of
[   26.463992]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.464471] 
[   26.464549] The buggy address belongs to the physical page:
[   26.464802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.465138] flags: 0x200000000000000(node=0|zone=2)
[   26.465346] page_type: f5(slab)
[   26.465530] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.465846] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.466186] page dumped because: kasan: bad access detected
[   26.466451] 
[   26.466530] Memory state around the buggy address:
[   26.466712]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.467167]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.467461] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.467785]                                               ^
[   26.467975]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.468184]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.468388] ==================================================================
[   26.350163] ==================================================================
[   26.350550] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.350988] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.351300] 
[   26.351408] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.351456] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.351480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.351499] Call Trace:
[   26.351514]  <TASK>
[   26.351529]  dump_stack_lvl+0x73/0xb0
[   26.351568]  print_report+0xd1/0x610
[   26.351590]  ? __virt_addr_valid+0x1db/0x2d0
[   26.351613]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.351639]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.351664]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.351691]  kasan_report+0x141/0x180
[   26.351720]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.351752]  kasan_check_range+0x10c/0x1c0
[   26.351794]  __kasan_check_write+0x18/0x20
[   26.351823]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.351852]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.351879]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.351903]  ? trace_hardirqs_on+0x37/0xe0
[   26.351925]  ? kasan_bitops_generic+0x92/0x1c0
[   26.351951]  kasan_bitops_generic+0x121/0x1c0
[   26.351974]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.351999]  ? __pfx_read_tsc+0x10/0x10
[   26.352019]  ? ktime_get_ts64+0x86/0x230
[   26.352042]  kunit_try_run_case+0x1a5/0x480
[   26.352064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.352084]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.352108]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.352131]  ? __kthread_parkme+0x82/0x180
[   26.352152]  ? preempt_count_sub+0x50/0x80
[   26.352175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.352196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.352231]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.352256]  kthread+0x337/0x6f0
[   26.352275]  ? trace_preempt_on+0x20/0xc0
[   26.352309]  ? __pfx_kthread+0x10/0x10
[   26.352330]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.352351]  ? calculate_sigpending+0x7b/0xa0
[   26.352386]  ? __pfx_kthread+0x10/0x10
[   26.352408]  ret_from_fork+0x116/0x1d0
[   26.352427]  ? __pfx_kthread+0x10/0x10
[   26.352459]  ret_from_fork_asm+0x1a/0x30
[   26.352490]  </TASK>
[   26.352502] 
[   26.360264] Allocated by task 311:
[   26.360430]  kasan_save_stack+0x45/0x70
[   26.360620]  kasan_save_track+0x18/0x40
[   26.360826]  kasan_save_alloc_info+0x3b/0x50
[   26.361029]  __kasan_kmalloc+0xb7/0xc0
[   26.361202]  __kmalloc_cache_noprof+0x189/0x420
[   26.361349]  kasan_bitops_generic+0x92/0x1c0
[   26.361523]  kunit_try_run_case+0x1a5/0x480
[   26.361743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.362006]  kthread+0x337/0x6f0
[   26.362165]  ret_from_fork+0x116/0x1d0
[   26.362306]  ret_from_fork_asm+0x1a/0x30
[   26.362495] 
[   26.362583] The buggy address belongs to the object at ffff8881058a8240
[   26.362583]  which belongs to the cache kmalloc-16 of size 16
[   26.363107] The buggy address is located 8 bytes inside of
[   26.363107]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.363495] 
[   26.363560] The buggy address belongs to the physical page:
[   26.363736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.363990] flags: 0x200000000000000(node=0|zone=2)
[   26.364218] page_type: f5(slab)
[   26.364397] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.364736] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.365079] page dumped because: kasan: bad access detected
[   26.365244] 
[   26.365305] Memory state around the buggy address:
[   26.365452]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.365661]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.365926] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.366239]                                               ^
[   26.366510]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.366856]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.367184] ==================================================================