Hay
Date
July 16, 2025, 12:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   33.031502] ==================================================================
[   33.031578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   33.031636] Read of size 8 at addr fff00000c6360328 by task kunit_try_catch/292
[   33.031707] 
[   33.031748] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.031866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.031894] Hardware name: linux,dummy-virt (DT)
[   33.031928] Call trace:
[   33.031951]  show_stack+0x20/0x38 (C)
[   33.032002]  dump_stack_lvl+0x8c/0xd0
[   33.032051]  print_report+0x118/0x5d0
[   33.032098]  kasan_report+0xdc/0x128
[   33.032142]  __asan_report_load8_noabort+0x20/0x30
[   33.032194]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   33.032249]  kasan_bitops_generic+0x110/0x1c8
[   33.032318]  kunit_try_run_case+0x170/0x3f0
[   33.032368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.032423]  kthread+0x328/0x630
[   33.032571]  ret_from_fork+0x10/0x20
[   33.032704] 
[   33.032765] Allocated by task 292:
[   33.033425]  kasan_bitops_generic+0xa0/0x1c8
[   33.035580] >fff00000c6360300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.038031]  ret_from_fork+0x10/0x20
[   33.039043] The buggy address is located 8 bytes inside of
[   33.039043]  allocated 9-byte region [fff00000c6360320, fff00000c6360329)
[   33.040473] Hardware name: linux,dummy-virt (DT)
[   33.041680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.042693] ==================================================================
[   33.023416] ==================================================================
[   33.023477] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   33.023560] Write of size 8 at addr fff00000c6360328 by task kunit_try_catch/292
[   33.023613] 
[   33.023645] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.023734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.023763] Hardware name: linux,dummy-virt (DT)
[   33.023796] Call trace:
[   33.023821]  show_stack+0x20/0x38 (C)
[   33.023869]  dump_stack_lvl+0x8c/0xd0
[   33.023917]  print_report+0x118/0x5d0
[   33.023963]  kasan_report+0xdc/0x128
[   33.024008]  kasan_check_range+0x100/0x1a8
[   33.024056]  __kasan_check_write+0x20/0x30
[   33.024105]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   33.024159]  kasan_bitops_generic+0x110/0x1c8
[   33.024209]  kunit_try_run_case+0x170/0x3f0
[   33.024258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.024312]  kthread+0x328/0x630
[   33.024354]  ret_from_fork+0x10/0x20
[   33.024403] 
[   33.024423] Allocated by task 292:
[   33.024451]  kasan_save_stack+0x3c/0x68
[   33.024491]  kasan_save_track+0x20/0x40
[   33.028618]  kasan_save_alloc_info+0x40/0x58
[   33.028666]  __kasan_kmalloc+0xd4/0xd8
[   33.028706]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.028751]  kasan_bitops_generic+0xa0/0x1c8
[   33.028793]  kunit_try_run_case+0x170/0x3f0
[   33.028834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.028880]  kthread+0x328/0x630
[   33.028919]  ret_from_fork+0x10/0x20
[   33.028957] 
[   33.028981] The buggy address belongs to the object at fff00000c6360320
[   33.028981]  which belongs to the cache kmalloc-16 of size 16
[   33.029045] The buggy address is located 8 bytes inside of
[   33.029045]  allocated 9-byte region [fff00000c6360320, fff00000c6360329)
[   33.029110] 
[   33.029245] The buggy address belongs to the physical page:
[   33.029294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360
[   33.029456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.029532] page_type: f5(slab)
[   33.029609] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.029689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.029763] page dumped because: kasan: bad access detected
[   33.029799] 
[   33.029848] Memory state around the buggy address:
[   33.029897]  fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.029944]  fff00000c6360280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.029990] >fff00000c6360300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.030031]                                   ^
[   33.030066]  fff00000c6360380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.030111]  fff00000c6360400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.030203] ==================================================================

[   25.393929] ==================================================================
[   25.394260] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.394552] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.394889] 
[   25.395154] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.395206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.395219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.395240] Call Trace:
[   25.395261]  <TASK>
[   25.395276]  dump_stack_lvl+0x73/0xb0
[   25.395318]  print_report+0xd1/0x610
[   25.395341]  ? __virt_addr_valid+0x1db/0x2d0
[   25.395364]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.395389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.395415]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.395440]  kasan_report+0x141/0x180
[   25.395462]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.395492]  kasan_check_range+0x10c/0x1c0
[   25.395515]  __kasan_check_write+0x18/0x20
[   25.395540]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.395565]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.395606]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.395630]  ? finish_task_switch.isra.0+0x156/0x700
[   25.395652]  ? kasan_bitops_generic+0x92/0x1c0
[   25.395679]  kasan_bitops_generic+0x116/0x1c0
[   25.395702]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.395726]  ? __pfx_read_tsc+0x10/0x10
[   25.395749]  ? ktime_get_ts64+0x86/0x230
[   25.395775]  kunit_try_run_case+0x1a5/0x480
[   25.395799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.395821]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.395843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.395865]  ? __kthread_parkme+0x82/0x180
[   25.395885]  ? preempt_count_sub+0x50/0x80
[   25.395907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.395929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.395956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.395983]  kthread+0x337/0x6f0
[   25.396002]  ? trace_preempt_on+0x20/0xc0
[   25.396025]  ? __pfx_kthread+0x10/0x10
[   25.396045]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.396066]  ? calculate_sigpending+0x7b/0xa0
[   25.396091]  ? __pfx_kthread+0x10/0x10
[   25.396113]  ret_from_fork+0x116/0x1d0
[   25.396132]  ? __pfx_kthread+0x10/0x10
[   25.396152]  ret_from_fork_asm+0x1a/0x30
[   25.396182]  </TASK>
[   25.396193] 
[   25.404714] Allocated by task 310:
[   25.404910]  kasan_save_stack+0x45/0x70
[   25.405118]  kasan_save_track+0x18/0x40
[   25.405246]  kasan_save_alloc_info+0x3b/0x50
[   25.405467]  __kasan_kmalloc+0xb7/0xc0
[   25.405612]  __kmalloc_cache_noprof+0x189/0x420
[   25.405802]  kasan_bitops_generic+0x92/0x1c0
[   25.406008]  kunit_try_run_case+0x1a5/0x480
[   25.406208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.406470]  kthread+0x337/0x6f0
[   25.406633]  ret_from_fork+0x116/0x1d0
[   25.406812]  ret_from_fork_asm+0x1a/0x30
[   25.406959] 
[   25.407023] The buggy address belongs to the object at ffff888105376d80
[   25.407023]  which belongs to the cache kmalloc-16 of size 16
[   25.407559] The buggy address is located 8 bytes inside of
[   25.407559]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.408739] 
[   25.408814] The buggy address belongs to the physical page:
[   25.409321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.409660] flags: 0x200000000000000(node=0|zone=2)
[   25.409900] page_type: f5(slab)
[   25.410043] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.410350] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.410710] page dumped because: kasan: bad access detected
[   25.410921] 
[   25.410995] Memory state around the buggy address:
[   25.411206]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.411499]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.411760] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.411965]                       ^
[   25.412082]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.412293]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.412575] ==================================================================
[   25.374433] ==================================================================
[   25.375033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.375361] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.375640] 
[   25.375729] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.375783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.375796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.375818] Call Trace:
[   25.375857]  <TASK>
[   25.376101]  dump_stack_lvl+0x73/0xb0
[   25.376141]  print_report+0xd1/0x610
[   25.376165]  ? __virt_addr_valid+0x1db/0x2d0
[   25.376191]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.376217]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.376243]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.376268]  kasan_report+0x141/0x180
[   25.376290]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.376336]  kasan_check_range+0x10c/0x1c0
[   25.376360]  __kasan_check_write+0x18/0x20
[   25.376383]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.376408]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.376434]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.376460]  ? finish_task_switch.isra.0+0x156/0x700
[   25.376483]  ? kasan_bitops_generic+0x92/0x1c0
[   25.376511]  kasan_bitops_generic+0x116/0x1c0
[   25.376533]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.376558]  ? __pfx_read_tsc+0x10/0x10
[   25.376580]  ? ktime_get_ts64+0x86/0x230
[   25.376606]  kunit_try_run_case+0x1a5/0x480
[   25.376631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.376654]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.376678]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.376699]  ? __kthread_parkme+0x82/0x180
[   25.376720]  ? preempt_count_sub+0x50/0x80
[   25.376742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.376765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.376792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.376819]  kthread+0x337/0x6f0
[   25.376837]  ? trace_preempt_on+0x20/0xc0
[   25.376861]  ? __pfx_kthread+0x10/0x10
[   25.376945]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.376966]  ? calculate_sigpending+0x7b/0xa0
[   25.376990]  ? __pfx_kthread+0x10/0x10
[   25.377011]  ret_from_fork+0x116/0x1d0
[   25.377032]  ? __pfx_kthread+0x10/0x10
[   25.377052]  ret_from_fork_asm+0x1a/0x30
[   25.377085]  </TASK>
[   25.377095] 
[   25.385087] Allocated by task 310:
[   25.385265]  kasan_save_stack+0x45/0x70
[   25.385471]  kasan_save_track+0x18/0x40
[   25.385661]  kasan_save_alloc_info+0x3b/0x50
[   25.385864]  __kasan_kmalloc+0xb7/0xc0
[   25.386042]  __kmalloc_cache_noprof+0x189/0x420
[   25.386346]  kasan_bitops_generic+0x92/0x1c0
[   25.386730]  kunit_try_run_case+0x1a5/0x480
[   25.387019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.387311]  kthread+0x337/0x6f0
[   25.387459]  ret_from_fork+0x116/0x1d0
[   25.387617]  ret_from_fork_asm+0x1a/0x30
[   25.387796] 
[   25.387861] The buggy address belongs to the object at ffff888105376d80
[   25.387861]  which belongs to the cache kmalloc-16 of size 16
[   25.388444] The buggy address is located 8 bytes inside of
[   25.388444]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.388833] 
[   25.388904] The buggy address belongs to the physical page:
[   25.389070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.389316] flags: 0x200000000000000(node=0|zone=2)
[   25.389567] page_type: f5(slab)
[   25.389827] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.390156] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.390477] page dumped because: kasan: bad access detected
[   25.390641] 
[   25.390704] Memory state around the buggy address:
[   25.390854]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.391062]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.391549] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.391913]                       ^
[   25.392151]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.392491]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.392948] ==================================================================
[   25.444214] ==================================================================
[   25.444467] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.444918] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.445266] 
[   25.445394] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.445447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.445460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.445484] Call Trace:
[   25.445504]  <TASK>
[   25.445522]  dump_stack_lvl+0x73/0xb0
[   25.445550]  print_report+0xd1/0x610
[   25.445573]  ? __virt_addr_valid+0x1db/0x2d0
[   25.445771]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.445799]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.445836]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.445861]  kasan_report+0x141/0x180
[   25.445932]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.445963]  kasan_check_range+0x10c/0x1c0
[   25.445987]  __kasan_check_write+0x18/0x20
[   25.446011]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.446036]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.446062]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.446086]  ? finish_task_switch.isra.0+0x156/0x700
[   25.446109]  ? kasan_bitops_generic+0x92/0x1c0
[   25.446136]  kasan_bitops_generic+0x116/0x1c0
[   25.446159]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.446182]  ? __pfx_read_tsc+0x10/0x10
[   25.446205]  ? ktime_get_ts64+0x86/0x230
[   25.446229]  kunit_try_run_case+0x1a5/0x480
[   25.446254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.446276]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.446314]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.446338]  ? __kthread_parkme+0x82/0x180
[   25.446358]  ? preempt_count_sub+0x50/0x80
[   25.446380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.446403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.446429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.446456]  kthread+0x337/0x6f0
[   25.446476]  ? trace_preempt_on+0x20/0xc0
[   25.446499]  ? __pfx_kthread+0x10/0x10
[   25.446520]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.446542]  ? calculate_sigpending+0x7b/0xa0
[   25.446565]  ? __pfx_kthread+0x10/0x10
[   25.446586]  ret_from_fork+0x116/0x1d0
[   25.446605]  ? __pfx_kthread+0x10/0x10
[   25.446625]  ret_from_fork_asm+0x1a/0x30
[   25.446655]  </TASK>
[   25.446666] 
[   25.455097] Allocated by task 310:
[   25.455283]  kasan_save_stack+0x45/0x70
[   25.455498]  kasan_save_track+0x18/0x40
[   25.455780]  kasan_save_alloc_info+0x3b/0x50
[   25.455926]  __kasan_kmalloc+0xb7/0xc0
[   25.456053]  __kmalloc_cache_noprof+0x189/0x420
[   25.456236]  kasan_bitops_generic+0x92/0x1c0
[   25.456450]  kunit_try_run_case+0x1a5/0x480
[   25.456646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.456974]  kthread+0x337/0x6f0
[   25.457123]  ret_from_fork+0x116/0x1d0
[   25.457249]  ret_from_fork_asm+0x1a/0x30
[   25.457533] 
[   25.457613] The buggy address belongs to the object at ffff888105376d80
[   25.457613]  which belongs to the cache kmalloc-16 of size 16
[   25.458112] The buggy address is located 8 bytes inside of
[   25.458112]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.460440] 
[   25.461001] The buggy address belongs to the physical page:
[   25.461205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.462956] flags: 0x200000000000000(node=0|zone=2)
[   25.463609] page_type: f5(slab)
[   25.464469] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.464864] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.465229] page dumped because: kasan: bad access detected
[   25.465583] 
[   25.465727] Memory state around the buggy address:
[   25.465886]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.466843]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.467555] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.468434]                       ^
[   25.468596]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.468911]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.469123] ==================================================================
[   25.413378] ==================================================================
[   25.413774] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.414127] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.414679] 
[   25.415095] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.415161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.415175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.415198] Call Trace:
[   25.415219]  <TASK>
[   25.415237]  dump_stack_lvl+0x73/0xb0
[   25.415268]  print_report+0xd1/0x610
[   25.415290]  ? __virt_addr_valid+0x1db/0x2d0
[   25.415324]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.415351]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.415872]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.415903]  kasan_report+0x141/0x180
[   25.415927]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.415958]  kasan_check_range+0x10c/0x1c0
[   25.415982]  __kasan_check_write+0x18/0x20
[   25.416014]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.416041]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.416067]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.416091]  ? finish_task_switch.isra.0+0x156/0x700
[   25.416115]  ? kasan_bitops_generic+0x92/0x1c0
[   25.416142]  kasan_bitops_generic+0x116/0x1c0
[   25.416165]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.416189]  ? __pfx_read_tsc+0x10/0x10
[   25.416215]  ? ktime_get_ts64+0x86/0x230
[   25.416241]  kunit_try_run_case+0x1a5/0x480
[   25.416266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.416288]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.416323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.416346]  ? __kthread_parkme+0x82/0x180
[   25.416366]  ? preempt_count_sub+0x50/0x80
[   25.416389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.416412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.416438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.416465]  kthread+0x337/0x6f0
[   25.416484]  ? trace_preempt_on+0x20/0xc0
[   25.416508]  ? __pfx_kthread+0x10/0x10
[   25.416528]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.416548]  ? calculate_sigpending+0x7b/0xa0
[   25.416572]  ? __pfx_kthread+0x10/0x10
[   25.416634]  ret_from_fork+0x116/0x1d0
[   25.416652]  ? __pfx_kthread+0x10/0x10
[   25.416673]  ret_from_fork_asm+0x1a/0x30
[   25.416704]  </TASK>
[   25.416715] 
[   25.430403] Allocated by task 310:
[   25.430578]  kasan_save_stack+0x45/0x70
[   25.430764]  kasan_save_track+0x18/0x40
[   25.431020]  kasan_save_alloc_info+0x3b/0x50
[   25.431212]  __kasan_kmalloc+0xb7/0xc0
[   25.431388]  __kmalloc_cache_noprof+0x189/0x420
[   25.431586]  kasan_bitops_generic+0x92/0x1c0
[   25.431777]  kunit_try_run_case+0x1a5/0x480
[   25.431957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.432179]  kthread+0x337/0x6f0
[   25.432781]  ret_from_fork+0x116/0x1d0
[   25.433421]  ret_from_fork_asm+0x1a/0x30
[   25.433772] 
[   25.434011] The buggy address belongs to the object at ffff888105376d80
[   25.434011]  which belongs to the cache kmalloc-16 of size 16
[   25.434894] The buggy address is located 8 bytes inside of
[   25.434894]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.436007] 
[   25.436242] The buggy address belongs to the physical page:
[   25.436508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.437087] flags: 0x200000000000000(node=0|zone=2)
[   25.437856] page_type: f5(slab)
[   25.438220] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.438793] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.439371] page dumped because: kasan: bad access detected
[   25.439845] 
[   25.440116] Memory state around the buggy address:
[   25.440449]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.441119]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.441852] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.442371]                       ^
[   25.442536]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.443284]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.443738] ==================================================================
[   25.469752] ==================================================================
[   25.469996] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   25.471675] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.472719] 
[   25.473004] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.473072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.473086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.473109] Call Trace:
[   25.473132]  <TASK>
[   25.473155]  dump_stack_lvl+0x73/0xb0
[   25.473193]  print_report+0xd1/0x610
[   25.473218]  ? __virt_addr_valid+0x1db/0x2d0
[   25.473242]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   25.473268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.473294]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   25.473332]  kasan_report+0x141/0x180
[   25.473354]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   25.473382]  kasan_check_range+0x10c/0x1c0
[   25.473406]  __kasan_check_write+0x18/0x20
[   25.473430]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   25.473454]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.473480]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.473505]  ? finish_task_switch.isra.0+0x156/0x700
[   25.473527]  ? kasan_bitops_generic+0x92/0x1c0
[   25.473553]  kasan_bitops_generic+0x116/0x1c0
[   25.473582]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.473612]  ? __pfx_read_tsc+0x10/0x10
[   25.473636]  ? ktime_get_ts64+0x86/0x230
[   25.473663]  kunit_try_run_case+0x1a5/0x480
[   25.473687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.473709]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.473732]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.473755]  ? __kthread_parkme+0x82/0x180
[   25.473774]  ? preempt_count_sub+0x50/0x80
[   25.473798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.473821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.473847]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.473874]  kthread+0x337/0x6f0
[   25.473893]  ? trace_preempt_on+0x20/0xc0
[   25.473916]  ? __pfx_kthread+0x10/0x10
[   25.473936]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.473957]  ? calculate_sigpending+0x7b/0xa0
[   25.473980]  ? __pfx_kthread+0x10/0x10
[   25.474001]  ret_from_fork+0x116/0x1d0
[   25.474020]  ? __pfx_kthread+0x10/0x10
[   25.474041]  ret_from_fork_asm+0x1a/0x30
[   25.474072]  </TASK>
[   25.474082] 
[   25.489356] Allocated by task 310:
[   25.489504]  kasan_save_stack+0x45/0x70
[   25.489844]  kasan_save_track+0x18/0x40
[   25.490269]  kasan_save_alloc_info+0x3b/0x50
[   25.490778]  __kasan_kmalloc+0xb7/0xc0
[   25.491179]  __kmalloc_cache_noprof+0x189/0x420
[   25.491704]  kasan_bitops_generic+0x92/0x1c0
[   25.492129]  kunit_try_run_case+0x1a5/0x480
[   25.492543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.492733]  kthread+0x337/0x6f0
[   25.492850]  ret_from_fork+0x116/0x1d0
[   25.493223]  ret_from_fork_asm+0x1a/0x30
[   25.493682] 
[   25.493876] The buggy address belongs to the object at ffff888105376d80
[   25.493876]  which belongs to the cache kmalloc-16 of size 16
[   25.495069] The buggy address is located 8 bytes inside of
[   25.495069]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.495621] 
[   25.495698] The buggy address belongs to the physical page:
[   25.496043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.496803] flags: 0x200000000000000(node=0|zone=2)
[   25.497343] page_type: f5(slab)
[   25.497681] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.498602] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.499160] page dumped because: kasan: bad access detected
[   25.499347] 
[   25.499416] Memory state around the buggy address:
[   25.499569]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.499778]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.500516] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.501221]                       ^
[   25.501570]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.502281]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.503102] ==================================================================
[   25.533753] ==================================================================
[   25.534010] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   25.534408] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.534820] 
[   25.534920] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.534973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.534986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.535007] Call Trace:
[   25.535029]  <TASK>
[   25.535049]  dump_stack_lvl+0x73/0xb0
[   25.535078]  print_report+0xd1/0x610
[   25.535102]  ? __virt_addr_valid+0x1db/0x2d0
[   25.535125]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   25.535150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.535176]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   25.535201]  kasan_report+0x141/0x180
[   25.535222]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   25.535251]  kasan_check_range+0x10c/0x1c0
[   25.535274]  __kasan_check_write+0x18/0x20
[   25.535296]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   25.535334]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.535360]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.535384]  ? finish_task_switch.isra.0+0x156/0x700
[   25.535407]  ? kasan_bitops_generic+0x92/0x1c0
[   25.535432]  kasan_bitops_generic+0x116/0x1c0
[   25.535455]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.535479]  ? __pfx_read_tsc+0x10/0x10
[   25.535502]  ? ktime_get_ts64+0x86/0x230
[   25.535526]  kunit_try_run_case+0x1a5/0x480
[   25.535551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.535573]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.535669]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.535693]  ? __kthread_parkme+0x82/0x180
[   25.535713]  ? preempt_count_sub+0x50/0x80
[   25.535736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.535760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.535788]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.535814]  kthread+0x337/0x6f0
[   25.535834]  ? trace_preempt_on+0x20/0xc0
[   25.535857]  ? __pfx_kthread+0x10/0x10
[   25.535878]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.535898]  ? calculate_sigpending+0x7b/0xa0
[   25.535922]  ? __pfx_kthread+0x10/0x10
[   25.535943]  ret_from_fork+0x116/0x1d0
[   25.535963]  ? __pfx_kthread+0x10/0x10
[   25.535984]  ret_from_fork_asm+0x1a/0x30
[   25.536016]  </TASK>
[   25.536027] 
[   25.544240] Allocated by task 310:
[   25.544385]  kasan_save_stack+0x45/0x70
[   25.544532]  kasan_save_track+0x18/0x40
[   25.544660]  kasan_save_alloc_info+0x3b/0x50
[   25.545039]  __kasan_kmalloc+0xb7/0xc0
[   25.545235]  __kmalloc_cache_noprof+0x189/0x420
[   25.545463]  kasan_bitops_generic+0x92/0x1c0
[   25.545773]  kunit_try_run_case+0x1a5/0x480
[   25.545964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.546135]  kthread+0x337/0x6f0
[   25.546249]  ret_from_fork+0x116/0x1d0
[   25.546385]  ret_from_fork_asm+0x1a/0x30
[   25.546568] 
[   25.546998] The buggy address belongs to the object at ffff888105376d80
[   25.546998]  which belongs to the cache kmalloc-16 of size 16
[   25.547541] The buggy address is located 8 bytes inside of
[   25.547541]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.548121] 
[   25.548218] The buggy address belongs to the physical page:
[   25.548459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.548819] flags: 0x200000000000000(node=0|zone=2)
[   25.549079] page_type: f5(slab)
[   25.549203] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.549512] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.549855] page dumped because: kasan: bad access detected
[   25.550295] 
[   25.550407] Memory state around the buggy address:
[   25.550622]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.550836]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.551096] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.551415]                       ^
[   25.551645]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.552103]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.552422] ==================================================================
[   25.503984] ==================================================================
[   25.504744] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   25.505283] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.505520] 
[   25.505612] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.505664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.505676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.505698] Call Trace:
[   25.505720]  <TASK>
[   25.505739]  dump_stack_lvl+0x73/0xb0
[   25.505769]  print_report+0xd1/0x610
[   25.505792]  ? __virt_addr_valid+0x1db/0x2d0
[   25.505815]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   25.505840]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.505867]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   25.505902]  kasan_report+0x141/0x180
[   25.505924]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   25.505955]  kasan_check_range+0x10c/0x1c0
[   25.505979]  __kasan_check_write+0x18/0x20
[   25.506001]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   25.506026]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.506052]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.506076]  ? finish_task_switch.isra.0+0x156/0x700
[   25.506099]  ? kasan_bitops_generic+0x92/0x1c0
[   25.506125]  kasan_bitops_generic+0x116/0x1c0
[   25.506148]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.506172]  ? __pfx_read_tsc+0x10/0x10
[   25.506195]  ? ktime_get_ts64+0x86/0x230
[   25.506219]  kunit_try_run_case+0x1a5/0x480
[   25.506244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.506266]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.506289]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.506324]  ? __kthread_parkme+0x82/0x180
[   25.506343]  ? preempt_count_sub+0x50/0x80
[   25.506366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.506389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.506415]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.506441]  kthread+0x337/0x6f0
[   25.506460]  ? trace_preempt_on+0x20/0xc0
[   25.506485]  ? __pfx_kthread+0x10/0x10
[   25.506505]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.506526]  ? calculate_sigpending+0x7b/0xa0
[   25.506550]  ? __pfx_kthread+0x10/0x10
[   25.506571]  ret_from_fork+0x116/0x1d0
[   25.506608]  ? __pfx_kthread+0x10/0x10
[   25.506629]  ret_from_fork_asm+0x1a/0x30
[   25.506660]  </TASK>
[   25.506671] 
[   25.520431] Allocated by task 310:
[   25.520583]  kasan_save_stack+0x45/0x70
[   25.520733]  kasan_save_track+0x18/0x40
[   25.521011]  kasan_save_alloc_info+0x3b/0x50
[   25.521412]  __kasan_kmalloc+0xb7/0xc0
[   25.521748]  __kmalloc_cache_noprof+0x189/0x420
[   25.522132]  kasan_bitops_generic+0x92/0x1c0
[   25.522597]  kunit_try_run_case+0x1a5/0x480
[   25.522991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.523508]  kthread+0x337/0x6f0
[   25.523830]  ret_from_fork+0x116/0x1d0
[   25.524224]  ret_from_fork_asm+0x1a/0x30
[   25.524660] 
[   25.524830] The buggy address belongs to the object at ffff888105376d80
[   25.524830]  which belongs to the cache kmalloc-16 of size 16
[   25.526101] The buggy address is located 8 bytes inside of
[   25.526101]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.526482] 
[   25.526555] The buggy address belongs to the physical page:
[   25.527020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.527808] flags: 0x200000000000000(node=0|zone=2)
[   25.528274] page_type: f5(slab)
[   25.528639] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.529493] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.529903] page dumped because: kasan: bad access detected
[   25.530074] 
[   25.530139] Memory state around the buggy address:
[   25.530293]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.530518]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.531088] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.531722]                       ^
[   25.532086]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.532611]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.533238] ==================================================================
[   25.354356] ==================================================================
[   25.354832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   25.355295] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.355631] 
[   25.355726] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.355780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.355795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.355818] Call Trace:
[   25.355833]  <TASK>
[   25.355852]  dump_stack_lvl+0x73/0xb0
[   25.355896]  print_report+0xd1/0x610
[   25.355920]  ? __virt_addr_valid+0x1db/0x2d0
[   25.355944]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   25.355970]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.355996]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   25.356021]  kasan_report+0x141/0x180
[   25.356044]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   25.356073]  kasan_check_range+0x10c/0x1c0
[   25.356097]  __kasan_check_write+0x18/0x20
[   25.356121]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   25.356147]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.356172]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.356197]  ? finish_task_switch.isra.0+0x156/0x700
[   25.356220]  ? kasan_bitops_generic+0x92/0x1c0
[   25.356246]  kasan_bitops_generic+0x116/0x1c0
[   25.356269]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.356293]  ? __pfx_read_tsc+0x10/0x10
[   25.356326]  ? ktime_get_ts64+0x86/0x230
[   25.356352]  kunit_try_run_case+0x1a5/0x480
[   25.356376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.356400]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.356423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.356445]  ? __kthread_parkme+0x82/0x180
[   25.356465]  ? preempt_count_sub+0x50/0x80
[   25.356488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.356511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.356537]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.356563]  kthread+0x337/0x6f0
[   25.356583]  ? trace_preempt_on+0x20/0xc0
[   25.356607]  ? __pfx_kthread+0x10/0x10
[   25.356628]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.356648]  ? calculate_sigpending+0x7b/0xa0
[   25.356673]  ? __pfx_kthread+0x10/0x10
[   25.356695]  ret_from_fork+0x116/0x1d0
[   25.356714]  ? __pfx_kthread+0x10/0x10
[   25.356735]  ret_from_fork_asm+0x1a/0x30
[   25.356766]  </TASK>
[   25.356777] 
[   25.365329] Allocated by task 310:
[   25.365498]  kasan_save_stack+0x45/0x70
[   25.365708]  kasan_save_track+0x18/0x40
[   25.365895]  kasan_save_alloc_info+0x3b/0x50
[   25.366281]  __kasan_kmalloc+0xb7/0xc0
[   25.366415]  __kmalloc_cache_noprof+0x189/0x420
[   25.366624]  kasan_bitops_generic+0x92/0x1c0
[   25.366908]  kunit_try_run_case+0x1a5/0x480
[   25.367115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.367310]  kthread+0x337/0x6f0
[   25.367428]  ret_from_fork+0x116/0x1d0
[   25.367657]  ret_from_fork_asm+0x1a/0x30
[   25.368111] 
[   25.368204] The buggy address belongs to the object at ffff888105376d80
[   25.368204]  which belongs to the cache kmalloc-16 of size 16
[   25.368734] The buggy address is located 8 bytes inside of
[   25.368734]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.369269] 
[   25.369353] The buggy address belongs to the physical page:
[   25.369525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.369769] flags: 0x200000000000000(node=0|zone=2)
[   25.369951] page_type: f5(slab)
[   25.370120] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.370461] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.371200] page dumped because: kasan: bad access detected
[   25.371454] 
[   25.371519] Memory state around the buggy address:
[   25.371674]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.371884]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.372092] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.372552]                       ^
[   25.373118]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.373476]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.374021] ==================================================================