Hay
Date
July 16, 2025, 12:11 p.m.

Environment
qemu-x86_64

[   25.608459] ==================================================================
[   25.608769] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.609042] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.609259] 
[   25.609362] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.609409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.609420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.609440] Call Trace:
[   25.609458]  <TASK>
[   25.609475]  dump_stack_lvl+0x73/0xb0
[   25.609502]  print_report+0xd1/0x610
[   25.609524]  ? __virt_addr_valid+0x1db/0x2d0
[   25.609547]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.609572]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.609601]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.609627]  kasan_report+0x141/0x180
[   25.609648]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.609678]  kasan_check_range+0x10c/0x1c0
[   25.609701]  __kasan_check_write+0x18/0x20
[   25.609724]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.609749]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.609778]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.609801]  ? finish_task_switch.isra.0+0x156/0x700
[   25.609822]  ? kasan_bitops_generic+0x92/0x1c0
[   25.609848]  kasan_bitops_generic+0x121/0x1c0
[   25.609870]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.609894]  ? __pfx_read_tsc+0x10/0x10
[   25.609915]  ? ktime_get_ts64+0x86/0x230
[   25.609939]  kunit_try_run_case+0x1a5/0x480
[   25.609962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.609983]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.610005]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.610027]  ? __kthread_parkme+0x82/0x180
[   25.610047]  ? preempt_count_sub+0x50/0x80
[   25.610069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.610091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.610117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.610143]  kthread+0x337/0x6f0
[   25.610161]  ? trace_preempt_on+0x20/0xc0
[   25.610184]  ? __pfx_kthread+0x10/0x10
[   25.610204]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.610224]  ? calculate_sigpending+0x7b/0xa0
[   25.610248]  ? __pfx_kthread+0x10/0x10
[   25.610268]  ret_from_fork+0x116/0x1d0
[   25.610287]  ? __pfx_kthread+0x10/0x10
[   25.610687]  ret_from_fork_asm+0x1a/0x30
[   25.610727]  </TASK>
[   25.610738] 
[   25.618319] Allocated by task 310:
[   25.618445]  kasan_save_stack+0x45/0x70
[   25.618609]  kasan_save_track+0x18/0x40
[   25.618740]  kasan_save_alloc_info+0x3b/0x50
[   25.618909]  __kasan_kmalloc+0xb7/0xc0
[   25.619088]  __kmalloc_cache_noprof+0x189/0x420
[   25.619313]  kasan_bitops_generic+0x92/0x1c0
[   25.619518]  kunit_try_run_case+0x1a5/0x480
[   25.619746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.619999]  kthread+0x337/0x6f0
[   25.620163]  ret_from_fork+0x116/0x1d0
[   25.620360]  ret_from_fork_asm+0x1a/0x30
[   25.620552] 
[   25.620661] The buggy address belongs to the object at ffff888105376d80
[   25.620661]  which belongs to the cache kmalloc-16 of size 16
[   25.621187] The buggy address is located 8 bytes inside of
[   25.621187]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.621722] 
[   25.621806] The buggy address belongs to the physical page:
[   25.621994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.622272] flags: 0x200000000000000(node=0|zone=2)
[   25.622520] page_type: f5(slab)
[   25.622713] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.622993] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.623316] page dumped because: kasan: bad access detected
[   25.623531] 
[   25.623638] Memory state around the buggy address:
[   25.623831]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.624104]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.624359] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.624582]                       ^
[   25.624698]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.624905]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.625108] ==================================================================
[   25.571975] ==================================================================
[   25.573213] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.573699] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.573982] 
[   25.574083] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.574135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.574148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.574172] Call Trace:
[   25.574189]  <TASK>
[   25.574208]  dump_stack_lvl+0x73/0xb0
[   25.574241]  print_report+0xd1/0x610
[   25.574264]  ? __virt_addr_valid+0x1db/0x2d0
[   25.574290]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.574331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.574357]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.574384]  kasan_report+0x141/0x180
[   25.574406]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.574437]  kasan_check_range+0x10c/0x1c0
[   25.574460]  __kasan_check_write+0x18/0x20
[   25.574483]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.574509]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.574537]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.574562]  ? finish_task_switch.isra.0+0x156/0x700
[   25.574596]  ? kasan_bitops_generic+0x92/0x1c0
[   25.574622]  kasan_bitops_generic+0x121/0x1c0
[   25.574644]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.574669]  ? __pfx_read_tsc+0x10/0x10
[   25.574692]  ? ktime_get_ts64+0x86/0x230
[   25.574719]  kunit_try_run_case+0x1a5/0x480
[   25.574745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.574767]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.574791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.574813]  ? __kthread_parkme+0x82/0x180
[   25.574834]  ? preempt_count_sub+0x50/0x80
[   25.574856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.574879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.574906]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.574933]  kthread+0x337/0x6f0
[   25.574952]  ? trace_preempt_on+0x20/0xc0
[   25.574977]  ? __pfx_kthread+0x10/0x10
[   25.574998]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.575019]  ? calculate_sigpending+0x7b/0xa0
[   25.575044]  ? __pfx_kthread+0x10/0x10
[   25.575065]  ret_from_fork+0x116/0x1d0
[   25.575084]  ? __pfx_kthread+0x10/0x10
[   25.575104]  ret_from_fork_asm+0x1a/0x30
[   25.575137]  </TASK>
[   25.575148] 
[   25.582794] Allocated by task 310:
[   25.582954]  kasan_save_stack+0x45/0x70
[   25.583137]  kasan_save_track+0x18/0x40
[   25.583331]  kasan_save_alloc_info+0x3b/0x50
[   25.583515]  __kasan_kmalloc+0xb7/0xc0
[   25.583685]  __kmalloc_cache_noprof+0x189/0x420
[   25.583836]  kasan_bitops_generic+0x92/0x1c0
[   25.583976]  kunit_try_run_case+0x1a5/0x480
[   25.584114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.584284]  kthread+0x337/0x6f0
[   25.584457]  ret_from_fork+0x116/0x1d0
[   25.584641]  ret_from_fork_asm+0x1a/0x30
[   25.584843] 
[   25.584932] The buggy address belongs to the object at ffff888105376d80
[   25.584932]  which belongs to the cache kmalloc-16 of size 16
[   25.585470] The buggy address is located 8 bytes inside of
[   25.585470]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.585905] 
[   25.585972] The buggy address belongs to the physical page:
[   25.586171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.586528] flags: 0x200000000000000(node=0|zone=2)
[   25.586987] page_type: f5(slab)
[   25.587140] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.587438] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.587741] page dumped because: kasan: bad access detected
[   25.587976] 
[   25.588050] Memory state around the buggy address:
[   25.588249]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.588547]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.588840] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.589112]                       ^
[   25.589282]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.589573]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.589846] ==================================================================
[   25.701107] ==================================================================
[   25.701445] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.702258] Read of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.702635] 
[   25.702744] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.702795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.702808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.702830] Call Trace:
[   25.702852]  <TASK>
[   25.702869]  dump_stack_lvl+0x73/0xb0
[   25.702900]  print_report+0xd1/0x610
[   25.702922]  ? __virt_addr_valid+0x1db/0x2d0
[   25.702946]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.702972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.702997]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.703024]  kasan_report+0x141/0x180
[   25.703045]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.703076]  kasan_check_range+0x10c/0x1c0
[   25.703099]  __kasan_check_read+0x15/0x20
[   25.703124]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.703152]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.703179]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.703204]  ? finish_task_switch.isra.0+0x156/0x700
[   25.703227]  ? kasan_bitops_generic+0x92/0x1c0
[   25.703253]  kasan_bitops_generic+0x121/0x1c0
[   25.703276]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.703312]  ? __pfx_read_tsc+0x10/0x10
[   25.703337]  ? ktime_get_ts64+0x86/0x230
[   25.703363]  kunit_try_run_case+0x1a5/0x480
[   25.703388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.703410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.703433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.703456]  ? __kthread_parkme+0x82/0x180
[   25.703476]  ? preempt_count_sub+0x50/0x80
[   25.703499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.703522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.703549]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.703595]  kthread+0x337/0x6f0
[   25.703615]  ? trace_preempt_on+0x20/0xc0
[   25.703639]  ? __pfx_kthread+0x10/0x10
[   25.703659]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.703680]  ? calculate_sigpending+0x7b/0xa0
[   25.703704]  ? __pfx_kthread+0x10/0x10
[   25.703725]  ret_from_fork+0x116/0x1d0
[   25.703745]  ? __pfx_kthread+0x10/0x10
[   25.703765]  ret_from_fork_asm+0x1a/0x30
[   25.703796]  </TASK>
[   25.703807] 
[   25.711267] Allocated by task 310:
[   25.711446]  kasan_save_stack+0x45/0x70
[   25.711657]  kasan_save_track+0x18/0x40
[   25.711832]  kasan_save_alloc_info+0x3b/0x50
[   25.711976]  __kasan_kmalloc+0xb7/0xc0
[   25.712102]  __kmalloc_cache_noprof+0x189/0x420
[   25.712332]  kasan_bitops_generic+0x92/0x1c0
[   25.712537]  kunit_try_run_case+0x1a5/0x480
[   25.712758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.712991]  kthread+0x337/0x6f0
[   25.713147]  ret_from_fork+0x116/0x1d0
[   25.713319]  ret_from_fork_asm+0x1a/0x30
[   25.713457] 
[   25.713548] The buggy address belongs to the object at ffff888105376d80
[   25.713548]  which belongs to the cache kmalloc-16 of size 16
[   25.714074] The buggy address is located 8 bytes inside of
[   25.714074]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.714519] 
[   25.714638] The buggy address belongs to the physical page:
[   25.714863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.715118] flags: 0x200000000000000(node=0|zone=2)
[   25.715277] page_type: f5(slab)
[   25.715403] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.715648] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.715956] page dumped because: kasan: bad access detected
[   25.716200] 
[   25.716293] Memory state around the buggy address:
[   25.716521]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.716859]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.717069] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.717274]                       ^
[   25.717402]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.717647]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.717962] ==================================================================
[   25.553139] ==================================================================
[   25.553419] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.553760] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.553978] 
[   25.554374] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.554433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.554447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.554469] Call Trace:
[   25.554489]  <TASK>
[   25.554505]  dump_stack_lvl+0x73/0xb0
[   25.554537]  print_report+0xd1/0x610
[   25.554560]  ? __virt_addr_valid+0x1db/0x2d0
[   25.554583]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.554611]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.554636]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.554663]  kasan_report+0x141/0x180
[   25.554685]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.554715]  kasan_check_range+0x10c/0x1c0
[   25.554738]  __kasan_check_write+0x18/0x20
[   25.554761]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.554788]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.554816]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.554841]  ? finish_task_switch.isra.0+0x156/0x700
[   25.554864]  ? kasan_bitops_generic+0x92/0x1c0
[   25.555117]  kasan_bitops_generic+0x121/0x1c0
[   25.555141]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.555166]  ? __pfx_read_tsc+0x10/0x10
[   25.555189]  ? ktime_get_ts64+0x86/0x230
[   25.555215]  kunit_try_run_case+0x1a5/0x480
[   25.555239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.555261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.555285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.555323]  ? __kthread_parkme+0x82/0x180
[   25.555344]  ? preempt_count_sub+0x50/0x80
[   25.555367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.555390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.555417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.555443]  kthread+0x337/0x6f0
[   25.555462]  ? trace_preempt_on+0x20/0xc0
[   25.555486]  ? __pfx_kthread+0x10/0x10
[   25.555507]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.555527]  ? calculate_sigpending+0x7b/0xa0
[   25.555552]  ? __pfx_kthread+0x10/0x10
[   25.555572]  ret_from_fork+0x116/0x1d0
[   25.555592]  ? __pfx_kthread+0x10/0x10
[   25.555612]  ret_from_fork_asm+0x1a/0x30
[   25.555643]  </TASK>
[   25.555654] 
[   25.563748] Allocated by task 310:
[   25.563936]  kasan_save_stack+0x45/0x70
[   25.564141]  kasan_save_track+0x18/0x40
[   25.564320]  kasan_save_alloc_info+0x3b/0x50
[   25.564483]  __kasan_kmalloc+0xb7/0xc0
[   25.564668]  __kmalloc_cache_noprof+0x189/0x420
[   25.564820]  kasan_bitops_generic+0x92/0x1c0
[   25.564962]  kunit_try_run_case+0x1a5/0x480
[   25.565108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.565371]  kthread+0x337/0x6f0
[   25.565542]  ret_from_fork+0x116/0x1d0
[   25.565732]  ret_from_fork_asm+0x1a/0x30
[   25.565943] 
[   25.566032] The buggy address belongs to the object at ffff888105376d80
[   25.566032]  which belongs to the cache kmalloc-16 of size 16
[   25.566569] The buggy address is located 8 bytes inside of
[   25.566569]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.566985] 
[   25.567054] The buggy address belongs to the physical page:
[   25.567220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.567561] flags: 0x200000000000000(node=0|zone=2)
[   25.567795] page_type: f5(slab)
[   25.567982] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.568290] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.568527] page dumped because: kasan: bad access detected
[   25.569014] 
[   25.569108] Memory state around the buggy address:
[   25.569350]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.569650]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.569876] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.570086]                       ^
[   25.570257]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.570583]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.571040] ==================================================================
[   25.591039] ==================================================================
[   25.591353] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.591745] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.592056] 
[   25.592164] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.592213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.592225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.592246] Call Trace:
[   25.592266]  <TASK>
[   25.592281]  dump_stack_lvl+0x73/0xb0
[   25.592322]  print_report+0xd1/0x610
[   25.592344]  ? __virt_addr_valid+0x1db/0x2d0
[   25.592368]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.592394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.592419]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.592446]  kasan_report+0x141/0x180
[   25.592467]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.592498]  kasan_check_range+0x10c/0x1c0
[   25.592521]  __kasan_check_write+0x18/0x20
[   25.592544]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.592571]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.592608]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.592632]  ? finish_task_switch.isra.0+0x156/0x700
[   25.592654]  ? kasan_bitops_generic+0x92/0x1c0
[   25.592680]  kasan_bitops_generic+0x121/0x1c0
[   25.592704]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.592728]  ? __pfx_read_tsc+0x10/0x10
[   25.592751]  ? ktime_get_ts64+0x86/0x230
[   25.592775]  kunit_try_run_case+0x1a5/0x480
[   25.592800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.592822]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.592845]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.592867]  ? __kthread_parkme+0x82/0x180
[   25.592887]  ? preempt_count_sub+0x50/0x80
[   25.592910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.592933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.592960]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.592986]  kthread+0x337/0x6f0
[   25.593005]  ? trace_preempt_on+0x20/0xc0
[   25.593029]  ? __pfx_kthread+0x10/0x10
[   25.593050]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.593070]  ? calculate_sigpending+0x7b/0xa0
[   25.593093]  ? __pfx_kthread+0x10/0x10
[   25.593115]  ret_from_fork+0x116/0x1d0
[   25.593134]  ? __pfx_kthread+0x10/0x10
[   25.593154]  ret_from_fork_asm+0x1a/0x30
[   25.593185]  </TASK>
[   25.593195] 
[   25.600743] Allocated by task 310:
[   25.600899]  kasan_save_stack+0x45/0x70
[   25.601064]  kasan_save_track+0x18/0x40
[   25.601207]  kasan_save_alloc_info+0x3b/0x50
[   25.601358]  __kasan_kmalloc+0xb7/0xc0
[   25.601486]  __kmalloc_cache_noprof+0x189/0x420
[   25.601667]  kasan_bitops_generic+0x92/0x1c0
[   25.601817]  kunit_try_run_case+0x1a5/0x480
[   25.601963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.602134]  kthread+0x337/0x6f0
[   25.602249]  ret_from_fork+0x116/0x1d0
[   25.602426]  ret_from_fork_asm+0x1a/0x30
[   25.602640] 
[   25.602730] The buggy address belongs to the object at ffff888105376d80
[   25.602730]  which belongs to the cache kmalloc-16 of size 16
[   25.603245] The buggy address is located 8 bytes inside of
[   25.603245]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.603786] 
[   25.603875] The buggy address belongs to the physical page:
[   25.604122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.604516] flags: 0x200000000000000(node=0|zone=2)
[   25.604771] page_type: f5(slab)
[   25.604937] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.605179] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.605409] page dumped because: kasan: bad access detected
[   25.605602] 
[   25.605666] Memory state around the buggy address:
[   25.605849]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.606157]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.606485] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.606824]                       ^
[   25.607002]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.607317]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.607652] ==================================================================
[   25.626243] ==================================================================
[   25.626640] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.627081] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.627429] 
[   25.627537] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.627607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.627620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.627640] Call Trace:
[   25.627660]  <TASK>
[   25.627677]  dump_stack_lvl+0x73/0xb0
[   25.627706]  print_report+0xd1/0x610
[   25.627728]  ? __virt_addr_valid+0x1db/0x2d0
[   25.627752]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.627779]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.627804]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.627831]  kasan_report+0x141/0x180
[   25.627852]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.627882]  kasan_check_range+0x10c/0x1c0
[   25.627905]  __kasan_check_write+0x18/0x20
[   25.627929]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.627956]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.627983]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.628006]  ? finish_task_switch.isra.0+0x156/0x700
[   25.628028]  ? kasan_bitops_generic+0x92/0x1c0
[   25.628054]  kasan_bitops_generic+0x121/0x1c0
[   25.628078]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.628103]  ? __pfx_read_tsc+0x10/0x10
[   25.628125]  ? ktime_get_ts64+0x86/0x230
[   25.628150]  kunit_try_run_case+0x1a5/0x480
[   25.628173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.628195]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.628218]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.628241]  ? __kthread_parkme+0x82/0x180
[   25.628261]  ? preempt_count_sub+0x50/0x80
[   25.628283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.628316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.628343]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.628370]  kthread+0x337/0x6f0
[   25.628389]  ? trace_preempt_on+0x20/0xc0
[   25.628413]  ? __pfx_kthread+0x10/0x10
[   25.628433]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.628454]  ? calculate_sigpending+0x7b/0xa0
[   25.628478]  ? __pfx_kthread+0x10/0x10
[   25.628499]  ret_from_fork+0x116/0x1d0
[   25.628518]  ? __pfx_kthread+0x10/0x10
[   25.628538]  ret_from_fork_asm+0x1a/0x30
[   25.628586]  </TASK>
[   25.628596] 
[   25.637504] Allocated by task 310:
[   25.637751]  kasan_save_stack+0x45/0x70
[   25.637892]  kasan_save_track+0x18/0x40
[   25.638021]  kasan_save_alloc_info+0x3b/0x50
[   25.638164]  __kasan_kmalloc+0xb7/0xc0
[   25.638290]  __kmalloc_cache_noprof+0x189/0x420
[   25.638447]  kasan_bitops_generic+0x92/0x1c0
[   25.638695]  kunit_try_run_case+0x1a5/0x480
[   25.639053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.639514]  kthread+0x337/0x6f0
[   25.639836]  ret_from_fork+0x116/0x1d0
[   25.640173]  ret_from_fork_asm+0x1a/0x30
[   25.640525] 
[   25.640705] The buggy address belongs to the object at ffff888105376d80
[   25.640705]  which belongs to the cache kmalloc-16 of size 16
[   25.641733] The buggy address is located 8 bytes inside of
[   25.641733]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.642752] 
[   25.642905] The buggy address belongs to the physical page:
[   25.643376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.644043] flags: 0x200000000000000(node=0|zone=2)
[   25.644470] page_type: f5(slab)
[   25.644786] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.645423] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.646063] page dumped because: kasan: bad access detected
[   25.646532] 
[   25.646702] Memory state around the buggy address:
[   25.646993]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.647204]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.647668] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.648289]                       ^
[   25.648651]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.649269]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.649798] ==================================================================
[   25.650874] ==================================================================
[   25.651613] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.652824] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.653456] 
[   25.653661] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.653716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.653728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.653750] Call Trace:
[   25.653770]  <TASK>
[   25.653789]  dump_stack_lvl+0x73/0xb0
[   25.653823]  print_report+0xd1/0x610
[   25.653845]  ? __virt_addr_valid+0x1db/0x2d0
[   25.653870]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.653896]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.653921]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.653948]  kasan_report+0x141/0x180
[   25.653970]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.654000]  kasan_check_range+0x10c/0x1c0
[   25.654023]  __kasan_check_write+0x18/0x20
[   25.654046]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.654072]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.654100]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.654124]  ? finish_task_switch.isra.0+0x156/0x700
[   25.654146]  ? kasan_bitops_generic+0x92/0x1c0
[   25.654172]  kasan_bitops_generic+0x121/0x1c0
[   25.654195]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.654219]  ? __pfx_read_tsc+0x10/0x10
[   25.654243]  ? ktime_get_ts64+0x86/0x230
[   25.654269]  kunit_try_run_case+0x1a5/0x480
[   25.654294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.654327]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.654351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.654374]  ? __kthread_parkme+0x82/0x180
[   25.654395]  ? preempt_count_sub+0x50/0x80
[   25.654419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.654443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.654470]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.654496]  kthread+0x337/0x6f0
[   25.654515]  ? trace_preempt_on+0x20/0xc0
[   25.654539]  ? __pfx_kthread+0x10/0x10
[   25.654559]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.654601]  ? calculate_sigpending+0x7b/0xa0
[   25.654625]  ? __pfx_kthread+0x10/0x10
[   25.654646]  ret_from_fork+0x116/0x1d0
[   25.654666]  ? __pfx_kthread+0x10/0x10
[   25.654686]  ret_from_fork_asm+0x1a/0x30
[   25.654718]  </TASK>
[   25.654728] 
[   25.667477] Allocated by task 310:
[   25.667825]  kasan_save_stack+0x45/0x70
[   25.668192]  kasan_save_track+0x18/0x40
[   25.668531]  kasan_save_alloc_info+0x3b/0x50
[   25.668933]  __kasan_kmalloc+0xb7/0xc0
[   25.669257]  __kmalloc_cache_noprof+0x189/0x420
[   25.669611]  kasan_bitops_generic+0x92/0x1c0
[   25.669893]  kunit_try_run_case+0x1a5/0x480
[   25.670036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.670207]  kthread+0x337/0x6f0
[   25.670333]  ret_from_fork+0x116/0x1d0
[   25.670461]  ret_from_fork_asm+0x1a/0x30
[   25.670675] 
[   25.670824] The buggy address belongs to the object at ffff888105376d80
[   25.670824]  which belongs to the cache kmalloc-16 of size 16
[   25.671855] The buggy address is located 8 bytes inside of
[   25.671855]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.672859] 
[   25.673019] The buggy address belongs to the physical page:
[   25.673496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.674184] flags: 0x200000000000000(node=0|zone=2)
[   25.674651] page_type: f5(slab)
[   25.674940] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.675329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.675550] page dumped because: kasan: bad access detected
[   25.676027] 
[   25.676172] Memory state around the buggy address:
[   25.676612]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.677218]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.677847] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.678067]                       ^
[   25.678187]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.678619]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.679189] ==================================================================
[   25.680297] ==================================================================
[   25.681518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.682064] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.682287] 
[   25.682387] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.682442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.682454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.682476] Call Trace:
[   25.682499]  <TASK>
[   25.682518]  dump_stack_lvl+0x73/0xb0
[   25.682548]  print_report+0xd1/0x610
[   25.682597]  ? __virt_addr_valid+0x1db/0x2d0
[   25.682624]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.682653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.682679]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.682706]  kasan_report+0x141/0x180
[   25.682728]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.682759]  kasan_check_range+0x10c/0x1c0
[   25.682782]  __kasan_check_write+0x18/0x20
[   25.682805]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.682832]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.682859]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.682885]  ? finish_task_switch.isra.0+0x156/0x700
[   25.682907]  ? kasan_bitops_generic+0x92/0x1c0
[   25.682934]  kasan_bitops_generic+0x121/0x1c0
[   25.682959]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.682984]  ? __pfx_read_tsc+0x10/0x10
[   25.683007]  ? ktime_get_ts64+0x86/0x230
[   25.683032]  kunit_try_run_case+0x1a5/0x480
[   25.683057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.683079]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.683102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.683125]  ? __kthread_parkme+0x82/0x180
[   25.683145]  ? preempt_count_sub+0x50/0x80
[   25.683168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.683191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.683218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.683245]  kthread+0x337/0x6f0
[   25.683264]  ? trace_preempt_on+0x20/0xc0
[   25.683288]  ? __pfx_kthread+0x10/0x10
[   25.683319]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.683340]  ? calculate_sigpending+0x7b/0xa0
[   25.683364]  ? __pfx_kthread+0x10/0x10
[   25.683385]  ret_from_fork+0x116/0x1d0
[   25.683404]  ? __pfx_kthread+0x10/0x10
[   25.683425]  ret_from_fork_asm+0x1a/0x30
[   25.683457]  </TASK>
[   25.683468] 
[   25.693371] Allocated by task 310:
[   25.693558]  kasan_save_stack+0x45/0x70
[   25.693787]  kasan_save_track+0x18/0x40
[   25.693953]  kasan_save_alloc_info+0x3b/0x50
[   25.694121]  __kasan_kmalloc+0xb7/0xc0
[   25.694314]  __kmalloc_cache_noprof+0x189/0x420
[   25.694495]  kasan_bitops_generic+0x92/0x1c0
[   25.694722]  kunit_try_run_case+0x1a5/0x480
[   25.694905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.695122]  kthread+0x337/0x6f0
[   25.695279]  ret_from_fork+0x116/0x1d0
[   25.695418]  ret_from_fork_asm+0x1a/0x30
[   25.695551] 
[   25.695634] The buggy address belongs to the object at ffff888105376d80
[   25.695634]  which belongs to the cache kmalloc-16 of size 16
[   25.696121] The buggy address is located 8 bytes inside of
[   25.696121]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.696647] 
[   25.696716] The buggy address belongs to the physical page:
[   25.696884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.697152] flags: 0x200000000000000(node=0|zone=2)
[   25.697393] page_type: f5(slab)
[   25.697559] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.697917] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.698248] page dumped because: kasan: bad access detected
[   25.698461] 
[   25.698548] Memory state around the buggy address:
[   25.698764]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.699054]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.699330] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.699625]                       ^
[   25.699793]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.700057]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.700316] ==================================================================
[   25.718702] ==================================================================
[   25.719348] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.719854] Read of size 8 at addr ffff888105376d88 by task kunit_try_catch/310
[   25.720181] 
[   25.720293] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.720358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.720371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.720392] Call Trace:
[   25.720411]  <TASK>
[   25.720428]  dump_stack_lvl+0x73/0xb0
[   25.720458]  print_report+0xd1/0x610
[   25.720479]  ? __virt_addr_valid+0x1db/0x2d0
[   25.720503]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.720531]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.720557]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.720606]  kasan_report+0x141/0x180
[   25.720628]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.720659]  __asan_report_load8_noabort+0x18/0x20
[   25.720682]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.720709]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.720737]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.720761]  ? finish_task_switch.isra.0+0x156/0x700
[   25.720785]  ? kasan_bitops_generic+0x92/0x1c0
[   25.720811]  kasan_bitops_generic+0x121/0x1c0
[   25.720834]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.720859]  ? __pfx_read_tsc+0x10/0x10
[   25.720882]  ? ktime_get_ts64+0x86/0x230
[   25.720907]  kunit_try_run_case+0x1a5/0x480
[   25.720932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.720954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.720977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.721000]  ? __kthread_parkme+0x82/0x180
[   25.721020]  ? preempt_count_sub+0x50/0x80
[   25.721042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.721065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.721092]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.721118]  kthread+0x337/0x6f0
[   25.721138]  ? trace_preempt_on+0x20/0xc0
[   25.723017]  ? __pfx_kthread+0x10/0x10
[   25.723046]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.723071]  ? calculate_sigpending+0x7b/0xa0
[   25.723096]  ? __pfx_kthread+0x10/0x10
[   25.723118]  ret_from_fork+0x116/0x1d0
[   25.723140]  ? __pfx_kthread+0x10/0x10
[   25.723161]  ret_from_fork_asm+0x1a/0x30
[   25.723192]  </TASK>
[   25.723203] 
[   25.736651] Allocated by task 310:
[   25.736818]  kasan_save_stack+0x45/0x70
[   25.737023]  kasan_save_track+0x18/0x40
[   25.737210]  kasan_save_alloc_info+0x3b/0x50
[   25.737395]  __kasan_kmalloc+0xb7/0xc0
[   25.737598]  __kmalloc_cache_noprof+0x189/0x420
[   25.737809]  kasan_bitops_generic+0x92/0x1c0
[   25.738003]  kunit_try_run_case+0x1a5/0x480
[   25.738184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.738396]  kthread+0x337/0x6f0
[   25.738559]  ret_from_fork+0x116/0x1d0
[   25.738722]  ret_from_fork_asm+0x1a/0x30
[   25.738894] 
[   25.738962] The buggy address belongs to the object at ffff888105376d80
[   25.738962]  which belongs to the cache kmalloc-16 of size 16
[   25.739480] The buggy address is located 8 bytes inside of
[   25.739480]  allocated 9-byte region [ffff888105376d80, ffff888105376d89)
[   25.739964] 
[   25.740055] The buggy address belongs to the physical page:
[   25.740261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376
[   25.740622] flags: 0x200000000000000(node=0|zone=2)
[   25.740815] page_type: f5(slab)
[   25.740978] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.741210] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.741572] page dumped because: kasan: bad access detected
[   25.741817] 
[   25.741888] Memory state around the buggy address:
[   25.742126]  ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.742404]  ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.742716] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.742923]                       ^
[   25.743067]  ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.743408]  ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.743717] ==================================================================