Hay
Date
July 22, 2025, 5:13 a.m.

Environment
qemu-x86_64

[   27.416699] ==================================================================
[   27.416978] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.417399] Read of size 8 at addr ffff888104919c88 by task kunit_try_catch/309
[   27.417946] 
[   27.418047] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.418096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.418109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.418130] Call Trace:
[   27.418145]  <TASK>
[   27.418160]  dump_stack_lvl+0x73/0xb0
[   27.418190]  print_report+0xd1/0x640
[   27.418214]  ? __virt_addr_valid+0x1db/0x2d0
[   27.418239]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.418267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.418295]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.418323]  kasan_report+0x141/0x180
[   27.418346]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.418378]  kasan_check_range+0x10c/0x1c0
[   27.418403]  __kasan_check_read+0x15/0x20
[   27.418427]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.418455]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.418483]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.418509]  ? trace_hardirqs_on+0x37/0xe0
[   27.418531]  ? kasan_bitops_generic+0x92/0x1c0
[   27.418558]  kasan_bitops_generic+0x121/0x1c0
[   27.418583]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.418610]  ? __pfx_read_tsc+0x10/0x10
[   27.418632]  ? ktime_get_ts64+0x86/0x230
[   27.418658]  kunit_try_run_case+0x1a5/0x480
[   27.418684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.418796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.418826]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.418939]  ? __kthread_parkme+0x82/0x180
[   27.418961]  ? preempt_count_sub+0x50/0x80
[   27.418986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.419012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.419037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.419062]  kthread+0x337/0x6f0
[   27.419096]  ? trace_preempt_on+0x20/0xc0
[   27.419120]  ? __pfx_kthread+0x10/0x10
[   27.419142]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.419179]  ? calculate_sigpending+0x7b/0xa0
[   27.419203]  ? __pfx_kthread+0x10/0x10
[   27.419225]  ret_from_fork+0x116/0x1d0
[   27.419247]  ? __pfx_kthread+0x10/0x10
[   27.419269]  ret_from_fork_asm+0x1a/0x30
[   27.419301]  </TASK>
[   27.419312] 
[   27.428991] Allocated by task 309:
[   27.429127]  kasan_save_stack+0x45/0x70
[   27.429274]  kasan_save_track+0x18/0x40
[   27.429408]  kasan_save_alloc_info+0x3b/0x50
[   27.429560]  __kasan_kmalloc+0xb7/0xc0
[   27.429817]  __kmalloc_cache_noprof+0x189/0x420
[   27.430477]  kasan_bitops_generic+0x92/0x1c0
[   27.431086]  kunit_try_run_case+0x1a5/0x480
[   27.432080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.432777]  kthread+0x337/0x6f0
[   27.433297]  ret_from_fork+0x116/0x1d0
[   27.433935]  ret_from_fork_asm+0x1a/0x30
[   27.434105] 
[   27.434416] The buggy address belongs to the object at ffff888104919c80
[   27.434416]  which belongs to the cache kmalloc-16 of size 16
[   27.435927] The buggy address is located 8 bytes inside of
[   27.435927]  allocated 9-byte region [ffff888104919c80, ffff888104919c89)
[   27.437186] 
[   27.437374] The buggy address belongs to the physical page:
[   27.437874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919
[   27.438439] flags: 0x200000000000000(node=0|zone=2)
[   27.438714] page_type: f5(slab)
[   27.438896] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.439230] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.439643] page dumped because: kasan: bad access detected
[   27.439999] 
[   27.440105] Memory state around the buggy address:
[   27.440522]  ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.440766]  ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.441365] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.441744]                       ^
[   27.442278]  ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.442730]  ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.443152] ==================================================================
[   27.443939] ==================================================================
[   27.444394] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.445419] Read of size 8 at addr ffff888104919c88 by task kunit_try_catch/309
[   27.445810] 
[   27.446363] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.446420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.446434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.446512] Call Trace:
[   27.446531]  <TASK>
[   27.446547]  dump_stack_lvl+0x73/0xb0
[   27.446579]  print_report+0xd1/0x640
[   27.446689]  ? __virt_addr_valid+0x1db/0x2d0
[   27.446715]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.446743]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.446769]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.446798]  kasan_report+0x141/0x180
[   27.446820]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.446867]  __asan_report_load8_noabort+0x18/0x20
[   27.446892]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.446920]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.446949]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.446974]  ? trace_hardirqs_on+0x37/0xe0
[   27.446997]  ? kasan_bitops_generic+0x92/0x1c0
[   27.447025]  kasan_bitops_generic+0x121/0x1c0
[   27.447050]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.447075]  ? __pfx_read_tsc+0x10/0x10
[   27.447097]  ? ktime_get_ts64+0x86/0x230
[   27.447124]  kunit_try_run_case+0x1a5/0x480
[   27.447150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.447175]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.447201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.447227]  ? __kthread_parkme+0x82/0x180
[   27.447248]  ? preempt_count_sub+0x50/0x80
[   27.447273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.447297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.447321]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.447346]  kthread+0x337/0x6f0
[   27.447367]  ? trace_preempt_on+0x20/0xc0
[   27.447390]  ? __pfx_kthread+0x10/0x10
[   27.447412]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.447435]  ? calculate_sigpending+0x7b/0xa0
[   27.447479]  ? __pfx_kthread+0x10/0x10
[   27.447501]  ret_from_fork+0x116/0x1d0
[   27.447522]  ? __pfx_kthread+0x10/0x10
[   27.447543]  ret_from_fork_asm+0x1a/0x30
[   27.447574]  </TASK>
[   27.447585] 
[   27.459079] Allocated by task 309:
[   27.459394]  kasan_save_stack+0x45/0x70
[   27.459655]  kasan_save_track+0x18/0x40
[   27.460309]  kasan_save_alloc_info+0x3b/0x50
[   27.460565]  __kasan_kmalloc+0xb7/0xc0
[   27.460769]  __kmalloc_cache_noprof+0x189/0x420
[   27.461008]  kasan_bitops_generic+0x92/0x1c0
[   27.461219]  kunit_try_run_case+0x1a5/0x480
[   27.461435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.461765]  kthread+0x337/0x6f0
[   27.461957]  ret_from_fork+0x116/0x1d0
[   27.462115]  ret_from_fork_asm+0x1a/0x30
[   27.462279] 
[   27.462381] The buggy address belongs to the object at ffff888104919c80
[   27.462381]  which belongs to the cache kmalloc-16 of size 16
[   27.462943] The buggy address is located 8 bytes inside of
[   27.462943]  allocated 9-byte region [ffff888104919c80, ffff888104919c89)
[   27.463638] 
[   27.463713] The buggy address belongs to the physical page:
[   27.463987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919
[   27.464368] flags: 0x200000000000000(node=0|zone=2)
[   27.464725] page_type: f5(slab)
[   27.464908] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.465202] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.465547] page dumped because: kasan: bad access detected
[   27.465896] 
[   27.465984] Memory state around the buggy address:
[   27.466198]  ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.466506]  ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.466955] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.467248]                       ^
[   27.467451]  ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.467667]  ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.468280] ==================================================================
[   27.299761] ==================================================================
[   27.300104] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.300678] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309
[   27.301063] 
[   27.301175] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.301222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.301235] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.301258] Call Trace:
[   27.301272]  <TASK>
[   27.301297]  dump_stack_lvl+0x73/0xb0
[   27.301325]  print_report+0xd1/0x640
[   27.301349]  ? __virt_addr_valid+0x1db/0x2d0
[   27.301384]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.301412]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.301439]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.301507]  kasan_report+0x141/0x180
[   27.301534]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.301573]  kasan_check_range+0x10c/0x1c0
[   27.301598]  __kasan_check_write+0x18/0x20
[   27.301623]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.301651]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.301681]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.301705]  ? trace_hardirqs_on+0x37/0xe0
[   27.301727]  ? kasan_bitops_generic+0x92/0x1c0
[   27.301756]  kasan_bitops_generic+0x121/0x1c0
[   27.301781]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.301806]  ? __pfx_read_tsc+0x10/0x10
[   27.301838]  ? ktime_get_ts64+0x86/0x230
[   27.301865]  kunit_try_run_case+0x1a5/0x480
[   27.301890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.301914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.301941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.301967]  ? __kthread_parkme+0x82/0x180
[   27.301989]  ? preempt_count_sub+0x50/0x80
[   27.302013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.302038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.302063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.302088]  kthread+0x337/0x6f0
[   27.302108]  ? trace_preempt_on+0x20/0xc0
[   27.302131]  ? __pfx_kthread+0x10/0x10
[   27.302153]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.302177]  ? calculate_sigpending+0x7b/0xa0
[   27.302250]  ? __pfx_kthread+0x10/0x10
[   27.302273]  ret_from_fork+0x116/0x1d0
[   27.302293]  ? __pfx_kthread+0x10/0x10
[   27.302315]  ret_from_fork_asm+0x1a/0x30
[   27.302346]  </TASK>
[   27.302358] 
[   27.317837] Allocated by task 309:
[   27.317976]  kasan_save_stack+0x45/0x70
[   27.318126]  kasan_save_track+0x18/0x40
[   27.318297]  kasan_save_alloc_info+0x3b/0x50
[   27.318450]  __kasan_kmalloc+0xb7/0xc0
[   27.318760]  __kmalloc_cache_noprof+0x189/0x420
[   27.319046]  kasan_bitops_generic+0x92/0x1c0
[   27.319262]  kunit_try_run_case+0x1a5/0x480
[   27.319412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.319662]  kthread+0x337/0x6f0
[   27.320038]  ret_from_fork+0x116/0x1d0
[   27.320282]  ret_from_fork_asm+0x1a/0x30
[   27.320432] 
[   27.320617] The buggy address belongs to the object at ffff888104919c80
[   27.320617]  which belongs to the cache kmalloc-16 of size 16
[   27.321152] The buggy address is located 8 bytes inside of
[   27.321152]  allocated 9-byte region [ffff888104919c80, ffff888104919c89)
[   27.321604] 
[   27.321688] The buggy address belongs to the physical page:
[   27.321990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919
[   27.322361] flags: 0x200000000000000(node=0|zone=2)
[   27.322565] page_type: f5(slab)
[   27.322730] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.323080] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.323364] page dumped because: kasan: bad access detected
[   27.323681] 
[   27.323770] Memory state around the buggy address:
[   27.323998]  ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.324524]  ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.325105] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.325514]                       ^
[   27.325676]  ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.325982]  ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.326359] ==================================================================
[   27.372317] ==================================================================
[   27.373010] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.373827] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309
[   27.374220] 
[   27.374308] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.374356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.374368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.374390] Call Trace:
[   27.374405]  <TASK>
[   27.374418]  dump_stack_lvl+0x73/0xb0
[   27.374449]  print_report+0xd1/0x640
[   27.374571]  ? __virt_addr_valid+0x1db/0x2d0
[   27.374598]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.374665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.374693]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.374723]  kasan_report+0x141/0x180
[   27.374757]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.374789]  kasan_check_range+0x10c/0x1c0
[   27.374814]  __kasan_check_write+0x18/0x20
[   27.374875]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.374903]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.374943]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.374968]  ? trace_hardirqs_on+0x37/0xe0
[   27.374991]  ? kasan_bitops_generic+0x92/0x1c0
[   27.375019]  kasan_bitops_generic+0x121/0x1c0
[   27.375043]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.375069]  ? __pfx_read_tsc+0x10/0x10
[   27.375091]  ? ktime_get_ts64+0x86/0x230
[   27.375115]  kunit_try_run_case+0x1a5/0x480
[   27.375140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.375175]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.375201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.375228]  ? __kthread_parkme+0x82/0x180
[   27.375249]  ? preempt_count_sub+0x50/0x80
[   27.375300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.375326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.375351]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.375387]  kthread+0x337/0x6f0
[   27.375409]  ? trace_preempt_on+0x20/0xc0
[   27.375449]  ? __pfx_kthread+0x10/0x10
[   27.375480]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.375504]  ? calculate_sigpending+0x7b/0xa0
[   27.375529]  ? __pfx_kthread+0x10/0x10
[   27.375603]  ret_from_fork+0x116/0x1d0
[   27.375656]  ? __pfx_kthread+0x10/0x10
[   27.375678]  ret_from_fork_asm+0x1a/0x30
[   27.375710]  </TASK>
[   27.375733] 
[   27.386447] Allocated by task 309:
[   27.386626]  kasan_save_stack+0x45/0x70
[   27.386776]  kasan_save_track+0x18/0x40
[   27.386956]  kasan_save_alloc_info+0x3b/0x50
[   27.387109]  __kasan_kmalloc+0xb7/0xc0
[   27.387242]  __kmalloc_cache_noprof+0x189/0x420
[   27.387459]  kasan_bitops_generic+0x92/0x1c0
[   27.387847]  kunit_try_run_case+0x1a5/0x480
[   27.388110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.388296]  kthread+0x337/0x6f0
[   27.388422]  ret_from_fork+0x116/0x1d0
[   27.388557]  ret_from_fork_asm+0x1a/0x30
[   27.388697] 
[   27.388918] The buggy address belongs to the object at ffff888104919c80
[   27.388918]  which belongs to the cache kmalloc-16 of size 16
[   27.389459] The buggy address is located 8 bytes inside of
[   27.389459]  allocated 9-byte region [ffff888104919c80, ffff888104919c89)
[   27.390148] 
[   27.390256] The buggy address belongs to the physical page:
[   27.390612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919
[   27.391005] flags: 0x200000000000000(node=0|zone=2)
[   27.391174] page_type: f5(slab)
[   27.391294] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.391905] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.392263] page dumped because: kasan: bad access detected
[   27.392439] 
[   27.392507] Memory state around the buggy address:
[   27.392662]  ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.393041]  ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.393361] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.393868]                       ^
[   27.394163]  ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.394538]  ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.394873] ==================================================================
[   27.395330] ==================================================================
[   27.395699] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.396103] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309
[   27.396493] 
[   27.396574] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.396619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.396631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.396654] Call Trace:
[   27.396669]  <TASK>
[   27.396683]  dump_stack_lvl+0x73/0xb0
[   27.396712]  print_report+0xd1/0x640
[   27.396735]  ? __virt_addr_valid+0x1db/0x2d0
[   27.396759]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.396787]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.396880]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.396914]  kasan_report+0x141/0x180
[   27.396938]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.396982]  kasan_check_range+0x10c/0x1c0
[   27.397006]  __kasan_check_write+0x18/0x20
[   27.397031]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.397072]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.397101]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.397127]  ? trace_hardirqs_on+0x37/0xe0
[   27.397149]  ? kasan_bitops_generic+0x92/0x1c0
[   27.397178]  kasan_bitops_generic+0x121/0x1c0
[   27.397202]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.397227]  ? __pfx_read_tsc+0x10/0x10
[   27.397250]  ? ktime_get_ts64+0x86/0x230
[   27.397275]  kunit_try_run_case+0x1a5/0x480
[   27.397300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.397324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.397351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.397377]  ? __kthread_parkme+0x82/0x180
[   27.397398]  ? preempt_count_sub+0x50/0x80
[   27.397422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.397447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.397473]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.397498]  kthread+0x337/0x6f0
[   27.397529]  ? trace_preempt_on+0x20/0xc0
[   27.397552]  ? __pfx_kthread+0x10/0x10
[   27.397696]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.397734]  ? calculate_sigpending+0x7b/0xa0
[   27.397759]  ? __pfx_kthread+0x10/0x10
[   27.397840]  ret_from_fork+0x116/0x1d0
[   27.397863]  ? __pfx_kthread+0x10/0x10
[   27.397885]  ret_from_fork_asm+0x1a/0x30
[   27.397917]  </TASK>
[   27.397928] 
[   27.407629] Allocated by task 309:
[   27.407844]  kasan_save_stack+0x45/0x70
[   27.407995]  kasan_save_track+0x18/0x40
[   27.408198]  kasan_save_alloc_info+0x3b/0x50
[   27.408429]  __kasan_kmalloc+0xb7/0xc0
[   27.408648]  __kmalloc_cache_noprof+0x189/0x420
[   27.408878]  kasan_bitops_generic+0x92/0x1c0
[   27.409107]  kunit_try_run_case+0x1a5/0x480
[   27.409324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.409747]  kthread+0x337/0x6f0
[   27.409906]  ret_from_fork+0x116/0x1d0
[   27.410132]  ret_from_fork_asm+0x1a/0x30
[   27.410309] 
[   27.410382] The buggy address belongs to the object at ffff888104919c80
[   27.410382]  which belongs to the cache kmalloc-16 of size 16
[   27.411075] The buggy address is located 8 bytes inside of
[   27.411075]  allocated 9-byte region [ffff888104919c80, ffff888104919c89)
[   27.411766] 
[   27.411885] The buggy address belongs to the physical page:
[   27.412157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919
[   27.412600] flags: 0x200000000000000(node=0|zone=2)
[   27.412827] page_type: f5(slab)
[   27.413028] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.413343] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.413572] page dumped because: kasan: bad access detected
[   27.413746] 
[   27.413813] Memory state around the buggy address:
[   27.413979]  ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.414221]  ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.414696] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.415141]                       ^
[   27.415324]  ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.415733]  ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.416050] ==================================================================
[   27.256560] ==================================================================
[   27.256938] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.257450] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309
[   27.257688] 
[   27.257770] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.257817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.257839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.257860] Call Trace:
[   27.257876]  <TASK>
[   27.257902]  dump_stack_lvl+0x73/0xb0
[   27.257930]  print_report+0xd1/0x640
[   27.257954]  ? __virt_addr_valid+0x1db/0x2d0
[   27.257988]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.258016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.258044]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.258073]  kasan_report+0x141/0x180
[   27.258096]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.258129]  kasan_check_range+0x10c/0x1c0
[   27.258153]  __kasan_check_write+0x18/0x20
[   27.258177]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.258206]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.258235]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.258259]  ? trace_hardirqs_on+0x37/0xe0
[   27.258283]  ? kasan_bitops_generic+0x92/0x1c0
[   27.258310]  kasan_bitops_generic+0x121/0x1c0
[   27.258335]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.258456]  ? __pfx_read_tsc+0x10/0x10
[   27.258483]  ? ktime_get_ts64+0x86/0x230
[   27.258520]  kunit_try_run_case+0x1a5/0x480
[   27.258547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.258665]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.258700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.258727]  ? __kthread_parkme+0x82/0x180
[   27.258748]  ? preempt_count_sub+0x50/0x80
[   27.258772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.258797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.258821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.258857]  kthread+0x337/0x6f0
[   27.258878]  ? trace_preempt_on+0x20/0xc0
[   27.258902]  ? __pfx_kthread+0x10/0x10
[   27.258985]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.259027]  ? calculate_sigpending+0x7b/0xa0
[   27.259052]  ? __pfx_kthread+0x10/0x10
[   27.259075]  ret_from_fork+0x116/0x1d0
[   27.259106]  ? __pfx_kthread+0x10/0x10
[   27.259128]  ret_from_fork_asm+0x1a/0x30
[   27.259160]  </TASK>
[   27.259188] 
[   27.268860] Allocated by task 309:
[   27.269038]  kasan_save_stack+0x45/0x70
[   27.269326]  kasan_save_track+0x18/0x40
[   27.269564]  kasan_save_alloc_info+0x3b/0x50
[   27.269809]  __kasan_kmalloc+0xb7/0xc0
[   27.269991]  __kmalloc_cache_noprof+0x189/0x420
[   27.270151]  kasan_bitops_generic+0x92/0x1c0
[   27.270300]  kunit_try_run_case+0x1a5/0x480
[   27.270447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.270624]  kthread+0x337/0x6f0
[   27.270745]  ret_from_fork+0x116/0x1d0
[   27.270914]  ret_from_fork_asm+0x1a/0x30
[   27.271231] 
[   27.271336] The buggy address belongs to the object at ffff888104919c80
[   27.271336]  which belongs to the cache kmalloc-16 of size 16
[   27.271876] The buggy address is located 8 bytes inside of
[   27.271876]  allocated 9-byte region [ffff888104919c80, ffff888104919c89)
[   27.272640] 
[   27.272719] The buggy address belongs to the physical page:
[   27.272916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919
[   27.273232] flags: 0x200000000000000(node=0|zone=2)
[   27.273510] page_type: f5(slab)
[   27.273743] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.274116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.274704] page dumped because: kasan: bad access detected
[   27.274974] 
[   27.275061] Memory state around the buggy address:
[   27.275306]  ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.275771]  ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.276098] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.276498]                       ^
[   27.276740]  ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.277002]  ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.277356] ==================================================================
[   27.349697] ==================================================================
[   27.350076] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.350543] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309
[   27.350941] 
[   27.351056] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.351134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.351147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.351168] Call Trace:
[   27.351183]  <TASK>
[   27.351209]  dump_stack_lvl+0x73/0xb0
[   27.351246]  print_report+0xd1/0x640
[   27.351270]  ? __virt_addr_valid+0x1db/0x2d0
[   27.351323]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.351350]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.351377]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.351416]  kasan_report+0x141/0x180
[   27.351440]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.351497]  kasan_check_range+0x10c/0x1c0
[   27.351522]  __kasan_check_write+0x18/0x20
[   27.351599]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.351630]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.351690]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.351715]  ? trace_hardirqs_on+0x37/0xe0
[   27.351738]  ? kasan_bitops_generic+0x92/0x1c0
[   27.351777]  kasan_bitops_generic+0x121/0x1c0
[   27.351825]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.351863]  ? __pfx_read_tsc+0x10/0x10
[   27.351885]  ? ktime_get_ts64+0x86/0x230
[   27.351950]  kunit_try_run_case+0x1a5/0x480
[   27.351975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.352000]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.352025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.352060]  ? __kthread_parkme+0x82/0x180
[   27.352084]  ? preempt_count_sub+0x50/0x80
[   27.352108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.352144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.352179]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.352204]  kthread+0x337/0x6f0
[   27.352224]  ? trace_preempt_on+0x20/0xc0
[   27.352248]  ? __pfx_kthread+0x10/0x10
[   27.352270]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.352294]  ? calculate_sigpending+0x7b/0xa0
[   27.352345]  ? __pfx_kthread+0x10/0x10
[   27.352368]  ret_from_fork+0x116/0x1d0
[   27.352389]  ? __pfx_kthread+0x10/0x10
[   27.352422]  ret_from_fork_asm+0x1a/0x30
[   27.352455]  </TASK>
[   27.352481] 
[   27.362439] Allocated by task 309:
[   27.362701]  kasan_save_stack+0x45/0x70
[   27.362961]  kasan_save_track+0x18/0x40
[   27.363182]  kasan_save_alloc_info+0x3b/0x50
[   27.363420]  __kasan_kmalloc+0xb7/0xc0
[   27.363633]  __kmalloc_cache_noprof+0x189/0x420
[   27.363928]  kasan_bitops_generic+0x92/0x1c0
[   27.364304]  kunit_try_run_case+0x1a5/0x480
[   27.364634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.364911]  kthread+0x337/0x6f0
[   27.365078]  ret_from_fork+0x116/0x1d0
[   27.365392]  ret_from_fork_asm+0x1a/0x30
[   27.365770] 
[   27.365920] The buggy address belongs to the object at ffff888104919c80
[   27.365920]  which belongs to the cache kmalloc-16 of size 16
[   27.366575] The buggy address is located 8 bytes inside of
[   27.366575]  allocated 9-byte region [ffff888104919c80, ffff888104919c89)
[   27.367074] 
[   27.367163] The buggy address belongs to the physical page:
[   27.367444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919
[   27.367810] flags: 0x200000000000000(node=0|zone=2)
[   27.368164] page_type: f5(slab)
[   27.368375] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.368798] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.369174] page dumped because: kasan: bad access detected
[   27.369461] 
[   27.369794] Memory state around the buggy address:
[   27.369979]  ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.370206]  ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.370522] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.370979]                       ^
[   27.371155]  ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.371527]  ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.371815] ==================================================================
[   27.277859] ==================================================================
[   27.278367] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.278881] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309
[   27.279158] 
[   27.279278] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.279337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.279350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.279371] Call Trace:
[   27.279385]  <TASK>
[   27.279399]  dump_stack_lvl+0x73/0xb0
[   27.279429]  print_report+0xd1/0x640
[   27.279452]  ? __virt_addr_valid+0x1db/0x2d0
[   27.279493]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.279520]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.279547]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.279577]  kasan_report+0x141/0x180
[   27.279600]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.279633]  kasan_check_range+0x10c/0x1c0
[   27.279658]  __kasan_check_write+0x18/0x20
[   27.279839]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.279879]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.279909]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.279933]  ? trace_hardirqs_on+0x37/0xe0
[   27.279956]  ? kasan_bitops_generic+0x92/0x1c0
[   27.279985]  kasan_bitops_generic+0x121/0x1c0
[   27.280010]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.280035]  ? __pfx_read_tsc+0x10/0x10
[   27.280057]  ? ktime_get_ts64+0x86/0x230
[   27.280082]  kunit_try_run_case+0x1a5/0x480
[   27.280108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.280131]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.280157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.280183]  ? __kthread_parkme+0x82/0x180
[   27.280204]  ? preempt_count_sub+0x50/0x80
[   27.280228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.280253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.280278]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.280302]  kthread+0x337/0x6f0
[   27.280322]  ? trace_preempt_on+0x20/0xc0
[   27.280345]  ? __pfx_kthread+0x10/0x10
[   27.280367]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.280391]  ? calculate_sigpending+0x7b/0xa0
[   27.280415]  ? __pfx_kthread+0x10/0x10
[   27.280438]  ret_from_fork+0x116/0x1d0
[   27.280458]  ? __pfx_kthread+0x10/0x10
[   27.280479]  ret_from_fork_asm+0x1a/0x30
[   27.280510]  </TASK>
[   27.280521] 
[   27.289852] Allocated by task 309:
[   27.289984]  kasan_save_stack+0x45/0x70
[   27.290132]  kasan_save_track+0x18/0x40
[   27.290267]  kasan_save_alloc_info+0x3b/0x50
[   27.290415]  __kasan_kmalloc+0xb7/0xc0
[   27.290781]  __kmalloc_cache_noprof+0x189/0x420
[   27.291033]  kasan_bitops_generic+0x92/0x1c0
[   27.291356]  kunit_try_run_case+0x1a5/0x480
[   27.291761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.292082]  kthread+0x337/0x6f0
[   27.292317]  ret_from_fork+0x116/0x1d0
[   27.292546]  ret_from_fork_asm+0x1a/0x30
[   27.292691] 
[   27.292760] The buggy address belongs to the object at ffff888104919c80
[   27.292760]  which belongs to the cache kmalloc-16 of size 16
[   27.293442] The buggy address is located 8 bytes inside of
[   27.293442]  allocated 9-byte region [ffff888104919c80, ffff888104919c89)
[   27.294026] 
[   27.294132] The buggy address belongs to the physical page:
[   27.294388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919
[   27.294907] flags: 0x200000000000000(node=0|zone=2)
[   27.295110] page_type: f5(slab)
[   27.295270] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.295695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.296045] page dumped because: kasan: bad access detected
[   27.296296] 
[   27.296413] Memory state around the buggy address:
[   27.296695]  ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.297050]  ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.297576] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.297902]                       ^
[   27.298089]  ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.298416]  ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.299048] ==================================================================
[   27.326865] ==================================================================
[   27.327118] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.327630] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309
[   27.327967] 
[   27.328089] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.328137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.328150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.328170] Call Trace:
[   27.328187]  <TASK>
[   27.328202]  dump_stack_lvl+0x73/0xb0
[   27.328231]  print_report+0xd1/0x640
[   27.328264]  ? __virt_addr_valid+0x1db/0x2d0
[   27.328288]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.328316]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.328354]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.328382]  kasan_report+0x141/0x180
[   27.328405]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.328438]  kasan_check_range+0x10c/0x1c0
[   27.328462]  __kasan_check_write+0x18/0x20
[   27.328488]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.328517]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.328556]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.328580]  ? trace_hardirqs_on+0x37/0xe0
[   27.328603]  ? kasan_bitops_generic+0x92/0x1c0
[   27.328641]  kasan_bitops_generic+0x121/0x1c0
[   27.328666]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.328692]  ? __pfx_read_tsc+0x10/0x10
[   27.328713]  ? ktime_get_ts64+0x86/0x230
[   27.328739]  kunit_try_run_case+0x1a5/0x480
[   27.328781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.328803]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.328838]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.328870]  ? __kthread_parkme+0x82/0x180
[   27.328891]  ? preempt_count_sub+0x50/0x80
[   27.328915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.329142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.329187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.329225]  kthread+0x337/0x6f0
[   27.329247]  ? trace_preempt_on+0x20/0xc0
[   27.329270]  ? __pfx_kthread+0x10/0x10
[   27.329292]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.329326]  ? calculate_sigpending+0x7b/0xa0
[   27.329350]  ? __pfx_kthread+0x10/0x10
[   27.329373]  ret_from_fork+0x116/0x1d0
[   27.329403]  ? __pfx_kthread+0x10/0x10
[   27.329425]  ret_from_fork_asm+0x1a/0x30
[   27.329457]  </TASK>
[   27.329525] 
[   27.338689] Allocated by task 309:
[   27.338948]  kasan_save_stack+0x45/0x70
[   27.339103]  kasan_save_track+0x18/0x40
[   27.339239]  kasan_save_alloc_info+0x3b/0x50
[   27.339511]  __kasan_kmalloc+0xb7/0xc0
[   27.339741]  __kmalloc_cache_noprof+0x189/0x420
[   27.340375]  kasan_bitops_generic+0x92/0x1c0
[   27.340630]  kunit_try_run_case+0x1a5/0x480
[   27.340840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.341111]  kthread+0x337/0x6f0
[   27.341517]  ret_from_fork+0x116/0x1d0
[   27.341798]  ret_from_fork_asm+0x1a/0x30
[   27.341960] 
[   27.342087] The buggy address belongs to the object at ffff888104919c80
[   27.342087]  which belongs to the cache kmalloc-16 of size 16
[   27.342899] The buggy address is located 8 bytes inside of
[   27.342899]  allocated 9-byte region [ffff888104919c80, ffff888104919c89)
[   27.343484] 
[   27.343600] The buggy address belongs to the physical page:
[   27.343950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919
[   27.344435] flags: 0x200000000000000(node=0|zone=2)
[   27.344912] page_type: f5(slab)
[   27.345111] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.345554] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.346011] page dumped because: kasan: bad access detected
[   27.346274] 
[   27.346381] Memory state around the buggy address:
[   27.346634]  ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.346976]  ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.347379] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.347884]                       ^
[   27.348016]  ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.348680]  ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.349018] ==================================================================