Hay
Date
July 23, 2025, 3:10 a.m.

Environment
qemu-x86_64

[   27.502905] ==================================================================
[   27.503199] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.503731] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.504060] 
[   27.504179] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.504228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.504241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.504263] Call Trace:
[   27.504282]  <TASK>
[   27.504299]  dump_stack_lvl+0x73/0xb0
[   27.504328]  print_report+0xd1/0x640
[   27.504350]  ? __virt_addr_valid+0x1db/0x2d0
[   27.504376]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.504403]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.504429]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.504456]  kasan_report+0x141/0x180
[   27.504478]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.504509]  kasan_check_range+0x10c/0x1c0
[   27.504533]  __kasan_check_write+0x18/0x20
[   27.504556]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   27.504584]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.504611]  ? ret_from_fork_asm+0x1a/0x30
[   27.504634]  ? kthread+0x337/0x6f0
[   27.504659]  kasan_bitops_generic+0x121/0x1c0
[   27.504682]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.504707]  ? __pfx_read_tsc+0x10/0x10
[   27.504730]  ? ktime_get_ts64+0x86/0x230
[   27.504756]  kunit_try_run_case+0x1a5/0x480
[   27.504780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.504803]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.504829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.504855]  ? __kthread_parkme+0x82/0x180
[   27.504875]  ? preempt_count_sub+0x50/0x80
[   27.504898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.504922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.505135]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.505186]  kthread+0x337/0x6f0
[   27.505210]  ? trace_preempt_on+0x20/0xc0
[   27.505235]  ? __pfx_kthread+0x10/0x10
[   27.505258]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.505283]  ? calculate_sigpending+0x7b/0xa0
[   27.505308]  ? __pfx_kthread+0x10/0x10
[   27.505330]  ret_from_fork+0x116/0x1d0
[   27.505350]  ? __pfx_kthread+0x10/0x10
[   27.505420]  ret_from_fork_asm+0x1a/0x30
[   27.505455]  </TASK>
[   27.505467] 
[   27.513418] Allocated by task 310:
[   27.513548]  kasan_save_stack+0x45/0x70
[   27.513685]  kasan_save_track+0x18/0x40
[   27.513924]  kasan_save_alloc_info+0x3b/0x50
[   27.514137]  __kasan_kmalloc+0xb7/0xc0
[   27.514327]  __kmalloc_cache_noprof+0x189/0x420
[   27.514544]  kasan_bitops_generic+0x92/0x1c0
[   27.514718]  kunit_try_run_case+0x1a5/0x480
[   27.514956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.515178]  kthread+0x337/0x6f0
[   27.515336]  ret_from_fork+0x116/0x1d0
[   27.515580]  ret_from_fork_asm+0x1a/0x30
[   27.515756] 
[   27.515849] The buggy address belongs to the object at ffff8881049630a0
[   27.515849]  which belongs to the cache kmalloc-16 of size 16
[   27.516360] The buggy address is located 8 bytes inside of
[   27.516360]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.516707] 
[   27.516773] The buggy address belongs to the physical page:
[   27.516950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.517363] flags: 0x200000000000000(node=0|zone=2)
[   27.517733] page_type: f5(slab)
[   27.517893] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.518230] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.518553] page dumped because: kasan: bad access detected
[   27.518754] 
[   27.518817] Memory state around the buggy address:
[   27.518968]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.519189]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.519808] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.520294]                                   ^
[   27.520616]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.520930]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.521263] ==================================================================
[   27.631272] ==================================================================
[   27.631508] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.632513] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.632877] 
[   27.633015] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.633068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.633081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.633103] Call Trace:
[   27.633122]  <TASK>
[   27.633142]  dump_stack_lvl+0x73/0xb0
[   27.633184]  print_report+0xd1/0x640
[   27.633206]  ? __virt_addr_valid+0x1db/0x2d0
[   27.633230]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.633257]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.633283]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.633311]  kasan_report+0x141/0x180
[   27.633333]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.633365]  kasan_check_range+0x10c/0x1c0
[   27.633450]  __kasan_check_write+0x18/0x20
[   27.633474]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   27.633501]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.633530]  ? ret_from_fork_asm+0x1a/0x30
[   27.633553]  ? kthread+0x337/0x6f0
[   27.633576]  kasan_bitops_generic+0x121/0x1c0
[   27.633600]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.633625]  ? __pfx_read_tsc+0x10/0x10
[   27.633647]  ? ktime_get_ts64+0x86/0x230
[   27.633672]  kunit_try_run_case+0x1a5/0x480
[   27.633697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.633723]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.633750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.633775]  ? __kthread_parkme+0x82/0x180
[   27.633795]  ? preempt_count_sub+0x50/0x80
[   27.633818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.633841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.633878]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.633901]  kthread+0x337/0x6f0
[   27.633921]  ? trace_preempt_on+0x20/0xc0
[   27.633955]  ? __pfx_kthread+0x10/0x10
[   27.633976]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.633999]  ? calculate_sigpending+0x7b/0xa0
[   27.634023]  ? __pfx_kthread+0x10/0x10
[   27.634045]  ret_from_fork+0x116/0x1d0
[   27.634065]  ? __pfx_kthread+0x10/0x10
[   27.634086]  ret_from_fork_asm+0x1a/0x30
[   27.634116]  </TASK>
[   27.634129] 
[   27.642241] Allocated by task 310:
[   27.642466]  kasan_save_stack+0x45/0x70
[   27.642657]  kasan_save_track+0x18/0x40
[   27.642818]  kasan_save_alloc_info+0x3b/0x50
[   27.643042]  __kasan_kmalloc+0xb7/0xc0
[   27.643246]  __kmalloc_cache_noprof+0x189/0x420
[   27.643420]  kasan_bitops_generic+0x92/0x1c0
[   27.643661]  kunit_try_run_case+0x1a5/0x480
[   27.643804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.643974]  kthread+0x337/0x6f0
[   27.644369]  ret_from_fork+0x116/0x1d0
[   27.644560]  ret_from_fork_asm+0x1a/0x30
[   27.644823] 
[   27.644923] The buggy address belongs to the object at ffff8881049630a0
[   27.644923]  which belongs to the cache kmalloc-16 of size 16
[   27.645436] The buggy address is located 8 bytes inside of
[   27.645436]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.645903] 
[   27.645971] The buggy address belongs to the physical page:
[   27.646158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.646397] flags: 0x200000000000000(node=0|zone=2)
[   27.646555] page_type: f5(slab)
[   27.646672] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.647302] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.647882] page dumped because: kasan: bad access detected
[   27.648048] 
[   27.648112] Memory state around the buggy address:
[   27.648612]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.648917]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.649218] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.649547]                                   ^
[   27.649726]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.649949]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.650274] ==================================================================
[   27.670316] ==================================================================
[   27.671171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.671681] Read of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.672114] 
[   27.672223] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.672271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.672283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.672305] Call Trace:
[   27.672321]  <TASK>
[   27.672337]  dump_stack_lvl+0x73/0xb0
[   27.672365]  print_report+0xd1/0x640
[   27.672438]  ? __virt_addr_valid+0x1db/0x2d0
[   27.672462]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.672490]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.672516]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.672544]  kasan_report+0x141/0x180
[   27.672566]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.672598]  __asan_report_load8_noabort+0x18/0x20
[   27.672622]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   27.672650]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.672679]  ? ret_from_fork_asm+0x1a/0x30
[   27.672703]  ? kthread+0x337/0x6f0
[   27.672727]  kasan_bitops_generic+0x121/0x1c0
[   27.672752]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.672776]  ? __pfx_read_tsc+0x10/0x10
[   27.672798]  ? ktime_get_ts64+0x86/0x230
[   27.672823]  kunit_try_run_case+0x1a5/0x480
[   27.672848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.672870]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.672896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.672922]  ? __kthread_parkme+0x82/0x180
[   27.672953]  ? preempt_count_sub+0x50/0x80
[   27.672978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.673002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.673026]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.673051]  kthread+0x337/0x6f0
[   27.673071]  ? trace_preempt_on+0x20/0xc0
[   27.673095]  ? __pfx_kthread+0x10/0x10
[   27.673117]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.673140]  ? calculate_sigpending+0x7b/0xa0
[   27.673177]  ? __pfx_kthread+0x10/0x10
[   27.673199]  ret_from_fork+0x116/0x1d0
[   27.673219]  ? __pfx_kthread+0x10/0x10
[   27.673240]  ret_from_fork_asm+0x1a/0x30
[   27.673271]  </TASK>
[   27.673283] 
[   27.681544] Allocated by task 310:
[   27.681682]  kasan_save_stack+0x45/0x70
[   27.681824]  kasan_save_track+0x18/0x40
[   27.682089]  kasan_save_alloc_info+0x3b/0x50
[   27.682310]  __kasan_kmalloc+0xb7/0xc0
[   27.682759]  __kmalloc_cache_noprof+0x189/0x420
[   27.682998]  kasan_bitops_generic+0x92/0x1c0
[   27.683195]  kunit_try_run_case+0x1a5/0x480
[   27.683356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.683593]  kthread+0x337/0x6f0
[   27.683749]  ret_from_fork+0x116/0x1d0
[   27.683906]  ret_from_fork_asm+0x1a/0x30
[   27.684112] 
[   27.684215] The buggy address belongs to the object at ffff8881049630a0
[   27.684215]  which belongs to the cache kmalloc-16 of size 16
[   27.684666] The buggy address is located 8 bytes inside of
[   27.684666]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.685184] 
[   27.685251] The buggy address belongs to the physical page:
[   27.685424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.685661] flags: 0x200000000000000(node=0|zone=2)
[   27.685821] page_type: f5(slab)
[   27.685936] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.686276] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.686660] page dumped because: kasan: bad access detected
[   27.686905] 
[   27.686992] Memory state around the buggy address:
[   27.687215]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.687680]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.687895] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.688347]                                   ^
[   27.688578]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.688829]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.689154] ==================================================================
[   27.580774] ==================================================================
[   27.581197] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.581879] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.582214] 
[   27.582300] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.582348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.582360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.582391] Call Trace:
[   27.582408]  <TASK>
[   27.582425]  dump_stack_lvl+0x73/0xb0
[   27.582452]  print_report+0xd1/0x640
[   27.582474]  ? __virt_addr_valid+0x1db/0x2d0
[   27.582498]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.582525]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.582551]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.582578]  kasan_report+0x141/0x180
[   27.582600]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.582631]  kasan_check_range+0x10c/0x1c0
[   27.582656]  __kasan_check_write+0x18/0x20
[   27.582680]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   27.582707]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.582735]  ? ret_from_fork_asm+0x1a/0x30
[   27.582757]  ? kthread+0x337/0x6f0
[   27.582782]  kasan_bitops_generic+0x121/0x1c0
[   27.582806]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.582830]  ? __pfx_read_tsc+0x10/0x10
[   27.582852]  ? ktime_get_ts64+0x86/0x230
[   27.582877]  kunit_try_run_case+0x1a5/0x480
[   27.582900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.582923]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.582948]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.582973]  ? __kthread_parkme+0x82/0x180
[   27.582998]  ? preempt_count_sub+0x50/0x80
[   27.583025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.583048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.583073]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.583096]  kthread+0x337/0x6f0
[   27.583116]  ? trace_preempt_on+0x20/0xc0
[   27.583141]  ? __pfx_kthread+0x10/0x10
[   27.583173]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.583197]  ? calculate_sigpending+0x7b/0xa0
[   27.583220]  ? __pfx_kthread+0x10/0x10
[   27.583242]  ret_from_fork+0x116/0x1d0
[   27.583261]  ? __pfx_kthread+0x10/0x10
[   27.583282]  ret_from_fork_asm+0x1a/0x30
[   27.583313]  </TASK>
[   27.583323] 
[   27.595244] Allocated by task 310:
[   27.595465]  kasan_save_stack+0x45/0x70
[   27.595616]  kasan_save_track+0x18/0x40
[   27.595752]  kasan_save_alloc_info+0x3b/0x50
[   27.595896]  __kasan_kmalloc+0xb7/0xc0
[   27.596080]  __kmalloc_cache_noprof+0x189/0x420
[   27.596522]  kasan_bitops_generic+0x92/0x1c0
[   27.596895]  kunit_try_run_case+0x1a5/0x480
[   27.597255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.597593]  kthread+0x337/0x6f0
[   27.597827]  ret_from_fork+0x116/0x1d0
[   27.598033]  ret_from_fork_asm+0x1a/0x30
[   27.598201] 
[   27.598270] The buggy address belongs to the object at ffff8881049630a0
[   27.598270]  which belongs to the cache kmalloc-16 of size 16
[   27.599028] The buggy address is located 8 bytes inside of
[   27.599028]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.599624] 
[   27.599732] The buggy address belongs to the physical page:
[   27.599988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.600256] flags: 0x200000000000000(node=0|zone=2)
[   27.600421] page_type: f5(slab)
[   27.600541] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.601332] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.602122] page dumped because: kasan: bad access detected
[   27.602621] 
[   27.602816] Memory state around the buggy address:
[   27.603255]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.603799]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.604360] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.605079]                                   ^
[   27.605305]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.605908]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.606369] ==================================================================
[   27.560654] ==================================================================
[   27.560949] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.561328] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.561699] 
[   27.561786] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.561834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.561847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.561868] Call Trace:
[   27.561887]  <TASK>
[   27.561905]  dump_stack_lvl+0x73/0xb0
[   27.561934]  print_report+0xd1/0x640
[   27.561956]  ? __virt_addr_valid+0x1db/0x2d0
[   27.561979]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.562007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.562032]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.562060]  kasan_report+0x141/0x180
[   27.562082]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.562112]  kasan_check_range+0x10c/0x1c0
[   27.562136]  __kasan_check_write+0x18/0x20
[   27.562173]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   27.562200]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.562230]  ? ret_from_fork_asm+0x1a/0x30
[   27.562254]  ? kthread+0x337/0x6f0
[   27.562279]  kasan_bitops_generic+0x121/0x1c0
[   27.562302]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.562327]  ? __pfx_read_tsc+0x10/0x10
[   27.562350]  ? ktime_get_ts64+0x86/0x230
[   27.562376]  kunit_try_run_case+0x1a5/0x480
[   27.562399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.562422]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.562447]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.562472]  ? __kthread_parkme+0x82/0x180
[   27.562492]  ? preempt_count_sub+0x50/0x80
[   27.562515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.562539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.562562]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.562585]  kthread+0x337/0x6f0
[   27.562605]  ? trace_preempt_on+0x20/0xc0
[   27.562629]  ? __pfx_kthread+0x10/0x10
[   27.562649]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.562673]  ? calculate_sigpending+0x7b/0xa0
[   27.562697]  ? __pfx_kthread+0x10/0x10
[   27.562718]  ret_from_fork+0x116/0x1d0
[   27.562738]  ? __pfx_kthread+0x10/0x10
[   27.562807]  ret_from_fork_asm+0x1a/0x30
[   27.562841]  </TASK>
[   27.562852] 
[   27.571471] Allocated by task 310:
[   27.571624]  kasan_save_stack+0x45/0x70
[   27.571811]  kasan_save_track+0x18/0x40
[   27.572031]  kasan_save_alloc_info+0x3b/0x50
[   27.572216]  __kasan_kmalloc+0xb7/0xc0
[   27.572347]  __kmalloc_cache_noprof+0x189/0x420
[   27.572865]  kasan_bitops_generic+0x92/0x1c0
[   27.573218]  kunit_try_run_case+0x1a5/0x480
[   27.573513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.573717]  kthread+0x337/0x6f0
[   27.573885]  ret_from_fork+0x116/0x1d0
[   27.574079]  ret_from_fork_asm+0x1a/0x30
[   27.574231] 
[   27.574329] The buggy address belongs to the object at ffff8881049630a0
[   27.574329]  which belongs to the cache kmalloc-16 of size 16
[   27.575101] The buggy address is located 8 bytes inside of
[   27.575101]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.575706] 
[   27.575808] The buggy address belongs to the physical page:
[   27.576092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.576469] flags: 0x200000000000000(node=0|zone=2)
[   27.576654] page_type: f5(slab)
[   27.576820] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.577134] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.577710] page dumped because: kasan: bad access detected
[   27.577968] 
[   27.578076] Memory state around the buggy address:
[   27.578513]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.578730]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.578935] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.579137]                                   ^
[   27.579352]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.579971]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.580343] ==================================================================
[   27.650820] ==================================================================
[   27.651165] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.651784] Read of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.652089] 
[   27.652188] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.652236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.652249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.652271] Call Trace:
[   27.652288]  <TASK>
[   27.652306]  dump_stack_lvl+0x73/0xb0
[   27.652334]  print_report+0xd1/0x640
[   27.652357]  ? __virt_addr_valid+0x1db/0x2d0
[   27.652381]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.652408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.652434]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.652463]  kasan_report+0x141/0x180
[   27.652486]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.652517]  kasan_check_range+0x10c/0x1c0
[   27.652540]  __kasan_check_read+0x15/0x20
[   27.652624]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   27.652657]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.652687]  ? ret_from_fork_asm+0x1a/0x30
[   27.652710]  ? kthread+0x337/0x6f0
[   27.652734]  kasan_bitops_generic+0x121/0x1c0
[   27.652758]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.652782]  ? __pfx_read_tsc+0x10/0x10
[   27.652805]  ? ktime_get_ts64+0x86/0x230
[   27.652829]  kunit_try_run_case+0x1a5/0x480
[   27.652855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.652876]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.652902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.652927]  ? __kthread_parkme+0x82/0x180
[   27.652960]  ? preempt_count_sub+0x50/0x80
[   27.652983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.653008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.653031]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.653055]  kthread+0x337/0x6f0
[   27.653075]  ? trace_preempt_on+0x20/0xc0
[   27.653100]  ? __pfx_kthread+0x10/0x10
[   27.653121]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.653156]  ? calculate_sigpending+0x7b/0xa0
[   27.653181]  ? __pfx_kthread+0x10/0x10
[   27.653202]  ret_from_fork+0x116/0x1d0
[   27.653223]  ? __pfx_kthread+0x10/0x10
[   27.653244]  ret_from_fork_asm+0x1a/0x30
[   27.653274]  </TASK>
[   27.653285] 
[   27.661679] Allocated by task 310:
[   27.661866]  kasan_save_stack+0x45/0x70
[   27.662118]  kasan_save_track+0x18/0x40
[   27.662379]  kasan_save_alloc_info+0x3b/0x50
[   27.662588]  __kasan_kmalloc+0xb7/0xc0
[   27.662739]  __kmalloc_cache_noprof+0x189/0x420
[   27.662956]  kasan_bitops_generic+0x92/0x1c0
[   27.663295]  kunit_try_run_case+0x1a5/0x480
[   27.663548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.663841]  kthread+0x337/0x6f0
[   27.664036]  ret_from_fork+0x116/0x1d0
[   27.664231]  ret_from_fork_asm+0x1a/0x30
[   27.664466] 
[   27.664552] The buggy address belongs to the object at ffff8881049630a0
[   27.664552]  which belongs to the cache kmalloc-16 of size 16
[   27.665023] The buggy address is located 8 bytes inside of
[   27.665023]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.665375] 
[   27.665443] The buggy address belongs to the physical page:
[   27.665617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.665851] flags: 0x200000000000000(node=0|zone=2)
[   27.666008] page_type: f5(slab)
[   27.666123] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.666823] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.667434] page dumped because: kasan: bad access detected
[   27.667688] 
[   27.667775] Memory state around the buggy address:
[   27.668041]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.668308]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.668519] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.668732]                                   ^
[   27.668882]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.669367]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.669709] ==================================================================
[   27.607139] ==================================================================
[   27.607432] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.607903] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.608212] 
[   27.608363] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.608457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.608469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.608491] Call Trace:
[   27.608511]  <TASK>
[   27.608542]  dump_stack_lvl+0x73/0xb0
[   27.608574]  print_report+0xd1/0x640
[   27.608597]  ? __virt_addr_valid+0x1db/0x2d0
[   27.608633]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.608660]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.608687]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.608714]  kasan_report+0x141/0x180
[   27.608745]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.608776]  kasan_check_range+0x10c/0x1c0
[   27.608811]  __kasan_check_write+0x18/0x20
[   27.608835]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   27.608862]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.608891]  ? ret_from_fork_asm+0x1a/0x30
[   27.608915]  ? kthread+0x337/0x6f0
[   27.608950]  kasan_bitops_generic+0x121/0x1c0
[   27.608974]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.609008]  ? __pfx_read_tsc+0x10/0x10
[   27.609030]  ? ktime_get_ts64+0x86/0x230
[   27.609066]  kunit_try_run_case+0x1a5/0x480
[   27.609091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.609114]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.609139]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.609174]  ? __kthread_parkme+0x82/0x180
[   27.609194]  ? preempt_count_sub+0x50/0x80
[   27.609218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.609242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.609266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.609289]  kthread+0x337/0x6f0
[   27.609308]  ? trace_preempt_on+0x20/0xc0
[   27.609333]  ? __pfx_kthread+0x10/0x10
[   27.609353]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.609377]  ? calculate_sigpending+0x7b/0xa0
[   27.609400]  ? __pfx_kthread+0x10/0x10
[   27.609423]  ret_from_fork+0x116/0x1d0
[   27.609443]  ? __pfx_kthread+0x10/0x10
[   27.609464]  ret_from_fork_asm+0x1a/0x30
[   27.609504]  </TASK>
[   27.609516] 
[   27.620503] Allocated by task 310:
[   27.620647]  kasan_save_stack+0x45/0x70
[   27.620796]  kasan_save_track+0x18/0x40
[   27.621028]  kasan_save_alloc_info+0x3b/0x50
[   27.621467]  __kasan_kmalloc+0xb7/0xc0
[   27.621656]  __kmalloc_cache_noprof+0x189/0x420
[   27.621811]  kasan_bitops_generic+0x92/0x1c0
[   27.621955]  kunit_try_run_case+0x1a5/0x480
[   27.622153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.622424]  kthread+0x337/0x6f0
[   27.622627]  ret_from_fork+0x116/0x1d0
[   27.622872]  ret_from_fork_asm+0x1a/0x30
[   27.623237] 
[   27.623578] The buggy address belongs to the object at ffff8881049630a0
[   27.623578]  which belongs to the cache kmalloc-16 of size 16
[   27.624070] The buggy address is located 8 bytes inside of
[   27.624070]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.624896] 
[   27.625034] The buggy address belongs to the physical page:
[   27.625299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.625807] flags: 0x200000000000000(node=0|zone=2)
[   27.625967] page_type: f5(slab)
[   27.626131] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.626659] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.627526] page dumped because: kasan: bad access detected
[   27.627795] 
[   27.627884] Memory state around the buggy address:
[   27.628417]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.628713]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.629033] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.629442]                                   ^
[   27.629761]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.630220]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.630715] ==================================================================
[   27.541066] ==================================================================
[   27.541321] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.542010] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.542248] 
[   27.542334] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.542381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.542394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.542415] Call Trace:
[   27.542435]  <TASK>
[   27.542453]  dump_stack_lvl+0x73/0xb0
[   27.542482]  print_report+0xd1/0x640
[   27.542503]  ? __virt_addr_valid+0x1db/0x2d0
[   27.542527]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.542554]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.542579]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.542606]  kasan_report+0x141/0x180
[   27.542628]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.542659]  kasan_check_range+0x10c/0x1c0
[   27.542725]  __kasan_check_write+0x18/0x20
[   27.542749]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   27.542776]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.542805]  ? ret_from_fork_asm+0x1a/0x30
[   27.542828]  ? kthread+0x337/0x6f0
[   27.542851]  kasan_bitops_generic+0x121/0x1c0
[   27.542875]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.542899]  ? __pfx_read_tsc+0x10/0x10
[   27.542921]  ? ktime_get_ts64+0x86/0x230
[   27.542946]  kunit_try_run_case+0x1a5/0x480
[   27.542971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.542994]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.543020]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.543045]  ? __kthread_parkme+0x82/0x180
[   27.543066]  ? preempt_count_sub+0x50/0x80
[   27.543089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.543113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.543137]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.543174]  kthread+0x337/0x6f0
[   27.543194]  ? trace_preempt_on+0x20/0xc0
[   27.543218]  ? __pfx_kthread+0x10/0x10
[   27.543239]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.543262]  ? calculate_sigpending+0x7b/0xa0
[   27.543287]  ? __pfx_kthread+0x10/0x10
[   27.543308]  ret_from_fork+0x116/0x1d0
[   27.543328]  ? __pfx_kthread+0x10/0x10
[   27.543349]  ret_from_fork_asm+0x1a/0x30
[   27.543380]  </TASK>
[   27.543392] 
[   27.551831] Allocated by task 310:
[   27.552025]  kasan_save_stack+0x45/0x70
[   27.552237]  kasan_save_track+0x18/0x40
[   27.552488]  kasan_save_alloc_info+0x3b/0x50
[   27.552692]  __kasan_kmalloc+0xb7/0xc0
[   27.552872]  __kmalloc_cache_noprof+0x189/0x420
[   27.553191]  kasan_bitops_generic+0x92/0x1c0
[   27.553342]  kunit_try_run_case+0x1a5/0x480
[   27.553735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.554066]  kthread+0x337/0x6f0
[   27.554223]  ret_from_fork+0x116/0x1d0
[   27.554463]  ret_from_fork_asm+0x1a/0x30
[   27.554625] 
[   27.554716] The buggy address belongs to the object at ffff8881049630a0
[   27.554716]  which belongs to the cache kmalloc-16 of size 16
[   27.555186] The buggy address is located 8 bytes inside of
[   27.555186]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.555654] 
[   27.555733] The buggy address belongs to the physical page:
[   27.555911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.556288] flags: 0x200000000000000(node=0|zone=2)
[   27.556512] page_type: f5(slab)
[   27.556674] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.557022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.557508] page dumped because: kasan: bad access detected
[   27.557701] 
[   27.557788] Memory state around the buggy address:
[   27.558076]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.558363]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.558645] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.558918]                                   ^
[   27.559318]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.559843]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.560156] ==================================================================
[   27.521764] ==================================================================
[   27.522134] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.522768] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.523091] 
[   27.523191] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.523239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.523252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.523273] Call Trace:
[   27.523288]  <TASK>
[   27.523304]  dump_stack_lvl+0x73/0xb0
[   27.523330]  print_report+0xd1/0x640
[   27.523352]  ? __virt_addr_valid+0x1db/0x2d0
[   27.523389]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.523415]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.523441]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.523468]  kasan_report+0x141/0x180
[   27.523490]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.523522]  kasan_check_range+0x10c/0x1c0
[   27.523545]  __kasan_check_write+0x18/0x20
[   27.523568]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   27.523596]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.523628]  ? ret_from_fork_asm+0x1a/0x30
[   27.523652]  ? kthread+0x337/0x6f0
[   27.523676]  kasan_bitops_generic+0x121/0x1c0
[   27.523700]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.523724]  ? __pfx_read_tsc+0x10/0x10
[   27.523747]  ? ktime_get_ts64+0x86/0x230
[   27.523772]  kunit_try_run_case+0x1a5/0x480
[   27.523797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.523819]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.523844]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.523871]  ? __kthread_parkme+0x82/0x180
[   27.523891]  ? preempt_count_sub+0x50/0x80
[   27.523914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.523939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.524012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.524036]  kthread+0x337/0x6f0
[   27.524056]  ? trace_preempt_on+0x20/0xc0
[   27.524081]  ? __pfx_kthread+0x10/0x10
[   27.524102]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.524125]  ? calculate_sigpending+0x7b/0xa0
[   27.524159]  ? __pfx_kthread+0x10/0x10
[   27.524181]  ret_from_fork+0x116/0x1d0
[   27.524201]  ? __pfx_kthread+0x10/0x10
[   27.524222]  ret_from_fork_asm+0x1a/0x30
[   27.524253]  </TASK>
[   27.524265] 
[   27.532112] Allocated by task 310:
[   27.532254]  kasan_save_stack+0x45/0x70
[   27.532401]  kasan_save_track+0x18/0x40
[   27.532697]  kasan_save_alloc_info+0x3b/0x50
[   27.532903]  __kasan_kmalloc+0xb7/0xc0
[   27.533282]  __kmalloc_cache_noprof+0x189/0x420
[   27.533497]  kasan_bitops_generic+0x92/0x1c0
[   27.533698]  kunit_try_run_case+0x1a5/0x480
[   27.533899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.534119]  kthread+0x337/0x6f0
[   27.534248]  ret_from_fork+0x116/0x1d0
[   27.534381]  ret_from_fork_asm+0x1a/0x30
[   27.534516] 
[   27.534580] The buggy address belongs to the object at ffff8881049630a0
[   27.534580]  which belongs to the cache kmalloc-16 of size 16
[   27.535372] The buggy address is located 8 bytes inside of
[   27.535372]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.535947] 
[   27.536040] The buggy address belongs to the physical page:
[   27.536312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.536650] flags: 0x200000000000000(node=0|zone=2)
[   27.536815] page_type: f5(slab)
[   27.536933] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.537285] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.537946] page dumped because: kasan: bad access detected
[   27.538124] 
[   27.538199] Memory state around the buggy address:
[   27.538353]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.538620]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.538934] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.539740]                                   ^
[   27.539982]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.540285]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.540578] ==================================================================