Hay
Date
July 24, 2025, 4:41 a.m.

Environment
qemu-x86_64

[   29.134499] ==================================================================
[   29.134749] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   29.136204] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   29.137226] 
[   29.137585] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   29.137756] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   29.137773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.137797] Call Trace:
[   29.137817]  <TASK>
[   29.137835]  dump_stack_lvl+0x73/0xb0
[   29.137867]  print_report+0xd1/0x640
[   29.137890]  ? __virt_addr_valid+0x1db/0x2d0
[   29.137915]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   29.137941]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.137967]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   29.137994]  kasan_report+0x141/0x180
[   29.138016]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   29.138047]  kasan_check_range+0x10c/0x1c0
[   29.138072]  __kasan_check_write+0x18/0x20
[   29.138095]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   29.138122]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.138149]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.138173]  ? trace_hardirqs_on+0x37/0xe0
[   29.138196]  ? kasan_bitops_generic+0x92/0x1c0
[   29.138223]  kasan_bitops_generic+0x121/0x1c0
[   29.138246]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.138271]  ? __pfx_read_tsc+0x10/0x10
[   29.138292]  ? ktime_get_ts64+0x86/0x230
[   29.138317]  kunit_try_run_case+0x1a5/0x480
[   29.138342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.138365]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.138390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.138416]  ? __kthread_parkme+0x82/0x180
[   29.138436]  ? preempt_count_sub+0x50/0x80
[   29.138459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.138482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.138506]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.138529]  kthread+0x337/0x6f0
[   29.138549]  ? trace_preempt_on+0x20/0xc0
[   29.138571]  ? __pfx_kthread+0x10/0x10
[   29.138610]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.138633]  ? calculate_sigpending+0x7b/0xa0
[   29.138657]  ? __pfx_kthread+0x10/0x10
[   29.138680]  ret_from_fork+0x116/0x1d0
[   29.138699]  ? __pfx_kthread+0x10/0x10
[   29.138719]  ret_from_fork_asm+0x1a/0x30
[   29.138751]  </TASK>
[   29.138761] 
[   29.151791] Allocated by task 309:
[   29.152014]  kasan_save_stack+0x45/0x70
[   29.152164]  kasan_save_track+0x18/0x40
[   29.152598]  kasan_save_alloc_info+0x3b/0x50
[   29.152832]  __kasan_kmalloc+0xb7/0xc0
[   29.152961]  __kmalloc_cache_noprof+0x189/0x420
[   29.153240]  kasan_bitops_generic+0x92/0x1c0
[   29.153511]  kunit_try_run_case+0x1a5/0x480
[   29.153737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.154042]  kthread+0x337/0x6f0
[   29.154162]  ret_from_fork+0x116/0x1d0
[   29.154288]  ret_from_fork_asm+0x1a/0x30
[   29.154461] 
[   29.154551] The buggy address belongs to the object at ffff888104625b80
[   29.154551]  which belongs to the cache kmalloc-16 of size 16
[   29.155024] The buggy address is located 8 bytes inside of
[   29.155024]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.155824] 
[   29.156055] The buggy address belongs to the physical page:
[   29.156477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.156792] flags: 0x200000000000000(node=0|zone=2)
[   29.156953] page_type: f5(slab)
[   29.157108] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.157434] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.157892] page dumped because: kasan: bad access detected
[   29.158116] 
[   29.158179] Memory state around the buggy address:
[   29.158377]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.158721]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.159093] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.159400]                       ^
[   29.159568]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.160031]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.160434] ==================================================================
[   29.271123] ==================================================================
[   29.271502] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   29.271955] Read of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   29.272316] 
[   29.272423] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   29.272472] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   29.272486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.272508] Call Trace:
[   29.272525]  <TASK>
[   29.272542]  dump_stack_lvl+0x73/0xb0
[   29.272568]  print_report+0xd1/0x640
[   29.272603]  ? __virt_addr_valid+0x1db/0x2d0
[   29.272627]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   29.272653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.272679]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   29.272706]  kasan_report+0x141/0x180
[   29.272728]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   29.272760]  kasan_check_range+0x10c/0x1c0
[   29.272789]  __kasan_check_read+0x15/0x20
[   29.272812]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   29.272839]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.272867]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.272892]  ? trace_hardirqs_on+0x37/0xe0
[   29.272915]  ? kasan_bitops_generic+0x92/0x1c0
[   29.272942]  kasan_bitops_generic+0x121/0x1c0
[   29.272966]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.272991]  ? __pfx_read_tsc+0x10/0x10
[   29.273013]  ? ktime_get_ts64+0x86/0x230
[   29.273037]  kunit_try_run_case+0x1a5/0x480
[   29.273061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.273084]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.273109]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.273134]  ? __kthread_parkme+0x82/0x180
[   29.273154]  ? preempt_count_sub+0x50/0x80
[   29.273177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.273201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.273224]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.273248]  kthread+0x337/0x6f0
[   29.273266]  ? trace_preempt_on+0x20/0xc0
[   29.273287]  ? __pfx_kthread+0x10/0x10
[   29.273308]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.273330]  ? calculate_sigpending+0x7b/0xa0
[   29.273353]  ? __pfx_kthread+0x10/0x10
[   29.273374]  ret_from_fork+0x116/0x1d0
[   29.273392]  ? __pfx_kthread+0x10/0x10
[   29.273412]  ret_from_fork_asm+0x1a/0x30
[   29.273443]  </TASK>
[   29.273453] 
[   29.282900] Allocated by task 309:
[   29.283072]  kasan_save_stack+0x45/0x70
[   29.283448]  kasan_save_track+0x18/0x40
[   29.283645]  kasan_save_alloc_info+0x3b/0x50
[   29.283930]  __kasan_kmalloc+0xb7/0xc0
[   29.284236]  __kmalloc_cache_noprof+0x189/0x420
[   29.284384]  kasan_bitops_generic+0x92/0x1c0
[   29.284525]  kunit_try_run_case+0x1a5/0x480
[   29.284682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.284903]  kthread+0x337/0x6f0
[   29.285216]  ret_from_fork+0x116/0x1d0
[   29.285591]  ret_from_fork_asm+0x1a/0x30
[   29.285893] 
[   29.286053] The buggy address belongs to the object at ffff888104625b80
[   29.286053]  which belongs to the cache kmalloc-16 of size 16
[   29.286719] The buggy address is located 8 bytes inside of
[   29.286719]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.287548] 
[   29.287625] The buggy address belongs to the physical page:
[   29.287884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.288308] flags: 0x200000000000000(node=0|zone=2)
[   29.288556] page_type: f5(slab)
[   29.288823] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.289235] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.289599] page dumped because: kasan: bad access detected
[   29.289851] 
[   29.289942] Memory state around the buggy address:
[   29.290174]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.290414]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.290763] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.291114]                       ^
[   29.291284]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.291617]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.291994] ==================================================================
[   29.102692] ==================================================================
[   29.103550] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   29.104081] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   29.104458] 
[   29.104545] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   29.104644] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   29.104660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.104681] Call Trace:
[   29.104699]  <TASK>
[   29.104717]  dump_stack_lvl+0x73/0xb0
[   29.104744]  print_report+0xd1/0x640
[   29.104798]  ? __virt_addr_valid+0x1db/0x2d0
[   29.104823]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   29.104849]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.104879]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   29.104906]  kasan_report+0x141/0x180
[   29.105017]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   29.105053]  kasan_check_range+0x10c/0x1c0
[   29.105076]  __kasan_check_write+0x18/0x20
[   29.105109]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   29.105136]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.105197]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.105222]  ? trace_hardirqs_on+0x37/0xe0
[   29.105245]  ? kasan_bitops_generic+0x92/0x1c0
[   29.105272]  kasan_bitops_generic+0x121/0x1c0
[   29.105295]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.105351]  ? __pfx_read_tsc+0x10/0x10
[   29.105373]  ? ktime_get_ts64+0x86/0x230
[   29.105398]  kunit_try_run_case+0x1a5/0x480
[   29.105423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.105446]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.105500]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.105525]  ? __kthread_parkme+0x82/0x180
[   29.105545]  ? preempt_count_sub+0x50/0x80
[   29.105567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.105603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.105625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.105677]  kthread+0x337/0x6f0
[   29.105698]  ? trace_preempt_on+0x20/0xc0
[   29.105719]  ? __pfx_kthread+0x10/0x10
[   29.105739]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.105761]  ? calculate_sigpending+0x7b/0xa0
[   29.105795]  ? __pfx_kthread+0x10/0x10
[   29.105816]  ret_from_fork+0x116/0x1d0
[   29.105835]  ? __pfx_kthread+0x10/0x10
[   29.106003]  ret_from_fork_asm+0x1a/0x30
[   29.106089]  </TASK>
[   29.106101] 
[   29.119605] Allocated by task 309:
[   29.119740]  kasan_save_stack+0x45/0x70
[   29.119973]  kasan_save_track+0x18/0x40
[   29.120350]  kasan_save_alloc_info+0x3b/0x50
[   29.120870]  __kasan_kmalloc+0xb7/0xc0
[   29.121312]  __kmalloc_cache_noprof+0x189/0x420
[   29.121733]  kasan_bitops_generic+0x92/0x1c0
[   29.122343]  kunit_try_run_case+0x1a5/0x480
[   29.122760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.123225]  kthread+0x337/0x6f0
[   29.123539]  ret_from_fork+0x116/0x1d0
[   29.123791]  ret_from_fork_asm+0x1a/0x30
[   29.124357] 
[   29.124429] The buggy address belongs to the object at ffff888104625b80
[   29.124429]  which belongs to the cache kmalloc-16 of size 16
[   29.124831] The buggy address is located 8 bytes inside of
[   29.124831]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.126176] 
[   29.126343] The buggy address belongs to the physical page:
[   29.126868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.127698] flags: 0x200000000000000(node=0|zone=2)
[   29.128176] page_type: f5(slab)
[   29.128295] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.128520] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.128746] page dumped because: kasan: bad access detected
[   29.128911] 
[   29.129111] Memory state around the buggy address:
[   29.129678]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.130485]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.131191] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.131960]                       ^
[   29.132298]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.132946]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.133615] ==================================================================
[   29.204558] ==================================================================
[   29.205105] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   29.205490] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   29.205839] 
[   29.206124] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   29.206219] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   29.206234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.206256] Call Trace:
[   29.206274]  <TASK>
[   29.206291]  dump_stack_lvl+0x73/0xb0
[   29.206346]  print_report+0xd1/0x640
[   29.206369]  ? __virt_addr_valid+0x1db/0x2d0
[   29.206393]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   29.206420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.206445]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   29.206472]  kasan_report+0x141/0x180
[   29.206495]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   29.206526]  kasan_check_range+0x10c/0x1c0
[   29.206550]  __kasan_check_write+0x18/0x20
[   29.206584]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   29.206612]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.206641]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.206665]  ? trace_hardirqs_on+0x37/0xe0
[   29.206688]  ? kasan_bitops_generic+0x92/0x1c0
[   29.206714]  kasan_bitops_generic+0x121/0x1c0
[   29.206738]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.206763]  ? __pfx_read_tsc+0x10/0x10
[   29.206862]  ? ktime_get_ts64+0x86/0x230
[   29.206893]  kunit_try_run_case+0x1a5/0x480
[   29.206919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.206942]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.206968]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.206992]  ? __kthread_parkme+0x82/0x180
[   29.207014]  ? preempt_count_sub+0x50/0x80
[   29.207037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.207062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.207086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.207109]  kthread+0x337/0x6f0
[   29.207128]  ? trace_preempt_on+0x20/0xc0
[   29.207151]  ? __pfx_kthread+0x10/0x10
[   29.207171]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.207194]  ? calculate_sigpending+0x7b/0xa0
[   29.207263]  ? __pfx_kthread+0x10/0x10
[   29.207309]  ret_from_fork+0x116/0x1d0
[   29.207329]  ? __pfx_kthread+0x10/0x10
[   29.207350]  ret_from_fork_asm+0x1a/0x30
[   29.207381]  </TASK>
[   29.207392] 
[   29.216846] Allocated by task 309:
[   29.217026]  kasan_save_stack+0x45/0x70
[   29.217266]  kasan_save_track+0x18/0x40
[   29.217568]  kasan_save_alloc_info+0x3b/0x50
[   29.217921]  __kasan_kmalloc+0xb7/0xc0
[   29.218125]  __kmalloc_cache_noprof+0x189/0x420
[   29.218371]  kasan_bitops_generic+0x92/0x1c0
[   29.218583]  kunit_try_run_case+0x1a5/0x480
[   29.218814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.219150]  kthread+0x337/0x6f0
[   29.219362]  ret_from_fork+0x116/0x1d0
[   29.219524]  ret_from_fork_asm+0x1a/0x30
[   29.219750] 
[   29.220058] The buggy address belongs to the object at ffff888104625b80
[   29.220058]  which belongs to the cache kmalloc-16 of size 16
[   29.220637] The buggy address is located 8 bytes inside of
[   29.220637]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.221289] 
[   29.221367] The buggy address belongs to the physical page:
[   29.221539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.222116] flags: 0x200000000000000(node=0|zone=2)
[   29.222471] page_type: f5(slab)
[   29.222692] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.223111] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.223546] page dumped because: kasan: bad access detected
[   29.223768] 
[   29.223831] Memory state around the buggy address:
[   29.223979]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.224528]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.225227] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.225489]                       ^
[   29.225665]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.225880]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.226674] ==================================================================
[   29.160980] ==================================================================
[   29.161282] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   29.161672] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   29.162193] 
[   29.162373] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   29.162430] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   29.162444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.162468] Call Trace:
[   29.162488]  <TASK>
[   29.162507]  dump_stack_lvl+0x73/0xb0
[   29.162537]  print_report+0xd1/0x640
[   29.162560]  ? __virt_addr_valid+0x1db/0x2d0
[   29.162597]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   29.162624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.162650]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   29.162677]  kasan_report+0x141/0x180
[   29.162721]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   29.162753]  kasan_check_range+0x10c/0x1c0
[   29.162776]  __kasan_check_write+0x18/0x20
[   29.162799]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   29.162825]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.162853]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.162877]  ? trace_hardirqs_on+0x37/0xe0
[   29.162900]  ? kasan_bitops_generic+0x92/0x1c0
[   29.162926]  kasan_bitops_generic+0x121/0x1c0
[   29.162949]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.163050]  ? __pfx_read_tsc+0x10/0x10
[   29.163077]  ? ktime_get_ts64+0x86/0x230
[   29.163102]  kunit_try_run_case+0x1a5/0x480
[   29.163129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.163152]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.163178]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.163203]  ? __kthread_parkme+0x82/0x180
[   29.163224]  ? preempt_count_sub+0x50/0x80
[   29.163247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.163278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.163301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.163325]  kthread+0x337/0x6f0
[   29.163344]  ? trace_preempt_on+0x20/0xc0
[   29.163367]  ? __pfx_kthread+0x10/0x10
[   29.163389]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.163413]  ? calculate_sigpending+0x7b/0xa0
[   29.163438]  ? __pfx_kthread+0x10/0x10
[   29.163462]  ret_from_fork+0x116/0x1d0
[   29.163483]  ? __pfx_kthread+0x10/0x10
[   29.163505]  ret_from_fork_asm+0x1a/0x30
[   29.163559]  </TASK>
[   29.163571] 
[   29.172348] Allocated by task 309:
[   29.172494]  kasan_save_stack+0x45/0x70
[   29.172666]  kasan_save_track+0x18/0x40
[   29.172797]  kasan_save_alloc_info+0x3b/0x50
[   29.173226]  __kasan_kmalloc+0xb7/0xc0
[   29.173439]  __kmalloc_cache_noprof+0x189/0x420
[   29.173668]  kasan_bitops_generic+0x92/0x1c0
[   29.173987]  kunit_try_run_case+0x1a5/0x480
[   29.174135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.174302]  kthread+0x337/0x6f0
[   29.174418]  ret_from_fork+0x116/0x1d0
[   29.174546]  ret_from_fork_asm+0x1a/0x30
[   29.174789] 
[   29.174913] The buggy address belongs to the object at ffff888104625b80
[   29.174913]  which belongs to the cache kmalloc-16 of size 16
[   29.175560] The buggy address is located 8 bytes inside of
[   29.175560]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.176445] 
[   29.176546] The buggy address belongs to the physical page:
[   29.176753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.177496] flags: 0x200000000000000(node=0|zone=2)
[   29.177706] page_type: f5(slab)
[   29.178008] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.178361] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.178598] page dumped because: kasan: bad access detected
[   29.178874] 
[   29.178999] Memory state around the buggy address:
[   29.179273]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.179542]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.179837] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.180275]                       ^
[   29.180399]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.180641]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.180948] ==================================================================
[   29.250616] ==================================================================
[   29.251028] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   29.251361] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   29.251698] 
[   29.251874] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   29.251932] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   29.251946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.251968] Call Trace:
[   29.251987]  <TASK>
[   29.252007]  dump_stack_lvl+0x73/0xb0
[   29.252037]  print_report+0xd1/0x640
[   29.252060]  ? __virt_addr_valid+0x1db/0x2d0
[   29.252084]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   29.252111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.252137]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   29.252165]  kasan_report+0x141/0x180
[   29.252188]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   29.252219]  kasan_check_range+0x10c/0x1c0
[   29.252242]  __kasan_check_write+0x18/0x20
[   29.252265]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   29.252292]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.252320]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.252344]  ? trace_hardirqs_on+0x37/0xe0
[   29.252366]  ? kasan_bitops_generic+0x92/0x1c0
[   29.252393]  kasan_bitops_generic+0x121/0x1c0
[   29.252456]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.252481]  ? __pfx_read_tsc+0x10/0x10
[   29.252502]  ? ktime_get_ts64+0x86/0x230
[   29.252526]  kunit_try_run_case+0x1a5/0x480
[   29.252552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.252586]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.252612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.252638]  ? __kthread_parkme+0x82/0x180
[   29.252659]  ? preempt_count_sub+0x50/0x80
[   29.252683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.252707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.252730]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.252753]  kthread+0x337/0x6f0
[   29.252773]  ? trace_preempt_on+0x20/0xc0
[   29.252807]  ? __pfx_kthread+0x10/0x10
[   29.252827]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.252850]  ? calculate_sigpending+0x7b/0xa0
[   29.252874]  ? __pfx_kthread+0x10/0x10
[   29.252895]  ret_from_fork+0x116/0x1d0
[   29.252948]  ? __pfx_kthread+0x10/0x10
[   29.252968]  ret_from_fork_asm+0x1a/0x30
[   29.253025]  </TASK>
[   29.253036] 
[   29.262207] Allocated by task 309:
[   29.262332]  kasan_save_stack+0x45/0x70
[   29.262470]  kasan_save_track+0x18/0x40
[   29.262629]  kasan_save_alloc_info+0x3b/0x50
[   29.262919]  __kasan_kmalloc+0xb7/0xc0
[   29.263307]  __kmalloc_cache_noprof+0x189/0x420
[   29.263648]  kasan_bitops_generic+0x92/0x1c0
[   29.264041]  kunit_try_run_case+0x1a5/0x480
[   29.264276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.264523]  kthread+0x337/0x6f0
[   29.264650]  ret_from_fork+0x116/0x1d0
[   29.264776]  ret_from_fork_asm+0x1a/0x30
[   29.265108] 
[   29.265290] The buggy address belongs to the object at ffff888104625b80
[   29.265290]  which belongs to the cache kmalloc-16 of size 16
[   29.265921] The buggy address is located 8 bytes inside of
[   29.265921]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.266435] 
[   29.266529] The buggy address belongs to the physical page:
[   29.266874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.267399] flags: 0x200000000000000(node=0|zone=2)
[   29.267630] page_type: f5(slab)
[   29.267795] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.268260] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.268602] page dumped because: kasan: bad access detected
[   29.268838] 
[   29.268900] Memory state around the buggy address:
[   29.269047]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.269253]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.269463] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.269730]                       ^
[   29.269899]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.270214]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.270526] ==================================================================
[   29.227289] ==================================================================
[   29.227670] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   29.228152] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   29.228413] 
[   29.228722] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   29.228824] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   29.228838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.228902] Call Trace:
[   29.228970]  <TASK>
[   29.228987]  dump_stack_lvl+0x73/0xb0
[   29.229017]  print_report+0xd1/0x640
[   29.229039]  ? __virt_addr_valid+0x1db/0x2d0
[   29.229062]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   29.229088]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.229145]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   29.229173]  kasan_report+0x141/0x180
[   29.229195]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   29.229226]  kasan_check_range+0x10c/0x1c0
[   29.229249]  __kasan_check_write+0x18/0x20
[   29.229303]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   29.229330]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.229358]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.229383]  ? trace_hardirqs_on+0x37/0xe0
[   29.229435]  ? kasan_bitops_generic+0x92/0x1c0
[   29.229463]  kasan_bitops_generic+0x121/0x1c0
[   29.229486]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.229510]  ? __pfx_read_tsc+0x10/0x10
[   29.229531]  ? ktime_get_ts64+0x86/0x230
[   29.229596]  kunit_try_run_case+0x1a5/0x480
[   29.229620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.229644]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.229669]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.229694]  ? __kthread_parkme+0x82/0x180
[   29.229714]  ? preempt_count_sub+0x50/0x80
[   29.229738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.229762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.229854]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.229883]  kthread+0x337/0x6f0
[   29.229938]  ? trace_preempt_on+0x20/0xc0
[   29.229960]  ? __pfx_kthread+0x10/0x10
[   29.229981]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.230015]  ? calculate_sigpending+0x7b/0xa0
[   29.230039]  ? __pfx_kthread+0x10/0x10
[   29.230061]  ret_from_fork+0x116/0x1d0
[   29.230115]  ? __pfx_kthread+0x10/0x10
[   29.230138]  ret_from_fork_asm+0x1a/0x30
[   29.230170]  </TASK>
[   29.230182] 
[   29.240375] Allocated by task 309:
[   29.240641]  kasan_save_stack+0x45/0x70
[   29.241187]  kasan_save_track+0x18/0x40
[   29.241344]  kasan_save_alloc_info+0x3b/0x50
[   29.241609]  __kasan_kmalloc+0xb7/0xc0
[   29.241822]  __kmalloc_cache_noprof+0x189/0x420
[   29.242116]  kasan_bitops_generic+0x92/0x1c0
[   29.242352]  kunit_try_run_case+0x1a5/0x480
[   29.242558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.242900]  kthread+0x337/0x6f0
[   29.243110]  ret_from_fork+0x116/0x1d0
[   29.243314]  ret_from_fork_asm+0x1a/0x30
[   29.243503] 
[   29.243604] The buggy address belongs to the object at ffff888104625b80
[   29.243604]  which belongs to the cache kmalloc-16 of size 16
[   29.244236] The buggy address is located 8 bytes inside of
[   29.244236]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.244759] 
[   29.244927] The buggy address belongs to the physical page:
[   29.245157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.245392] flags: 0x200000000000000(node=0|zone=2)
[   29.245550] page_type: f5(slab)
[   29.245726] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.246649] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.246919] page dumped because: kasan: bad access detected
[   29.247085] 
[   29.247148] Memory state around the buggy address:
[   29.247307]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.247523]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.248304] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.248687]                       ^
[   29.248890]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.249279]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.250059] ==================================================================
[   29.181662] ==================================================================
[   29.182203] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   29.182822] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   29.183289] 
[   29.183397] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   29.183492] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   29.183505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.183551] Call Trace:
[   29.183571]  <TASK>
[   29.183600]  dump_stack_lvl+0x73/0xb0
[   29.183629]  print_report+0xd1/0x640
[   29.183653]  ? __virt_addr_valid+0x1db/0x2d0
[   29.183678]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   29.183705]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.183731]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   29.183789]  kasan_report+0x141/0x180
[   29.183863]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   29.183896]  kasan_check_range+0x10c/0x1c0
[   29.183933]  __kasan_check_write+0x18/0x20
[   29.183957]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   29.184020]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.184050]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.184075]  ? trace_hardirqs_on+0x37/0xe0
[   29.184097]  ? kasan_bitops_generic+0x92/0x1c0
[   29.184124]  kasan_bitops_generic+0x121/0x1c0
[   29.184147]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.184172]  ? __pfx_read_tsc+0x10/0x10
[   29.184225]  ? ktime_get_ts64+0x86/0x230
[   29.184250]  kunit_try_run_case+0x1a5/0x480
[   29.184276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.184298]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.184324]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.184379]  ? __kthread_parkme+0x82/0x180
[   29.184399]  ? preempt_count_sub+0x50/0x80
[   29.184423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.184447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.184470]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.184494]  kthread+0x337/0x6f0
[   29.184512]  ? trace_preempt_on+0x20/0xc0
[   29.184566]  ? __pfx_kthread+0x10/0x10
[   29.184599]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.184622]  ? calculate_sigpending+0x7b/0xa0
[   29.184646]  ? __pfx_kthread+0x10/0x10
[   29.184667]  ret_from_fork+0x116/0x1d0
[   29.184719]  ? __pfx_kthread+0x10/0x10
[   29.184740]  ret_from_fork_asm+0x1a/0x30
[   29.184772]  </TASK>
[   29.184782] 
[   29.194906] Allocated by task 309:
[   29.195223]  kasan_save_stack+0x45/0x70
[   29.195464]  kasan_save_track+0x18/0x40
[   29.195670]  kasan_save_alloc_info+0x3b/0x50
[   29.195881]  __kasan_kmalloc+0xb7/0xc0
[   29.196066]  __kmalloc_cache_noprof+0x189/0x420
[   29.196416]  kasan_bitops_generic+0x92/0x1c0
[   29.196629]  kunit_try_run_case+0x1a5/0x480
[   29.196894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.197162]  kthread+0x337/0x6f0
[   29.197330]  ret_from_fork+0x116/0x1d0
[   29.197511]  ret_from_fork_asm+0x1a/0x30
[   29.197728] 
[   29.197852] The buggy address belongs to the object at ffff888104625b80
[   29.197852]  which belongs to the cache kmalloc-16 of size 16
[   29.198446] The buggy address is located 8 bytes inside of
[   29.198446]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.199129] 
[   29.199299] The buggy address belongs to the physical page:
[   29.199559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.199976] flags: 0x200000000000000(node=0|zone=2)
[   29.200143] page_type: f5(slab)
[   29.200259] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.200485] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.201026] page dumped because: kasan: bad access detected
[   29.201349] 
[   29.201471] Memory state around the buggy address:
[   29.201902]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.202391]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.202658] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.202868]                       ^
[   29.203270]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.203678]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.204093] ==================================================================
[   29.292513] ==================================================================
[   29.292918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   29.293437] Read of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   29.293850] 
[   29.293969] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   29.294017] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   29.294031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.294104] Call Trace:
[   29.294122]  <TASK>
[   29.294170]  dump_stack_lvl+0x73/0xb0
[   29.294197]  print_report+0xd1/0x640
[   29.294219]  ? __virt_addr_valid+0x1db/0x2d0
[   29.294243]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   29.294270]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.294296]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   29.294355]  kasan_report+0x141/0x180
[   29.294378]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   29.294410]  __asan_report_load8_noabort+0x18/0x20
[   29.294435]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   29.294462]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   29.294519]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.294544]  ? trace_hardirqs_on+0x37/0xe0
[   29.294566]  ? kasan_bitops_generic+0x92/0x1c0
[   29.294606]  kasan_bitops_generic+0x121/0x1c0
[   29.294629]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.294685]  ? __pfx_read_tsc+0x10/0x10
[   29.294707]  ? ktime_get_ts64+0x86/0x230
[   29.294732]  kunit_try_run_case+0x1a5/0x480
[   29.294756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.294779]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.294804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.294859]  ? __kthread_parkme+0x82/0x180
[   29.294879]  ? preempt_count_sub+0x50/0x80
[   29.294902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.294938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.294963]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.295091]  kthread+0x337/0x6f0
[   29.295112]  ? trace_preempt_on+0x20/0xc0
[   29.295133]  ? __pfx_kthread+0x10/0x10
[   29.295163]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.295186]  ? calculate_sigpending+0x7b/0xa0
[   29.295210]  ? __pfx_kthread+0x10/0x10
[   29.295232]  ret_from_fork+0x116/0x1d0
[   29.295257]  ? __pfx_kthread+0x10/0x10
[   29.295277]  ret_from_fork_asm+0x1a/0x30
[   29.295308]  </TASK>
[   29.295318] 
[   29.304313] Allocated by task 309:
[   29.304541]  kasan_save_stack+0x45/0x70
[   29.304757]  kasan_save_track+0x18/0x40
[   29.305000]  kasan_save_alloc_info+0x3b/0x50
[   29.305174]  __kasan_kmalloc+0xb7/0xc0
[   29.305294]  __kmalloc_cache_noprof+0x189/0x420
[   29.305527]  kasan_bitops_generic+0x92/0x1c0
[   29.305749]  kunit_try_run_case+0x1a5/0x480
[   29.306071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.306313]  kthread+0x337/0x6f0
[   29.306491]  ret_from_fork+0x116/0x1d0
[   29.306680]  ret_from_fork_asm+0x1a/0x30
[   29.306890] 
[   29.307043] The buggy address belongs to the object at ffff888104625b80
[   29.307043]  which belongs to the cache kmalloc-16 of size 16
[   29.307557] The buggy address is located 8 bytes inside of
[   29.307557]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.308227] 
[   29.308345] The buggy address belongs to the physical page:
[   29.308559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.309027] flags: 0x200000000000000(node=0|zone=2)
[   29.309275] page_type: f5(slab)
[   29.309435] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.309758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.310159] page dumped because: kasan: bad access detected
[   29.310399] 
[   29.310516] Memory state around the buggy address:
[   29.310726]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.311199]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.311819] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.312026]                       ^
[   29.312219]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.312523]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.312838] ==================================================================