Hay
Date
July 25, 2025, 3:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   34.668570] ==================================================================
[   34.668769] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   34.668849] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.668902] 
[   34.669038] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.669128] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.669226] Hardware name: linux,dummy-virt (DT)
[   34.669260] Call trace:
[   34.669301]  show_stack+0x20/0x38 (C)
[   34.669577]  dump_stack_lvl+0x8c/0xd0
[   34.669664]  print_report+0x118/0x5e8
[   34.669731]  kasan_report+0xdc/0x128
[   34.669806]  kasan_check_range+0x100/0x1a8
[   34.669894]  __kasan_check_write+0x20/0x30
[   34.669959]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   34.670012]  kasan_bitops_generic+0x110/0x1c8
[   34.670081]  kunit_try_run_case+0x170/0x3f0
[   34.670131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.670424]  kthread+0x328/0x630
[   34.670522]  ret_from_fork+0x10/0x20
[   34.670600] 
[   34.670673] Allocated by task 293:
[   34.670707]  kasan_save_stack+0x3c/0x68
[   34.670786]  kasan_save_track+0x20/0x40
[   34.670898]  kasan_save_alloc_info+0x40/0x58
[   34.670950]  __kasan_kmalloc+0xd4/0xd8
[   34.671014]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.671070]  kasan_bitops_generic+0xa0/0x1c8
[   34.671178]  kunit_try_run_case+0x170/0x3f0
[   34.671320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.671370]  kthread+0x328/0x630
[   34.671404]  ret_from_fork+0x10/0x20
[   34.671442] 
[   34.671465] The buggy address belongs to the object at fff00000c91b2880
[   34.671465]  which belongs to the cache kmalloc-16 of size 16
[   34.671576] The buggy address is located 8 bytes inside of
[   34.671576]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.671805] 
[   34.671859] The buggy address belongs to the physical page:
[   34.671920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.672016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.672137] page_type: f5(slab)
[   34.672193] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.672274] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.672365] page dumped because: kasan: bad access detected
[   34.672428] 
[   34.672489] Memory state around the buggy address:
[   34.672631]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.672708]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.673073] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.673239]                       ^
[   34.673320]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.673430]  fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.673570] ==================================================================
[   34.674568] ==================================================================
[   34.674742] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   34.674827] Read of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.675020] 
[   34.675250] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.675360] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.675486] Hardware name: linux,dummy-virt (DT)
[   34.675566] Call trace:
[   34.675626]  show_stack+0x20/0x38 (C)
[   34.675753]  dump_stack_lvl+0x8c/0xd0
[   34.675804]  print_report+0x118/0x5e8
[   34.675851]  kasan_report+0xdc/0x128
[   34.675895]  __asan_report_load8_noabort+0x20/0x30
[   34.676285]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   34.676409]  kasan_bitops_generic+0x110/0x1c8
[   34.676516]  kunit_try_run_case+0x170/0x3f0
[   34.676685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.676845]  kthread+0x328/0x630
[   34.676941]  ret_from_fork+0x10/0x20
[   34.677076] 
[   34.677120] Allocated by task 293:
[   34.677154]  kasan_save_stack+0x3c/0x68
[   34.677262]  kasan_save_track+0x20/0x40
[   34.677715]  kasan_save_alloc_info+0x40/0x58
[   34.677804]  __kasan_kmalloc+0xd4/0xd8
[   34.677974]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.678031]  kasan_bitops_generic+0xa0/0x1c8
[   34.678119]  kunit_try_run_case+0x170/0x3f0
[   34.678216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.678277]  kthread+0x328/0x630
[   34.678311]  ret_from_fork+0x10/0x20
[   34.678380] 
[   34.678592] The buggy address belongs to the object at fff00000c91b2880
[   34.678592]  which belongs to the cache kmalloc-16 of size 16
[   34.679252] The buggy address is located 8 bytes inside of
[   34.679252]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.679372] 
[   34.679398] The buggy address belongs to the physical page:
[   34.679446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.679513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.679826] page_type: f5(slab)
[   34.680054] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.680192] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.680334] page dumped because: kasan: bad access detected
[   34.680419] 
[   34.680459] Memory state around the buggy address:
[   34.680502]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.680777]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.680956] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.681070]                       ^
[   34.681168]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.681313]  fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.681376] ==================================================================
[   34.665015] ==================================================================
[   34.665246] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   34.665311] Read of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.665364] 
[   34.665398] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.665589] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.665664] Hardware name: linux,dummy-virt (DT)
[   34.665700] Call trace:
[   34.665745]  show_stack+0x20/0x38 (C)
[   34.665798]  dump_stack_lvl+0x8c/0xd0
[   34.665864]  print_report+0x118/0x5e8
[   34.665990]  kasan_report+0xdc/0x128
[   34.666036]  __asan_report_load8_noabort+0x20/0x30
[   34.666088]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   34.666141]  kasan_bitops_generic+0x110/0x1c8
[   34.666202]  kunit_try_run_case+0x170/0x3f0
[   34.666251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.666312]  kthread+0x328/0x630
[   34.666358]  ret_from_fork+0x10/0x20
[   34.666409] 
[   34.666437] Allocated by task 293:
[   34.666480]  kasan_save_stack+0x3c/0x68
[   34.666523]  kasan_save_track+0x20/0x40
[   34.666560]  kasan_save_alloc_info+0x40/0x58
[   34.666600]  __kasan_kmalloc+0xd4/0xd8
[   34.666654]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.666713]  kasan_bitops_generic+0xa0/0x1c8
[   34.666756]  kunit_try_run_case+0x170/0x3f0
[   34.666796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.666849]  kthread+0x328/0x630
[   34.666886]  ret_from_fork+0x10/0x20
[   34.666938] 
[   34.666961] The buggy address belongs to the object at fff00000c91b2880
[   34.666961]  which belongs to the cache kmalloc-16 of size 16
[   34.667020] The buggy address is located 8 bytes inside of
[   34.667020]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.667084] 
[   34.667105] The buggy address belongs to the physical page:
[   34.667142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.667198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.667253] page_type: f5(slab)
[   34.667301] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.667352] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.667393] page dumped because: kasan: bad access detected
[   34.667436] 
[   34.667456] Memory state around the buggy address:
[   34.667489]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.667536]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.667581] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.667628]                       ^
[   34.667668]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.667714]  fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.667755] ==================================================================
[   34.656715] ==================================================================
[   34.656817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   34.657038] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.657103] 
[   34.657157] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.657294] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.657335] Hardware name: linux,dummy-virt (DT)
[   34.657370] Call trace:
[   34.657412]  show_stack+0x20/0x38 (C)
[   34.657591]  dump_stack_lvl+0x8c/0xd0
[   34.657811]  print_report+0x118/0x5e8
[   34.657895]  kasan_report+0xdc/0x128
[   34.657970]  kasan_check_range+0x100/0x1a8
[   34.658033]  __kasan_check_write+0x20/0x30
[   34.658099]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   34.658172]  kasan_bitops_generic+0x110/0x1c8
[   34.658224]  kunit_try_run_case+0x170/0x3f0
[   34.658274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.658328]  kthread+0x328/0x630
[   34.658555]  ret_from_fork+0x10/0x20
[   34.658622] 
[   34.658688] Allocated by task 293:
[   34.658765]  kasan_save_stack+0x3c/0x68
[   34.658830]  kasan_save_track+0x20/0x40
[   34.658869]  kasan_save_alloc_info+0x40/0x58
[   34.658909]  __kasan_kmalloc+0xd4/0xd8
[   34.659050]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.659210]  kasan_bitops_generic+0xa0/0x1c8
[   34.659380]  kunit_try_run_case+0x170/0x3f0
[   34.659613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.659771]  kthread+0x328/0x630
[   34.659811]  ret_from_fork+0x10/0x20
[   34.659850] 
[   34.659933] The buggy address belongs to the object at fff00000c91b2880
[   34.659933]  which belongs to the cache kmalloc-16 of size 16
[   34.660041] The buggy address is located 8 bytes inside of
[   34.660041]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.660130] 
[   34.660153] The buggy address belongs to the physical page:
[   34.660239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.660620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.660791] page_type: f5(slab)
[   34.660866] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.660963] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.661016] page dumped because: kasan: bad access detected
[   34.661049] 
[   34.661107] Memory state around the buggy address:
[   34.661404]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.661514]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.661619] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.661673]                       ^
[   34.661733]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.661890]  fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.662029] ==================================================================
[   34.690803] ==================================================================
[   34.690864] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   34.691176] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.691470] 
[   34.691510] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.691762] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.691939] Hardware name: linux,dummy-virt (DT)
[   34.692026] Call trace:
[   34.692116]  show_stack+0x20/0x38 (C)
[   34.692728]  dump_stack_lvl+0x8c/0xd0
[   34.692940]  print_report+0x118/0x5e8
[   34.693115]  kasan_report+0xdc/0x128
[   34.693602]  kasan_check_range+0x100/0x1a8
[   34.693949]  __kasan_check_write+0x20/0x30
[   34.694062]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   34.694231]  kasan_bitops_generic+0x110/0x1c8
[   34.694808]  kunit_try_run_case+0x170/0x3f0
[   34.695140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.695205]  kthread+0x328/0x630
[   34.695417]  ret_from_fork+0x10/0x20
[   34.695677] 
[   34.695885] Allocated by task 293:
[   34.696112]  kasan_save_stack+0x3c/0x68
[   34.696206]  kasan_save_track+0x20/0x40
[   34.696286]  kasan_save_alloc_info+0x40/0x58
[   34.696465]  __kasan_kmalloc+0xd4/0xd8
[   34.696576]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.696692]  kasan_bitops_generic+0xa0/0x1c8
[   34.696780]  kunit_try_run_case+0x170/0x3f0
[   34.696915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.697006]  kthread+0x328/0x630
[   34.697041]  ret_from_fork+0x10/0x20
[   34.697300] 
[   34.697469] The buggy address belongs to the object at fff00000c91b2880
[   34.697469]  which belongs to the cache kmalloc-16 of size 16
[   34.697600] The buggy address is located 8 bytes inside of
[   34.697600]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.697724] 
[   34.698141] The buggy address belongs to the physical page:
[   34.698448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.698573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.699013] page_type: f5(slab)
[   34.699144] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.699249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.699388] page dumped because: kasan: bad access detected
[   34.699510] 
[   34.699662] Memory state around the buggy address:
[   34.699916]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.700104]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.700195] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.700286]                       ^
[   34.700365]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.700519]  fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.700615] ==================================================================
[   34.702323] ==================================================================
[   34.702486] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   34.702562] Read of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.702615] 
[   34.702661] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.702762] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.702804] Hardware name: linux,dummy-virt (DT)
[   34.702837] Call trace:
[   34.702860]  show_stack+0x20/0x38 (C)
[   34.702911]  dump_stack_lvl+0x8c/0xd0
[   34.703549]  print_report+0x118/0x5e8
[   34.703628]  kasan_report+0xdc/0x128
[   34.703862]  __asan_report_load8_noabort+0x20/0x30
[   34.704190]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   34.704327]  kasan_bitops_generic+0x110/0x1c8
[   34.704717]  kunit_try_run_case+0x170/0x3f0
[   34.704860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.704951]  kthread+0x328/0x630
[   34.705333]  ret_from_fork+0x10/0x20
[   34.705516] 
[   34.705542] Allocated by task 293:
[   34.705602]  kasan_save_stack+0x3c/0x68
[   34.705981]  kasan_save_track+0x20/0x40
[   34.706182]  kasan_save_alloc_info+0x40/0x58
[   34.706300]  __kasan_kmalloc+0xd4/0xd8
[   34.706405]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.706456]  kasan_bitops_generic+0xa0/0x1c8
[   34.706737]  kunit_try_run_case+0x170/0x3f0
[   34.706991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.707242]  kthread+0x328/0x630
[   34.707348]  ret_from_fork+0x10/0x20
[   34.707390] 
[   34.707411] The buggy address belongs to the object at fff00000c91b2880
[   34.707411]  which belongs to the cache kmalloc-16 of size 16
[   34.709769] page dumped because: kasan: bad access detected
[   34.711164]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.713305] 
[   34.713814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.714106] Hardware name: linux,dummy-virt (DT)
[   34.714352] Call trace:
[   34.714388]  show_stack+0x20/0x38 (C)
[   34.714870]  kasan_check_range+0x100/0x1a8
[   34.715881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.718689]  kunit_try_run_case+0x170/0x3f0
[   34.718910] 
[   34.719538] 
[   34.720706] page dumped because: kasan: bad access detected
[   34.724421] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.724767] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.724941] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.725063]  show_stack+0x20/0x38 (C)
[   34.725825]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   34.726661] 
[   34.726858] Allocated by task 293:
[   34.727314]  kasan_save_alloc_info+0x40/0x58
[   34.727991]  kunit_try_run_case+0x170/0x3f0
[   34.728529]  kthread+0x328/0x630
[   34.728955] The buggy address is located 8 bytes inside of
[   34.728955]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.730331] 
[   34.730444]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.731050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   34.731157] 
[   34.731198] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.731338] Hardware name: linux,dummy-virt (DT)
[   34.732490]  kunit_try_run_case+0x170/0x3f0
[   34.733432]  ret_from_fork+0x10/0x20
[   34.734856]  __kasan_kmalloc+0xd4/0xd8
[   34.736898] The buggy address is located 8 bytes inside of
[   34.736898]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.738144] page dumped because: kasan: bad access detected
[   34.738807] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.741614] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   34.742027] 
[   34.742062] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.742785] Call trace:
[   34.743425]  kasan_report+0xdc/0x128
[   34.743859]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   34.745699] 
[   34.746202]  kasan_save_track+0x20/0x40
[   34.746899]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.747391]  kthread+0x328/0x630
[   34.747891] The buggy address is located 8 bytes inside of
[   34.747891]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.749914]                       ^
[   34.752401] Read of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.752630] 
[   34.752706] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.753225] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.753284] Hardware name: linux,dummy-virt (DT)
[   34.753320] Call trace:
[   34.753408]  dump_stack_lvl+0x8c/0xd0
[   34.753601]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   34.753825]  kthread+0x328/0x630
[   34.754375]  kasan_save_track+0x20/0x40
[   34.754492]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.754689]  kthread+0x328/0x630
[   34.754785] The buggy address belongs to the object at fff00000c91b2880
[   34.754785]  which belongs to the cache kmalloc-16 of size 16
[   34.756105] page_type: f5(slab)
[   34.756324] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.757179]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.760652] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   34.761306] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.762149]  kasan_check_range+0x100/0x1a8
[   34.762577]  kasan_bitops_generic+0x11c/0x1c8
[   34.764061]  kthread+0x328/0x630
[   34.764464] 
[   34.764802]  kasan_save_track+0x20/0x40
[   34.765883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.766750] The buggy address is located 8 bytes inside of
[   34.766750]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.768062] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.770293] ==================================================================
[   34.684028] ==================================================================
[   34.684092] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   34.684150] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.684232] 
[   34.684269] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.684368] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.684401] Hardware name: linux,dummy-virt (DT)
[   34.684446] Call trace:
[   34.684471]  show_stack+0x20/0x38 (C)
[   34.684528]  dump_stack_lvl+0x8c/0xd0
[   34.684577]  print_report+0x118/0x5e8
[   34.684624]  kasan_report+0xdc/0x128
[   34.684685]  kasan_check_range+0x100/0x1a8
[   34.684733]  __kasan_check_write+0x20/0x30
[   34.684782]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   34.684845]  kasan_bitops_generic+0x110/0x1c8
[   34.684897]  kunit_try_run_case+0x170/0x3f0
[   34.684953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.685029]  kthread+0x328/0x630
[   34.685073]  ret_from_fork+0x10/0x20
[   34.685120] 
[   34.685143] Allocated by task 293:
[   34.685183]  kasan_save_stack+0x3c/0x68
[   34.685225]  kasan_save_track+0x20/0x40
[   34.685263]  kasan_save_alloc_info+0x40/0x58
[   34.685302]  __kasan_kmalloc+0xd4/0xd8
[   34.685337]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.685380]  kasan_bitops_generic+0xa0/0x1c8
[   34.685422]  kunit_try_run_case+0x170/0x3f0
[   34.685462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.685506]  kthread+0x328/0x630
[   34.685550]  ret_from_fork+0x10/0x20
[   34.685589] 
[   34.685610] The buggy address belongs to the object at fff00000c91b2880
[   34.685610]  which belongs to the cache kmalloc-16 of size 16
[   34.686460] The buggy address is located 8 bytes inside of
[   34.686460]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.686541] 
[   34.686567] The buggy address belongs to the physical page:
[   34.686631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.686884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.687152] page_type: f5(slab)
[   34.687261] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.687532] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.687765] page dumped because: kasan: bad access detected
[   34.687868] 
[   34.687960] Memory state around the buggy address:
[   34.688033]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.688401]  fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   34.688586] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.688832]                       ^
[   34.689147]  fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.689427]  fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.689511] ==================================================================

[   27.842625] ==================================================================
[   27.843592] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.844375] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   27.844703] 
[   27.845109] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   27.845191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.845205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.845228] Call Trace:
[   27.845242]  <TASK>
[   27.845260]  dump_stack_lvl+0x73/0xb0
[   27.845293]  print_report+0xd1/0x640
[   27.845317]  ? __virt_addr_valid+0x1db/0x2d0
[   27.845343]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.845369]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.845397]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.845424]  kasan_report+0x141/0x180
[   27.845448]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.845479]  kasan_check_range+0x10c/0x1c0
[   27.845505]  __kasan_check_write+0x18/0x20
[   27.845530]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.845557]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.845585]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.845611]  ? trace_hardirqs_on+0x37/0xe0
[   27.845635]  ? kasan_bitops_generic+0x92/0x1c0
[   27.845665]  kasan_bitops_generic+0x116/0x1c0
[   27.845690]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.845716]  ? __pfx_read_tsc+0x10/0x10
[   27.845741]  ? ktime_get_ts64+0x86/0x230
[   27.845767]  kunit_try_run_case+0x1a5/0x480
[   27.845807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.845831]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.845855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.845882]  ? __kthread_parkme+0x82/0x180
[   27.845904]  ? preempt_count_sub+0x50/0x80
[   27.845928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.845963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.845989]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.846013]  kthread+0x337/0x6f0
[   27.846034]  ? trace_preempt_on+0x20/0xc0
[   27.846069]  ? __pfx_kthread+0x10/0x10
[   27.846091]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.846116]  ? calculate_sigpending+0x7b/0xa0
[   27.846141]  ? __pfx_kthread+0x10/0x10
[   27.846163]  ret_from_fork+0x116/0x1d0
[   27.846184]  ? __pfx_kthread+0x10/0x10
[   27.846205]  ret_from_fork_asm+0x1a/0x30
[   27.846238]  </TASK>
[   27.846251] 
[   27.858425] Allocated by task 310:
[   27.858692]  kasan_save_stack+0x45/0x70
[   27.859049]  kasan_save_track+0x18/0x40
[   27.859227]  kasan_save_alloc_info+0x3b/0x50
[   27.859437]  __kasan_kmalloc+0xb7/0xc0
[   27.859614]  __kmalloc_cache_noprof+0x189/0x420
[   27.859829]  kasan_bitops_generic+0x92/0x1c0
[   27.860048]  kunit_try_run_case+0x1a5/0x480
[   27.860734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.861183]  kthread+0x337/0x6f0
[   27.861478]  ret_from_fork+0x116/0x1d0
[   27.861639]  ret_from_fork_asm+0x1a/0x30
[   27.862068] 
[   27.862220] The buggy address belongs to the object at ffff8881057d7680
[   27.862220]  which belongs to the cache kmalloc-16 of size 16
[   27.862993] The buggy address is located 8 bytes inside of
[   27.862993]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   27.863737] 
[   27.863837] The buggy address belongs to the physical page:
[   27.864301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   27.864745] flags: 0x200000000000000(node=0|zone=2)
[   27.865274] page_type: f5(slab)
[   27.865424] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.865769] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.866321] page dumped because: kasan: bad access detected
[   27.866649] 
[   27.866734] Memory state around the buggy address:
[   27.867005]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.867611]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.868076] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.868385]                       ^
[   27.868525]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.868828]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.869425] ==================================================================
[   27.998941] ==================================================================
[   27.999436] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.999754] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   28.000288] 
[   28.000591] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.000701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.000715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.000739] Call Trace:
[   28.000753]  <TASK>
[   28.000769]  dump_stack_lvl+0x73/0xb0
[   28.000858]  print_report+0xd1/0x640
[   28.000882]  ? __virt_addr_valid+0x1db/0x2d0
[   28.000907]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   28.000933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.000973]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   28.001000]  kasan_report+0x141/0x180
[   28.001023]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   28.001054]  kasan_check_range+0x10c/0x1c0
[   28.001079]  __kasan_check_write+0x18/0x20
[   28.001102]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   28.001136]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.001163]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.001188]  ? trace_hardirqs_on+0x37/0xe0
[   28.001210]  ? kasan_bitops_generic+0x92/0x1c0
[   28.001238]  kasan_bitops_generic+0x116/0x1c0
[   28.001263]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.001289]  ? __pfx_read_tsc+0x10/0x10
[   28.001312]  ? ktime_get_ts64+0x86/0x230
[   28.001336]  kunit_try_run_case+0x1a5/0x480
[   28.001361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.001384]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.001407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.001435]  ? __kthread_parkme+0x82/0x180
[   28.001456]  ? preempt_count_sub+0x50/0x80
[   28.001480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.001505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.001530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.001554]  kthread+0x337/0x6f0
[   28.001575]  ? trace_preempt_on+0x20/0xc0
[   28.001598]  ? __pfx_kthread+0x10/0x10
[   28.001620]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.001644]  ? calculate_sigpending+0x7b/0xa0
[   28.001668]  ? __pfx_kthread+0x10/0x10
[   28.001691]  ret_from_fork+0x116/0x1d0
[   28.001711]  ? __pfx_kthread+0x10/0x10
[   28.001733]  ret_from_fork_asm+0x1a/0x30
[   28.001764]  </TASK>
[   28.001776] 
[   28.018451] Allocated by task 310:
[   28.018592]  kasan_save_stack+0x45/0x70
[   28.018740]  kasan_save_track+0x18/0x40
[   28.018880]  kasan_save_alloc_info+0x3b/0x50
[   28.019478]  __kasan_kmalloc+0xb7/0xc0
[   28.019991]  __kmalloc_cache_noprof+0x189/0x420
[   28.020667]  kasan_bitops_generic+0x92/0x1c0
[   28.021191]  kunit_try_run_case+0x1a5/0x480
[   28.021754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.022565]  kthread+0x337/0x6f0
[   28.022814]  ret_from_fork+0x116/0x1d0
[   28.022963]  ret_from_fork_asm+0x1a/0x30
[   28.023490] 
[   28.023664] The buggy address belongs to the object at ffff8881057d7680
[   28.023664]  which belongs to the cache kmalloc-16 of size 16
[   28.025195] The buggy address is located 8 bytes inside of
[   28.025195]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   28.025581] 
[   28.025652] The buggy address belongs to the physical page:
[   28.025837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   28.026103] flags: 0x200000000000000(node=0|zone=2)
[   28.026270] page_type: f5(slab)
[   28.026475] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.027225] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.027987] page dumped because: kasan: bad access detected
[   28.028510] 
[   28.028664] Memory state around the buggy address:
[   28.029115]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.029699]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.030021] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.030624]                       ^
[   28.031138]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.031567]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.031837] ==================================================================
[   27.870147] ==================================================================
[   27.870455] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.871298] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   27.871703] 
[   27.872020] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   27.872077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.872091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.872172] Call Trace:
[   27.872194]  <TASK>
[   27.872213]  dump_stack_lvl+0x73/0xb0
[   27.872245]  print_report+0xd1/0x640
[   27.872269]  ? __virt_addr_valid+0x1db/0x2d0
[   27.872295]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.872321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.872348]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.872375]  kasan_report+0x141/0x180
[   27.872398]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.872430]  kasan_check_range+0x10c/0x1c0
[   27.872455]  __kasan_check_write+0x18/0x20
[   27.872480]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.872506]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.872535]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.872559]  ? trace_hardirqs_on+0x37/0xe0
[   27.872583]  ? kasan_bitops_generic+0x92/0x1c0
[   27.872611]  kasan_bitops_generic+0x116/0x1c0
[   27.872636]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.872662]  ? __pfx_read_tsc+0x10/0x10
[   27.872686]  ? ktime_get_ts64+0x86/0x230
[   27.872712]  kunit_try_run_case+0x1a5/0x480
[   27.872738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.872762]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.872842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.872872]  ? __kthread_parkme+0x82/0x180
[   27.872896]  ? preempt_count_sub+0x50/0x80
[   27.872921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.872959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.872983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.873009]  kthread+0x337/0x6f0
[   27.873031]  ? trace_preempt_on+0x20/0xc0
[   27.873054]  ? __pfx_kthread+0x10/0x10
[   27.873076]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.873102]  ? calculate_sigpending+0x7b/0xa0
[   27.873133]  ? __pfx_kthread+0x10/0x10
[   27.873156]  ret_from_fork+0x116/0x1d0
[   27.873176]  ? __pfx_kthread+0x10/0x10
[   27.873198]  ret_from_fork_asm+0x1a/0x30
[   27.873231]  </TASK>
[   27.873243] 
[   27.884440] Allocated by task 310:
[   27.884624]  kasan_save_stack+0x45/0x70
[   27.884788]  kasan_save_track+0x18/0x40
[   27.885016]  kasan_save_alloc_info+0x3b/0x50
[   27.885660]  __kasan_kmalloc+0xb7/0xc0
[   27.885880]  __kmalloc_cache_noprof+0x189/0x420
[   27.886282]  kasan_bitops_generic+0x92/0x1c0
[   27.886455]  kunit_try_run_case+0x1a5/0x480
[   27.886733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.887034]  kthread+0x337/0x6f0
[   27.887168]  ret_from_fork+0x116/0x1d0
[   27.887359]  ret_from_fork_asm+0x1a/0x30
[   27.887530] 
[   27.887623] The buggy address belongs to the object at ffff8881057d7680
[   27.887623]  which belongs to the cache kmalloc-16 of size 16
[   27.888600] The buggy address is located 8 bytes inside of
[   27.888600]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   27.889241] 
[   27.889554] The buggy address belongs to the physical page:
[   27.890032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   27.890477] flags: 0x200000000000000(node=0|zone=2)
[   27.890694] page_type: f5(slab)
[   27.891042] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.891518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.891878] page dumped because: kasan: bad access detected
[   27.892331] 
[   27.892411] Memory state around the buggy address:
[   27.892624]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.893158]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.893541] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.893903]                       ^
[   27.894220]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.894490]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.894817] ==================================================================
[   27.895686] ==================================================================
[   27.896001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.896610] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   27.897284] 
[   27.897400] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   27.897450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.897462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.897483] Call Trace:
[   27.897499]  <TASK>
[   27.897514]  dump_stack_lvl+0x73/0xb0
[   27.897542]  print_report+0xd1/0x640
[   27.897567]  ? __virt_addr_valid+0x1db/0x2d0
[   27.897591]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.897617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.897645]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.897672]  kasan_report+0x141/0x180
[   27.897696]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.897727]  kasan_check_range+0x10c/0x1c0
[   27.897752]  __kasan_check_write+0x18/0x20
[   27.897777]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.898034]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.898071]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.898097]  ? trace_hardirqs_on+0x37/0xe0
[   27.898120]  ? kasan_bitops_generic+0x92/0x1c0
[   27.898149]  kasan_bitops_generic+0x116/0x1c0
[   27.898174]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.898200]  ? __pfx_read_tsc+0x10/0x10
[   27.898225]  ? ktime_get_ts64+0x86/0x230
[   27.898252]  kunit_try_run_case+0x1a5/0x480
[   27.898278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.898302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.898326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.898353]  ? __kthread_parkme+0x82/0x180
[   27.898375]  ? preempt_count_sub+0x50/0x80
[   27.898399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.898424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.898449]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.898474]  kthread+0x337/0x6f0
[   27.898495]  ? trace_preempt_on+0x20/0xc0
[   27.898519]  ? __pfx_kthread+0x10/0x10
[   27.898541]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.898567]  ? calculate_sigpending+0x7b/0xa0
[   27.898591]  ? __pfx_kthread+0x10/0x10
[   27.898613]  ret_from_fork+0x116/0x1d0
[   27.898634]  ? __pfx_kthread+0x10/0x10
[   27.898655]  ret_from_fork_asm+0x1a/0x30
[   27.898687]  </TASK>
[   27.898699] 
[   27.909676] Allocated by task 310:
[   27.909808]  kasan_save_stack+0x45/0x70
[   27.910533]  kasan_save_track+0x18/0x40
[   27.910869]  kasan_save_alloc_info+0x3b/0x50
[   27.911053]  __kasan_kmalloc+0xb7/0xc0
[   27.911395]  __kmalloc_cache_noprof+0x189/0x420
[   27.911563]  kasan_bitops_generic+0x92/0x1c0
[   27.911776]  kunit_try_run_case+0x1a5/0x480
[   27.912295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.912526]  kthread+0x337/0x6f0
[   27.912754]  ret_from_fork+0x116/0x1d0
[   27.913080]  ret_from_fork_asm+0x1a/0x30
[   27.913366] 
[   27.913445] The buggy address belongs to the object at ffff8881057d7680
[   27.913445]  which belongs to the cache kmalloc-16 of size 16
[   27.914144] The buggy address is located 8 bytes inside of
[   27.914144]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   27.914642] 
[   27.914726] The buggy address belongs to the physical page:
[   27.914954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   27.915702] flags: 0x200000000000000(node=0|zone=2)
[   27.916093] page_type: f5(slab)
[   27.916230] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.916559] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.916873] page dumped because: kasan: bad access detected
[   27.917127] 
[   27.917500] Memory state around the buggy address:
[   27.917700]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.918240]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.918655] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.919099]                       ^
[   27.919233]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.919739]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.920294] ==================================================================
[   27.920938] ==================================================================
[   27.921626] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.922040] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   27.922663] 
[   27.922755] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   27.922857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.922873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.923034] Call Trace:
[   27.923050]  <TASK>
[   27.923067]  dump_stack_lvl+0x73/0xb0
[   27.923097]  print_report+0xd1/0x640
[   27.923120]  ? __virt_addr_valid+0x1db/0x2d0
[   27.923144]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.923171]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.923198]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.923225]  kasan_report+0x141/0x180
[   27.923249]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.923280]  kasan_check_range+0x10c/0x1c0
[   27.923305]  __kasan_check_write+0x18/0x20
[   27.923330]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.923356]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.923384]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.923410]  ? trace_hardirqs_on+0x37/0xe0
[   27.923433]  ? kasan_bitops_generic+0x92/0x1c0
[   27.923461]  kasan_bitops_generic+0x116/0x1c0
[   27.923486]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.923512]  ? __pfx_read_tsc+0x10/0x10
[   27.923534]  ? ktime_get_ts64+0x86/0x230
[   27.923560]  kunit_try_run_case+0x1a5/0x480
[   27.923585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.923609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.923632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.923660]  ? __kthread_parkme+0x82/0x180
[   27.923681]  ? preempt_count_sub+0x50/0x80
[   27.923706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.923731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.923756]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.923794]  kthread+0x337/0x6f0
[   27.923816]  ? trace_preempt_on+0x20/0xc0
[   27.923840]  ? __pfx_kthread+0x10/0x10
[   27.923862]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.923887]  ? calculate_sigpending+0x7b/0xa0
[   27.923911]  ? __pfx_kthread+0x10/0x10
[   27.923934]  ret_from_fork+0x116/0x1d0
[   27.923964]  ? __pfx_kthread+0x10/0x10
[   27.923985]  ret_from_fork_asm+0x1a/0x30
[   27.924017]  </TASK>
[   27.924028] 
[   27.935609] Allocated by task 310:
[   27.935976]  kasan_save_stack+0x45/0x70
[   27.936135]  kasan_save_track+0x18/0x40
[   27.936475]  kasan_save_alloc_info+0x3b/0x50
[   27.936693]  __kasan_kmalloc+0xb7/0xc0
[   27.936868]  __kmalloc_cache_noprof+0x189/0x420
[   27.937425]  kasan_bitops_generic+0x92/0x1c0
[   27.937602]  kunit_try_run_case+0x1a5/0x480
[   27.938017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.938328]  kthread+0x337/0x6f0
[   27.938572]  ret_from_fork+0x116/0x1d0
[   27.938732]  ret_from_fork_asm+0x1a/0x30
[   27.939149] 
[   27.939227] The buggy address belongs to the object at ffff8881057d7680
[   27.939227]  which belongs to the cache kmalloc-16 of size 16
[   27.939774] The buggy address is located 8 bytes inside of
[   27.939774]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   27.940545] 
[   27.940747] The buggy address belongs to the physical page:
[   27.941114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   27.941469] flags: 0x200000000000000(node=0|zone=2)
[   27.941685] page_type: f5(slab)
[   27.942211] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.942527] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.943049] page dumped because: kasan: bad access detected
[   27.943405] 
[   27.943479] Memory state around the buggy address:
[   27.943678]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.944362]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.944658] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.945153]                       ^
[   27.945326]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.945621]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.946244] ==================================================================
[   28.032912] ==================================================================
[   28.033782] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   28.034801] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   28.035409] 
[   28.035502] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.035551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.035564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.035584] Call Trace:
[   28.035597]  <TASK>
[   28.035615]  dump_stack_lvl+0x73/0xb0
[   28.035643]  print_report+0xd1/0x640
[   28.035666]  ? __virt_addr_valid+0x1db/0x2d0
[   28.035692]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   28.035719]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.035745]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   28.035772]  kasan_report+0x141/0x180
[   28.035857]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   28.035891]  kasan_check_range+0x10c/0x1c0
[   28.035915]  __kasan_check_write+0x18/0x20
[   28.035940]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   28.035981]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.036009]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.036035]  ? trace_hardirqs_on+0x37/0xe0
[   28.036059]  ? kasan_bitops_generic+0x92/0x1c0
[   28.036088]  kasan_bitops_generic+0x116/0x1c0
[   28.036112]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.036138]  ? __pfx_read_tsc+0x10/0x10
[   28.036160]  ? ktime_get_ts64+0x86/0x230
[   28.036196]  kunit_try_run_case+0x1a5/0x480
[   28.036221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.036245]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.036268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.036295]  ? __kthread_parkme+0x82/0x180
[   28.036317]  ? preempt_count_sub+0x50/0x80
[   28.036341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.036366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.036391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.036416]  kthread+0x337/0x6f0
[   28.036437]  ? trace_preempt_on+0x20/0xc0
[   28.036461]  ? __pfx_kthread+0x10/0x10
[   28.036483]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.036509]  ? calculate_sigpending+0x7b/0xa0
[   28.036534]  ? __pfx_kthread+0x10/0x10
[   28.036556]  ret_from_fork+0x116/0x1d0
[   28.036577]  ? __pfx_kthread+0x10/0x10
[   28.036599]  ret_from_fork_asm+0x1a/0x30
[   28.036632]  </TASK>
[   28.036643] 
[   28.051637] Allocated by task 310:
[   28.051770]  kasan_save_stack+0x45/0x70
[   28.052178]  kasan_save_track+0x18/0x40
[   28.052517]  kasan_save_alloc_info+0x3b/0x50
[   28.052895]  __kasan_kmalloc+0xb7/0xc0
[   28.053256]  __kmalloc_cache_noprof+0x189/0x420
[   28.053955]  kasan_bitops_generic+0x92/0x1c0
[   28.054462]  kunit_try_run_case+0x1a5/0x480
[   28.054844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.055448]  kthread+0x337/0x6f0
[   28.055816]  ret_from_fork+0x116/0x1d0
[   28.056262]  ret_from_fork_asm+0x1a/0x30
[   28.056456] 
[   28.056524] The buggy address belongs to the object at ffff8881057d7680
[   28.056524]  which belongs to the cache kmalloc-16 of size 16
[   28.057118] The buggy address is located 8 bytes inside of
[   28.057118]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   28.058348] 
[   28.058680] The buggy address belongs to the physical page:
[   28.059276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   28.060090] flags: 0x200000000000000(node=0|zone=2)
[   28.060266] page_type: f5(slab)
[   28.060389] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.060627] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.060858] page dumped because: kasan: bad access detected
[   28.061226] 
[   28.061395] Memory state around the buggy address:
[   28.061810]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.062548]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.063267] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.064163]                       ^
[   28.064496]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.065171]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.065874] ==================================================================
[   27.973107] ==================================================================
[   27.973516] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.974201] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   27.974499] 
[   27.974607] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   27.974653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.974665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.974685] Call Trace:
[   27.974700]  <TASK>
[   27.974716]  dump_stack_lvl+0x73/0xb0
[   27.974742]  print_report+0xd1/0x640
[   27.974766]  ? __virt_addr_valid+0x1db/0x2d0
[   27.975031]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.975084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.975113]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.975141]  kasan_report+0x141/0x180
[   27.975166]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.975197]  kasan_check_range+0x10c/0x1c0
[   27.975223]  __kasan_check_write+0x18/0x20
[   27.975247]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.975274]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.975301]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.975325]  ? trace_hardirqs_on+0x37/0xe0
[   27.975348]  ? kasan_bitops_generic+0x92/0x1c0
[   27.975376]  kasan_bitops_generic+0x116/0x1c0
[   27.975401]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.975429]  ? __pfx_read_tsc+0x10/0x10
[   27.975451]  ? ktime_get_ts64+0x86/0x230
[   27.975478]  kunit_try_run_case+0x1a5/0x480
[   27.975502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.975527]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.975549]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.975576]  ? __kthread_parkme+0x82/0x180
[   27.975597]  ? preempt_count_sub+0x50/0x80
[   27.975622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.975647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.975672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.975698]  kthread+0x337/0x6f0
[   27.975718]  ? trace_preempt_on+0x20/0xc0
[   27.975741]  ? __pfx_kthread+0x10/0x10
[   27.975763]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.975839]  ? calculate_sigpending+0x7b/0xa0
[   27.975865]  ? __pfx_kthread+0x10/0x10
[   27.975889]  ret_from_fork+0x116/0x1d0
[   27.975909]  ? __pfx_kthread+0x10/0x10
[   27.975931]  ret_from_fork_asm+0x1a/0x30
[   27.975974]  </TASK>
[   27.975986] 
[   27.987410] Allocated by task 310:
[   27.987589]  kasan_save_stack+0x45/0x70
[   27.988064]  kasan_save_track+0x18/0x40
[   27.988247]  kasan_save_alloc_info+0x3b/0x50
[   27.988446]  __kasan_kmalloc+0xb7/0xc0
[   27.988617]  __kmalloc_cache_noprof+0x189/0x420
[   27.988814]  kasan_bitops_generic+0x92/0x1c0
[   27.989334]  kunit_try_run_case+0x1a5/0x480
[   27.989496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.989827]  kthread+0x337/0x6f0
[   27.990218]  ret_from_fork+0x116/0x1d0
[   27.990408]  ret_from_fork_asm+0x1a/0x30
[   27.990584] 
[   27.990666] The buggy address belongs to the object at ffff8881057d7680
[   27.990666]  which belongs to the cache kmalloc-16 of size 16
[   27.991461] The buggy address is located 8 bytes inside of
[   27.991461]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   27.992236] 
[   27.992317] The buggy address belongs to the physical page:
[   27.992585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   27.993282] flags: 0x200000000000000(node=0|zone=2)
[   27.993474] page_type: f5(slab)
[   27.993649] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.994044] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.994600] page dumped because: kasan: bad access detected
[   27.994833] 
[   27.994993] Memory state around the buggy address:
[   27.995188]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.995493]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.996123] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.996423]                       ^
[   27.996591]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.997088]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.997401] ==================================================================
[   27.946848] ==================================================================
[   27.947736] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.948298] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   27.948625] 
[   27.948728] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   27.948777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.948789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.948810] Call Trace:
[   27.948825]  <TASK>
[   27.948840]  dump_stack_lvl+0x73/0xb0
[   27.948869]  print_report+0xd1/0x640
[   27.948893]  ? __virt_addr_valid+0x1db/0x2d0
[   27.949268]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.949297]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.949324]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.949351]  kasan_report+0x141/0x180
[   27.949375]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.949409]  kasan_check_range+0x10c/0x1c0
[   27.949434]  __kasan_check_write+0x18/0x20
[   27.949458]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.949486]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.949514]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.949539]  ? trace_hardirqs_on+0x37/0xe0
[   27.949562]  ? kasan_bitops_generic+0x92/0x1c0
[   27.949591]  kasan_bitops_generic+0x116/0x1c0
[   27.949616]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.949642]  ? __pfx_read_tsc+0x10/0x10
[   27.949665]  ? ktime_get_ts64+0x86/0x230
[   27.949690]  kunit_try_run_case+0x1a5/0x480
[   27.949716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.949740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.949763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.949837]  ? __kthread_parkme+0x82/0x180
[   27.949859]  ? preempt_count_sub+0x50/0x80
[   27.949885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.949909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.949935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.949971]  kthread+0x337/0x6f0
[   27.949992]  ? trace_preempt_on+0x20/0xc0
[   27.950015]  ? __pfx_kthread+0x10/0x10
[   27.950036]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.950073]  ? calculate_sigpending+0x7b/0xa0
[   27.950098]  ? __pfx_kthread+0x10/0x10
[   27.950122]  ret_from_fork+0x116/0x1d0
[   27.950142]  ? __pfx_kthread+0x10/0x10
[   27.950164]  ret_from_fork_asm+0x1a/0x30
[   27.950196]  </TASK>
[   27.950208] 
[   27.961576] Allocated by task 310:
[   27.961742]  kasan_save_stack+0x45/0x70
[   27.961913]  kasan_save_track+0x18/0x40
[   27.962555]  kasan_save_alloc_info+0x3b/0x50
[   27.962742]  __kasan_kmalloc+0xb7/0xc0
[   27.962966]  __kmalloc_cache_noprof+0x189/0x420
[   27.963725]  kasan_bitops_generic+0x92/0x1c0
[   27.964050]  kunit_try_run_case+0x1a5/0x480
[   27.964233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.964489]  kthread+0x337/0x6f0
[   27.964639]  ret_from_fork+0x116/0x1d0
[   27.964817]  ret_from_fork_asm+0x1a/0x30
[   27.964996] 
[   27.965063] The buggy address belongs to the object at ffff8881057d7680
[   27.965063]  which belongs to the cache kmalloc-16 of size 16
[   27.965987] The buggy address is located 8 bytes inside of
[   27.965987]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   27.966677] 
[   27.966940] The buggy address belongs to the physical page:
[   27.967456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   27.967903] flags: 0x200000000000000(node=0|zone=2)
[   27.968338] page_type: f5(slab)
[   27.968491] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.969028] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.969312] page dumped because: kasan: bad access detected
[   27.969565] 
[   27.969659] Memory state around the buggy address:
[   27.969862]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.970512]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.970773] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.971329]                       ^
[   27.971479]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.972122]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.972475] ==================================================================