Hay
Date
June 18, 2025, 6:43 a.m.

Environment
qemu-arm64
qemu-x86_64

[   23.361257] ==================================================================
[   23.361688] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   23.362430] Write of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271
[   23.362603] 
[   23.362698] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.362899] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.362965] Hardware name: linux,dummy-virt (DT)
[   23.363055] Call trace:
[   23.363112]  show_stack+0x20/0x38 (C)
[   23.363513]  dump_stack_lvl+0x8c/0xd0
[   23.364329]  print_report+0x118/0x608
[   23.364881]  kasan_report+0xdc/0x128
[   23.365109]  kasan_check_range+0x100/0x1a8
[   23.365447]  __kasan_check_write+0x20/0x30
[   23.365950]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   23.366637]  kasan_bitops_generic+0x110/0x1c8
[   23.366995]  kunit_try_run_case+0x170/0x3f0
[   23.367174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.367714]  kthread+0x328/0x630
[   23.368215]  ret_from_fork+0x10/0x20
[   23.368371] 
[   23.368739] Allocated by task 271:
[   23.368889]  kasan_save_stack+0x3c/0x68
[   23.369714]  kasan_save_track+0x20/0x40
[   23.369985]  kasan_save_alloc_info+0x40/0x58
[   23.370486]  __kasan_kmalloc+0xd4/0xd8
[   23.370884]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.371237]  kasan_bitops_generic+0xa0/0x1c8
[   23.371361]  kunit_try_run_case+0x170/0x3f0
[   23.371905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.372467]  kthread+0x328/0x630
[   23.372659]  ret_from_fork+0x10/0x20
[   23.372976] 
[   23.373199] The buggy address belongs to the object at fff00000c60581a0
[   23.373199]  which belongs to the cache kmalloc-16 of size 16
[   23.373750] The buggy address is located 8 bytes inside of
[   23.373750]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.374000] 
[   23.375110] The buggy address belongs to the physical page:
[   23.375217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058
[   23.375333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.375397] page_type: f5(slab)
[   23.375452] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   23.375512] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.375560] page dumped because: kasan: bad access detected
[   23.375598] 
[   23.375621] Memory state around the buggy address:
[   23.375664]  fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   23.375716]  fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.375764] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.375808]                                   ^
[   23.375848]  fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.375896]  fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.375940] ==================================================================
[   23.377153] ==================================================================
[   23.377279] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   23.377414] Read of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271
[   23.377544] 
[   23.377631] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.377856] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.377935] Hardware name: linux,dummy-virt (DT)
[   23.378028] Call trace:
[   23.378082]  show_stack+0x20/0x38 (C)
[   23.378191]  dump_stack_lvl+0x8c/0xd0
[   23.378316]  print_report+0x118/0x608
[   23.378474]  kasan_report+0xdc/0x128
[   23.378623]  __asan_report_load8_noabort+0x20/0x30
[   23.378875]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   23.379249]  kasan_bitops_generic+0x110/0x1c8
[   23.379545]  kunit_try_run_case+0x170/0x3f0
[   23.379701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.379861]  kthread+0x328/0x630
[   23.379990]  ret_from_fork+0x10/0x20
[   23.380157] 
[   23.380217] Allocated by task 271:
[   23.380294]  kasan_save_stack+0x3c/0x68
[   23.380382]  kasan_save_track+0x20/0x40
[   23.380473]  kasan_save_alloc_info+0x40/0x58
[   23.380786]  __kasan_kmalloc+0xd4/0xd8
[   23.380883]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.380992]  kasan_bitops_generic+0xa0/0x1c8
[   23.381110]  kunit_try_run_case+0x170/0x3f0
[   23.381205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.381324]  kthread+0x328/0x630
[   23.381427]  ret_from_fork+0x10/0x20
[   23.381559] 
[   23.381638] The buggy address belongs to the object at fff00000c60581a0
[   23.381638]  which belongs to the cache kmalloc-16 of size 16
[   23.381826] The buggy address is located 8 bytes inside of
[   23.381826]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.382039] 
[   23.382095] The buggy address belongs to the physical page:
[   23.382180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058
[   23.382320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.382454] page_type: f5(slab)
[   23.382551] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   23.382682] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.382788] page dumped because: kasan: bad access detected
[   23.382873] 
[   23.382932] Memory state around the buggy address:
[   23.383075]  fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   23.383184]  fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.383299] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.383958]                                   ^
[   23.384121]  fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.384246]  fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.384366] ==================================================================
[   23.386913] ==================================================================
[   23.387058] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   23.387179] Write of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271
[   23.387308] 
[   23.387397] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.387633] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.387716] Hardware name: linux,dummy-virt (DT)
[   23.387802] Call trace:
[   23.387863]  show_stack+0x20/0x38 (C)
[   23.387987]  dump_stack_lvl+0x8c/0xd0
[   23.388159]  print_report+0x118/0x608
[   23.388271]  kasan_report+0xdc/0x128
[   23.388396]  kasan_check_range+0x100/0x1a8
[   23.388751]  __kasan_check_write+0x20/0x30
[   23.389194]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   23.389554]  kasan_bitops_generic+0x110/0x1c8
[   23.389676]  kunit_try_run_case+0x170/0x3f0
[   23.389943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.390136]  kthread+0x328/0x630
[   23.390246]  ret_from_fork+0x10/0x20
[   23.390702] 
[   23.390758] Allocated by task 271:
[   23.390836]  kasan_save_stack+0x3c/0x68
[   23.390945]  kasan_save_track+0x20/0x40
[   23.391058]  kasan_save_alloc_info+0x40/0x58
[   23.391165]  __kasan_kmalloc+0xd4/0xd8
[   23.391244]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.391360]  kasan_bitops_generic+0xa0/0x1c8
[   23.391460]  kunit_try_run_case+0x170/0x3f0
[   23.391858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.392067]  kthread+0x328/0x630
[   23.392164]  ret_from_fork+0x10/0x20
[   23.392302] 
[   23.392355] The buggy address belongs to the object at fff00000c60581a0
[   23.392355]  which belongs to the cache kmalloc-16 of size 16
[   23.392555] The buggy address is located 8 bytes inside of
[   23.392555]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.392760] 
[   23.392838] The buggy address belongs to the physical page:
[   23.392956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058
[   23.393151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.393276] page_type: f5(slab)
[   23.393431] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   23.393584] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.393736] page dumped because: kasan: bad access detected
[   23.393837] 
[   23.393884] Memory state around the buggy address:
[   23.393966]  fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   23.394131]  fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.394234] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.394331]                                   ^
[   23.394517]  fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.394623]  fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.394721] ==================================================================
[   23.397371] ==================================================================
[   23.397505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   23.397633] Read of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271
[   23.397762] 
[   23.397849] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.398120] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.398199] Hardware name: linux,dummy-virt (DT)
[   23.398339]  show_stack+0x20/0x38 (C)
[   23.399678]  kasan_bitops_generic+0x110/0x1c8
[   23.400594] Allocated by task 271:
[   23.400985]  __kasan_kmalloc+0xd4/0xd8
[   23.401415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.401966] The buggy address is located 8 bytes inside of
[   23.401966]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.402743] page_type: f5(slab)
[   23.403313] page dumped because: kasan: bad access detected
[   23.404303] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.407214] Write of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271
[   23.408227]  dump_stack_lvl+0x8c/0xd0
[   23.408466]  kasan_report+0xdc/0x128
[   23.409003]  kasan_bitops_generic+0x110/0x1c8
[   23.409542]  ret_from_fork+0x10/0x20
[   23.410401]  __kasan_kmalloc+0xd4/0xd8
[   23.410838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.411200] 
[   23.411434] The buggy address is located 8 bytes inside of
[   23.411434]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.412314] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.413057] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.414207] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   23.414857] Call trace:
[   23.414916]  show_stack+0x20/0x38 (C)
[   23.415990]  kunit_try_run_case+0x170/0x3f0
[   23.416309]  kthread+0x328/0x630
[   23.417272]  kasan_save_stack+0x3c/0x68
[   23.417943]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.418362]  kthread+0x328/0x630
[   23.418705]  ret_from_fork+0x10/0x20
[   23.419015] The buggy address is located 8 bytes inside of
[   23.419015]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.420717] 
[   23.420763] Memory state around the buggy address:
[   23.421183] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.424272] ==================================================================

[   13.218387] ==================================================================
[   13.218743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.219104] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.219780] 
[   13.219897] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.219944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.219955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.219976] Call Trace:
[   13.219988]  <TASK>
[   13.220002]  dump_stack_lvl+0x73/0xb0
[   13.220027]  print_report+0xd1/0x650
[   13.220048]  ? __virt_addr_valid+0x1db/0x2d0
[   13.220069]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.220093]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.220118]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.220142]  kasan_report+0x141/0x180
[   13.220163]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.220225]  kasan_check_range+0x10c/0x1c0
[   13.220248]  __kasan_check_write+0x18/0x20
[   13.220270]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.220294]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.220319]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.220342]  ? trace_hardirqs_on+0x37/0xe0
[   13.220364]  ? kasan_bitops_generic+0x92/0x1c0
[   13.220390]  kasan_bitops_generic+0x116/0x1c0
[   13.220412]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.220499]  ? __pfx_read_tsc+0x10/0x10
[   13.220520]  ? ktime_get_ts64+0x86/0x230
[   13.220545]  kunit_try_run_case+0x1a5/0x480
[   13.220567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.220588]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.220609]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.220631]  ? __kthread_parkme+0x82/0x180
[   13.220653]  ? preempt_count_sub+0x50/0x80
[   13.220676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.220699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.220720]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.220742]  kthread+0x337/0x6f0
[   13.220761]  ? trace_preempt_on+0x20/0xc0
[   13.220782]  ? __pfx_kthread+0x10/0x10
[   13.220801]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.220820]  ? calculate_sigpending+0x7b/0xa0
[   13.220843]  ? __pfx_kthread+0x10/0x10
[   13.220863]  ret_from_fork+0x116/0x1d0
[   13.220881]  ? __pfx_kthread+0x10/0x10
[   13.220900]  ret_from_fork_asm+0x1a/0x30
[   13.220929]  </TASK>
[   13.220939] 
[   13.229087] Allocated by task 287:
[   13.229289]  kasan_save_stack+0x45/0x70
[   13.229576]  kasan_save_track+0x18/0x40
[   13.229768]  kasan_save_alloc_info+0x3b/0x50
[   13.229971]  __kasan_kmalloc+0xb7/0xc0
[   13.230107]  __kmalloc_cache_noprof+0x189/0x420
[   13.230358]  kasan_bitops_generic+0x92/0x1c0
[   13.230753]  kunit_try_run_case+0x1a5/0x480
[   13.230950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.231184]  kthread+0x337/0x6f0
[   13.231341]  ret_from_fork+0x116/0x1d0
[   13.231561]  ret_from_fork_asm+0x1a/0x30
[   13.231739] 
[   13.231825] The buggy address belongs to the object at ffff8881028596c0
[   13.231825]  which belongs to the cache kmalloc-16 of size 16
[   13.232364] The buggy address is located 8 bytes inside of
[   13.232364]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.232873] 
[   13.232941] The buggy address belongs to the physical page:
[   13.233105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.233585] flags: 0x200000000000000(node=0|zone=2)
[   13.233821] page_type: f5(slab)
[   13.233977] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.234289] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.234768] page dumped because: kasan: bad access detected
[   13.235028] 
[   13.235114] Memory state around the buggy address:
[   13.235367]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.235772]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.236027] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.236372]                                               ^
[   13.236689]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.236973]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.237230] ==================================================================
[   13.287569] ==================================================================
[   13.287915] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.288165] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.288640] 
[   13.288779] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.288826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.288838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.288858] Call Trace:
[   13.288871]  <TASK>
[   13.288884]  dump_stack_lvl+0x73/0xb0
[   13.288909]  print_report+0xd1/0x650
[   13.288930]  ? __virt_addr_valid+0x1db/0x2d0
[   13.288951]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.288974]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.288998]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.289022]  kasan_report+0x141/0x180
[   13.289043]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.289072]  kasan_check_range+0x10c/0x1c0
[   13.289104]  __kasan_check_write+0x18/0x20
[   13.289125]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.289149]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.289184]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.289215]  ? trace_hardirqs_on+0x37/0xe0
[   13.289235]  ? kasan_bitops_generic+0x92/0x1c0
[   13.289261]  kasan_bitops_generic+0x116/0x1c0
[   13.289282]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.289305]  ? __pfx_read_tsc+0x10/0x10
[   13.289326]  ? ktime_get_ts64+0x86/0x230
[   13.289349]  kunit_try_run_case+0x1a5/0x480
[   13.289371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.289392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.289412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.289435]  ? __kthread_parkme+0x82/0x180
[   13.289455]  ? preempt_count_sub+0x50/0x80
[   13.289476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.289498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.289519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.289541]  kthread+0x337/0x6f0
[   13.289559]  ? trace_preempt_on+0x20/0xc0
[   13.289579]  ? __pfx_kthread+0x10/0x10
[   13.289644]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.289666]  ? calculate_sigpending+0x7b/0xa0
[   13.289688]  ? __pfx_kthread+0x10/0x10
[   13.289709]  ret_from_fork+0x116/0x1d0
[   13.289727]  ? __pfx_kthread+0x10/0x10
[   13.289746]  ret_from_fork_asm+0x1a/0x30
[   13.289774]  </TASK>
[   13.289783] 
[   13.298610] Allocated by task 287:
[   13.298771]  kasan_save_stack+0x45/0x70
[   13.298964]  kasan_save_track+0x18/0x40
[   13.299147]  kasan_save_alloc_info+0x3b/0x50
[   13.299353]  __kasan_kmalloc+0xb7/0xc0
[   13.299715]  __kmalloc_cache_noprof+0x189/0x420
[   13.300045]  kasan_bitops_generic+0x92/0x1c0
[   13.300218]  kunit_try_run_case+0x1a5/0x480
[   13.300518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.300870]  kthread+0x337/0x6f0
[   13.301079]  ret_from_fork+0x116/0x1d0
[   13.301328]  ret_from_fork_asm+0x1a/0x30
[   13.301465] 
[   13.301528] The buggy address belongs to the object at ffff8881028596c0
[   13.301528]  which belongs to the cache kmalloc-16 of size 16
[   13.301873] The buggy address is located 8 bytes inside of
[   13.301873]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.302748] 
[   13.302902] The buggy address belongs to the physical page:
[   13.303295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.303607] flags: 0x200000000000000(node=0|zone=2)
[   13.303794] page_type: f5(slab)
[   13.303956] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.304524] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.304876] page dumped because: kasan: bad access detected
[   13.305113] 
[   13.305177] Memory state around the buggy address:
[   13.305405]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.305816]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.306145] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.306378]                                               ^
[   13.306546]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.306979]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.307358] ==================================================================
[   13.198017] ==================================================================
[   13.198387] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.198907] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.199175] 
[   13.199285] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.199354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.199366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.199388] Call Trace:
[   13.199401]  <TASK>
[   13.199415]  dump_stack_lvl+0x73/0xb0
[   13.199520]  print_report+0xd1/0x650
[   13.199545]  ? __virt_addr_valid+0x1db/0x2d0
[   13.199569]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.199594]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.199619]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.199643]  kasan_report+0x141/0x180
[   13.199665]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.199694]  kasan_check_range+0x10c/0x1c0
[   13.199716]  __kasan_check_write+0x18/0x20
[   13.199739]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.199763]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.199791]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.199814]  ? trace_hardirqs_on+0x37/0xe0
[   13.199834]  ? kasan_bitops_generic+0x92/0x1c0
[   13.199859]  kasan_bitops_generic+0x116/0x1c0
[   13.199881]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.199904]  ? __pfx_read_tsc+0x10/0x10
[   13.199923]  ? ktime_get_ts64+0x86/0x230
[   13.199947]  kunit_try_run_case+0x1a5/0x480
[   13.199970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.199990]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.200011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.200032]  ? __kthread_parkme+0x82/0x180
[   13.200051]  ? preempt_count_sub+0x50/0x80
[   13.200073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.200095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.200117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.200138]  kthread+0x337/0x6f0
[   13.200156]  ? trace_preempt_on+0x20/0xc0
[   13.200177]  ? __pfx_kthread+0x10/0x10
[   13.200197]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.200245]  ? calculate_sigpending+0x7b/0xa0
[   13.200267]  ? __pfx_kthread+0x10/0x10
[   13.200287]  ret_from_fork+0x116/0x1d0
[   13.200304]  ? __pfx_kthread+0x10/0x10
[   13.200324]  ret_from_fork_asm+0x1a/0x30
[   13.200353]  </TASK>
[   13.200363] 
[   13.208576] Allocated by task 287:
[   13.208711]  kasan_save_stack+0x45/0x70
[   13.208847]  kasan_save_track+0x18/0x40
[   13.209021]  kasan_save_alloc_info+0x3b/0x50
[   13.209253]  __kasan_kmalloc+0xb7/0xc0
[   13.209497]  __kmalloc_cache_noprof+0x189/0x420
[   13.209702]  kasan_bitops_generic+0x92/0x1c0
[   13.209842]  kunit_try_run_case+0x1a5/0x480
[   13.209980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.210194]  kthread+0x337/0x6f0
[   13.210377]  ret_from_fork+0x116/0x1d0
[   13.210758]  ret_from_fork_asm+0x1a/0x30
[   13.210958] 
[   13.211046] The buggy address belongs to the object at ffff8881028596c0
[   13.211046]  which belongs to the cache kmalloc-16 of size 16
[   13.211605] The buggy address is located 8 bytes inside of
[   13.211605]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.212058] 
[   13.212140] The buggy address belongs to the physical page:
[   13.212367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.212671] flags: 0x200000000000000(node=0|zone=2)
[   13.212860] page_type: f5(slab)
[   13.213019] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.213414] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.213766] page dumped because: kasan: bad access detected
[   13.213932] 
[   13.213993] Memory state around the buggy address:
[   13.214142]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.214378]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.214845] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.215156]                                               ^
[   13.215483]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.215800]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.216106] ==================================================================
[   13.331265] ==================================================================
[   13.331753] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.332111] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.332626] 
[   13.332912] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.332961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.332974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.332994] Call Trace:
[   13.333005]  <TASK>
[   13.333018]  dump_stack_lvl+0x73/0xb0
[   13.333045]  print_report+0xd1/0x650
[   13.333064]  ? __virt_addr_valid+0x1db/0x2d0
[   13.333086]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.333109]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.333133]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.333157]  kasan_report+0x141/0x180
[   13.333177]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.333216]  kasan_check_range+0x10c/0x1c0
[   13.333239]  __kasan_check_write+0x18/0x20
[   13.333260]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.333284]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.333309]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.333331]  ? trace_hardirqs_on+0x37/0xe0
[   13.333351]  ? kasan_bitops_generic+0x92/0x1c0
[   13.333377]  kasan_bitops_generic+0x116/0x1c0
[   13.333400]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.333423]  ? __pfx_read_tsc+0x10/0x10
[   13.333443]  ? ktime_get_ts64+0x86/0x230
[   13.333467]  kunit_try_run_case+0x1a5/0x480
[   13.333489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.333510]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.333531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.333553]  ? __kthread_parkme+0x82/0x180
[   13.333572]  ? preempt_count_sub+0x50/0x80
[   13.333595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.333627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.333649]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.333671]  kthread+0x337/0x6f0
[   13.333702]  ? trace_preempt_on+0x20/0xc0
[   13.333722]  ? __pfx_kthread+0x10/0x10
[   13.333742]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.333762]  ? calculate_sigpending+0x7b/0xa0
[   13.333785]  ? __pfx_kthread+0x10/0x10
[   13.333806]  ret_from_fork+0x116/0x1d0
[   13.333823]  ? __pfx_kthread+0x10/0x10
[   13.333843]  ret_from_fork_asm+0x1a/0x30
[   13.333872]  </TASK>
[   13.333881] 
[   13.342852] Allocated by task 287:
[   13.343009]  kasan_save_stack+0x45/0x70
[   13.343149]  kasan_save_track+0x18/0x40
[   13.343547]  kasan_save_alloc_info+0x3b/0x50
[   13.343948]  __kasan_kmalloc+0xb7/0xc0
[   13.344135]  __kmalloc_cache_noprof+0x189/0x420
[   13.344292]  kasan_bitops_generic+0x92/0x1c0
[   13.344430]  kunit_try_run_case+0x1a5/0x480
[   13.344622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.344859]  kthread+0x337/0x6f0
[   13.345254]  ret_from_fork+0x116/0x1d0
[   13.345467]  ret_from_fork_asm+0x1a/0x30
[   13.345697] 
[   13.345764] The buggy address belongs to the object at ffff8881028596c0
[   13.345764]  which belongs to the cache kmalloc-16 of size 16
[   13.346267] The buggy address is located 8 bytes inside of
[   13.346267]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.346765] 
[   13.346835] The buggy address belongs to the physical page:
[   13.347027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.347389] flags: 0x200000000000000(node=0|zone=2)
[   13.347610] page_type: f5(slab)
[   13.347765] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.348400] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.349404] page dumped because: kasan: bad access detected
[   13.349777] 
[   13.349875] Memory state around the buggy address:
[   13.350245]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.350578]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.351121] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.351721]                                               ^
[   13.351914]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.352375]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.352848] ==================================================================
[   13.178747] ==================================================================
[   13.179713] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.180084] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.180492] 
[   13.180593] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.180640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.180658] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.180679] Call Trace:
[   13.180690]  <TASK>
[   13.180705]  dump_stack_lvl+0x73/0xb0
[   13.180731]  print_report+0xd1/0x650
[   13.180751]  ? __virt_addr_valid+0x1db/0x2d0
[   13.180773]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.180797]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.180821]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.180845]  kasan_report+0x141/0x180
[   13.180866]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.180894]  kasan_check_range+0x10c/0x1c0
[   13.180916]  __kasan_check_write+0x18/0x20
[   13.180937]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.180961]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.180985]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.181008]  ? trace_hardirqs_on+0x37/0xe0
[   13.181030]  ? kasan_bitops_generic+0x92/0x1c0
[   13.181054]  kasan_bitops_generic+0x116/0x1c0
[   13.181076]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.181099]  ? __pfx_read_tsc+0x10/0x10
[   13.181119]  ? ktime_get_ts64+0x86/0x230
[   13.181141]  kunit_try_run_case+0x1a5/0x480
[   13.181164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.181214]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.181235]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.181257]  ? __kthread_parkme+0x82/0x180
[   13.181275]  ? preempt_count_sub+0x50/0x80
[   13.181298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.181319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.181341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.181363]  kthread+0x337/0x6f0
[   13.181381]  ? trace_preempt_on+0x20/0xc0
[   13.181402]  ? __pfx_kthread+0x10/0x10
[   13.181495]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.181518]  ? calculate_sigpending+0x7b/0xa0
[   13.181540]  ? __pfx_kthread+0x10/0x10
[   13.181561]  ret_from_fork+0x116/0x1d0
[   13.181580]  ? __pfx_kthread+0x10/0x10
[   13.181599]  ret_from_fork_asm+0x1a/0x30
[   13.181628]  </TASK>
[   13.181637] 
[   13.189907] Allocated by task 287:
[   13.190036]  kasan_save_stack+0x45/0x70
[   13.190172]  kasan_save_track+0x18/0x40
[   13.190380]  kasan_save_alloc_info+0x3b/0x50
[   13.190767]  __kasan_kmalloc+0xb7/0xc0
[   13.190956]  __kmalloc_cache_noprof+0x189/0x420
[   13.191147]  kasan_bitops_generic+0x92/0x1c0
[   13.191360]  kunit_try_run_case+0x1a5/0x480
[   13.191616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.191842]  kthread+0x337/0x6f0
[   13.191993]  ret_from_fork+0x116/0x1d0
[   13.192143]  ret_from_fork_asm+0x1a/0x30
[   13.192341] 
[   13.192499] The buggy address belongs to the object at ffff8881028596c0
[   13.192499]  which belongs to the cache kmalloc-16 of size 16
[   13.192956] The buggy address is located 8 bytes inside of
[   13.192956]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.193511] 
[   13.193596] The buggy address belongs to the physical page:
[   13.193821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.194119] flags: 0x200000000000000(node=0|zone=2)
[   13.194355] page_type: f5(slab)
[   13.194720] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.195014] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.195310] page dumped because: kasan: bad access detected
[   13.195658] 
[   13.195750] Memory state around the buggy address:
[   13.195903]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.196181]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.196562] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.196780]                                               ^
[   13.196947]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.197154]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.197541] ==================================================================
[   13.267747] ==================================================================
[   13.267984] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.268418] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.268722] 
[   13.268911] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.268961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.269034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.269069] Call Trace:
[   13.269087]  <TASK>
[   13.269101]  dump_stack_lvl+0x73/0xb0
[   13.269128]  print_report+0xd1/0x650
[   13.269156]  ? __virt_addr_valid+0x1db/0x2d0
[   13.269178]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.269202]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.269241]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.269265]  kasan_report+0x141/0x180
[   13.269286]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.269314]  kasan_check_range+0x10c/0x1c0
[   13.269335]  __kasan_check_write+0x18/0x20
[   13.269357]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.269381]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.269405]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.269427]  ? trace_hardirqs_on+0x37/0xe0
[   13.269448]  ? kasan_bitops_generic+0x92/0x1c0
[   13.269473]  kasan_bitops_generic+0x116/0x1c0
[   13.269495]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.269601]  ? __pfx_read_tsc+0x10/0x10
[   13.269632]  ? ktime_get_ts64+0x86/0x230
[   13.269656]  kunit_try_run_case+0x1a5/0x480
[   13.269678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.269709]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.269731]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.269752]  ? __kthread_parkme+0x82/0x180
[   13.269771]  ? preempt_count_sub+0x50/0x80
[   13.269794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.269815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.269837]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.269858]  kthread+0x337/0x6f0
[   13.269877]  ? trace_preempt_on+0x20/0xc0
[   13.269897]  ? __pfx_kthread+0x10/0x10
[   13.269917]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.269936]  ? calculate_sigpending+0x7b/0xa0
[   13.269958]  ? __pfx_kthread+0x10/0x10
[   13.269978]  ret_from_fork+0x116/0x1d0
[   13.269996]  ? __pfx_kthread+0x10/0x10
[   13.270015]  ret_from_fork_asm+0x1a/0x30
[   13.270044]  </TASK>
[   13.270054] 
[   13.278630] Allocated by task 287:
[   13.278977]  kasan_save_stack+0x45/0x70
[   13.279177]  kasan_save_track+0x18/0x40
[   13.279515]  kasan_save_alloc_info+0x3b/0x50
[   13.279702]  __kasan_kmalloc+0xb7/0xc0
[   13.279893]  __kmalloc_cache_noprof+0x189/0x420
[   13.280087]  kasan_bitops_generic+0x92/0x1c0
[   13.280274]  kunit_try_run_case+0x1a5/0x480
[   13.280495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.280663]  kthread+0x337/0x6f0
[   13.280775]  ret_from_fork+0x116/0x1d0
[   13.280896]  ret_from_fork_asm+0x1a/0x30
[   13.281074] 
[   13.281158] The buggy address belongs to the object at ffff8881028596c0
[   13.281158]  which belongs to the cache kmalloc-16 of size 16
[   13.281682] The buggy address is located 8 bytes inside of
[   13.281682]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.282025] 
[   13.282088] The buggy address belongs to the physical page:
[   13.282684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.283076] flags: 0x200000000000000(node=0|zone=2)
[   13.283429] page_type: f5(slab)
[   13.283595] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.284043] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.284484] page dumped because: kasan: bad access detected
[   13.284727] 
[   13.284813] Memory state around the buggy address:
[   13.285019]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.285356]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.285820] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.286135]                                               ^
[   13.286402]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.286678]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.286956] ==================================================================
[   13.239242] ==================================================================
[   13.239973] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.240488] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.241649] 
[   13.241734] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.241781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.241794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.241814] Call Trace:
[   13.241828]  <TASK>
[   13.241842]  dump_stack_lvl+0x73/0xb0
[   13.241870]  print_report+0xd1/0x650
[   13.241890]  ? __virt_addr_valid+0x1db/0x2d0
[   13.241912]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.241936]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.241960]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.241984]  kasan_report+0x141/0x180
[   13.242005]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.242033]  kasan_check_range+0x10c/0x1c0
[   13.242055]  __kasan_check_write+0x18/0x20
[   13.242077]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.242101]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.242126]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.242148]  ? trace_hardirqs_on+0x37/0xe0
[   13.242169]  ? kasan_bitops_generic+0x92/0x1c0
[   13.242195]  kasan_bitops_generic+0x116/0x1c0
[   13.242228]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.242250]  ? __pfx_read_tsc+0x10/0x10
[   13.242270]  ? ktime_get_ts64+0x86/0x230
[   13.242349]  kunit_try_run_case+0x1a5/0x480
[   13.242373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.242440]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.242463]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.242483]  ? __kthread_parkme+0x82/0x180
[   13.242514]  ? preempt_count_sub+0x50/0x80
[   13.242536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.242558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.242580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.242602]  kthread+0x337/0x6f0
[   13.242621]  ? trace_preempt_on+0x20/0xc0
[   13.242641]  ? __pfx_kthread+0x10/0x10
[   13.242660]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.242680]  ? calculate_sigpending+0x7b/0xa0
[   13.242702]  ? __pfx_kthread+0x10/0x10
[   13.242722]  ret_from_fork+0x116/0x1d0
[   13.242739]  ? __pfx_kthread+0x10/0x10
[   13.242759]  ret_from_fork_asm+0x1a/0x30
[   13.242787]  </TASK>
[   13.242796] 
[   13.255810] Allocated by task 287:
[   13.256548]  kasan_save_stack+0x45/0x70
[   13.256766]  kasan_save_track+0x18/0x40
[   13.257045]  kasan_save_alloc_info+0x3b/0x50
[   13.257195]  __kasan_kmalloc+0xb7/0xc0
[   13.257645]  __kmalloc_cache_noprof+0x189/0x420
[   13.257807]  kasan_bitops_generic+0x92/0x1c0
[   13.258078]  kunit_try_run_case+0x1a5/0x480
[   13.258465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.258978]  kthread+0x337/0x6f0
[   13.259126]  ret_from_fork+0x116/0x1d0
[   13.259317]  ret_from_fork_asm+0x1a/0x30
[   13.259841] 
[   13.259925] The buggy address belongs to the object at ffff8881028596c0
[   13.259925]  which belongs to the cache kmalloc-16 of size 16
[   13.260612] The buggy address is located 8 bytes inside of
[   13.260612]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.261407] 
[   13.261646] The buggy address belongs to the physical page:
[   13.261976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.262289] flags: 0x200000000000000(node=0|zone=2)
[   13.262823] page_type: f5(slab)
[   13.263106] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.263525] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.264041] page dumped because: kasan: bad access detected
[   13.264563] 
[   13.264634] Memory state around the buggy address:
[   13.264784]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.264988]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.265190] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.265448]                                               ^
[   13.266060]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.266677]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.266921] ==================================================================
[   13.308015] ==================================================================
[   13.308580] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.308936] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.309343] 
[   13.309494] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.309539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.309616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.309666] Call Trace:
[   13.309680]  <TASK>
[   13.309694]  dump_stack_lvl+0x73/0xb0
[   13.309720]  print_report+0xd1/0x650
[   13.309753]  ? __virt_addr_valid+0x1db/0x2d0
[   13.309774]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.309798]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.309823]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.309847]  kasan_report+0x141/0x180
[   13.309867]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.309896]  kasan_check_range+0x10c/0x1c0
[   13.309918]  __kasan_check_write+0x18/0x20
[   13.309970]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.310006]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.310044]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.310067]  ? trace_hardirqs_on+0x37/0xe0
[   13.310087]  ? kasan_bitops_generic+0x92/0x1c0
[   13.310113]  kasan_bitops_generic+0x116/0x1c0
[   13.310136]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.310160]  ? __pfx_read_tsc+0x10/0x10
[   13.310180]  ? ktime_get_ts64+0x86/0x230
[   13.310213]  kunit_try_run_case+0x1a5/0x480
[   13.310239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.310259]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.310310]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.310331]  ? __kthread_parkme+0x82/0x180
[   13.310373]  ? preempt_count_sub+0x50/0x80
[   13.310395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.310417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.310510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.310537]  kthread+0x337/0x6f0
[   13.310556]  ? trace_preempt_on+0x20/0xc0
[   13.310578]  ? __pfx_kthread+0x10/0x10
[   13.310598]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.310618]  ? calculate_sigpending+0x7b/0xa0
[   13.310641]  ? __pfx_kthread+0x10/0x10
[   13.310661]  ret_from_fork+0x116/0x1d0
[   13.310679]  ? __pfx_kthread+0x10/0x10
[   13.310699]  ret_from_fork_asm+0x1a/0x30
[   13.310728]  </TASK>
[   13.310737] 
[   13.319963] Allocated by task 287:
[   13.320158]  kasan_save_stack+0x45/0x70
[   13.320305]  kasan_save_track+0x18/0x40
[   13.320433]  kasan_save_alloc_info+0x3b/0x50
[   13.320573]  __kasan_kmalloc+0xb7/0xc0
[   13.320861]  __kmalloc_cache_noprof+0x189/0x420
[   13.321118]  kasan_bitops_generic+0x92/0x1c0
[   13.321335]  kunit_try_run_case+0x1a5/0x480
[   13.321533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.321742]  kthread+0x337/0x6f0
[   13.321942]  ret_from_fork+0x116/0x1d0
[   13.322426]  ret_from_fork_asm+0x1a/0x30
[   13.322653] 
[   13.322805] The buggy address belongs to the object at ffff8881028596c0
[   13.322805]  which belongs to the cache kmalloc-16 of size 16
[   13.323358] The buggy address is located 8 bytes inside of
[   13.323358]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.323999] 
[   13.324074] The buggy address belongs to the physical page:
[   13.324289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.324646] flags: 0x200000000000000(node=0|zone=2)
[   13.325020] page_type: f5(slab)
[   13.325374] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.325716] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.326156] page dumped because: kasan: bad access detected
[   13.326489] 
[   13.326619] Memory state around the buggy address:
[   13.326817]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.327121]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.327679] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.328032]                                               ^
[   13.328215]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.328570]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.328868] ==================================================================