Hay
Date
June 18, 2025, 6:43 a.m.

Environment
qemu-arm64
qemu-x86_64

[   23.538072] ==================================================================
[   23.539966] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   23.540563] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.540722] Call trace:
[   23.541145]  kasan_report+0xdc/0x128
[   23.541389]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   23.541752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.542386]  kasan_save_track+0x20/0x40
[   23.542727]  kasan_bitops_generic+0xa0/0x1c8
[   23.543056]  kthread+0x328/0x630
[   23.543438] The buggy address is located 8 bytes inside of
[   23.543438]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.544198] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.544550]  fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   23.545054]  fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.547906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   23.550447] Read of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271
[   23.551177] 
[   23.551427] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.551644] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.552224] Hardware name: linux,dummy-virt (DT)
[   23.552614] Call trace:
[   23.553174]  show_stack+0x20/0x38 (C)
[   23.553868]  dump_stack_lvl+0x8c/0xd0
[   23.554264]  print_report+0x118/0x608
[   23.554548]  __asan_report_load8_noabort+0x20/0x30
[   23.554772]  kasan_bitops_generic+0x11c/0x1c8
[   23.554881]  kunit_try_run_case+0x170/0x3f0
[   23.554999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.560288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.565127] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.603839] ==================================================================

[   13.396077] ==================================================================
[   13.396366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.396884] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.397352] 
[   13.397462] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.397507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.397518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.397637] Call Trace:
[   13.397656]  <TASK>
[   13.397670]  dump_stack_lvl+0x73/0xb0
[   13.397698]  print_report+0xd1/0x650
[   13.397720]  ? __virt_addr_valid+0x1db/0x2d0
[   13.397741]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.397766]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.397791]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.397819]  kasan_report+0x141/0x180
[   13.397839]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.397870]  kasan_check_range+0x10c/0x1c0
[   13.397893]  __kasan_check_write+0x18/0x20
[   13.397915]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.397942]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.397970]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.397992]  ? trace_hardirqs_on+0x37/0xe0
[   13.398014]  ? kasan_bitops_generic+0x92/0x1c0
[   13.398039]  kasan_bitops_generic+0x121/0x1c0
[   13.398062]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.398085]  ? __pfx_read_tsc+0x10/0x10
[   13.398106]  ? ktime_get_ts64+0x86/0x230
[   13.398129]  kunit_try_run_case+0x1a5/0x480
[   13.398152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.398174]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.398195]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.398228]  ? __kthread_parkme+0x82/0x180
[   13.398248]  ? preempt_count_sub+0x50/0x80
[   13.398270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.398293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.398314]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.398336]  kthread+0x337/0x6f0
[   13.398355]  ? trace_preempt_on+0x20/0xc0
[   13.398376]  ? __pfx_kthread+0x10/0x10
[   13.398396]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.398416]  ? calculate_sigpending+0x7b/0xa0
[   13.398439]  ? __pfx_kthread+0x10/0x10
[   13.398460]  ret_from_fork+0x116/0x1d0
[   13.398478]  ? __pfx_kthread+0x10/0x10
[   13.398497]  ret_from_fork_asm+0x1a/0x30
[   13.398527]  </TASK>
[   13.398537] 
[   13.416720] Allocated by task 287:
[   13.416905]  kasan_save_stack+0x45/0x70
[   13.417087]  kasan_save_track+0x18/0x40
[   13.417261]  kasan_save_alloc_info+0x3b/0x50
[   13.417451]  __kasan_kmalloc+0xb7/0xc0
[   13.417583]  __kmalloc_cache_noprof+0x189/0x420
[   13.417800]  kasan_bitops_generic+0x92/0x1c0
[   13.418004]  kunit_try_run_case+0x1a5/0x480
[   13.418201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.419089]  kthread+0x337/0x6f0
[   13.419449]  ret_from_fork+0x116/0x1d0
[   13.419938]  ret_from_fork_asm+0x1a/0x30
[   13.420615] 
[   13.420942] The buggy address belongs to the object at ffff8881028596c0
[   13.420942]  which belongs to the cache kmalloc-16 of size 16
[   13.421737] The buggy address is located 8 bytes inside of
[   13.421737]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.422092] 
[   13.422157] The buggy address belongs to the physical page:
[   13.423148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.424170] flags: 0x200000000000000(node=0|zone=2)
[   13.424887] page_type: f5(slab)
[   13.425468] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.426490] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.427158] page dumped because: kasan: bad access detected
[   13.427671] 
[   13.427772] Memory state around the buggy address:
[   13.428168]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.428850]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.429241] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.429790]                                               ^
[   13.430127]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.430903]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.431219] ==================================================================
[   13.533032] ==================================================================
[   13.533502] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.533802] Read of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.534083] 
[   13.534179] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.534236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.534270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.534291] Call Trace:
[   13.534304]  <TASK>
[   13.534317]  dump_stack_lvl+0x73/0xb0
[   13.534342]  print_report+0xd1/0x650
[   13.534363]  ? __virt_addr_valid+0x1db/0x2d0
[   13.534384]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.534409]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.534453]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.534480]  kasan_report+0x141/0x180
[   13.534501]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.534531]  __asan_report_load8_noabort+0x18/0x20
[   13.534554]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.534580]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.534621]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.534645]  ? trace_hardirqs_on+0x37/0xe0
[   13.534666]  ? kasan_bitops_generic+0x92/0x1c0
[   13.534691]  kasan_bitops_generic+0x121/0x1c0
[   13.534713]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.534737]  ? __pfx_read_tsc+0x10/0x10
[   13.534757]  ? ktime_get_ts64+0x86/0x230
[   13.534793]  kunit_try_run_case+0x1a5/0x480
[   13.534816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.534837]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.534858]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.534880]  ? __kthread_parkme+0x82/0x180
[   13.534899]  ? preempt_count_sub+0x50/0x80
[   13.534920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.534943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.534965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.534988]  kthread+0x337/0x6f0
[   13.535007]  ? trace_preempt_on+0x20/0xc0
[   13.535029]  ? __pfx_kthread+0x10/0x10
[   13.535050]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.535070]  ? calculate_sigpending+0x7b/0xa0
[   13.535093]  ? __pfx_kthread+0x10/0x10
[   13.535380]  ret_from_fork+0x116/0x1d0
[   13.535413]  ? __pfx_kthread+0x10/0x10
[   13.535502]  ret_from_fork_asm+0x1a/0x30
[   13.535531]  </TASK>
[   13.535542] 
[   13.544097] Allocated by task 287:
[   13.544310]  kasan_save_stack+0x45/0x70
[   13.544597]  kasan_save_track+0x18/0x40
[   13.544789]  kasan_save_alloc_info+0x3b/0x50
[   13.544972]  __kasan_kmalloc+0xb7/0xc0
[   13.545168]  __kmalloc_cache_noprof+0x189/0x420
[   13.545409]  kasan_bitops_generic+0x92/0x1c0
[   13.545569]  kunit_try_run_case+0x1a5/0x480
[   13.545707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.546005]  kthread+0x337/0x6f0
[   13.546195]  ret_from_fork+0x116/0x1d0
[   13.546385]  ret_from_fork_asm+0x1a/0x30
[   13.546577] 
[   13.546945] The buggy address belongs to the object at ffff8881028596c0
[   13.546945]  which belongs to the cache kmalloc-16 of size 16
[   13.547391] The buggy address is located 8 bytes inside of
[   13.547391]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.548022] 
[   13.548113] The buggy address belongs to the physical page:
[   13.548402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.548855] flags: 0x200000000000000(node=0|zone=2)
[   13.549038] page_type: f5(slab)
[   13.549153] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.549467] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.549863] page dumped because: kasan: bad access detected
[   13.550070] 
[   13.550135] Memory state around the buggy address:
[   13.550348]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.550885]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.551233] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.551610]                                               ^
[   13.551844]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.552104]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.552516] ==================================================================
[   13.513690] ==================================================================
[   13.513958] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.514560] Read of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.514886] 
[   13.514985] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.515029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.515040] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.515060] Call Trace:
[   13.515076]  <TASK>
[   13.515089]  dump_stack_lvl+0x73/0xb0
[   13.515114]  print_report+0xd1/0x650
[   13.515134]  ? __virt_addr_valid+0x1db/0x2d0
[   13.515155]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.515181]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.515219]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.515245]  kasan_report+0x141/0x180
[   13.515266]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.515296]  kasan_check_range+0x10c/0x1c0
[   13.515318]  __kasan_check_read+0x15/0x20
[   13.515340]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.515366]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.515393]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.515415]  ? trace_hardirqs_on+0x37/0xe0
[   13.515436]  ? kasan_bitops_generic+0x92/0x1c0
[   13.515461]  kasan_bitops_generic+0x121/0x1c0
[   13.515483]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.515507]  ? __pfx_read_tsc+0x10/0x10
[   13.515526]  ? ktime_get_ts64+0x86/0x230
[   13.515549]  kunit_try_run_case+0x1a5/0x480
[   13.515571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.515592]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.515613]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.515635]  ? __kthread_parkme+0x82/0x180
[   13.515653]  ? preempt_count_sub+0x50/0x80
[   13.515676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.515721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.515743]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.515765]  kthread+0x337/0x6f0
[   13.515783]  ? trace_preempt_on+0x20/0xc0
[   13.515804]  ? __pfx_kthread+0x10/0x10
[   13.515824]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.515843]  ? calculate_sigpending+0x7b/0xa0
[   13.515867]  ? __pfx_kthread+0x10/0x10
[   13.515887]  ret_from_fork+0x116/0x1d0
[   13.515905]  ? __pfx_kthread+0x10/0x10
[   13.515924]  ret_from_fork_asm+0x1a/0x30
[   13.515953]  </TASK>
[   13.515962] 
[   13.524576] Allocated by task 287:
[   13.524715]  kasan_save_stack+0x45/0x70
[   13.524899]  kasan_save_track+0x18/0x40
[   13.525022]  kasan_save_alloc_info+0x3b/0x50
[   13.525158]  __kasan_kmalloc+0xb7/0xc0
[   13.525338]  __kmalloc_cache_noprof+0x189/0x420
[   13.525544]  kasan_bitops_generic+0x92/0x1c0
[   13.525732]  kunit_try_run_case+0x1a5/0x480
[   13.525899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.526129]  kthread+0x337/0x6f0
[   13.526574]  ret_from_fork+0x116/0x1d0
[   13.526789]  ret_from_fork_asm+0x1a/0x30
[   13.526978] 
[   13.527073] The buggy address belongs to the object at ffff8881028596c0
[   13.527073]  which belongs to the cache kmalloc-16 of size 16
[   13.527698] The buggy address is located 8 bytes inside of
[   13.527698]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.528139] 
[   13.528264] The buggy address belongs to the physical page:
[   13.528602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.528852] flags: 0x200000000000000(node=0|zone=2)
[   13.529007] page_type: f5(slab)
[   13.529119] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.529506] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.529864] page dumped because: kasan: bad access detected
[   13.530107] 
[   13.530172] Memory state around the buggy address:
[   13.530338]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.530636]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.530927] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.531654]                                               ^
[   13.531894]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.532241]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.532600] ==================================================================
[   13.431867] ==================================================================
[   13.432215] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.432666] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.432920] 
[   13.433018] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.433064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.433074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.433095] Call Trace:
[   13.433111]  <TASK>
[   13.433125]  dump_stack_lvl+0x73/0xb0
[   13.433151]  print_report+0xd1/0x650
[   13.433171]  ? __virt_addr_valid+0x1db/0x2d0
[   13.433192]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.433228]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.433253]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.433279]  kasan_report+0x141/0x180
[   13.433319]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.433349]  kasan_check_range+0x10c/0x1c0
[   13.433371]  __kasan_check_write+0x18/0x20
[   13.433392]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.433418]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.433444]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.433466]  ? trace_hardirqs_on+0x37/0xe0
[   13.433487]  ? kasan_bitops_generic+0x92/0x1c0
[   13.433512]  kasan_bitops_generic+0x121/0x1c0
[   13.433534]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.433558]  ? __pfx_read_tsc+0x10/0x10
[   13.433578]  ? ktime_get_ts64+0x86/0x230
[   13.433601]  kunit_try_run_case+0x1a5/0x480
[   13.433623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.433644]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.433665]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.433686]  ? __kthread_parkme+0x82/0x180
[   13.433705]  ? preempt_count_sub+0x50/0x80
[   13.433728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.433750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.433772]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.433794]  kthread+0x337/0x6f0
[   13.433827]  ? trace_preempt_on+0x20/0xc0
[   13.433848]  ? __pfx_kthread+0x10/0x10
[   13.433868]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.433887]  ? calculate_sigpending+0x7b/0xa0
[   13.433910]  ? __pfx_kthread+0x10/0x10
[   13.433930]  ret_from_fork+0x116/0x1d0
[   13.433948]  ? __pfx_kthread+0x10/0x10
[   13.433967]  ret_from_fork_asm+0x1a/0x30
[   13.433996]  </TASK>
[   13.434006] 
[   13.442820] Allocated by task 287:
[   13.443286]  kasan_save_stack+0x45/0x70
[   13.443472]  kasan_save_track+0x18/0x40
[   13.443603]  kasan_save_alloc_info+0x3b/0x50
[   13.443750]  __kasan_kmalloc+0xb7/0xc0
[   13.443997]  __kmalloc_cache_noprof+0x189/0x420
[   13.444322]  kasan_bitops_generic+0x92/0x1c0
[   13.444747]  kunit_try_run_case+0x1a5/0x480
[   13.444906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.445158]  kthread+0x337/0x6f0
[   13.445488]  ret_from_fork+0x116/0x1d0
[   13.445629]  ret_from_fork_asm+0x1a/0x30
[   13.445762] 
[   13.445827] The buggy address belongs to the object at ffff8881028596c0
[   13.445827]  which belongs to the cache kmalloc-16 of size 16
[   13.446373] The buggy address is located 8 bytes inside of
[   13.446373]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.447095] 
[   13.447192] The buggy address belongs to the physical page:
[   13.447513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.447809] flags: 0x200000000000000(node=0|zone=2)
[   13.448116] page_type: f5(slab)
[   13.448253] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.448548] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.448865] page dumped because: kasan: bad access detected
[   13.449027] 
[   13.449089] Memory state around the buggy address:
[   13.449597]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.449944]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.450301] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.450737]                                               ^
[   13.451001]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.451297]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.451723] ==================================================================
[   13.452164] ==================================================================
[   13.452567] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.452866] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.453182] 
[   13.453322] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.453371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.453382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.453403] Call Trace:
[   13.453418]  <TASK>
[   13.453431]  dump_stack_lvl+0x73/0xb0
[   13.453458]  print_report+0xd1/0x650
[   13.453478]  ? __virt_addr_valid+0x1db/0x2d0
[   13.453499]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.453525]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.453550]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.453578]  kasan_report+0x141/0x180
[   13.453598]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.453630]  kasan_check_range+0x10c/0x1c0
[   13.453652]  __kasan_check_write+0x18/0x20
[   13.453674]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.453700]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.453727]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.453849]  ? trace_hardirqs_on+0x37/0xe0
[   13.453872]  ? kasan_bitops_generic+0x92/0x1c0
[   13.453898]  kasan_bitops_generic+0x121/0x1c0
[   13.453921]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.453944]  ? __pfx_read_tsc+0x10/0x10
[   13.453964]  ? ktime_get_ts64+0x86/0x230
[   13.453987]  kunit_try_run_case+0x1a5/0x480
[   13.454010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.454031]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.454052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.454073]  ? __kthread_parkme+0x82/0x180
[   13.454093]  ? preempt_count_sub+0x50/0x80
[   13.454114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.454137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.454159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.454180]  kthread+0x337/0x6f0
[   13.454232]  ? trace_preempt_on+0x20/0xc0
[   13.454254]  ? __pfx_kthread+0x10/0x10
[   13.454274]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.454293]  ? calculate_sigpending+0x7b/0xa0
[   13.454316]  ? __pfx_kthread+0x10/0x10
[   13.454337]  ret_from_fork+0x116/0x1d0
[   13.454355]  ? __pfx_kthread+0x10/0x10
[   13.454374]  ret_from_fork_asm+0x1a/0x30
[   13.454421]  </TASK>
[   13.454431] 
[   13.463629] Allocated by task 287:
[   13.463909]  kasan_save_stack+0x45/0x70
[   13.464250]  kasan_save_track+0x18/0x40
[   13.464506]  kasan_save_alloc_info+0x3b/0x50
[   13.464694]  __kasan_kmalloc+0xb7/0xc0
[   13.464868]  __kmalloc_cache_noprof+0x189/0x420
[   13.465047]  kasan_bitops_generic+0x92/0x1c0
[   13.465202]  kunit_try_run_case+0x1a5/0x480
[   13.465437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.465641]  kthread+0x337/0x6f0
[   13.465984]  ret_from_fork+0x116/0x1d0
[   13.466170]  ret_from_fork_asm+0x1a/0x30
[   13.466926] 
[   13.467003] The buggy address belongs to the object at ffff8881028596c0
[   13.467003]  which belongs to the cache kmalloc-16 of size 16
[   13.467366] The buggy address is located 8 bytes inside of
[   13.467366]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.468129] 
[   13.468516] The buggy address belongs to the physical page:
[   13.468775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.469123] flags: 0x200000000000000(node=0|zone=2)
[   13.469377] page_type: f5(slab)
[   13.469599] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.469833] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.470158] page dumped because: kasan: bad access detected
[   13.470429] 
[   13.470535] Memory state around the buggy address:
[   13.470748]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.471006]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.471485] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.471908]                                               ^
[   13.472158]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.472607]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.472825] ==================================================================
[   13.375042] ==================================================================
[   13.375326] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.376022] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.376317] 
[   13.376416] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.376511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.376524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.376544] Call Trace:
[   13.376556]  <TASK>
[   13.376581]  dump_stack_lvl+0x73/0xb0
[   13.376607]  print_report+0xd1/0x650
[   13.376627]  ? __virt_addr_valid+0x1db/0x2d0
[   13.376648]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.376677]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.376702]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.376728]  kasan_report+0x141/0x180
[   13.376749]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.376780]  kasan_check_range+0x10c/0x1c0
[   13.376812]  __kasan_check_write+0x18/0x20
[   13.376834]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.376860]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.376897]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.376920]  ? trace_hardirqs_on+0x37/0xe0
[   13.376940]  ? kasan_bitops_generic+0x92/0x1c0
[   13.376966]  kasan_bitops_generic+0x121/0x1c0
[   13.376996]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.377020]  ? __pfx_read_tsc+0x10/0x10
[   13.377040]  ? ktime_get_ts64+0x86/0x230
[   13.377074]  kunit_try_run_case+0x1a5/0x480
[   13.377097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.377117]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.377145]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.377168]  ? __kthread_parkme+0x82/0x180
[   13.377188]  ? preempt_count_sub+0x50/0x80
[   13.377226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.377249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.377270]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.377293]  kthread+0x337/0x6f0
[   13.377311]  ? trace_preempt_on+0x20/0xc0
[   13.377332]  ? __pfx_kthread+0x10/0x10
[   13.377352]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.377372]  ? calculate_sigpending+0x7b/0xa0
[   13.377395]  ? __pfx_kthread+0x10/0x10
[   13.377416]  ret_from_fork+0x116/0x1d0
[   13.377627]  ? __pfx_kthread+0x10/0x10
[   13.377657]  ret_from_fork_asm+0x1a/0x30
[   13.377701]  </TASK>
[   13.377712] 
[   13.386896] Allocated by task 287:
[   13.387056]  kasan_save_stack+0x45/0x70
[   13.387257]  kasan_save_track+0x18/0x40
[   13.387420]  kasan_save_alloc_info+0x3b/0x50
[   13.387686]  __kasan_kmalloc+0xb7/0xc0
[   13.387840]  __kmalloc_cache_noprof+0x189/0x420
[   13.388035]  kasan_bitops_generic+0x92/0x1c0
[   13.388254]  kunit_try_run_case+0x1a5/0x480
[   13.388437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.388710]  kthread+0x337/0x6f0
[   13.388885]  ret_from_fork+0x116/0x1d0
[   13.389065]  ret_from_fork_asm+0x1a/0x30
[   13.389314] 
[   13.389415] The buggy address belongs to the object at ffff8881028596c0
[   13.389415]  which belongs to the cache kmalloc-16 of size 16
[   13.390108] The buggy address is located 8 bytes inside of
[   13.390108]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.390478] 
[   13.390542] The buggy address belongs to the physical page:
[   13.390708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.391412] flags: 0x200000000000000(node=0|zone=2)
[   13.391846] page_type: f5(slab)
[   13.391971] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.392244] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.392773] page dumped because: kasan: bad access detected
[   13.393115] 
[   13.393280] Memory state around the buggy address:
[   13.393650]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.393931]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.394150] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.394394]                                               ^
[   13.394737]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.395155]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.395507] ==================================================================
[   13.473258] ==================================================================
[   13.473718] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.474052] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.474288] 
[   13.474386] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.474491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.474505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.474525] Call Trace:
[   13.474537]  <TASK>
[   13.474550]  dump_stack_lvl+0x73/0xb0
[   13.474575]  print_report+0xd1/0x650
[   13.474596]  ? __virt_addr_valid+0x1db/0x2d0
[   13.474617]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.474642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.474667]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.474692]  kasan_report+0x141/0x180
[   13.474713]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.474742]  kasan_check_range+0x10c/0x1c0
[   13.474765]  __kasan_check_write+0x18/0x20
[   13.474809]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.474834]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.474873]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.474895]  ? trace_hardirqs_on+0x37/0xe0
[   13.474916]  ? kasan_bitops_generic+0x92/0x1c0
[   13.474958]  kasan_bitops_generic+0x121/0x1c0
[   13.474980]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.475004]  ? __pfx_read_tsc+0x10/0x10
[   13.475024]  ? ktime_get_ts64+0x86/0x230
[   13.475048]  kunit_try_run_case+0x1a5/0x480
[   13.475072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.475093]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.475114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.475136]  ? __kthread_parkme+0x82/0x180
[   13.475155]  ? preempt_count_sub+0x50/0x80
[   13.475178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.475201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.475232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.475254]  kthread+0x337/0x6f0
[   13.475273]  ? trace_preempt_on+0x20/0xc0
[   13.475311]  ? __pfx_kthread+0x10/0x10
[   13.475331]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.475352]  ? calculate_sigpending+0x7b/0xa0
[   13.475375]  ? __pfx_kthread+0x10/0x10
[   13.475397]  ret_from_fork+0x116/0x1d0
[   13.475416]  ? __pfx_kthread+0x10/0x10
[   13.475619]  ret_from_fork_asm+0x1a/0x30
[   13.475655]  </TASK>
[   13.475667] 
[   13.484463] Allocated by task 287:
[   13.484588]  kasan_save_stack+0x45/0x70
[   13.484869]  kasan_save_track+0x18/0x40
[   13.485224]  kasan_save_alloc_info+0x3b/0x50
[   13.485449]  __kasan_kmalloc+0xb7/0xc0
[   13.485732]  __kmalloc_cache_noprof+0x189/0x420
[   13.485958]  kasan_bitops_generic+0x92/0x1c0
[   13.486167]  kunit_try_run_case+0x1a5/0x480
[   13.486477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.486750]  kthread+0x337/0x6f0
[   13.486934]  ret_from_fork+0x116/0x1d0
[   13.487108]  ret_from_fork_asm+0x1a/0x30
[   13.487311] 
[   13.487411] The buggy address belongs to the object at ffff8881028596c0
[   13.487411]  which belongs to the cache kmalloc-16 of size 16
[   13.488110] The buggy address is located 8 bytes inside of
[   13.488110]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.488501] 
[   13.488567] The buggy address belongs to the physical page:
[   13.488818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.489161] flags: 0x200000000000000(node=0|zone=2)
[   13.489395] page_type: f5(slab)
[   13.489540] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.489793] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.490012] page dumped because: kasan: bad access detected
[   13.490176] 
[   13.490371] Memory state around the buggy address:
[   13.490596]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.490909]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.491261] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.491787]                                               ^
[   13.492059]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.492347]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.492788] ==================================================================
[   13.493323] ==================================================================
[   13.493647] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.494092] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.494412] 
[   13.494537] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.494584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.494596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.494616] Call Trace:
[   13.494630]  <TASK>
[   13.494644]  dump_stack_lvl+0x73/0xb0
[   13.494670]  print_report+0xd1/0x650
[   13.494692]  ? __virt_addr_valid+0x1db/0x2d0
[   13.494715]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.494741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.494834]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.494862]  kasan_report+0x141/0x180
[   13.494883]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.494914]  kasan_check_range+0x10c/0x1c0
[   13.494937]  __kasan_check_write+0x18/0x20
[   13.494960]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.494985]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.495032]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.495055]  ? trace_hardirqs_on+0x37/0xe0
[   13.495075]  ? kasan_bitops_generic+0x92/0x1c0
[   13.495100]  kasan_bitops_generic+0x121/0x1c0
[   13.495122]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.495145]  ? __pfx_read_tsc+0x10/0x10
[   13.495181]  ? ktime_get_ts64+0x86/0x230
[   13.495213]  kunit_try_run_case+0x1a5/0x480
[   13.495235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.495256]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.495277]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.495299]  ? __kthread_parkme+0x82/0x180
[   13.495320]  ? preempt_count_sub+0x50/0x80
[   13.495342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.495364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.495386]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.495408]  kthread+0x337/0x6f0
[   13.495426]  ? trace_preempt_on+0x20/0xc0
[   13.495447]  ? __pfx_kthread+0x10/0x10
[   13.495466]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.495486]  ? calculate_sigpending+0x7b/0xa0
[   13.495509]  ? __pfx_kthread+0x10/0x10
[   13.495529]  ret_from_fork+0x116/0x1d0
[   13.495548]  ? __pfx_kthread+0x10/0x10
[   13.495568]  ret_from_fork_asm+0x1a/0x30
[   13.495597]  </TASK>
[   13.495607] 
[   13.504963] Allocated by task 287:
[   13.505140]  kasan_save_stack+0x45/0x70
[   13.505382]  kasan_save_track+0x18/0x40
[   13.505553]  kasan_save_alloc_info+0x3b/0x50
[   13.505694]  __kasan_kmalloc+0xb7/0xc0
[   13.505851]  __kmalloc_cache_noprof+0x189/0x420
[   13.506063]  kasan_bitops_generic+0x92/0x1c0
[   13.506275]  kunit_try_run_case+0x1a5/0x480
[   13.506457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.506624]  kthread+0x337/0x6f0
[   13.506737]  ret_from_fork+0x116/0x1d0
[   13.507078]  ret_from_fork_asm+0x1a/0x30
[   13.507401] 
[   13.507601] The buggy address belongs to the object at ffff8881028596c0
[   13.507601]  which belongs to the cache kmalloc-16 of size 16
[   13.508091] The buggy address is located 8 bytes inside of
[   13.508091]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.508505] 
[   13.508569] The buggy address belongs to the physical page:
[   13.508739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.509306] flags: 0x200000000000000(node=0|zone=2)
[   13.509764] page_type: f5(slab)
[   13.509954] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.510317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.510701] page dumped because: kasan: bad access detected
[   13.510867] 
[   13.510932] Memory state around the buggy address:
[   13.511114]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.511595]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.511887] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.512096]                                               ^
[   13.512539]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.512889]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.513138] ==================================================================
[   13.353680] ==================================================================
[   13.354599] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.354981] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287
[   13.355251] 
[   13.355355] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.355400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.355412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.355432] Call Trace:
[   13.355448]  <TASK>
[   13.355463]  dump_stack_lvl+0x73/0xb0
[   13.355487]  print_report+0xd1/0x650
[   13.355507]  ? __virt_addr_valid+0x1db/0x2d0
[   13.355528]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.355553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.355578]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.355605]  kasan_report+0x141/0x180
[   13.355625]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.355655]  kasan_check_range+0x10c/0x1c0
[   13.355678]  __kasan_check_write+0x18/0x20
[   13.355699]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.355725]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.355753]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.355776]  ? trace_hardirqs_on+0x37/0xe0
[   13.355798]  ? kasan_bitops_generic+0x92/0x1c0
[   13.355822]  kasan_bitops_generic+0x121/0x1c0
[   13.355845]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.355868]  ? __pfx_read_tsc+0x10/0x10
[   13.355888]  ? ktime_get_ts64+0x86/0x230
[   13.355912]  kunit_try_run_case+0x1a5/0x480
[   13.355935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.355956]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.355977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.355998]  ? __kthread_parkme+0x82/0x180
[   13.356018]  ? preempt_count_sub+0x50/0x80
[   13.356040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.356063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.356085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.356106]  kthread+0x337/0x6f0
[   13.356125]  ? trace_preempt_on+0x20/0xc0
[   13.356145]  ? __pfx_kthread+0x10/0x10
[   13.356165]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.356185]  ? calculate_sigpending+0x7b/0xa0
[   13.356226]  ? __pfx_kthread+0x10/0x10
[   13.356247]  ret_from_fork+0x116/0x1d0
[   13.356266]  ? __pfx_kthread+0x10/0x10
[   13.356296]  ret_from_fork_asm+0x1a/0x30
[   13.356325]  </TASK>
[   13.356335] 
[   13.365619] Allocated by task 287:
[   13.365819]  kasan_save_stack+0x45/0x70
[   13.365967]  kasan_save_track+0x18/0x40
[   13.366149]  kasan_save_alloc_info+0x3b/0x50
[   13.366391]  __kasan_kmalloc+0xb7/0xc0
[   13.366572]  __kmalloc_cache_noprof+0x189/0x420
[   13.366826]  kasan_bitops_generic+0x92/0x1c0
[   13.367059]  kunit_try_run_case+0x1a5/0x480
[   13.367377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.367725]  kthread+0x337/0x6f0
[   13.367848]  ret_from_fork+0x116/0x1d0
[   13.367973]  ret_from_fork_asm+0x1a/0x30
[   13.368103] 
[   13.368166] The buggy address belongs to the object at ffff8881028596c0
[   13.368166]  which belongs to the cache kmalloc-16 of size 16
[   13.368774] The buggy address is located 8 bytes inside of
[   13.368774]  allocated 9-byte region [ffff8881028596c0, ffff8881028596c9)
[   13.369277] 
[   13.369343] The buggy address belongs to the physical page:
[   13.369510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859
[   13.370335] flags: 0x200000000000000(node=0|zone=2)
[   13.370795] page_type: f5(slab)
[   13.370974] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   13.371319] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.371741] page dumped because: kasan: bad access detected
[   13.371985] 
[   13.372088] Memory state around the buggy address:
[   13.372312]  ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.372676]  ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.372889] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.373125]                                               ^
[   13.373385]  ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.373691]  ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.374316] ==================================================================