Hay
Date
June 20, 2025, 12:38 p.m.

Environment
qemu-x86_64

[   28.143278] ==================================================================
[   28.144829] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   28.145274] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.145799] 
[   28.146010] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.146125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.146153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.146198] Call Trace:
[   28.146241]  <TASK>
[   28.146285]  dump_stack_lvl+0x73/0xb0
[   28.146355]  print_report+0xd1/0x650
[   28.146409]  ? __virt_addr_valid+0x1db/0x2d0
[   28.146476]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   28.146535]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.146594]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   28.146651]  kasan_report+0x141/0x180
[   28.146701]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   28.146771]  kasan_check_range+0x10c/0x1c0
[   28.146824]  __kasan_check_write+0x18/0x20
[   28.146878]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   28.146935]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.146996]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.147051]  ? trace_hardirqs_on+0x37/0xe0
[   28.147098]  ? kasan_bitops_generic+0x92/0x1c0
[   28.147161]  kasan_bitops_generic+0x116/0x1c0
[   28.147213]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.147271]  ? __pfx_read_tsc+0x10/0x10
[   28.147320]  ? ktime_get_ts64+0x86/0x230
[   28.147379]  kunit_try_run_case+0x1a5/0x480
[   28.147447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.147491]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.147535]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.147583]  ? __kthread_parkme+0x82/0x180
[   28.147629]  ? preempt_count_sub+0x50/0x80
[   28.147681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.147734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.147785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.147836]  kthread+0x337/0x6f0
[   28.147878]  ? trace_preempt_on+0x20/0xc0
[   28.147927]  ? __pfx_kthread+0x10/0x10
[   28.147972]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.148019]  ? calculate_sigpending+0x7b/0xa0
[   28.148073]  ? __pfx_kthread+0x10/0x10
[   28.148120]  ret_from_fork+0x116/0x1d0
[   28.148162]  ? __pfx_kthread+0x10/0x10
[   28.148207]  ret_from_fork_asm+0x1a/0x30
[   28.148276]  </TASK>
[   28.148303] 
[   28.161907] Allocated by task 290:
[   28.162142]  kasan_save_stack+0x45/0x70
[   28.162515]  kasan_save_track+0x18/0x40
[   28.162827]  kasan_save_alloc_info+0x3b/0x50
[   28.163185]  __kasan_kmalloc+0xb7/0xc0
[   28.163379]  __kmalloc_cache_noprof+0x189/0x420
[   28.163581]  kasan_bitops_generic+0x92/0x1c0
[   28.163768]  kunit_try_run_case+0x1a5/0x480
[   28.163953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.164182]  kthread+0x337/0x6f0
[   28.164488]  ret_from_fork+0x116/0x1d0
[   28.164916]  ret_from_fork_asm+0x1a/0x30
[   28.165244] 
[   28.165470] The buggy address belongs to the object at ffff8881022cf740
[   28.165470]  which belongs to the cache kmalloc-16 of size 16
[   28.166387] The buggy address is located 8 bytes inside of
[   28.166387]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.167061] 
[   28.167202] The buggy address belongs to the physical page:
[   28.167571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.167950] flags: 0x200000000000000(node=0|zone=2)
[   28.168187] page_type: f5(slab)
[   28.168487] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.169040] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.169598] page dumped because: kasan: bad access detected
[   28.169810] 
[   28.169910] Memory state around the buggy address:
[   28.170121]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.170382]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.170653] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.170909]                                               ^
[   28.171125]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.171384]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.171937] ==================================================================
[   28.062410] ==================================================================
[   28.063208] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   28.063935] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.064526] 
[   28.064757] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.064871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.064901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.064954] Call Trace:
[   28.064998]  <TASK>
[   28.065042]  dump_stack_lvl+0x73/0xb0
[   28.065109]  print_report+0xd1/0x650
[   28.065163]  ? __virt_addr_valid+0x1db/0x2d0
[   28.065207]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   28.065263]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.065323]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   28.065381]  kasan_report+0x141/0x180
[   28.065433]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   28.065587]  kasan_check_range+0x10c/0x1c0
[   28.065643]  __kasan_check_write+0x18/0x20
[   28.065697]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   28.065754]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.065811]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.065868]  ? trace_hardirqs_on+0x37/0xe0
[   28.065919]  ? kasan_bitops_generic+0x92/0x1c0
[   28.065981]  kasan_bitops_generic+0x116/0x1c0
[   28.066047]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.066103]  ? __pfx_read_tsc+0x10/0x10
[   28.066154]  ? ktime_get_ts64+0x86/0x230
[   28.066217]  kunit_try_run_case+0x1a5/0x480
[   28.066277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.066328]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.066380]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.066433]  ? __kthread_parkme+0x82/0x180
[   28.066485]  ? preempt_count_sub+0x50/0x80
[   28.066526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.066567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.066609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.066649]  kthread+0x337/0x6f0
[   28.066680]  ? trace_preempt_on+0x20/0xc0
[   28.066718]  ? __pfx_kthread+0x10/0x10
[   28.066751]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.066787]  ? calculate_sigpending+0x7b/0xa0
[   28.066833]  ? __pfx_kthread+0x10/0x10
[   28.066873]  ret_from_fork+0x116/0x1d0
[   28.066910]  ? __pfx_kthread+0x10/0x10
[   28.066949]  ret_from_fork_asm+0x1a/0x30
[   28.067017]  </TASK>
[   28.067044] 
[   28.077469] Allocated by task 290:
[   28.077799]  kasan_save_stack+0x45/0x70
[   28.078090]  kasan_save_track+0x18/0x40
[   28.078428]  kasan_save_alloc_info+0x3b/0x50
[   28.078645]  __kasan_kmalloc+0xb7/0xc0
[   28.078817]  __kmalloc_cache_noprof+0x189/0x420
[   28.079024]  kasan_bitops_generic+0x92/0x1c0
[   28.079331]  kunit_try_run_case+0x1a5/0x480
[   28.079681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.080109]  kthread+0x337/0x6f0
[   28.080310]  ret_from_fork+0x116/0x1d0
[   28.080533]  ret_from_fork_asm+0x1a/0x30
[   28.080718] 
[   28.080821] The buggy address belongs to the object at ffff8881022cf740
[   28.080821]  which belongs to the cache kmalloc-16 of size 16
[   28.081392] The buggy address is located 8 bytes inside of
[   28.081392]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.082279] 
[   28.082465] The buggy address belongs to the physical page:
[   28.082768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.083066] flags: 0x200000000000000(node=0|zone=2)
[   28.083594] page_type: f5(slab)
[   28.083876] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.084253] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.084514] page dumped because: kasan: bad access detected
[   28.084724] 
[   28.084818] Memory state around the buggy address:
[   28.085016]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.085508]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.086276] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.086817]                                               ^
[   28.087225]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.087729]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.088095] ==================================================================
[   28.036449] ==================================================================
[   28.037050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   28.037510] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.038086] 
[   28.038411] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.038533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.038580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.038626] Call Trace:
[   28.038667]  <TASK>
[   28.038702]  dump_stack_lvl+0x73/0xb0
[   28.038757]  print_report+0xd1/0x650
[   28.038792]  ? __virt_addr_valid+0x1db/0x2d0
[   28.038831]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   28.038867]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.038912]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   28.038954]  kasan_report+0x141/0x180
[   28.038988]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   28.039032]  kasan_check_range+0x10c/0x1c0
[   28.039067]  __kasan_check_write+0x18/0x20
[   28.039102]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   28.039141]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.039228]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.039277]  ? trace_hardirqs_on+0x37/0xe0
[   28.039326]  ? kasan_bitops_generic+0x92/0x1c0
[   28.039389]  kasan_bitops_generic+0x116/0x1c0
[   28.039436]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.039497]  ? __pfx_read_tsc+0x10/0x10
[   28.039540]  ? ktime_get_ts64+0x86/0x230
[   28.039626]  kunit_try_run_case+0x1a5/0x480
[   28.039695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.039747]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.039811]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.039873]  ? __kthread_parkme+0x82/0x180
[   28.039931]  ? preempt_count_sub+0x50/0x80
[   28.039982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.040046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.040098]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.040210]  kthread+0x337/0x6f0
[   28.040269]  ? trace_preempt_on+0x20/0xc0
[   28.040312]  ? __pfx_kthread+0x10/0x10
[   28.040351]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.040390]  ? calculate_sigpending+0x7b/0xa0
[   28.040449]  ? __pfx_kthread+0x10/0x10
[   28.040500]  ret_from_fork+0x116/0x1d0
[   28.040546]  ? __pfx_kthread+0x10/0x10
[   28.040595]  ret_from_fork_asm+0x1a/0x30
[   28.040664]  </TASK>
[   28.040692] 
[   28.050878] Allocated by task 290:
[   28.051229]  kasan_save_stack+0x45/0x70
[   28.051673]  kasan_save_track+0x18/0x40
[   28.051984]  kasan_save_alloc_info+0x3b/0x50
[   28.052255]  __kasan_kmalloc+0xb7/0xc0
[   28.052467]  __kmalloc_cache_noprof+0x189/0x420
[   28.052710]  kasan_bitops_generic+0x92/0x1c0
[   28.052932]  kunit_try_run_case+0x1a5/0x480
[   28.053178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.053450]  kthread+0x337/0x6f0
[   28.053721]  ret_from_fork+0x116/0x1d0
[   28.054044]  ret_from_fork_asm+0x1a/0x30
[   28.054420] 
[   28.054634] The buggy address belongs to the object at ffff8881022cf740
[   28.054634]  which belongs to the cache kmalloc-16 of size 16
[   28.055482] The buggy address is located 8 bytes inside of
[   28.055482]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.056379] 
[   28.056498] The buggy address belongs to the physical page:
[   28.056716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.056993] flags: 0x200000000000000(node=0|zone=2)
[   28.057238] page_type: f5(slab)
[   28.057599] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.058340] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.059010] page dumped because: kasan: bad access detected
[   28.059426] 
[   28.059577] Memory state around the buggy address:
[   28.059892]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.060271]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.060586] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.060841]                                               ^
[   28.061054]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.061311]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.061571] ==================================================================
[   28.007816] ==================================================================
[   28.008325] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   28.008666] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.009900] 
[   28.010132] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.010399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.010452] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.010563] Call Trace:
[   28.010595]  <TASK>
[   28.010621]  dump_stack_lvl+0x73/0xb0
[   28.010669]  print_report+0xd1/0x650
[   28.010695]  ? __virt_addr_valid+0x1db/0x2d0
[   28.010723]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   28.010752]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.010781]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   28.010809]  kasan_report+0x141/0x180
[   28.010832]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   28.010864]  kasan_check_range+0x10c/0x1c0
[   28.010891]  __kasan_check_write+0x18/0x20
[   28.010915]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   28.010943]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.010973]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.010999]  ? trace_hardirqs_on+0x37/0xe0
[   28.011024]  ? kasan_bitops_generic+0x92/0x1c0
[   28.011054]  kasan_bitops_generic+0x116/0x1c0
[   28.011079]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.011106]  ? __pfx_read_tsc+0x10/0x10
[   28.011129]  ? ktime_get_ts64+0x86/0x230
[   28.011189]  kunit_try_run_case+0x1a5/0x480
[   28.011223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.011247]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.011273]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.011298]  ? __kthread_parkme+0x82/0x180
[   28.011321]  ? preempt_count_sub+0x50/0x80
[   28.011347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.011373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.011397]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.011422]  kthread+0x337/0x6f0
[   28.011462]  ? trace_preempt_on+0x20/0xc0
[   28.011490]  ? __pfx_kthread+0x10/0x10
[   28.011512]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.011534]  ? calculate_sigpending+0x7b/0xa0
[   28.011561]  ? __pfx_kthread+0x10/0x10
[   28.011584]  ret_from_fork+0x116/0x1d0
[   28.011604]  ? __pfx_kthread+0x10/0x10
[   28.011626]  ret_from_fork_asm+0x1a/0x30
[   28.011658]  </TASK>
[   28.011672] 
[   28.022592] Allocated by task 290:
[   28.022790]  kasan_save_stack+0x45/0x70
[   28.023220]  kasan_save_track+0x18/0x40
[   28.023593]  kasan_save_alloc_info+0x3b/0x50
[   28.023987]  __kasan_kmalloc+0xb7/0xc0
[   28.024344]  __kmalloc_cache_noprof+0x189/0x420
[   28.024744]  kasan_bitops_generic+0x92/0x1c0
[   28.025116]  kunit_try_run_case+0x1a5/0x480
[   28.025533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.025786]  kthread+0x337/0x6f0
[   28.025963]  ret_from_fork+0x116/0x1d0
[   28.026182]  ret_from_fork_asm+0x1a/0x30
[   28.026373] 
[   28.026556] The buggy address belongs to the object at ffff8881022cf740
[   28.026556]  which belongs to the cache kmalloc-16 of size 16
[   28.027465] The buggy address is located 8 bytes inside of
[   28.027465]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.028367] 
[   28.028571] The buggy address belongs to the physical page:
[   28.028869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.029203] flags: 0x200000000000000(node=0|zone=2)
[   28.029589] page_type: f5(slab)
[   28.029894] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.030539] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.031133] page dumped because: kasan: bad access detected
[   28.031495] 
[   28.031597] Memory state around the buggy address:
[   28.031924]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.032508]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.032815] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.033106]                                               ^
[   28.033545]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.034031]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.034574] ==================================================================
[   28.174293] ==================================================================
[   28.175083] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   28.175746] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.176310] 
[   28.176535] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.176643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.176674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.176723] Call Trace:
[   28.176764]  <TASK>
[   28.176808]  dump_stack_lvl+0x73/0xb0
[   28.176872]  print_report+0xd1/0x650
[   28.176920]  ? __virt_addr_valid+0x1db/0x2d0
[   28.176976]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   28.177033]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.177088]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   28.177145]  kasan_report+0x141/0x180
[   28.177189]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   28.177248]  kasan_check_range+0x10c/0x1c0
[   28.177302]  __kasan_check_write+0x18/0x20
[   28.177357]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   28.177416]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.177487]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.177534]  ? trace_hardirqs_on+0x37/0xe0
[   28.177584]  ? kasan_bitops_generic+0x92/0x1c0
[   28.177644]  kasan_bitops_generic+0x116/0x1c0
[   28.177699]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.177756]  ? __pfx_read_tsc+0x10/0x10
[   28.177805]  ? ktime_get_ts64+0x86/0x230
[   28.177867]  kunit_try_run_case+0x1a5/0x480
[   28.177923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.177976]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.178040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.178093]  ? __kthread_parkme+0x82/0x180
[   28.178146]  ? preempt_count_sub+0x50/0x80
[   28.178191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.178240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.178290]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.178340]  kthread+0x337/0x6f0
[   28.178384]  ? trace_preempt_on+0x20/0xc0
[   28.178436]  ? __pfx_kthread+0x10/0x10
[   28.178496]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.178544]  ? calculate_sigpending+0x7b/0xa0
[   28.178599]  ? __pfx_kthread+0x10/0x10
[   28.178652]  ret_from_fork+0x116/0x1d0
[   28.178697]  ? __pfx_kthread+0x10/0x10
[   28.178746]  ret_from_fork_asm+0x1a/0x30
[   28.178819]  </TASK>
[   28.178846] 
[   28.192421] Allocated by task 290:
[   28.192817]  kasan_save_stack+0x45/0x70
[   28.193216]  kasan_save_track+0x18/0x40
[   28.193519]  kasan_save_alloc_info+0x3b/0x50
[   28.193889]  __kasan_kmalloc+0xb7/0xc0
[   28.194092]  __kmalloc_cache_noprof+0x189/0x420
[   28.196859]  kasan_bitops_generic+0x92/0x1c0
[   28.197388]  kunit_try_run_case+0x1a5/0x480
[   28.197603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.197822]  kthread+0x337/0x6f0
[   28.197990]  ret_from_fork+0x116/0x1d0
[   28.199027]  ret_from_fork_asm+0x1a/0x30
[   28.199753] 
[   28.200210] The buggy address belongs to the object at ffff8881022cf740
[   28.200210]  which belongs to the cache kmalloc-16 of size 16
[   28.201397] The buggy address is located 8 bytes inside of
[   28.201397]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.202359] 
[   28.203249] The buggy address belongs to the physical page:
[   28.203802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.204251] flags: 0x200000000000000(node=0|zone=2)
[   28.204561] page_type: f5(slab)
[   28.204842] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.205283] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.205728] page dumped because: kasan: bad access detected
[   28.206035] 
[   28.206212] Memory state around the buggy address:
[   28.206589]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.206914]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.207549] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.207898]                                               ^
[   28.208155]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.208696]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.209139] ==================================================================
[   28.115111] ==================================================================
[   28.115770] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   28.116477] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.116945] 
[   28.117094] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.117194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.117217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.117260] Call Trace:
[   28.117300]  <TASK>
[   28.117339]  dump_stack_lvl+0x73/0xb0
[   28.117407]  print_report+0xd1/0x650
[   28.117462]  ? __virt_addr_valid+0x1db/0x2d0
[   28.117513]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   28.117570]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.117629]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   28.117686]  kasan_report+0x141/0x180
[   28.117735]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   28.117803]  kasan_check_range+0x10c/0x1c0
[   28.117858]  __kasan_check_write+0x18/0x20
[   28.117911]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   28.117972]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.118042]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.118101]  ? trace_hardirqs_on+0x37/0xe0
[   28.118154]  ? kasan_bitops_generic+0x92/0x1c0
[   28.118215]  kasan_bitops_generic+0x116/0x1c0
[   28.118268]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.118325]  ? __pfx_read_tsc+0x10/0x10
[   28.118373]  ? ktime_get_ts64+0x86/0x230
[   28.118430]  kunit_try_run_case+0x1a5/0x480
[   28.118486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.118519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.118554]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.118587]  ? __kthread_parkme+0x82/0x180
[   28.118617]  ? preempt_count_sub+0x50/0x80
[   28.118652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.118687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.118724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.118764]  kthread+0x337/0x6f0
[   28.118797]  ? trace_preempt_on+0x20/0xc0
[   28.118842]  ? __pfx_kthread+0x10/0x10
[   28.118885]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.118929]  ? calculate_sigpending+0x7b/0xa0
[   28.118982]  ? __pfx_kthread+0x10/0x10
[   28.119029]  ret_from_fork+0x116/0x1d0
[   28.119073]  ? __pfx_kthread+0x10/0x10
[   28.119121]  ret_from_fork_asm+0x1a/0x30
[   28.119194]  </TASK>
[   28.119222] 
[   28.131053] Allocated by task 290:
[   28.131418]  kasan_save_stack+0x45/0x70
[   28.131799]  kasan_save_track+0x18/0x40
[   28.132106]  kasan_save_alloc_info+0x3b/0x50
[   28.132462]  __kasan_kmalloc+0xb7/0xc0
[   28.132644]  __kmalloc_cache_noprof+0x189/0x420
[   28.132849]  kasan_bitops_generic+0x92/0x1c0
[   28.133043]  kunit_try_run_case+0x1a5/0x480
[   28.133234]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.133464]  kthread+0x337/0x6f0
[   28.133634]  ret_from_fork+0x116/0x1d0
[   28.133811]  ret_from_fork_asm+0x1a/0x30
[   28.133987] 
[   28.134105] The buggy address belongs to the object at ffff8881022cf740
[   28.134105]  which belongs to the cache kmalloc-16 of size 16
[   28.134611] The buggy address is located 8 bytes inside of
[   28.134611]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.135453] 
[   28.135677] The buggy address belongs to the physical page:
[   28.136099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.136663] flags: 0x200000000000000(node=0|zone=2)
[   28.137020] page_type: f5(slab)
[   28.137305] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.137834] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.138500] page dumped because: kasan: bad access detected
[   28.138893] 
[   28.139059] Memory state around the buggy address:
[   28.139521]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.139837]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.140124] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.140591]                                               ^
[   28.140861]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.141119]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.141646] ==================================================================
[   28.089596] ==================================================================
[   28.089915] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   28.090597] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   28.090980] 
[   28.091129] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.091227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.091256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.091306] Call Trace:
[   28.091350]  <TASK>
[   28.091392]  dump_stack_lvl+0x73/0xb0
[   28.091466]  print_report+0xd1/0x650
[   28.091510]  ? __virt_addr_valid+0x1db/0x2d0
[   28.091558]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   28.091605]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.091650]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   28.091689]  kasan_report+0x141/0x180
[   28.091725]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   28.091776]  kasan_check_range+0x10c/0x1c0
[   28.091820]  __kasan_check_write+0x18/0x20
[   28.091866]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   28.091913]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.091966]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.092017]  ? trace_hardirqs_on+0x37/0xe0
[   28.092064]  ? kasan_bitops_generic+0x92/0x1c0
[   28.092126]  kasan_bitops_generic+0x116/0x1c0
[   28.092170]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.092217]  ? __pfx_read_tsc+0x10/0x10
[   28.092264]  ? ktime_get_ts64+0x86/0x230
[   28.092315]  kunit_try_run_case+0x1a5/0x480
[   28.092360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.092404]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.092467]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.092513]  ? __kthread_parkme+0x82/0x180
[   28.092558]  ? preempt_count_sub+0x50/0x80
[   28.092606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.092656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.092712]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.092764]  kthread+0x337/0x6f0
[   28.092812]  ? trace_preempt_on+0x20/0xc0
[   28.092863]  ? __pfx_kthread+0x10/0x10
[   28.092913]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.092961]  ? calculate_sigpending+0x7b/0xa0
[   28.093016]  ? __pfx_kthread+0x10/0x10
[   28.093066]  ret_from_fork+0x116/0x1d0
[   28.093112]  ? __pfx_kthread+0x10/0x10
[   28.093157]  ret_from_fork_asm+0x1a/0x30
[   28.093231]  </TASK>
[   28.093259] 
[   28.102940] Allocated by task 290:
[   28.103147]  kasan_save_stack+0x45/0x70
[   28.103515]  kasan_save_track+0x18/0x40
[   28.103948]  kasan_save_alloc_info+0x3b/0x50
[   28.104354]  __kasan_kmalloc+0xb7/0xc0
[   28.104671]  __kmalloc_cache_noprof+0x189/0x420
[   28.105033]  kasan_bitops_generic+0x92/0x1c0
[   28.105504]  kunit_try_run_case+0x1a5/0x480
[   28.105743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.106068]  kthread+0x337/0x6f0
[   28.106423]  ret_from_fork+0x116/0x1d0
[   28.106650]  ret_from_fork_asm+0x1a/0x30
[   28.106903] 
[   28.107009] The buggy address belongs to the object at ffff8881022cf740
[   28.107009]  which belongs to the cache kmalloc-16 of size 16
[   28.107881] The buggy address is located 8 bytes inside of
[   28.107881]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   28.108575] 
[   28.108753] The buggy address belongs to the physical page:
[   28.109021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   28.109673] flags: 0x200000000000000(node=0|zone=2)
[   28.109924] page_type: f5(slab)
[   28.110142] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.110547] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.111050] page dumped because: kasan: bad access detected
[   28.111242] 
[   28.111336] Memory state around the buggy address:
[   28.111537]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.111787]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.112048] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.112302]                                               ^
[   28.112607]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.113146]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.113740] ==================================================================
[   27.971414] ==================================================================
[   27.972002] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.972375] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290
[   27.972951] 
[   27.973167] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   27.973280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.973338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.973381] Call Trace:
[   27.973409]  <TASK>
[   27.973455]  dump_stack_lvl+0x73/0xb0
[   27.973534]  print_report+0xd1/0x650
[   27.973602]  ? __virt_addr_valid+0x1db/0x2d0
[   27.973647]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.973698]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.973747]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.973798]  kasan_report+0x141/0x180
[   27.973846]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.973904]  kasan_check_range+0x10c/0x1c0
[   27.973946]  __kasan_check_write+0x18/0x20
[   27.973989]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.974048]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.974106]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.974193]  ? trace_hardirqs_on+0x37/0xe0
[   27.974247]  ? kasan_bitops_generic+0x92/0x1c0
[   27.974294]  kasan_bitops_generic+0x116/0x1c0
[   27.974341]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.974398]  ? __pfx_read_tsc+0x10/0x10
[   27.974457]  ? ktime_get_ts64+0x86/0x230
[   27.974519]  kunit_try_run_case+0x1a5/0x480
[   27.974575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.974613]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.974654]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.974691]  ? __kthread_parkme+0x82/0x180
[   27.974725]  ? preempt_count_sub+0x50/0x80
[   27.974764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.974805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.974842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.974883]  kthread+0x337/0x6f0
[   27.974916]  ? trace_preempt_on+0x20/0xc0
[   27.974956]  ? __pfx_kthread+0x10/0x10
[   27.975001]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.975043]  ? calculate_sigpending+0x7b/0xa0
[   27.975084]  ? __pfx_kthread+0x10/0x10
[   27.975125]  ret_from_fork+0x116/0x1d0
[   27.975203]  ? __pfx_kthread+0x10/0x10
[   27.975253]  ret_from_fork_asm+0x1a/0x30
[   27.975317]  </TASK>
[   27.975338] 
[   27.990220] Allocated by task 290:
[   27.990611]  kasan_save_stack+0x45/0x70
[   27.990990]  kasan_save_track+0x18/0x40
[   27.991498]  kasan_save_alloc_info+0x3b/0x50
[   27.992016]  __kasan_kmalloc+0xb7/0xc0
[   27.992394]  __kmalloc_cache_noprof+0x189/0x420
[   27.992864]  kasan_bitops_generic+0x92/0x1c0
[   27.993079]  kunit_try_run_case+0x1a5/0x480
[   27.993466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.994438]  kthread+0x337/0x6f0
[   27.994900]  ret_from_fork+0x116/0x1d0
[   27.995138]  ret_from_fork_asm+0x1a/0x30
[   27.995469] 
[   27.995771] The buggy address belongs to the object at ffff8881022cf740
[   27.995771]  which belongs to the cache kmalloc-16 of size 16
[   27.996587] The buggy address is located 8 bytes inside of
[   27.996587]  allocated 9-byte region [ffff8881022cf740, ffff8881022cf749)
[   27.997086] 
[   27.997205] The buggy address belongs to the physical page:
[   27.998222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf
[   27.999029] flags: 0x200000000000000(node=0|zone=2)
[   27.999496] page_type: f5(slab)
[   27.999846] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.000456] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.000869] page dumped because: kasan: bad access detected
[   28.001450] 
[   28.001561] Memory state around the buggy address:
[   28.002098]  ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.003168]  ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.003532] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   28.003749]                                               ^
[   28.004179]  ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.005089]  ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.005706] ==================================================================