Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   35.076677] ==================================================================
[   35.076753] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   35.076893] Read of size 8 at addr fff00000c57889e8 by task kunit_try_catch/292
[   35.077126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.077321]  dump_stack_lvl+0x8c/0xd0
[   35.077731]  kasan_bitops_generic+0x11c/0x1c8
[   35.077926]  kthread+0x328/0x630
[   35.078401]  kasan_save_stack+0x3c/0x68
[   35.078648]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.079009]  kthread+0x328/0x630
[   35.079320] 
[   35.079826] page_type: f5(slab)
[   35.080368] 
[   35.080599]  fff00000c5788900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.081350] ==================================================================

[   25.654457] ==================================================================
[   25.654809] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.655177] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310
[   25.655603] 
[   25.655696] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.655747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.655760] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.655784] Call Trace:
[   25.655807]  <TASK>
[   25.655826]  dump_stack_lvl+0x73/0xb0
[   25.655857]  print_report+0xd1/0x650
[   25.655880]  ? __virt_addr_valid+0x1db/0x2d0
[   25.655905]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.655931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.655958]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.655985]  kasan_report+0x141/0x180
[   25.656007]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.656038]  kasan_check_range+0x10c/0x1c0
[   25.656073]  __kasan_check_write+0x18/0x20
[   25.656100]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.656128]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.656156]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.656181]  ? trace_hardirqs_on+0x37/0xe0
[   25.656204]  ? kasan_bitops_generic+0x92/0x1c0
[   25.656231]  kasan_bitops_generic+0x121/0x1c0
[   25.656254]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.656279]  ? __pfx_read_tsc+0x10/0x10
[   25.656302]  ? ktime_get_ts64+0x86/0x230
[   25.656329]  kunit_try_run_case+0x1a5/0x480
[   25.656355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.656379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.656413]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.656436]  ? __kthread_parkme+0x82/0x180
[   25.656456]  ? preempt_count_sub+0x50/0x80
[   25.656480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.656505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.656530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.656554]  kthread+0x337/0x6f0
[   25.656574]  ? trace_preempt_on+0x20/0xc0
[   25.656596]  ? __pfx_kthread+0x10/0x10
[   25.656617]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.656641]  ? calculate_sigpending+0x7b/0xa0
[   25.656664]  ? __pfx_kthread+0x10/0x10
[   25.656686]  ret_from_fork+0x116/0x1d0
[   25.656706]  ? __pfx_kthread+0x10/0x10
[   25.656727]  ret_from_fork_asm+0x1a/0x30
[   25.656759]  </TASK>
[   25.656771] 
[   25.665853] Allocated by task 310:
[   25.666413]  kasan_save_stack+0x45/0x70
[   25.666643]  kasan_save_track+0x18/0x40
[   25.666836]  kasan_save_alloc_info+0x3b/0x50
[   25.667258]  __kasan_kmalloc+0xb7/0xc0
[   25.667454]  __kmalloc_cache_noprof+0x189/0x420
[   25.667672]  kasan_bitops_generic+0x92/0x1c0
[   25.667876]  kunit_try_run_case+0x1a5/0x480
[   25.668089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.668402]  kthread+0x337/0x6f0
[   25.668528]  ret_from_fork+0x116/0x1d0
[   25.668700]  ret_from_fork_asm+0x1a/0x30
[   25.668890] 
[   25.668976] The buggy address belongs to the object at ffff8881049ad5c0
[   25.668976]  which belongs to the cache kmalloc-16 of size 16
[   25.669387] The buggy address is located 8 bytes inside of
[   25.669387]  allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9)
[   25.669730] 
[   25.669868] The buggy address belongs to the physical page:
[   25.670174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad
[   25.670511] flags: 0x200000000000000(node=0|zone=2)
[   25.670742] page_type: f5(slab)
[   25.670917] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   25.671620] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.671964] page dumped because: kasan: bad access detected
[   25.672155] 
[   25.672403] Memory state around the buggy address:
[   25.672642]  ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.672928]  ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.673292] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.673576]                                               ^
[   25.673750]  ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.673987]  ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.674666] ==================================================================
[   25.541928] ==================================================================
[   25.542311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.542799] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310
[   25.543196] 
[   25.543419] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.543490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.543504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.543527] Call Trace:
[   25.543550]  <TASK>
[   25.543739]  dump_stack_lvl+0x73/0xb0
[   25.543779]  print_report+0xd1/0x650
[   25.543804]  ? __virt_addr_valid+0x1db/0x2d0
[   25.543830]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.543856]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.543882]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.543909]  kasan_report+0x141/0x180
[   25.543930]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.543963]  kasan_check_range+0x10c/0x1c0
[   25.543986]  __kasan_check_write+0x18/0x20
[   25.544010]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.544037]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.544078]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.544105]  ? trace_hardirqs_on+0x37/0xe0
[   25.544131]  ? kasan_bitops_generic+0x92/0x1c0
[   25.544158]  kasan_bitops_generic+0x121/0x1c0
[   25.544191]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.544216]  ? __pfx_read_tsc+0x10/0x10
[   25.544239]  ? ktime_get_ts64+0x86/0x230
[   25.544274]  kunit_try_run_case+0x1a5/0x480
[   25.544301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.544326]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.544348]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.544371]  ? __kthread_parkme+0x82/0x180
[   25.544392]  ? preempt_count_sub+0x50/0x80
[   25.544416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.544441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.544465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.544551]  kthread+0x337/0x6f0
[   25.544573]  ? trace_preempt_on+0x20/0xc0
[   25.544595]  ? __pfx_kthread+0x10/0x10
[   25.544616]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.544641]  ? calculate_sigpending+0x7b/0xa0
[   25.544665]  ? __pfx_kthread+0x10/0x10
[   25.544686]  ret_from_fork+0x116/0x1d0
[   25.544707]  ? __pfx_kthread+0x10/0x10
[   25.544727]  ret_from_fork_asm+0x1a/0x30
[   25.544759]  </TASK>
[   25.544772] 
[   25.558632] Allocated by task 310:
[   25.558785]  kasan_save_stack+0x45/0x70
[   25.559096]  kasan_save_track+0x18/0x40
[   25.559660]  kasan_save_alloc_info+0x3b/0x50
[   25.560239]  __kasan_kmalloc+0xb7/0xc0
[   25.560699]  __kmalloc_cache_noprof+0x189/0x420
[   25.561252]  kasan_bitops_generic+0x92/0x1c0
[   25.561652]  kunit_try_run_case+0x1a5/0x480
[   25.561807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.562016]  kthread+0x337/0x6f0
[   25.562554]  ret_from_fork+0x116/0x1d0
[   25.563074]  ret_from_fork_asm+0x1a/0x30
[   25.563645] 
[   25.563902] The buggy address belongs to the object at ffff8881049ad5c0
[   25.563902]  which belongs to the cache kmalloc-16 of size 16
[   25.565027] The buggy address is located 8 bytes inside of
[   25.565027]  allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9)
[   25.566052] 
[   25.566362] The buggy address belongs to the physical page:
[   25.566916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad
[   25.567632] flags: 0x200000000000000(node=0|zone=2)
[   25.567800] page_type: f5(slab)
[   25.567918] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   25.568148] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.568402] page dumped because: kasan: bad access detected
[   25.568575] 
[   25.568994] Memory state around the buggy address:
[   25.569359]  ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.569628]  ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.569960] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.570182]                                               ^
[   25.570396]  ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.570774]  ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.571098] ==================================================================
[   25.571775] ==================================================================
[   25.572076] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.572715] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310
[   25.573141] 
[   25.573319] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.573375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.573390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.573416] Call Trace:
[   25.573438]  <TASK>
[   25.573460]  dump_stack_lvl+0x73/0xb0
[   25.573492]  print_report+0xd1/0x650
[   25.573515]  ? __virt_addr_valid+0x1db/0x2d0
[   25.573540]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.573567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.573593]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.573621]  kasan_report+0x141/0x180
[   25.573643]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.573673]  kasan_check_range+0x10c/0x1c0
[   25.573697]  __kasan_check_write+0x18/0x20
[   25.573720]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.573747]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.573775]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.573800]  ? trace_hardirqs_on+0x37/0xe0
[   25.573829]  ? kasan_bitops_generic+0x92/0x1c0
[   25.573855]  kasan_bitops_generic+0x121/0x1c0
[   25.573878]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.573903]  ? __pfx_read_tsc+0x10/0x10
[   25.573924]  ? ktime_get_ts64+0x86/0x230
[   25.573950]  kunit_try_run_case+0x1a5/0x480
[   25.573977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.573999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.574023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.574047]  ? __kthread_parkme+0x82/0x180
[   25.574080]  ? preempt_count_sub+0x50/0x80
[   25.574104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.574130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.574155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.574180]  kthread+0x337/0x6f0
[   25.574201]  ? trace_preempt_on+0x20/0xc0
[   25.574234]  ? __pfx_kthread+0x10/0x10
[   25.574255]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.574280]  ? calculate_sigpending+0x7b/0xa0
[   25.574304]  ? __pfx_kthread+0x10/0x10
[   25.574326]  ret_from_fork+0x116/0x1d0
[   25.574346]  ? __pfx_kthread+0x10/0x10
[   25.574367]  ret_from_fork_asm+0x1a/0x30
[   25.574398]  </TASK>
[   25.574410] 
[   25.582756] Allocated by task 310:
[   25.582947]  kasan_save_stack+0x45/0x70
[   25.583359]  kasan_save_track+0x18/0x40
[   25.583549]  kasan_save_alloc_info+0x3b/0x50
[   25.583749]  __kasan_kmalloc+0xb7/0xc0
[   25.583938]  __kmalloc_cache_noprof+0x189/0x420
[   25.584155]  kasan_bitops_generic+0x92/0x1c0
[   25.584610]  kunit_try_run_case+0x1a5/0x480
[   25.584822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.585099]  kthread+0x337/0x6f0
[   25.585350]  ret_from_fork+0x116/0x1d0
[   25.585539]  ret_from_fork_asm+0x1a/0x30
[   25.585690] 
[   25.585754] The buggy address belongs to the object at ffff8881049ad5c0
[   25.585754]  which belongs to the cache kmalloc-16 of size 16
[   25.586404] The buggy address is located 8 bytes inside of
[   25.586404]  allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9)
[   25.586954] 
[   25.587049] The buggy address belongs to the physical page:
[   25.587392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad
[   25.587734] flags: 0x200000000000000(node=0|zone=2)
[   25.588018] page_type: f5(slab)
[   25.588163] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   25.588761] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.589134] page dumped because: kasan: bad access detected
[   25.589481] 
[   25.589565] Memory state around the buggy address:
[   25.589770]  ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.590142]  ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.590570] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.590881]                                               ^
[   25.591121]  ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.591556]  ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.591813] ==================================================================
[   25.614213] ==================================================================
[   25.614836] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.615260] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310
[   25.615538] 
[   25.615779] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.615833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.615846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.615870] Call Trace:
[   25.615887]  <TASK>
[   25.615907]  dump_stack_lvl+0x73/0xb0
[   25.615953]  print_report+0xd1/0x650
[   25.615977]  ? __virt_addr_valid+0x1db/0x2d0
[   25.616001]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.616027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.616053]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.616091]  kasan_report+0x141/0x180
[   25.616112]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.616143]  kasan_check_range+0x10c/0x1c0
[   25.616167]  __kasan_check_write+0x18/0x20
[   25.616190]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.616295]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.616323]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.616348]  ? trace_hardirqs_on+0x37/0xe0
[   25.616371]  ? kasan_bitops_generic+0x92/0x1c0
[   25.616398]  kasan_bitops_generic+0x121/0x1c0
[   25.616420]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.616445]  ? __pfx_read_tsc+0x10/0x10
[   25.616467]  ? ktime_get_ts64+0x86/0x230
[   25.616491]  kunit_try_run_case+0x1a5/0x480
[   25.616518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.616541]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.616565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.616587]  ? __kthread_parkme+0x82/0x180
[   25.616608]  ? preempt_count_sub+0x50/0x80
[   25.616631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.616656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.616681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.616705]  kthread+0x337/0x6f0
[   25.616725]  ? trace_preempt_on+0x20/0xc0
[   25.616747]  ? __pfx_kthread+0x10/0x10
[   25.616768]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.616792]  ? calculate_sigpending+0x7b/0xa0
[   25.616817]  ? __pfx_kthread+0x10/0x10
[   25.616838]  ret_from_fork+0x116/0x1d0
[   25.616857]  ? __pfx_kthread+0x10/0x10
[   25.616879]  ret_from_fork_asm+0x1a/0x30
[   25.616909]  </TASK>
[   25.616923] 
[   25.625023] Allocated by task 310:
[   25.625212]  kasan_save_stack+0x45/0x70
[   25.625392]  kasan_save_track+0x18/0x40
[   25.625557]  kasan_save_alloc_info+0x3b/0x50
[   25.625710]  __kasan_kmalloc+0xb7/0xc0
[   25.625841]  __kmalloc_cache_noprof+0x189/0x420
[   25.625994]  kasan_bitops_generic+0x92/0x1c0
[   25.626205]  kunit_try_run_case+0x1a5/0x480
[   25.626515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.626872]  kthread+0x337/0x6f0
[   25.627106]  ret_from_fork+0x116/0x1d0
[   25.627542]  ret_from_fork_asm+0x1a/0x30
[   25.627715] 
[   25.627796] The buggy address belongs to the object at ffff8881049ad5c0
[   25.627796]  which belongs to the cache kmalloc-16 of size 16
[   25.628467] The buggy address is located 8 bytes inside of
[   25.628467]  allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9)
[   25.628906] 
[   25.629117] The buggy address belongs to the physical page:
[   25.629321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad
[   25.629557] flags: 0x200000000000000(node=0|zone=2)
[   25.629715] page_type: f5(slab)
[   25.629839] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   25.630361] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.630706] page dumped because: kasan: bad access detected
[   25.630978] 
[   25.631076] Memory state around the buggy address:
[   25.631548]  ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.631854]  ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.632183] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.632449]                                               ^
[   25.632660]  ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.633004]  ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.633289] ==================================================================
[   25.633727] ==================================================================
[   25.633986] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.634402] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310
[   25.635003] 
[   25.635136] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.635191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.635205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.635413] Call Trace:
[   25.635438]  <TASK>
[   25.635458]  dump_stack_lvl+0x73/0xb0
[   25.635489]  print_report+0xd1/0x650
[   25.635512]  ? __virt_addr_valid+0x1db/0x2d0
[   25.635537]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.635564]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.635589]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.635617]  kasan_report+0x141/0x180
[   25.635639]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.635670]  kasan_check_range+0x10c/0x1c0
[   25.635693]  __kasan_check_write+0x18/0x20
[   25.635716]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.635743]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.635771]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.635796]  ? trace_hardirqs_on+0x37/0xe0
[   25.635819]  ? kasan_bitops_generic+0x92/0x1c0
[   25.635846]  kasan_bitops_generic+0x121/0x1c0
[   25.635869]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.635894]  ? __pfx_read_tsc+0x10/0x10
[   25.635915]  ? ktime_get_ts64+0x86/0x230
[   25.635951]  kunit_try_run_case+0x1a5/0x480
[   25.635977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.636001]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.636024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.636046]  ? __kthread_parkme+0x82/0x180
[   25.636081]  ? preempt_count_sub+0x50/0x80
[   25.636105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.636130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.636156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.636256]  kthread+0x337/0x6f0
[   25.636284]  ? trace_preempt_on+0x20/0xc0
[   25.636307]  ? __pfx_kthread+0x10/0x10
[   25.636327]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.636352]  ? calculate_sigpending+0x7b/0xa0
[   25.636377]  ? __pfx_kthread+0x10/0x10
[   25.636400]  ret_from_fork+0x116/0x1d0
[   25.636418]  ? __pfx_kthread+0x10/0x10
[   25.636439]  ret_from_fork_asm+0x1a/0x30
[   25.636471]  </TASK>
[   25.636483] 
[   25.645244] Allocated by task 310:
[   25.645444]  kasan_save_stack+0x45/0x70
[   25.645646]  kasan_save_track+0x18/0x40
[   25.645844]  kasan_save_alloc_info+0x3b/0x50
[   25.646147]  __kasan_kmalloc+0xb7/0xc0
[   25.646560]  __kmalloc_cache_noprof+0x189/0x420
[   25.646764]  kasan_bitops_generic+0x92/0x1c0
[   25.646906]  kunit_try_run_case+0x1a5/0x480
[   25.647132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.647502]  kthread+0x337/0x6f0
[   25.647651]  ret_from_fork+0x116/0x1d0
[   25.647808]  ret_from_fork_asm+0x1a/0x30
[   25.647980] 
[   25.648085] The buggy address belongs to the object at ffff8881049ad5c0
[   25.648085]  which belongs to the cache kmalloc-16 of size 16
[   25.648843] The buggy address is located 8 bytes inside of
[   25.648843]  allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9)
[   25.649515] 
[   25.649614] The buggy address belongs to the physical page:
[   25.649785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad
[   25.650110] flags: 0x200000000000000(node=0|zone=2)
[   25.650343] page_type: f5(slab)
[   25.650561] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   25.650792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.651439] page dumped because: kasan: bad access detected
[   25.651641] 
[   25.651732] Memory state around the buggy address:
[   25.651922]  ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.652232]  ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.652697] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.652987]                                               ^
[   25.653294]  ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.653597]  ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.653920] ==================================================================
[   25.695496] ==================================================================
[   25.695831] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.696397] Read of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310
[   25.696707] 
[   25.696818] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.696870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.696884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.696908] Call Trace:
[   25.696940]  <TASK>
[   25.696960]  dump_stack_lvl+0x73/0xb0
[   25.696990]  print_report+0xd1/0x650
[   25.697014]  ? __virt_addr_valid+0x1db/0x2d0
[   25.697039]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.697077]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.697104]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.697132]  kasan_report+0x141/0x180
[   25.697154]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.697186]  kasan_check_range+0x10c/0x1c0
[   25.697209]  __kasan_check_read+0x15/0x20
[   25.697232]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.697260]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.697288]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.697326]  ? trace_hardirqs_on+0x37/0xe0
[   25.697350]  ? kasan_bitops_generic+0x92/0x1c0
[   25.697377]  kasan_bitops_generic+0x121/0x1c0
[   25.697400]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.697425]  ? __pfx_read_tsc+0x10/0x10
[   25.697447]  ? ktime_get_ts64+0x86/0x230
[   25.697473]  kunit_try_run_case+0x1a5/0x480
[   25.697499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.697523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.697546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.697568]  ? __kthread_parkme+0x82/0x180
[   25.697590]  ? preempt_count_sub+0x50/0x80
[   25.697614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.697639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.697665]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.697692]  kthread+0x337/0x6f0
[   25.697713]  ? trace_preempt_on+0x20/0xc0
[   25.697736]  ? __pfx_kthread+0x10/0x10
[   25.697757]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.697782]  ? calculate_sigpending+0x7b/0xa0
[   25.697807]  ? __pfx_kthread+0x10/0x10
[   25.697835]  ret_from_fork+0x116/0x1d0
[   25.697855]  ? __pfx_kthread+0x10/0x10
[   25.697878]  ret_from_fork_asm+0x1a/0x30
[   25.697912]  </TASK>
[   25.697925] 
[   25.706835] Allocated by task 310:
[   25.707016]  kasan_save_stack+0x45/0x70
[   25.707184]  kasan_save_track+0x18/0x40
[   25.707410]  kasan_save_alloc_info+0x3b/0x50
[   25.707625]  __kasan_kmalloc+0xb7/0xc0
[   25.707805]  __kmalloc_cache_noprof+0x189/0x420
[   25.708019]  kasan_bitops_generic+0x92/0x1c0
[   25.708237]  kunit_try_run_case+0x1a5/0x480
[   25.708491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.708751]  kthread+0x337/0x6f0
[   25.708894]  ret_from_fork+0x116/0x1d0
[   25.709108]  ret_from_fork_asm+0x1a/0x30
[   25.709298] 
[   25.709422] The buggy address belongs to the object at ffff8881049ad5c0
[   25.709422]  which belongs to the cache kmalloc-16 of size 16
[   25.709881] The buggy address is located 8 bytes inside of
[   25.709881]  allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9)
[   25.710615] 
[   25.710704] The buggy address belongs to the physical page:
[   25.710928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad
[   25.711386] flags: 0x200000000000000(node=0|zone=2)
[   25.711585] page_type: f5(slab)
[   25.711754] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   25.712055] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.712289] page dumped because: kasan: bad access detected
[   25.712456] 
[   25.712520] Memory state around the buggy address:
[   25.712669]  ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.713039]  ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.713675] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.714096]                                               ^
[   25.714602]  ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.714823]  ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.715147] ==================================================================
[   25.675085] ==================================================================
[   25.675422] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.676111] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310
[   25.676674] 
[   25.676785] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.676839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.676854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.676877] Call Trace:
[   25.676900]  <TASK>
[   25.676920]  dump_stack_lvl+0x73/0xb0
[   25.676952]  print_report+0xd1/0x650
[   25.676976]  ? __virt_addr_valid+0x1db/0x2d0
[   25.677002]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.677028]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.677055]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.677094]  kasan_report+0x141/0x180
[   25.677116]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.677148]  kasan_check_range+0x10c/0x1c0
[   25.677170]  __kasan_check_write+0x18/0x20
[   25.677244]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.677273]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.677302]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.677328]  ? trace_hardirqs_on+0x37/0xe0
[   25.677352]  ? kasan_bitops_generic+0x92/0x1c0
[   25.677380]  kasan_bitops_generic+0x121/0x1c0
[   25.677405]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.677430]  ? __pfx_read_tsc+0x10/0x10
[   25.677453]  ? ktime_get_ts64+0x86/0x230
[   25.677479]  kunit_try_run_case+0x1a5/0x480
[   25.677506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.677530]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.677553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.677576]  ? __kthread_parkme+0x82/0x180
[   25.677597]  ? preempt_count_sub+0x50/0x80
[   25.677621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.677646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.677671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.677696]  kthread+0x337/0x6f0
[   25.677716]  ? trace_preempt_on+0x20/0xc0
[   25.677738]  ? __pfx_kthread+0x10/0x10
[   25.677759]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.677784]  ? calculate_sigpending+0x7b/0xa0
[   25.677808]  ? __pfx_kthread+0x10/0x10
[   25.677839]  ret_from_fork+0x116/0x1d0
[   25.677858]  ? __pfx_kthread+0x10/0x10
[   25.677879]  ret_from_fork_asm+0x1a/0x30
[   25.677911]  </TASK>
[   25.677924] 
[   25.686555] Allocated by task 310:
[   25.686706]  kasan_save_stack+0x45/0x70
[   25.686911]  kasan_save_track+0x18/0x40
[   25.687052]  kasan_save_alloc_info+0x3b/0x50
[   25.687203]  __kasan_kmalloc+0xb7/0xc0
[   25.687330]  __kmalloc_cache_noprof+0x189/0x420
[   25.687507]  kasan_bitops_generic+0x92/0x1c0
[   25.687993]  kunit_try_run_case+0x1a5/0x480
[   25.688335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.688599]  kthread+0x337/0x6f0
[   25.688773]  ret_from_fork+0x116/0x1d0
[   25.688972]  ret_from_fork_asm+0x1a/0x30
[   25.689154] 
[   25.689313] The buggy address belongs to the object at ffff8881049ad5c0
[   25.689313]  which belongs to the cache kmalloc-16 of size 16
[   25.689800] The buggy address is located 8 bytes inside of
[   25.689800]  allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9)
[   25.690403] 
[   25.690552] The buggy address belongs to the physical page:
[   25.690734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad
[   25.690970] flags: 0x200000000000000(node=0|zone=2)
[   25.691144] page_type: f5(slab)
[   25.691314] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   25.691651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.691984] page dumped because: kasan: bad access detected
[   25.692286] 
[   25.692355] Memory state around the buggy address:
[   25.692505]  ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.692781]  ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.693137] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.693640]                                               ^
[   25.693807]  ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.694019]  ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.694732] ==================================================================
[   25.592658] ==================================================================
[   25.592971] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.593425] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310
[   25.593797] 
[   25.593944] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.593998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.594012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.594035] Call Trace:
[   25.594086]  <TASK>
[   25.594109]  dump_stack_lvl+0x73/0xb0
[   25.594141]  print_report+0xd1/0x650
[   25.594164]  ? __virt_addr_valid+0x1db/0x2d0
[   25.594307]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.594336]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.594361]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.594389]  kasan_report+0x141/0x180
[   25.594411]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.594443]  kasan_check_range+0x10c/0x1c0
[   25.594487]  __kasan_check_write+0x18/0x20
[   25.594510]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.594538]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.594580]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.594606]  ? trace_hardirqs_on+0x37/0xe0
[   25.594629]  ? kasan_bitops_generic+0x92/0x1c0
[   25.594657]  kasan_bitops_generic+0x121/0x1c0
[   25.594680]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.594705]  ? __pfx_read_tsc+0x10/0x10
[   25.594727]  ? ktime_get_ts64+0x86/0x230
[   25.594752]  kunit_try_run_case+0x1a5/0x480
[   25.594779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.594803]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.594827]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.594849]  ? __kthread_parkme+0x82/0x180
[   25.594870]  ? preempt_count_sub+0x50/0x80
[   25.594894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.594957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.594984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.595009]  kthread+0x337/0x6f0
[   25.595028]  ? trace_preempt_on+0x20/0xc0
[   25.595051]  ? __pfx_kthread+0x10/0x10
[   25.595081]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.595121]  ? calculate_sigpending+0x7b/0xa0
[   25.595146]  ? __pfx_kthread+0x10/0x10
[   25.595168]  ret_from_fork+0x116/0x1d0
[   25.595250]  ? __pfx_kthread+0x10/0x10
[   25.595272]  ret_from_fork_asm+0x1a/0x30
[   25.595304]  </TASK>
[   25.595317] 
[   25.604763] Allocated by task 310:
[   25.604939]  kasan_save_stack+0x45/0x70
[   25.605274]  kasan_save_track+0x18/0x40
[   25.605469]  kasan_save_alloc_info+0x3b/0x50
[   25.605640]  __kasan_kmalloc+0xb7/0xc0
[   25.605863]  __kmalloc_cache_noprof+0x189/0x420
[   25.606104]  kasan_bitops_generic+0x92/0x1c0
[   25.606415]  kunit_try_run_case+0x1a5/0x480
[   25.606630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.606870]  kthread+0x337/0x6f0
[   25.607077]  ret_from_fork+0x116/0x1d0
[   25.607336]  ret_from_fork_asm+0x1a/0x30
[   25.607514] 
[   25.607620] The buggy address belongs to the object at ffff8881049ad5c0
[   25.607620]  which belongs to the cache kmalloc-16 of size 16
[   25.608145] The buggy address is located 8 bytes inside of
[   25.608145]  allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9)
[   25.608753] 
[   25.608846] The buggy address belongs to the physical page:
[   25.609145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad
[   25.609562] flags: 0x200000000000000(node=0|zone=2)
[   25.609784] page_type: f5(slab)
[   25.610007] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   25.610456] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.610769] page dumped because: kasan: bad access detected
[   25.611081] 
[   25.611155] Memory state around the buggy address:
[   25.611583]  ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.611840]  ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.612159] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.612400]                                               ^
[   25.612584]  ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.612899]  ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.613739] ==================================================================
[   25.715826] ==================================================================
[   25.716124] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.716390] Read of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310
[   25.716944] 
[   25.717080] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.717133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.717147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.717171] Call Trace:
[   25.717194]  <TASK>
[   25.717217]  dump_stack_lvl+0x73/0xb0
[   25.717250]  print_report+0xd1/0x650
[   25.717275]  ? __virt_addr_valid+0x1db/0x2d0
[   25.717300]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.717328]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.717356]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.717386]  kasan_report+0x141/0x180
[   25.717409]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.717442]  __asan_report_load8_noabort+0x18/0x20
[   25.717467]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.717495]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.717523]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.717549]  ? trace_hardirqs_on+0x37/0xe0
[   25.717573]  ? kasan_bitops_generic+0x92/0x1c0
[   25.717600]  kasan_bitops_generic+0x121/0x1c0
[   25.717625]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.717650]  ? __pfx_read_tsc+0x10/0x10
[   25.717673]  ? ktime_get_ts64+0x86/0x230
[   25.717698]  kunit_try_run_case+0x1a5/0x480
[   25.717725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.717751]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.717774]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.717797]  ? __kthread_parkme+0x82/0x180
[   25.717824]  ? preempt_count_sub+0x50/0x80
[   25.717862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.717888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.717914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.717939]  kthread+0x337/0x6f0
[   25.717960]  ? trace_preempt_on+0x20/0xc0
[   25.717983]  ? __pfx_kthread+0x10/0x10
[   25.718004]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.718029]  ? calculate_sigpending+0x7b/0xa0
[   25.718054]  ? __pfx_kthread+0x10/0x10
[   25.718085]  ret_from_fork+0x116/0x1d0
[   25.718105]  ? __pfx_kthread+0x10/0x10
[   25.718126]  ret_from_fork_asm+0x1a/0x30
[   25.718159]  </TASK>
[   25.718172] 
[   25.726687] Allocated by task 310:
[   25.726875]  kasan_save_stack+0x45/0x70
[   25.727046]  kasan_save_track+0x18/0x40
[   25.727385]  kasan_save_alloc_info+0x3b/0x50
[   25.727553]  __kasan_kmalloc+0xb7/0xc0
[   25.727679]  __kmalloc_cache_noprof+0x189/0x420
[   25.727827]  kasan_bitops_generic+0x92/0x1c0
[   25.728382]  kunit_try_run_case+0x1a5/0x480
[   25.728611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.728862]  kthread+0x337/0x6f0
[   25.729053]  ret_from_fork+0x116/0x1d0
[   25.729296]  ret_from_fork_asm+0x1a/0x30
[   25.729506] 
[   25.729597] The buggy address belongs to the object at ffff8881049ad5c0
[   25.729597]  which belongs to the cache kmalloc-16 of size 16
[   25.729965] The buggy address is located 8 bytes inside of
[   25.729965]  allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9)
[   25.730787] 
[   25.730878] The buggy address belongs to the physical page:
[   25.731070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad
[   25.731300] flags: 0x200000000000000(node=0|zone=2)
[   25.731461] page_type: f5(slab)
[   25.731578] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   25.732104] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.732824] page dumped because: kasan: bad access detected
[   25.733074] 
[   25.733446] Memory state around the buggy address:
[   25.733675]  ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.733947]  ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.734253] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.734526]                                               ^
[   25.734717]  ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.734917]  ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.735274] ==================================================================

[   25.473808] ==================================================================
[   25.474832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.475110] Read of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309
[   25.475444] 
[   25.475569] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.475620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.475634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.475657] Call Trace:
[   25.475673]  <TASK>
[   25.475785]  dump_stack_lvl+0x73/0xb0
[   25.475818]  print_report+0xd1/0x650
[   25.475840]  ? __virt_addr_valid+0x1db/0x2d0
[   25.475863]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.475890]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.475918]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.475944]  kasan_report+0x141/0x180
[   25.475966]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.475997]  __asan_report_load8_noabort+0x18/0x20
[   25.476021]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.476048]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.476082]  kasan_bitops_generic+0x121/0x1c0
[   25.476105]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.476129]  ? __pfx_read_tsc+0x10/0x10
[   25.476149]  ? ktime_get_ts64+0x86/0x230
[   25.476174]  kunit_try_run_case+0x1a5/0x480
[   25.476198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.476222]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.476242]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.476264]  ? __kthread_parkme+0x82/0x180
[   25.476284]  ? preempt_count_sub+0x50/0x80
[   25.476321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.476347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.476371]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.476395]  kthread+0x337/0x6f0
[   25.476414]  ? trace_preempt_on+0x20/0xc0
[   25.476436]  ? __pfx_kthread+0x10/0x10
[   25.476456]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.476481]  ? calculate_sigpending+0x7b/0xa0
[   25.476734]  ? __pfx_kthread+0x10/0x10
[   25.476757]  ret_from_fork+0x116/0x1d0
[   25.476776]  ? __pfx_kthread+0x10/0x10
[   25.476798]  ret_from_fork_asm+0x1a/0x30
[   25.476828]  </TASK>
[   25.476840] 
[   25.486982] Allocated by task 309:
[   25.487126]  kasan_save_stack+0x45/0x70
[   25.487333]  kasan_save_track+0x18/0x40
[   25.487812]  kasan_save_alloc_info+0x3b/0x50
[   25.487972]  __kasan_kmalloc+0xb7/0xc0
[   25.488160]  __kmalloc_cache_noprof+0x189/0x420
[   25.488470]  kasan_bitops_generic+0x92/0x1c0
[   25.488892]  kunit_try_run_case+0x1a5/0x480
[   25.489113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.489354]  kthread+0x337/0x6f0
[   25.489507]  ret_from_fork+0x116/0x1d0
[   25.489931]  ret_from_fork_asm+0x1a/0x30
[   25.490121] 
[   25.490213] The buggy address belongs to the object at ffff88810586d4c0
[   25.490213]  which belongs to the cache kmalloc-16 of size 16
[   25.490851] The buggy address is located 8 bytes inside of
[   25.490851]  allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9)
[   25.491601] 
[   25.491681] The buggy address belongs to the physical page:
[   25.492088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d
[   25.492778] flags: 0x200000000000000(node=0|zone=2)
[   25.493212] page_type: f5(slab)
[   25.493404] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.493922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.494323] page dumped because: kasan: bad access detected
[   25.494544] 
[   25.494711] Memory state around the buggy address:
[   25.495110]  ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.495576]  ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.496132] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.496529]                                               ^
[   25.496774]  ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.497041]  ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.497326] ==================================================================
[   25.332431] ==================================================================
[   25.332802] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.333486] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309
[   25.333992] 
[   25.334099] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.334148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.334162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.334183] Call Trace:
[   25.334196]  <TASK>
[   25.334209]  dump_stack_lvl+0x73/0xb0
[   25.334237]  print_report+0xd1/0x650
[   25.334258]  ? __virt_addr_valid+0x1db/0x2d0
[   25.334281]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.334320]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.334346]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.334373]  kasan_report+0x141/0x180
[   25.334395]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.334426]  kasan_check_range+0x10c/0x1c0
[   25.334449]  __kasan_check_write+0x18/0x20
[   25.334472]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.334499]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.334533]  kasan_bitops_generic+0x121/0x1c0
[   25.334556]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.334581]  ? __pfx_read_tsc+0x10/0x10
[   25.334602]  ? ktime_get_ts64+0x86/0x230
[   25.334626]  kunit_try_run_case+0x1a5/0x480
[   25.334650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.334673]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.334696]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.334717]  ? __kthread_parkme+0x82/0x180
[   25.334952]  ? preempt_count_sub+0x50/0x80
[   25.334986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.335013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.335038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.335064]  kthread+0x337/0x6f0
[   25.335084]  ? trace_preempt_on+0x20/0xc0
[   25.335107]  ? __pfx_kthread+0x10/0x10
[   25.335129]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.335154]  ? calculate_sigpending+0x7b/0xa0
[   25.335178]  ? __pfx_kthread+0x10/0x10
[   25.335200]  ret_from_fork+0x116/0x1d0
[   25.335219]  ? __pfx_kthread+0x10/0x10
[   25.335240]  ret_from_fork_asm+0x1a/0x30
[   25.335270]  </TASK>
[   25.335282] 
[   25.342732] Allocated by task 309:
[   25.342860]  kasan_save_stack+0x45/0x70
[   25.342995]  kasan_save_track+0x18/0x40
[   25.343122]  kasan_save_alloc_info+0x3b/0x50
[   25.343339]  __kasan_kmalloc+0xb7/0xc0
[   25.343693]  __kmalloc_cache_noprof+0x189/0x420
[   25.343966]  kasan_bitops_generic+0x92/0x1c0
[   25.344173]  kunit_try_run_case+0x1a5/0x480
[   25.344396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.344658]  kthread+0x337/0x6f0
[   25.344880]  ret_from_fork+0x116/0x1d0
[   25.345041]  ret_from_fork_asm+0x1a/0x30
[   25.345174] 
[   25.345239] The buggy address belongs to the object at ffff88810586d4c0
[   25.345239]  which belongs to the cache kmalloc-16 of size 16
[   25.345643] The buggy address is located 8 bytes inside of
[   25.345643]  allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9)
[   25.346157] 
[   25.346223] The buggy address belongs to the physical page:
[   25.346640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d
[   25.346902] flags: 0x200000000000000(node=0|zone=2)
[   25.347059] page_type: f5(slab)
[   25.347174] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.347684] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.348184] page dumped because: kasan: bad access detected
[   25.348512] 
[   25.348607] Memory state around the buggy address:
[   25.348855]  ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.349128]  ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.349425] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.349748]                                               ^
[   25.350008]  ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.350345]  ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.350614] ==================================================================
[   25.351174] ==================================================================
[   25.351466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.351971] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309
[   25.352224] 
[   25.352298] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.352355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.352369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.352389] Call Trace:
[   25.352403]  <TASK>
[   25.352416]  dump_stack_lvl+0x73/0xb0
[   25.352442]  print_report+0xd1/0x650
[   25.352465]  ? __virt_addr_valid+0x1db/0x2d0
[   25.352487]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.352524]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.352551]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.352577]  kasan_report+0x141/0x180
[   25.352599]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.352630]  kasan_check_range+0x10c/0x1c0
[   25.352653]  __kasan_check_write+0x18/0x20
[   25.352677]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.352704]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.352737]  kasan_bitops_generic+0x121/0x1c0
[   25.352761]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.352786]  ? __pfx_read_tsc+0x10/0x10
[   25.352808]  ? ktime_get_ts64+0x86/0x230
[   25.352831]  kunit_try_run_case+0x1a5/0x480
[   25.352856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.352879]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.352900]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.352922]  ? __kthread_parkme+0x82/0x180
[   25.352943]  ? preempt_count_sub+0x50/0x80
[   25.352966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.352991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.353062]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.353090]  kthread+0x337/0x6f0
[   25.353110]  ? trace_preempt_on+0x20/0xc0
[   25.353132]  ? __pfx_kthread+0x10/0x10
[   25.353153]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.353178]  ? calculate_sigpending+0x7b/0xa0
[   25.353201]  ? __pfx_kthread+0x10/0x10
[   25.353222]  ret_from_fork+0x116/0x1d0
[   25.353242]  ? __pfx_kthread+0x10/0x10
[   25.353263]  ret_from_fork_asm+0x1a/0x30
[   25.353293]  </TASK>
[   25.353304] 
[   25.362530] Allocated by task 309:
[   25.363056]  kasan_save_stack+0x45/0x70
[   25.363472]  kasan_save_track+0x18/0x40
[   25.363935]  kasan_save_alloc_info+0x3b/0x50
[   25.364345]  __kasan_kmalloc+0xb7/0xc0
[   25.364777]  __kmalloc_cache_noprof+0x189/0x420
[   25.365167]  kasan_bitops_generic+0x92/0x1c0
[   25.365331]  kunit_try_run_case+0x1a5/0x480
[   25.365793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.366271]  kthread+0x337/0x6f0
[   25.366555]  ret_from_fork+0x116/0x1d0
[   25.366966]  ret_from_fork_asm+0x1a/0x30
[   25.367116] 
[   25.367182] The buggy address belongs to the object at ffff88810586d4c0
[   25.367182]  which belongs to the cache kmalloc-16 of size 16
[   25.367536] The buggy address is located 8 bytes inside of
[   25.367536]  allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9)
[   25.367881] 
[   25.367947] The buggy address belongs to the physical page:
[   25.368169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d
[   25.368920] flags: 0x200000000000000(node=0|zone=2)
[   25.369446] page_type: f5(slab)
[   25.369852] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.370574] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.371433] page dumped because: kasan: bad access detected
[   25.372097] 
[   25.372284] Memory state around the buggy address:
[   25.372806]  ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.373510]  ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.374431] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.375296]                                               ^
[   25.375973]  ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.376752]  ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.377378] ==================================================================
[   25.451044] ==================================================================
[   25.451356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.451735] Read of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309
[   25.452159] 
[   25.452275] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.452333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.452346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.452367] Call Trace:
[   25.452383]  <TASK>
[   25.452397]  dump_stack_lvl+0x73/0xb0
[   25.452424]  print_report+0xd1/0x650
[   25.452482]  ? __virt_addr_valid+0x1db/0x2d0
[   25.452518]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.452555]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.452581]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.452608]  kasan_report+0x141/0x180
[   25.452630]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.452662]  kasan_check_range+0x10c/0x1c0
[   25.452685]  __kasan_check_read+0x15/0x20
[   25.452708]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.452735]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.452842]  kasan_bitops_generic+0x121/0x1c0
[   25.452905]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.452930]  ? __pfx_read_tsc+0x10/0x10
[   25.452962]  ? ktime_get_ts64+0x86/0x230
[   25.452987]  kunit_try_run_case+0x1a5/0x480
[   25.453039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.453064]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.453097]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.453119]  ? __kthread_parkme+0x82/0x180
[   25.453139]  ? preempt_count_sub+0x50/0x80
[   25.453162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.453187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.453211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.453236]  kthread+0x337/0x6f0
[   25.453255]  ? trace_preempt_on+0x20/0xc0
[   25.453276]  ? __pfx_kthread+0x10/0x10
[   25.453298]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.453333]  ? calculate_sigpending+0x7b/0xa0
[   25.453355]  ? __pfx_kthread+0x10/0x10
[   25.453377]  ret_from_fork+0x116/0x1d0
[   25.453397]  ? __pfx_kthread+0x10/0x10
[   25.453418]  ret_from_fork_asm+0x1a/0x30
[   25.453449]  </TASK>
[   25.453461] 
[   25.462691] Allocated by task 309:
[   25.462825]  kasan_save_stack+0x45/0x70
[   25.463211]  kasan_save_track+0x18/0x40
[   25.463641]  kasan_save_alloc_info+0x3b/0x50
[   25.463842]  __kasan_kmalloc+0xb7/0xc0
[   25.464282]  __kmalloc_cache_noprof+0x189/0x420
[   25.464449]  kasan_bitops_generic+0x92/0x1c0
[   25.464927]  kunit_try_run_case+0x1a5/0x480
[   25.465246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.465540]  kthread+0x337/0x6f0
[   25.465764]  ret_from_fork+0x116/0x1d0
[   25.466019]  ret_from_fork_asm+0x1a/0x30
[   25.466529] 
[   25.466623] The buggy address belongs to the object at ffff88810586d4c0
[   25.466623]  which belongs to the cache kmalloc-16 of size 16
[   25.467235] The buggy address is located 8 bytes inside of
[   25.467235]  allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9)
[   25.468011] 
[   25.468110] The buggy address belongs to the physical page:
[   25.468320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d
[   25.468834] flags: 0x200000000000000(node=0|zone=2)
[   25.469058] page_type: f5(slab)
[   25.469236] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.469636] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.470078] page dumped because: kasan: bad access detected
[   25.470405] 
[   25.470492] Memory state around the buggy address:
[   25.470795]  ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.471337]  ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.471767] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.472277]                                               ^
[   25.472550]  ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.472975]  ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.473319] ==================================================================
[   25.378263] ==================================================================
[   25.378513] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.379233] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309
[   25.380032] 
[   25.380353] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.380406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.380419] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.380440] Call Trace:
[   25.380456]  <TASK>
[   25.380471]  dump_stack_lvl+0x73/0xb0
[   25.380530]  print_report+0xd1/0x650
[   25.380552]  ? __virt_addr_valid+0x1db/0x2d0
[   25.380587]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.380614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.380639]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.380666]  kasan_report+0x141/0x180
[   25.380746]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.380778]  kasan_check_range+0x10c/0x1c0
[   25.380801]  __kasan_check_write+0x18/0x20
[   25.380825]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.380851]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.380885]  kasan_bitops_generic+0x121/0x1c0
[   25.380908]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.380932]  ? __pfx_read_tsc+0x10/0x10
[   25.380953]  ? ktime_get_ts64+0x86/0x230
[   25.380977]  kunit_try_run_case+0x1a5/0x480
[   25.381002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.381025]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.381046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.381069]  ? __kthread_parkme+0x82/0x180
[   25.381089]  ? preempt_count_sub+0x50/0x80
[   25.381112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.381136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.381160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.381185]  kthread+0x337/0x6f0
[   25.381204]  ? trace_preempt_on+0x20/0xc0
[   25.381226]  ? __pfx_kthread+0x10/0x10
[   25.381247]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.381270]  ? calculate_sigpending+0x7b/0xa0
[   25.381294]  ? __pfx_kthread+0x10/0x10
[   25.381329]  ret_from_fork+0x116/0x1d0
[   25.381349]  ? __pfx_kthread+0x10/0x10
[   25.381370]  ret_from_fork_asm+0x1a/0x30
[   25.381400]  </TASK>
[   25.381413] 
[   25.394372] Allocated by task 309:
[   25.394525]  kasan_save_stack+0x45/0x70
[   25.395149]  kasan_save_track+0x18/0x40
[   25.395659]  kasan_save_alloc_info+0x3b/0x50
[   25.396299]  __kasan_kmalloc+0xb7/0xc0
[   25.396830]  __kmalloc_cache_noprof+0x189/0x420
[   25.397260]  kasan_bitops_generic+0x92/0x1c0
[   25.397428]  kunit_try_run_case+0x1a5/0x480
[   25.397611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.398318]  kthread+0x337/0x6f0
[   25.398790]  ret_from_fork+0x116/0x1d0
[   25.399281]  ret_from_fork_asm+0x1a/0x30
[   25.399904] 
[   25.400230] The buggy address belongs to the object at ffff88810586d4c0
[   25.400230]  which belongs to the cache kmalloc-16 of size 16
[   25.401350] The buggy address is located 8 bytes inside of
[   25.401350]  allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9)
[   25.402064] 
[   25.402406] The buggy address belongs to the physical page:
[   25.403018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d
[   25.403647] flags: 0x200000000000000(node=0|zone=2)
[   25.404220] page_type: f5(slab)
[   25.404365] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.405034] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.406050] page dumped because: kasan: bad access detected
[   25.406552] 
[   25.406711] Memory state around the buggy address:
[   25.407161]  ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.407519]  ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.408462] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.409026]                                               ^
[   25.409211]  ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.409444]  ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.409727] ==================================================================
[   25.410227] ==================================================================
[   25.410484] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.411042] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309
[   25.411325] 
[   25.411444] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.411514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.411528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.411561] Call Trace:
[   25.411577]  <TASK>
[   25.411592]  dump_stack_lvl+0x73/0xb0
[   25.411619]  print_report+0xd1/0x650
[   25.411641]  ? __virt_addr_valid+0x1db/0x2d0
[   25.411664]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.411689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.411715]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.411742]  kasan_report+0x141/0x180
[   25.411764]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.411795]  kasan_check_range+0x10c/0x1c0
[   25.411818]  __kasan_check_write+0x18/0x20
[   25.411840]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.411867]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.411911]  kasan_bitops_generic+0x121/0x1c0
[   25.411935]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.411959]  ? __pfx_read_tsc+0x10/0x10
[   25.412047]  ? ktime_get_ts64+0x86/0x230
[   25.412077]  kunit_try_run_case+0x1a5/0x480
[   25.412102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.412139]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.412161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.412183]  ? __kthread_parkme+0x82/0x180
[   25.412204]  ? preempt_count_sub+0x50/0x80
[   25.412227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.412252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.412277]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.412302]  kthread+0x337/0x6f0
[   25.412342]  ? trace_preempt_on+0x20/0xc0
[   25.412365]  ? __pfx_kthread+0x10/0x10
[   25.412386]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.412420]  ? calculate_sigpending+0x7b/0xa0
[   25.412445]  ? __pfx_kthread+0x10/0x10
[   25.412467]  ret_from_fork+0x116/0x1d0
[   25.412486]  ? __pfx_kthread+0x10/0x10
[   25.412515]  ret_from_fork_asm+0x1a/0x30
[   25.412547]  </TASK>
[   25.412558] 
[   25.420968] Allocated by task 309:
[   25.421173]  kasan_save_stack+0x45/0x70
[   25.421408]  kasan_save_track+0x18/0x40
[   25.421797]  kasan_save_alloc_info+0x3b/0x50
[   25.422021]  __kasan_kmalloc+0xb7/0xc0
[   25.422260]  __kmalloc_cache_noprof+0x189/0x420
[   25.422476]  kasan_bitops_generic+0x92/0x1c0
[   25.422654]  kunit_try_run_case+0x1a5/0x480
[   25.422878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.423117]  kthread+0x337/0x6f0
[   25.423235]  ret_from_fork+0x116/0x1d0
[   25.423426]  ret_from_fork_asm+0x1a/0x30
[   25.423633] 
[   25.423737] The buggy address belongs to the object at ffff88810586d4c0
[   25.423737]  which belongs to the cache kmalloc-16 of size 16
[   25.424239] The buggy address is located 8 bytes inside of
[   25.424239]  allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9)
[   25.424944] 
[   25.425154] The buggy address belongs to the physical page:
[   25.425430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d
[   25.425907] flags: 0x200000000000000(node=0|zone=2)
[   25.426199] page_type: f5(slab)
[   25.426333] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.426643] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.427003] page dumped because: kasan: bad access detected
[   25.427349] 
[   25.427414] Memory state around the buggy address:
[   25.427720]  ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.428040]  ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.428321] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.428881]                                               ^
[   25.429124]  ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.429352]  ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.429580] ==================================================================
[   25.430034] ==================================================================
[   25.430397] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.430798] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309
[   25.431182] 
[   25.431282] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.431338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.431350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.431371] Call Trace:
[   25.431385]  <TASK>
[   25.431399]  dump_stack_lvl+0x73/0xb0
[   25.431426]  print_report+0xd1/0x650
[   25.431447]  ? __virt_addr_valid+0x1db/0x2d0
[   25.431470]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.431496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.431522]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.431548]  kasan_report+0x141/0x180
[   25.431570]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.431600]  kasan_check_range+0x10c/0x1c0
[   25.431634]  __kasan_check_write+0x18/0x20
[   25.431658]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.431685]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.431731]  kasan_bitops_generic+0x121/0x1c0
[   25.431808]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.431849]  ? __pfx_read_tsc+0x10/0x10
[   25.431871]  ? ktime_get_ts64+0x86/0x230
[   25.431894]  kunit_try_run_case+0x1a5/0x480
[   25.431919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.431942]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.431964]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.431985]  ? __kthread_parkme+0x82/0x180
[   25.432005]  ? preempt_count_sub+0x50/0x80
[   25.432029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.432063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.432087]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.432112]  kthread+0x337/0x6f0
[   25.432142]  ? trace_preempt_on+0x20/0xc0
[   25.432165]  ? __pfx_kthread+0x10/0x10
[   25.432186]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.432209]  ? calculate_sigpending+0x7b/0xa0
[   25.432232]  ? __pfx_kthread+0x10/0x10
[   25.432253]  ret_from_fork+0x116/0x1d0
[   25.432272]  ? __pfx_kthread+0x10/0x10
[   25.432292]  ret_from_fork_asm+0x1a/0x30
[   25.432333]  </TASK>
[   25.432344] 
[   25.441105] Allocated by task 309:
[   25.441303]  kasan_save_stack+0x45/0x70
[   25.441602]  kasan_save_track+0x18/0x40
[   25.441877]  kasan_save_alloc_info+0x3b/0x50
[   25.442043]  __kasan_kmalloc+0xb7/0xc0
[   25.442171]  __kmalloc_cache_noprof+0x189/0x420
[   25.442342]  kasan_bitops_generic+0x92/0x1c0
[   25.442550]  kunit_try_run_case+0x1a5/0x480
[   25.442758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.443011]  kthread+0x337/0x6f0
[   25.443335]  ret_from_fork+0x116/0x1d0
[   25.443722]  ret_from_fork_asm+0x1a/0x30
[   25.443930] 
[   25.443998] The buggy address belongs to the object at ffff88810586d4c0
[   25.443998]  which belongs to the cache kmalloc-16 of size 16
[   25.444405] The buggy address is located 8 bytes inside of
[   25.444405]  allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9)
[   25.445491] 
[   25.445649] The buggy address belongs to the physical page:
[   25.445977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d
[   25.446293] flags: 0x200000000000000(node=0|zone=2)
[   25.446465] page_type: f5(slab)
[   25.446581] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.447211] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.447525] page dumped because: kasan: bad access detected
[   25.447919] 
[   25.448014] Memory state around the buggy address:
[   25.448178]  ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.448444]  ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.448942] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.449366]                                               ^
[   25.449788]  ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.450060]  ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.450370] ==================================================================
[   25.291097] ==================================================================
[   25.291476] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.292076] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309
[   25.292358] 
[   25.292484] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.292531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.292545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.292566] Call Trace:
[   25.292579]  <TASK>
[   25.292593]  dump_stack_lvl+0x73/0xb0
[   25.292620]  print_report+0xd1/0x650
[   25.292641]  ? __virt_addr_valid+0x1db/0x2d0
[   25.292664]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.292771]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.292797]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.292824]  kasan_report+0x141/0x180
[   25.292847]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.292878]  kasan_check_range+0x10c/0x1c0
[   25.292918]  __kasan_check_write+0x18/0x20
[   25.292942]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.292968]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.293002]  kasan_bitops_generic+0x121/0x1c0
[   25.293025]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.293050]  ? __pfx_read_tsc+0x10/0x10
[   25.293087]  ? ktime_get_ts64+0x86/0x230
[   25.293110]  kunit_try_run_case+0x1a5/0x480
[   25.293135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.293159]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.293179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.293201]  ? __kthread_parkme+0x82/0x180
[   25.293239]  ? preempt_count_sub+0x50/0x80
[   25.293263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.293287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.293323]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.293348]  kthread+0x337/0x6f0
[   25.293367]  ? trace_preempt_on+0x20/0xc0
[   25.293389]  ? __pfx_kthread+0x10/0x10
[   25.293410]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.293434]  ? calculate_sigpending+0x7b/0xa0
[   25.293457]  ? __pfx_kthread+0x10/0x10
[   25.293503]  ret_from_fork+0x116/0x1d0
[   25.293523]  ? __pfx_kthread+0x10/0x10
[   25.293543]  ret_from_fork_asm+0x1a/0x30
[   25.293574]  </TASK>
[   25.293587] 
[   25.302742] Allocated by task 309:
[   25.302935]  kasan_save_stack+0x45/0x70
[   25.303097]  kasan_save_track+0x18/0x40
[   25.303227]  kasan_save_alloc_info+0x3b/0x50
[   25.303425]  __kasan_kmalloc+0xb7/0xc0
[   25.303860]  __kmalloc_cache_noprof+0x189/0x420
[   25.304113]  kasan_bitops_generic+0x92/0x1c0
[   25.304318]  kunit_try_run_case+0x1a5/0x480
[   25.304560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.304834]  kthread+0x337/0x6f0
[   25.304955]  ret_from_fork+0x116/0x1d0
[   25.305133]  ret_from_fork_asm+0x1a/0x30
[   25.305360] 
[   25.305448] The buggy address belongs to the object at ffff88810586d4c0
[   25.305448]  which belongs to the cache kmalloc-16 of size 16
[   25.306206] The buggy address is located 8 bytes inside of
[   25.306206]  allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9)
[   25.306908] 
[   25.307014] The buggy address belongs to the physical page:
[   25.307204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d
[   25.307451] flags: 0x200000000000000(node=0|zone=2)
[   25.307870] page_type: f5(slab)
[   25.308043] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.308499] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.308885] page dumped because: kasan: bad access detected
[   25.309119] 
[   25.309231] Memory state around the buggy address:
[   25.309482]  ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.309808]  ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.310262] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.310536]                                               ^
[   25.310998]  ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.311374]  ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.311652] ==================================================================
[   25.312267] ==================================================================
[   25.312593] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.313074] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309
[   25.313413] 
[   25.313519] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.313564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.313577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.313598] Call Trace:
[   25.313614]  <TASK>
[   25.313649]  dump_stack_lvl+0x73/0xb0
[   25.313822]  print_report+0xd1/0x650
[   25.313856]  ? __virt_addr_valid+0x1db/0x2d0
[   25.313880]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.313906]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.313932]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.313958]  kasan_report+0x141/0x180
[   25.313980]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.314011]  kasan_check_range+0x10c/0x1c0
[   25.314034]  __kasan_check_write+0x18/0x20
[   25.314057]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.314083]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.314118]  kasan_bitops_generic+0x121/0x1c0
[   25.314142]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.314166]  ? __pfx_read_tsc+0x10/0x10
[   25.314188]  ? ktime_get_ts64+0x86/0x230
[   25.314212]  kunit_try_run_case+0x1a5/0x480
[   25.314237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.314260]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.314282]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.314318]  ? __kthread_parkme+0x82/0x180
[   25.314338]  ? preempt_count_sub+0x50/0x80
[   25.314361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.314386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.314410]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.314435]  kthread+0x337/0x6f0
[   25.314455]  ? trace_preempt_on+0x20/0xc0
[   25.314477]  ? __pfx_kthread+0x10/0x10
[   25.314524]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.314548]  ? calculate_sigpending+0x7b/0xa0
[   25.314572]  ? __pfx_kthread+0x10/0x10
[   25.314594]  ret_from_fork+0x116/0x1d0
[   25.314613]  ? __pfx_kthread+0x10/0x10
[   25.314634]  ret_from_fork_asm+0x1a/0x30
[   25.314663]  </TASK>
[   25.314686] 
[   25.323285] Allocated by task 309:
[   25.323474]  kasan_save_stack+0x45/0x70
[   25.323740]  kasan_save_track+0x18/0x40
[   25.323966]  kasan_save_alloc_info+0x3b/0x50
[   25.324124]  __kasan_kmalloc+0xb7/0xc0
[   25.324317]  __kmalloc_cache_noprof+0x189/0x420
[   25.324590]  kasan_bitops_generic+0x92/0x1c0
[   25.324810]  kunit_try_run_case+0x1a5/0x480
[   25.325093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.325386]  kthread+0x337/0x6f0
[   25.325556]  ret_from_fork+0x116/0x1d0
[   25.325974]  ret_from_fork_asm+0x1a/0x30
[   25.326135] 
[   25.326201] The buggy address belongs to the object at ffff88810586d4c0
[   25.326201]  which belongs to the cache kmalloc-16 of size 16
[   25.326810] The buggy address is located 8 bytes inside of
[   25.326810]  allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9)
[   25.327287] 
[   25.327404] The buggy address belongs to the physical page:
[   25.327665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d
[   25.328129] flags: 0x200000000000000(node=0|zone=2)
[   25.328392] page_type: f5(slab)
[   25.328554] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.328868] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.329086] page dumped because: kasan: bad access detected
[   25.329251] 
[   25.329322] Memory state around the buggy address:
[   25.329470]  ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.330074]  ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.330663] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   25.331020]                                               ^
[   25.331422]  ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.331848]  ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.332061] ==================================================================