Hay
Date
July 3, 2025, 10:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   57.861538] ==================================================================
[   57.868853] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   57.877922] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370
[   57.885413] 
[   57.886939] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   57.886969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.886979] Hardware name: Thundercomm Dragonboard 845c (DT)
[   57.886990] Call trace:
[   57.886996]  show_stack+0x20/0x38 (C)
[   57.887013]  dump_stack_lvl+0x8c/0xd0
[   57.887032]  print_report+0x118/0x608
[   57.887051]  kasan_report+0xdc/0x128
[   57.887070]  kasan_check_range+0x100/0x1a8
[   57.887090]  __kasan_check_write+0x20/0x30
[   57.887106]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   57.887129]  kasan_bitops_generic+0x11c/0x1c8
[   57.887146]  kunit_try_run_case+0x170/0x3f0
[   57.887164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.887187]  kthread+0x328/0x630
[   57.887200]  ret_from_fork+0x10/0x20
[   57.887217] 
[   57.962658] Allocated by task 370:
[   57.966115]  kasan_save_stack+0x3c/0x68
[   57.970014]  kasan_save_track+0x20/0x40
[   57.973912]  kasan_save_alloc_info+0x40/0x58
[   57.978251]  __kasan_kmalloc+0xd4/0xd8
[   57.982061]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.986664]  kasan_bitops_generic+0xa0/0x1c8
[   57.991008]  kunit_try_run_case+0x170/0x3f0
[   57.995266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.000828]  kthread+0x328/0x630
[   58.004115]  ret_from_fork+0x10/0x20
[   58.007752] 
[   58.009276] The buggy address belongs to the object at ffff000098190200
[   58.009276]  which belongs to the cache kmalloc-16 of size 16
[   58.021758] The buggy address is located 8 bytes inside of
[   58.021758]  allocated 9-byte region [ffff000098190200, ffff000098190209)
[   58.034159] 
[   58.035684] The buggy address belongs to the physical page:
[   58.041333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190
[   58.049431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.056041] page_type: f5(slab)
[   58.059242] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   58.067084] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.074920] page dumped because: kasan: bad access detected
[   58.080569] 
[   58.082093] Memory state around the buggy address:
[   58.086950]  ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.094266]  ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.101581] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.108894]                       ^
[   58.112438]  ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.119753]  ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.127066] ==================================================================
[   57.319272] ==================================================================
[   57.326589] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   57.335658] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370
[   57.343149] 
[   57.344675] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   57.344703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.344712] Hardware name: Thundercomm Dragonboard 845c (DT)
[   57.344724] Call trace:
[   57.344729]  show_stack+0x20/0x38 (C)
[   57.344747]  dump_stack_lvl+0x8c/0xd0
[   57.344767]  print_report+0x118/0x608
[   57.344787]  kasan_report+0xdc/0x128
[   57.344805]  kasan_check_range+0x100/0x1a8
[   57.344824]  __kasan_check_write+0x20/0x30
[   57.344840]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   57.344860]  kasan_bitops_generic+0x11c/0x1c8
[   57.344879]  kunit_try_run_case+0x170/0x3f0
[   57.344896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.344917]  kthread+0x328/0x630
[   57.344931]  ret_from_fork+0x10/0x20
[   57.344947] 
[   57.420392] Allocated by task 370:
[   57.423852]  kasan_save_stack+0x3c/0x68
[   57.427751]  kasan_save_track+0x20/0x40
[   57.431651]  kasan_save_alloc_info+0x40/0x58
[   57.435991]  __kasan_kmalloc+0xd4/0xd8
[   57.439801]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.444405]  kasan_bitops_generic+0xa0/0x1c8
[   57.448748]  kunit_try_run_case+0x170/0x3f0
[   57.453003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.458575]  kthread+0x328/0x630
[   57.461862]  ret_from_fork+0x10/0x20
[   57.465499] 
[   57.467024] The buggy address belongs to the object at ffff000098190200
[   57.467024]  which belongs to the cache kmalloc-16 of size 16
[   57.479507] The buggy address is located 8 bytes inside of
[   57.479507]  allocated 9-byte region [ffff000098190200, ffff000098190209)
[   57.491906] 
[   57.493430] The buggy address belongs to the physical page:
[   57.499080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190
[   57.507180] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.513791] page_type: f5(slab)
[   57.516991] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   57.524831] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   57.532665] page dumped because: kasan: bad access detected
[   57.538315] 
[   57.539838] Memory state around the buggy address:
[   57.544696]  ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.552013]  ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.559328] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.566640]                       ^
[   57.570185]  ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.577499]  ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.584811] ==================================================================
[   57.592191] ==================================================================
[   57.599505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   57.608576] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370
[   57.615982] 
[   57.617508] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   57.617538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.617546] Hardware name: Thundercomm Dragonboard 845c (DT)
[   57.617557] Call trace:
[   57.617562]  show_stack+0x20/0x38 (C)
[   57.617580]  dump_stack_lvl+0x8c/0xd0
[   57.617598]  print_report+0x118/0x608
[   57.617616]  kasan_report+0xdc/0x128
[   57.617635]  __asan_report_load8_noabort+0x20/0x30
[   57.617650]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   57.617672]  kasan_bitops_generic+0x11c/0x1c8
[   57.617689]  kunit_try_run_case+0x170/0x3f0
[   57.617707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.617727]  kthread+0x328/0x630
[   57.617740]  ret_from_fork+0x10/0x20
[   57.617757] 
[   57.689768] Allocated by task 370:
[   57.693225]  kasan_save_stack+0x3c/0x68
[   57.697126]  kasan_save_track+0x20/0x40
[   57.701027]  kasan_save_alloc_info+0x40/0x58
[   57.705368]  __kasan_kmalloc+0xd4/0xd8
[   57.709179]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.713783]  kasan_bitops_generic+0xa0/0x1c8
[   57.718126]  kunit_try_run_case+0x170/0x3f0
[   57.722383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.727943]  kthread+0x328/0x630
[   57.731230]  ret_from_fork+0x10/0x20
[   57.734865] 
[   57.736390] The buggy address belongs to the object at ffff000098190200
[   57.736390]  which belongs to the cache kmalloc-16 of size 16
[   57.748873] The buggy address is located 8 bytes inside of
[   57.748873]  allocated 9-byte region [ffff000098190200, ffff000098190209)
[   57.761271] 
[   57.762795] The buggy address belongs to the physical page:
[   57.768443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190
[   57.776542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.783153] page_type: f5(slab)
[   57.786355] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   57.794195] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   57.802033] page dumped because: kasan: bad access detected
[   57.807681] 
[   57.809204] Memory state around the buggy address:
[   57.814061]  ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.821375]  ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.828688] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.835999]                       ^
[   57.839543]  ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.846858]  ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.854170] ==================================================================
[   56.777168] ==================================================================
[   56.784483] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   56.793464] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370
[   56.800956] 
[   56.802481] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   56.802513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.802521] Hardware name: Thundercomm Dragonboard 845c (DT)
[   56.802533] Call trace:
[   56.802540]  show_stack+0x20/0x38 (C)
[   56.802558]  dump_stack_lvl+0x8c/0xd0
[   56.802577]  print_report+0x118/0x608
[   56.802596]  kasan_report+0xdc/0x128
[   56.802614]  kasan_check_range+0x100/0x1a8
[   56.802635]  __kasan_check_write+0x20/0x30
[   56.802651]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   56.802675]  kasan_bitops_generic+0x11c/0x1c8
[   56.802694]  kunit_try_run_case+0x170/0x3f0
[   56.802713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.802733]  kthread+0x328/0x630
[   56.802748]  ret_from_fork+0x10/0x20
[   56.802766] 
[   56.878134] Allocated by task 370:
[   56.881592]  kasan_save_stack+0x3c/0x68
[   56.885493]  kasan_save_track+0x20/0x40
[   56.889392]  kasan_save_alloc_info+0x40/0x58
[   56.893733]  __kasan_kmalloc+0xd4/0xd8
[   56.897545]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.902146]  kasan_bitops_generic+0xa0/0x1c8
[   56.906488]  kunit_try_run_case+0x170/0x3f0
[   56.910745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.916306]  kthread+0x328/0x630
[   56.919593]  ret_from_fork+0x10/0x20
[   56.923231] 
[   56.924755] The buggy address belongs to the object at ffff000098190200
[   56.924755]  which belongs to the cache kmalloc-16 of size 16
[   56.937236] The buggy address is located 8 bytes inside of
[   56.937236]  allocated 9-byte region [ffff000098190200, ffff000098190209)
[   56.949636] 
[   56.951161] The buggy address belongs to the physical page:
[   56.956809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190
[   56.964910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.971520] page_type: f5(slab)
[   56.974720] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   56.982560] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   56.990394] page dumped because: kasan: bad access detected
[   56.996043] 
[   56.997567] Memory state around the buggy address:
[   57.002427]  ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.009743]  ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.017056] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.024370]                       ^
[   57.027914]  ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.035230]  ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.042543] ==================================================================
[   58.134445] ==================================================================
[   58.141761] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   58.150830] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370
[   58.158236] 
[   58.159762] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   58.159792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.159801] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.159812] Call trace:
[   58.159817]  show_stack+0x20/0x38 (C)
[   58.159834]  dump_stack_lvl+0x8c/0xd0
[   58.159853]  print_report+0x118/0x608
[   58.159872]  kasan_report+0xdc/0x128
[   58.159890]  __asan_report_load8_noabort+0x20/0x30
[   58.159907]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   58.159929]  kasan_bitops_generic+0x11c/0x1c8
[   58.159948]  kunit_try_run_case+0x170/0x3f0
[   58.159965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.159986]  kthread+0x328/0x630
[   58.160000]  ret_from_fork+0x10/0x20
[   58.160017] 
[   58.232025] Allocated by task 370:
[   58.235484]  kasan_save_stack+0x3c/0x68
[   58.239385]  kasan_save_track+0x20/0x40
[   58.243284]  kasan_save_alloc_info+0x40/0x58
[   58.247624]  __kasan_kmalloc+0xd4/0xd8
[   58.251435]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.256039]  kasan_bitops_generic+0xa0/0x1c8
[   58.260383]  kunit_try_run_case+0x170/0x3f0
[   58.264640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.270213]  kthread+0x328/0x630
[   58.273502]  ret_from_fork+0x10/0x20
[   58.277139] 
[   58.278662] The buggy address belongs to the object at ffff000098190200
[   58.278662]  which belongs to the cache kmalloc-16 of size 16
[   58.291144] The buggy address is located 8 bytes inside of
[   58.291144]  allocated 9-byte region [ffff000098190200, ffff000098190209)
[   58.303544] 
[   58.305069] The buggy address belongs to the physical page:
[   58.310718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190
[   58.318817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.325427] page_type: f5(slab)
[   58.328627] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   58.336464] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.344300] page dumped because: kasan: bad access detected
[   58.349950] 
[   58.351474] Memory state around the buggy address:
[   58.356333]  ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.363649]  ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.370963] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.378275]                       ^
[   58.381819]  ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.389134]  ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.396447] ==================================================================
[   57.049920] ==================================================================
[   57.057237] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   57.066305] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370
[   57.073712] 
[   57.075239] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   57.075269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.075278] Hardware name: Thundercomm Dragonboard 845c (DT)
[   57.075288] Call trace:
[   57.075294]  show_stack+0x20/0x38 (C)
[   57.075314]  dump_stack_lvl+0x8c/0xd0
[   57.075333]  print_report+0x118/0x608
[   57.075352]  kasan_report+0xdc/0x128
[   57.075370]  __asan_report_load8_noabort+0x20/0x30
[   57.075386]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   57.075408]  kasan_bitops_generic+0x11c/0x1c8
[   57.075427]  kunit_try_run_case+0x170/0x3f0
[   57.075446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.075468]  kthread+0x328/0x630
[   57.075481]  ret_from_fork+0x10/0x20
[   57.075498] 
[   57.147496] Allocated by task 370:
[   57.150954]  kasan_save_stack+0x3c/0x68
[   57.154856]  kasan_save_track+0x20/0x40
[   57.158756]  kasan_save_alloc_info+0x40/0x58
[   57.163097]  __kasan_kmalloc+0xd4/0xd8
[   57.166907]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.171510]  kasan_bitops_generic+0xa0/0x1c8
[   57.175855]  kunit_try_run_case+0x170/0x3f0
[   57.180110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.185674]  kthread+0x328/0x630
[   57.188961]  ret_from_fork+0x10/0x20
[   57.192598] 
[   57.194122] The buggy address belongs to the object at ffff000098190200
[   57.194122]  which belongs to the cache kmalloc-16 of size 16
[   57.206606] The buggy address is located 8 bytes inside of
[   57.206606]  allocated 9-byte region [ffff000098190200, ffff000098190209)
[   57.219004] 
[   57.220528] The buggy address belongs to the physical page:
[   57.226178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190
[   57.234276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.240886] page_type: f5(slab)
[   57.244087] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   57.251925] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   57.259762] page dumped because: kasan: bad access detected
[   57.265410] 
[   57.266933] Memory state around the buggy address:
[   57.271791]  ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.279105]  ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.286421] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.293733]                       ^
[   57.297278]  ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.304592]  ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.311906] ==================================================================
[   58.403814] ==================================================================
[   58.411129] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   58.420195] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370
[   58.427686] 
[   58.429212] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   58.429239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.429248] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.429258] Call trace:
[   58.429264]  show_stack+0x20/0x38 (C)
[   58.429282]  dump_stack_lvl+0x8c/0xd0
[   58.429301]  print_report+0x118/0x608
[   58.429320]  kasan_report+0xdc/0x128
[   58.429337]  kasan_check_range+0x100/0x1a8
[   58.429357]  __kasan_check_write+0x20/0x30
[   58.429373]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   58.429395]  kasan_bitops_generic+0x11c/0x1c8
[   58.429413]  kunit_try_run_case+0x170/0x3f0
[   58.429431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.429452]  kthread+0x328/0x630
[   58.429466]  ret_from_fork+0x10/0x20
[   58.429485] 
[   58.504918] Allocated by task 370:
[   58.508375]  kasan_save_stack+0x3c/0x68
[   58.512274]  kasan_save_track+0x20/0x40
[   58.516174]  kasan_save_alloc_info+0x40/0x58
[   58.520514]  __kasan_kmalloc+0xd4/0xd8
[   58.524325]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.528928]  kasan_bitops_generic+0xa0/0x1c8
[   58.533272]  kunit_try_run_case+0x170/0x3f0
[   58.537528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.543100]  kthread+0x328/0x630
[   58.546388]  ret_from_fork+0x10/0x20
[   58.550024] 
[   58.551548] The buggy address belongs to the object at ffff000098190200
[   58.551548]  which belongs to the cache kmalloc-16 of size 16
[   58.564032] The buggy address is located 8 bytes inside of
[   58.564032]  allocated 9-byte region [ffff000098190200, ffff000098190209)
[   58.576431] 
[   58.577955] The buggy address belongs to the physical page:
[   58.583603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190
[   58.591702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.598313] page_type: f5(slab)
[   58.601514] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   58.609354] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.617188] page dumped because: kasan: bad access detected
[   58.622837] 
[   58.624361] Memory state around the buggy address:
[   58.629218]  ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.636533]  ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.643847] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.651160]                       ^
[   58.654706]  ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.662021]  ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.669334] ==================================================================
[   58.676712] ==================================================================
[   58.684026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   58.693094] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370
[   58.700499] 
[   58.702026] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   58.702056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.702064] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.702075] Call trace:
[   58.702081]  show_stack+0x20/0x38 (C)
[   58.702098]  dump_stack_lvl+0x8c/0xd0
[   58.702118]  print_report+0x118/0x608
[   58.702137]  kasan_report+0xdc/0x128
[   58.702155]  __asan_report_load8_noabort+0x20/0x30
[   58.702171]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   58.702193]  kasan_bitops_generic+0x11c/0x1c8
[   58.702211]  kunit_try_run_case+0x170/0x3f0
[   58.702229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.702250]  kthread+0x328/0x630
[   58.702263]  ret_from_fork+0x10/0x20
[   58.702280] 
[   58.774303] Allocated by task 370:
[   58.777760]  kasan_save_stack+0x3c/0x68
[   58.781659]  kasan_save_track+0x20/0x40
[   58.785559]  kasan_save_alloc_info+0x40/0x58
[   58.789898]  __kasan_kmalloc+0xd4/0xd8
[   58.793711]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.798316]  kasan_bitops_generic+0xa0/0x1c8
[   58.802659]  kunit_try_run_case+0x170/0x3f0
[   58.806916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.812476]  kthread+0x328/0x630
[   58.815764]  ret_from_fork+0x10/0x20
[   58.819402] 
[   58.820927] The buggy address belongs to the object at ffff000098190200
[   58.820927]  which belongs to the cache kmalloc-16 of size 16
[   58.833408] The buggy address is located 8 bytes inside of
[   58.833408]  allocated 9-byte region [ffff000098190200, ffff000098190209)
[   58.845806] 
[   58.847332] The buggy address belongs to the physical page:
[   58.852979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190
[   58.861078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.867688] page_type: f5(slab)
[   58.870891] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   58.878729] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.886563] page dumped because: kasan: bad access detected
[   58.892212] 
[   58.893737] Memory state around the buggy address:
[   58.898594]  ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.905909]  ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.913226] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.920539]                       ^
[   58.924084]  ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.931400]  ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.938711] ==================================================================
[   58.946076] ==================================================================
[   58.953391] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   58.962460] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370
[   58.969862] 
[   58.971390] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   58.971419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.971427] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.971437] Call trace:
[   58.971444]  show_stack+0x20/0x38 (C)
[   58.971462]  dump_stack_lvl+0x8c/0xd0
[   58.971480]  print_report+0x118/0x608
[   58.971499]  kasan_report+0xdc/0x128
[   58.971516]  __asan_report_load8_noabort+0x20/0x30
[   58.971533]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   58.971555]  kasan_bitops_generic+0x11c/0x1c8
[   58.971572]  kunit_try_run_case+0x170/0x3f0
[   58.971589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.971610]  kthread+0x328/0x630
[   58.971623]  ret_from_fork+0x10/0x20
[   58.971640] 
[   59.043645] Allocated by task 370:
[   59.047103]  kasan_save_stack+0x3c/0x68
[   59.051003]  kasan_save_track+0x20/0x40
[   59.054901]  kasan_save_alloc_info+0x40/0x58
[   59.059241]  __kasan_kmalloc+0xd4/0xd8
[   59.063053]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.067656]  kasan_bitops_generic+0xa0/0x1c8
[   59.071998]  kunit_try_run_case+0x170/0x3f0
[   59.076252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.081822]  kthread+0x328/0x630
[   59.085108]  ret_from_fork+0x10/0x20
[   59.088744] 
[   59.090268] The buggy address belongs to the object at ffff000098190200
[   59.090268]  which belongs to the cache kmalloc-16 of size 16
[   59.102752] The buggy address is located 8 bytes inside of
[   59.102752]  allocated 9-byte region [ffff000098190200, ffff000098190209)
[   59.115149] 
[   59.116674] The buggy address belongs to the physical page:
[   59.122323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190
[   59.130422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.137031] page_type: f5(slab)
[   59.140233] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   59.148073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.155909] page dumped because: kasan: bad access detected
[   59.161558] 
[   59.163082] Memory state around the buggy address:
[   59.167940]  ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.175256]  ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.182572] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.189884]                       ^
[   59.193429]  ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.200743]  ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.208057] ==================================================================

[   33.441756] ==================================================================
[   33.443092] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   33.443153] Read of size 8 at addr fff00000c5a30ce8 by task kunit_try_catch/293
[   33.443206] 
[   33.443399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.444640]  kasan_bitops_generic+0x11c/0x1c8
[   33.446228]  kasan_save_track+0x20/0x40
[   33.447483] 
[   33.448573] page_type: f5(slab)
[   33.449445]  fff00000c5a30b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.450225]  fff00000c5a30d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.451940] ==================================================================

[   25.433334] ==================================================================
[   25.433772] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.434245] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310
[   25.434496] 
[   25.434576] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.434621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.434634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.434655] Call Trace:
[   25.434666]  <TASK>
[   25.434680]  dump_stack_lvl+0x73/0xb0
[   25.434707]  print_report+0xd1/0x650
[   25.434728]  ? __virt_addr_valid+0x1db/0x2d0
[   25.434751]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.434777]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.434802]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.434829]  kasan_report+0x141/0x180
[   25.434850]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.434881]  kasan_check_range+0x10c/0x1c0
[   25.434905]  __kasan_check_write+0x18/0x20
[   25.434927]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   25.434954]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.434982]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.435005]  ? trace_hardirqs_on+0x37/0xe0
[   25.435026]  ? kasan_bitops_generic+0x92/0x1c0
[   25.435052]  kasan_bitops_generic+0x121/0x1c0
[   25.435076]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.435100]  ? __pfx_read_tsc+0x10/0x10
[   25.435121]  ? ktime_get_ts64+0x86/0x230
[   25.435145]  kunit_try_run_case+0x1a5/0x480
[   25.435302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.435326]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.435347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.435374]  ? __kthread_parkme+0x82/0x180
[   25.435395]  ? preempt_count_sub+0x50/0x80
[   25.435419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.435444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.435483]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.435507]  kthread+0x337/0x6f0
[   25.435527]  ? trace_preempt_on+0x20/0xc0
[   25.435549]  ? __pfx_kthread+0x10/0x10
[   25.435571]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.435593]  ? calculate_sigpending+0x7b/0xa0
[   25.435618]  ? __pfx_kthread+0x10/0x10
[   25.435640]  ret_from_fork+0x116/0x1d0
[   25.435659]  ? __pfx_kthread+0x10/0x10
[   25.435681]  ret_from_fork_asm+0x1a/0x30
[   25.435711]  </TASK>
[   25.435722] 
[   25.444100] Allocated by task 310:
[   25.444223]  kasan_save_stack+0x45/0x70
[   25.444364]  kasan_save_track+0x18/0x40
[   25.444685]  kasan_save_alloc_info+0x3b/0x50
[   25.444891]  __kasan_kmalloc+0xb7/0xc0
[   25.445074]  __kmalloc_cache_noprof+0x189/0x420
[   25.445285]  kasan_bitops_generic+0x92/0x1c0
[   25.445512]  kunit_try_run_case+0x1a5/0x480
[   25.445719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.445979]  kthread+0x337/0x6f0
[   25.446145]  ret_from_fork+0x116/0x1d0
[   25.446328]  ret_from_fork_asm+0x1a/0x30
[   25.447737] 
[   25.448142] The buggy address belongs to the object at ffff888104b06e60
[   25.448142]  which belongs to the cache kmalloc-16 of size 16
[   25.449575] The buggy address is located 8 bytes inside of
[   25.449575]  allocated 9-byte region [ffff888104b06e60, ffff888104b06e69)
[   25.450911] 
[   25.451220] The buggy address belongs to the physical page:
[   25.451832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06
[   25.452630] flags: 0x200000000000000(node=0|zone=2)
[   25.452811] page_type: f5(slab)
[   25.452930] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.453162] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.453386] page dumped because: kasan: bad access detected
[   25.453708] 
[   25.453879] Memory state around the buggy address:
[   25.454092]  ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.455010]  ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   25.455502] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.456104]                                                           ^
[   25.456511]  ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.456731]  ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.456940] ==================================================================
[   25.373361] ==================================================================
[   25.373747] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.374033] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310
[   25.374686] 
[   25.374807] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.374853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.374866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.374886] Call Trace:
[   25.374900]  <TASK>
[   25.374916]  dump_stack_lvl+0x73/0xb0
[   25.374943]  print_report+0xd1/0x650
[   25.374965]  ? __virt_addr_valid+0x1db/0x2d0
[   25.374989]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.375015]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.375041]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.375068]  kasan_report+0x141/0x180
[   25.375089]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.375121]  kasan_check_range+0x10c/0x1c0
[   25.375144]  __kasan_check_write+0x18/0x20
[   25.375167]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   25.375194]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.375222]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.375245]  ? trace_hardirqs_on+0x37/0xe0
[   25.375265]  ? kasan_bitops_generic+0x92/0x1c0
[   25.375293]  kasan_bitops_generic+0x121/0x1c0
[   25.375316]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.375340]  ? __pfx_read_tsc+0x10/0x10
[   25.375362]  ? ktime_get_ts64+0x86/0x230
[   25.375385]  kunit_try_run_case+0x1a5/0x480
[   25.375410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.375434]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.375469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.375496]  ? __kthread_parkme+0x82/0x180
[   25.375516]  ? preempt_count_sub+0x50/0x80
[   25.375539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.375564]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.375588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.375677]  kthread+0x337/0x6f0
[   25.375703]  ? trace_preempt_on+0x20/0xc0
[   25.375726]  ? __pfx_kthread+0x10/0x10
[   25.375747]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.375771]  ? calculate_sigpending+0x7b/0xa0
[   25.375795]  ? __pfx_kthread+0x10/0x10
[   25.375817]  ret_from_fork+0x116/0x1d0
[   25.375836]  ? __pfx_kthread+0x10/0x10
[   25.375857]  ret_from_fork_asm+0x1a/0x30
[   25.375887]  </TASK>
[   25.375899] 
[   25.385729] Allocated by task 310:
[   25.385913]  kasan_save_stack+0x45/0x70
[   25.386074]  kasan_save_track+0x18/0x40
[   25.386300]  kasan_save_alloc_info+0x3b/0x50
[   25.386514]  __kasan_kmalloc+0xb7/0xc0
[   25.386685]  __kmalloc_cache_noprof+0x189/0x420
[   25.386885]  kasan_bitops_generic+0x92/0x1c0
[   25.387065]  kunit_try_run_case+0x1a5/0x480
[   25.387266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.387502]  kthread+0x337/0x6f0
[   25.387641]  ret_from_fork+0x116/0x1d0
[   25.387803]  ret_from_fork_asm+0x1a/0x30
[   25.387970] 
[   25.388050] The buggy address belongs to the object at ffff888104b06e60
[   25.388050]  which belongs to the cache kmalloc-16 of size 16
[   25.388487] The buggy address is located 8 bytes inside of
[   25.388487]  allocated 9-byte region [ffff888104b06e60, ffff888104b06e69)
[   25.388881] 
[   25.388968] The buggy address belongs to the physical page:
[   25.389207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06
[   25.389560] flags: 0x200000000000000(node=0|zone=2)
[   25.390067] page_type: f5(slab)
[   25.390426] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.390720] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.390999] page dumped because: kasan: bad access detected
[   25.391390] 
[   25.391484] Memory state around the buggy address:
[   25.391687]  ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.391955]  ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   25.392261] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.392520]                                                           ^
[   25.392785]  ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.393047]  ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.393353] ==================================================================
[   25.354357] ==================================================================
[   25.354702] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.355003] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310
[   25.355414] 
[   25.355505] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.355549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.355561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.355582] Call Trace:
[   25.355595]  <TASK>
[   25.355610]  dump_stack_lvl+0x73/0xb0
[   25.355636]  print_report+0xd1/0x650
[   25.355657]  ? __virt_addr_valid+0x1db/0x2d0
[   25.355679]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.355705]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.355730]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.355757]  kasan_report+0x141/0x180
[   25.355778]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.355809]  kasan_check_range+0x10c/0x1c0
[   25.355832]  __kasan_check_write+0x18/0x20
[   25.355854]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   25.355882]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.355909]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.355932]  ? trace_hardirqs_on+0x37/0xe0
[   25.355952]  ? kasan_bitops_generic+0x92/0x1c0
[   25.355979]  kasan_bitops_generic+0x121/0x1c0
[   25.356001]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.356026]  ? __pfx_read_tsc+0x10/0x10
[   25.356047]  ? ktime_get_ts64+0x86/0x230
[   25.356070]  kunit_try_run_case+0x1a5/0x480
[   25.356095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.356118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.356139]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.356164]  ? __kthread_parkme+0x82/0x180
[   25.356185]  ? preempt_count_sub+0x50/0x80
[   25.356208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.356232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.356256]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.356280]  kthread+0x337/0x6f0
[   25.356299]  ? trace_preempt_on+0x20/0xc0
[   25.356321]  ? __pfx_kthread+0x10/0x10
[   25.356342]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.356365]  ? calculate_sigpending+0x7b/0xa0
[   25.356389]  ? __pfx_kthread+0x10/0x10
[   25.356411]  ret_from_fork+0x116/0x1d0
[   25.356430]  ? __pfx_kthread+0x10/0x10
[   25.356450]  ret_from_fork_asm+0x1a/0x30
[   25.356491]  </TASK>
[   25.356502] 
[   25.364982] Allocated by task 310:
[   25.365156]  kasan_save_stack+0x45/0x70
[   25.365352]  kasan_save_track+0x18/0x40
[   25.365544]  kasan_save_alloc_info+0x3b/0x50
[   25.365746]  __kasan_kmalloc+0xb7/0xc0
[   25.366254]  __kmalloc_cache_noprof+0x189/0x420
[   25.366496]  kasan_bitops_generic+0x92/0x1c0
[   25.366643]  kunit_try_run_case+0x1a5/0x480
[   25.366784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.366951]  kthread+0x337/0x6f0
[   25.367108]  ret_from_fork+0x116/0x1d0
[   25.367554]  ret_from_fork_asm+0x1a/0x30
[   25.367763] 
[   25.367853] The buggy address belongs to the object at ffff888104b06e60
[   25.367853]  which belongs to the cache kmalloc-16 of size 16
[   25.368623] The buggy address is located 8 bytes inside of
[   25.368623]  allocated 9-byte region [ffff888104b06e60, ffff888104b06e69)
[   25.369080] 
[   25.369156] The buggy address belongs to the physical page:
[   25.369474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06
[   25.369782] flags: 0x200000000000000(node=0|zone=2)
[   25.369982] page_type: f5(slab)
[   25.370148] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.370620] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.370902] page dumped because: kasan: bad access detected
[   25.371066] 
[   25.371215] Memory state around the buggy address:
[   25.371443]  ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.371736]  ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   25.371945] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.372151]                                                           ^
[   25.372344]  ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.372617]  ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.372924] ==================================================================
[   25.488530] ==================================================================
[   25.488892] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.489490] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310
[   25.489795] 
[   25.489907] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.489963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.489975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.489996] Call Trace:
[   25.490014]  <TASK>
[   25.490040]  dump_stack_lvl+0x73/0xb0
[   25.490069]  print_report+0xd1/0x650
[   25.490091]  ? __virt_addr_valid+0x1db/0x2d0
[   25.490114]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.490150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.490178]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.490219]  kasan_report+0x141/0x180
[   25.490245]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.490279]  kasan_check_range+0x10c/0x1c0
[   25.490303]  __kasan_check_write+0x18/0x20
[   25.490327]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   25.490354]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.490382]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.490494]  ? trace_hardirqs_on+0x37/0xe0
[   25.490517]  ? kasan_bitops_generic+0x92/0x1c0
[   25.490546]  kasan_bitops_generic+0x121/0x1c0
[   25.490570]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.490594]  ? __pfx_read_tsc+0x10/0x10
[   25.490616]  ? ktime_get_ts64+0x86/0x230
[   25.490641]  kunit_try_run_case+0x1a5/0x480
[   25.490667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.490690]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.490712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.490738]  ? __kthread_parkme+0x82/0x180
[   25.490759]  ? preempt_count_sub+0x50/0x80
[   25.490782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.490807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.490831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.490855]  kthread+0x337/0x6f0
[   25.490885]  ? trace_preempt_on+0x20/0xc0
[   25.490907]  ? __pfx_kthread+0x10/0x10
[   25.490928]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.490962]  ? calculate_sigpending+0x7b/0xa0
[   25.490987]  ? __pfx_kthread+0x10/0x10
[   25.491009]  ret_from_fork+0x116/0x1d0
[   25.491028]  ? __pfx_kthread+0x10/0x10
[   25.491050]  ret_from_fork_asm+0x1a/0x30
[   25.491082]  </TASK>
[   25.491093] 
[   25.506207] Allocated by task 310:
[   25.506344]  kasan_save_stack+0x45/0x70
[   25.506614]  kasan_save_track+0x18/0x40
[   25.506891]  kasan_save_alloc_info+0x3b/0x50
[   25.507100]  __kasan_kmalloc+0xb7/0xc0
[   25.507287]  __kmalloc_cache_noprof+0x189/0x420
[   25.507470]  kasan_bitops_generic+0x92/0x1c0
[   25.507778]  kunit_try_run_case+0x1a5/0x480
[   25.508013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.508471]  kthread+0x337/0x6f0
[   25.508684]  ret_from_fork+0x116/0x1d0
[   25.508838]  ret_from_fork_asm+0x1a/0x30
[   25.508971] 
[   25.509038] The buggy address belongs to the object at ffff888104b06e60
[   25.509038]  which belongs to the cache kmalloc-16 of size 16
[   25.509632] The buggy address is located 8 bytes inside of
[   25.509632]  allocated 9-byte region [ffff888104b06e60, ffff888104b06e69)
[   25.510152] 
[   25.510243] The buggy address belongs to the physical page:
[   25.510477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06
[   25.510781] flags: 0x200000000000000(node=0|zone=2)
[   25.511000] page_type: f5(slab)
[   25.511143] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.511443] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.511913] page dumped because: kasan: bad access detected
[   25.512087] 
[   25.512379] Memory state around the buggy address:
[   25.512620]  ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.512935]  ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   25.513341] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.513676]                                                           ^
[   25.513955]  ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.514366]  ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.514672] ==================================================================
[   25.414228] ==================================================================
[   25.414586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.414939] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310
[   25.415482] 
[   25.415572] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.415618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.415630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.415650] Call Trace:
[   25.415666]  <TASK>
[   25.415681]  dump_stack_lvl+0x73/0xb0
[   25.415710]  print_report+0xd1/0x650
[   25.415732]  ? __virt_addr_valid+0x1db/0x2d0
[   25.415754]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.415781]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.415806]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.415833]  kasan_report+0x141/0x180
[   25.415855]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.415887]  kasan_check_range+0x10c/0x1c0
[   25.415910]  __kasan_check_write+0x18/0x20
[   25.415933]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   25.415960]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.415987]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.416011]  ? trace_hardirqs_on+0x37/0xe0
[   25.416032]  ? kasan_bitops_generic+0x92/0x1c0
[   25.416059]  kasan_bitops_generic+0x121/0x1c0
[   25.416082]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.416107]  ? __pfx_read_tsc+0x10/0x10
[   25.416128]  ? ktime_get_ts64+0x86/0x230
[   25.416420]  kunit_try_run_case+0x1a5/0x480
[   25.416448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.416486]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.416508]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.416534]  ? __kthread_parkme+0x82/0x180
[   25.416555]  ? preempt_count_sub+0x50/0x80
[   25.416580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.416605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.416629]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.416653]  kthread+0x337/0x6f0
[   25.416673]  ? trace_preempt_on+0x20/0xc0
[   25.416695]  ? __pfx_kthread+0x10/0x10
[   25.416716]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.416740]  ? calculate_sigpending+0x7b/0xa0
[   25.416765]  ? __pfx_kthread+0x10/0x10
[   25.416787]  ret_from_fork+0x116/0x1d0
[   25.416806]  ? __pfx_kthread+0x10/0x10
[   25.416827]  ret_from_fork_asm+0x1a/0x30
[   25.416857]  </TASK>
[   25.416869] 
[   25.425098] Allocated by task 310:
[   25.425335]  kasan_save_stack+0x45/0x70
[   25.425516]  kasan_save_track+0x18/0x40
[   25.425694]  kasan_save_alloc_info+0x3b/0x50
[   25.425899]  __kasan_kmalloc+0xb7/0xc0
[   25.426074]  __kmalloc_cache_noprof+0x189/0x420
[   25.426394]  kasan_bitops_generic+0x92/0x1c0
[   25.426573]  kunit_try_run_case+0x1a5/0x480
[   25.426752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.426920]  kthread+0x337/0x6f0
[   25.427040]  ret_from_fork+0x116/0x1d0
[   25.427263]  ret_from_fork_asm+0x1a/0x30
[   25.427728] 
[   25.427834] The buggy address belongs to the object at ffff888104b06e60
[   25.427834]  which belongs to the cache kmalloc-16 of size 16
[   25.428272] The buggy address is located 8 bytes inside of
[   25.428272]  allocated 9-byte region [ffff888104b06e60, ffff888104b06e69)
[   25.428623] 
[   25.428688] The buggy address belongs to the physical page:
[   25.428872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06
[   25.429213] flags: 0x200000000000000(node=0|zone=2)
[   25.429430] page_type: f5(slab)
[   25.429690] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.430042] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.430309] page dumped because: kasan: bad access detected
[   25.430484] 
[   25.430547] Memory state around the buggy address:
[   25.430692]  ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.430898]  ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   25.431103] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.431920]                                                           ^
[   25.432227]  ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.432561]  ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.432876] ==================================================================
[   25.393758] ==================================================================
[   25.394056] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.394493] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310
[   25.395372] 
[   25.395642] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.395692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.395705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.395727] Call Trace:
[   25.395740]  <TASK>
[   25.395754]  dump_stack_lvl+0x73/0xb0
[   25.395782]  print_report+0xd1/0x650
[   25.395804]  ? __virt_addr_valid+0x1db/0x2d0
[   25.395826]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.395853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.395878]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.395905]  kasan_report+0x141/0x180
[   25.395928]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.396346]  kasan_check_range+0x10c/0x1c0
[   25.396379]  __kasan_check_write+0x18/0x20
[   25.396403]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   25.396430]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.396537]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.396562]  ? trace_hardirqs_on+0x37/0xe0
[   25.396638]  ? kasan_bitops_generic+0x92/0x1c0
[   25.396713]  kasan_bitops_generic+0x121/0x1c0
[   25.396739]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.396765]  ? __pfx_read_tsc+0x10/0x10
[   25.396836]  ? ktime_get_ts64+0x86/0x230
[   25.396861]  kunit_try_run_case+0x1a5/0x480
[   25.396886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.396910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.396931]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.396958]  ? __kthread_parkme+0x82/0x180
[   25.396979]  ? preempt_count_sub+0x50/0x80
[   25.397002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.397027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.397051]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.397076]  kthread+0x337/0x6f0
[   25.397099]  ? trace_preempt_on+0x20/0xc0
[   25.397125]  ? __pfx_kthread+0x10/0x10
[   25.397151]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.397177]  ? calculate_sigpending+0x7b/0xa0
[   25.397201]  ? __pfx_kthread+0x10/0x10
[   25.397247]  ret_from_fork+0x116/0x1d0
[   25.397275]  ? __pfx_kthread+0x10/0x10
[   25.397297]  ret_from_fork_asm+0x1a/0x30
[   25.397328]  </TASK>
[   25.397340] 
[   25.406124] Allocated by task 310:
[   25.406300]  kasan_save_stack+0x45/0x70
[   25.406517]  kasan_save_track+0x18/0x40
[   25.406697]  kasan_save_alloc_info+0x3b/0x50
[   25.406865]  __kasan_kmalloc+0xb7/0xc0
[   25.406994]  __kmalloc_cache_noprof+0x189/0x420
[   25.407221]  kasan_bitops_generic+0x92/0x1c0
[   25.407427]  kunit_try_run_case+0x1a5/0x480
[   25.407632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.407829]  kthread+0x337/0x6f0
[   25.407989]  ret_from_fork+0x116/0x1d0
[   25.408141]  ret_from_fork_asm+0x1a/0x30
[   25.408407] 
[   25.408500] The buggy address belongs to the object at ffff888104b06e60
[   25.408500]  which belongs to the cache kmalloc-16 of size 16
[   25.409084] The buggy address is located 8 bytes inside of
[   25.409084]  allocated 9-byte region [ffff888104b06e60, ffff888104b06e69)
[   25.409516] 
[   25.409585] The buggy address belongs to the physical page:
[   25.409750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06
[   25.409989] flags: 0x200000000000000(node=0|zone=2)
[   25.410207] page_type: f5(slab)
[   25.410367] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.410871] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.411147] page dumped because: kasan: bad access detected
[   25.411308] 
[   25.411370] Memory state around the buggy address:
[   25.411806]  ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.412133]  ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   25.412521] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.412805]                                                           ^
[   25.412999]  ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.413330]  ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.413665] ==================================================================
[   25.537556] ==================================================================
[   25.537885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.538390] Read of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310
[   25.538717] 
[   25.538816] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.538863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.538876] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.538897] Call Trace:
[   25.538910]  <TASK>
[   25.538925]  dump_stack_lvl+0x73/0xb0
[   25.538962]  print_report+0xd1/0x650
[   25.538985]  ? __virt_addr_valid+0x1db/0x2d0
[   25.539007]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.539045]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.539072]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.539099]  kasan_report+0x141/0x180
[   25.539121]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.539265]  __asan_report_load8_noabort+0x18/0x20
[   25.539302]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   25.539330]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.539370]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.539394]  ? trace_hardirqs_on+0x37/0xe0
[   25.539415]  ? kasan_bitops_generic+0x92/0x1c0
[   25.539443]  kasan_bitops_generic+0x121/0x1c0
[   25.539483]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.539508]  ? __pfx_read_tsc+0x10/0x10
[   25.539540]  ? ktime_get_ts64+0x86/0x230
[   25.539564]  kunit_try_run_case+0x1a5/0x480
[   25.539589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.539612]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.539642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.539669]  ? __kthread_parkme+0x82/0x180
[   25.539690]  ? preempt_count_sub+0x50/0x80
[   25.539724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.539748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.539773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.539798]  kthread+0x337/0x6f0
[   25.539818]  ? trace_preempt_on+0x20/0xc0
[   25.539840]  ? __pfx_kthread+0x10/0x10
[   25.539862]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.539885]  ? calculate_sigpending+0x7b/0xa0
[   25.539909]  ? __pfx_kthread+0x10/0x10
[   25.539940]  ret_from_fork+0x116/0x1d0
[   25.539960]  ? __pfx_kthread+0x10/0x10
[   25.539981]  ret_from_fork_asm+0x1a/0x30
[   25.540023]  </TASK>
[   25.540035] 
[   25.548635] Allocated by task 310:
[   25.548839]  kasan_save_stack+0x45/0x70
[   25.549024]  kasan_save_track+0x18/0x40
[   25.549308]  kasan_save_alloc_info+0x3b/0x50
[   25.549508]  __kasan_kmalloc+0xb7/0xc0
[   25.549703]  __kmalloc_cache_noprof+0x189/0x420
[   25.549926]  kasan_bitops_generic+0x92/0x1c0
[   25.550120]  kunit_try_run_case+0x1a5/0x480
[   25.550476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.550756]  kthread+0x337/0x6f0
[   25.550920]  ret_from_fork+0x116/0x1d0
[   25.551099]  ret_from_fork_asm+0x1a/0x30
[   25.551406] 
[   25.551523] The buggy address belongs to the object at ffff888104b06e60
[   25.551523]  which belongs to the cache kmalloc-16 of size 16
[   25.552056] The buggy address is located 8 bytes inside of
[   25.552056]  allocated 9-byte region [ffff888104b06e60, ffff888104b06e69)
[   25.552583] 
[   25.552686] The buggy address belongs to the physical page:
[   25.552963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06
[   25.553383] flags: 0x200000000000000(node=0|zone=2)
[   25.553557] page_type: f5(slab)
[   25.553720] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.554079] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.554592] page dumped because: kasan: bad access detected
[   25.554833] 
[   25.554900] Memory state around the buggy address:
[   25.555097]  ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.555528]  ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   25.555834] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.556252]                                                           ^
[   25.556550]  ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.556847]  ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.557231] ==================================================================
[   25.516261] ==================================================================
[   25.516576] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.517470] Read of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310
[   25.517764] 
[   25.517872] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.517918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.517930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.517951] Call Trace:
[   25.517963]  <TASK>
[   25.517988]  dump_stack_lvl+0x73/0xb0
[   25.518016]  print_report+0xd1/0x650
[   25.518038]  ? __virt_addr_valid+0x1db/0x2d0
[   25.518075]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.518102]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.518216]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.518249]  kasan_report+0x141/0x180
[   25.518272]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.518304]  kasan_check_range+0x10c/0x1c0
[   25.518327]  __kasan_check_read+0x15/0x20
[   25.518351]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   25.518378]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.518406]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.518429]  ? trace_hardirqs_on+0x37/0xe0
[   25.518450]  ? kasan_bitops_generic+0x92/0x1c0
[   25.518488]  kasan_bitops_generic+0x121/0x1c0
[   25.518511]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.518536]  ? __pfx_read_tsc+0x10/0x10
[   25.518557]  ? ktime_get_ts64+0x86/0x230
[   25.518581]  kunit_try_run_case+0x1a5/0x480
[   25.518605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.518628]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.518651]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.518678]  ? __kthread_parkme+0x82/0x180
[   25.518698]  ? preempt_count_sub+0x50/0x80
[   25.518722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.518746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.518771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.518796]  kthread+0x337/0x6f0
[   25.518816]  ? trace_preempt_on+0x20/0xc0
[   25.518838]  ? __pfx_kthread+0x10/0x10
[   25.518859]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.518884]  ? calculate_sigpending+0x7b/0xa0
[   25.518908]  ? __pfx_kthread+0x10/0x10
[   25.518931]  ret_from_fork+0x116/0x1d0
[   25.518950]  ? __pfx_kthread+0x10/0x10
[   25.518971]  ret_from_fork_asm+0x1a/0x30
[   25.519002]  </TASK>
[   25.519013] 
[   25.527998] Allocated by task 310:
[   25.528419]  kasan_save_stack+0x45/0x70
[   25.528635]  kasan_save_track+0x18/0x40
[   25.528823]  kasan_save_alloc_info+0x3b/0x50
[   25.529028]  __kasan_kmalloc+0xb7/0xc0
[   25.529369]  __kmalloc_cache_noprof+0x189/0x420
[   25.529595]  kasan_bitops_generic+0x92/0x1c0
[   25.529806]  kunit_try_run_case+0x1a5/0x480
[   25.530025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.530363]  kthread+0x337/0x6f0
[   25.530500]  ret_from_fork+0x116/0x1d0
[   25.530627]  ret_from_fork_asm+0x1a/0x30
[   25.530803] 
[   25.530890] The buggy address belongs to the object at ffff888104b06e60
[   25.530890]  which belongs to the cache kmalloc-16 of size 16
[   25.531538] The buggy address is located 8 bytes inside of
[   25.531538]  allocated 9-byte region [ffff888104b06e60, ffff888104b06e69)
[   25.531956] 
[   25.532047] The buggy address belongs to the physical page:
[   25.532524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06
[   25.532877] flags: 0x200000000000000(node=0|zone=2)
[   25.533091] page_type: f5(slab)
[   25.533406] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.533751] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.534067] page dumped because: kasan: bad access detected
[   25.534412] 
[   25.534520] Memory state around the buggy address:
[   25.534751]  ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.534998]  ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   25.535393] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.535773]                                                           ^
[   25.536065]  ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.536591]  ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.536933] ==================================================================
[   25.457353] ==================================================================
[   25.458020] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.459163] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310
[   25.459952] 
[   25.460127] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.460261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.460276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.460297] Call Trace:
[   25.460311]  <TASK>
[   25.460327]  dump_stack_lvl+0x73/0xb0
[   25.460355]  print_report+0xd1/0x650
[   25.460378]  ? __virt_addr_valid+0x1db/0x2d0
[   25.460412]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.460441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.460486]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.460512]  kasan_report+0x141/0x180
[   25.460534]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.460567]  kasan_check_range+0x10c/0x1c0
[   25.460589]  __kasan_check_write+0x18/0x20
[   25.460613]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   25.460640]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   25.460668]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.460691]  ? trace_hardirqs_on+0x37/0xe0
[   25.460713]  ? kasan_bitops_generic+0x92/0x1c0
[   25.460739]  kasan_bitops_generic+0x121/0x1c0
[   25.460762]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.460786]  ? __pfx_read_tsc+0x10/0x10
[   25.460808]  ? ktime_get_ts64+0x86/0x230
[   25.460832]  kunit_try_run_case+0x1a5/0x480
[   25.460856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.460879]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.460901]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.460927]  ? __kthread_parkme+0x82/0x180
[   25.460947]  ? preempt_count_sub+0x50/0x80
[   25.460970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.460994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.461018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.461042]  kthread+0x337/0x6f0
[   25.461061]  ? trace_preempt_on+0x20/0xc0
[   25.461083]  ? __pfx_kthread+0x10/0x10
[   25.461104]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.461128]  ? calculate_sigpending+0x7b/0xa0
[   25.461152]  ? __pfx_kthread+0x10/0x10
[   25.461233]  ret_from_fork+0x116/0x1d0
[   25.461253]  ? __pfx_kthread+0x10/0x10
[   25.461274]  ret_from_fork_asm+0x1a/0x30
[   25.461308]  </TASK>
[   25.461319] 
[   25.476723] Allocated by task 310:
[   25.476848]  kasan_save_stack+0x45/0x70
[   25.476993]  kasan_save_track+0x18/0x40
[   25.477122]  kasan_save_alloc_info+0x3b/0x50
[   25.477477]  __kasan_kmalloc+0xb7/0xc0
[   25.477941]  __kmalloc_cache_noprof+0x189/0x420
[   25.478374]  kasan_bitops_generic+0x92/0x1c0
[   25.478909]  kunit_try_run_case+0x1a5/0x480
[   25.479363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.480015]  kthread+0x337/0x6f0
[   25.480377]  ret_from_fork+0x116/0x1d0
[   25.480838]  ret_from_fork_asm+0x1a/0x30
[   25.481275] 
[   25.481555] The buggy address belongs to the object at ffff888104b06e60
[   25.481555]  which belongs to the cache kmalloc-16 of size 16
[   25.482729] The buggy address is located 8 bytes inside of
[   25.482729]  allocated 9-byte region [ffff888104b06e60, ffff888104b06e69)
[   25.483639] 
[   25.483719] The buggy address belongs to the physical page:
[   25.483890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06
[   25.484127] flags: 0x200000000000000(node=0|zone=2)
[   25.484289] page_type: f5(slab)
[   25.484543] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.484897] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.485150] page dumped because: kasan: bad access detected
[   25.485538] 
[   25.485627] Memory state around the buggy address:
[   25.485779]  ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.486088]  ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   25.486537] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.486899]                                                           ^
[   25.487104]  ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.487381]  ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.487690] ==================================================================