Hay
Date
July 4, 2025, 11:10 a.m.

Environment
qemu-x86_64

[   27.251428] ==================================================================
[   27.251770] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.252197] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.252626] 
[   27.252755] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.252811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.252825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.252850] Call Trace:
[   27.252871]  <TASK>
[   27.252893]  dump_stack_lvl+0x73/0xb0
[   27.252924]  print_report+0xd1/0x650
[   27.252949]  ? __virt_addr_valid+0x1db/0x2d0
[   27.252975]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.253002]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.253029]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.253056]  kasan_report+0x141/0x180
[   27.253079]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.253111]  kasan_check_range+0x10c/0x1c0
[   27.253136]  __kasan_check_write+0x18/0x20
[   27.253161]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.253188]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.253216]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.253243]  ? kasan_bitops_generic+0x92/0x1c0
[   27.253272]  kasan_bitops_generic+0x116/0x1c0
[   27.253297]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.253323]  ? __pfx_read_tsc+0x10/0x10
[   27.253346]  ? ktime_get_ts64+0x86/0x230
[   27.253373]  kunit_try_run_case+0x1a5/0x480
[   27.253412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.253437]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.253464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.253490]  ? __kthread_parkme+0x82/0x180
[   27.253513]  ? preempt_count_sub+0x50/0x80
[   27.253539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.253567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.253592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.253619]  kthread+0x337/0x6f0
[   27.253639]  ? trace_preempt_on+0x20/0xc0
[   27.253665]  ? __pfx_kthread+0x10/0x10
[   27.253687]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.253711]  ? calculate_sigpending+0x7b/0xa0
[   27.253737]  ? __pfx_kthread+0x10/0x10
[   27.253761]  ret_from_fork+0x116/0x1d0
[   27.253781]  ? __pfx_kthread+0x10/0x10
[   27.253804]  ret_from_fork_asm+0x1a/0x30
[   27.253837]  </TASK>
[   27.253850] 
[   27.262535] Allocated by task 310:
[   27.262683]  kasan_save_stack+0x45/0x70
[   27.262834]  kasan_save_track+0x18/0x40
[   27.262995]  kasan_save_alloc_info+0x3b/0x50
[   27.263212]  __kasan_kmalloc+0xb7/0xc0
[   27.263484]  __kmalloc_cache_noprof+0x189/0x420
[   27.263808]  kasan_bitops_generic+0x92/0x1c0
[   27.264042]  kunit_try_run_case+0x1a5/0x480
[   27.264208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.264484]  kthread+0x337/0x6f0
[   27.264642]  ret_from_fork+0x116/0x1d0
[   27.264828]  ret_from_fork_asm+0x1a/0x30
[   27.265103] 
[   27.265239] The buggy address belongs to the object at ffff88810527f2e0
[   27.265239]  which belongs to the cache kmalloc-16 of size 16
[   27.266011] The buggy address is located 8 bytes inside of
[   27.266011]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.266543] 
[   27.266624] The buggy address belongs to the physical page:
[   27.266806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.267144] flags: 0x200000000000000(node=0|zone=2)
[   27.267387] page_type: f5(slab)
[   27.267738] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.268011] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.268256] page dumped because: kasan: bad access detected
[   27.268446] 
[   27.268515] Memory state around the buggy address:
[   27.268766]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.269368]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.269960] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.270502]                                                           ^
[   27.270776]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.271071]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.271571] ==================================================================
[   27.292504] ==================================================================
[   27.292871] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.293371] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.293714] 
[   27.293835] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.293889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.293903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.293949] Call Trace:
[   27.293969]  <TASK>
[   27.293990]  dump_stack_lvl+0x73/0xb0
[   27.294019]  print_report+0xd1/0x650
[   27.294043]  ? __virt_addr_valid+0x1db/0x2d0
[   27.294070]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.294097]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.294125]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.294368]  kasan_report+0x141/0x180
[   27.294408]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.294441]  kasan_check_range+0x10c/0x1c0
[   27.294468]  __kasan_check_write+0x18/0x20
[   27.294493]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.294521]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.294550]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.294576]  ? kasan_bitops_generic+0x92/0x1c0
[   27.294606]  kasan_bitops_generic+0x116/0x1c0
[   27.294632]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.294658]  ? __pfx_read_tsc+0x10/0x10
[   27.294682]  ? ktime_get_ts64+0x86/0x230
[   27.294709]  kunit_try_run_case+0x1a5/0x480
[   27.294737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.294762]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.294789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.294816]  ? __kthread_parkme+0x82/0x180
[   27.294838]  ? preempt_count_sub+0x50/0x80
[   27.294865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.294895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.294924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.294950]  kthread+0x337/0x6f0
[   27.294971]  ? trace_preempt_on+0x20/0xc0
[   27.294998]  ? __pfx_kthread+0x10/0x10
[   27.295021]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.295069]  ? calculate_sigpending+0x7b/0xa0
[   27.295096]  ? __pfx_kthread+0x10/0x10
[   27.295119]  ret_from_fork+0x116/0x1d0
[   27.295215]  ? __pfx_kthread+0x10/0x10
[   27.295241]  ret_from_fork_asm+0x1a/0x30
[   27.295277]  </TASK>
[   27.295290] 
[   27.303850] Allocated by task 310:
[   27.304027]  kasan_save_stack+0x45/0x70
[   27.304346]  kasan_save_track+0x18/0x40
[   27.304539]  kasan_save_alloc_info+0x3b/0x50
[   27.304695]  __kasan_kmalloc+0xb7/0xc0
[   27.304832]  __kmalloc_cache_noprof+0x189/0x420
[   27.305092]  kasan_bitops_generic+0x92/0x1c0
[   27.305383]  kunit_try_run_case+0x1a5/0x480
[   27.305615]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.305876]  kthread+0x337/0x6f0
[   27.306064]  ret_from_fork+0x116/0x1d0
[   27.306314]  ret_from_fork_asm+0x1a/0x30
[   27.306543] 
[   27.306641] The buggy address belongs to the object at ffff88810527f2e0
[   27.306641]  which belongs to the cache kmalloc-16 of size 16
[   27.307114] The buggy address is located 8 bytes inside of
[   27.307114]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.307616] 
[   27.307710] The buggy address belongs to the physical page:
[   27.307934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.308257] flags: 0x200000000000000(node=0|zone=2)
[   27.308445] page_type: f5(slab)
[   27.308572] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.308810] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.309082] page dumped because: kasan: bad access detected
[   27.309575] 
[   27.309678] Memory state around the buggy address:
[   27.309935]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.310333]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.310677] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.311003]                                                           ^
[   27.311342]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.311590]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.311804] ==================================================================
[   27.331513] ==================================================================
[   27.331849] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.332497] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.332834] 
[   27.332949] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.333003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.333016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.333040] Call Trace:
[   27.333061]  <TASK>
[   27.333083]  dump_stack_lvl+0x73/0xb0
[   27.333208]  print_report+0xd1/0x650
[   27.333238]  ? __virt_addr_valid+0x1db/0x2d0
[   27.333263]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.333289]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.333317]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.333343]  kasan_report+0x141/0x180
[   27.333366]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.333406]  kasan_check_range+0x10c/0x1c0
[   27.333431]  __kasan_check_write+0x18/0x20
[   27.333455]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.333480]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.333507]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.333534]  ? kasan_bitops_generic+0x92/0x1c0
[   27.333562]  kasan_bitops_generic+0x116/0x1c0
[   27.333585]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.333610]  ? __pfx_read_tsc+0x10/0x10
[   27.333632]  ? ktime_get_ts64+0x86/0x230
[   27.333659]  kunit_try_run_case+0x1a5/0x480
[   27.333685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.333711]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.333737]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.333764]  ? __kthread_parkme+0x82/0x180
[   27.333785]  ? preempt_count_sub+0x50/0x80
[   27.333810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.333836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.333861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.333887]  kthread+0x337/0x6f0
[   27.333908]  ? trace_preempt_on+0x20/0xc0
[   27.333953]  ? __pfx_kthread+0x10/0x10
[   27.333975]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.333998]  ? calculate_sigpending+0x7b/0xa0
[   27.334023]  ? __pfx_kthread+0x10/0x10
[   27.334045]  ret_from_fork+0x116/0x1d0
[   27.334066]  ? __pfx_kthread+0x10/0x10
[   27.334088]  ret_from_fork_asm+0x1a/0x30
[   27.334121]  </TASK>
[   27.334193] 
[   27.342547] Allocated by task 310:
[   27.342755]  kasan_save_stack+0x45/0x70
[   27.342969]  kasan_save_track+0x18/0x40
[   27.343234]  kasan_save_alloc_info+0x3b/0x50
[   27.343436]  __kasan_kmalloc+0xb7/0xc0
[   27.343593]  __kmalloc_cache_noprof+0x189/0x420
[   27.343817]  kasan_bitops_generic+0x92/0x1c0
[   27.344043]  kunit_try_run_case+0x1a5/0x480
[   27.344302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.344504]  kthread+0x337/0x6f0
[   27.344629]  ret_from_fork+0x116/0x1d0
[   27.344765]  ret_from_fork_asm+0x1a/0x30
[   27.344934] 
[   27.345006] The buggy address belongs to the object at ffff88810527f2e0
[   27.345006]  which belongs to the cache kmalloc-16 of size 16
[   27.345750] The buggy address is located 8 bytes inside of
[   27.345750]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.346474] 
[   27.346582] The buggy address belongs to the physical page:
[   27.346842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.347314] flags: 0x200000000000000(node=0|zone=2)
[   27.347579] page_type: f5(slab)
[   27.347759] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.348111] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.348512] page dumped because: kasan: bad access detected
[   27.348759] 
[   27.348831] Memory state around the buggy address:
[   27.349076]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.349691]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.349990] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.350281]                                                           ^
[   27.350551]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.350889]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.351144] ==================================================================
[   27.312333] ==================================================================
[   27.312692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.313099] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.313633] 
[   27.313759] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.313812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.313825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.313849] Call Trace:
[   27.313869]  <TASK>
[   27.313888]  dump_stack_lvl+0x73/0xb0
[   27.313917]  print_report+0xd1/0x650
[   27.313940]  ? __virt_addr_valid+0x1db/0x2d0
[   27.313966]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.313991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.314017]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.314068]  kasan_report+0x141/0x180
[   27.314091]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.314120]  kasan_check_range+0x10c/0x1c0
[   27.314218]  __kasan_check_write+0x18/0x20
[   27.314244]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.314270]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.314296]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.314320]  ? kasan_bitops_generic+0x92/0x1c0
[   27.314348]  kasan_bitops_generic+0x116/0x1c0
[   27.314370]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.314405]  ? __pfx_read_tsc+0x10/0x10
[   27.314427]  ? ktime_get_ts64+0x86/0x230
[   27.314453]  kunit_try_run_case+0x1a5/0x480
[   27.314479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.314503]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.314529]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.314554]  ? __kthread_parkme+0x82/0x180
[   27.314576]  ? preempt_count_sub+0x50/0x80
[   27.314600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.314626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.314650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.314675]  kthread+0x337/0x6f0
[   27.314696]  ? trace_preempt_on+0x20/0xc0
[   27.314720]  ? __pfx_kthread+0x10/0x10
[   27.314743]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.314766]  ? calculate_sigpending+0x7b/0xa0
[   27.314790]  ? __pfx_kthread+0x10/0x10
[   27.314812]  ret_from_fork+0x116/0x1d0
[   27.314831]  ? __pfx_kthread+0x10/0x10
[   27.314852]  ret_from_fork_asm+0x1a/0x30
[   27.314884]  </TASK>
[   27.314896] 
[   27.322751] Allocated by task 310:
[   27.322943]  kasan_save_stack+0x45/0x70
[   27.323250]  kasan_save_track+0x18/0x40
[   27.323461]  kasan_save_alloc_info+0x3b/0x50
[   27.323667]  __kasan_kmalloc+0xb7/0xc0
[   27.323858]  __kmalloc_cache_noprof+0x189/0x420
[   27.324095]  kasan_bitops_generic+0x92/0x1c0
[   27.324378]  kunit_try_run_case+0x1a5/0x480
[   27.324603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.324859]  kthread+0x337/0x6f0
[   27.325042]  ret_from_fork+0x116/0x1d0
[   27.325472]  ret_from_fork_asm+0x1a/0x30
[   27.325662] 
[   27.325749] The buggy address belongs to the object at ffff88810527f2e0
[   27.325749]  which belongs to the cache kmalloc-16 of size 16
[   27.326272] The buggy address is located 8 bytes inside of
[   27.326272]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.326743] 
[   27.326820] The buggy address belongs to the physical page:
[   27.327050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.327356] flags: 0x200000000000000(node=0|zone=2)
[   27.327581] page_type: f5(slab)
[   27.327746] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.328037] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.328357] page dumped because: kasan: bad access detected
[   27.328822] 
[   27.328962] Memory state around the buggy address:
[   27.329131]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.329434]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.329650] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.329860]                                                           ^
[   27.330240]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.330567]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.330902] ==================================================================
[   27.225194] ==================================================================
[   27.225535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.226111] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.226590] 
[   27.226713] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.226773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.226788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.226814] Call Trace:
[   27.226837]  <TASK>
[   27.226860]  dump_stack_lvl+0x73/0xb0
[   27.226893]  print_report+0xd1/0x650
[   27.226918]  ? __virt_addr_valid+0x1db/0x2d0
[   27.226945]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.226973]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.227002]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.227031]  kasan_report+0x141/0x180
[   27.227055]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.227088]  kasan_check_range+0x10c/0x1c0
[   27.227113]  __kasan_check_write+0x18/0x20
[   27.227139]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.227166]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.227195]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.227223]  ? kasan_bitops_generic+0x92/0x1c0
[   27.227252]  kasan_bitops_generic+0x116/0x1c0
[   27.227279]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.227307]  ? __pfx_read_tsc+0x10/0x10
[   27.227331]  ? ktime_get_ts64+0x86/0x230
[   27.227359]  kunit_try_run_case+0x1a5/0x480
[   27.227387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.227426]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.227453]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.227479]  ? __kthread_parkme+0x82/0x180
[   27.227503]  ? preempt_count_sub+0x50/0x80
[   27.227529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.227557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.227584]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.227611]  kthread+0x337/0x6f0
[   27.227633]  ? trace_preempt_on+0x20/0xc0
[   27.227662]  ? __pfx_kthread+0x10/0x10
[   27.227686]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.227710]  ? calculate_sigpending+0x7b/0xa0
[   27.227737]  ? __pfx_kthread+0x10/0x10
[   27.227760]  ret_from_fork+0x116/0x1d0
[   27.227782]  ? __pfx_kthread+0x10/0x10
[   27.227804]  ret_from_fork_asm+0x1a/0x30
[   27.227839]  </TASK>
[   27.227852] 
[   27.236863] Allocated by task 310:
[   27.237078]  kasan_save_stack+0x45/0x70
[   27.237563]  kasan_save_track+0x18/0x40
[   27.237921]  kasan_save_alloc_info+0x3b/0x50
[   27.238089]  __kasan_kmalloc+0xb7/0xc0
[   27.238234]  __kmalloc_cache_noprof+0x189/0x420
[   27.239175]  kasan_bitops_generic+0x92/0x1c0
[   27.239715]  kunit_try_run_case+0x1a5/0x480
[   27.240339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.240553]  kthread+0x337/0x6f0
[   27.240683]  ret_from_fork+0x116/0x1d0
[   27.240821]  ret_from_fork_asm+0x1a/0x30
[   27.240968] 
[   27.241041] The buggy address belongs to the object at ffff88810527f2e0
[   27.241041]  which belongs to the cache kmalloc-16 of size 16
[   27.241985] The buggy address is located 8 bytes inside of
[   27.241985]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.243996] 
[   27.244133] The buggy address belongs to the physical page:
[   27.244748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.245205] flags: 0x200000000000000(node=0|zone=2)
[   27.245657] page_type: f5(slab)
[   27.245952] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.246773] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.247303] page dumped because: kasan: bad access detected
[   27.247568] 
[   27.247655] Memory state around the buggy address:
[   27.247875]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.248595]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.248958] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.249447]                                                           ^
[   27.249835]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.250360]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.250669] ==================================================================
[   27.272000] ==================================================================
[   27.272599] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.272880] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.273199] 
[   27.273317] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.273371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.273385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.273454] Call Trace:
[   27.273474]  <TASK>
[   27.273497]  dump_stack_lvl+0x73/0xb0
[   27.273528]  print_report+0xd1/0x650
[   27.273552]  ? __virt_addr_valid+0x1db/0x2d0
[   27.273578]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.273605]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.273633]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.273661]  kasan_report+0x141/0x180
[   27.273684]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.273716]  kasan_check_range+0x10c/0x1c0
[   27.273741]  __kasan_check_write+0x18/0x20
[   27.273766]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.273793]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.273821]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.273848]  ? kasan_bitops_generic+0x92/0x1c0
[   27.273884]  kasan_bitops_generic+0x116/0x1c0
[   27.273909]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.273935]  ? __pfx_read_tsc+0x10/0x10
[   27.273959]  ? ktime_get_ts64+0x86/0x230
[   27.273986]  kunit_try_run_case+0x1a5/0x480
[   27.274014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.274040]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.274068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.274094]  ? __kthread_parkme+0x82/0x180
[   27.274116]  ? preempt_count_sub+0x50/0x80
[   27.274142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.274169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.274195]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.274222]  kthread+0x337/0x6f0
[   27.274242]  ? trace_preempt_on+0x20/0xc0
[   27.274268]  ? __pfx_kthread+0x10/0x10
[   27.274290]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.274315]  ? calculate_sigpending+0x7b/0xa0
[   27.274340]  ? __pfx_kthread+0x10/0x10
[   27.274364]  ret_from_fork+0x116/0x1d0
[   27.274384]  ? __pfx_kthread+0x10/0x10
[   27.274642]  ret_from_fork_asm+0x1a/0x30
[   27.274679]  </TASK>
[   27.274692] 
[   27.283282] Allocated by task 310:
[   27.283494]  kasan_save_stack+0x45/0x70
[   27.283703]  kasan_save_track+0x18/0x40
[   27.283910]  kasan_save_alloc_info+0x3b/0x50
[   27.284123]  __kasan_kmalloc+0xb7/0xc0
[   27.284320]  __kmalloc_cache_noprof+0x189/0x420
[   27.284623]  kasan_bitops_generic+0x92/0x1c0
[   27.284832]  kunit_try_run_case+0x1a5/0x480
[   27.284993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.285265]  kthread+0x337/0x6f0
[   27.285448]  ret_from_fork+0x116/0x1d0
[   27.285643]  ret_from_fork_asm+0x1a/0x30
[   27.285837] 
[   27.285917] The buggy address belongs to the object at ffff88810527f2e0
[   27.285917]  which belongs to the cache kmalloc-16 of size 16
[   27.286640] The buggy address is located 8 bytes inside of
[   27.286640]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.287254] 
[   27.287350] The buggy address belongs to the physical page:
[   27.287589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.287950] flags: 0x200000000000000(node=0|zone=2)
[   27.288270] page_type: f5(slab)
[   27.288437] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.288791] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.289127] page dumped because: kasan: bad access detected
[   27.289478] 
[   27.289576] Memory state around the buggy address:
[   27.289782]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.290064]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.290574] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.290913]                                                           ^
[   27.291331]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.291679]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.291970] ==================================================================
[   27.351575] ==================================================================
[   27.352054] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.352529] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.352848] 
[   27.352970] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.353024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.353037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.353063] Call Trace:
[   27.353085]  <TASK>
[   27.353106]  dump_stack_lvl+0x73/0xb0
[   27.353329]  print_report+0xd1/0x650
[   27.353366]  ? __virt_addr_valid+0x1db/0x2d0
[   27.353410]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.353437]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.353465]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.353492]  kasan_report+0x141/0x180
[   27.353516]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.353547]  kasan_check_range+0x10c/0x1c0
[   27.353571]  __kasan_check_write+0x18/0x20
[   27.353596]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.353621]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.353649]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.353676]  ? kasan_bitops_generic+0x92/0x1c0
[   27.353703]  kasan_bitops_generic+0x116/0x1c0
[   27.353728]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.353754]  ? __pfx_read_tsc+0x10/0x10
[   27.353778]  ? ktime_get_ts64+0x86/0x230
[   27.353804]  kunit_try_run_case+0x1a5/0x480
[   27.353831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.353856]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.353912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.353940]  ? __kthread_parkme+0x82/0x180
[   27.353963]  ? preempt_count_sub+0x50/0x80
[   27.353989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.354016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.354042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.354070]  kthread+0x337/0x6f0
[   27.354092]  ? trace_preempt_on+0x20/0xc0
[   27.354119]  ? __pfx_kthread+0x10/0x10
[   27.354222]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.354249]  ? calculate_sigpending+0x7b/0xa0
[   27.354276]  ? __pfx_kthread+0x10/0x10
[   27.354300]  ret_from_fork+0x116/0x1d0
[   27.354322]  ? __pfx_kthread+0x10/0x10
[   27.354345]  ret_from_fork_asm+0x1a/0x30
[   27.354379]  </TASK>
[   27.354402] 
[   27.363216] Allocated by task 310:
[   27.363427]  kasan_save_stack+0x45/0x70
[   27.363640]  kasan_save_track+0x18/0x40
[   27.363833]  kasan_save_alloc_info+0x3b/0x50
[   27.364066]  __kasan_kmalloc+0xb7/0xc0
[   27.364332]  __kmalloc_cache_noprof+0x189/0x420
[   27.364512]  kasan_bitops_generic+0x92/0x1c0
[   27.364665]  kunit_try_run_case+0x1a5/0x480
[   27.364835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.365119]  kthread+0x337/0x6f0
[   27.365499]  ret_from_fork+0x116/0x1d0
[   27.365694]  ret_from_fork_asm+0x1a/0x30
[   27.365899] 
[   27.365996] The buggy address belongs to the object at ffff88810527f2e0
[   27.365996]  which belongs to the cache kmalloc-16 of size 16
[   27.366605] The buggy address is located 8 bytes inside of
[   27.366605]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.367113] 
[   27.367285] The buggy address belongs to the physical page:
[   27.367499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.367749] flags: 0x200000000000000(node=0|zone=2)
[   27.367948] page_type: f5(slab)
[   27.368077] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.368450] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.368791] page dumped because: kasan: bad access detected
[   27.369046] 
[   27.369141] Memory state around the buggy address:
[   27.369368]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.369928]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.370232] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.370540]                                                           ^
[   27.370845]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.371256]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.371563] ==================================================================
[   27.185415] ==================================================================
[   27.185848] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.187230] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310
[   27.188471] 
[   27.188590] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.188652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.188668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.188725] Call Trace:
[   27.188743]  <TASK>
[   27.188768]  dump_stack_lvl+0x73/0xb0
[   27.188928]  print_report+0xd1/0x650
[   27.188957]  ? __virt_addr_valid+0x1db/0x2d0
[   27.188985]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.189012]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.189042]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.189070]  kasan_report+0x141/0x180
[   27.189094]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.189127]  kasan_check_range+0x10c/0x1c0
[   27.189328]  __kasan_check_write+0x18/0x20
[   27.189355]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.189384]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.189426]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.189455]  ? kasan_bitops_generic+0x92/0x1c0
[   27.189486]  kasan_bitops_generic+0x116/0x1c0
[   27.189512]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.189540]  ? __pfx_read_tsc+0x10/0x10
[   27.189566]  ? ktime_get_ts64+0x86/0x230
[   27.189595]  kunit_try_run_case+0x1a5/0x480
[   27.189625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.189652]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.189681]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.189709]  ? __kthread_parkme+0x82/0x180
[   27.189734]  ? preempt_count_sub+0x50/0x80
[   27.189760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.189788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.189816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.189842]  kthread+0x337/0x6f0
[   27.189889]  ? trace_preempt_on+0x20/0xc0
[   27.189916]  ? __pfx_kthread+0x10/0x10
[   27.189940]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.189965]  ? calculate_sigpending+0x7b/0xa0
[   27.189992]  ? __pfx_kthread+0x10/0x10
[   27.190016]  ret_from_fork+0x116/0x1d0
[   27.190037]  ? __pfx_kthread+0x10/0x10
[   27.190062]  ret_from_fork_asm+0x1a/0x30
[   27.190099]  </TASK>
[   27.190114] 
[   27.210201] Allocated by task 310:
[   27.210871]  kasan_save_stack+0x45/0x70
[   27.211452]  kasan_save_track+0x18/0x40
[   27.212097]  kasan_save_alloc_info+0x3b/0x50
[   27.212448]  __kasan_kmalloc+0xb7/0xc0
[   27.212603]  __kmalloc_cache_noprof+0x189/0x420
[   27.212769]  kasan_bitops_generic+0x92/0x1c0
[   27.212946]  kunit_try_run_case+0x1a5/0x480
[   27.213286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.213812]  kthread+0x337/0x6f0
[   27.214244]  ret_from_fork+0x116/0x1d0
[   27.214644]  ret_from_fork_asm+0x1a/0x30
[   27.215144] 
[   27.215477] The buggy address belongs to the object at ffff88810527f2e0
[   27.215477]  which belongs to the cache kmalloc-16 of size 16
[   27.216304] The buggy address is located 8 bytes inside of
[   27.216304]  allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9)
[   27.217081] 
[   27.217295] The buggy address belongs to the physical page:
[   27.217912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   27.218602] flags: 0x200000000000000(node=0|zone=2)
[   27.218793] page_type: f5(slab)
[   27.219045] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.219866] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.220773] page dumped because: kasan: bad access detected
[   27.221372] 
[   27.221464] Memory state around the buggy address:
[   27.221634]  ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.221867]  ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.222102] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.222854]                                                           ^
[   27.223144]  ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.223518]  ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.224404] ==================================================================