Hay
Date
July 9, 2025, 1:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.713376] ==================================================================
[   31.713419] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   31.713697] Call trace:
[   31.714802]  kasan_bitops_generic+0x110/0x1c8
[   31.715791]  kasan_save_stack+0x3c/0x68
[   31.716526]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.716817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.718233] 
[   31.718815] page_type: f5(slab)
[   31.719225] page dumped because: kasan: bad access detected
[   31.720477] ==================================================================
[   31.685097] ==================================================================
[   31.685479] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   31.685540] Read of size 8 at addr fff00000c7b74d88 by task kunit_try_catch/293
[   31.685593] 
[   31.685632] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   31.685724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.685754] Hardware name: linux,dummy-virt (DT)
[   31.685786] Call trace:
[   31.685811]  show_stack+0x20/0x38 (C)
[   31.685860]  dump_stack_lvl+0x8c/0xd0
[   31.685910]  print_report+0x118/0x5d0
[   31.685966]  kasan_report+0xdc/0x128
[   31.686023]  __asan_report_load8_noabort+0x20/0x30
[   31.686084]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   31.686141]  kasan_bitops_generic+0x110/0x1c8
[   31.686193]  kunit_try_run_case+0x170/0x3f0
[   31.686253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.686309]  kthread+0x328/0x630
[   31.686356]  ret_from_fork+0x10/0x20
[   31.686410] 
[   31.686431] Allocated by task 293:
[   31.686471]  kasan_save_stack+0x3c/0x68
[   31.686523]  kasan_save_track+0x20/0x40
[   31.686565]  kasan_save_alloc_info+0x40/0x58
[   31.686604]  __kasan_kmalloc+0xd4/0xd8
[   31.686643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.686683]  kasan_bitops_generic+0xa0/0x1c8
[   31.686724]  kunit_try_run_case+0x170/0x3f0
[   31.686765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.686813]  kthread+0x328/0x630
[   31.686848]  ret_from_fork+0x10/0x20
[   31.686885] 
[   31.686905] The buggy address belongs to the object at fff00000c7b74d80
[   31.686905]  which belongs to the cache kmalloc-16 of size 16
[   31.686974] The buggy address is located 8 bytes inside of
[   31.686974]  allocated 9-byte region [fff00000c7b74d80, fff00000c7b74d89)
[   31.687039] 
[   31.687070] The buggy address belongs to the physical page:
[   31.687711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b74
[   31.687838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.687907] page_type: f5(slab)
[   31.687976] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   31.688223] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.688486] page dumped because: kasan: bad access detected
[   31.688529] 
[   31.688748] Memory state around the buggy address:
[   31.688814]  fff00000c7b74c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.689020]  fff00000c7b74d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.689220] >fff00000c7b74d80: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.689403]                       ^
[   31.689452]  fff00000c7b74e00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   31.689757]  fff00000c7b74e80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.689852] ==================================================================
[   31.690580] ==================================================================
[   31.690633] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   31.690685] Write of size 8 at addr fff00000c7b74d88 by task kunit_try_catch/293
[   31.691020] 
[   31.691748] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   31.691893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.691924] Hardware name: linux,dummy-virt (DT)
[   31.691956] Call trace:
[   31.691980]  show_stack+0x20/0x38 (C)
[   31.692560]  dump_stack_lvl+0x8c/0xd0
[   31.693598]  __kasan_check_write+0x20/0x30
[   31.695202]  kasan_save_stack+0x3c/0x68
[   31.696005]  kunit_try_run_case+0x170/0x3f0
[   31.697256] 
[   31.698191] page_type: f5(slab)
[   31.698828] 
[   31.699372]  fff00000c7b74d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.701893] ==================================================================
[   31.674580] ==================================================================
[   31.674896] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   31.675234] Write of size 8 at addr fff00000c7b74d88 by task kunit_try_catch/293
[   31.675293] 
[   31.675330] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   31.675420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.675863] Hardware name: linux,dummy-virt (DT)
[   31.676036] Call trace:
[   31.676131]  show_stack+0x20/0x38 (C)
[   31.676244]  dump_stack_lvl+0x8c/0xd0
[   31.676448]  print_report+0x118/0x5d0
[   31.676631]  kasan_report+0xdc/0x128
[   31.676946]  kasan_check_range+0x100/0x1a8
[   31.677112]  __kasan_check_write+0x20/0x30
[   31.677271]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   31.677403]  kasan_bitops_generic+0x110/0x1c8
[   31.677726]  kunit_try_run_case+0x170/0x3f0
[   31.677868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.678121]  kthread+0x328/0x630
[   31.678499]  ret_from_fork+0x10/0x20
[   31.678613] 
[   31.678771] Allocated by task 293:
[   31.679155]  kasan_save_stack+0x3c/0x68
[   31.679243]  kasan_save_track+0x20/0x40
[   31.679452]  kasan_save_alloc_info+0x40/0x58
[   31.679618]  __kasan_kmalloc+0xd4/0xd8
[   31.679740]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.679981]  kasan_bitops_generic+0xa0/0x1c8
[   31.680246]  kunit_try_run_case+0x170/0x3f0
[   31.680354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.680560]  kthread+0x328/0x630
[   31.680645]  ret_from_fork+0x10/0x20
[   31.680821] 
[   31.680980] The buggy address belongs to the object at fff00000c7b74d80
[   31.680980]  which belongs to the cache kmalloc-16 of size 16
[   31.681105] The buggy address is located 8 bytes inside of
[   31.681105]  allocated 9-byte region [fff00000c7b74d80, fff00000c7b74d89)
[   31.681549] 
[   31.681679] The buggy address belongs to the physical page:
[   31.681773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b74
[   31.681880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.681953] page_type: f5(slab)
[   31.682320] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   31.682413] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.682820] page dumped because: kasan: bad access detected
[   31.682909] 
[   31.683037] Memory state around the buggy address:
[   31.683253]  fff00000c7b74c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.683314]  fff00000c7b74d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.683358] >fff00000c7b74d80: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.683679]                       ^
[   31.683902]  fff00000c7b74e00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   31.684104]  fff00000c7b74e80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.684345] ==================================================================

[   26.295086] ==================================================================
[   26.295423] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.295960] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.296298] 
[   26.296403] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.296450] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.296463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.296484] Call Trace:
[   26.296499]  <TASK>
[   26.296514]  dump_stack_lvl+0x73/0xb0
[   26.296543]  print_report+0xd1/0x610
[   26.296564]  ? __virt_addr_valid+0x1db/0x2d0
[   26.296587]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.296611]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.296636]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.296661]  kasan_report+0x141/0x180
[   26.296682]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.296723]  kasan_check_range+0x10c/0x1c0
[   26.296747]  __kasan_check_write+0x18/0x20
[   26.296788]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.296814]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.296840]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.296863]  ? trace_hardirqs_on+0x37/0xe0
[   26.296885]  ? kasan_bitops_generic+0x92/0x1c0
[   26.296911]  kasan_bitops_generic+0x116/0x1c0
[   26.296934]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.296958]  ? __pfx_read_tsc+0x10/0x10
[   26.296979]  ? ktime_get_ts64+0x86/0x230
[   26.297004]  kunit_try_run_case+0x1a5/0x480
[   26.297025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.297046]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.297070]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.297093]  ? __kthread_parkme+0x82/0x180
[   26.297113]  ? preempt_count_sub+0x50/0x80
[   26.297136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.297158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.297183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.297208]  kthread+0x337/0x6f0
[   26.297227]  ? trace_preempt_on+0x20/0xc0
[   26.297249]  ? __pfx_kthread+0x10/0x10
[   26.297269]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.297291]  ? calculate_sigpending+0x7b/0xa0
[   26.297315]  ? __pfx_kthread+0x10/0x10
[   26.297336]  ret_from_fork+0x116/0x1d0
[   26.297355]  ? __pfx_kthread+0x10/0x10
[   26.297375]  ret_from_fork_asm+0x1a/0x30
[   26.297406]  </TASK>
[   26.297416] 
[   26.304802] Allocated by task 311:
[   26.304982]  kasan_save_stack+0x45/0x70
[   26.305156]  kasan_save_track+0x18/0x40
[   26.305326]  kasan_save_alloc_info+0x3b/0x50
[   26.305504]  __kasan_kmalloc+0xb7/0xc0
[   26.305683]  __kmalloc_cache_noprof+0x189/0x420
[   26.305865]  kasan_bitops_generic+0x92/0x1c0
[   26.306074]  kunit_try_run_case+0x1a5/0x480
[   26.306278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.306493]  kthread+0x337/0x6f0
[   26.306650]  ret_from_fork+0x116/0x1d0
[   26.306808]  ret_from_fork_asm+0x1a/0x30
[   26.307003] 
[   26.307090] The buggy address belongs to the object at ffff8881058a8240
[   26.307090]  which belongs to the cache kmalloc-16 of size 16
[   26.307506] The buggy address is located 8 bytes inside of
[   26.307506]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.308060] 
[   26.308138] The buggy address belongs to the physical page:
[   26.308352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.308656] flags: 0x200000000000000(node=0|zone=2)
[   26.308903] page_type: f5(slab)
[   26.309055] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.309350] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.309654] page dumped because: kasan: bad access detected
[   26.309861] 
[   26.309925] Memory state around the buggy address:
[   26.310072]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.310280]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.310486] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.310745]                                               ^
[   26.311016]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.311326]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.311627] ==================================================================
[   26.207251] ==================================================================
[   26.207527] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   26.207879] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.208246] 
[   26.208355] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.208405] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.208418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.208440] Call Trace:
[   26.208457]  <TASK>
[   26.208474]  dump_stack_lvl+0x73/0xb0
[   26.208504]  print_report+0xd1/0x610
[   26.208525]  ? __virt_addr_valid+0x1db/0x2d0
[   26.208549]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   26.208573]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.208599]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   26.208624]  kasan_report+0x141/0x180
[   26.208645]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   26.208674]  kasan_check_range+0x10c/0x1c0
[   26.208710]  __kasan_check_write+0x18/0x20
[   26.208734]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   26.208759]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.208785]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.208808]  ? trace_hardirqs_on+0x37/0xe0
[   26.208829]  ? kasan_bitops_generic+0x92/0x1c0
[   26.208855]  kasan_bitops_generic+0x116/0x1c0
[   26.208878]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.208902]  ? __pfx_read_tsc+0x10/0x10
[   26.208923]  ? ktime_get_ts64+0x86/0x230
[   26.208947]  kunit_try_run_case+0x1a5/0x480
[   26.208968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.208989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.209014]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.209037]  ? __kthread_parkme+0x82/0x180
[   26.209058]  ? preempt_count_sub+0x50/0x80
[   26.209081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.209103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.209127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.209204]  kthread+0x337/0x6f0
[   26.209224]  ? trace_preempt_on+0x20/0xc0
[   26.209246]  ? __pfx_kthread+0x10/0x10
[   26.209266]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.209288]  ? calculate_sigpending+0x7b/0xa0
[   26.209311]  ? __pfx_kthread+0x10/0x10
[   26.209332]  ret_from_fork+0x116/0x1d0
[   26.209351]  ? __pfx_kthread+0x10/0x10
[   26.209371]  ret_from_fork_asm+0x1a/0x30
[   26.209402]  </TASK>
[   26.209413] 
[   26.217343] Allocated by task 311:
[   26.217523]  kasan_save_stack+0x45/0x70
[   26.217720]  kasan_save_track+0x18/0x40
[   26.218083]  kasan_save_alloc_info+0x3b/0x50
[   26.218241]  __kasan_kmalloc+0xb7/0xc0
[   26.218395]  __kmalloc_cache_noprof+0x189/0x420
[   26.218604]  kasan_bitops_generic+0x92/0x1c0
[   26.218818]  kunit_try_run_case+0x1a5/0x480
[   26.218955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.219124]  kthread+0x337/0x6f0
[   26.219236]  ret_from_fork+0x116/0x1d0
[   26.219360]  ret_from_fork_asm+0x1a/0x30
[   26.219547] 
[   26.219639] The buggy address belongs to the object at ffff8881058a8240
[   26.219639]  which belongs to the cache kmalloc-16 of size 16
[   26.220362] The buggy address is located 8 bytes inside of
[   26.220362]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.220811] 
[   26.220927] The buggy address belongs to the physical page:
[   26.221146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.221516] flags: 0x200000000000000(node=0|zone=2)
[   26.221809] page_type: f5(slab)
[   26.222008] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.222431] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.222771] page dumped because: kasan: bad access detected
[   26.222947] 
[   26.223008] Memory state around the buggy address:
[   26.223418]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.223756]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.224184] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.224486]                                               ^
[   26.224733]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.225148]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.225459] ==================================================================
[   26.226919] ==================================================================
[   26.227749] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   26.229183] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.229551] 
[   26.229640] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.229691] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.229716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.229737] Call Trace:
[   26.229751]  <TASK>
[   26.229767]  dump_stack_lvl+0x73/0xb0
[   26.229796]  print_report+0xd1/0x610
[   26.229819]  ? __virt_addr_valid+0x1db/0x2d0
[   26.229841]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   26.229866]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.230228]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   26.230258]  kasan_report+0x141/0x180
[   26.230297]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   26.230329]  kasan_check_range+0x10c/0x1c0
[   26.230359]  __kasan_check_write+0x18/0x20
[   26.230382]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   26.230407]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.230432]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.230456]  ? trace_hardirqs_on+0x37/0xe0
[   26.230478]  ? kasan_bitops_generic+0x92/0x1c0
[   26.230504]  kasan_bitops_generic+0x116/0x1c0
[   26.230528]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.230553]  ? __pfx_read_tsc+0x10/0x10
[   26.230575]  ? ktime_get_ts64+0x86/0x230
[   26.230600]  kunit_try_run_case+0x1a5/0x480
[   26.230623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.230644]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.230667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.230691]  ? __kthread_parkme+0x82/0x180
[   26.230720]  ? preempt_count_sub+0x50/0x80
[   26.230744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.230766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.230823]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.230847]  kthread+0x337/0x6f0
[   26.230867]  ? trace_preempt_on+0x20/0xc0
[   26.230890]  ? __pfx_kthread+0x10/0x10
[   26.230920]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.230943]  ? calculate_sigpending+0x7b/0xa0
[   26.230967]  ? __pfx_kthread+0x10/0x10
[   26.230988]  ret_from_fork+0x116/0x1d0
[   26.231007]  ? __pfx_kthread+0x10/0x10
[   26.231026]  ret_from_fork_asm+0x1a/0x30
[   26.231056]  </TASK>
[   26.231068] 
[   26.246193] Allocated by task 311:
[   26.246383]  kasan_save_stack+0x45/0x70
[   26.246783]  kasan_save_track+0x18/0x40
[   26.247223]  kasan_save_alloc_info+0x3b/0x50
[   26.247456]  __kasan_kmalloc+0xb7/0xc0
[   26.247847]  __kmalloc_cache_noprof+0x189/0x420
[   26.248302]  kasan_bitops_generic+0x92/0x1c0
[   26.248636]  kunit_try_run_case+0x1a5/0x480
[   26.249023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.249204]  kthread+0x337/0x6f0
[   26.249320]  ret_from_fork+0x116/0x1d0
[   26.249446]  ret_from_fork_asm+0x1a/0x30
[   26.249578] 
[   26.249642] The buggy address belongs to the object at ffff8881058a8240
[   26.249642]  which belongs to the cache kmalloc-16 of size 16
[   26.250040] The buggy address is located 8 bytes inside of
[   26.250040]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.250599] 
[   26.250668] The buggy address belongs to the physical page:
[   26.250843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.251280] flags: 0x200000000000000(node=0|zone=2)
[   26.251590] page_type: f5(slab)
[   26.251748] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.252215] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.252490] page dumped because: kasan: bad access detected
[   26.253125] 
[   26.253393] Memory state around the buggy address:
[   26.253633]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.254543]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.254979] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.256260]                                               ^
[   26.257120]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.257355]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.257568] ==================================================================
[   26.278229] ==================================================================
[   26.278563] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.279100] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.279439] 
[   26.279534] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.279580] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.279593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.279614] Call Trace:
[   26.279628]  <TASK>
[   26.279642]  dump_stack_lvl+0x73/0xb0
[   26.279672]  print_report+0xd1/0x610
[   26.279704]  ? __virt_addr_valid+0x1db/0x2d0
[   26.279728]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.279753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.279799]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.279829]  kasan_report+0x141/0x180
[   26.279851]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.279879]  kasan_check_range+0x10c/0x1c0
[   26.279902]  __kasan_check_write+0x18/0x20
[   26.279924]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.279949]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.279974]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.279997]  ? trace_hardirqs_on+0x37/0xe0
[   26.280018]  ? kasan_bitops_generic+0x92/0x1c0
[   26.280044]  kasan_bitops_generic+0x116/0x1c0
[   26.280067]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.280091]  ? __pfx_read_tsc+0x10/0x10
[   26.280111]  ? ktime_get_ts64+0x86/0x230
[   26.280135]  kunit_try_run_case+0x1a5/0x480
[   26.280157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.280176]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.280200]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.280224]  ? __kthread_parkme+0x82/0x180
[   26.280244]  ? preempt_count_sub+0x50/0x80
[   26.280267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.280289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.280313]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.280338]  kthread+0x337/0x6f0
[   26.280358]  ? trace_preempt_on+0x20/0xc0
[   26.280379]  ? __pfx_kthread+0x10/0x10
[   26.280399]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.280421]  ? calculate_sigpending+0x7b/0xa0
[   26.280444]  ? __pfx_kthread+0x10/0x10
[   26.280465]  ret_from_fork+0x116/0x1d0
[   26.280483]  ? __pfx_kthread+0x10/0x10
[   26.280504]  ret_from_fork_asm+0x1a/0x30
[   26.280535]  </TASK>
[   26.280546] 
[   26.287932] Allocated by task 311:
[   26.288085]  kasan_save_stack+0x45/0x70
[   26.288220]  kasan_save_track+0x18/0x40
[   26.288346]  kasan_save_alloc_info+0x3b/0x50
[   26.288531]  __kasan_kmalloc+0xb7/0xc0
[   26.288715]  __kmalloc_cache_noprof+0x189/0x420
[   26.288954]  kasan_bitops_generic+0x92/0x1c0
[   26.289154]  kunit_try_run_case+0x1a5/0x480
[   26.289348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.289538]  kthread+0x337/0x6f0
[   26.289656]  ret_from_fork+0x116/0x1d0
[   26.289861]  ret_from_fork_asm+0x1a/0x30
[   26.290055] 
[   26.290144] The buggy address belongs to the object at ffff8881058a8240
[   26.290144]  which belongs to the cache kmalloc-16 of size 16
[   26.290646] The buggy address is located 8 bytes inside of
[   26.290646]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.291134] 
[   26.291227] The buggy address belongs to the physical page:
[   26.291393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.291625] flags: 0x200000000000000(node=0|zone=2)
[   26.291812] page_type: f5(slab)
[   26.291927] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.292212] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.292534] page dumped because: kasan: bad access detected
[   26.292802] 
[   26.292887] Memory state around the buggy address:
[   26.293098]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.293374]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.293580] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.293817]                                               ^
[   26.293982]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.294237]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.294547] ==================================================================
[   26.135649] ==================================================================
[   26.136247] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   26.136624] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.137615] 
[   26.137758] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.137816] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.137830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.137853] Call Trace:
[   26.137866]  <TASK>
[   26.137887]  dump_stack_lvl+0x73/0xb0
[   26.137921]  print_report+0xd1/0x610
[   26.137944]  ? __virt_addr_valid+0x1db/0x2d0
[   26.137970]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   26.138186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.138215]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   26.138239]  kasan_report+0x141/0x180
[   26.138263]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   26.138292]  kasan_check_range+0x10c/0x1c0
[   26.138314]  __kasan_check_write+0x18/0x20
[   26.138338]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   26.138363]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.138388]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.138412]  ? trace_hardirqs_on+0x37/0xe0
[   26.138436]  ? kasan_bitops_generic+0x92/0x1c0
[   26.138462]  kasan_bitops_generic+0x116/0x1c0
[   26.138485]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.138509]  ? __pfx_read_tsc+0x10/0x10
[   26.138532]  ? ktime_get_ts64+0x86/0x230
[   26.138557]  kunit_try_run_case+0x1a5/0x480
[   26.138580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.138600]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.138625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.138648]  ? __kthread_parkme+0x82/0x180
[   26.138669]  ? preempt_count_sub+0x50/0x80
[   26.138709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.138731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.138756]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.138781]  kthread+0x337/0x6f0
[   26.138801]  ? trace_preempt_on+0x20/0xc0
[   26.138822]  ? __pfx_kthread+0x10/0x10
[   26.138843]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.138864]  ? calculate_sigpending+0x7b/0xa0
[   26.138900]  ? __pfx_kthread+0x10/0x10
[   26.138922]  ret_from_fork+0x116/0x1d0
[   26.138940]  ? __pfx_kthread+0x10/0x10
[   26.138961]  ret_from_fork_asm+0x1a/0x30
[   26.138992]  </TASK>
[   26.139004] 
[   26.147562] Allocated by task 311:
[   26.147707]  kasan_save_stack+0x45/0x70
[   26.147904]  kasan_save_track+0x18/0x40
[   26.148089]  kasan_save_alloc_info+0x3b/0x50
[   26.148297]  __kasan_kmalloc+0xb7/0xc0
[   26.148532]  __kmalloc_cache_noprof+0x189/0x420
[   26.148733]  kasan_bitops_generic+0x92/0x1c0
[   26.149092]  kunit_try_run_case+0x1a5/0x480
[   26.149262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.149469]  kthread+0x337/0x6f0
[   26.149587]  ret_from_fork+0x116/0x1d0
[   26.149722]  ret_from_fork_asm+0x1a/0x30
[   26.149855] 
[   26.149921] The buggy address belongs to the object at ffff8881058a8240
[   26.149921]  which belongs to the cache kmalloc-16 of size 16
[   26.150452] The buggy address is located 8 bytes inside of
[   26.150452]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.150960] 
[   26.151059] The buggy address belongs to the physical page:
[   26.151301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.151615] flags: 0x200000000000000(node=0|zone=2)
[   26.153057] page_type: f5(slab)
[   26.153232] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.153685] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.154141] page dumped because: kasan: bad access detected
[   26.154461] 
[   26.154535] Memory state around the buggy address:
[   26.154837]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.155470]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.155901] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.156298]                                               ^
[   26.156644]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.157098]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.157494] ==================================================================
[   26.259352] ==================================================================
[   26.260682] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.261810] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.262357] 
[   26.262467] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.262521] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.262535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.262557] Call Trace:
[   26.262572]  <TASK>
[   26.262589]  dump_stack_lvl+0x73/0xb0
[   26.262622]  print_report+0xd1/0x610
[   26.262643]  ? __virt_addr_valid+0x1db/0x2d0
[   26.262666]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.262721]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.262746]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.262794]  kasan_report+0x141/0x180
[   26.262816]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.262844]  kasan_check_range+0x10c/0x1c0
[   26.262867]  __kasan_check_write+0x18/0x20
[   26.262890]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.262915]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.262941]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.262964]  ? trace_hardirqs_on+0x37/0xe0
[   26.262986]  ? kasan_bitops_generic+0x92/0x1c0
[   26.263012]  kasan_bitops_generic+0x116/0x1c0
[   26.263035]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.263059]  ? __pfx_read_tsc+0x10/0x10
[   26.263080]  ? ktime_get_ts64+0x86/0x230
[   26.263105]  kunit_try_run_case+0x1a5/0x480
[   26.263126]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.263146]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.263170]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.263193]  ? __kthread_parkme+0x82/0x180
[   26.263215]  ? preempt_count_sub+0x50/0x80
[   26.263239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.263261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.263286]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.263311]  kthread+0x337/0x6f0
[   26.263331]  ? trace_preempt_on+0x20/0xc0
[   26.263355]  ? __pfx_kthread+0x10/0x10
[   26.263377]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.263398]  ? calculate_sigpending+0x7b/0xa0
[   26.263423]  ? __pfx_kthread+0x10/0x10
[   26.263444]  ret_from_fork+0x116/0x1d0
[   26.263463]  ? __pfx_kthread+0x10/0x10
[   26.263483]  ret_from_fork_asm+0x1a/0x30
[   26.263514]  </TASK>
[   26.263526] 
[   26.270981] Allocated by task 311:
[   26.271120]  kasan_save_stack+0x45/0x70
[   26.271295]  kasan_save_track+0x18/0x40
[   26.271464]  kasan_save_alloc_info+0x3b/0x50
[   26.271656]  __kasan_kmalloc+0xb7/0xc0
[   26.271857]  __kmalloc_cache_noprof+0x189/0x420
[   26.272012]  kasan_bitops_generic+0x92/0x1c0
[   26.272170]  kunit_try_run_case+0x1a5/0x480
[   26.272375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.272625]  kthread+0x337/0x6f0
[   26.272824]  ret_from_fork+0x116/0x1d0
[   26.272953]  ret_from_fork_asm+0x1a/0x30
[   26.273085] 
[   26.273174] The buggy address belongs to the object at ffff8881058a8240
[   26.273174]  which belongs to the cache kmalloc-16 of size 16
[   26.273712] The buggy address is located 8 bytes inside of
[   26.273712]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.274171] 
[   26.274262] The buggy address belongs to the physical page:
[   26.274487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.274782] flags: 0x200000000000000(node=0|zone=2)
[   26.274936] page_type: f5(slab)
[   26.275047] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.275268] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.275563] page dumped because: kasan: bad access detected
[   26.275837] 
[   26.275924] Memory state around the buggy address:
[   26.276137]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.276445]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.276783] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.277080]                                               ^
[   26.277244]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.277448]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.277650] ==================================================================
[   26.158277] ==================================================================
[   26.158834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   26.159334] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.159731] 
[   26.159828] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.160149] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.160170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.160194] Call Trace:
[   26.160209]  <TASK>
[   26.160227]  dump_stack_lvl+0x73/0xb0
[   26.160260]  print_report+0xd1/0x610
[   26.160283]  ? __virt_addr_valid+0x1db/0x2d0
[   26.160307]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   26.160331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.160357]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   26.160382]  kasan_report+0x141/0x180
[   26.160403]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   26.160433]  kasan_check_range+0x10c/0x1c0
[   26.160456]  __kasan_check_write+0x18/0x20
[   26.160478]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   26.160502]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.160527]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.160550]  ? trace_hardirqs_on+0x37/0xe0
[   26.160574]  ? kasan_bitops_generic+0x92/0x1c0
[   26.160600]  kasan_bitops_generic+0x116/0x1c0
[   26.160622]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.160646]  ? __pfx_read_tsc+0x10/0x10
[   26.160668]  ? ktime_get_ts64+0x86/0x230
[   26.160708]  kunit_try_run_case+0x1a5/0x480
[   26.160732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.160752]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.160776]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.160799]  ? __kthread_parkme+0x82/0x180
[   26.160843]  ? preempt_count_sub+0x50/0x80
[   26.160866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.160952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.160978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.161002]  kthread+0x337/0x6f0
[   26.161022]  ? trace_preempt_on+0x20/0xc0
[   26.161043]  ? __pfx_kthread+0x10/0x10
[   26.161064]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.161087]  ? calculate_sigpending+0x7b/0xa0
[   26.161111]  ? __pfx_kthread+0x10/0x10
[   26.161133]  ret_from_fork+0x116/0x1d0
[   26.161151]  ? __pfx_kthread+0x10/0x10
[   26.161172]  ret_from_fork_asm+0x1a/0x30
[   26.161202]  </TASK>
[   26.161213] 
[   26.172447] Allocated by task 311:
[   26.172622]  kasan_save_stack+0x45/0x70
[   26.173078]  kasan_save_track+0x18/0x40
[   26.173340]  kasan_save_alloc_info+0x3b/0x50
[   26.173599]  __kasan_kmalloc+0xb7/0xc0
[   26.173865]  __kmalloc_cache_noprof+0x189/0x420
[   26.174272]  kasan_bitops_generic+0x92/0x1c0
[   26.174463]  kunit_try_run_case+0x1a5/0x480
[   26.174665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.175089]  kthread+0x337/0x6f0
[   26.175218]  ret_from_fork+0x116/0x1d0
[   26.175398]  ret_from_fork_asm+0x1a/0x30
[   26.175597] 
[   26.175691] The buggy address belongs to the object at ffff8881058a8240
[   26.175691]  which belongs to the cache kmalloc-16 of size 16
[   26.176247] The buggy address is located 8 bytes inside of
[   26.176247]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.176654] 
[   26.176757] The buggy address belongs to the physical page:
[   26.177108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.177384] flags: 0x200000000000000(node=0|zone=2)
[   26.177611] page_type: f5(slab)
[   26.177741] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.178233] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.178482] page dumped because: kasan: bad access detected
[   26.178732] 
[   26.178873] Memory state around the buggy address:
[   26.179078]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.179390]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.179635] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.179926]                                               ^
[   26.180399]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.180622]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.181155] ==================================================================
[   26.181581] ==================================================================
[   26.181906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   26.182235] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311
[   26.182569] 
[   26.182669] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.182729] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.182743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.182766] Call Trace:
[   26.182783]  <TASK>
[   26.182801]  dump_stack_lvl+0x73/0xb0
[   26.182830]  print_report+0xd1/0x610
[   26.182852]  ? __virt_addr_valid+0x1db/0x2d0
[   26.182875]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   26.182900]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.182926]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   26.182951]  kasan_report+0x141/0x180
[   26.182972]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   26.183001]  kasan_check_range+0x10c/0x1c0
[   26.183024]  __kasan_check_write+0x18/0x20
[   26.183048]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   26.183073]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.183148]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.183172]  ? trace_hardirqs_on+0x37/0xe0
[   26.183194]  ? kasan_bitops_generic+0x92/0x1c0
[   26.183220]  kasan_bitops_generic+0x116/0x1c0
[   26.183243]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.183266]  ? __pfx_read_tsc+0x10/0x10
[   26.183287]  ? ktime_get_ts64+0x86/0x230
[   26.183312]  kunit_try_run_case+0x1a5/0x480
[   26.183334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.183353]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.183377]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.183400]  ? __kthread_parkme+0x82/0x180
[   26.183420]  ? preempt_count_sub+0x50/0x80
[   26.183444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.183465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.183489]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.183513]  kthread+0x337/0x6f0
[   26.183532]  ? trace_preempt_on+0x20/0xc0
[   26.183554]  ? __pfx_kthread+0x10/0x10
[   26.183574]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.183596]  ? calculate_sigpending+0x7b/0xa0
[   26.183619]  ? __pfx_kthread+0x10/0x10
[   26.183641]  ret_from_fork+0x116/0x1d0
[   26.183659]  ? __pfx_kthread+0x10/0x10
[   26.183680]  ret_from_fork_asm+0x1a/0x30
[   26.183722]  </TASK>
[   26.183733] 
[   26.194765] Allocated by task 311:
[   26.195214]  kasan_save_stack+0x45/0x70
[   26.195473]  kasan_save_track+0x18/0x40
[   26.195662]  kasan_save_alloc_info+0x3b/0x50
[   26.196081]  __kasan_kmalloc+0xb7/0xc0
[   26.196401]  __kmalloc_cache_noprof+0x189/0x420
[   26.196598]  kasan_bitops_generic+0x92/0x1c0
[   26.197040]  kunit_try_run_case+0x1a5/0x480
[   26.197291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.197705]  kthread+0x337/0x6f0
[   26.197993]  ret_from_fork+0x116/0x1d0
[   26.198174]  ret_from_fork_asm+0x1a/0x30
[   26.198353] 
[   26.198434] The buggy address belongs to the object at ffff8881058a8240
[   26.198434]  which belongs to the cache kmalloc-16 of size 16
[   26.199480] The buggy address is located 8 bytes inside of
[   26.199480]  allocated 9-byte region [ffff8881058a8240, ffff8881058a8249)
[   26.200401] 
[   26.200621] The buggy address belongs to the physical page:
[   26.201132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8
[   26.201569] flags: 0x200000000000000(node=0|zone=2)
[   26.201980] page_type: f5(slab)
[   26.202170] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.202445] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.202742] page dumped because: kasan: bad access detected
[   26.203230] 
[   26.203322] Memory state around the buggy address:
[   26.203754]  ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.204281]  ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   26.204752] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.205307]                                               ^
[   26.205540]  ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.206033]  ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.206555] ==================================================================