Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   59.575827] ==================================================================
[   59.582927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   59.591085] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   59.598463] 
[   59.599946] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   59.599998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.600014] Hardware name: WinLink E850-96 board (DT)
[   59.600034] Call trace:
[   59.600045]  show_stack+0x20/0x38 (C)
[   59.600076]  dump_stack_lvl+0x8c/0xd0
[   59.600110]  print_report+0x118/0x5d0
[   59.600138]  kasan_report+0xdc/0x128
[   59.600165]  kasan_check_range+0x100/0x1a8
[   59.600196]  __kasan_check_write+0x20/0x30
[   59.600226]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   59.600261]  kasan_bitops_generic+0x110/0x1c8
[   59.600297]  kunit_try_run_case+0x170/0x3f0
[   59.600331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.600362]  kthread+0x328/0x630
[   59.600391]  ret_from_fork+0x10/0x20
[   59.600426] 
[   59.672854] Allocated by task 345:
[   59.676241]  kasan_save_stack+0x3c/0x68
[   59.680059]  kasan_save_track+0x20/0x40
[   59.683878]  kasan_save_alloc_info+0x40/0x58
[   59.688132]  __kasan_kmalloc+0xd4/0xd8
[   59.691864]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.696378]  kasan_bitops_generic+0xa0/0x1c8
[   59.700631]  kunit_try_run_case+0x170/0x3f0
[   59.704798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.710267]  kthread+0x328/0x630
[   59.713478]  ret_from_fork+0x10/0x20
[   59.717037] 
[   59.718514] The buggy address belongs to the object at ffff000800b19520
[   59.718514]  which belongs to the cache kmalloc-16 of size 16
[   59.730840] The buggy address is located 8 bytes inside of
[   59.730840]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   59.743079] 
[   59.744556] The buggy address belongs to the physical page:
[   59.750112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   59.758099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.764607] page_type: f5(slab)
[   59.767741] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.775464] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.783182] page dumped because: kasan: bad access detected
[   59.788737] 
[   59.790213] Memory state around the buggy address:
[   59.794993]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.802196]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   59.809402] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   59.816602]                                   ^
[   59.821119]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.828324]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.835527] ==================================================================
[   60.109849] ==================================================================
[   60.116949] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   60.125105] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   60.132396] 
[   60.133880] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   60.133930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.133948] Hardware name: WinLink E850-96 board (DT)
[   60.133967] Call trace:
[   60.133980]  show_stack+0x20/0x38 (C)
[   60.134012]  dump_stack_lvl+0x8c/0xd0
[   60.134045]  print_report+0x118/0x5d0
[   60.134074]  kasan_report+0xdc/0x128
[   60.134102]  __asan_report_load8_noabort+0x20/0x30
[   60.134135]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   60.134170]  kasan_bitops_generic+0x110/0x1c8
[   60.134205]  kunit_try_run_case+0x170/0x3f0
[   60.134242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.134274]  kthread+0x328/0x630
[   60.134302]  ret_from_fork+0x10/0x20
[   60.134335] 
[   60.203402] Allocated by task 345:
[   60.206787]  kasan_save_stack+0x3c/0x68
[   60.210607]  kasan_save_track+0x20/0x40
[   60.214426]  kasan_save_alloc_info+0x40/0x58
[   60.218679]  __kasan_kmalloc+0xd4/0xd8
[   60.222412]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.226926]  kasan_bitops_generic+0xa0/0x1c8
[   60.231179]  kunit_try_run_case+0x170/0x3f0
[   60.235346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.240814]  kthread+0x328/0x630
[   60.244026]  ret_from_fork+0x10/0x20
[   60.247585] 
[   60.249062] The buggy address belongs to the object at ffff000800b19520
[   60.249062]  which belongs to the cache kmalloc-16 of size 16
[   60.261387] The buggy address is located 8 bytes inside of
[   60.261387]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   60.273626] 
[   60.275104] The buggy address belongs to the physical page:
[   60.280662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   60.288646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.295155] page_type: f5(slab)
[   60.298288] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.306011] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.313730] page dumped because: kasan: bad access detected
[   60.319285] 
[   60.320761] Memory state around the buggy address:
[   60.325540]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.332744]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   60.339950] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   60.347149]                                   ^
[   60.351667]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.358872]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.366073] ==================================================================
[   59.842838] ==================================================================
[   59.849938] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   59.858095] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   59.865473] 
[   59.866957] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   59.867006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.867022] Hardware name: WinLink E850-96 board (DT)
[   59.867044] Call trace:
[   59.867056]  show_stack+0x20/0x38 (C)
[   59.867090]  dump_stack_lvl+0x8c/0xd0
[   59.867121]  print_report+0x118/0x5d0
[   59.867148]  kasan_report+0xdc/0x128
[   59.867175]  kasan_check_range+0x100/0x1a8
[   59.867203]  __kasan_check_write+0x20/0x30
[   59.867234]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   59.867271]  kasan_bitops_generic+0x110/0x1c8
[   59.867307]  kunit_try_run_case+0x170/0x3f0
[   59.867343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.867377]  kthread+0x328/0x630
[   59.867404]  ret_from_fork+0x10/0x20
[   59.867439] 
[   59.939864] Allocated by task 345:
[   59.943251]  kasan_save_stack+0x3c/0x68
[   59.947069]  kasan_save_track+0x20/0x40
[   59.950888]  kasan_save_alloc_info+0x40/0x58
[   59.955141]  __kasan_kmalloc+0xd4/0xd8
[   59.958874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.963388]  kasan_bitops_generic+0xa0/0x1c8
[   59.967641]  kunit_try_run_case+0x170/0x3f0
[   59.971808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.977276]  kthread+0x328/0x630
[   59.980488]  ret_from_fork+0x10/0x20
[   59.984047] 
[   59.985523] The buggy address belongs to the object at ffff000800b19520
[   59.985523]  which belongs to the cache kmalloc-16 of size 16
[   59.997850] The buggy address is located 8 bytes inside of
[   59.997850]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   60.010088] 
[   60.011566] The buggy address belongs to the physical page:
[   60.017122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   60.025108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.031617] page_type: f5(slab)
[   60.034751] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.042473] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.050192] page dumped because: kasan: bad access detected
[   60.055748] 
[   60.057223] Memory state around the buggy address:
[   60.062003]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.069206]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   60.076412] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   60.083612]                                   ^
[   60.088129]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.095334]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.102535] ==================================================================
[   58.512551] ==================================================================
[   58.521834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   58.529992] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   58.537367] 
[   58.538853] CPU: 2 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   58.538910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.538930] Hardware name: WinLink E850-96 board (DT)
[   58.538952] Call trace:
[   58.538965]  show_stack+0x20/0x38 (C)
[   58.539004]  dump_stack_lvl+0x8c/0xd0
[   58.539038]  print_report+0x118/0x5d0
[   58.539068]  kasan_report+0xdc/0x128
[   58.539096]  kasan_check_range+0x100/0x1a8
[   58.539128]  __kasan_check_write+0x20/0x30
[   58.539162]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   58.539199]  kasan_bitops_generic+0x110/0x1c8
[   58.539237]  kunit_try_run_case+0x170/0x3f0
[   58.539276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.539310]  kthread+0x328/0x630
[   58.539339]  ret_from_fork+0x10/0x20
[   58.539376] 
[   58.611759] Allocated by task 345:
[   58.615148]  kasan_save_stack+0x3c/0x68
[   58.618963]  kasan_save_track+0x20/0x40
[   58.622783]  kasan_save_alloc_info+0x40/0x58
[   58.627037]  __kasan_kmalloc+0xd4/0xd8
[   58.630769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.635283]  kasan_bitops_generic+0xa0/0x1c8
[   58.639536]  kunit_try_run_case+0x170/0x3f0
[   58.643703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.649173]  kthread+0x328/0x630
[   58.652383]  ret_from_fork+0x10/0x20
[   58.655943] 
[   58.657420] The buggy address belongs to the object at ffff000800b19520
[   58.657420]  which belongs to the cache kmalloc-16 of size 16
[   58.669745] The buggy address is located 8 bytes inside of
[   58.669745]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   58.681985] 
[   58.683463] The buggy address belongs to the physical page:
[   58.689019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   58.697003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.703513] page_type: f5(slab)
[   58.706649] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   58.714368] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.722087] page dumped because: kasan: bad access detected
[   58.727642] 
[   58.729118] Memory state around the buggy address:
[   58.733898]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.741101]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   58.748308] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   58.755507]                                   ^
[   58.760024]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.767230]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.774431] ==================================================================
[   60.640394] ==================================================================
[   60.647494] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   60.655652] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   60.663030] 
[   60.664513] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   60.664563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.664580] Hardware name: WinLink E850-96 board (DT)
[   60.664597] Call trace:
[   60.664610]  show_stack+0x20/0x38 (C)
[   60.664643]  dump_stack_lvl+0x8c/0xd0
[   60.664674]  print_report+0x118/0x5d0
[   60.664701]  kasan_report+0xdc/0x128
[   60.664731]  kasan_check_range+0x100/0x1a8
[   60.664760]  __kasan_check_write+0x20/0x30
[   60.664792]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   60.664830]  kasan_bitops_generic+0x110/0x1c8
[   60.664865]  kunit_try_run_case+0x170/0x3f0
[   60.664901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.664934]  kthread+0x328/0x630
[   60.664961]  ret_from_fork+0x10/0x20
[   60.664996] 
[   60.737421] Allocated by task 345:
[   60.740806]  kasan_save_stack+0x3c/0x68
[   60.744626]  kasan_save_track+0x20/0x40
[   60.748446]  kasan_save_alloc_info+0x40/0x58
[   60.752699]  __kasan_kmalloc+0xd4/0xd8
[   60.756431]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.760947]  kasan_bitops_generic+0xa0/0x1c8
[   60.765198]  kunit_try_run_case+0x170/0x3f0
[   60.769365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.774834]  kthread+0x328/0x630
[   60.778046]  ret_from_fork+0x10/0x20
[   60.781605] 
[   60.783080] The buggy address belongs to the object at ffff000800b19520
[   60.783080]  which belongs to the cache kmalloc-16 of size 16
[   60.795407] The buggy address is located 8 bytes inside of
[   60.795407]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   60.807646] 
[   60.809122] The buggy address belongs to the physical page:
[   60.814678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   60.822665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.829175] page_type: f5(slab)
[   60.832308] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.840031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.847750] page dumped because: kasan: bad access detected
[   60.853305] 
[   60.854780] Memory state around the buggy address:
[   60.859560]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.866763]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   60.873970] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   60.881169]                                   ^
[   60.885686]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.892892]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.900092] ==================================================================
[   59.312332] ==================================================================
[   59.319392] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   59.327547] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   59.334838] 
[   59.336323] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   59.336375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.336391] Hardware name: WinLink E850-96 board (DT)
[   59.336412] Call trace:
[   59.336427]  show_stack+0x20/0x38 (C)
[   59.336459]  dump_stack_lvl+0x8c/0xd0
[   59.336491]  print_report+0x118/0x5d0
[   59.336522]  kasan_report+0xdc/0x128
[   59.336550]  __asan_report_load8_noabort+0x20/0x30
[   59.336585]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   59.336622]  kasan_bitops_generic+0x110/0x1c8
[   59.336657]  kunit_try_run_case+0x170/0x3f0
[   59.336695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.336729]  kthread+0x328/0x630
[   59.336758]  ret_from_fork+0x10/0x20
[   59.336793] 
[   59.405844] Allocated by task 345:
[   59.409233]  kasan_save_stack+0x3c/0x68
[   59.413049]  kasan_save_track+0x20/0x40
[   59.416868]  kasan_save_alloc_info+0x40/0x58
[   59.421122]  __kasan_kmalloc+0xd4/0xd8
[   59.424854]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.429368]  kasan_bitops_generic+0xa0/0x1c8
[   59.433622]  kunit_try_run_case+0x170/0x3f0
[   59.437788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.443258]  kthread+0x328/0x630
[   59.446468]  ret_from_fork+0x10/0x20
[   59.450028] 
[   59.451505] The buggy address belongs to the object at ffff000800b19520
[   59.451505]  which belongs to the cache kmalloc-16 of size 16
[   59.463830] The buggy address is located 8 bytes inside of
[   59.463830]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   59.476069] 
[   59.477546] The buggy address belongs to the physical page:
[   59.483102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   59.491088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.497598] page_type: f5(slab)
[   59.500731] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.508453] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.516172] page dumped because: kasan: bad access detected
[   59.521728] 
[   59.523203] Memory state around the buggy address:
[   59.527983]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.535186]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   59.542392] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   59.549592]                                   ^
[   59.554110]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.561316]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.568516] ==================================================================
[   60.373370] ==================================================================
[   60.380485] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   60.388642] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   60.396020] 
[   60.397504] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   60.397557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.397573] Hardware name: WinLink E850-96 board (DT)
[   60.397595] Call trace:
[   60.397608]  show_stack+0x20/0x38 (C)
[   60.397640]  dump_stack_lvl+0x8c/0xd0
[   60.397669]  print_report+0x118/0x5d0
[   60.397698]  kasan_report+0xdc/0x128
[   60.397728]  kasan_check_range+0x100/0x1a8
[   60.397761]  __kasan_check_write+0x20/0x30
[   60.397790]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   60.397826]  kasan_bitops_generic+0x110/0x1c8
[   60.397859]  kunit_try_run_case+0x170/0x3f0
[   60.397895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.397929]  kthread+0x328/0x630
[   60.397955]  ret_from_fork+0x10/0x20
[   60.397986] 
[   60.470411] Allocated by task 345:
[   60.473797]  kasan_save_stack+0x3c/0x68
[   60.477616]  kasan_save_track+0x20/0x40
[   60.481436]  kasan_save_alloc_info+0x40/0x58
[   60.485689]  __kasan_kmalloc+0xd4/0xd8
[   60.489422]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.493935]  kasan_bitops_generic+0xa0/0x1c8
[   60.498189]  kunit_try_run_case+0x170/0x3f0
[   60.502356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.507824]  kthread+0x328/0x630
[   60.511036]  ret_from_fork+0x10/0x20
[   60.514595] 
[   60.516071] The buggy address belongs to the object at ffff000800b19520
[   60.516071]  which belongs to the cache kmalloc-16 of size 16
[   60.528397] The buggy address is located 8 bytes inside of
[   60.528397]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   60.540636] 
[   60.542113] The buggy address belongs to the physical page:
[   60.547668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   60.555655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.562164] page_type: f5(slab)
[   60.565299] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.573020] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.580740] page dumped because: kasan: bad access detected
[   60.586295] 
[   60.587771] Memory state around the buggy address:
[   60.592550]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.599753]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   60.606960] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   60.614159]                                   ^
[   60.618677]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.625882]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.633083] ==================================================================
[   58.781942] ==================================================================
[   58.788844] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   58.796999] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   58.804290] 
[   58.805775] CPU: 2 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   58.805832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.805849] Hardware name: WinLink E850-96 board (DT)
[   58.805871] Call trace:
[   58.805884]  show_stack+0x20/0x38 (C)
[   58.805919]  dump_stack_lvl+0x8c/0xd0
[   58.805953]  print_report+0x118/0x5d0
[   58.805979]  kasan_report+0xdc/0x128
[   58.806007]  __asan_report_load8_noabort+0x20/0x30
[   58.806043]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   58.806080]  kasan_bitops_generic+0x110/0x1c8
[   58.806119]  kunit_try_run_case+0x170/0x3f0
[   58.806156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.806190]  kthread+0x328/0x630
[   58.806221]  ret_from_fork+0x10/0x20
[   58.806255] 
[   58.875297] Allocated by task 345:
[   58.878685]  kasan_save_stack+0x3c/0x68
[   58.882503]  kasan_save_track+0x20/0x40
[   58.886321]  kasan_save_alloc_info+0x40/0x58
[   58.890574]  __kasan_kmalloc+0xd4/0xd8
[   58.894307]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.898821]  kasan_bitops_generic+0xa0/0x1c8
[   58.903074]  kunit_try_run_case+0x170/0x3f0
[   58.907241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.912711]  kthread+0x328/0x630
[   58.915921]  ret_from_fork+0x10/0x20
[   58.919480] 
[   58.920957] The buggy address belongs to the object at ffff000800b19520
[   58.920957]  which belongs to the cache kmalloc-16 of size 16
[   58.933283] The buggy address is located 8 bytes inside of
[   58.933283]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   58.945521] 
[   58.946999] The buggy address belongs to the physical page:
[   58.952555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   58.960541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.967050] page_type: f5(slab)
[   58.970185] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   58.977906] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.985624] page dumped because: kasan: bad access detected
[   58.991180] 
[   58.992655] Memory state around the buggy address:
[   58.997437]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.004639]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   59.011846] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   59.019044]                                   ^
[   59.023562]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.030768]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.037968] ==================================================================
[   59.045415] ==================================================================
[   59.052381] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   59.060537] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   59.067915] 
[   59.069399] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   59.069453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.069471] Hardware name: WinLink E850-96 board (DT)
[   59.069496] Call trace:
[   59.069510]  show_stack+0x20/0x38 (C)
[   59.069548]  dump_stack_lvl+0x8c/0xd0
[   59.069582]  print_report+0x118/0x5d0
[   59.069613]  kasan_report+0xdc/0x128
[   59.069642]  kasan_check_range+0x100/0x1a8
[   59.069672]  __kasan_check_write+0x20/0x30
[   59.069708]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   59.069748]  kasan_bitops_generic+0x110/0x1c8
[   59.069784]  kunit_try_run_case+0x170/0x3f0
[   59.069823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.069857]  kthread+0x328/0x630
[   59.069886]  ret_from_fork+0x10/0x20
[   59.069924] 
[   59.142306] Allocated by task 345:
[   59.145695]  kasan_save_stack+0x3c/0x68
[   59.149511]  kasan_save_track+0x20/0x40
[   59.153331]  kasan_save_alloc_info+0x40/0x58
[   59.157584]  __kasan_kmalloc+0xd4/0xd8
[   59.161317]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.165830]  kasan_bitops_generic+0xa0/0x1c8
[   59.170083]  kunit_try_run_case+0x170/0x3f0
[   59.174252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.179720]  kthread+0x328/0x630
[   59.182931]  ret_from_fork+0x10/0x20
[   59.186490] 
[   59.187967] The buggy address belongs to the object at ffff000800b19520
[   59.187967]  which belongs to the cache kmalloc-16 of size 16
[   59.200292] The buggy address is located 8 bytes inside of
[   59.200292]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   59.212531] 
[   59.214009] The buggy address belongs to the physical page:
[   59.219567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   59.227550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.234060] page_type: f5(slab)
[   59.237194] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.244916] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.252634] page dumped because: kasan: bad access detected
[   59.258190] 
[   59.259665] Memory state around the buggy address:
[   59.264447]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.271649]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   59.278854] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   59.286054]                                   ^
[   59.290573]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.297778]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.304978] ==================================================================
[   60.907491] ==================================================================
[   60.914504] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   60.922662] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   60.929953] 
[   60.931436] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   60.931485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.931501] Hardware name: WinLink E850-96 board (DT)
[   60.931521] Call trace:
[   60.931533]  show_stack+0x20/0x38 (C)
[   60.931565]  dump_stack_lvl+0x8c/0xd0
[   60.931598]  print_report+0x118/0x5d0
[   60.931627]  kasan_report+0xdc/0x128
[   60.931654]  __asan_report_load8_noabort+0x20/0x30
[   60.931687]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   60.931724]  kasan_bitops_generic+0x110/0x1c8
[   60.931759]  kunit_try_run_case+0x170/0x3f0
[   60.931793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.931826]  kthread+0x328/0x630
[   60.931855]  ret_from_fork+0x10/0x20
[   60.931888] 
[   61.000959] Allocated by task 345:
[   61.004345]  kasan_save_stack+0x3c/0x68
[   61.008164]  kasan_save_track+0x20/0x40
[   61.011983]  kasan_save_alloc_info+0x40/0x58
[   61.016237]  __kasan_kmalloc+0xd4/0xd8
[   61.019969]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.024483]  kasan_bitops_generic+0xa0/0x1c8
[   61.028737]  kunit_try_run_case+0x170/0x3f0
[   61.032903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.038372]  kthread+0x328/0x630
[   61.041583]  ret_from_fork+0x10/0x20
[   61.045143] 
[   61.046618] The buggy address belongs to the object at ffff000800b19520
[   61.046618]  which belongs to the cache kmalloc-16 of size 16
[   61.058945] The buggy address is located 8 bytes inside of
[   61.058945]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   61.071184] 
[   61.072659] The buggy address belongs to the physical page:
[   61.078217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   61.086203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.092711] page_type: f5(slab)
[   61.095846] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.103568] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.111287] page dumped because: kasan: bad access detected
[   61.116843] 
[   61.118318] Memory state around the buggy address:
[   61.123098]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.130301]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   61.137506] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   61.144707]                                   ^
[   61.149224]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.156429]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.163630] ==================================================================

[   32.735381] ==================================================================
[   32.735996] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   32.736406]  dump_stack_lvl+0x8c/0xd0
[   32.736718]  kunit_try_run_case+0x170/0x3f0
[   32.736950] Allocated by task 292:
[   32.737149]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.737860] The buggy address belongs to the object at fff00000c63ef120
[   32.737860]  which belongs to the cache kmalloc-16 of size 16
[   32.740457]                                   ^
[   32.741313] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   32.742448] 
[   32.742669]  show_stack+0x20/0x38 (C)
[   32.743067]  kunit_try_run_case+0x170/0x3f0
[   32.743536]  kasan_bitops_generic+0xa0/0x1c8
[   32.743735] 
[   32.744081] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.748779] ==================================================================

[   26.078588] ==================================================================
[   26.078942] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.079545] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   26.079945] 
[   26.080071] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.080134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.080147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.080170] Call Trace:
[   26.080184]  <TASK>
[   26.080213]  dump_stack_lvl+0x73/0xb0
[   26.080245]  print_report+0xd1/0x610
[   26.080285]  ? __virt_addr_valid+0x1db/0x2d0
[   26.080311]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.080343]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.080368]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.080393]  kasan_report+0x141/0x180
[   26.080433]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.080462]  kasan_check_range+0x10c/0x1c0
[   26.080493]  __kasan_check_write+0x18/0x20
[   26.080516]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.080542]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.080579]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.080603]  ? trace_hardirqs_on+0x37/0xe0
[   26.080626]  ? kasan_bitops_generic+0x92/0x1c0
[   26.080664]  kasan_bitops_generic+0x116/0x1c0
[   26.080687]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.080721]  ? __pfx_read_tsc+0x10/0x10
[   26.080751]  ? ktime_get_ts64+0x86/0x230
[   26.080777]  kunit_try_run_case+0x1a5/0x480
[   26.080811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.080832]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.080856]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.080890]  ? __kthread_parkme+0x82/0x180
[   26.080912]  ? preempt_count_sub+0x50/0x80
[   26.080936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.080957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.080991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.081016]  kthread+0x337/0x6f0
[   26.081036]  ? trace_preempt_on+0x20/0xc0
[   26.081069]  ? __pfx_kthread+0x10/0x10
[   26.081091]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.081113]  ? calculate_sigpending+0x7b/0xa0
[   26.081139]  ? __pfx_kthread+0x10/0x10
[   26.081160]  ret_from_fork+0x116/0x1d0
[   26.081179]  ? __pfx_kthread+0x10/0x10
[   26.081200]  ret_from_fork_asm+0x1a/0x30
[   26.081231]  </TASK>
[   26.081243] 
[   26.088974] Allocated by task 311:
[   26.089159]  kasan_save_stack+0x45/0x70
[   26.089344]  kasan_save_track+0x18/0x40
[   26.089568]  kasan_save_alloc_info+0x3b/0x50
[   26.089792]  __kasan_kmalloc+0xb7/0xc0
[   26.089971]  __kmalloc_cache_noprof+0x189/0x420
[   26.090175]  kasan_bitops_generic+0x92/0x1c0
[   26.090389]  kunit_try_run_case+0x1a5/0x480
[   26.090602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.090847]  kthread+0x337/0x6f0
[   26.091024]  ret_from_fork+0x116/0x1d0
[   26.091188]  ret_from_fork_asm+0x1a/0x30
[   26.091385] 
[   26.091487] The buggy address belongs to the object at ffff888104c83b80
[   26.091487]  which belongs to the cache kmalloc-16 of size 16
[   26.091851] The buggy address is located 8 bytes inside of
[   26.091851]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   26.092191] 
[   26.092259] The buggy address belongs to the physical page:
[   26.092516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   26.092868] flags: 0x200000000000000(node=0|zone=2)
[   26.093107] page_type: f5(slab)
[   26.093272] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.093654] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.093994] page dumped because: kasan: bad access detected
[   26.094223] 
[   26.094331] Memory state around the buggy address:
[   26.094573]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.094805]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.095012] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.095216]                       ^
[   26.095331]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.095623]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.095964] ==================================================================
[   25.880532] ==================================================================
[   25.880980] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   25.881390] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   25.881795] 
[   25.881920] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   25.881979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.881993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.882016] Call Trace:
[   25.882030]  <TASK>
[   25.882051]  dump_stack_lvl+0x73/0xb0
[   25.882084]  print_report+0xd1/0x610
[   25.882107]  ? __virt_addr_valid+0x1db/0x2d0
[   25.882132]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   25.882158]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.882184]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   25.882210]  kasan_report+0x141/0x180
[   25.882232]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   25.882262]  kasan_check_range+0x10c/0x1c0
[   25.882331]  __kasan_check_write+0x18/0x20
[   25.882355]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   25.882380]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.882406]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.882433]  ? trace_hardirqs_on+0x37/0xe0
[   25.882456]  ? kasan_bitops_generic+0x92/0x1c0
[   25.882483]  kasan_bitops_generic+0x116/0x1c0
[   25.882507]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.882532]  ? __pfx_read_tsc+0x10/0x10
[   25.882554]  ? ktime_get_ts64+0x86/0x230
[   25.882581]  kunit_try_run_case+0x1a5/0x480
[   25.882603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.882623]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.882648]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.882670]  ? __kthread_parkme+0x82/0x180
[   25.882692]  ? preempt_count_sub+0x50/0x80
[   25.882716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.882749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.882774]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.882798]  kthread+0x337/0x6f0
[   25.882818]  ? trace_preempt_on+0x20/0xc0
[   25.882843]  ? __pfx_kthread+0x10/0x10
[   25.882865]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.882887]  ? calculate_sigpending+0x7b/0xa0
[   25.882912]  ? __pfx_kthread+0x10/0x10
[   25.882933]  ret_from_fork+0x116/0x1d0
[   25.882952]  ? __pfx_kthread+0x10/0x10
[   25.882973]  ret_from_fork_asm+0x1a/0x30
[   25.883004]  </TASK>
[   25.883017] 
[   25.891299] Allocated by task 311:
[   25.891440]  kasan_save_stack+0x45/0x70
[   25.891703]  kasan_save_track+0x18/0x40
[   25.891908]  kasan_save_alloc_info+0x3b/0x50
[   25.892072]  __kasan_kmalloc+0xb7/0xc0
[   25.892198]  __kmalloc_cache_noprof+0x189/0x420
[   25.892405]  kasan_bitops_generic+0x92/0x1c0
[   25.892693]  kunit_try_run_case+0x1a5/0x480
[   25.892922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.893156]  kthread+0x337/0x6f0
[   25.893381]  ret_from_fork+0x116/0x1d0
[   25.893568]  ret_from_fork_asm+0x1a/0x30
[   25.893747] 
[   25.893824] The buggy address belongs to the object at ffff888104c83b80
[   25.893824]  which belongs to the cache kmalloc-16 of size 16
[   25.894201] The buggy address is located 8 bytes inside of
[   25.894201]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   25.894912] 
[   25.894984] The buggy address belongs to the physical page:
[   25.895152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   25.895623] flags: 0x200000000000000(node=0|zone=2)
[   25.895872] page_type: f5(slab)
[   25.896038] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.896581] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.896864] page dumped because: kasan: bad access detected
[   25.897030] 
[   25.897093] Memory state around the buggy address:
[   25.897268]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.897894]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.898218] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.898623]                       ^
[   25.898768]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.899002]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.899306] ==================================================================
[   25.930671] ==================================================================
[   25.931179] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.932709] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   25.933247] 
[   25.933629] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   25.933691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.933704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.933728] Call Trace:
[   25.933864]  <TASK>
[   25.933885]  dump_stack_lvl+0x73/0xb0
[   25.933924]  print_report+0xd1/0x610
[   25.933951]  ? __virt_addr_valid+0x1db/0x2d0
[   25.933977]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.934003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.934029]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.934054]  kasan_report+0x141/0x180
[   25.934076]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.934105]  kasan_check_range+0x10c/0x1c0
[   25.934128]  __kasan_check_write+0x18/0x20
[   25.934151]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   25.934176]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.934201]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.934226]  ? trace_hardirqs_on+0x37/0xe0
[   25.934250]  ? kasan_bitops_generic+0x92/0x1c0
[   25.934340]  kasan_bitops_generic+0x116/0x1c0
[   25.934366]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.934391]  ? __pfx_read_tsc+0x10/0x10
[   25.934413]  ? ktime_get_ts64+0x86/0x230
[   25.934440]  kunit_try_run_case+0x1a5/0x480
[   25.934464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.934485]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.934509]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.934532]  ? __kthread_parkme+0x82/0x180
[   25.934554]  ? preempt_count_sub+0x50/0x80
[   25.934578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.934600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.934626]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.934651]  kthread+0x337/0x6f0
[   25.934671]  ? trace_preempt_on+0x20/0xc0
[   25.934694]  ? __pfx_kthread+0x10/0x10
[   25.934715]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.934751]  ? calculate_sigpending+0x7b/0xa0
[   25.934775]  ? __pfx_kthread+0x10/0x10
[   25.934796]  ret_from_fork+0x116/0x1d0
[   25.934815]  ? __pfx_kthread+0x10/0x10
[   25.934835]  ret_from_fork_asm+0x1a/0x30
[   25.934865]  </TASK>
[   25.934877] 
[   25.951674] Allocated by task 311:
[   25.951829]  kasan_save_stack+0x45/0x70
[   25.951984]  kasan_save_track+0x18/0x40
[   25.952112]  kasan_save_alloc_info+0x3b/0x50
[   25.952256]  __kasan_kmalloc+0xb7/0xc0
[   25.952386]  __kmalloc_cache_noprof+0x189/0x420
[   25.953383]  kasan_bitops_generic+0x92/0x1c0
[   25.953894]  kunit_try_run_case+0x1a5/0x480
[   25.954351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.954953]  kthread+0x337/0x6f0
[   25.955256]  ret_from_fork+0x116/0x1d0
[   25.955687]  ret_from_fork_asm+0x1a/0x30
[   25.956080] 
[   25.956260] The buggy address belongs to the object at ffff888104c83b80
[   25.956260]  which belongs to the cache kmalloc-16 of size 16
[   25.957486] The buggy address is located 8 bytes inside of
[   25.957486]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   25.958133] 
[   25.958209] The buggy address belongs to the physical page:
[   25.958715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   25.959685] flags: 0x200000000000000(node=0|zone=2)
[   25.960196] page_type: f5(slab)
[   25.960711] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.961082] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.961453] page dumped because: kasan: bad access detected
[   25.961986] 
[   25.962159] Memory state around the buggy address:
[   25.962701]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.963433]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.963907] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.964234]                       ^
[   25.964359]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.965197]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.966071] ==================================================================
[   25.996174] ==================================================================
[   25.996405] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.996648] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   25.997222] 
[   25.997393] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   25.997454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.997467] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.997491] Call Trace:
[   25.997511]  <TASK>
[   25.997527]  dump_stack_lvl+0x73/0xb0
[   25.997557]  print_report+0xd1/0x610
[   25.997582]  ? __virt_addr_valid+0x1db/0x2d0
[   25.997609]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.997636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.997662]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.997687]  kasan_report+0x141/0x180
[   25.997709]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.997748]  kasan_check_range+0x10c/0x1c0
[   25.997772]  __kasan_check_write+0x18/0x20
[   25.997795]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   25.997821]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.997848]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.997874]  ? trace_hardirqs_on+0x37/0xe0
[   25.997896]  ? kasan_bitops_generic+0x92/0x1c0
[   25.997922]  kasan_bitops_generic+0x116/0x1c0
[   25.997947]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.997971]  ? __pfx_read_tsc+0x10/0x10
[   25.997994]  ? ktime_get_ts64+0x86/0x230
[   25.998019]  kunit_try_run_case+0x1a5/0x480
[   25.998041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.998060]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.998084]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.998108]  ? __kthread_parkme+0x82/0x180
[   25.998129]  ? preempt_count_sub+0x50/0x80
[   25.998153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.998174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.998199]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.998224]  kthread+0x337/0x6f0
[   25.998243]  ? trace_preempt_on+0x20/0xc0
[   25.998265]  ? __pfx_kthread+0x10/0x10
[   25.998285]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.998307]  ? calculate_sigpending+0x7b/0xa0
[   25.998331]  ? __pfx_kthread+0x10/0x10
[   25.998353]  ret_from_fork+0x116/0x1d0
[   25.998371]  ? __pfx_kthread+0x10/0x10
[   25.998392]  ret_from_fork_asm+0x1a/0x30
[   25.998422]  </TASK>
[   25.998433] 
[   26.016445] Allocated by task 311:
[   26.016765]  kasan_save_stack+0x45/0x70
[   26.017139]  kasan_save_track+0x18/0x40
[   26.017540]  kasan_save_alloc_info+0x3b/0x50
[   26.017944]  __kasan_kmalloc+0xb7/0xc0
[   26.018147]  __kmalloc_cache_noprof+0x189/0x420
[   26.018599]  kasan_bitops_generic+0x92/0x1c0
[   26.019003]  kunit_try_run_case+0x1a5/0x480
[   26.019156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.019327]  kthread+0x337/0x6f0
[   26.019441]  ret_from_fork+0x116/0x1d0
[   26.019566]  ret_from_fork_asm+0x1a/0x30
[   26.019698] 
[   26.019807] The buggy address belongs to the object at ffff888104c83b80
[   26.019807]  which belongs to the cache kmalloc-16 of size 16
[   26.020446] The buggy address is located 8 bytes inside of
[   26.020446]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   26.021591] 
[   26.021666] The buggy address belongs to the physical page:
[   26.021845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   26.022080] flags: 0x200000000000000(node=0|zone=2)
[   26.022239] page_type: f5(slab)
[   26.022691] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.023315] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.023980] page dumped because: kasan: bad access detected
[   26.024404] 
[   26.024566] Memory state around the buggy address:
[   26.024801]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.025414]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.025629] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.025847]                       ^
[   26.025964]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.026172]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.026635] ==================================================================
[   25.966980] ==================================================================
[   25.967469] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.967927] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   25.968228] 
[   25.968411] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   25.968643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.968660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.968685] Call Trace:
[   25.968707]  <TASK>
[   25.968749]  dump_stack_lvl+0x73/0xb0
[   25.968784]  print_report+0xd1/0x610
[   25.968813]  ? __virt_addr_valid+0x1db/0x2d0
[   25.968839]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.968864]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.968890]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.968915]  kasan_report+0x141/0x180
[   25.968936]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.968965]  kasan_check_range+0x10c/0x1c0
[   25.968989]  __kasan_check_write+0x18/0x20
[   25.969013]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   25.969038]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.969063]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.969087]  ? trace_hardirqs_on+0x37/0xe0
[   25.969110]  ? kasan_bitops_generic+0x92/0x1c0
[   25.969137]  kasan_bitops_generic+0x116/0x1c0
[   25.969160]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.969184]  ? __pfx_read_tsc+0x10/0x10
[   25.969206]  ? ktime_get_ts64+0x86/0x230
[   25.969231]  kunit_try_run_case+0x1a5/0x480
[   25.969253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.969323]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.969351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.969375]  ? __kthread_parkme+0x82/0x180
[   25.969396]  ? preempt_count_sub+0x50/0x80
[   25.969427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.969449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.969475]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.969501]  kthread+0x337/0x6f0
[   25.969522]  ? trace_preempt_on+0x20/0xc0
[   25.969543]  ? __pfx_kthread+0x10/0x10
[   25.969564]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.969585]  ? calculate_sigpending+0x7b/0xa0
[   25.969611]  ? __pfx_kthread+0x10/0x10
[   25.969632]  ret_from_fork+0x116/0x1d0
[   25.969652]  ? __pfx_kthread+0x10/0x10
[   25.969672]  ret_from_fork_asm+0x1a/0x30
[   25.969702]  </TASK>
[   25.969714] 
[   25.983694] Allocated by task 311:
[   25.983836]  kasan_save_stack+0x45/0x70
[   25.983980]  kasan_save_track+0x18/0x40
[   25.984106]  kasan_save_alloc_info+0x3b/0x50
[   25.984246]  __kasan_kmalloc+0xb7/0xc0
[   25.984653]  __kmalloc_cache_noprof+0x189/0x420
[   25.985076]  kasan_bitops_generic+0x92/0x1c0
[   25.985532]  kunit_try_run_case+0x1a5/0x480
[   25.986098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.986630]  kthread+0x337/0x6f0
[   25.987089]  ret_from_fork+0x116/0x1d0
[   25.987532]  ret_from_fork_asm+0x1a/0x30
[   25.987928] 
[   25.988098] The buggy address belongs to the object at ffff888104c83b80
[   25.988098]  which belongs to the cache kmalloc-16 of size 16
[   25.989507] The buggy address is located 8 bytes inside of
[   25.989507]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   25.990187] 
[   25.990333] The buggy address belongs to the physical page:
[   25.990829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   25.991509] flags: 0x200000000000000(node=0|zone=2)
[   25.991962] page_type: f5(slab)
[   25.992211] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.992939] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.993338] page dumped because: kasan: bad access detected
[   25.994017] 
[   25.994171] Memory state around the buggy address:
[   25.994616]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.994841]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.995046] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.995248]                       ^
[   25.995362]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.995567]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.995782] ==================================================================
[   25.899761] ==================================================================
[   25.900100] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.900597] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   25.901267] 
[   25.901632] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   25.901690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.901703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.901726] Call Trace:
[   25.901761]  <TASK>
[   25.901779]  dump_stack_lvl+0x73/0xb0
[   25.901810]  print_report+0xd1/0x610
[   25.901832]  ? __virt_addr_valid+0x1db/0x2d0
[   25.901857]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.901882]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.901907]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.901932]  kasan_report+0x141/0x180
[   25.901954]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.901984]  kasan_check_range+0x10c/0x1c0
[   25.902007]  __kasan_check_write+0x18/0x20
[   25.902030]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   25.902055]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.902082]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.902106]  ? trace_hardirqs_on+0x37/0xe0
[   25.902130]  ? kasan_bitops_generic+0x92/0x1c0
[   25.902156]  kasan_bitops_generic+0x116/0x1c0
[   25.902180]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.902204]  ? __pfx_read_tsc+0x10/0x10
[   25.902227]  ? ktime_get_ts64+0x86/0x230
[   25.902252]  kunit_try_run_case+0x1a5/0x480
[   25.902275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.902296]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.902321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.902344]  ? __kthread_parkme+0x82/0x180
[   25.902366]  ? preempt_count_sub+0x50/0x80
[   25.902390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.902412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.902585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.902611]  kthread+0x337/0x6f0
[   25.902630]  ? trace_preempt_on+0x20/0xc0
[   25.902654]  ? __pfx_kthread+0x10/0x10
[   25.902675]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.902697]  ? calculate_sigpending+0x7b/0xa0
[   25.902722]  ? __pfx_kthread+0x10/0x10
[   25.902754]  ret_from_fork+0x116/0x1d0
[   25.902772]  ? __pfx_kthread+0x10/0x10
[   25.902794]  ret_from_fork_asm+0x1a/0x30
[   25.902824]  </TASK>
[   25.902836] 
[   25.911097] Allocated by task 311:
[   25.911329]  kasan_save_stack+0x45/0x70
[   25.911556]  kasan_save_track+0x18/0x40
[   25.911749]  kasan_save_alloc_info+0x3b/0x50
[   25.911890]  __kasan_kmalloc+0xb7/0xc0
[   25.912015]  __kmalloc_cache_noprof+0x189/0x420
[   25.912199]  kasan_bitops_generic+0x92/0x1c0
[   25.912600]  kunit_try_run_case+0x1a5/0x480
[   25.912964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.913176]  kthread+0x337/0x6f0
[   25.913421]  ret_from_fork+0x116/0x1d0
[   25.913588]  ret_from_fork_asm+0x1a/0x30
[   25.913782] 
[   25.913854] The buggy address belongs to the object at ffff888104c83b80
[   25.913854]  which belongs to the cache kmalloc-16 of size 16
[   25.914351] The buggy address is located 8 bytes inside of
[   25.914351]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   25.914946] 
[   25.915016] The buggy address belongs to the physical page:
[   25.915182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   25.915415] flags: 0x200000000000000(node=0|zone=2)
[   25.915618] page_type: f5(slab)
[   25.915792] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.920518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.921810] page dumped because: kasan: bad access detected
[   25.923364] 
[   25.924349] Memory state around the buggy address:
[   25.925168]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.926229]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.926457] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.926658]                       ^
[   25.926878]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.927849]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.928960] ==================================================================
[   26.027590] ==================================================================
[   26.027991] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.028744] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   26.029175] 
[   26.029279] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.029332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.029344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.029411] Call Trace:
[   26.029435]  <TASK>
[   26.029469]  dump_stack_lvl+0x73/0xb0
[   26.029509]  print_report+0xd1/0x610
[   26.029532]  ? __virt_addr_valid+0x1db/0x2d0
[   26.029557]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.029592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.029618]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.029643]  kasan_report+0x141/0x180
[   26.029676]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.029706]  kasan_check_range+0x10c/0x1c0
[   26.029740]  __kasan_check_write+0x18/0x20
[   26.029762]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.029789]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.029815]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.029838]  ? trace_hardirqs_on+0x37/0xe0
[   26.029862]  ? kasan_bitops_generic+0x92/0x1c0
[   26.029889]  kasan_bitops_generic+0x116/0x1c0
[   26.029912]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.029946]  ? __pfx_read_tsc+0x10/0x10
[   26.029968]  ? ktime_get_ts64+0x86/0x230
[   26.029993]  kunit_try_run_case+0x1a5/0x480
[   26.030025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.030046]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.030069]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.030093]  ? __kthread_parkme+0x82/0x180
[   26.030113]  ? preempt_count_sub+0x50/0x80
[   26.030137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.030168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.030193]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.030219]  kthread+0x337/0x6f0
[   26.030248]  ? trace_preempt_on+0x20/0xc0
[   26.030471]  ? __pfx_kthread+0x10/0x10
[   26.030507]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.030531]  ? calculate_sigpending+0x7b/0xa0
[   26.030555]  ? __pfx_kthread+0x10/0x10
[   26.030577]  ret_from_fork+0x116/0x1d0
[   26.030596]  ? __pfx_kthread+0x10/0x10
[   26.030618]  ret_from_fork_asm+0x1a/0x30
[   26.030649]  </TASK>
[   26.030661] 
[   26.045001] Allocated by task 311:
[   26.045324]  kasan_save_stack+0x45/0x70
[   26.045824]  kasan_save_track+0x18/0x40
[   26.046201]  kasan_save_alloc_info+0x3b/0x50
[   26.046854]  __kasan_kmalloc+0xb7/0xc0
[   26.047236]  __kmalloc_cache_noprof+0x189/0x420
[   26.048285]  kasan_bitops_generic+0x92/0x1c0
[   26.048707]  kunit_try_run_case+0x1a5/0x480
[   26.049386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.049847]  kthread+0x337/0x6f0
[   26.049968]  ret_from_fork+0x116/0x1d0
[   26.050094]  ret_from_fork_asm+0x1a/0x30
[   26.050226] 
[   26.050473] The buggy address belongs to the object at ffff888104c83b80
[   26.050473]  which belongs to the cache kmalloc-16 of size 16
[   26.051751] The buggy address is located 8 bytes inside of
[   26.051751]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   26.052989] 
[   26.053216] The buggy address belongs to the physical page:
[   26.053703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   26.053955] flags: 0x200000000000000(node=0|zone=2)
[   26.054115] page_type: f5(slab)
[   26.054232] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.054470] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.055058] page dumped because: kasan: bad access detected
[   26.055389] 
[   26.055476] Memory state around the buggy address:
[   26.055713]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.056005]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.056338] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.056680]                       ^
[   26.056867]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.057170]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.057446] ==================================================================
[   26.058043] ==================================================================
[   26.058402] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.058811] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   26.059112] 
[   26.059222] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.059274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.059287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.059311] Call Trace:
[   26.059332]  <TASK>
[   26.059353]  dump_stack_lvl+0x73/0xb0
[   26.059381]  print_report+0xd1/0x610
[   26.059403]  ? __virt_addr_valid+0x1db/0x2d0
[   26.059631]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.059667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.059708]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.059744]  kasan_report+0x141/0x180
[   26.059767]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.059819]  kasan_check_range+0x10c/0x1c0
[   26.059842]  __kasan_check_write+0x18/0x20
[   26.059864]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.059900]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.059926]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.059950]  ? trace_hardirqs_on+0x37/0xe0
[   26.059973]  ? kasan_bitops_generic+0x92/0x1c0
[   26.059999]  kasan_bitops_generic+0x116/0x1c0
[   26.060022]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.060048]  ? __pfx_read_tsc+0x10/0x10
[   26.060070]  ? ktime_get_ts64+0x86/0x230
[   26.060095]  kunit_try_run_case+0x1a5/0x480
[   26.060118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.060137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.060162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.060186]  ? __kthread_parkme+0x82/0x180
[   26.060209]  ? preempt_count_sub+0x50/0x80
[   26.060233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.060264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.060350]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.060375]  kthread+0x337/0x6f0
[   26.060395]  ? trace_preempt_on+0x20/0xc0
[   26.060417]  ? __pfx_kthread+0x10/0x10
[   26.060439]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.060492]  ? calculate_sigpending+0x7b/0xa0
[   26.060519]  ? __pfx_kthread+0x10/0x10
[   26.060553]  ret_from_fork+0x116/0x1d0
[   26.060573]  ? __pfx_kthread+0x10/0x10
[   26.060593]  ret_from_fork_asm+0x1a/0x30
[   26.060624]  </TASK>
[   26.060636] 
[   26.069439] Allocated by task 311:
[   26.069672]  kasan_save_stack+0x45/0x70
[   26.069878]  kasan_save_track+0x18/0x40
[   26.070080]  kasan_save_alloc_info+0x3b/0x50
[   26.070323]  __kasan_kmalloc+0xb7/0xc0
[   26.070548]  __kmalloc_cache_noprof+0x189/0x420
[   26.070775]  kasan_bitops_generic+0x92/0x1c0
[   26.070956]  kunit_try_run_case+0x1a5/0x480
[   26.071136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.071471]  kthread+0x337/0x6f0
[   26.071681]  ret_from_fork+0x116/0x1d0
[   26.071827]  ret_from_fork_asm+0x1a/0x30
[   26.071965] 
[   26.072035] The buggy address belongs to the object at ffff888104c83b80
[   26.072035]  which belongs to the cache kmalloc-16 of size 16
[   26.072476] The buggy address is located 8 bytes inside of
[   26.072476]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   26.073384] 
[   26.073509] The buggy address belongs to the physical page:
[   26.073755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   26.074062] flags: 0x200000000000000(node=0|zone=2)
[   26.074230] page_type: f5(slab)
[   26.074354] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.074581] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.074933] page dumped because: kasan: bad access detected
[   26.075227] 
[   26.075322] Memory state around the buggy address:
[   26.075720]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.076089]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.076525] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.076868]                       ^
[   26.076987]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.077193]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.077763] ==================================================================