Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   61.170990] ==================================================================
[   61.178041] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   61.186894] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   61.194272] 
[   61.195754] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   61.195804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.195821] Hardware name: WinLink E850-96 board (DT)
[   61.195838] Call trace:
[   61.195852]  show_stack+0x20/0x38 (C)
[   61.195884]  dump_stack_lvl+0x8c/0xd0
[   61.195915]  print_report+0x118/0x5d0
[   61.195942]  kasan_report+0xdc/0x128
[   61.195971]  kasan_check_range+0x100/0x1a8
[   61.196001]  __kasan_check_write+0x20/0x30
[   61.196031]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   61.196070]  kasan_bitops_generic+0x11c/0x1c8
[   61.196105]  kunit_try_run_case+0x170/0x3f0
[   61.196141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.196174]  kthread+0x328/0x630
[   61.196200]  ret_from_fork+0x10/0x20
[   61.196233] 
[   61.269358] Allocated by task 345:
[   61.272743]  kasan_save_stack+0x3c/0x68
[   61.276563]  kasan_save_track+0x20/0x40
[   61.280382]  kasan_save_alloc_info+0x40/0x58
[   61.284635]  __kasan_kmalloc+0xd4/0xd8
[   61.288368]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.292881]  kasan_bitops_generic+0xa0/0x1c8
[   61.297135]  kunit_try_run_case+0x170/0x3f0
[   61.301302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.306770]  kthread+0x328/0x630
[   61.309982]  ret_from_fork+0x10/0x20
[   61.313541] 
[   61.315017] The buggy address belongs to the object at ffff000800b19520
[   61.315017]  which belongs to the cache kmalloc-16 of size 16
[   61.327344] The buggy address is located 8 bytes inside of
[   61.327344]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   61.339582] 
[   61.341058] The buggy address belongs to the physical page:
[   61.346615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   61.354600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.361110] page_type: f5(slab)
[   61.364245] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.371967] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.379686] page dumped because: kasan: bad access detected
[   61.385241] 
[   61.386717] Memory state around the buggy address:
[   61.391497]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.398700]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   61.405906] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   61.413106]                                   ^
[   61.417623]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.424828]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.432029] ==================================================================
[   61.704453] ==================================================================
[   61.711541] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   61.720480] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   61.727858] 
[   61.729337] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   61.729386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.729405] Hardware name: WinLink E850-96 board (DT)
[   61.729423] Call trace:
[   61.729435]  show_stack+0x20/0x38 (C)
[   61.729466]  dump_stack_lvl+0x8c/0xd0
[   61.729499]  print_report+0x118/0x5d0
[   61.729527]  kasan_report+0xdc/0x128
[   61.729553]  kasan_check_range+0x100/0x1a8
[   61.729583]  __kasan_check_write+0x20/0x30
[   61.729614]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   61.729650]  kasan_bitops_generic+0x11c/0x1c8
[   61.729686]  kunit_try_run_case+0x170/0x3f0
[   61.729718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.729748]  kthread+0x328/0x630
[   61.729775]  ret_from_fork+0x10/0x20
[   61.729804] 
[   61.803030] Allocated by task 345:
[   61.806416]  kasan_save_stack+0x3c/0x68
[   61.810235]  kasan_save_track+0x20/0x40
[   61.814055]  kasan_save_alloc_info+0x40/0x58
[   61.818308]  __kasan_kmalloc+0xd4/0xd8
[   61.822040]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.826554]  kasan_bitops_generic+0xa0/0x1c8
[   61.830808]  kunit_try_run_case+0x170/0x3f0
[   61.834974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.840443]  kthread+0x328/0x630
[   61.843655]  ret_from_fork+0x10/0x20
[   61.847214] 
[   61.848689] The buggy address belongs to the object at ffff000800b19520
[   61.848689]  which belongs to the cache kmalloc-16 of size 16
[   61.861016] The buggy address is located 8 bytes inside of
[   61.861016]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   61.873255] 
[   61.874731] The buggy address belongs to the physical page:
[   61.880287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   61.888272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.894783] page_type: f5(slab)
[   61.897917] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.905640] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.913359] page dumped because: kasan: bad access detected
[   61.918914] 
[   61.920389] Memory state around the buggy address:
[   61.925169]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.932373]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   61.939577] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   61.946778]                                   ^
[   61.951296]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.958500]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.965702] ==================================================================
[   63.305497] ==================================================================
[   63.312558] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   63.321498] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   63.328789] 
[   63.330269] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   63.330318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.330334] Hardware name: WinLink E850-96 board (DT)
[   63.330352] Call trace:
[   63.330364]  show_stack+0x20/0x38 (C)
[   63.330396]  dump_stack_lvl+0x8c/0xd0
[   63.330427]  print_report+0x118/0x5d0
[   63.330456]  kasan_report+0xdc/0x128
[   63.330482]  __asan_report_load8_noabort+0x20/0x30
[   63.330515]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   63.330555]  kasan_bitops_generic+0x11c/0x1c8
[   63.330589]  kunit_try_run_case+0x170/0x3f0
[   63.330622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.330657]  kthread+0x328/0x630
[   63.330684]  ret_from_fork+0x10/0x20
[   63.330714] 
[   63.400576] Allocated by task 345:
[   63.403961]  kasan_save_stack+0x3c/0x68
[   63.407781]  kasan_save_track+0x20/0x40
[   63.411600]  kasan_save_alloc_info+0x40/0x58
[   63.415853]  __kasan_kmalloc+0xd4/0xd8
[   63.419586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.424100]  kasan_bitops_generic+0xa0/0x1c8
[   63.428353]  kunit_try_run_case+0x170/0x3f0
[   63.432520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.437989]  kthread+0x328/0x630
[   63.441200]  ret_from_fork+0x10/0x20
[   63.444759] 
[   63.446235] The buggy address belongs to the object at ffff000800b19520
[   63.446235]  which belongs to the cache kmalloc-16 of size 16
[   63.458561] The buggy address is located 8 bytes inside of
[   63.458561]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   63.470801] 
[   63.472276] The buggy address belongs to the physical page:
[   63.477832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   63.485818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.492328] page_type: f5(slab)
[   63.495461] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   63.503185] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   63.510904] page dumped because: kasan: bad access detected
[   63.516459] 
[   63.517935] Memory state around the buggy address:
[   63.522713]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   63.529918]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   63.537123] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   63.544324]                                   ^
[   63.548841]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.556046]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.563247] ==================================================================
[   62.506745] ==================================================================
[   62.513786] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   62.522725] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   62.530016] 
[   62.531497] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   62.531546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.531562] Hardware name: WinLink E850-96 board (DT)
[   62.531581] Call trace:
[   62.531593]  show_stack+0x20/0x38 (C)
[   62.531623]  dump_stack_lvl+0x8c/0xd0
[   62.531652]  print_report+0x118/0x5d0
[   62.531680]  kasan_report+0xdc/0x128
[   62.531708]  __asan_report_load8_noabort+0x20/0x30
[   62.531743]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   62.531781]  kasan_bitops_generic+0x11c/0x1c8
[   62.531816]  kunit_try_run_case+0x170/0x3f0
[   62.531853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.531886]  kthread+0x328/0x630
[   62.531913]  ret_from_fork+0x10/0x20
[   62.531944] 
[   62.601803] Allocated by task 345:
[   62.605188]  kasan_save_stack+0x3c/0x68
[   62.609008]  kasan_save_track+0x20/0x40
[   62.612827]  kasan_save_alloc_info+0x40/0x58
[   62.617081]  __kasan_kmalloc+0xd4/0xd8
[   62.620813]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.625327]  kasan_bitops_generic+0xa0/0x1c8
[   62.629581]  kunit_try_run_case+0x170/0x3f0
[   62.633747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.639216]  kthread+0x328/0x630
[   62.642428]  ret_from_fork+0x10/0x20
[   62.645986] 
[   62.647462] The buggy address belongs to the object at ffff000800b19520
[   62.647462]  which belongs to the cache kmalloc-16 of size 16
[   62.659789] The buggy address is located 8 bytes inside of
[   62.659789]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   62.672028] 
[   62.673504] The buggy address belongs to the physical page:
[   62.679059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   62.687047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.693555] page_type: f5(slab)
[   62.696690] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.704412] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.712131] page dumped because: kasan: bad access detected
[   62.717687] 
[   62.719162] Memory state around the buggy address:
[   62.723941]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.731145]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   62.738350] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   62.745551]                                   ^
[   62.750068]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.757273]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.764474] ==================================================================
[   62.238153] ==================================================================
[   62.245213] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   62.254152] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   62.261530] 
[   62.263011] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   62.263059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.263077] Hardware name: WinLink E850-96 board (DT)
[   62.263095] Call trace:
[   62.263105]  show_stack+0x20/0x38 (C)
[   62.263138]  dump_stack_lvl+0x8c/0xd0
[   62.263166]  print_report+0x118/0x5d0
[   62.263192]  kasan_report+0xdc/0x128
[   62.263219]  kasan_check_range+0x100/0x1a8
[   62.263248]  __kasan_check_write+0x20/0x30
[   62.263278]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   62.263317]  kasan_bitops_generic+0x11c/0x1c8
[   62.263352]  kunit_try_run_case+0x170/0x3f0
[   62.263387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.263420]  kthread+0x328/0x630
[   62.263447]  ret_from_fork+0x10/0x20
[   62.263478] 
[   62.336703] Allocated by task 345:
[   62.340088]  kasan_save_stack+0x3c/0x68
[   62.343907]  kasan_save_track+0x20/0x40
[   62.347727]  kasan_save_alloc_info+0x40/0x58
[   62.351980]  __kasan_kmalloc+0xd4/0xd8
[   62.355713]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.360227]  kasan_bitops_generic+0xa0/0x1c8
[   62.364480]  kunit_try_run_case+0x170/0x3f0
[   62.368647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.374116]  kthread+0x328/0x630
[   62.377327]  ret_from_fork+0x10/0x20
[   62.380886] 
[   62.382362] The buggy address belongs to the object at ffff000800b19520
[   62.382362]  which belongs to the cache kmalloc-16 of size 16
[   62.394689] The buggy address is located 8 bytes inside of
[   62.394689]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   62.406928] 
[   62.408403] The buggy address belongs to the physical page:
[   62.413959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   62.421945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.428455] page_type: f5(slab)
[   62.431589] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.439312] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.447031] page dumped because: kasan: bad access detected
[   62.452586] 
[   62.454062] Memory state around the buggy address:
[   62.458840]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.466045]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   62.473250] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   62.480450]                                   ^
[   62.484969]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.492173]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.499374] ==================================================================
[   63.040392] ==================================================================
[   63.047458] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   63.056397] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   63.063689] 
[   63.065170] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   63.065217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.065235] Hardware name: WinLink E850-96 board (DT)
[   63.065251] Call trace:
[   63.065264]  show_stack+0x20/0x38 (C)
[   63.065296]  dump_stack_lvl+0x8c/0xd0
[   63.065324]  print_report+0x118/0x5d0
[   63.065352]  kasan_report+0xdc/0x128
[   63.065379]  __asan_report_load8_noabort+0x20/0x30
[   63.065413]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   63.065452]  kasan_bitops_generic+0x11c/0x1c8
[   63.065486]  kunit_try_run_case+0x170/0x3f0
[   63.065520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.065555]  kthread+0x328/0x630
[   63.065582]  ret_from_fork+0x10/0x20
[   63.065613] 
[   63.135477] Allocated by task 345:
[   63.138861]  kasan_save_stack+0x3c/0x68
[   63.142680]  kasan_save_track+0x20/0x40
[   63.146500]  kasan_save_alloc_info+0x40/0x58
[   63.150753]  __kasan_kmalloc+0xd4/0xd8
[   63.154486]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.158999]  kasan_bitops_generic+0xa0/0x1c8
[   63.163253]  kunit_try_run_case+0x170/0x3f0
[   63.167419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.172888]  kthread+0x328/0x630
[   63.176100]  ret_from_fork+0x10/0x20
[   63.179659] 
[   63.181135] The buggy address belongs to the object at ffff000800b19520
[   63.181135]  which belongs to the cache kmalloc-16 of size 16
[   63.193461] The buggy address is located 8 bytes inside of
[   63.193461]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   63.205700] 
[   63.207176] The buggy address belongs to the physical page:
[   63.212732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   63.220719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.227228] page_type: f5(slab)
[   63.230364] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   63.238085] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   63.245804] page dumped because: kasan: bad access detected
[   63.251359] 
[   63.252835] Memory state around the buggy address:
[   63.257613]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   63.264818]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   63.272023] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   63.279223]                                   ^
[   63.283741]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.290946]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.298147] ==================================================================
[   61.973077] ==================================================================
[   61.980112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   61.989052] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   61.996344] 
[   61.997823] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   61.997874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.997890] Hardware name: WinLink E850-96 board (DT)
[   61.997910] Call trace:
[   61.997922]  show_stack+0x20/0x38 (C)
[   61.997954]  dump_stack_lvl+0x8c/0xd0
[   61.997989]  print_report+0x118/0x5d0
[   61.998018]  kasan_report+0xdc/0x128
[   61.998046]  __asan_report_load8_noabort+0x20/0x30
[   61.998079]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   61.998119]  kasan_bitops_generic+0x11c/0x1c8
[   61.998153]  kunit_try_run_case+0x170/0x3f0
[   61.998187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.998220]  kthread+0x328/0x630
[   61.998247]  ret_from_fork+0x10/0x20
[   61.998279] 
[   62.068130] Allocated by task 345:
[   62.071516]  kasan_save_stack+0x3c/0x68
[   62.075336]  kasan_save_track+0x20/0x40
[   62.079155]  kasan_save_alloc_info+0x40/0x58
[   62.083408]  __kasan_kmalloc+0xd4/0xd8
[   62.087141]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.091654]  kasan_bitops_generic+0xa0/0x1c8
[   62.095908]  kunit_try_run_case+0x170/0x3f0
[   62.100075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.105543]  kthread+0x328/0x630
[   62.108755]  ret_from_fork+0x10/0x20
[   62.112314] 
[   62.113789] The buggy address belongs to the object at ffff000800b19520
[   62.113789]  which belongs to the cache kmalloc-16 of size 16
[   62.126116] The buggy address is located 8 bytes inside of
[   62.126116]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   62.138355] 
[   62.139831] The buggy address belongs to the physical page:
[   62.145387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   62.153375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.159883] page_type: f5(slab)
[   62.163017] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.170740] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.178459] page dumped because: kasan: bad access detected
[   62.184014] 
[   62.185490] Memory state around the buggy address:
[   62.190269]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.197472]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   62.204677] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   62.211878]                                   ^
[   62.216396]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.223601]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.230802] ==================================================================
[   62.771819] ==================================================================
[   62.778887] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   62.787825] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   62.795203] 
[   62.796682] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   62.796731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.796747] Hardware name: WinLink E850-96 board (DT)
[   62.796766] Call trace:
[   62.796778]  show_stack+0x20/0x38 (C)
[   62.796809]  dump_stack_lvl+0x8c/0xd0
[   62.796839]  print_report+0x118/0x5d0
[   62.796867]  kasan_report+0xdc/0x128
[   62.796894]  kasan_check_range+0x100/0x1a8
[   62.796924]  __kasan_check_write+0x20/0x30
[   62.796955]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   62.796995]  kasan_bitops_generic+0x11c/0x1c8
[   62.797029]  kunit_try_run_case+0x170/0x3f0
[   62.797062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.797095]  kthread+0x328/0x630
[   62.797121]  ret_from_fork+0x10/0x20
[   62.797153] 
[   62.870375] Allocated by task 345:
[   62.873761]  kasan_save_stack+0x3c/0x68
[   62.877580]  kasan_save_track+0x20/0x40
[   62.881400]  kasan_save_alloc_info+0x40/0x58
[   62.885653]  __kasan_kmalloc+0xd4/0xd8
[   62.889386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.893899]  kasan_bitops_generic+0xa0/0x1c8
[   62.898153]  kunit_try_run_case+0x170/0x3f0
[   62.902319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.907788]  kthread+0x328/0x630
[   62.911000]  ret_from_fork+0x10/0x20
[   62.914559] 
[   62.916036] The buggy address belongs to the object at ffff000800b19520
[   62.916036]  which belongs to the cache kmalloc-16 of size 16
[   62.928361] The buggy address is located 8 bytes inside of
[   62.928361]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   62.940600] 
[   62.942076] The buggy address belongs to the physical page:
[   62.947632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   62.955617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.962128] page_type: f5(slab)
[   62.965262] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.972984] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.980704] page dumped because: kasan: bad access detected
[   62.986259] 
[   62.987735] Memory state around the buggy address:
[   62.992513]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.999718]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   63.006922] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   63.014123]                                   ^
[   63.018641]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.025846]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.033047] ==================================================================
[   61.439401] ==================================================================
[   61.446440] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   61.455381] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   61.462671] 
[   61.464153] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   61.464204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.464221] Hardware name: WinLink E850-96 board (DT)
[   61.464239] Call trace:
[   61.464252]  show_stack+0x20/0x38 (C)
[   61.464285]  dump_stack_lvl+0x8c/0xd0
[   61.464314]  print_report+0x118/0x5d0
[   61.464342]  kasan_report+0xdc/0x128
[   61.464369]  __asan_report_load8_noabort+0x20/0x30
[   61.464404]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   61.464447]  kasan_bitops_generic+0x11c/0x1c8
[   61.464480]  kunit_try_run_case+0x170/0x3f0
[   61.464513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.464548]  kthread+0x328/0x630
[   61.464574]  ret_from_fork+0x10/0x20
[   61.464605] 
[   61.534458] Allocated by task 345:
[   61.537843]  kasan_save_stack+0x3c/0x68
[   61.541663]  kasan_save_track+0x20/0x40
[   61.545482]  kasan_save_alloc_info+0x40/0x58
[   61.549736]  __kasan_kmalloc+0xd4/0xd8
[   61.553468]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.557982]  kasan_bitops_generic+0xa0/0x1c8
[   61.562235]  kunit_try_run_case+0x170/0x3f0
[   61.566402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.571870]  kthread+0x328/0x630
[   61.575082]  ret_from_fork+0x10/0x20
[   61.578641] 
[   61.580117] The buggy address belongs to the object at ffff000800b19520
[   61.580117]  which belongs to the cache kmalloc-16 of size 16
[   61.592444] The buggy address is located 8 bytes inside of
[   61.592444]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   61.604683] 
[   61.606158] The buggy address belongs to the physical page:
[   61.611715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   61.619702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.626210] page_type: f5(slab)
[   61.629345] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.637067] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.644786] page dumped because: kasan: bad access detected
[   61.650342] 
[   61.651817] Memory state around the buggy address:
[   61.656597]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.663800]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   61.671007] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   61.678206]                                   ^
[   61.682723]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.689928]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.697129] ==================================================================

[   32.775843] ==================================================================
[   32.775925] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   32.776620]  show_stack+0x20/0x38 (C)
[   32.777060]  kunit_try_run_case+0x170/0x3f0
[   32.777957]  kasan_save_alloc_info+0x40/0x58
[   32.779516] The buggy address is located 8 bytes inside of
[   32.779516]  allocated 9-byte region [fff00000c63ef120, fff00000c63ef129)
[   32.781633] >fff00000c63ef100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.783922] Write of size 8 at addr fff00000c63ef128 by task kunit_try_catch/292
[   32.784813]  kasan_check_range+0x100/0x1a8
[   32.785071]  kunit_try_run_case+0x170/0x3f0
[   32.786720]  kasan_bitops_generic+0xa0/0x1c8
[   32.787923] 
[   32.788475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.789472]  fff00000c63ef080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.791990] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   32.793269]  kasan_report+0xdc/0x128
[   32.793581]  kasan_bitops_generic+0x11c/0x1c8
[   32.794000]  kasan_save_track+0x20/0x40
[   32.794523] The buggy address is located 8 bytes inside of
[   32.794523]  allocated 9-byte region [fff00000c63ef120, fff00000c63ef129)
[   32.796270]  fff00000c63ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.797977] 
[   32.798284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.799922]  __kasan_check_write+0x20/0x30
[   32.800455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.801744]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.803584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ef
[   32.804881]                                   ^
[   32.806191] ==================================================================
[   32.768128] ==================================================================
[   32.768619] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   32.769270] Hardware name: linux,dummy-virt (DT)
[   32.769889]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   32.770353]  kasan_save_track+0x20/0x40
[   32.771944] 
[   32.772189] The buggy address is located 8 bytes inside of
[   32.772189]  allocated 9-byte region [fff00000c63ef120, fff00000c63ef129)
[   32.774417] ==================================================================

[   26.193750] ==================================================================
[   26.193988] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.194248] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   26.194509] 
[   26.194593] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.194644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.194656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.194680] Call Trace:
[   26.194700]  <TASK>
[   26.194718]  dump_stack_lvl+0x73/0xb0
[   26.194759]  print_report+0xd1/0x610
[   26.194782]  ? __virt_addr_valid+0x1db/0x2d0
[   26.194808]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.195625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.195662]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.195707]  kasan_report+0x141/0x180
[   26.195748]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.195780]  kasan_check_range+0x10c/0x1c0
[   26.195804]  __kasan_check_write+0x18/0x20
[   26.195838]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.195865]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.195892]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.195917]  ? trace_hardirqs_on+0x37/0xe0
[   26.195941]  ? kasan_bitops_generic+0x92/0x1c0
[   26.195977]  kasan_bitops_generic+0x121/0x1c0
[   26.196001]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.196025]  ? __pfx_read_tsc+0x10/0x10
[   26.196483]  ? ktime_get_ts64+0x86/0x230
[   26.196523]  kunit_try_run_case+0x1a5/0x480
[   26.196561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.196581]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.196606]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.196641]  ? __kthread_parkme+0x82/0x180
[   26.196662]  ? preempt_count_sub+0x50/0x80
[   26.196686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.196718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.196763]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.196787]  kthread+0x337/0x6f0
[   26.196807]  ? trace_preempt_on+0x20/0xc0
[   26.196842]  ? __pfx_kthread+0x10/0x10
[   26.196863]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.196885]  ? calculate_sigpending+0x7b/0xa0
[   26.196910]  ? __pfx_kthread+0x10/0x10
[   26.196932]  ret_from_fork+0x116/0x1d0
[   26.196950]  ? __pfx_kthread+0x10/0x10
[   26.196971]  ret_from_fork_asm+0x1a/0x30
[   26.197002]  </TASK>
[   26.197014] 
[   26.208601] Allocated by task 311:
[   26.208980]  kasan_save_stack+0x45/0x70
[   26.209167]  kasan_save_track+0x18/0x40
[   26.209458]  kasan_save_alloc_info+0x3b/0x50
[   26.209641]  __kasan_kmalloc+0xb7/0xc0
[   26.209946]  __kmalloc_cache_noprof+0x189/0x420
[   26.210268]  kasan_bitops_generic+0x92/0x1c0
[   26.210467]  kunit_try_run_case+0x1a5/0x480
[   26.210801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.211131]  kthread+0x337/0x6f0
[   26.211415]  ret_from_fork+0x116/0x1d0
[   26.211592]  ret_from_fork_asm+0x1a/0x30
[   26.211896] 
[   26.211997] The buggy address belongs to the object at ffff888104c83b80
[   26.211997]  which belongs to the cache kmalloc-16 of size 16
[   26.212699] The buggy address is located 8 bytes inside of
[   26.212699]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   26.213210] 
[   26.213287] The buggy address belongs to the physical page:
[   26.213587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   26.213942] flags: 0x200000000000000(node=0|zone=2)
[   26.214145] page_type: f5(slab)
[   26.214333] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.214650] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.215053] page dumped because: kasan: bad access detected
[   26.215300] 
[   26.215436] Memory state around the buggy address:
[   26.215607]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.215933]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.216211] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.216561]                       ^
[   26.216682]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.216986]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.217281] ==================================================================
[   26.175231] ==================================================================
[   26.175595] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.175912] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   26.176238] 
[   26.176355] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.176427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.176440] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.176462] Call Trace:
[   26.176483]  <TASK>
[   26.176501]  dump_stack_lvl+0x73/0xb0
[   26.176530]  print_report+0xd1/0x610
[   26.176551]  ? __virt_addr_valid+0x1db/0x2d0
[   26.176576]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.176603]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.176629]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.176656]  kasan_report+0x141/0x180
[   26.176676]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.176707]  kasan_check_range+0x10c/0x1c0
[   26.176740]  __kasan_check_write+0x18/0x20
[   26.176762]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.176948]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.176977]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.177015]  ? trace_hardirqs_on+0x37/0xe0
[   26.177037]  ? kasan_bitops_generic+0x92/0x1c0
[   26.177076]  kasan_bitops_generic+0x121/0x1c0
[   26.177100]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.177125]  ? __pfx_read_tsc+0x10/0x10
[   26.177147]  ? ktime_get_ts64+0x86/0x230
[   26.177182]  kunit_try_run_case+0x1a5/0x480
[   26.177203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.177224]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.177258]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.177282]  ? __kthread_parkme+0x82/0x180
[   26.177303]  ? preempt_count_sub+0x50/0x80
[   26.177334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.177355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.177381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.177433]  kthread+0x337/0x6f0
[   26.177453]  ? trace_preempt_on+0x20/0xc0
[   26.177476]  ? __pfx_kthread+0x10/0x10
[   26.177506]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.177528]  ? calculate_sigpending+0x7b/0xa0
[   26.177553]  ? __pfx_kthread+0x10/0x10
[   26.177585]  ret_from_fork+0x116/0x1d0
[   26.177606]  ? __pfx_kthread+0x10/0x10
[   26.177626]  ret_from_fork_asm+0x1a/0x30
[   26.177657]  </TASK>
[   26.177669] 
[   26.185280] Allocated by task 311:
[   26.185498]  kasan_save_stack+0x45/0x70
[   26.185715]  kasan_save_track+0x18/0x40
[   26.185894]  kasan_save_alloc_info+0x3b/0x50
[   26.186036]  __kasan_kmalloc+0xb7/0xc0
[   26.186161]  __kmalloc_cache_noprof+0x189/0x420
[   26.186308]  kasan_bitops_generic+0x92/0x1c0
[   26.186474]  kunit_try_run_case+0x1a5/0x480
[   26.186628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.186908]  kthread+0x337/0x6f0
[   26.187100]  ret_from_fork+0x116/0x1d0
[   26.187317]  ret_from_fork_asm+0x1a/0x30
[   26.187576] 
[   26.187680] The buggy address belongs to the object at ffff888104c83b80
[   26.187680]  which belongs to the cache kmalloc-16 of size 16
[   26.188204] The buggy address is located 8 bytes inside of
[   26.188204]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   26.188776] 
[   26.188852] The buggy address belongs to the physical page:
[   26.189020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   26.189298] flags: 0x200000000000000(node=0|zone=2)
[   26.189962] page_type: f5(slab)
[   26.190155] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.190525] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.190889] page dumped because: kasan: bad access detected
[   26.191131] 
[   26.191216] Memory state around the buggy address:
[   26.191416]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.191620]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.191846] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.192102]                       ^
[   26.192275]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.192665]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.192917] ==================================================================
[   26.132643] ==================================================================
[   26.133038] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.133510] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   26.133864] 
[   26.133973] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.134023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.134035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.134058] Call Trace:
[   26.134078]  <TASK>
[   26.134095]  dump_stack_lvl+0x73/0xb0
[   26.134123]  print_report+0xd1/0x610
[   26.134144]  ? __virt_addr_valid+0x1db/0x2d0
[   26.134169]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.134195]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.134220]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.134248]  kasan_report+0x141/0x180
[   26.134280]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.134311]  kasan_check_range+0x10c/0x1c0
[   26.134345]  __kasan_check_write+0x18/0x20
[   26.134368]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.134412]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.134448]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.134472]  ? trace_hardirqs_on+0x37/0xe0
[   26.134495]  ? kasan_bitops_generic+0x92/0x1c0
[   26.134532]  kasan_bitops_generic+0x121/0x1c0
[   26.134558]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.134584]  ? __pfx_read_tsc+0x10/0x10
[   26.134615]  ? ktime_get_ts64+0x86/0x230
[   26.134640]  kunit_try_run_case+0x1a5/0x480
[   26.134661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.134693]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.134718]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.134750]  ? __kthread_parkme+0x82/0x180
[   26.134781]  ? preempt_count_sub+0x50/0x80
[   26.134806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.134829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.134866]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.134891]  kthread+0x337/0x6f0
[   26.134911]  ? trace_preempt_on+0x20/0xc0
[   26.134942]  ? __pfx_kthread+0x10/0x10
[   26.134963]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.134985]  ? calculate_sigpending+0x7b/0xa0
[   26.135019]  ? __pfx_kthread+0x10/0x10
[   26.135041]  ret_from_fork+0x116/0x1d0
[   26.135060]  ? __pfx_kthread+0x10/0x10
[   26.135090]  ret_from_fork_asm+0x1a/0x30
[   26.135121]  </TASK>
[   26.135131] 
[   26.146369] Allocated by task 311:
[   26.146757]  kasan_save_stack+0x45/0x70
[   26.146943]  kasan_save_track+0x18/0x40
[   26.147109]  kasan_save_alloc_info+0x3b/0x50
[   26.147297]  __kasan_kmalloc+0xb7/0xc0
[   26.147708]  __kmalloc_cache_noprof+0x189/0x420
[   26.148114]  kasan_bitops_generic+0x92/0x1c0
[   26.148518]  kunit_try_run_case+0x1a5/0x480
[   26.148921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.149416]  kthread+0x337/0x6f0
[   26.149653]  ret_from_fork+0x116/0x1d0
[   26.149961]  ret_from_fork_asm+0x1a/0x30
[   26.150145] 
[   26.150231] The buggy address belongs to the object at ffff888104c83b80
[   26.150231]  which belongs to the cache kmalloc-16 of size 16
[   26.151039] The buggy address is located 8 bytes inside of
[   26.151039]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   26.151707] 
[   26.151804] The buggy address belongs to the physical page:
[   26.152038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   26.152364] flags: 0x200000000000000(node=0|zone=2)
[   26.152651] page_type: f5(slab)
[   26.152828] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.153130] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.153493] page dumped because: kasan: bad access detected
[   26.153712] 
[   26.153828] Memory state around the buggy address:
[   26.154023]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.154276]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.154647] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.154968]                       ^
[   26.155086]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.155413]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.155700] ==================================================================
[   26.218724] ==================================================================
[   26.219040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.219402] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   26.219707] 
[   26.219988] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.220044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.220057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.220080] Call Trace:
[   26.220102]  <TASK>
[   26.220132]  dump_stack_lvl+0x73/0xb0
[   26.220162]  print_report+0xd1/0x610
[   26.220185]  ? __virt_addr_valid+0x1db/0x2d0
[   26.220221]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.220247]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.220272]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.220299]  kasan_report+0x141/0x180
[   26.220325]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.220356]  kasan_check_range+0x10c/0x1c0
[   26.220378]  __kasan_check_write+0x18/0x20
[   26.220420]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.220447]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.220474]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.220508]  ? trace_hardirqs_on+0x37/0xe0
[   26.220530]  ? kasan_bitops_generic+0x92/0x1c0
[   26.220557]  kasan_bitops_generic+0x121/0x1c0
[   26.220590]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.220614]  ? __pfx_read_tsc+0x10/0x10
[   26.220636]  ? ktime_get_ts64+0x86/0x230
[   26.220660]  kunit_try_run_case+0x1a5/0x480
[   26.220682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.220702]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.220726]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.220759]  ? __kthread_parkme+0x82/0x180
[   26.220780]  ? preempt_count_sub+0x50/0x80
[   26.220805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.220827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.220852]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.220877]  kthread+0x337/0x6f0
[   26.220897]  ? trace_preempt_on+0x20/0xc0
[   26.220919]  ? __pfx_kthread+0x10/0x10
[   26.220939]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.220961]  ? calculate_sigpending+0x7b/0xa0
[   26.220985]  ? __pfx_kthread+0x10/0x10
[   26.221007]  ret_from_fork+0x116/0x1d0
[   26.221026]  ? __pfx_kthread+0x10/0x10
[   26.221047]  ret_from_fork_asm+0x1a/0x30
[   26.221078]  </TASK>
[   26.221089] 
[   26.228908] Allocated by task 311:
[   26.229097]  kasan_save_stack+0x45/0x70
[   26.229300]  kasan_save_track+0x18/0x40
[   26.229509]  kasan_save_alloc_info+0x3b/0x50
[   26.229654]  __kasan_kmalloc+0xb7/0xc0
[   26.229835]  __kmalloc_cache_noprof+0x189/0x420
[   26.230054]  kasan_bitops_generic+0x92/0x1c0
[   26.230284]  kunit_try_run_case+0x1a5/0x480
[   26.230522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.230761]  kthread+0x337/0x6f0
[   26.230929]  ret_from_fork+0x116/0x1d0
[   26.231108]  ret_from_fork_asm+0x1a/0x30
[   26.231294] 
[   26.231385] The buggy address belongs to the object at ffff888104c83b80
[   26.231385]  which belongs to the cache kmalloc-16 of size 16
[   26.231902] The buggy address is located 8 bytes inside of
[   26.231902]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   26.232414] 
[   26.232526] The buggy address belongs to the physical page:
[   26.232705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   26.232948] flags: 0x200000000000000(node=0|zone=2)
[   26.233109] page_type: f5(slab)
[   26.233226] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.233618] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.234015] page dumped because: kasan: bad access detected
[   26.234283] 
[   26.234370] Memory state around the buggy address:
[   26.234544]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.234762]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.235031] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.235355]                       ^
[   26.235552]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.235873]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.236194] ==================================================================
[   26.156908] ==================================================================
[   26.157241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.157638] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   26.157943] 
[   26.158060] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.158113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.158124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.158147] Call Trace:
[   26.158170]  <TASK>
[   26.158189]  dump_stack_lvl+0x73/0xb0
[   26.158218]  print_report+0xd1/0x610
[   26.158240]  ? __virt_addr_valid+0x1db/0x2d0
[   26.158264]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.158290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.158315]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.158341]  kasan_report+0x141/0x180
[   26.158362]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.158392]  kasan_check_range+0x10c/0x1c0
[   26.158415]  __kasan_check_write+0x18/0x20
[   26.158437]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.158464]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.158491]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.158515]  ? trace_hardirqs_on+0x37/0xe0
[   26.158537]  ? kasan_bitops_generic+0x92/0x1c0
[   26.158562]  kasan_bitops_generic+0x121/0x1c0
[   26.158584]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.158608]  ? __pfx_read_tsc+0x10/0x10
[   26.158630]  ? ktime_get_ts64+0x86/0x230
[   26.158654]  kunit_try_run_case+0x1a5/0x480
[   26.158675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.158694]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.158718]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.159117]  ? __kthread_parkme+0x82/0x180
[   26.159146]  ? preempt_count_sub+0x50/0x80
[   26.159171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.159192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.159219]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.159243]  kthread+0x337/0x6f0
[   26.159263]  ? trace_preempt_on+0x20/0xc0
[   26.159286]  ? __pfx_kthread+0x10/0x10
[   26.159307]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.159329]  ? calculate_sigpending+0x7b/0xa0
[   26.159354]  ? __pfx_kthread+0x10/0x10
[   26.159377]  ret_from_fork+0x116/0x1d0
[   26.159415]  ? __pfx_kthread+0x10/0x10
[   26.159437]  ret_from_fork_asm+0x1a/0x30
[   26.159468]  </TASK>
[   26.159479] 
[   26.167313] Allocated by task 311:
[   26.167507]  kasan_save_stack+0x45/0x70
[   26.167707]  kasan_save_track+0x18/0x40
[   26.167875]  kasan_save_alloc_info+0x3b/0x50
[   26.168089]  __kasan_kmalloc+0xb7/0xc0
[   26.168258]  __kmalloc_cache_noprof+0x189/0x420
[   26.168504]  kasan_bitops_generic+0x92/0x1c0
[   26.168704]  kunit_try_run_case+0x1a5/0x480
[   26.168890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.169066]  kthread+0x337/0x6f0
[   26.169253]  ret_from_fork+0x116/0x1d0
[   26.169458]  ret_from_fork_asm+0x1a/0x30
[   26.169645] 
[   26.169710] The buggy address belongs to the object at ffff888104c83b80
[   26.169710]  which belongs to the cache kmalloc-16 of size 16
[   26.170203] The buggy address is located 8 bytes inside of
[   26.170203]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   26.170633] 
[   26.170701] The buggy address belongs to the physical page:
[   26.170876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   26.171197] flags: 0x200000000000000(node=0|zone=2)
[   26.171455] page_type: f5(slab)
[   26.171636] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.171976] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.172194] page dumped because: kasan: bad access detected
[   26.172362] 
[   26.172448] Memory state around the buggy address:
[   26.172607]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.172934]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.173275] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.173655]                       ^
[   26.173835]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.174179]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.174466] ==================================================================
[   26.096819] ==================================================================
[   26.097161] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.097606] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   26.097940] 
[   26.098047] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.098111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.098125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.098159] Call Trace:
[   26.098176]  <TASK>
[   26.098193]  dump_stack_lvl+0x73/0xb0
[   26.098224]  print_report+0xd1/0x610
[   26.098245]  ? __virt_addr_valid+0x1db/0x2d0
[   26.098270]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.098297]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.098323]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.098351]  kasan_report+0x141/0x180
[   26.098372]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.098422]  kasan_check_range+0x10c/0x1c0
[   26.098446]  __kasan_check_write+0x18/0x20
[   26.098468]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.098494]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.098522]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.098555]  ? trace_hardirqs_on+0x37/0xe0
[   26.098579]  ? kasan_bitops_generic+0x92/0x1c0
[   26.098607]  kasan_bitops_generic+0x121/0x1c0
[   26.098640]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.098664]  ? __pfx_read_tsc+0x10/0x10
[   26.098686]  ? ktime_get_ts64+0x86/0x230
[   26.098712]  kunit_try_run_case+0x1a5/0x480
[   26.098743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.098763]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.098787]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.098811]  ? __kthread_parkme+0x82/0x180
[   26.098832]  ? preempt_count_sub+0x50/0x80
[   26.098855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.098877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.098902]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.098927]  kthread+0x337/0x6f0
[   26.098947]  ? trace_preempt_on+0x20/0xc0
[   26.098970]  ? __pfx_kthread+0x10/0x10
[   26.098991]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.099012]  ? calculate_sigpending+0x7b/0xa0
[   26.099037]  ? __pfx_kthread+0x10/0x10
[   26.099059]  ret_from_fork+0x116/0x1d0
[   26.099079]  ? __pfx_kthread+0x10/0x10
[   26.099099]  ret_from_fork_asm+0x1a/0x30
[   26.099130]  </TASK>
[   26.099141] 
[   26.106949] Allocated by task 311:
[   26.107123]  kasan_save_stack+0x45/0x70
[   26.107316]  kasan_save_track+0x18/0x40
[   26.107518]  kasan_save_alloc_info+0x3b/0x50
[   26.107724]  __kasan_kmalloc+0xb7/0xc0
[   26.107904]  __kmalloc_cache_noprof+0x189/0x420
[   26.108055]  kasan_bitops_generic+0x92/0x1c0
[   26.108196]  kunit_try_run_case+0x1a5/0x480
[   26.108414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.108691]  kthread+0x337/0x6f0
[   26.108889]  ret_from_fork+0x116/0x1d0
[   26.109056]  ret_from_fork_asm+0x1a/0x30
[   26.109201] 
[   26.109265] The buggy address belongs to the object at ffff888104c83b80
[   26.109265]  which belongs to the cache kmalloc-16 of size 16
[   26.109646] The buggy address is located 8 bytes inside of
[   26.109646]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   26.110132] 
[   26.110221] The buggy address belongs to the physical page:
[   26.110513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   26.110861] flags: 0x200000000000000(node=0|zone=2)
[   26.111092] page_type: f5(slab)
[   26.111213] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.111462] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.111687] page dumped because: kasan: bad access detected
[   26.111947] 
[   26.112042] Memory state around the buggy address:
[   26.112280]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.112638]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.112970] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.113286]                       ^
[   26.113469]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.113762]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.114058] ==================================================================
[   26.114697] ==================================================================
[   26.115026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.115430] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   26.115749] 
[   26.115832] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.115881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.115894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.115915] Call Trace:
[   26.115934]  <TASK>
[   26.115949]  dump_stack_lvl+0x73/0xb0
[   26.115977]  print_report+0xd1/0x610
[   26.115998]  ? __virt_addr_valid+0x1db/0x2d0
[   26.116021]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.116047]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.116073]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.116111]  kasan_report+0x141/0x180
[   26.116132]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.116174]  kasan_check_range+0x10c/0x1c0
[   26.116198]  __kasan_check_write+0x18/0x20
[   26.116221]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.116247]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.116275]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.116299]  ? trace_hardirqs_on+0x37/0xe0
[   26.116325]  ? kasan_bitops_generic+0x92/0x1c0
[   26.116352]  kasan_bitops_generic+0x121/0x1c0
[   26.116375]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.116418]  ? __pfx_read_tsc+0x10/0x10
[   26.116439]  ? ktime_get_ts64+0x86/0x230
[   26.116464]  kunit_try_run_case+0x1a5/0x480
[   26.116495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.116516]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.116541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.116575]  ? __kthread_parkme+0x82/0x180
[   26.116596]  ? preempt_count_sub+0x50/0x80
[   26.116621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.116642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.116667]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.116693]  kthread+0x337/0x6f0
[   26.116712]  ? trace_preempt_on+0x20/0xc0
[   26.116742]  ? __pfx_kthread+0x10/0x10
[   26.116763]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.116785]  ? calculate_sigpending+0x7b/0xa0
[   26.116809]  ? __pfx_kthread+0x10/0x10
[   26.116831]  ret_from_fork+0x116/0x1d0
[   26.116849]  ? __pfx_kthread+0x10/0x10
[   26.116870]  ret_from_fork_asm+0x1a/0x30
[   26.116901]  </TASK>
[   26.116913] 
[   26.124487] Allocated by task 311:
[   26.124654]  kasan_save_stack+0x45/0x70
[   26.124870]  kasan_save_track+0x18/0x40
[   26.125072]  kasan_save_alloc_info+0x3b/0x50
[   26.125318]  __kasan_kmalloc+0xb7/0xc0
[   26.125558]  __kmalloc_cache_noprof+0x189/0x420
[   26.125799]  kasan_bitops_generic+0x92/0x1c0
[   26.125943]  kunit_try_run_case+0x1a5/0x480
[   26.126143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.126451]  kthread+0x337/0x6f0
[   26.126605]  ret_from_fork+0x116/0x1d0
[   26.126769]  ret_from_fork_asm+0x1a/0x30
[   26.126962] 
[   26.127064] The buggy address belongs to the object at ffff888104c83b80
[   26.127064]  which belongs to the cache kmalloc-16 of size 16
[   26.127573] The buggy address is located 8 bytes inside of
[   26.127573]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   26.128084] 
[   26.128167] The buggy address belongs to the physical page:
[   26.128423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   26.128781] flags: 0x200000000000000(node=0|zone=2)
[   26.128974] page_type: f5(slab)
[   26.129091] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.129315] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.129561] page dumped because: kasan: bad access detected
[   26.129745] 
[   26.129846] Memory state around the buggy address:
[   26.130069]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.130376]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.130701] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.131018]                       ^
[   26.131186]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.131524]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.131829] ==================================================================
[   26.254840] ==================================================================
[   26.255356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.255803] Read of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   26.256032] 
[   26.256162] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.256224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.256237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.256258] Call Trace:
[   26.256290]  <TASK>
[   26.256307]  dump_stack_lvl+0x73/0xb0
[   26.256342]  print_report+0xd1/0x610
[   26.256373]  ? __virt_addr_valid+0x1db/0x2d0
[   26.256420]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.256449]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.256474]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.256500]  kasan_report+0x141/0x180
[   26.256522]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.256552]  __asan_report_load8_noabort+0x18/0x20
[   26.256585]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.256611]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.256649]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.256672]  ? trace_hardirqs_on+0x37/0xe0
[   26.256694]  ? kasan_bitops_generic+0x92/0x1c0
[   26.256721]  kasan_bitops_generic+0x121/0x1c0
[   26.256753]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.256777]  ? __pfx_read_tsc+0x10/0x10
[   26.256799]  ? ktime_get_ts64+0x86/0x230
[   26.256824]  kunit_try_run_case+0x1a5/0x480
[   26.256846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.256866]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.256890]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.256913]  ? __kthread_parkme+0x82/0x180
[   26.256936]  ? preempt_count_sub+0x50/0x80
[   26.256960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.256990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.257016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.257041]  kthread+0x337/0x6f0
[   26.257070]  ? trace_preempt_on+0x20/0xc0
[   26.257092]  ? __pfx_kthread+0x10/0x10
[   26.257113]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.257135]  ? calculate_sigpending+0x7b/0xa0
[   26.257159]  ? __pfx_kthread+0x10/0x10
[   26.257181]  ret_from_fork+0x116/0x1d0
[   26.257199]  ? __pfx_kthread+0x10/0x10
[   26.257220]  ret_from_fork_asm+0x1a/0x30
[   26.257250]  </TASK>
[   26.257261] 
[   26.264667] Allocated by task 311:
[   26.264797]  kasan_save_stack+0x45/0x70
[   26.264933]  kasan_save_track+0x18/0x40
[   26.265118]  kasan_save_alloc_info+0x3b/0x50
[   26.265351]  __kasan_kmalloc+0xb7/0xc0
[   26.265578]  __kmalloc_cache_noprof+0x189/0x420
[   26.265801]  kasan_bitops_generic+0x92/0x1c0
[   26.266027]  kunit_try_run_case+0x1a5/0x480
[   26.266230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.266497]  kthread+0x337/0x6f0
[   26.266658]  ret_from_fork+0x116/0x1d0
[   26.266853]  ret_from_fork_asm+0x1a/0x30
[   26.267022] 
[   26.267123] The buggy address belongs to the object at ffff888104c83b80
[   26.267123]  which belongs to the cache kmalloc-16 of size 16
[   26.267621] The buggy address is located 8 bytes inside of
[   26.267621]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   26.268112] 
[   26.268208] The buggy address belongs to the physical page:
[   26.268466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   26.268724] flags: 0x200000000000000(node=0|zone=2)
[   26.268891] page_type: f5(slab)
[   26.269006] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.269227] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.269560] page dumped because: kasan: bad access detected
[   26.269808] 
[   26.269893] Memory state around the buggy address:
[   26.270105]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.270426]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.270687] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.270967]                       ^
[   26.271083]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.271287]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.271514] ==================================================================
[   26.237058] ==================================================================
[   26.237460] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.237852] Read of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311
[   26.238141] 
[   26.238251] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.238303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.238315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.238338] Call Trace:
[   26.238360]  <TASK>
[   26.238378]  dump_stack_lvl+0x73/0xb0
[   26.238429]  print_report+0xd1/0x610
[   26.238450]  ? __virt_addr_valid+0x1db/0x2d0
[   26.238477]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.238504]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.238530]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.238556]  kasan_report+0x141/0x180
[   26.238577]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.238608]  kasan_check_range+0x10c/0x1c0
[   26.238631]  __kasan_check_read+0x15/0x20
[   26.238663]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.238689]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.238717]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.238766]  ? trace_hardirqs_on+0x37/0xe0
[   26.238788]  ? kasan_bitops_generic+0x92/0x1c0
[   26.238814]  kasan_bitops_generic+0x121/0x1c0
[   26.238848]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.238872]  ? __pfx_read_tsc+0x10/0x10
[   26.238894]  ? ktime_get_ts64+0x86/0x230
[   26.238919]  kunit_try_run_case+0x1a5/0x480
[   26.238942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.238963]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.238987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.239010]  ? __kthread_parkme+0x82/0x180
[   26.239031]  ? preempt_count_sub+0x50/0x80
[   26.239054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.239076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.239102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.239127]  kthread+0x337/0x6f0
[   26.239148]  ? trace_preempt_on+0x20/0xc0
[   26.239170]  ? __pfx_kthread+0x10/0x10
[   26.239191]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.239212]  ? calculate_sigpending+0x7b/0xa0
[   26.239236]  ? __pfx_kthread+0x10/0x10
[   26.239258]  ret_from_fork+0x116/0x1d0
[   26.239277]  ? __pfx_kthread+0x10/0x10
[   26.239298]  ret_from_fork_asm+0x1a/0x30
[   26.239329]  </TASK>
[   26.239340] 
[   26.247026] Allocated by task 311:
[   26.247225]  kasan_save_stack+0x45/0x70
[   26.247448]  kasan_save_track+0x18/0x40
[   26.247638]  kasan_save_alloc_info+0x3b/0x50
[   26.247837]  __kasan_kmalloc+0xb7/0xc0
[   26.248033]  __kmalloc_cache_noprof+0x189/0x420
[   26.248217]  kasan_bitops_generic+0x92/0x1c0
[   26.248453]  kunit_try_run_case+0x1a5/0x480
[   26.248655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.248898]  kthread+0x337/0x6f0
[   26.249066]  ret_from_fork+0x116/0x1d0
[   26.249217]  ret_from_fork_asm+0x1a/0x30
[   26.249355] 
[   26.249447] The buggy address belongs to the object at ffff888104c83b80
[   26.249447]  which belongs to the cache kmalloc-16 of size 16
[   26.249803] The buggy address is located 8 bytes inside of
[   26.249803]  allocated 9-byte region [ffff888104c83b80, ffff888104c83b89)
[   26.250337] 
[   26.250442] The buggy address belongs to the physical page:
[   26.250686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83
[   26.251035] flags: 0x200000000000000(node=0|zone=2)
[   26.251258] page_type: f5(slab)
[   26.251406] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.251627] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.251853] page dumped because: kasan: bad access detected
[   26.252094] 
[   26.252181] Memory state around the buggy address:
[   26.252472]  ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.252823]  ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.253134] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.253494]                       ^
[   26.253666]  ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.253972]  ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.254254] ==================================================================