Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-x86_64

[   61.488137] ==================================================================
[   61.495203] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   61.504143] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   61.511521] 
[   61.513002] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   61.513047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.513063] Hardware name: WinLink E850-96 board (DT)
[   61.513081] Call trace:
[   61.513092]  show_stack+0x20/0x38 (C)
[   61.513123]  dump_stack_lvl+0x8c/0xd0
[   61.513157]  print_report+0x118/0x5d0
[   61.513186]  kasan_report+0xdc/0x128
[   61.513214]  kasan_check_range+0x100/0x1a8
[   61.513243]  __kasan_check_write+0x20/0x30
[   61.513272]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   61.513311]  kasan_bitops_generic+0x11c/0x1c8
[   61.513345]  kunit_try_run_case+0x170/0x3f0
[   61.513380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.513412]  kthread+0x328/0x630
[   61.513439]  ret_from_fork+0x10/0x20
[   61.513469] 
[   61.586693] Allocated by task 345:
[   61.590079]  kasan_save_stack+0x3c/0x68
[   61.593898]  kasan_save_track+0x20/0x40
[   61.597718]  kasan_save_alloc_info+0x40/0x58
[   61.601971]  __kasan_kmalloc+0xd4/0xd8
[   61.605703]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.610218]  kasan_bitops_generic+0xa0/0x1c8
[   61.614471]  kunit_try_run_case+0x170/0x3f0
[   61.618637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.624106]  kthread+0x328/0x630
[   61.627318]  ret_from_fork+0x10/0x20
[   61.630877] 
[   61.632352] The buggy address belongs to the object at ffff000806e5df40
[   61.632352]  which belongs to the cache kmalloc-16 of size 16
[   61.644679] The buggy address is located 8 bytes inside of
[   61.644679]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   61.656918] 
[   61.658394] The buggy address belongs to the physical page:
[   61.663950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   61.671937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.678446] page_type: f5(slab)
[   61.681578] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.689303] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.697022] page dumped because: kasan: bad access detected
[   61.702577] 
[   61.704053] Memory state around the buggy address:
[   61.708831]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.716035]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.723240] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   61.730441]                                               ^
[   61.736000]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.743205]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.750406] ==================================================================
[   60.952383] ==================================================================
[   60.959447] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   60.968387] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   60.975765] 
[   60.977246] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   60.977294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.977312] Hardware name: WinLink E850-96 board (DT)
[   60.977331] Call trace:
[   60.977345]  show_stack+0x20/0x38 (C)
[   60.977376]  dump_stack_lvl+0x8c/0xd0
[   60.977407]  print_report+0x118/0x5d0
[   60.977436]  kasan_report+0xdc/0x128
[   60.977463]  kasan_check_range+0x100/0x1a8
[   60.977494]  __kasan_check_write+0x20/0x30
[   60.977525]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   60.977566]  kasan_bitops_generic+0x11c/0x1c8
[   60.977601]  kunit_try_run_case+0x170/0x3f0
[   60.977634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.977668]  kthread+0x328/0x630
[   60.977695]  ret_from_fork+0x10/0x20
[   60.977727] 
[   61.050937] Allocated by task 345:
[   61.054323]  kasan_save_stack+0x3c/0x68
[   61.058142]  kasan_save_track+0x20/0x40
[   61.061962]  kasan_save_alloc_info+0x40/0x58
[   61.066215]  __kasan_kmalloc+0xd4/0xd8
[   61.069948]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.074462]  kasan_bitops_generic+0xa0/0x1c8
[   61.078715]  kunit_try_run_case+0x170/0x3f0
[   61.082883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.088350]  kthread+0x328/0x630
[   61.091562]  ret_from_fork+0x10/0x20
[   61.095121] 
[   61.096596] The buggy address belongs to the object at ffff000806e5df40
[   61.096596]  which belongs to the cache kmalloc-16 of size 16
[   61.108923] The buggy address is located 8 bytes inside of
[   61.108923]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   61.121162] 
[   61.122638] The buggy address belongs to the physical page:
[   61.128194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   61.136181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.142690] page_type: f5(slab)
[   61.145822] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.153547] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.161266] page dumped because: kasan: bad access detected
[   61.166821] 
[   61.168297] Memory state around the buggy address:
[   61.173075]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.180280]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.187484] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   61.194685]                                               ^
[   61.200244]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.207449]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.214650] ==================================================================
[   61.221995] ==================================================================
[   61.229061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   61.238001] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   61.245292] 
[   61.246773] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   61.246820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.246835] Hardware name: WinLink E850-96 board (DT)
[   61.246855] Call trace:
[   61.246867]  show_stack+0x20/0x38 (C)
[   61.246898]  dump_stack_lvl+0x8c/0xd0
[   61.246930]  print_report+0x118/0x5d0
[   61.246958]  kasan_report+0xdc/0x128
[   61.246985]  __asan_report_load8_noabort+0x20/0x30
[   61.247018]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   61.247057]  kasan_bitops_generic+0x11c/0x1c8
[   61.247093]  kunit_try_run_case+0x170/0x3f0
[   61.247127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.247158]  kthread+0x328/0x630
[   61.247185]  ret_from_fork+0x10/0x20
[   61.247216] 
[   61.317079] Allocated by task 345:
[   61.320465]  kasan_save_stack+0x3c/0x68
[   61.324284]  kasan_save_track+0x20/0x40
[   61.328105]  kasan_save_alloc_info+0x40/0x58
[   61.332357]  __kasan_kmalloc+0xd4/0xd8
[   61.336089]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.340605]  kasan_bitops_generic+0xa0/0x1c8
[   61.344857]  kunit_try_run_case+0x170/0x3f0
[   61.349024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.354492]  kthread+0x328/0x630
[   61.357704]  ret_from_fork+0x10/0x20
[   61.361263] 
[   61.362738] The buggy address belongs to the object at ffff000806e5df40
[   61.362738]  which belongs to the cache kmalloc-16 of size 16
[   61.375065] The buggy address is located 8 bytes inside of
[   61.375065]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   61.387304] 
[   61.388780] The buggy address belongs to the physical page:
[   61.394336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   61.402321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.408831] page_type: f5(slab)
[   61.411964] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.419689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.427408] page dumped because: kasan: bad access detected
[   61.432963] 
[   61.434438] Memory state around the buggy address:
[   61.439217]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.446421]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.453626] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   61.460827]                                               ^
[   61.466386]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.473591]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.480792] ==================================================================
[   62.023897] ==================================================================
[   62.030959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   62.039898] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   62.047190] 
[   62.048671] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   62.048720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.048737] Hardware name: WinLink E850-96 board (DT)
[   62.048755] Call trace:
[   62.048770]  show_stack+0x20/0x38 (C)
[   62.048801]  dump_stack_lvl+0x8c/0xd0
[   62.048833]  print_report+0x118/0x5d0
[   62.048861]  kasan_report+0xdc/0x128
[   62.048891]  __asan_report_load8_noabort+0x20/0x30
[   62.048928]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   62.048966]  kasan_bitops_generic+0x11c/0x1c8
[   62.049001]  kunit_try_run_case+0x170/0x3f0
[   62.049036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.049070]  kthread+0x328/0x630
[   62.049099]  ret_from_fork+0x10/0x20
[   62.049129] 
[   62.118977] Allocated by task 345:
[   62.122363]  kasan_save_stack+0x3c/0x68
[   62.126182]  kasan_save_track+0x20/0x40
[   62.130001]  kasan_save_alloc_info+0x40/0x58
[   62.134255]  __kasan_kmalloc+0xd4/0xd8
[   62.137987]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.142501]  kasan_bitops_generic+0xa0/0x1c8
[   62.146754]  kunit_try_run_case+0x170/0x3f0
[   62.150921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.156390]  kthread+0x328/0x630
[   62.159601]  ret_from_fork+0x10/0x20
[   62.163160] 
[   62.164636] The buggy address belongs to the object at ffff000806e5df40
[   62.164636]  which belongs to the cache kmalloc-16 of size 16
[   62.176963] The buggy address is located 8 bytes inside of
[   62.176963]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   62.189202] 
[   62.190678] The buggy address belongs to the physical page:
[   62.196234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   62.204221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.210729] page_type: f5(slab)
[   62.213862] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.221586] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.229305] page dumped because: kasan: bad access detected
[   62.234861] 
[   62.236336] Memory state around the buggy address:
[   62.241114]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.248319]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.255524] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   62.262725]                                               ^
[   62.268284]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.275489]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.282690] ==================================================================
[   59.881018] ==================================================================
[   59.888109] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   59.896962] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   59.904340] 
[   59.905821] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   59.905869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.905885] Hardware name: WinLink E850-96 board (DT)
[   59.905904] Call trace:
[   59.905918]  show_stack+0x20/0x38 (C)
[   59.905951]  dump_stack_lvl+0x8c/0xd0
[   59.905980]  print_report+0x118/0x5d0
[   59.906009]  kasan_report+0xdc/0x128
[   59.906037]  kasan_check_range+0x100/0x1a8
[   59.906067]  __kasan_check_write+0x20/0x30
[   59.906098]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   59.906138]  kasan_bitops_generic+0x11c/0x1c8
[   59.906172]  kunit_try_run_case+0x170/0x3f0
[   59.906206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.906239]  kthread+0x328/0x630
[   59.906267]  ret_from_fork+0x10/0x20
[   59.906299] 
[   59.979426] Allocated by task 345:
[   59.982813]  kasan_save_stack+0x3c/0x68
[   59.986631]  kasan_save_track+0x20/0x40
[   59.990450]  kasan_save_alloc_info+0x40/0x58
[   59.994703]  __kasan_kmalloc+0xd4/0xd8
[   59.998436]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.002950]  kasan_bitops_generic+0xa0/0x1c8
[   60.007203]  kunit_try_run_case+0x170/0x3f0
[   60.011370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.016838]  kthread+0x328/0x630
[   60.020050]  ret_from_fork+0x10/0x20
[   60.023609] 
[   60.025085] The buggy address belongs to the object at ffff000806e5df40
[   60.025085]  which belongs to the cache kmalloc-16 of size 16
[   60.037411] The buggy address is located 8 bytes inside of
[   60.037411]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   60.049650] 
[   60.051126] The buggy address belongs to the physical page:
[   60.056682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   60.064668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.071178] page_type: f5(slab)
[   60.074311] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.082035] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.089754] page dumped because: kasan: bad access detected
[   60.095310] 
[   60.096785] Memory state around the buggy address:
[   60.101563]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.108768]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.115973] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   60.123174]                                               ^
[   60.128733]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.135938]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.143139] ==================================================================
[   60.416623] ==================================================================
[   60.423692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   60.432631] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   60.440009] 
[   60.441490] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   60.441537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.441553] Hardware name: WinLink E850-96 board (DT)
[   60.441571] Call trace:
[   60.441583]  show_stack+0x20/0x38 (C)
[   60.441617]  dump_stack_lvl+0x8c/0xd0
[   60.441647]  print_report+0x118/0x5d0
[   60.441674]  kasan_report+0xdc/0x128
[   60.441701]  kasan_check_range+0x100/0x1a8
[   60.441732]  __kasan_check_write+0x20/0x30
[   60.441761]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   60.441800]  kasan_bitops_generic+0x11c/0x1c8
[   60.441832]  kunit_try_run_case+0x170/0x3f0
[   60.441864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.441899]  kthread+0x328/0x630
[   60.441925]  ret_from_fork+0x10/0x20
[   60.441956] 
[   60.515181] Allocated by task 345:
[   60.518569]  kasan_save_stack+0x3c/0x68
[   60.522387]  kasan_save_track+0x20/0x40
[   60.526206]  kasan_save_alloc_info+0x40/0x58
[   60.530459]  __kasan_kmalloc+0xd4/0xd8
[   60.534192]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.538706]  kasan_bitops_generic+0xa0/0x1c8
[   60.542959]  kunit_try_run_case+0x170/0x3f0
[   60.547125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.552594]  kthread+0x328/0x630
[   60.555806]  ret_from_fork+0x10/0x20
[   60.559365] 
[   60.560841] The buggy address belongs to the object at ffff000806e5df40
[   60.560841]  which belongs to the cache kmalloc-16 of size 16
[   60.573167] The buggy address is located 8 bytes inside of
[   60.573167]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   60.585406] 
[   60.586882] The buggy address belongs to the physical page:
[   60.592438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   60.600424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.606934] page_type: f5(slab)
[   60.610066] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.617791] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.625510] page dumped because: kasan: bad access detected
[   60.631065] 
[   60.632541] Memory state around the buggy address:
[   60.637319]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.644524]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.651728] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   60.658930]                                               ^
[   60.664489]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.671693]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.678894] ==================================================================
[   61.757777] ==================================================================
[   61.764817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   61.773757] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   61.781048] 
[   61.782529] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   61.782578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.782594] Hardware name: WinLink E850-96 board (DT)
[   61.782613] Call trace:
[   61.782628]  show_stack+0x20/0x38 (C)
[   61.782661]  dump_stack_lvl+0x8c/0xd0
[   61.782694]  print_report+0x118/0x5d0
[   61.782721]  kasan_report+0xdc/0x128
[   61.782748]  __asan_report_load8_noabort+0x20/0x30
[   61.782782]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   61.782822]  kasan_bitops_generic+0x11c/0x1c8
[   61.782857]  kunit_try_run_case+0x170/0x3f0
[   61.782892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.782923]  kthread+0x328/0x630
[   61.782951]  ret_from_fork+0x10/0x20
[   61.782983] 
[   61.852835] Allocated by task 345:
[   61.856221]  kasan_save_stack+0x3c/0x68
[   61.860040]  kasan_save_track+0x20/0x40
[   61.863860]  kasan_save_alloc_info+0x40/0x58
[   61.868113]  __kasan_kmalloc+0xd4/0xd8
[   61.871846]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.876359]  kasan_bitops_generic+0xa0/0x1c8
[   61.880612]  kunit_try_run_case+0x170/0x3f0
[   61.884779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.890248]  kthread+0x328/0x630
[   61.893460]  ret_from_fork+0x10/0x20
[   61.897018] 
[   61.898494] The buggy address belongs to the object at ffff000806e5df40
[   61.898494]  which belongs to the cache kmalloc-16 of size 16
[   61.910821] The buggy address is located 8 bytes inside of
[   61.910821]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   61.923060] 
[   61.924536] The buggy address belongs to the physical page:
[   61.930091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   61.938078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.944587] page_type: f5(slab)
[   61.947720] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.955445] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.963163] page dumped because: kasan: bad access detected
[   61.968719] 
[   61.970194] Memory state around the buggy address:
[   61.974972]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.982177]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.989382] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   61.996583]                                               ^
[   62.002142]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.009347]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.016550] ==================================================================
[   60.150511] ==================================================================
[   60.157549] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   60.166489] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   60.173780] 
[   60.175262] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   60.175312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.175327] Hardware name: WinLink E850-96 board (DT)
[   60.175347] Call trace:
[   60.175361]  show_stack+0x20/0x38 (C)
[   60.175393]  dump_stack_lvl+0x8c/0xd0
[   60.175425]  print_report+0x118/0x5d0
[   60.175455]  kasan_report+0xdc/0x128
[   60.175482]  __asan_report_load8_noabort+0x20/0x30
[   60.175516]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   60.175554]  kasan_bitops_generic+0x11c/0x1c8
[   60.175587]  kunit_try_run_case+0x170/0x3f0
[   60.175624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.175657]  kthread+0x328/0x630
[   60.175686]  ret_from_fork+0x10/0x20
[   60.175717] 
[   60.245568] Allocated by task 345:
[   60.248955]  kasan_save_stack+0x3c/0x68
[   60.252772]  kasan_save_track+0x20/0x40
[   60.256592]  kasan_save_alloc_info+0x40/0x58
[   60.260845]  __kasan_kmalloc+0xd4/0xd8
[   60.264578]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.269092]  kasan_bitops_generic+0xa0/0x1c8
[   60.273345]  kunit_try_run_case+0x170/0x3f0
[   60.277512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.282980]  kthread+0x328/0x630
[   60.286192]  ret_from_fork+0x10/0x20
[   60.289751] 
[   60.291227] The buggy address belongs to the object at ffff000806e5df40
[   60.291227]  which belongs to the cache kmalloc-16 of size 16
[   60.303555] The buggy address is located 8 bytes inside of
[   60.303555]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   60.315792] 
[   60.317268] The buggy address belongs to the physical page:
[   60.322824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   60.330809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.337320] page_type: f5(slab)
[   60.340452] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.348177] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.355896] page dumped because: kasan: bad access detected
[   60.361451] 
[   60.362927] Memory state around the buggy address:
[   60.367705]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.374910]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.382114] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   60.389316]                                               ^
[   60.394875]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.402079]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.409281] ==================================================================
[   60.686267] ==================================================================
[   60.693306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   60.702245] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   60.709536] 
[   60.711017] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   60.711067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.711085] Hardware name: WinLink E850-96 board (DT)
[   60.711104] Call trace:
[   60.711116]  show_stack+0x20/0x38 (C)
[   60.711149]  dump_stack_lvl+0x8c/0xd0
[   60.711180]  print_report+0x118/0x5d0
[   60.711209]  kasan_report+0xdc/0x128
[   60.711235]  __asan_report_load8_noabort+0x20/0x30
[   60.711269]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   60.711309]  kasan_bitops_generic+0x11c/0x1c8
[   60.711341]  kunit_try_run_case+0x170/0x3f0
[   60.711377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.711409]  kthread+0x328/0x630
[   60.711436]  ret_from_fork+0x10/0x20
[   60.711469] 
[   60.781323] Allocated by task 345:
[   60.784709]  kasan_save_stack+0x3c/0x68
[   60.788530]  kasan_save_track+0x20/0x40
[   60.792348]  kasan_save_alloc_info+0x40/0x58
[   60.796601]  __kasan_kmalloc+0xd4/0xd8
[   60.800334]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.804847]  kasan_bitops_generic+0xa0/0x1c8
[   60.809101]  kunit_try_run_case+0x170/0x3f0
[   60.813268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.818736]  kthread+0x328/0x630
[   60.821948]  ret_from_fork+0x10/0x20
[   60.825507] 
[   60.826982] The buggy address belongs to the object at ffff000806e5df40
[   60.826982]  which belongs to the cache kmalloc-16 of size 16
[   60.839309] The buggy address is located 8 bytes inside of
[   60.839309]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   60.851548] 
[   60.853024] The buggy address belongs to the physical page:
[   60.858581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   60.866567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.873076] page_type: f5(slab)
[   60.876208] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.883933] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.891652] page dumped because: kasan: bad access detected
[   60.897207] 
[   60.898683] Memory state around the buggy address:
[   60.903461]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.910665]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.917870] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   60.925071]                                               ^
[   60.930630]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.937835]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.945036] ==================================================================

[   26.571295] ==================================================================
[   26.571631] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.572191] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310
[   26.572424] 
[   26.572510] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.572564] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.572578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.572601] Call Trace:
[   26.572616]  <TASK>
[   26.572636]  dump_stack_lvl+0x73/0xb0
[   26.572677]  print_report+0xd1/0x610
[   26.572700]  ? __virt_addr_valid+0x1db/0x2d0
[   26.572724]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.572750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.572775]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.572802]  kasan_report+0x141/0x180
[   26.572826]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.572857]  kasan_check_range+0x10c/0x1c0
[   26.572880]  __kasan_check_write+0x18/0x20
[   26.572912]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.572939]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.572966]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.572991]  ? trace_hardirqs_on+0x37/0xe0
[   26.573014]  ? kasan_bitops_generic+0x92/0x1c0
[   26.573040]  kasan_bitops_generic+0x121/0x1c0
[   26.573063]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.573087]  ? __pfx_read_tsc+0x10/0x10
[   26.573109]  ? ktime_get_ts64+0x86/0x230
[   26.573133]  kunit_try_run_case+0x1a5/0x480
[   26.573157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.573177]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.573201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.573225]  ? __kthread_parkme+0x82/0x180
[   26.573247]  ? preempt_count_sub+0x50/0x80
[   26.573270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.573292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.573317]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.573342]  kthread+0x337/0x6f0
[   26.573362]  ? trace_preempt_on+0x20/0xc0
[   26.573384]  ? __pfx_kthread+0x10/0x10
[   26.573405]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.573427]  ? calculate_sigpending+0x7b/0xa0
[   26.573451]  ? __pfx_kthread+0x10/0x10
[   26.573473]  ret_from_fork+0x116/0x1d0
[   26.573492]  ? __pfx_kthread+0x10/0x10
[   26.573513]  ret_from_fork_asm+0x1a/0x30
[   26.573543]  </TASK>
[   26.573555] 
[   26.581627] Allocated by task 310:
[   26.581818]  kasan_save_stack+0x45/0x70
[   26.582005]  kasan_save_track+0x18/0x40
[   26.582188]  kasan_save_alloc_info+0x3b/0x50
[   26.582381]  __kasan_kmalloc+0xb7/0xc0
[   26.582543]  __kmalloc_cache_noprof+0x189/0x420
[   26.584377]  kasan_bitops_generic+0x92/0x1c0
[   26.584702]  kunit_try_run_case+0x1a5/0x480
[   26.584861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.585037]  kthread+0x337/0x6f0
[   26.585154]  ret_from_fork+0x116/0x1d0
[   26.585281]  ret_from_fork_asm+0x1a/0x30
[   26.585415] 
[   26.585481] The buggy address belongs to the object at ffff8881058422c0
[   26.585481]  which belongs to the cache kmalloc-16 of size 16
[   26.587644] The buggy address is located 8 bytes inside of
[   26.587644]  allocated 9-byte region [ffff8881058422c0, ffff8881058422c9)
[   26.588689] 
[   26.588793] The buggy address belongs to the physical page:
[   26.588970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842
[   26.589227] flags: 0x200000000000000(node=0|zone=2)
[   26.589389] page_type: f5(slab)
[   26.589510] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.589927] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.590951] page dumped because: kasan: bad access detected
[   26.591237] 
[   26.591739] Memory state around the buggy address:
[   26.592007]  ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.592479]  ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc
[   26.592713] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.592920]                                               ^
[   26.593425]  ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.593753]  ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.594837] ==================================================================
[   26.596350] ==================================================================
[   26.596819] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.597276] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310
[   26.597592] 
[   26.597711] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.597813] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.597828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.597853] Call Trace:
[   26.597884]  <TASK>
[   26.597905]  dump_stack_lvl+0x73/0xb0
[   26.597936]  print_report+0xd1/0x610
[   26.597987]  ? __virt_addr_valid+0x1db/0x2d0
[   26.598011]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.598053]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.598095]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.598135]  kasan_report+0x141/0x180
[   26.598156]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.598186]  kasan_check_range+0x10c/0x1c0
[   26.598219]  __kasan_check_write+0x18/0x20
[   26.598241]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.598278]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.598305]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.598329]  ? trace_hardirqs_on+0x37/0xe0
[   26.598352]  ? kasan_bitops_generic+0x92/0x1c0
[   26.598378]  kasan_bitops_generic+0x121/0x1c0
[   26.598400]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.598424]  ? __pfx_read_tsc+0x10/0x10
[   26.598445]  ? ktime_get_ts64+0x86/0x230
[   26.598469]  kunit_try_run_case+0x1a5/0x480
[   26.598493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.598514]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.598540]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.598564]  ? __kthread_parkme+0x82/0x180
[   26.598585]  ? preempt_count_sub+0x50/0x80
[   26.598608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.598632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.598668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.598693]  kthread+0x337/0x6f0
[   26.598713]  ? trace_preempt_on+0x20/0xc0
[   26.598735]  ? __pfx_kthread+0x10/0x10
[   26.598765]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.598787]  ? calculate_sigpending+0x7b/0xa0
[   26.598811]  ? __pfx_kthread+0x10/0x10
[   26.598832]  ret_from_fork+0x116/0x1d0
[   26.598851]  ? __pfx_kthread+0x10/0x10
[   26.598871]  ret_from_fork_asm+0x1a/0x30
[   26.598902]  </TASK>
[   26.598914] 
[   26.609396] Allocated by task 310:
[   26.609582]  kasan_save_stack+0x45/0x70
[   26.609859]  kasan_save_track+0x18/0x40
[   26.610406]  kasan_save_alloc_info+0x3b/0x50
[   26.610910]  __kasan_kmalloc+0xb7/0xc0
[   26.611090]  __kmalloc_cache_noprof+0x189/0x420
[   26.611281]  kasan_bitops_generic+0x92/0x1c0
[   26.611463]  kunit_try_run_case+0x1a5/0x480
[   26.611641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.612199]  kthread+0x337/0x6f0
[   26.612476]  ret_from_fork+0x116/0x1d0
[   26.612670]  ret_from_fork_asm+0x1a/0x30
[   26.613014] 
[   26.613393] The buggy address belongs to the object at ffff8881058422c0
[   26.613393]  which belongs to the cache kmalloc-16 of size 16
[   26.614187] The buggy address is located 8 bytes inside of
[   26.614187]  allocated 9-byte region [ffff8881058422c0, ffff8881058422c9)
[   26.614670] 
[   26.614772] The buggy address belongs to the physical page:
[   26.614993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842
[   26.615307] flags: 0x200000000000000(node=0|zone=2)
[   26.615518] page_type: f5(slab)
[   26.616119] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.616605] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.617069] page dumped because: kasan: bad access detected
[   26.617461] 
[   26.617747] Memory state around the buggy address:
[   26.618127]  ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.618421]  ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc
[   26.618888] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.619451]                                               ^
[   26.619704]  ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.620324]  ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.620632] ==================================================================
[   26.684925] ==================================================================
[   26.685203] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.685515] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310
[   26.685848] 
[   26.685960] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.686018] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.686031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.686061] Call Trace:
[   26.686080]  <TASK>
[   26.686099]  dump_stack_lvl+0x73/0xb0
[   26.686129]  print_report+0xd1/0x610
[   26.686151]  ? __virt_addr_valid+0x1db/0x2d0
[   26.686175]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.686200]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.686226]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.686252]  kasan_report+0x141/0x180
[   26.686272]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.686303]  kasan_check_range+0x10c/0x1c0
[   26.686334]  __kasan_check_write+0x18/0x20
[   26.686356]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.686382]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.686408]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.686432]  ? trace_hardirqs_on+0x37/0xe0
[   26.686455]  ? kasan_bitops_generic+0x92/0x1c0
[   26.686481]  kasan_bitops_generic+0x121/0x1c0
[   26.686504]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.686528]  ? __pfx_read_tsc+0x10/0x10
[   26.686549]  ? ktime_get_ts64+0x86/0x230
[   26.686573]  kunit_try_run_case+0x1a5/0x480
[   26.686596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.686616]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.686640]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.686673]  ? __kthread_parkme+0x82/0x180
[   26.686694]  ? preempt_count_sub+0x50/0x80
[   26.686718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.686739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.686777]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.686801]  kthread+0x337/0x6f0
[   26.686821]  ? trace_preempt_on+0x20/0xc0
[   26.686842]  ? __pfx_kthread+0x10/0x10
[   26.686863]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.686885]  ? calculate_sigpending+0x7b/0xa0
[   26.686909]  ? __pfx_kthread+0x10/0x10
[   26.686930]  ret_from_fork+0x116/0x1d0
[   26.686948]  ? __pfx_kthread+0x10/0x10
[   26.686969]  ret_from_fork_asm+0x1a/0x30
[   26.686999]  </TASK>
[   26.687009] 
[   26.695019] Allocated by task 310:
[   26.695171]  kasan_save_stack+0x45/0x70
[   26.695319]  kasan_save_track+0x18/0x40
[   26.695503]  kasan_save_alloc_info+0x3b/0x50
[   26.695712]  __kasan_kmalloc+0xb7/0xc0
[   26.695906]  __kmalloc_cache_noprof+0x189/0x420
[   26.696083]  kasan_bitops_generic+0x92/0x1c0
[   26.696271]  kunit_try_run_case+0x1a5/0x480
[   26.696450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.696679]  kthread+0x337/0x6f0
[   26.696815]  ret_from_fork+0x116/0x1d0
[   26.696997]  ret_from_fork_asm+0x1a/0x30
[   26.697175] 
[   26.697261] The buggy address belongs to the object at ffff8881058422c0
[   26.697261]  which belongs to the cache kmalloc-16 of size 16
[   26.697720] The buggy address is located 8 bytes inside of
[   26.697720]  allocated 9-byte region [ffff8881058422c0, ffff8881058422c9)
[   26.698165] 
[   26.698233] The buggy address belongs to the physical page:
[   26.698398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842
[   26.698632] flags: 0x200000000000000(node=0|zone=2)
[   26.698865] page_type: f5(slab)
[   26.699140] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.699474] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.699763] page dumped because: kasan: bad access detected
[   26.699926] 
[   26.699987] Memory state around the buggy address:
[   26.700136]  ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.700432]  ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc
[   26.700748] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.701058]                                               ^
[   26.701306]  ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.701625]  ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.701897] ==================================================================
[   26.702546] ==================================================================
[   26.703105] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.703601] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310
[   26.703971] 
[   26.704083] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.704138] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.704154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.704178] Call Trace:
[   26.704198]  <TASK>
[   26.704217]  dump_stack_lvl+0x73/0xb0
[   26.704248]  print_report+0xd1/0x610
[   26.704269]  ? __virt_addr_valid+0x1db/0x2d0
[   26.704295]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.704321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.704346]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.704374]  kasan_report+0x141/0x180
[   26.704396]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.704427]  kasan_check_range+0x10c/0x1c0
[   26.704454]  __kasan_check_write+0x18/0x20
[   26.704479]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.704508]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.704535]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.704560]  ? trace_hardirqs_on+0x37/0xe0
[   26.704584]  ? kasan_bitops_generic+0x92/0x1c0
[   26.704610]  kasan_bitops_generic+0x121/0x1c0
[   26.704633]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.704666]  ? __pfx_read_tsc+0x10/0x10
[   26.704688]  ? ktime_get_ts64+0x86/0x230
[   26.704712]  kunit_try_run_case+0x1a5/0x480
[   26.704736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.704756]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.704780]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.704803]  ? __kthread_parkme+0x82/0x180
[   26.704825]  ? preempt_count_sub+0x50/0x80
[   26.704848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.704870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.704895]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.704920]  kthread+0x337/0x6f0
[   26.704939]  ? trace_preempt_on+0x20/0xc0
[   26.704960]  ? __pfx_kthread+0x10/0x10
[   26.704981]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.705002]  ? calculate_sigpending+0x7b/0xa0
[   26.705026]  ? __pfx_kthread+0x10/0x10
[   26.705047]  ret_from_fork+0x116/0x1d0
[   26.705065]  ? __pfx_kthread+0x10/0x10
[   26.705086]  ret_from_fork_asm+0x1a/0x30
[   26.705117]  </TASK>
[   26.705127] 
[   26.713756] Allocated by task 310:
[   26.713954]  kasan_save_stack+0x45/0x70
[   26.714158]  kasan_save_track+0x18/0x40
[   26.714336]  kasan_save_alloc_info+0x3b/0x50
[   26.714532]  __kasan_kmalloc+0xb7/0xc0
[   26.715049]  __kmalloc_cache_noprof+0x189/0x420
[   26.715273]  kasan_bitops_generic+0x92/0x1c0
[   26.715680]  kunit_try_run_case+0x1a5/0x480
[   26.716002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.716254]  kthread+0x337/0x6f0
[   26.716409]  ret_from_fork+0x116/0x1d0
[   26.716579]  ret_from_fork_asm+0x1a/0x30
[   26.716792] 
[   26.716880] The buggy address belongs to the object at ffff8881058422c0
[   26.716880]  which belongs to the cache kmalloc-16 of size 16
[   26.717372] The buggy address is located 8 bytes inside of
[   26.717372]  allocated 9-byte region [ffff8881058422c0, ffff8881058422c9)
[   26.718325] 
[   26.718408] The buggy address belongs to the physical page:
[   26.718745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842
[   26.719339] flags: 0x200000000000000(node=0|zone=2)
[   26.719680] page_type: f5(slab)
[   26.719958] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.720458] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.721049] page dumped because: kasan: bad access detected
[   26.721405] 
[   26.721504] Memory state around the buggy address:
[   26.721708]  ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.722292]  ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc
[   26.722595] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.723090]                                               ^
[   26.723564]  ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.724117]  ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.724410] ==================================================================
[   26.742682] ==================================================================
[   26.743447] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.743948] Read of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310
[   26.744212] 
[   26.744318] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.744371] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.744385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.744410] Call Trace:
[   26.744429]  <TASK>
[   26.744448]  dump_stack_lvl+0x73/0xb0
[   26.744478]  print_report+0xd1/0x610
[   26.744500]  ? __virt_addr_valid+0x1db/0x2d0
[   26.744524]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.744550]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.744577]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.744605]  kasan_report+0x141/0x180
[   26.744626]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.744669]  __asan_report_load8_noabort+0x18/0x20
[   26.744693]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.744720]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.744757]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.744782]  ? trace_hardirqs_on+0x37/0xe0
[   26.744805]  ? kasan_bitops_generic+0x92/0x1c0
[   26.744831]  kasan_bitops_generic+0x121/0x1c0
[   26.744854]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.744878]  ? __pfx_read_tsc+0x10/0x10
[   26.744899]  ? ktime_get_ts64+0x86/0x230
[   26.744924]  kunit_try_run_case+0x1a5/0x480
[   26.744947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.744967]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.744991]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.745015]  ? __kthread_parkme+0x82/0x180
[   26.745036]  ? preempt_count_sub+0x50/0x80
[   26.745059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.745082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.745107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.745132]  kthread+0x337/0x6f0
[   26.745151]  ? trace_preempt_on+0x20/0xc0
[   26.745173]  ? __pfx_kthread+0x10/0x10
[   26.745194]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.745215]  ? calculate_sigpending+0x7b/0xa0
[   26.745239]  ? __pfx_kthread+0x10/0x10
[   26.745261]  ret_from_fork+0x116/0x1d0
[   26.745278]  ? __pfx_kthread+0x10/0x10
[   26.745299]  ret_from_fork_asm+0x1a/0x30
[   26.745330]  </TASK>
[   26.745341] 
[   26.753067] Allocated by task 310:
[   26.753206]  kasan_save_stack+0x45/0x70
[   26.753409]  kasan_save_track+0x18/0x40
[   26.753595]  kasan_save_alloc_info+0x3b/0x50
[   26.753824]  __kasan_kmalloc+0xb7/0xc0
[   26.753978]  __kmalloc_cache_noprof+0x189/0x420
[   26.754134]  kasan_bitops_generic+0x92/0x1c0
[   26.754273]  kunit_try_run_case+0x1a5/0x480
[   26.754412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.754582]  kthread+0x337/0x6f0
[   26.754706]  ret_from_fork+0x116/0x1d0
[   26.754834]  ret_from_fork_asm+0x1a/0x30
[   26.754965] 
[   26.755056] The buggy address belongs to the object at ffff8881058422c0
[   26.755056]  which belongs to the cache kmalloc-16 of size 16
[   26.755641] The buggy address is located 8 bytes inside of
[   26.755641]  allocated 9-byte region [ffff8881058422c0, ffff8881058422c9)
[   26.756160] 
[   26.756249] The buggy address belongs to the physical page:
[   26.756477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842
[   26.756723] flags: 0x200000000000000(node=0|zone=2)
[   26.756894] page_type: f5(slab)
[   26.757014] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.757235] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.757451] page dumped because: kasan: bad access detected
[   26.757887] 
[   26.757988] Memory state around the buggy address:
[   26.758210]  ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.758526]  ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc
[   26.758849] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.759162]                                               ^
[   26.759414]  ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.759855]  ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.760207] ==================================================================
[   26.725001] ==================================================================
[   26.725306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.725705] Read of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310
[   26.725991] 
[   26.726119] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.726173] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.726187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.726209] Call Trace:
[   26.726229]  <TASK>
[   26.726250]  dump_stack_lvl+0x73/0xb0
[   26.726281]  print_report+0xd1/0x610
[   26.726302]  ? __virt_addr_valid+0x1db/0x2d0
[   26.726326]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.726352]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.726378]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.726404]  kasan_report+0x141/0x180
[   26.726427]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.726457]  kasan_check_range+0x10c/0x1c0
[   26.726481]  __kasan_check_read+0x15/0x20
[   26.726503]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.726529]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.726557]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.726581]  ? trace_hardirqs_on+0x37/0xe0
[   26.726603]  ? kasan_bitops_generic+0x92/0x1c0
[   26.726629]  kasan_bitops_generic+0x121/0x1c0
[   26.726652]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.726687]  ? __pfx_read_tsc+0x10/0x10
[   26.726708]  ? ktime_get_ts64+0x86/0x230
[   26.726733]  kunit_try_run_case+0x1a5/0x480
[   26.726756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.726776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.726800]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.726833]  ? __kthread_parkme+0x82/0x180
[   26.726854]  ? preempt_count_sub+0x50/0x80
[   26.726877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.726899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.726923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.726948]  kthread+0x337/0x6f0
[   26.726968]  ? trace_preempt_on+0x20/0xc0
[   26.726989]  ? __pfx_kthread+0x10/0x10
[   26.727010]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.727032]  ? calculate_sigpending+0x7b/0xa0
[   26.727056]  ? __pfx_kthread+0x10/0x10
[   26.727078]  ret_from_fork+0x116/0x1d0
[   26.727097]  ? __pfx_kthread+0x10/0x10
[   26.727117]  ret_from_fork_asm+0x1a/0x30
[   26.727148]  </TASK>
[   26.727158] 
[   26.735008] Allocated by task 310:
[   26.735196]  kasan_save_stack+0x45/0x70
[   26.735342]  kasan_save_track+0x18/0x40
[   26.735470]  kasan_save_alloc_info+0x3b/0x50
[   26.735611]  __kasan_kmalloc+0xb7/0xc0
[   26.735831]  __kmalloc_cache_noprof+0x189/0x420
[   26.736049]  kasan_bitops_generic+0x92/0x1c0
[   26.736251]  kunit_try_run_case+0x1a5/0x480
[   26.736452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.736696]  kthread+0x337/0x6f0
[   26.736848]  ret_from_fork+0x116/0x1d0
[   26.736995]  ret_from_fork_asm+0x1a/0x30
[   26.737188] 
[   26.737279] The buggy address belongs to the object at ffff8881058422c0
[   26.737279]  which belongs to the cache kmalloc-16 of size 16
[   26.737717] The buggy address is located 8 bytes inside of
[   26.737717]  allocated 9-byte region [ffff8881058422c0, ffff8881058422c9)
[   26.738212] 
[   26.738294] The buggy address belongs to the physical page:
[   26.738503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842
[   26.738746] flags: 0x200000000000000(node=0|zone=2)
[   26.738987] page_type: f5(slab)
[   26.739153] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.739441] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.739724] page dumped because: kasan: bad access detected
[   26.739972] 
[   26.740060] Memory state around the buggy address:
[   26.740277]  ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.740551]  ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc
[   26.740917] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.741174]                                               ^
[   26.741341]  ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.741547]  ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.741814] ==================================================================
[   26.667159] ==================================================================
[   26.667524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.668053] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310
[   26.668324] 
[   26.668418] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.668473] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.668486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.668510] Call Trace:
[   26.668531]  <TASK>
[   26.668551]  dump_stack_lvl+0x73/0xb0
[   26.668582]  print_report+0xd1/0x610
[   26.668605]  ? __virt_addr_valid+0x1db/0x2d0
[   26.668630]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.668668]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.668694]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.668720]  kasan_report+0x141/0x180
[   26.668741]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.668779]  kasan_check_range+0x10c/0x1c0
[   26.668801]  __kasan_check_write+0x18/0x20
[   26.668823]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.668851]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.668878]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.668903]  ? trace_hardirqs_on+0x37/0xe0
[   26.668926]  ? kasan_bitops_generic+0x92/0x1c0
[   26.668951]  kasan_bitops_generic+0x121/0x1c0
[   26.668974]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.668998]  ? __pfx_read_tsc+0x10/0x10
[   26.669019]  ? ktime_get_ts64+0x86/0x230
[   26.669043]  kunit_try_run_case+0x1a5/0x480
[   26.669066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.669086]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.669111]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.669134]  ? __kthread_parkme+0x82/0x180
[   26.669155]  ? preempt_count_sub+0x50/0x80
[   26.669178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.669200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.669224]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.669249]  kthread+0x337/0x6f0
[   26.669268]  ? trace_preempt_on+0x20/0xc0
[   26.669290]  ? __pfx_kthread+0x10/0x10
[   26.669310]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.669332]  ? calculate_sigpending+0x7b/0xa0
[   26.669355]  ? __pfx_kthread+0x10/0x10
[   26.669376]  ret_from_fork+0x116/0x1d0
[   26.669394]  ? __pfx_kthread+0x10/0x10
[   26.669415]  ret_from_fork_asm+0x1a/0x30
[   26.669446]  </TASK>
[   26.669458] 
[   26.677030] Allocated by task 310:
[   26.677178]  kasan_save_stack+0x45/0x70
[   26.677340]  kasan_save_track+0x18/0x40
[   26.677527]  kasan_save_alloc_info+0x3b/0x50
[   26.677747]  __kasan_kmalloc+0xb7/0xc0
[   26.677933]  __kmalloc_cache_noprof+0x189/0x420
[   26.678153]  kasan_bitops_generic+0x92/0x1c0
[   26.678312]  kunit_try_run_case+0x1a5/0x480
[   26.678490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.678751]  kthread+0x337/0x6f0
[   26.678898]  ret_from_fork+0x116/0x1d0
[   26.679071]  ret_from_fork_asm+0x1a/0x30
[   26.679239] 
[   26.679304] The buggy address belongs to the object at ffff8881058422c0
[   26.679304]  which belongs to the cache kmalloc-16 of size 16
[   26.679652] The buggy address is located 8 bytes inside of
[   26.679652]  allocated 9-byte region [ffff8881058422c0, ffff8881058422c9)
[   26.680063] 
[   26.680195] The buggy address belongs to the physical page:
[   26.680442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842
[   26.680797] flags: 0x200000000000000(node=0|zone=2)
[   26.681025] page_type: f5(slab)
[   26.681195] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.681711] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.682104] page dumped because: kasan: bad access detected
[   26.682267] 
[   26.682328] Memory state around the buggy address:
[   26.682477]  ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.682837]  ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc
[   26.683152] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.683459]                                               ^
[   26.683691]  ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.684053]  ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.684320] ==================================================================
[   26.645311] ==================================================================
[   26.645643] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.646556] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310
[   26.647137] 
[   26.647258] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.647314] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.647328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.647352] Call Trace:
[   26.647373]  <TASK>
[   26.647393]  dump_stack_lvl+0x73/0xb0
[   26.647429]  print_report+0xd1/0x610
[   26.647452]  ? __virt_addr_valid+0x1db/0x2d0
[   26.647476]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.647502]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.647527]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.647554]  kasan_report+0x141/0x180
[   26.647576]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.647608]  kasan_check_range+0x10c/0x1c0
[   26.647631]  __kasan_check_write+0x18/0x20
[   26.647666]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.647693]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.647720]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.647761]  ? trace_hardirqs_on+0x37/0xe0
[   26.647784]  ? kasan_bitops_generic+0x92/0x1c0
[   26.647809]  kasan_bitops_generic+0x121/0x1c0
[   26.647832]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.647856]  ? __pfx_read_tsc+0x10/0x10
[   26.647878]  ? ktime_get_ts64+0x86/0x230
[   26.647902]  kunit_try_run_case+0x1a5/0x480
[   26.647926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.647949]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.647974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.647998]  ? __kthread_parkme+0x82/0x180
[   26.648019]  ? preempt_count_sub+0x50/0x80
[   26.648043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.648064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.648089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.648114]  kthread+0x337/0x6f0
[   26.648133]  ? trace_preempt_on+0x20/0xc0
[   26.648155]  ? __pfx_kthread+0x10/0x10
[   26.648176]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.648197]  ? calculate_sigpending+0x7b/0xa0
[   26.648220]  ? __pfx_kthread+0x10/0x10
[   26.648241]  ret_from_fork+0x116/0x1d0
[   26.648260]  ? __pfx_kthread+0x10/0x10
[   26.648280]  ret_from_fork_asm+0x1a/0x30
[   26.648311]  </TASK>
[   26.648322] 
[   26.658287] Allocated by task 310:
[   26.658692]  kasan_save_stack+0x45/0x70
[   26.659031]  kasan_save_track+0x18/0x40
[   26.659400]  kasan_save_alloc_info+0x3b/0x50
[   26.659728]  __kasan_kmalloc+0xb7/0xc0
[   26.660072]  __kmalloc_cache_noprof+0x189/0x420
[   26.660289]  kasan_bitops_generic+0x92/0x1c0
[   26.660476]  kunit_try_run_case+0x1a5/0x480
[   26.660652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.660840]  kthread+0x337/0x6f0
[   26.660960]  ret_from_fork+0x116/0x1d0
[   26.661152]  ret_from_fork_asm+0x1a/0x30
[   26.661347] 
[   26.661436] The buggy address belongs to the object at ffff8881058422c0
[   26.661436]  which belongs to the cache kmalloc-16 of size 16
[   26.662059] The buggy address is located 8 bytes inside of
[   26.662059]  allocated 9-byte region [ffff8881058422c0, ffff8881058422c9)
[   26.662520] 
[   26.662606] The buggy address belongs to the physical page:
[   26.662848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842
[   26.663150] flags: 0x200000000000000(node=0|zone=2)
[   26.663378] page_type: f5(slab)
[   26.663523] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.663901] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.664197] page dumped because: kasan: bad access detected
[   26.664361] 
[   26.664422] Memory state around the buggy address:
[   26.664623]  ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.664944]  ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc
[   26.665167] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.665370]                                               ^
[   26.665631]  ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.666126]  ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.666398] ==================================================================
[   26.621645] ==================================================================
[   26.622676] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.623067] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310
[   26.623351] 
[   26.623453] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.623509] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.623523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.623548] Call Trace:
[   26.623562]  <TASK>
[   26.623582]  dump_stack_lvl+0x73/0xb0
[   26.623614]  print_report+0xd1/0x610
[   26.623637]  ? __virt_addr_valid+0x1db/0x2d0
[   26.623671]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.623697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.623723]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.624001]  kasan_report+0x141/0x180
[   26.624027]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.624072]  kasan_check_range+0x10c/0x1c0
[   26.624096]  __kasan_check_write+0x18/0x20
[   26.624323]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.624352]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.624381]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.624406]  ? trace_hardirqs_on+0x37/0xe0
[   26.624429]  ? kasan_bitops_generic+0x92/0x1c0
[   26.624457]  kasan_bitops_generic+0x121/0x1c0
[   26.624480]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.624504]  ? __pfx_read_tsc+0x10/0x10
[   26.624526]  ? ktime_get_ts64+0x86/0x230
[   26.624551]  kunit_try_run_case+0x1a5/0x480
[   26.624575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.624596]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.624621]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.624645]  ? __kthread_parkme+0x82/0x180
[   26.624679]  ? preempt_count_sub+0x50/0x80
[   26.624702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.624723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.624759]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.624783]  kthread+0x337/0x6f0
[   26.624803]  ? trace_preempt_on+0x20/0xc0
[   26.624825]  ? __pfx_kthread+0x10/0x10
[   26.624846]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.624867]  ? calculate_sigpending+0x7b/0xa0
[   26.624891]  ? __pfx_kthread+0x10/0x10
[   26.624912]  ret_from_fork+0x116/0x1d0
[   26.624930]  ? __pfx_kthread+0x10/0x10
[   26.624951]  ret_from_fork_asm+0x1a/0x30
[   26.625010]  </TASK>
[   26.625021] 
[   26.635384] Allocated by task 310:
[   26.635630]  kasan_save_stack+0x45/0x70
[   26.635857]  kasan_save_track+0x18/0x40
[   26.636077]  kasan_save_alloc_info+0x3b/0x50
[   26.636382]  __kasan_kmalloc+0xb7/0xc0
[   26.636528]  __kmalloc_cache_noprof+0x189/0x420
[   26.636739]  kasan_bitops_generic+0x92/0x1c0
[   26.636931]  kunit_try_run_case+0x1a5/0x480
[   26.637115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.637355]  kthread+0x337/0x6f0
[   26.637467]  ret_from_fork+0x116/0x1d0
[   26.637677]  ret_from_fork_asm+0x1a/0x30
[   26.637882] 
[   26.637944] The buggy address belongs to the object at ffff8881058422c0
[   26.637944]  which belongs to the cache kmalloc-16 of size 16
[   26.638688] The buggy address is located 8 bytes inside of
[   26.638688]  allocated 9-byte region [ffff8881058422c0, ffff8881058422c9)
[   26.639592] 
[   26.639724] The buggy address belongs to the physical page:
[   26.640057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842
[   26.640377] flags: 0x200000000000000(node=0|zone=2)
[   26.640589] page_type: f5(slab)
[   26.640738] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.641044] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.641341] page dumped because: kasan: bad access detected
[   26.641559] 
[   26.641628] Memory state around the buggy address:
[   26.642371]  ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.642750]  ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc
[   26.643095] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   26.643439]                                               ^
[   26.643624]  ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.644110]  ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.644492] ==================================================================