Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-x86_64

[   59.782788] ==================================================================
[   59.789893] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   59.798052] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   59.805429] 
[   59.806912] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   59.806963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.806981] Hardware name: WinLink E850-96 board (DT)
[   59.807001] Call trace:
[   59.807014]  show_stack+0x20/0x38 (C)
[   59.807047]  dump_stack_lvl+0x8c/0xd0
[   59.807081]  print_report+0x118/0x5d0
[   59.807109]  kasan_report+0xdc/0x128
[   59.807134]  kasan_check_range+0x100/0x1a8
[   59.807165]  __kasan_check_write+0x20/0x30
[   59.807196]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   59.807234]  kasan_bitops_generic+0x110/0x1c8
[   59.807268]  kunit_try_run_case+0x170/0x3f0
[   59.807298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.807333]  kthread+0x328/0x630
[   59.807359]  ret_from_fork+0x10/0x20
[   59.807392] 
[   59.879820] Allocated by task 342:
[   59.883207]  kasan_save_stack+0x3c/0x68
[   59.887025]  kasan_save_track+0x20/0x40
[   59.890844]  kasan_save_alloc_info+0x40/0x58
[   59.895098]  __kasan_kmalloc+0xd4/0xd8
[   59.898830]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.903344]  kasan_bitops_generic+0xa0/0x1c8
[   59.907597]  kunit_try_run_case+0x170/0x3f0
[   59.911764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.917233]  kthread+0x328/0x630
[   59.920444]  ret_from_fork+0x10/0x20
[   59.924003] 
[   59.925479] The buggy address belongs to the object at ffff000806093fe0
[   59.925479]  which belongs to the cache kmalloc-16 of size 16
[   59.937806] The buggy address is located 8 bytes inside of
[   59.937806]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   59.950044] 
[   59.951523] The buggy address belongs to the physical page:
[   59.957079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   59.965063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.971572] page_type: f5(slab)
[   59.974707] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.982429] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.990148] page dumped because: kasan: bad access detected
[   59.995704] 
[   59.997179] Memory state around the buggy address:
[   60.001959]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.009162]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.016367] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   60.023568]                                                           ^
[   60.030168]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.037373]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   60.044575] ==================================================================
[   59.248090] ==================================================================
[   59.255178] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   59.263337] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   59.270628] 
[   59.272111] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   59.272164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.272178] Hardware name: WinLink E850-96 board (DT)
[   59.272198] Call trace:
[   59.272209]  show_stack+0x20/0x38 (C)
[   59.272239]  dump_stack_lvl+0x8c/0xd0
[   59.272276]  print_report+0x118/0x5d0
[   59.272303]  kasan_report+0xdc/0x128
[   59.272331]  __asan_report_load8_noabort+0x20/0x30
[   59.272361]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   59.272399]  kasan_bitops_generic+0x110/0x1c8
[   59.272434]  kunit_try_run_case+0x170/0x3f0
[   59.272463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.272498]  kthread+0x328/0x630
[   59.272525]  ret_from_fork+0x10/0x20
[   59.272558] 
[   59.341634] Allocated by task 342:
[   59.345021]  kasan_save_stack+0x3c/0x68
[   59.348838]  kasan_save_track+0x20/0x40
[   59.352658]  kasan_save_alloc_info+0x40/0x58
[   59.356911]  __kasan_kmalloc+0xd4/0xd8
[   59.360644]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.365157]  kasan_bitops_generic+0xa0/0x1c8
[   59.369411]  kunit_try_run_case+0x170/0x3f0
[   59.373578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.379046]  kthread+0x328/0x630
[   59.382258]  ret_from_fork+0x10/0x20
[   59.385817] 
[   59.387293] The buggy address belongs to the object at ffff000806093fe0
[   59.387293]  which belongs to the cache kmalloc-16 of size 16
[   59.399619] The buggy address is located 8 bytes inside of
[   59.399619]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   59.411858] 
[   59.413336] The buggy address belongs to the physical page:
[   59.418893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   59.426877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.433386] page_type: f5(slab)
[   59.436520] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.444243] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.451963] page dumped because: kasan: bad access detected
[   59.457517] 
[   59.458992] Memory state around the buggy address:
[   59.463771]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.470976]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.478180] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   59.485381]                                                           ^
[   59.491984]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.499188]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   59.506388] ==================================================================
[   60.051887] ==================================================================
[   60.058986] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   60.067145] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   60.074435] 
[   60.075918] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   60.075970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.075986] Hardware name: WinLink E850-96 board (DT)
[   60.076004] Call trace:
[   60.076016]  show_stack+0x20/0x38 (C)
[   60.076047]  dump_stack_lvl+0x8c/0xd0
[   60.076080]  print_report+0x118/0x5d0
[   60.076108]  kasan_report+0xdc/0x128
[   60.076136]  __asan_report_load8_noabort+0x20/0x30
[   60.076168]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   60.076203]  kasan_bitops_generic+0x110/0x1c8
[   60.076237]  kunit_try_run_case+0x170/0x3f0
[   60.076268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.076303]  kthread+0x328/0x630
[   60.076328]  ret_from_fork+0x10/0x20
[   60.076361] 
[   60.145441] Allocated by task 342:
[   60.148827]  kasan_save_stack+0x3c/0x68
[   60.152646]  kasan_save_track+0x20/0x40
[   60.156465]  kasan_save_alloc_info+0x40/0x58
[   60.160719]  __kasan_kmalloc+0xd4/0xd8
[   60.164451]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.168965]  kasan_bitops_generic+0xa0/0x1c8
[   60.173218]  kunit_try_run_case+0x170/0x3f0
[   60.177385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.182854]  kthread+0x328/0x630
[   60.186065]  ret_from_fork+0x10/0x20
[   60.189624] 
[   60.191100] The buggy address belongs to the object at ffff000806093fe0
[   60.191100]  which belongs to the cache kmalloc-16 of size 16
[   60.203427] The buggy address is located 8 bytes inside of
[   60.203427]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   60.215665] 
[   60.217145] The buggy address belongs to the physical page:
[   60.222700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   60.230684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.237193] page_type: f5(slab)
[   60.240327] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.248050] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.255769] page dumped because: kasan: bad access detected
[   60.261324] 
[   60.262800] Memory state around the buggy address:
[   60.267582]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.274783]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.281988] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   60.289189]                                                           ^
[   60.295790]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.302995]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   60.310195] ==================================================================
[   58.978986] ==================================================================
[   58.986087] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   58.994243] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   59.001623] 
[   59.003106] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   59.003158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.003175] Hardware name: WinLink E850-96 board (DT)
[   59.003195] Call trace:
[   59.003210]  show_stack+0x20/0x38 (C)
[   59.003242]  dump_stack_lvl+0x8c/0xd0
[   59.003276]  print_report+0x118/0x5d0
[   59.003306]  kasan_report+0xdc/0x128
[   59.003332]  kasan_check_range+0x100/0x1a8
[   59.003361]  __kasan_check_write+0x20/0x30
[   59.003391]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   59.003427]  kasan_bitops_generic+0x110/0x1c8
[   59.003461]  kunit_try_run_case+0x170/0x3f0
[   59.003494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.003530]  kthread+0x328/0x630
[   59.003558]  ret_from_fork+0x10/0x20
[   59.003591] 
[   59.076012] Allocated by task 342:
[   59.079400]  kasan_save_stack+0x3c/0x68
[   59.083218]  kasan_save_track+0x20/0x40
[   59.087037]  kasan_save_alloc_info+0x40/0x58
[   59.091290]  __kasan_kmalloc+0xd4/0xd8
[   59.095023]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.099536]  kasan_bitops_generic+0xa0/0x1c8
[   59.103790]  kunit_try_run_case+0x170/0x3f0
[   59.107956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.113426]  kthread+0x328/0x630
[   59.116637]  ret_from_fork+0x10/0x20
[   59.120196] 
[   59.121672] The buggy address belongs to the object at ffff000806093fe0
[   59.121672]  which belongs to the cache kmalloc-16 of size 16
[   59.133998] The buggy address is located 8 bytes inside of
[   59.133998]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   59.146237] 
[   59.147717] The buggy address belongs to the physical page:
[   59.153272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   59.161256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.167764] page_type: f5(slab)
[   59.170901] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.178622] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.186342] page dumped because: kasan: bad access detected
[   59.191897] 
[   59.193371] Memory state around the buggy address:
[   59.198150]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.205354]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.212559] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   59.219760]                                                           ^
[   59.226361]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.233566]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   59.240767] ==================================================================
[   58.442024] ==================================================================
[   58.451373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   58.459529] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   58.466908] 
[   58.468392] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   58.468446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.468463] Hardware name: WinLink E850-96 board (DT)
[   58.468484] Call trace:
[   58.468497]  show_stack+0x20/0x38 (C)
[   58.468534]  dump_stack_lvl+0x8c/0xd0
[   58.468569]  print_report+0x118/0x5d0
[   58.468597]  kasan_report+0xdc/0x128
[   58.468625]  kasan_check_range+0x100/0x1a8
[   58.468654]  __kasan_check_write+0x20/0x30
[   58.468685]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   58.468722]  kasan_bitops_generic+0x110/0x1c8
[   58.468754]  kunit_try_run_case+0x170/0x3f0
[   58.468787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.468823]  kthread+0x328/0x630
[   58.468849]  ret_from_fork+0x10/0x20
[   58.468884] 
[   58.541299] Allocated by task 342:
[   58.544684]  kasan_save_stack+0x3c/0x68
[   58.548504]  kasan_save_track+0x20/0x40
[   58.552323]  kasan_save_alloc_info+0x40/0x58
[   58.556576]  __kasan_kmalloc+0xd4/0xd8
[   58.560308]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.564822]  kasan_bitops_generic+0xa0/0x1c8
[   58.569076]  kunit_try_run_case+0x170/0x3f0
[   58.573242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.578711]  kthread+0x328/0x630
[   58.581923]  ret_from_fork+0x10/0x20
[   58.585482] 
[   58.586960] The buggy address belongs to the object at ffff000806093fe0
[   58.586960]  which belongs to the cache kmalloc-16 of size 16
[   58.599286] The buggy address is located 8 bytes inside of
[   58.599286]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   58.611523] 
[   58.613001] The buggy address belongs to the physical page:
[   58.618559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   58.626542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.633052] page_type: f5(slab)
[   58.636189] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   58.643908] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.651627] page dumped because: kasan: bad access detected
[   58.657182] 
[   58.658657] Memory state around the buggy address:
[   58.663436]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.670641]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.677845] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   58.685046]                                                           ^
[   58.691648]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.698852]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   58.706053] ==================================================================
[   59.513707] ==================================================================
[   59.520800] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   59.528959] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   59.536335] 
[   59.537818] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   59.537871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.537889] Hardware name: WinLink E850-96 board (DT)
[   59.537908] Call trace:
[   59.537919]  show_stack+0x20/0x38 (C)
[   59.537952]  dump_stack_lvl+0x8c/0xd0
[   59.537986]  print_report+0x118/0x5d0
[   59.538014]  kasan_report+0xdc/0x128
[   59.538042]  kasan_check_range+0x100/0x1a8
[   59.538070]  __kasan_check_write+0x20/0x30
[   59.538101]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   59.538138]  kasan_bitops_generic+0x110/0x1c8
[   59.538172]  kunit_try_run_case+0x170/0x3f0
[   59.538202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.538239]  kthread+0x328/0x630
[   59.538265]  ret_from_fork+0x10/0x20
[   59.538299] 
[   59.610728] Allocated by task 342:
[   59.614113]  kasan_save_stack+0x3c/0x68
[   59.617932]  kasan_save_track+0x20/0x40
[   59.621751]  kasan_save_alloc_info+0x40/0x58
[   59.626004]  __kasan_kmalloc+0xd4/0xd8
[   59.629737]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.634251]  kasan_bitops_generic+0xa0/0x1c8
[   59.638504]  kunit_try_run_case+0x170/0x3f0
[   59.642671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.648140]  kthread+0x328/0x630
[   59.651351]  ret_from_fork+0x10/0x20
[   59.654910] 
[   59.656386] The buggy address belongs to the object at ffff000806093fe0
[   59.656386]  which belongs to the cache kmalloc-16 of size 16
[   59.668712] The buggy address is located 8 bytes inside of
[   59.668712]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   59.680951] 
[   59.682429] The buggy address belongs to the physical page:
[   59.687987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   59.695970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.702479] page_type: f5(slab)
[   59.705614] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.713336] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.721055] page dumped because: kasan: bad access detected
[   59.726610] 
[   59.728086] Memory state around the buggy address:
[   59.732864]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.740069]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.747274] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   59.754475]                                                           ^
[   59.761075]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.768280]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   59.775482] ==================================================================
[   58.713374] ==================================================================
[   58.720466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   58.728623] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   58.735913] 
[   58.737398] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   58.737453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.737472] Hardware name: WinLink E850-96 board (DT)
[   58.737491] Call trace:
[   58.737505]  show_stack+0x20/0x38 (C)
[   58.737540]  dump_stack_lvl+0x8c/0xd0
[   58.737575]  print_report+0x118/0x5d0
[   58.737605]  kasan_report+0xdc/0x128
[   58.737631]  __asan_report_load8_noabort+0x20/0x30
[   58.737664]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   58.737702]  kasan_bitops_generic+0x110/0x1c8
[   58.737736]  kunit_try_run_case+0x170/0x3f0
[   58.737768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.737805]  kthread+0x328/0x630
[   58.737833]  ret_from_fork+0x10/0x20
[   58.737868] 
[   58.806919] Allocated by task 342:
[   58.810307]  kasan_save_stack+0x3c/0x68
[   58.814124]  kasan_save_track+0x20/0x40
[   58.817943]  kasan_save_alloc_info+0x40/0x58
[   58.822197]  __kasan_kmalloc+0xd4/0xd8
[   58.825930]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.830443]  kasan_bitops_generic+0xa0/0x1c8
[   58.834697]  kunit_try_run_case+0x170/0x3f0
[   58.838864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.844332]  kthread+0x328/0x630
[   58.847544]  ret_from_fork+0x10/0x20
[   58.851103] 
[   58.852578] The buggy address belongs to the object at ffff000806093fe0
[   58.852578]  which belongs to the cache kmalloc-16 of size 16
[   58.864908] The buggy address is located 8 bytes inside of
[   58.864908]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   58.877144] 
[   58.878623] The buggy address belongs to the physical page:
[   58.884179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   58.892164] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.898671] page_type: f5(slab)
[   58.901807] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   58.909529] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.917249] page dumped because: kasan: bad access detected
[   58.922803] 
[   58.924279] Memory state around the buggy address:
[   58.929060]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.936261]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.943466] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   58.950667]                                                           ^
[   58.957268]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.964473]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   58.971674] ==================================================================
[   60.317502] ==================================================================
[   60.324606] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   60.332766] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   60.340143] 
[   60.341625] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   60.341674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.341689] Hardware name: WinLink E850-96 board (DT)
[   60.341706] Call trace:
[   60.341716]  show_stack+0x20/0x38 (C)
[   60.341747]  dump_stack_lvl+0x8c/0xd0
[   60.341778]  print_report+0x118/0x5d0
[   60.341807]  kasan_report+0xdc/0x128
[   60.341833]  kasan_check_range+0x100/0x1a8
[   60.341862]  __kasan_check_write+0x20/0x30
[   60.341893]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   60.341929]  kasan_bitops_generic+0x110/0x1c8
[   60.341963]  kunit_try_run_case+0x170/0x3f0
[   60.341993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.342026]  kthread+0x328/0x630
[   60.342051]  ret_from_fork+0x10/0x20
[   60.342081] 
[   60.414534] Allocated by task 342:
[   60.417921]  kasan_save_stack+0x3c/0x68
[   60.421739]  kasan_save_track+0x20/0x40
[   60.425558]  kasan_save_alloc_info+0x40/0x58
[   60.429812]  __kasan_kmalloc+0xd4/0xd8
[   60.433544]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.438058]  kasan_bitops_generic+0xa0/0x1c8
[   60.442312]  kunit_try_run_case+0x170/0x3f0
[   60.446478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.451947]  kthread+0x328/0x630
[   60.455159]  ret_from_fork+0x10/0x20
[   60.458718] 
[   60.460193] The buggy address belongs to the object at ffff000806093fe0
[   60.460193]  which belongs to the cache kmalloc-16 of size 16
[   60.472520] The buggy address is located 8 bytes inside of
[   60.472520]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   60.484759] 
[   60.486238] The buggy address belongs to the physical page:
[   60.491794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   60.499777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.506286] page_type: f5(slab)
[   60.509419] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.517144] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.524862] page dumped because: kasan: bad access detected
[   60.530418] 
[   60.531893] Memory state around the buggy address:
[   60.536672]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.543876]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.551081] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   60.558282]                                                           ^
[   60.564883]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.572087]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   60.579289] ==================================================================
[   60.855751] ==================================================================
[   60.862794] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   60.870953] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   60.878242] 
[   60.879724] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   60.879773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.879790] Hardware name: WinLink E850-96 board (DT)
[   60.879808] Call trace:
[   60.879821]  show_stack+0x20/0x38 (C)
[   60.879853]  dump_stack_lvl+0x8c/0xd0
[   60.879885]  print_report+0x118/0x5d0
[   60.879913]  kasan_report+0xdc/0x128
[   60.879941]  __asan_report_load8_noabort+0x20/0x30
[   60.879973]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   60.880010]  kasan_bitops_generic+0x110/0x1c8
[   60.880045]  kunit_try_run_case+0x170/0x3f0
[   60.880077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.880110]  kthread+0x328/0x630
[   60.880135]  ret_from_fork+0x10/0x20
[   60.880166] 
[   60.949248] Allocated by task 342:
[   60.952634]  kasan_save_stack+0x3c/0x68
[   60.956453]  kasan_save_track+0x20/0x40
[   60.960272]  kasan_save_alloc_info+0x40/0x58
[   60.964526]  __kasan_kmalloc+0xd4/0xd8
[   60.968258]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.972773]  kasan_bitops_generic+0xa0/0x1c8
[   60.977026]  kunit_try_run_case+0x170/0x3f0
[   60.981192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.986661]  kthread+0x328/0x630
[   60.989872]  ret_from_fork+0x10/0x20
[   60.993432] 
[   60.994907] The buggy address belongs to the object at ffff000806093fe0
[   60.994907]  which belongs to the cache kmalloc-16 of size 16
[   61.007234] The buggy address is located 8 bytes inside of
[   61.007234]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   61.019473] 
[   61.020950] The buggy address belongs to the physical page:
[   61.026508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   61.034492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.041000] page_type: f5(slab)
[   61.044137] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.051858] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.059576] page dumped because: kasan: bad access detected
[   61.065132] 
[   61.066607] Memory state around the buggy address:
[   61.071386]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.078590]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.085795] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   61.092996]                                                           ^
[   61.099597]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.106802]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   61.114003] ==================================================================
[   60.586604] ==================================================================
[   60.593700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   60.601858] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   60.609236] 
[   60.610719] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   60.610768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.610782] Hardware name: WinLink E850-96 board (DT)
[   60.610800] Call trace:
[   60.610813]  show_stack+0x20/0x38 (C)
[   60.610847]  dump_stack_lvl+0x8c/0xd0
[   60.610881]  print_report+0x118/0x5d0
[   60.610909]  kasan_report+0xdc/0x128
[   60.610935]  kasan_check_range+0x100/0x1a8
[   60.610967]  __kasan_check_write+0x20/0x30
[   60.610997]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   60.611034]  kasan_bitops_generic+0x110/0x1c8
[   60.611066]  kunit_try_run_case+0x170/0x3f0
[   60.611095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.611131]  kthread+0x328/0x630
[   60.611157]  ret_from_fork+0x10/0x20
[   60.611190] 
[   60.683627] Allocated by task 342:
[   60.687013]  kasan_save_stack+0x3c/0x68
[   60.690832]  kasan_save_track+0x20/0x40
[   60.694652]  kasan_save_alloc_info+0x40/0x58
[   60.698905]  __kasan_kmalloc+0xd4/0xd8
[   60.702638]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.707151]  kasan_bitops_generic+0xa0/0x1c8
[   60.711405]  kunit_try_run_case+0x170/0x3f0
[   60.715571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.721040]  kthread+0x328/0x630
[   60.724252]  ret_from_fork+0x10/0x20
[   60.727811] 
[   60.729286] The buggy address belongs to the object at ffff000806093fe0
[   60.729286]  which belongs to the cache kmalloc-16 of size 16
[   60.741613] The buggy address is located 8 bytes inside of
[   60.741613]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   60.753852] 
[   60.755332] The buggy address belongs to the physical page:
[   60.760887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   60.768871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.775379] page_type: f5(slab)
[   60.778514] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.786237] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.793955] page dumped because: kasan: bad access detected
[   60.799511] 
[   60.800987] Memory state around the buggy address:
[   60.805768]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.812969]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.820174] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   60.827375]                                                           ^
[   60.833976]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.841181]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   60.848382] ==================================================================

[   26.106107] ==================================================================
[   26.106509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   26.107020] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.107266] 
[   26.107357] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.107416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.107432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.107458] Call Trace:
[   26.107475]  <TASK>
[   26.107494]  dump_stack_lvl+0x73/0xb0
[   26.107939]  print_report+0xd1/0x610
[   26.107983]  ? __virt_addr_valid+0x1db/0x2d0
[   26.108014]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   26.108046]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.108249]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   26.108284]  kasan_report+0x141/0x180
[   26.108313]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   26.108352]  kasan_check_range+0x10c/0x1c0
[   26.108382]  __kasan_check_write+0x18/0x20
[   26.108410]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   26.108441]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.108474]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.108504]  ? trace_hardirqs_on+0x37/0xe0
[   26.108544]  ? kasan_bitops_generic+0x92/0x1c0
[   26.108644]  kasan_bitops_generic+0x116/0x1c0
[   26.108673]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.108705]  ? __pfx_read_tsc+0x10/0x10
[   26.108730]  ? ktime_get_ts64+0x86/0x230
[   26.108759]  kunit_try_run_case+0x1a5/0x480
[   26.108788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.108813]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.108839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.108868]  ? __kthread_parkme+0x82/0x180
[   26.108892]  ? preempt_count_sub+0x50/0x80
[   26.108922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.108950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.108983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.109015]  kthread+0x337/0x6f0
[   26.109038]  ? trace_preempt_on+0x20/0xc0
[   26.109065]  ? __pfx_kthread+0x10/0x10
[   26.109090]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.109119]  ? calculate_sigpending+0x7b/0xa0
[   26.109148]  ? __pfx_kthread+0x10/0x10
[   26.109174]  ret_from_fork+0x116/0x1d0
[   26.109197]  ? __pfx_kthread+0x10/0x10
[   26.109222]  ret_from_fork_asm+0x1a/0x30
[   26.109262]  </TASK>
[   26.109275] 
[   26.126493] Allocated by task 309:
[   26.126856]  kasan_save_stack+0x45/0x70
[   26.127360]  kasan_save_track+0x18/0x40
[   26.127512]  kasan_save_alloc_info+0x3b/0x50
[   26.128193]  __kasan_kmalloc+0xb7/0xc0
[   26.128777]  __kmalloc_cache_noprof+0x189/0x420
[   26.129328]  kasan_bitops_generic+0x92/0x1c0
[   26.129500]  kunit_try_run_case+0x1a5/0x480
[   26.129667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.130090]  kthread+0x337/0x6f0
[   26.130472]  ret_from_fork+0x116/0x1d0
[   26.130914]  ret_from_fork_asm+0x1a/0x30
[   26.131372] 
[   26.131541] The buggy address belongs to the object at ffff888104884680
[   26.131541]  which belongs to the cache kmalloc-16 of size 16
[   26.132821] The buggy address is located 8 bytes inside of
[   26.132821]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.133201] 
[   26.133274] The buggy address belongs to the physical page:
[   26.133454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.133843] flags: 0x200000000000000(node=0|zone=2)
[   26.134012] page_type: f5(slab)
[   26.134259] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.135016] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.135251] page dumped because: kasan: bad access detected
[   26.135479] 
[   26.135568] Memory state around the buggy address:
[   26.135892]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.136361]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.136879] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.137169]                       ^
[   26.137304]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.137790]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.138152] ==================================================================
[   26.248481] ==================================================================
[   26.249720] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.250719] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.251260] 
[   26.251453] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.251513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.251541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.251566] Call Trace:
[   26.251586]  <TASK>
[   26.251606]  dump_stack_lvl+0x73/0xb0
[   26.251651]  print_report+0xd1/0x610
[   26.251678]  ? __virt_addr_valid+0x1db/0x2d0
[   26.251746]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.251805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.251851]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.251883]  kasan_report+0x141/0x180
[   26.251911]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.251949]  kasan_check_range+0x10c/0x1c0
[   26.251980]  __kasan_check_write+0x18/0x20
[   26.252007]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   26.252039]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.252071]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.252111]  ? trace_hardirqs_on+0x37/0xe0
[   26.252138]  ? kasan_bitops_generic+0x92/0x1c0
[   26.252192]  kasan_bitops_generic+0x116/0x1c0
[   26.252221]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.252251]  ? __pfx_read_tsc+0x10/0x10
[   26.252277]  ? ktime_get_ts64+0x86/0x230
[   26.252306]  kunit_try_run_case+0x1a5/0x480
[   26.252334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.252359]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.252387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.252415]  ? __kthread_parkme+0x82/0x180
[   26.252439]  ? preempt_count_sub+0x50/0x80
[   26.252468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.252497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.252538]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.252569]  kthread+0x337/0x6f0
[   26.252608]  ? trace_preempt_on+0x20/0xc0
[   26.252635]  ? __pfx_kthread+0x10/0x10
[   26.252660]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.252689]  ? calculate_sigpending+0x7b/0xa0
[   26.252718]  ? __pfx_kthread+0x10/0x10
[   26.252745]  ret_from_fork+0x116/0x1d0
[   26.252767]  ? __pfx_kthread+0x10/0x10
[   26.252793]  ret_from_fork_asm+0x1a/0x30
[   26.252832]  </TASK>
[   26.252846] 
[   26.269212] Allocated by task 309:
[   26.269349]  kasan_save_stack+0x45/0x70
[   26.269505]  kasan_save_track+0x18/0x40
[   26.270062]  kasan_save_alloc_info+0x3b/0x50
[   26.270640]  __kasan_kmalloc+0xb7/0xc0
[   26.271130]  __kmalloc_cache_noprof+0x189/0x420
[   26.271645]  kasan_bitops_generic+0x92/0x1c0
[   26.272075]  kunit_try_run_case+0x1a5/0x480
[   26.272488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.273203]  kthread+0x337/0x6f0
[   26.273387]  ret_from_fork+0x116/0x1d0
[   26.273540]  ret_from_fork_asm+0x1a/0x30
[   26.274049] 
[   26.274212] The buggy address belongs to the object at ffff888104884680
[   26.274212]  which belongs to the cache kmalloc-16 of size 16
[   26.275379] The buggy address is located 8 bytes inside of
[   26.275379]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.276338] 
[   26.276550] The buggy address belongs to the physical page:
[   26.277064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.277331] flags: 0x200000000000000(node=0|zone=2)
[   26.277503] page_type: f5(slab)
[   26.277884] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.278754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.279514] page dumped because: kasan: bad access detected
[   26.280108] 
[   26.280270] Memory state around the buggy address:
[   26.280954]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.281477]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.282138] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.282477]                       ^
[   26.282737]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.283417]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.284151] ==================================================================
[   26.284925] ==================================================================
[   26.285157] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.285411] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.285666] 
[   26.285899] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.286010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.286028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.286053] Call Trace:
[   26.286069]  <TASK>
[   26.286085]  dump_stack_lvl+0x73/0xb0
[   26.286118]  print_report+0xd1/0x610
[   26.286145]  ? __virt_addr_valid+0x1db/0x2d0
[   26.286172]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.286204]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.286235]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.286266]  kasan_report+0x141/0x180
[   26.286292]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.286330]  kasan_check_range+0x10c/0x1c0
[   26.286359]  __kasan_check_write+0x18/0x20
[   26.286385]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   26.286417]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.286449]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.286481]  ? trace_hardirqs_on+0x37/0xe0
[   26.286507]  ? kasan_bitops_generic+0x92/0x1c0
[   26.286554]  kasan_bitops_generic+0x116/0x1c0
[   26.286653]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.286729]  ? __pfx_read_tsc+0x10/0x10
[   26.286754]  ? ktime_get_ts64+0x86/0x230
[   26.286784]  kunit_try_run_case+0x1a5/0x480
[   26.286813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.286838]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.286866]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.286894]  ? __kthread_parkme+0x82/0x180
[   26.286919]  ? preempt_count_sub+0x50/0x80
[   26.286949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.286978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.287009]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.287041]  kthread+0x337/0x6f0
[   26.287065]  ? trace_preempt_on+0x20/0xc0
[   26.287091]  ? __pfx_kthread+0x10/0x10
[   26.287117]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.287146]  ? calculate_sigpending+0x7b/0xa0
[   26.287175]  ? __pfx_kthread+0x10/0x10
[   26.287201]  ret_from_fork+0x116/0x1d0
[   26.287223]  ? __pfx_kthread+0x10/0x10
[   26.287249]  ret_from_fork_asm+0x1a/0x30
[   26.287288]  </TASK>
[   26.287303] 
[   26.295991] Allocated by task 309:
[   26.296118]  kasan_save_stack+0x45/0x70
[   26.296261]  kasan_save_track+0x18/0x40
[   26.296399]  kasan_save_alloc_info+0x3b/0x50
[   26.296638]  __kasan_kmalloc+0xb7/0xc0
[   26.296950]  __kmalloc_cache_noprof+0x189/0x420
[   26.297182]  kasan_bitops_generic+0x92/0x1c0
[   26.297398]  kunit_try_run_case+0x1a5/0x480
[   26.297659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.298118]  kthread+0x337/0x6f0
[   26.298276]  ret_from_fork+0x116/0x1d0
[   26.298461]  ret_from_fork_asm+0x1a/0x30
[   26.298757] 
[   26.298903] The buggy address belongs to the object at ffff888104884680
[   26.298903]  which belongs to the cache kmalloc-16 of size 16
[   26.299321] The buggy address is located 8 bytes inside of
[   26.299321]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.300200] 
[   26.300478] The buggy address belongs to the physical page:
[   26.300704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.301339] flags: 0x200000000000000(node=0|zone=2)
[   26.301537] page_type: f5(slab)
[   26.301846] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.302297] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.302629] page dumped because: kasan: bad access detected
[   26.302804] 
[   26.302873] Memory state around the buggy address:
[   26.303203]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.303545]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.304152] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.304442]                       ^
[   26.304662]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.305010]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.305385] ==================================================================
[   26.139057] ==================================================================
[   26.139421] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   26.139772] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.140275] 
[   26.140386] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.140443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.140459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.140486] Call Trace:
[   26.140500]  <TASK>
[   26.140518]  dump_stack_lvl+0x73/0xb0
[   26.140562]  print_report+0xd1/0x610
[   26.140893]  ? __virt_addr_valid+0x1db/0x2d0
[   26.140925]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   26.141011]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.141044]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   26.141076]  kasan_report+0x141/0x180
[   26.141114]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   26.141152]  kasan_check_range+0x10c/0x1c0
[   26.141192]  __kasan_check_write+0x18/0x20
[   26.141220]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   26.141251]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.141285]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.141314]  ? trace_hardirqs_on+0x37/0xe0
[   26.141340]  ? kasan_bitops_generic+0x92/0x1c0
[   26.141374]  kasan_bitops_generic+0x116/0x1c0
[   26.141403]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.141434]  ? __pfx_read_tsc+0x10/0x10
[   26.141460]  ? ktime_get_ts64+0x86/0x230
[   26.141490]  kunit_try_run_case+0x1a5/0x480
[   26.141518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.141554]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.141647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.141678]  ? __kthread_parkme+0x82/0x180
[   26.141703]  ? preempt_count_sub+0x50/0x80
[   26.141732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.141761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.141792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.141824]  kthread+0x337/0x6f0
[   26.141848]  ? trace_preempt_on+0x20/0xc0
[   26.141876]  ? __pfx_kthread+0x10/0x10
[   26.141900]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.141930]  ? calculate_sigpending+0x7b/0xa0
[   26.141958]  ? __pfx_kthread+0x10/0x10
[   26.141985]  ret_from_fork+0x116/0x1d0
[   26.142007]  ? __pfx_kthread+0x10/0x10
[   26.142033]  ret_from_fork_asm+0x1a/0x30
[   26.142074]  </TASK>
[   26.142087] 
[   26.151387] Allocated by task 309:
[   26.151564]  kasan_save_stack+0x45/0x70
[   26.151843]  kasan_save_track+0x18/0x40
[   26.152019]  kasan_save_alloc_info+0x3b/0x50
[   26.152183]  __kasan_kmalloc+0xb7/0xc0
[   26.152398]  __kmalloc_cache_noprof+0x189/0x420
[   26.152634]  kasan_bitops_generic+0x92/0x1c0
[   26.152888]  kunit_try_run_case+0x1a5/0x480
[   26.153302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.153574]  kthread+0x337/0x6f0
[   26.153702]  ret_from_fork+0x116/0x1d0
[   26.153841]  ret_from_fork_asm+0x1a/0x30
[   26.153986] 
[   26.154077] The buggy address belongs to the object at ffff888104884680
[   26.154077]  which belongs to the cache kmalloc-16 of size 16
[   26.154656] The buggy address is located 8 bytes inside of
[   26.154656]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.155047] 
[   26.155117] The buggy address belongs to the physical page:
[   26.157621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.158438] flags: 0x200000000000000(node=0|zone=2)
[   26.159055] page_type: f5(slab)
[   26.159194] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.159436] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.160810] page dumped because: kasan: bad access detected
[   26.161699] 
[   26.162173] Memory state around the buggy address:
[   26.163186]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.163990]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.164237] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.164472]                       ^
[   26.164715]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.165812]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.166657] ==================================================================
[   26.226186] ==================================================================
[   26.226494] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   26.227026] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.227344] 
[   26.227455] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.227512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.227540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.227644] Call Trace:
[   26.227663]  <TASK>
[   26.227680]  dump_stack_lvl+0x73/0xb0
[   26.227713]  print_report+0xd1/0x610
[   26.227741]  ? __virt_addr_valid+0x1db/0x2d0
[   26.227768]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   26.227798]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.227830]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   26.227862]  kasan_report+0x141/0x180
[   26.227888]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   26.227926]  kasan_check_range+0x10c/0x1c0
[   26.227955]  __kasan_check_write+0x18/0x20
[   26.227983]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   26.228014]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.228047]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.228075]  ? trace_hardirqs_on+0x37/0xe0
[   26.228101]  ? kasan_bitops_generic+0x92/0x1c0
[   26.228136]  kasan_bitops_generic+0x116/0x1c0
[   26.228164]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.228195]  ? __pfx_read_tsc+0x10/0x10
[   26.228220]  ? ktime_get_ts64+0x86/0x230
[   26.228249]  kunit_try_run_case+0x1a5/0x480
[   26.228277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.228302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.228330]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.228358]  ? __kthread_parkme+0x82/0x180
[   26.228383]  ? preempt_count_sub+0x50/0x80
[   26.228412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.228440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.228472]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.228504]  kthread+0x337/0x6f0
[   26.228537]  ? trace_preempt_on+0x20/0xc0
[   26.228630]  ? __pfx_kthread+0x10/0x10
[   26.228659]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.228688]  ? calculate_sigpending+0x7b/0xa0
[   26.228716]  ? __pfx_kthread+0x10/0x10
[   26.228742]  ret_from_fork+0x116/0x1d0
[   26.228766]  ? __pfx_kthread+0x10/0x10
[   26.228791]  ret_from_fork_asm+0x1a/0x30
[   26.228832]  </TASK>
[   26.228846] 
[   26.237294] Allocated by task 309:
[   26.237465]  kasan_save_stack+0x45/0x70
[   26.237717]  kasan_save_track+0x18/0x40
[   26.237889]  kasan_save_alloc_info+0x3b/0x50
[   26.238104]  __kasan_kmalloc+0xb7/0xc0
[   26.238300]  __kmalloc_cache_noprof+0x189/0x420
[   26.238537]  kasan_bitops_generic+0x92/0x1c0
[   26.238918]  kunit_try_run_case+0x1a5/0x480
[   26.239103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.239344]  kthread+0x337/0x6f0
[   26.239517]  ret_from_fork+0x116/0x1d0
[   26.239806]  ret_from_fork_asm+0x1a/0x30
[   26.239983] 
[   26.240077] The buggy address belongs to the object at ffff888104884680
[   26.240077]  which belongs to the cache kmalloc-16 of size 16
[   26.240653] The buggy address is located 8 bytes inside of
[   26.240653]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.241134] 
[   26.241216] The buggy address belongs to the physical page:
[   26.241447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.241873] flags: 0x200000000000000(node=0|zone=2)
[   26.242082] page_type: f5(slab)
[   26.242253] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.242742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.243057] page dumped because: kasan: bad access detected
[   26.243283] 
[   26.243369] Memory state around the buggy address:
[   26.243671]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.243973]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.244218] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.244440]                       ^
[   26.245457]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.246607]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.247522] ==================================================================
[   26.305965] ==================================================================
[   26.306324] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.306890] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.307155] 
[   26.307266] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.307322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.307375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.307400] Call Trace:
[   26.307416]  <TASK>
[   26.307471]  dump_stack_lvl+0x73/0xb0
[   26.307538]  print_report+0xd1/0x610
[   26.307566]  ? __virt_addr_valid+0x1db/0x2d0
[   26.307593]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.307623]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.307655]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.307687]  kasan_report+0x141/0x180
[   26.307715]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.307753]  kasan_check_range+0x10c/0x1c0
[   26.307781]  __kasan_check_write+0x18/0x20
[   26.307837]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   26.307869]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.308010]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.308041]  ? trace_hardirqs_on+0x37/0xe0
[   26.308068]  ? kasan_bitops_generic+0x92/0x1c0
[   26.308102]  kasan_bitops_generic+0x116/0x1c0
[   26.308130]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.308161]  ? __pfx_read_tsc+0x10/0x10
[   26.308185]  ? ktime_get_ts64+0x86/0x230
[   26.308215]  kunit_try_run_case+0x1a5/0x480
[   26.308242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.308269]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.308296]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.308324]  ? __kthread_parkme+0x82/0x180
[   26.308347]  ? preempt_count_sub+0x50/0x80
[   26.308377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.308405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.308436]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.308469]  kthread+0x337/0x6f0
[   26.308493]  ? trace_preempt_on+0x20/0xc0
[   26.308521]  ? __pfx_kthread+0x10/0x10
[   26.308555]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.308585]  ? calculate_sigpending+0x7b/0xa0
[   26.308613]  ? __pfx_kthread+0x10/0x10
[   26.308639]  ret_from_fork+0x116/0x1d0
[   26.308697]  ? __pfx_kthread+0x10/0x10
[   26.308765]  ret_from_fork_asm+0x1a/0x30
[   26.308805]  </TASK>
[   26.308818] 
[   26.317744] Allocated by task 309:
[   26.318077]  kasan_save_stack+0x45/0x70
[   26.318306]  kasan_save_track+0x18/0x40
[   26.318513]  kasan_save_alloc_info+0x3b/0x50
[   26.318777]  __kasan_kmalloc+0xb7/0xc0
[   26.318917]  __kmalloc_cache_noprof+0x189/0x420
[   26.319078]  kasan_bitops_generic+0x92/0x1c0
[   26.319263]  kunit_try_run_case+0x1a5/0x480
[   26.319479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.319853]  kthread+0x337/0x6f0
[   26.320238]  ret_from_fork+0x116/0x1d0
[   26.320469]  ret_from_fork_asm+0x1a/0x30
[   26.320654] 
[   26.320733] The buggy address belongs to the object at ffff888104884680
[   26.320733]  which belongs to the cache kmalloc-16 of size 16
[   26.321298] The buggy address is located 8 bytes inside of
[   26.321298]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.321811] 
[   26.322033] The buggy address belongs to the physical page:
[   26.322342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.322719] flags: 0x200000000000000(node=0|zone=2)
[   26.323041] page_type: f5(slab)
[   26.323191] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.323787] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.324114] page dumped because: kasan: bad access detected
[   26.324368] 
[   26.324506] Memory state around the buggy address:
[   26.324826]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.325172]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.325441] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.326006]                       ^
[   26.326196]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.326636]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.327068] ==================================================================
[   26.199729] ==================================================================
[   26.200011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   26.200347] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.201715] 
[   26.201981] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.202165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.202184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.202210] Call Trace:
[   26.202227]  <TASK>
[   26.202243]  dump_stack_lvl+0x73/0xb0
[   26.202277]  print_report+0xd1/0x610
[   26.202304]  ? __virt_addr_valid+0x1db/0x2d0
[   26.202332]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   26.202362]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.202393]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   26.202426]  kasan_report+0x141/0x180
[   26.202453]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   26.202496]  kasan_check_range+0x10c/0x1c0
[   26.202535]  __kasan_check_write+0x18/0x20
[   26.202563]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   26.202662]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.202695]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.202724]  ? trace_hardirqs_on+0x37/0xe0
[   26.202751]  ? kasan_bitops_generic+0x92/0x1c0
[   26.202786]  kasan_bitops_generic+0x116/0x1c0
[   26.202814]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.202845]  ? __pfx_read_tsc+0x10/0x10
[   26.202869]  ? ktime_get_ts64+0x86/0x230
[   26.202901]  kunit_try_run_case+0x1a5/0x480
[   26.202929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.202956]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.202983]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.203011]  ? __kthread_parkme+0x82/0x180
[   26.203036]  ? preempt_count_sub+0x50/0x80
[   26.203067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.203095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.203129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.203161]  kthread+0x337/0x6f0
[   26.203184]  ? trace_preempt_on+0x20/0xc0
[   26.203212]  ? __pfx_kthread+0x10/0x10
[   26.203236]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.203266]  ? calculate_sigpending+0x7b/0xa0
[   26.203294]  ? __pfx_kthread+0x10/0x10
[   26.203321]  ret_from_fork+0x116/0x1d0
[   26.203343]  ? __pfx_kthread+0x10/0x10
[   26.203369]  ret_from_fork_asm+0x1a/0x30
[   26.203408]  </TASK>
[   26.203422] 
[   26.216996] Allocated by task 309:
[   26.217179]  kasan_save_stack+0x45/0x70
[   26.217368]  kasan_save_track+0x18/0x40
[   26.218089]  kasan_save_alloc_info+0x3b/0x50
[   26.218277]  __kasan_kmalloc+0xb7/0xc0
[   26.218418]  __kmalloc_cache_noprof+0x189/0x420
[   26.218984]  kasan_bitops_generic+0x92/0x1c0
[   26.219388]  kunit_try_run_case+0x1a5/0x480
[   26.219570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.219766]  kthread+0x337/0x6f0
[   26.219893]  ret_from_fork+0x116/0x1d0
[   26.220030]  ret_from_fork_asm+0x1a/0x30
[   26.220173] 
[   26.220245] The buggy address belongs to the object at ffff888104884680
[   26.220245]  which belongs to the cache kmalloc-16 of size 16
[   26.220665] The buggy address is located 8 bytes inside of
[   26.220665]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.221215] 
[   26.221318] The buggy address belongs to the physical page:
[   26.221651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.222016] flags: 0x200000000000000(node=0|zone=2)
[   26.222254] page_type: f5(slab)
[   26.222427] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.222969] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.223214] page dumped because: kasan: bad access detected
[   26.223444] 
[   26.223555] Memory state around the buggy address:
[   26.223872]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.224202]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.224499] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.224874]                       ^
[   26.225059]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.225374]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.225771] ==================================================================
[   26.168393] ==================================================================
[   26.168999] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   26.169275] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.169515] 
[   26.169628] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.169687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.169703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.169729] Call Trace:
[   26.169749]  <TASK>
[   26.169769]  dump_stack_lvl+0x73/0xb0
[   26.169861]  print_report+0xd1/0x610
[   26.169890]  ? __virt_addr_valid+0x1db/0x2d0
[   26.170128]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   26.170161]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.170195]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   26.170227]  kasan_report+0x141/0x180
[   26.170256]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   26.170295]  kasan_check_range+0x10c/0x1c0
[   26.170325]  __kasan_check_write+0x18/0x20
[   26.170352]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   26.170384]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.170417]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.170446]  ? trace_hardirqs_on+0x37/0xe0
[   26.170482]  ? kasan_bitops_generic+0x92/0x1c0
[   26.170517]  kasan_bitops_generic+0x116/0x1c0
[   26.170558]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.170867]  ? __pfx_read_tsc+0x10/0x10
[   26.170897]  ? ktime_get_ts64+0x86/0x230
[   26.170930]  kunit_try_run_case+0x1a5/0x480
[   26.170960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.170988]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.171017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.171045]  ? __kthread_parkme+0x82/0x180
[   26.171070]  ? preempt_count_sub+0x50/0x80
[   26.171100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.171128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.171161]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.171194]  kthread+0x337/0x6f0
[   26.171217]  ? trace_preempt_on+0x20/0xc0
[   26.171245]  ? __pfx_kthread+0x10/0x10
[   26.171269]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.171297]  ? calculate_sigpending+0x7b/0xa0
[   26.171329]  ? __pfx_kthread+0x10/0x10
[   26.171355]  ret_from_fork+0x116/0x1d0
[   26.171377]  ? __pfx_kthread+0x10/0x10
[   26.171403]  ret_from_fork_asm+0x1a/0x30
[   26.171443]  </TASK>
[   26.171457] 
[   26.189364] Allocated by task 309:
[   26.189500]  kasan_save_stack+0x45/0x70
[   26.189667]  kasan_save_track+0x18/0x40
[   26.189835]  kasan_save_alloc_info+0x3b/0x50
[   26.190157]  __kasan_kmalloc+0xb7/0xc0
[   26.190316]  __kmalloc_cache_noprof+0x189/0x420
[   26.190482]  kasan_bitops_generic+0x92/0x1c0
[   26.190924]  kunit_try_run_case+0x1a5/0x480
[   26.191333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.191705]  kthread+0x337/0x6f0
[   26.191917]  ret_from_fork+0x116/0x1d0
[   26.192129]  ret_from_fork_asm+0x1a/0x30
[   26.192329] 
[   26.192462] The buggy address belongs to the object at ffff888104884680
[   26.192462]  which belongs to the cache kmalloc-16 of size 16
[   26.193224] The buggy address is located 8 bytes inside of
[   26.193224]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.193894] 
[   26.194112] The buggy address belongs to the physical page:
[   26.194304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.194692] flags: 0x200000000000000(node=0|zone=2)
[   26.195197] page_type: f5(slab)
[   26.195379] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.195710] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.196033] page dumped because: kasan: bad access detected
[   26.196466] 
[   26.196612] Memory state around the buggy address:
[   26.196815]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.197236]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.197576] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.198282]                       ^
[   26.198453]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.198912]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.199233] ==================================================================