Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-x86_64

[   61.391854] ==================================================================
[   61.398896] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   61.407837] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   61.415127] 
[   61.416609] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   61.416658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.416672] Hardware name: WinLink E850-96 board (DT)
[   61.416691] Call trace:
[   61.416702]  show_stack+0x20/0x38 (C)
[   61.416735]  dump_stack_lvl+0x8c/0xd0
[   61.416766]  print_report+0x118/0x5d0
[   61.416793]  kasan_report+0xdc/0x128
[   61.416821]  __asan_report_load8_noabort+0x20/0x30
[   61.416853]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   61.416891]  kasan_bitops_generic+0x11c/0x1c8
[   61.416925]  kunit_try_run_case+0x170/0x3f0
[   61.416954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.416988]  kthread+0x328/0x630
[   61.417015]  ret_from_fork+0x10/0x20
[   61.417045] 
[   61.486914] Allocated by task 342:
[   61.490300]  kasan_save_stack+0x3c/0x68
[   61.494119]  kasan_save_track+0x20/0x40
[   61.497938]  kasan_save_alloc_info+0x40/0x58
[   61.502192]  __kasan_kmalloc+0xd4/0xd8
[   61.505924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.510438]  kasan_bitops_generic+0xa0/0x1c8
[   61.514691]  kunit_try_run_case+0x170/0x3f0
[   61.518858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.524326]  kthread+0x328/0x630
[   61.527538]  ret_from_fork+0x10/0x20
[   61.531098] 
[   61.532573] The buggy address belongs to the object at ffff000806093fe0
[   61.532573]  which belongs to the cache kmalloc-16 of size 16
[   61.544899] The buggy address is located 8 bytes inside of
[   61.544899]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   61.557138] 
[   61.558616] The buggy address belongs to the physical page:
[   61.564171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   61.572157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.578666] page_type: f5(slab)
[   61.581798] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.589523] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.597242] page dumped because: kasan: bad access detected
[   61.602798] 
[   61.604273] Memory state around the buggy address:
[   61.609052]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.616256]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.623461] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   61.630662]                                                           ^
[   61.637263]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.644467]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   61.651668] ==================================================================
[   62.196825] ==================================================================
[   62.203920] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   62.212860] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   62.220236] 
[   62.221717] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   62.221765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.221781] Hardware name: WinLink E850-96 board (DT)
[   62.221800] Call trace:
[   62.221813]  show_stack+0x20/0x38 (C)
[   62.221844]  dump_stack_lvl+0x8c/0xd0
[   62.221875]  print_report+0x118/0x5d0
[   62.221905]  kasan_report+0xdc/0x128
[   62.221933]  kasan_check_range+0x100/0x1a8
[   62.221962]  __kasan_check_write+0x20/0x30
[   62.221993]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   62.222033]  kasan_bitops_generic+0x11c/0x1c8
[   62.222068]  kunit_try_run_case+0x170/0x3f0
[   62.222095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.222129]  kthread+0x328/0x630
[   62.222156]  ret_from_fork+0x10/0x20
[   62.222188] 
[   62.295409] Allocated by task 342:
[   62.298794]  kasan_save_stack+0x3c/0x68
[   62.302614]  kasan_save_track+0x20/0x40
[   62.306433]  kasan_save_alloc_info+0x40/0x58
[   62.310686]  __kasan_kmalloc+0xd4/0xd8
[   62.314419]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.318933]  kasan_bitops_generic+0xa0/0x1c8
[   62.323186]  kunit_try_run_case+0x170/0x3f0
[   62.327353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.332821]  kthread+0x328/0x630
[   62.336033]  ret_from_fork+0x10/0x20
[   62.339592] 
[   62.341068] The buggy address belongs to the object at ffff000806093fe0
[   62.341068]  which belongs to the cache kmalloc-16 of size 16
[   62.353394] The buggy address is located 8 bytes inside of
[   62.353394]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   62.365633] 
[   62.367112] The buggy address belongs to the physical page:
[   62.372667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   62.380651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.387161] page_type: f5(slab)
[   62.390294] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.398018] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.405737] page dumped because: kasan: bad access detected
[   62.411292] 
[   62.412768] Memory state around the buggy address:
[   62.417546]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.424751]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.431955] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   62.439157]                                                           ^
[   62.445757]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.452962]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   62.460163] ==================================================================
[   62.734692] ==================================================================
[   62.741757] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   62.750699] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   62.758075] 
[   62.759560] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   62.759608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.759626] Hardware name: WinLink E850-96 board (DT)
[   62.759642] Call trace:
[   62.759655]  show_stack+0x20/0x38 (C)
[   62.759686]  dump_stack_lvl+0x8c/0xd0
[   62.759718]  print_report+0x118/0x5d0
[   62.759745]  kasan_report+0xdc/0x128
[   62.759771]  kasan_check_range+0x100/0x1a8
[   62.759799]  __kasan_check_write+0x20/0x30
[   62.759830]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   62.759868]  kasan_bitops_generic+0x11c/0x1c8
[   62.759903]  kunit_try_run_case+0x170/0x3f0
[   62.759933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.759965]  kthread+0x328/0x630
[   62.759991]  ret_from_fork+0x10/0x20
[   62.760022] 
[   62.833248] Allocated by task 342:
[   62.836634]  kasan_save_stack+0x3c/0x68
[   62.840453]  kasan_save_track+0x20/0x40
[   62.844272]  kasan_save_alloc_info+0x40/0x58
[   62.848525]  __kasan_kmalloc+0xd4/0xd8
[   62.852258]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.856772]  kasan_bitops_generic+0xa0/0x1c8
[   62.861025]  kunit_try_run_case+0x170/0x3f0
[   62.865192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.870661]  kthread+0x328/0x630
[   62.873872]  ret_from_fork+0x10/0x20
[   62.877431] 
[   62.878907] The buggy address belongs to the object at ffff000806093fe0
[   62.878907]  which belongs to the cache kmalloc-16 of size 16
[   62.891233] The buggy address is located 8 bytes inside of
[   62.891233]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   62.903472] 
[   62.904950] The buggy address belongs to the physical page:
[   62.910507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   62.918490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.925000] page_type: f5(slab)
[   62.928134] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.935857] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.943576] page dumped because: kasan: bad access detected
[   62.949131] 
[   62.950607] Memory state around the buggy address:
[   62.955386]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.962590]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.969795] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   62.976996]                                                           ^
[   62.983596]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.990801]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   62.998002] ==================================================================
[   63.005373] ==================================================================
[   63.012413] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   63.021353] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   63.028644] 
[   63.030126] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   63.030175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.030190] Hardware name: WinLink E850-96 board (DT)
[   63.030207] Call trace:
[   63.030221]  show_stack+0x20/0x38 (C)
[   63.030253]  dump_stack_lvl+0x8c/0xd0
[   63.030285]  print_report+0x118/0x5d0
[   63.030315]  kasan_report+0xdc/0x128
[   63.030343]  __asan_report_load8_noabort+0x20/0x30
[   63.030377]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   63.030415]  kasan_bitops_generic+0x11c/0x1c8
[   63.030448]  kunit_try_run_case+0x170/0x3f0
[   63.030478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.030512]  kthread+0x328/0x630
[   63.030537]  ret_from_fork+0x10/0x20
[   63.030566] 
[   63.100431] Allocated by task 342:
[   63.103817]  kasan_save_stack+0x3c/0x68
[   63.107636]  kasan_save_track+0x20/0x40
[   63.111455]  kasan_save_alloc_info+0x40/0x58
[   63.115709]  __kasan_kmalloc+0xd4/0xd8
[   63.119442]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.123955]  kasan_bitops_generic+0xa0/0x1c8
[   63.128209]  kunit_try_run_case+0x170/0x3f0
[   63.132375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.137844]  kthread+0x328/0x630
[   63.141056]  ret_from_fork+0x10/0x20
[   63.144614] 
[   63.146090] The buggy address belongs to the object at ffff000806093fe0
[   63.146090]  which belongs to the cache kmalloc-16 of size 16
[   63.158417] The buggy address is located 8 bytes inside of
[   63.158417]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   63.170656] 
[   63.172133] The buggy address belongs to the physical page:
[   63.177689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   63.185673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.192183] page_type: f5(slab)
[   63.195317] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   63.203041] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   63.210760] page dumped because: kasan: bad access detected
[   63.216315] 
[   63.217791] Memory state around the buggy address:
[   63.222570]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   63.229773]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   63.236978] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   63.244179]                                                           ^
[   63.250780]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.257985]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   63.265186] ==================================================================
[   63.272531] ==================================================================
[   63.279597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   63.288536] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   63.295828] 
[   63.297308] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   63.297358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.297375] Hardware name: WinLink E850-96 board (DT)
[   63.297394] Call trace:
[   63.297406]  show_stack+0x20/0x38 (C)
[   63.297437]  dump_stack_lvl+0x8c/0xd0
[   63.297470]  print_report+0x118/0x5d0
[   63.297497]  kasan_report+0xdc/0x128
[   63.297524]  __asan_report_load8_noabort+0x20/0x30
[   63.297555]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   63.297594]  kasan_bitops_generic+0x11c/0x1c8
[   63.297628]  kunit_try_run_case+0x170/0x3f0
[   63.297657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.297689]  kthread+0x328/0x630
[   63.297716]  ret_from_fork+0x10/0x20
[   63.297746] 
[   63.367614] Allocated by task 342:
[   63.371000]  kasan_save_stack+0x3c/0x68
[   63.374819]  kasan_save_track+0x20/0x40
[   63.378639]  kasan_save_alloc_info+0x40/0x58
[   63.382892]  __kasan_kmalloc+0xd4/0xd8
[   63.386625]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.391139]  kasan_bitops_generic+0xa0/0x1c8
[   63.395392]  kunit_try_run_case+0x170/0x3f0
[   63.399559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.405027]  kthread+0x328/0x630
[   63.408239]  ret_from_fork+0x10/0x20
[   63.411798] 
[   63.413274] The buggy address belongs to the object at ffff000806093fe0
[   63.413274]  which belongs to the cache kmalloc-16 of size 16
[   63.425600] The buggy address is located 8 bytes inside of
[   63.425600]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   63.437839] 
[   63.439317] The buggy address belongs to the physical page:
[   63.444873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   63.452857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.459367] page_type: f5(slab)
[   63.462500] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   63.470224] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   63.477943] page dumped because: kasan: bad access detected
[   63.483499] 
[   63.484974] Memory state around the buggy address:
[   63.489752]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   63.496957]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   63.504162] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   63.511362]                                                           ^
[   63.517963]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.525168]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   63.532369] ==================================================================
[   61.929693] ==================================================================
[   61.936735] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   61.945675] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   61.952966] 
[   61.954447] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   61.954495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.954512] Hardware name: WinLink E850-96 board (DT)
[   61.954529] Call trace:
[   61.954541]  show_stack+0x20/0x38 (C)
[   61.954572]  dump_stack_lvl+0x8c/0xd0
[   61.954604]  print_report+0x118/0x5d0
[   61.954632]  kasan_report+0xdc/0x128
[   61.954658]  __asan_report_load8_noabort+0x20/0x30
[   61.954692]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   61.954730]  kasan_bitops_generic+0x11c/0x1c8
[   61.954763]  kunit_try_run_case+0x170/0x3f0
[   61.954792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.954824]  kthread+0x328/0x630
[   61.954851]  ret_from_fork+0x10/0x20
[   61.954884] 
[   62.024753] Allocated by task 342:
[   62.028139]  kasan_save_stack+0x3c/0x68
[   62.031958]  kasan_save_track+0x20/0x40
[   62.035777]  kasan_save_alloc_info+0x40/0x58
[   62.040031]  __kasan_kmalloc+0xd4/0xd8
[   62.043763]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.048277]  kasan_bitops_generic+0xa0/0x1c8
[   62.052531]  kunit_try_run_case+0x170/0x3f0
[   62.056697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.062166]  kthread+0x328/0x630
[   62.065377]  ret_from_fork+0x10/0x20
[   62.068936] 
[   62.070412] The buggy address belongs to the object at ffff000806093fe0
[   62.070412]  which belongs to the cache kmalloc-16 of size 16
[   62.082738] The buggy address is located 8 bytes inside of
[   62.082738]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   62.094977] 
[   62.096455] The buggy address belongs to the physical page:
[   62.102011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   62.109995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.116505] page_type: f5(slab)
[   62.119638] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.127363] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.135081] page dumped because: kasan: bad access detected
[   62.140637] 
[   62.142112] Memory state around the buggy address:
[   62.146892]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.154095]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.161300] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   62.168501]                                                           ^
[   62.175102]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.182307]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   62.189508] ==================================================================
[   62.467535] ==================================================================
[   62.474574] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   62.483515] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   62.490805] 
[   62.492288] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   62.492334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.492352] Hardware name: WinLink E850-96 board (DT)
[   62.492370] Call trace:
[   62.492382]  show_stack+0x20/0x38 (C)
[   62.492413]  dump_stack_lvl+0x8c/0xd0
[   62.492446]  print_report+0x118/0x5d0
[   62.492473]  kasan_report+0xdc/0x128
[   62.492501]  __asan_report_load8_noabort+0x20/0x30
[   62.492532]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   62.492570]  kasan_bitops_generic+0x11c/0x1c8
[   62.492605]  kunit_try_run_case+0x170/0x3f0
[   62.492632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.492667]  kthread+0x328/0x630
[   62.492693]  ret_from_fork+0x10/0x20
[   62.492726] 
[   62.562592] Allocated by task 342:
[   62.565978]  kasan_save_stack+0x3c/0x68
[   62.569797]  kasan_save_track+0x20/0x40
[   62.573616]  kasan_save_alloc_info+0x40/0x58
[   62.577870]  __kasan_kmalloc+0xd4/0xd8
[   62.581602]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.586116]  kasan_bitops_generic+0xa0/0x1c8
[   62.590369]  kunit_try_run_case+0x170/0x3f0
[   62.594537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.600005]  kthread+0x328/0x630
[   62.603217]  ret_from_fork+0x10/0x20
[   62.606775] 
[   62.608251] The buggy address belongs to the object at ffff000806093fe0
[   62.608251]  which belongs to the cache kmalloc-16 of size 16
[   62.620578] The buggy address is located 8 bytes inside of
[   62.620578]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   62.632817] 
[   62.634296] The buggy address belongs to the physical page:
[   62.639851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   62.647834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.654344] page_type: f5(slab)
[   62.657477] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.665202] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.672920] page dumped because: kasan: bad access detected
[   62.678476] 
[   62.679951] Memory state around the buggy address:
[   62.684730]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.691934]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.699139] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   62.706340]                                                           ^
[   62.712941]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.720145]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   62.727346] ==================================================================
[   61.659020] ==================================================================
[   61.666079] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   61.675020] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   61.682397] 
[   61.683878] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   61.683924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.683940] Hardware name: WinLink E850-96 board (DT)
[   61.683958] Call trace:
[   61.683968]  show_stack+0x20/0x38 (C)
[   61.683997]  dump_stack_lvl+0x8c/0xd0
[   61.684028]  print_report+0x118/0x5d0
[   61.684055]  kasan_report+0xdc/0x128
[   61.684082]  kasan_check_range+0x100/0x1a8
[   61.684110]  __kasan_check_write+0x20/0x30
[   61.684141]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   61.684180]  kasan_bitops_generic+0x11c/0x1c8
[   61.684213]  kunit_try_run_case+0x170/0x3f0
[   61.684243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.684277]  kthread+0x328/0x630
[   61.684302]  ret_from_fork+0x10/0x20
[   61.684332] 
[   61.757569] Allocated by task 342:
[   61.760956]  kasan_save_stack+0x3c/0x68
[   61.764774]  kasan_save_track+0x20/0x40
[   61.768594]  kasan_save_alloc_info+0x40/0x58
[   61.772847]  __kasan_kmalloc+0xd4/0xd8
[   61.776580]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.781093]  kasan_bitops_generic+0xa0/0x1c8
[   61.785347]  kunit_try_run_case+0x170/0x3f0
[   61.789514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.794982]  kthread+0x328/0x630
[   61.798194]  ret_from_fork+0x10/0x20
[   61.801753] 
[   61.803229] The buggy address belongs to the object at ffff000806093fe0
[   61.803229]  which belongs to the cache kmalloc-16 of size 16
[   61.815555] The buggy address is located 8 bytes inside of
[   61.815555]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   61.827794] 
[   61.829272] The buggy address belongs to the physical page:
[   61.834827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   61.842811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.849321] page_type: f5(slab)
[   61.852454] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.860179] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.867898] page dumped because: kasan: bad access detected
[   61.873453] 
[   61.874929] Memory state around the buggy address:
[   61.879707]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.886911]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.894117] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   61.901317]                                                           ^
[   61.907918]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.915123]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   61.922324] ==================================================================
[   61.121365] ==================================================================
[   61.128414] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   61.137267] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   61.144645] 
[   61.146126] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   61.146176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.146194] Hardware name: WinLink E850-96 board (DT)
[   61.146212] Call trace:
[   61.146223]  show_stack+0x20/0x38 (C)
[   61.146257]  dump_stack_lvl+0x8c/0xd0
[   61.146291]  print_report+0x118/0x5d0
[   61.146320]  kasan_report+0xdc/0x128
[   61.146348]  kasan_check_range+0x100/0x1a8
[   61.146377]  __kasan_check_write+0x20/0x30
[   61.146408]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   61.146446]  kasan_bitops_generic+0x11c/0x1c8
[   61.146479]  kunit_try_run_case+0x170/0x3f0
[   61.146509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.146542]  kthread+0x328/0x630
[   61.146568]  ret_from_fork+0x10/0x20
[   61.146599] 
[   61.219730] Allocated by task 342:
[   61.223116]  kasan_save_stack+0x3c/0x68
[   61.226935]  kasan_save_track+0x20/0x40
[   61.230755]  kasan_save_alloc_info+0x40/0x58
[   61.235008]  __kasan_kmalloc+0xd4/0xd8
[   61.238740]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.243254]  kasan_bitops_generic+0xa0/0x1c8
[   61.247508]  kunit_try_run_case+0x170/0x3f0
[   61.251674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.257143]  kthread+0x328/0x630
[   61.260355]  ret_from_fork+0x10/0x20
[   61.263914] 
[   61.265389] The buggy address belongs to the object at ffff000806093fe0
[   61.265389]  which belongs to the cache kmalloc-16 of size 16
[   61.277716] The buggy address is located 8 bytes inside of
[   61.277716]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   61.289955] 
[   61.291432] The buggy address belongs to the physical page:
[   61.296989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   61.304973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.311482] page_type: f5(slab)
[   61.314615] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.322340] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.330058] page dumped because: kasan: bad access detected
[   61.335614] 
[   61.337090] Memory state around the buggy address:
[   61.341868]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.349073]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.356277] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   61.363478]                                                           ^
[   61.370079]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.377284]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   61.384485] ==================================================================

[   26.373675] ==================================================================
[   26.373987] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.374367] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.374878] 
[   26.375030] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.375102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.375117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.375142] Call Trace:
[   26.375156]  <TASK>
[   26.375172]  dump_stack_lvl+0x73/0xb0
[   26.375204]  print_report+0xd1/0x610
[   26.375230]  ? __virt_addr_valid+0x1db/0x2d0
[   26.375258]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.375290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.375321]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.375380]  kasan_report+0x141/0x180
[   26.375407]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.375470]  kasan_check_range+0x10c/0x1c0
[   26.375509]  __kasan_check_write+0x18/0x20
[   26.375546]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   26.375580]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.375614]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.375644]  ? trace_hardirqs_on+0x37/0xe0
[   26.375670]  ? kasan_bitops_generic+0x92/0x1c0
[   26.375704]  kasan_bitops_generic+0x121/0x1c0
[   26.375732]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.375940]  ? __pfx_read_tsc+0x10/0x10
[   26.375967]  ? ktime_get_ts64+0x86/0x230
[   26.375998]  kunit_try_run_case+0x1a5/0x480
[   26.376027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.376053]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.376081]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.376109]  ? __kthread_parkme+0x82/0x180
[   26.376134]  ? preempt_count_sub+0x50/0x80
[   26.376163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.376192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.376224]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.376256]  kthread+0x337/0x6f0
[   26.376280]  ? trace_preempt_on+0x20/0xc0
[   26.376308]  ? __pfx_kthread+0x10/0x10
[   26.376333]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.376363]  ? calculate_sigpending+0x7b/0xa0
[   26.376392]  ? __pfx_kthread+0x10/0x10
[   26.376418]  ret_from_fork+0x116/0x1d0
[   26.376442]  ? __pfx_kthread+0x10/0x10
[   26.376467]  ret_from_fork_asm+0x1a/0x30
[   26.376507]  </TASK>
[   26.376521] 
[   26.386126] Allocated by task 309:
[   26.386293]  kasan_save_stack+0x45/0x70
[   26.386728]  kasan_save_track+0x18/0x40
[   26.386959]  kasan_save_alloc_info+0x3b/0x50
[   26.387199]  __kasan_kmalloc+0xb7/0xc0
[   26.387416]  __kmalloc_cache_noprof+0x189/0x420
[   26.387760]  kasan_bitops_generic+0x92/0x1c0
[   26.387925]  kunit_try_run_case+0x1a5/0x480
[   26.388076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.388289]  kthread+0x337/0x6f0
[   26.388511]  ret_from_fork+0x116/0x1d0
[   26.388721]  ret_from_fork_asm+0x1a/0x30
[   26.388926] 
[   26.389020] The buggy address belongs to the object at ffff888104884680
[   26.389020]  which belongs to the cache kmalloc-16 of size 16
[   26.390019] The buggy address is located 8 bytes inside of
[   26.390019]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.390562] 
[   26.390687] The buggy address belongs to the physical page:
[   26.390957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.391423] flags: 0x200000000000000(node=0|zone=2)
[   26.391725] page_type: f5(slab)
[   26.391995] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.392499] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.392959] page dumped because: kasan: bad access detected
[   26.393235] 
[   26.393314] Memory state around the buggy address:
[   26.393588]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.393831]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.394158] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.394439]                       ^
[   26.394853]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.395102]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.395471] ==================================================================
[   26.328048] ==================================================================
[   26.328460] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.328967] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.329639] 
[   26.329869] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.329942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.329957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.329983] Call Trace:
[   26.329999]  <TASK>
[   26.330015]  dump_stack_lvl+0x73/0xb0
[   26.330050]  print_report+0xd1/0x610
[   26.330078]  ? __virt_addr_valid+0x1db/0x2d0
[   26.330137]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.330170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.330214]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.330247]  kasan_report+0x141/0x180
[   26.330275]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.330315]  kasan_check_range+0x10c/0x1c0
[   26.330343]  __kasan_check_write+0x18/0x20
[   26.330372]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   26.330406]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.330440]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.330473]  ? trace_hardirqs_on+0x37/0xe0
[   26.330500]  ? kasan_bitops_generic+0x92/0x1c0
[   26.330543]  kasan_bitops_generic+0x121/0x1c0
[   26.330571]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.330620]  ? __pfx_read_tsc+0x10/0x10
[   26.330645]  ? ktime_get_ts64+0x86/0x230
[   26.330675]  kunit_try_run_case+0x1a5/0x480
[   26.330704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.330730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.330758]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.330786]  ? __kthread_parkme+0x82/0x180
[   26.330811]  ? preempt_count_sub+0x50/0x80
[   26.330841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.330869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.330901]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.330934]  kthread+0x337/0x6f0
[   26.330957]  ? trace_preempt_on+0x20/0xc0
[   26.330985]  ? __pfx_kthread+0x10/0x10
[   26.331011]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.331040]  ? calculate_sigpending+0x7b/0xa0
[   26.331070]  ? __pfx_kthread+0x10/0x10
[   26.331097]  ret_from_fork+0x116/0x1d0
[   26.331119]  ? __pfx_kthread+0x10/0x10
[   26.331145]  ret_from_fork_asm+0x1a/0x30
[   26.331185]  </TASK>
[   26.331198] 
[   26.341404] Allocated by task 309:
[   26.341563]  kasan_save_stack+0x45/0x70
[   26.342031]  kasan_save_track+0x18/0x40
[   26.342241]  kasan_save_alloc_info+0x3b/0x50
[   26.342413]  __kasan_kmalloc+0xb7/0xc0
[   26.342600]  __kmalloc_cache_noprof+0x189/0x420
[   26.342857]  kasan_bitops_generic+0x92/0x1c0
[   26.343115]  kunit_try_run_case+0x1a5/0x480
[   26.343392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.343775]  kthread+0x337/0x6f0
[   26.343902]  ret_from_fork+0x116/0x1d0
[   26.344040]  ret_from_fork_asm+0x1a/0x30
[   26.344275] 
[   26.344577] The buggy address belongs to the object at ffff888104884680
[   26.344577]  which belongs to the cache kmalloc-16 of size 16
[   26.345129] The buggy address is located 8 bytes inside of
[   26.345129]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.345694] 
[   26.345801] The buggy address belongs to the physical page:
[   26.346047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.346297] flags: 0x200000000000000(node=0|zone=2)
[   26.346549] page_type: f5(slab)
[   26.346873] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.347252] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.347788] page dumped because: kasan: bad access detected
[   26.348082] 
[   26.348156] Memory state around the buggy address:
[   26.348315]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.348809]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.349197] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.349634]                       ^
[   26.349832]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.350086]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.350457] ==================================================================
[   26.503797] ==================================================================
[   26.504148] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.504517] Read of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.504875] 
[   26.504992] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.505047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.505063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.505088] Call Trace:
[   26.505107]  <TASK>
[   26.505125]  dump_stack_lvl+0x73/0xb0
[   26.505155]  print_report+0xd1/0x610
[   26.505182]  ? __virt_addr_valid+0x1db/0x2d0
[   26.505209]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.505240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.505272]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.505305]  kasan_report+0x141/0x180
[   26.505332]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.505373]  __asan_report_load8_noabort+0x18/0x20
[   26.505402]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   26.505435]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.505470]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.505498]  ? trace_hardirqs_on+0x37/0xe0
[   26.506513]  ? kasan_bitops_generic+0x92/0x1c0
[   26.506654]  kasan_bitops_generic+0x121/0x1c0
[   26.506689]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.506721]  ? __pfx_read_tsc+0x10/0x10
[   26.506747]  ? ktime_get_ts64+0x86/0x230
[   26.506777]  kunit_try_run_case+0x1a5/0x480
[   26.506806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.506832]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.506860]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.506889]  ? __kthread_parkme+0x82/0x180
[   26.506914]  ? preempt_count_sub+0x50/0x80
[   26.506944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.506972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.507004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.507037]  kthread+0x337/0x6f0
[   26.507060]  ? trace_preempt_on+0x20/0xc0
[   26.507088]  ? __pfx_kthread+0x10/0x10
[   26.507113]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.507143]  ? calculate_sigpending+0x7b/0xa0
[   26.507172]  ? __pfx_kthread+0x10/0x10
[   26.507198]  ret_from_fork+0x116/0x1d0
[   26.507221]  ? __pfx_kthread+0x10/0x10
[   26.507247]  ret_from_fork_asm+0x1a/0x30
[   26.507287]  </TASK>
[   26.507302] 
[   26.518970] Allocated by task 309:
[   26.519237]  kasan_save_stack+0x45/0x70
[   26.519421]  kasan_save_track+0x18/0x40
[   26.519712]  kasan_save_alloc_info+0x3b/0x50
[   26.519919]  __kasan_kmalloc+0xb7/0xc0
[   26.520084]  __kmalloc_cache_noprof+0x189/0x420
[   26.520316]  kasan_bitops_generic+0x92/0x1c0
[   26.520493]  kunit_try_run_case+0x1a5/0x480
[   26.520781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.520998]  kthread+0x337/0x6f0
[   26.521163]  ret_from_fork+0x116/0x1d0
[   26.521358]  ret_from_fork_asm+0x1a/0x30
[   26.521512] 
[   26.521818] The buggy address belongs to the object at ffff888104884680
[   26.521818]  which belongs to the cache kmalloc-16 of size 16
[   26.522318] The buggy address is located 8 bytes inside of
[   26.522318]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.522900] 
[   26.523003] The buggy address belongs to the physical page:
[   26.523224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.523652] flags: 0x200000000000000(node=0|zone=2)
[   26.523882] page_type: f5(slab)
[   26.524008] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.524360] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.524737] page dumped because: kasan: bad access detected
[   26.524966] 
[   26.525057] Memory state around the buggy address:
[   26.525233]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.525523]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.526044] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.526352]                       ^
[   26.526518]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.526928]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.527200] ==================================================================
[   26.482413] ==================================================================
[   26.483067] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.483474] Read of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.483882] 
[   26.483985] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.484039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.484054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.484079] Call Trace:
[   26.484095]  <TASK>
[   26.484111]  dump_stack_lvl+0x73/0xb0
[   26.484144]  print_report+0xd1/0x610
[   26.484172]  ? __virt_addr_valid+0x1db/0x2d0
[   26.484200]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.484233]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.484265]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.484299]  kasan_report+0x141/0x180
[   26.484326]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.484366]  kasan_check_range+0x10c/0x1c0
[   26.484395]  __kasan_check_read+0x15/0x20
[   26.484422]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   26.484456]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.484492]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.484521]  ? trace_hardirqs_on+0x37/0xe0
[   26.484560]  ? kasan_bitops_generic+0x92/0x1c0
[   26.484642]  kasan_bitops_generic+0x121/0x1c0
[   26.484671]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.484702]  ? __pfx_read_tsc+0x10/0x10
[   26.484728]  ? ktime_get_ts64+0x86/0x230
[   26.484758]  kunit_try_run_case+0x1a5/0x480
[   26.484788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.484814]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.484843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.484873]  ? __kthread_parkme+0x82/0x180
[   26.484899]  ? preempt_count_sub+0x50/0x80
[   26.484929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.484958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.484990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.485023]  kthread+0x337/0x6f0
[   26.485045]  ? trace_preempt_on+0x20/0xc0
[   26.485073]  ? __pfx_kthread+0x10/0x10
[   26.485099]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.485129]  ? calculate_sigpending+0x7b/0xa0
[   26.485159]  ? __pfx_kthread+0x10/0x10
[   26.485185]  ret_from_fork+0x116/0x1d0
[   26.485209]  ? __pfx_kthread+0x10/0x10
[   26.485235]  ret_from_fork_asm+0x1a/0x30
[   26.485276]  </TASK>
[   26.485289] 
[   26.493713] Allocated by task 309:
[   26.493905]  kasan_save_stack+0x45/0x70
[   26.494105]  kasan_save_track+0x18/0x40
[   26.494302]  kasan_save_alloc_info+0x3b/0x50
[   26.494535]  __kasan_kmalloc+0xb7/0xc0
[   26.494904]  __kmalloc_cache_noprof+0x189/0x420
[   26.495412]  kasan_bitops_generic+0x92/0x1c0
[   26.495816]  kunit_try_run_case+0x1a5/0x480
[   26.496014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.496245]  kthread+0x337/0x6f0
[   26.496403]  ret_from_fork+0x116/0x1d0
[   26.496556]  ret_from_fork_asm+0x1a/0x30
[   26.497025] 
[   26.497121] The buggy address belongs to the object at ffff888104884680
[   26.497121]  which belongs to the cache kmalloc-16 of size 16
[   26.497612] The buggy address is located 8 bytes inside of
[   26.497612]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.498107] 
[   26.498187] The buggy address belongs to the physical page:
[   26.498420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.498816] flags: 0x200000000000000(node=0|zone=2)
[   26.499018] page_type: f5(slab)
[   26.499143] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.499384] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.499838] page dumped because: kasan: bad access detected
[   26.500096] 
[   26.500188] Memory state around the buggy address:
[   26.500357]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.500757]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.501097] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.501435]                       ^
[   26.501651]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.501982]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.502315] ==================================================================
[   26.419858] ==================================================================
[   26.421962] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.422276] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.422706] 
[   26.422806] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.422903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.422920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.422947] Call Trace:
[   26.423023]  <TASK>
[   26.423044]  dump_stack_lvl+0x73/0xb0
[   26.423079]  print_report+0xd1/0x610
[   26.423116]  ? __virt_addr_valid+0x1db/0x2d0
[   26.423145]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.423178]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.423221]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.423254]  kasan_report+0x141/0x180
[   26.423281]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.423321]  kasan_check_range+0x10c/0x1c0
[   26.423350]  __kasan_check_write+0x18/0x20
[   26.423378]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   26.423411]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.423446]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.423473]  ? trace_hardirqs_on+0x37/0xe0
[   26.423500]  ? kasan_bitops_generic+0x92/0x1c0
[   26.423552]  kasan_bitops_generic+0x121/0x1c0
[   26.423579]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.423620]  ? __pfx_read_tsc+0x10/0x10
[   26.423648]  ? ktime_get_ts64+0x86/0x230
[   26.423677]  kunit_try_run_case+0x1a5/0x480
[   26.423724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.423806]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.423836]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.423864]  ? __kthread_parkme+0x82/0x180
[   26.424422]  ? preempt_count_sub+0x50/0x80
[   26.424455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.424484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.424517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.424896]  kthread+0x337/0x6f0
[   26.424923]  ? trace_preempt_on+0x20/0xc0
[   26.424953]  ? __pfx_kthread+0x10/0x10
[   26.424979]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.425011]  ? calculate_sigpending+0x7b/0xa0
[   26.425040]  ? __pfx_kthread+0x10/0x10
[   26.425067]  ret_from_fork+0x116/0x1d0
[   26.425091]  ? __pfx_kthread+0x10/0x10
[   26.425116]  ret_from_fork_asm+0x1a/0x30
[   26.425156]  </TASK>
[   26.425171] 
[   26.433933] Allocated by task 309:
[   26.434116]  kasan_save_stack+0x45/0x70
[   26.434320]  kasan_save_track+0x18/0x40
[   26.434733]  kasan_save_alloc_info+0x3b/0x50
[   26.434917]  __kasan_kmalloc+0xb7/0xc0
[   26.435057]  __kmalloc_cache_noprof+0x189/0x420
[   26.435218]  kasan_bitops_generic+0x92/0x1c0
[   26.435420]  kunit_try_run_case+0x1a5/0x480
[   26.435777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.436054]  kthread+0x337/0x6f0
[   26.436225]  ret_from_fork+0x116/0x1d0
[   26.436376]  ret_from_fork_asm+0x1a/0x30
[   26.436565] 
[   26.436706] The buggy address belongs to the object at ffff888104884680
[   26.436706]  which belongs to the cache kmalloc-16 of size 16
[   26.437177] The buggy address is located 8 bytes inside of
[   26.437177]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.437777] 
[   26.437869] The buggy address belongs to the physical page:
[   26.438061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.438312] flags: 0x200000000000000(node=0|zone=2)
[   26.438554] page_type: f5(slab)
[   26.438726] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.439255] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.439614] page dumped because: kasan: bad access detected
[   26.439825] 
[   26.439895] Memory state around the buggy address:
[   26.440054]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.440334]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.440619] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.440892]                       ^
[   26.441048]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.441320]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.442477] ==================================================================
[   26.443330] ==================================================================
[   26.443726] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.444111] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.444398] 
[   26.444500] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.444567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.444582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.444607] Call Trace:
[   26.444622]  <TASK>
[   26.444638]  dump_stack_lvl+0x73/0xb0
[   26.444670]  print_report+0xd1/0x610
[   26.444696]  ? __virt_addr_valid+0x1db/0x2d0
[   26.444724]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.444756]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.444788]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.444823]  kasan_report+0x141/0x180
[   26.444849]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.444956]  kasan_check_range+0x10c/0x1c0
[   26.444987]  __kasan_check_write+0x18/0x20
[   26.445016]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   26.445051]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.445086]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.445115]  ? trace_hardirqs_on+0x37/0xe0
[   26.445140]  ? kasan_bitops_generic+0x92/0x1c0
[   26.445175]  kasan_bitops_generic+0x121/0x1c0
[   26.445202]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.445234]  ? __pfx_read_tsc+0x10/0x10
[   26.445258]  ? ktime_get_ts64+0x86/0x230
[   26.445288]  kunit_try_run_case+0x1a5/0x480
[   26.445316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.445342]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.445369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.445397]  ? __kthread_parkme+0x82/0x180
[   26.445422]  ? preempt_count_sub+0x50/0x80
[   26.445452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.445481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.445513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.445559]  kthread+0x337/0x6f0
[   26.445583]  ? trace_preempt_on+0x20/0xc0
[   26.445762]  ? __pfx_kthread+0x10/0x10
[   26.445789]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.445818]  ? calculate_sigpending+0x7b/0xa0
[   26.445848]  ? __pfx_kthread+0x10/0x10
[   26.445876]  ret_from_fork+0x116/0x1d0
[   26.445899]  ? __pfx_kthread+0x10/0x10
[   26.445925]  ret_from_fork_asm+0x1a/0x30
[   26.445966]  </TASK>
[   26.445979] 
[   26.454319] Allocated by task 309:
[   26.454458]  kasan_save_stack+0x45/0x70
[   26.454885]  kasan_save_track+0x18/0x40
[   26.455072]  kasan_save_alloc_info+0x3b/0x50
[   26.455262]  __kasan_kmalloc+0xb7/0xc0
[   26.455448]  __kmalloc_cache_noprof+0x189/0x420
[   26.455750]  kasan_bitops_generic+0x92/0x1c0
[   26.455973]  kunit_try_run_case+0x1a5/0x480
[   26.456175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.456412]  kthread+0x337/0x6f0
[   26.456548]  ret_from_fork+0x116/0x1d0
[   26.456686]  ret_from_fork_asm+0x1a/0x30
[   26.456828] 
[   26.456901] The buggy address belongs to the object at ffff888104884680
[   26.456901]  which belongs to the cache kmalloc-16 of size 16
[   26.457480] The buggy address is located 8 bytes inside of
[   26.457480]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.457888] 
[   26.457958] The buggy address belongs to the physical page:
[   26.458136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.458398] flags: 0x200000000000000(node=0|zone=2)
[   26.458731] page_type: f5(slab)
[   26.458904] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.459257] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.459609] page dumped because: kasan: bad access detected
[   26.459869] 
[   26.460019] Memory state around the buggy address:
[   26.460253]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.460697]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.460970] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.461290]                       ^
[   26.461456]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.461957]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.462185] ==================================================================
[   26.396076] ==================================================================
[   26.396426] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.396943] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.397265] 
[   26.397434] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.397490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.397506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.397542] Call Trace:
[   26.397557]  <TASK>
[   26.397574]  dump_stack_lvl+0x73/0xb0
[   26.397621]  print_report+0xd1/0x610
[   26.397647]  ? __virt_addr_valid+0x1db/0x2d0
[   26.397675]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.397803]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.397837]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.397872]  kasan_report+0x141/0x180
[   26.397899]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.397971]  kasan_check_range+0x10c/0x1c0
[   26.398001]  __kasan_check_write+0x18/0x20
[   26.398039]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   26.398074]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.398108]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.398137]  ? trace_hardirqs_on+0x37/0xe0
[   26.398163]  ? kasan_bitops_generic+0x92/0x1c0
[   26.398226]  kasan_bitops_generic+0x121/0x1c0
[   26.398256]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.398308]  ? __pfx_read_tsc+0x10/0x10
[   26.398334]  ? ktime_get_ts64+0x86/0x230
[   26.398363]  kunit_try_run_case+0x1a5/0x480
[   26.398392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.398418]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.398446]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.398477]  ? __kthread_parkme+0x82/0x180
[   26.398502]  ? preempt_count_sub+0x50/0x80
[   26.398541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.398569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.398737]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.398771]  kthread+0x337/0x6f0
[   26.398795]  ? trace_preempt_on+0x20/0xc0
[   26.398824]  ? __pfx_kthread+0x10/0x10
[   26.398849]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.398878]  ? calculate_sigpending+0x7b/0xa0
[   26.398908]  ? __pfx_kthread+0x10/0x10
[   26.398935]  ret_from_fork+0x116/0x1d0
[   26.398959]  ? __pfx_kthread+0x10/0x10
[   26.398984]  ret_from_fork_asm+0x1a/0x30
[   26.399024]  </TASK>
[   26.399038] 
[   26.408652] Allocated by task 309:
[   26.408956]  kasan_save_stack+0x45/0x70
[   26.409275]  kasan_save_track+0x18/0x40
[   26.409456]  kasan_save_alloc_info+0x3b/0x50
[   26.409794]  __kasan_kmalloc+0xb7/0xc0
[   26.410057]  __kmalloc_cache_noprof+0x189/0x420
[   26.410222]  kasan_bitops_generic+0x92/0x1c0
[   26.410378]  kunit_try_run_case+0x1a5/0x480
[   26.410673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.410999]  kthread+0x337/0x6f0
[   26.411177]  ret_from_fork+0x116/0x1d0
[   26.411345]  ret_from_fork_asm+0x1a/0x30
[   26.411628] 
[   26.411725] The buggy address belongs to the object at ffff888104884680
[   26.411725]  which belongs to the cache kmalloc-16 of size 16
[   26.412487] The buggy address is located 8 bytes inside of
[   26.412487]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.413019] 
[   26.413093] The buggy address belongs to the physical page:
[   26.413477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.414115] flags: 0x200000000000000(node=0|zone=2)
[   26.414303] page_type: f5(slab)
[   26.414429] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.416401] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.416919] page dumped because: kasan: bad access detected
[   26.417198] 
[   26.417299] Memory state around the buggy address:
[   26.417493]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.417743]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.417966] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.418322]                       ^
[   26.418490]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.418816]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.419063] ==================================================================
[   26.351099] ==================================================================
[   26.351455] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.352061] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.352409] 
[   26.352522] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.352591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.352606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.352630] Call Trace:
[   26.352649]  <TASK>
[   26.352771]  dump_stack_lvl+0x73/0xb0
[   26.352837]  print_report+0xd1/0x610
[   26.352865]  ? __virt_addr_valid+0x1db/0x2d0
[   26.352902]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.352935]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.352966]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.352999]  kasan_report+0x141/0x180
[   26.353027]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.353068]  kasan_check_range+0x10c/0x1c0
[   26.353097]  __kasan_check_write+0x18/0x20
[   26.353125]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   26.353159]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.353225]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.353277]  ? trace_hardirqs_on+0x37/0xe0
[   26.353304]  ? kasan_bitops_generic+0x92/0x1c0
[   26.353339]  kasan_bitops_generic+0x121/0x1c0
[   26.353367]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.353398]  ? __pfx_read_tsc+0x10/0x10
[   26.353423]  ? ktime_get_ts64+0x86/0x230
[   26.353454]  kunit_try_run_case+0x1a5/0x480
[   26.353482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.353508]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.353544]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.353572]  ? __kthread_parkme+0x82/0x180
[   26.353638]  ? preempt_count_sub+0x50/0x80
[   26.353669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.353698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.353730]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.353763]  kthread+0x337/0x6f0
[   26.353785]  ? trace_preempt_on+0x20/0xc0
[   26.353814]  ? __pfx_kthread+0x10/0x10
[   26.353840]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.353869]  ? calculate_sigpending+0x7b/0xa0
[   26.353898]  ? __pfx_kthread+0x10/0x10
[   26.353925]  ret_from_fork+0x116/0x1d0
[   26.353948]  ? __pfx_kthread+0x10/0x10
[   26.353973]  ret_from_fork_asm+0x1a/0x30
[   26.354014]  </TASK>
[   26.354027] 
[   26.364086] Allocated by task 309:
[   26.364222]  kasan_save_stack+0x45/0x70
[   26.364427]  kasan_save_track+0x18/0x40
[   26.364864]  kasan_save_alloc_info+0x3b/0x50
[   26.365085]  __kasan_kmalloc+0xb7/0xc0
[   26.365346]  __kmalloc_cache_noprof+0x189/0x420
[   26.365513]  kasan_bitops_generic+0x92/0x1c0
[   26.365678]  kunit_try_run_case+0x1a5/0x480
[   26.365889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.366272]  kthread+0x337/0x6f0
[   26.366610]  ret_from_fork+0x116/0x1d0
[   26.366809]  ret_from_fork_asm+0x1a/0x30
[   26.367008] 
[   26.367205] The buggy address belongs to the object at ffff888104884680
[   26.367205]  which belongs to the cache kmalloc-16 of size 16
[   26.367772] The buggy address is located 8 bytes inside of
[   26.367772]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.368278] 
[   26.368425] The buggy address belongs to the physical page:
[   26.368623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.369182] flags: 0x200000000000000(node=0|zone=2)
[   26.369375] page_type: f5(slab)
[   26.369558] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.370106] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.370451] page dumped because: kasan: bad access detected
[   26.370865] 
[   26.370959] Memory state around the buggy address:
[   26.371158]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.371459]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.371864] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.372182]                       ^
[   26.372352]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.372883]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.373245] ==================================================================
[   26.462711] ==================================================================
[   26.463033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.463314] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309
[   26.463735] 
[   26.463852] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.463908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.463923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.463949] Call Trace:
[   26.463964]  <TASK>
[   26.463980]  dump_stack_lvl+0x73/0xb0
[   26.464010]  print_report+0xd1/0x610
[   26.464037]  ? __virt_addr_valid+0x1db/0x2d0
[   26.464064]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.464097]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.464128]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.464162]  kasan_report+0x141/0x180
[   26.464189]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.464229]  kasan_check_range+0x10c/0x1c0
[   26.464257]  __kasan_check_write+0x18/0x20
[   26.464285]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   26.464320]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.464353]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.464382]  ? trace_hardirqs_on+0x37/0xe0
[   26.464408]  ? kasan_bitops_generic+0x92/0x1c0
[   26.464442]  kasan_bitops_generic+0x121/0x1c0
[   26.464470]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.464502]  ? __pfx_read_tsc+0x10/0x10
[   26.464539]  ? ktime_get_ts64+0x86/0x230
[   26.464570]  kunit_try_run_case+0x1a5/0x480
[   26.464774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.464802]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.464830]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.464859]  ? __kthread_parkme+0x82/0x180
[   26.464884]  ? preempt_count_sub+0x50/0x80
[   26.464914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.464942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.464975]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.465008]  kthread+0x337/0x6f0
[   26.465031]  ? trace_preempt_on+0x20/0xc0
[   26.465059]  ? __pfx_kthread+0x10/0x10
[   26.465085]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.465114]  ? calculate_sigpending+0x7b/0xa0
[   26.465143]  ? __pfx_kthread+0x10/0x10
[   26.465170]  ret_from_fork+0x116/0x1d0
[   26.465192]  ? __pfx_kthread+0x10/0x10
[   26.465218]  ret_from_fork_asm+0x1a/0x30
[   26.465258]  </TASK>
[   26.465271] 
[   26.473839] Allocated by task 309:
[   26.474023]  kasan_save_stack+0x45/0x70
[   26.474229]  kasan_save_track+0x18/0x40
[   26.474424]  kasan_save_alloc_info+0x3b/0x50
[   26.474750]  __kasan_kmalloc+0xb7/0xc0
[   26.474905]  __kmalloc_cache_noprof+0x189/0x420
[   26.475131]  kasan_bitops_generic+0x92/0x1c0
[   26.475286]  kunit_try_run_case+0x1a5/0x480
[   26.475497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.475867]  kthread+0x337/0x6f0
[   26.476013]  ret_from_fork+0x116/0x1d0
[   26.476190]  ret_from_fork_asm+0x1a/0x30
[   26.476375] 
[   26.476466] The buggy address belongs to the object at ffff888104884680
[   26.476466]  which belongs to the cache kmalloc-16 of size 16
[   26.477008] The buggy address is located 8 bytes inside of
[   26.477008]  allocated 9-byte region [ffff888104884680, ffff888104884689)
[   26.477509] 
[   26.477887] The buggy address belongs to the physical page:
[   26.478124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884
[   26.478399] flags: 0x200000000000000(node=0|zone=2)
[   26.478742] page_type: f5(slab)
[   26.479027] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   26.479269] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.479502] page dumped because: kasan: bad access detected
[   26.479704] 
[   26.479798] Memory state around the buggy address:
[   26.480073]  ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.480405]  ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.480738] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.481145]                       ^
[   26.481323]  ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.481604]  ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.482066] ==================================================================