Hay
Date
July 17, 2025, 10:12 a.m.

Environment
qemu-x86_64

[   27.688276] ==================================================================
[   27.688627] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.689571] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310
[   27.689904] 
[   27.689993] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   27.690040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.690052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.690072] Call Trace:
[   27.690100]  <TASK>
[   27.690114]  dump_stack_lvl+0x73/0xb0
[   27.690143]  print_report+0xd1/0x610
[   27.690165]  ? __virt_addr_valid+0x1db/0x2d0
[   27.690187]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.690211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.690236]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.690267]  kasan_report+0x141/0x180
[   27.690289]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.690318]  kasan_check_range+0x10c/0x1c0
[   27.690341]  __kasan_check_write+0x18/0x20
[   27.690363]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.690387]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.690412]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.690435]  ? trace_hardirqs_on+0x37/0xe0
[   27.690457]  ? kasan_bitops_generic+0x92/0x1c0
[   27.690484]  kasan_bitops_generic+0x116/0x1c0
[   27.690506]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.690530]  ? __pfx_read_tsc+0x10/0x10
[   27.690550]  ? ktime_get_ts64+0x86/0x230
[   27.690573]  kunit_try_run_case+0x1a5/0x480
[   27.690595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.690617]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.690641]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.690664]  ? __kthread_parkme+0x82/0x180
[   27.690688]  ? preempt_count_sub+0x50/0x80
[   27.690711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.690734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.690756]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.690779]  kthread+0x337/0x6f0
[   27.690797]  ? trace_preempt_on+0x20/0xc0
[   27.690819]  ? __pfx_kthread+0x10/0x10
[   27.690839]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.690860]  ? calculate_sigpending+0x7b/0xa0
[   27.690882]  ? __pfx_kthread+0x10/0x10
[   27.690903]  ret_from_fork+0x116/0x1d0
[   27.690921]  ? __pfx_kthread+0x10/0x10
[   27.690941]  ret_from_fork_asm+0x1a/0x30
[   27.690972]  </TASK>
[   27.690983] 
[   27.705042] Allocated by task 310:
[   27.705194]  kasan_save_stack+0x45/0x70
[   27.705517]  kasan_save_track+0x18/0x40
[   27.705987]  kasan_save_alloc_info+0x3b/0x50
[   27.706422]  __kasan_kmalloc+0xb7/0xc0
[   27.706684]  __kmalloc_cache_noprof+0x189/0x420
[   27.707044]  kasan_bitops_generic+0x92/0x1c0
[   27.707198]  kunit_try_run_case+0x1a5/0x480
[   27.707376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.707915]  kthread+0x337/0x6f0
[   27.708248]  ret_from_fork+0x116/0x1d0
[   27.708640]  ret_from_fork_asm+0x1a/0x30
[   27.709026] 
[   27.709228] The buggy address belongs to the object at ffff8881048d1b00
[   27.709228]  which belongs to the cache kmalloc-16 of size 16
[   27.709833] The buggy address is located 8 bytes inside of
[   27.709833]  allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09)
[   27.710196] 
[   27.710261] The buggy address belongs to the physical page:
[   27.710812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1
[   27.711536] flags: 0x200000000000000(node=0|zone=2)
[   27.712113] page_type: f5(slab)
[   27.712444] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.713112] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.714022] page dumped because: kasan: bad access detected
[   27.714430] 
[   27.714495] Memory state around the buggy address:
[   27.714644]  ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.714852]  ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.715060] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.715392]                       ^
[   27.715549]  ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.715918]  ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.716220] ==================================================================
[   27.768807] ==================================================================
[   27.769304] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.769679] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310
[   27.770256] 
[   27.770387] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   27.770519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.770531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.770552] Call Trace:
[   27.770567]  <TASK>
[   27.770581]  dump_stack_lvl+0x73/0xb0
[   27.770610]  print_report+0xd1/0x610
[   27.770632]  ? __virt_addr_valid+0x1db/0x2d0
[   27.770654]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.770678]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.770703]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.770727]  kasan_report+0x141/0x180
[   27.770749]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.770778]  kasan_check_range+0x10c/0x1c0
[   27.770800]  __kasan_check_write+0x18/0x20
[   27.770822]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.770847]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.770872]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.770895]  ? trace_hardirqs_on+0x37/0xe0
[   27.770917]  ? kasan_bitops_generic+0x92/0x1c0
[   27.770943]  kasan_bitops_generic+0x116/0x1c0
[   27.770966]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.770990]  ? __pfx_read_tsc+0x10/0x10
[   27.771009]  ? ktime_get_ts64+0x86/0x230
[   27.771033]  kunit_try_run_case+0x1a5/0x480
[   27.771056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.771090]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.771112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.771135]  ? __kthread_parkme+0x82/0x180
[   27.771158]  ? preempt_count_sub+0x50/0x80
[   27.771181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.771205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.771227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.771250]  kthread+0x337/0x6f0
[   27.771268]  ? trace_preempt_on+0x20/0xc0
[   27.771308]  ? __pfx_kthread+0x10/0x10
[   27.771327]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.771348]  ? calculate_sigpending+0x7b/0xa0
[   27.771370]  ? __pfx_kthread+0x10/0x10
[   27.771391]  ret_from_fork+0x116/0x1d0
[   27.771409]  ? __pfx_kthread+0x10/0x10
[   27.771428]  ret_from_fork_asm+0x1a/0x30
[   27.771461]  </TASK>
[   27.771472] 
[   27.781893] Allocated by task 310:
[   27.782066]  kasan_save_stack+0x45/0x70
[   27.782269]  kasan_save_track+0x18/0x40
[   27.782733]  kasan_save_alloc_info+0x3b/0x50
[   27.783064]  __kasan_kmalloc+0xb7/0xc0
[   27.783522]  __kmalloc_cache_noprof+0x189/0x420
[   27.783802]  kasan_bitops_generic+0x92/0x1c0
[   27.784123]  kunit_try_run_case+0x1a5/0x480
[   27.784541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.784836]  kthread+0x337/0x6f0
[   27.785125]  ret_from_fork+0x116/0x1d0
[   27.785460]  ret_from_fork_asm+0x1a/0x30
[   27.785650] 
[   27.785734] The buggy address belongs to the object at ffff8881048d1b00
[   27.785734]  which belongs to the cache kmalloc-16 of size 16
[   27.786224] The buggy address is located 8 bytes inside of
[   27.786224]  allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09)
[   27.787400] 
[   27.787486] The buggy address belongs to the physical page:
[   27.788034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1
[   27.788603] flags: 0x200000000000000(node=0|zone=2)
[   27.789010] page_type: f5(slab)
[   27.789190] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.790008] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.790500] page dumped because: kasan: bad access detected
[   27.790925] 
[   27.791016] Memory state around the buggy address:
[   27.791381]  ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.791673]  ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.791960] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.792493]                       ^
[   27.792632]  ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.792923]  ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.793221] ==================================================================
[   27.663947] ==================================================================
[   27.664572] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.664901] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310
[   27.665201] 
[   27.665293] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   27.665342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.665355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.665376] Call Trace:
[   27.665389]  <TASK>
[   27.665403]  dump_stack_lvl+0x73/0xb0
[   27.665432]  print_report+0xd1/0x610
[   27.665454]  ? __virt_addr_valid+0x1db/0x2d0
[   27.665476]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.665500]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.665525]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.665550]  kasan_report+0x141/0x180
[   27.665571]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.665600]  kasan_check_range+0x10c/0x1c0
[   27.665623]  __kasan_check_write+0x18/0x20
[   27.665645]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.665670]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.665696]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.665719]  ? trace_hardirqs_on+0x37/0xe0
[   27.665742]  ? kasan_bitops_generic+0x92/0x1c0
[   27.665770]  kasan_bitops_generic+0x116/0x1c0
[   27.665793]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.665818]  ? __pfx_read_tsc+0x10/0x10
[   27.665838]  ? ktime_get_ts64+0x86/0x230
[   27.665861]  kunit_try_run_case+0x1a5/0x480
[   27.665884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.665906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.665937]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.665960]  ? __kthread_parkme+0x82/0x180
[   27.665983]  ? preempt_count_sub+0x50/0x80
[   27.666006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.666029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.666052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.666074]  kthread+0x337/0x6f0
[   27.666165]  ? trace_preempt_on+0x20/0xc0
[   27.666189]  ? __pfx_kthread+0x10/0x10
[   27.666210]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.666231]  ? calculate_sigpending+0x7b/0xa0
[   27.666294]  ? __pfx_kthread+0x10/0x10
[   27.666315]  ret_from_fork+0x116/0x1d0
[   27.666334]  ? __pfx_kthread+0x10/0x10
[   27.666354]  ret_from_fork_asm+0x1a/0x30
[   27.666386]  </TASK>
[   27.666396] 
[   27.675045] Allocated by task 310:
[   27.675760]  kasan_save_stack+0x45/0x70
[   27.675944]  kasan_save_track+0x18/0x40
[   27.676122]  kasan_save_alloc_info+0x3b/0x50
[   27.676669]  __kasan_kmalloc+0xb7/0xc0
[   27.676852]  __kmalloc_cache_noprof+0x189/0x420
[   27.677001]  kasan_bitops_generic+0x92/0x1c0
[   27.677539]  kunit_try_run_case+0x1a5/0x480
[   27.677844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.678180]  kthread+0x337/0x6f0
[   27.678551]  ret_from_fork+0x116/0x1d0
[   27.678725]  ret_from_fork_asm+0x1a/0x30
[   27.678903] 
[   27.678976] The buggy address belongs to the object at ffff8881048d1b00
[   27.678976]  which belongs to the cache kmalloc-16 of size 16
[   27.679889] The buggy address is located 8 bytes inside of
[   27.679889]  allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09)
[   27.680627] 
[   27.680733] The buggy address belongs to the physical page:
[   27.681201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1
[   27.681790] flags: 0x200000000000000(node=0|zone=2)
[   27.682111] page_type: f5(slab)
[   27.682281] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.682907] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.683390] page dumped because: kasan: bad access detected
[   27.683717] 
[   27.683813] Memory state around the buggy address:
[   27.684209]  ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.684648]  ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.685061] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.685470]                       ^
[   27.685650]  ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.685932]  ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.686244] ==================================================================
[   27.718646] ==================================================================
[   27.719497] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.719926] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310
[   27.720263] 
[   27.720714] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   27.720769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.720781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.720801] Call Trace:
[   27.720815]  <TASK>
[   27.720831]  dump_stack_lvl+0x73/0xb0
[   27.720862]  print_report+0xd1/0x610
[   27.720884]  ? __virt_addr_valid+0x1db/0x2d0
[   27.720908]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.720932]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.720958]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.720982]  kasan_report+0x141/0x180
[   27.721003]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.721033]  kasan_check_range+0x10c/0x1c0
[   27.721057]  __kasan_check_write+0x18/0x20
[   27.721092]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.721118]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.721143]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.721166]  ? trace_hardirqs_on+0x37/0xe0
[   27.721189]  ? kasan_bitops_generic+0x92/0x1c0
[   27.721216]  kasan_bitops_generic+0x116/0x1c0
[   27.721238]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.721262]  ? __pfx_read_tsc+0x10/0x10
[   27.721360]  ? ktime_get_ts64+0x86/0x230
[   27.721387]  kunit_try_run_case+0x1a5/0x480
[   27.721412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.721433]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.721457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.721479]  ? __kthread_parkme+0x82/0x180
[   27.721502]  ? preempt_count_sub+0x50/0x80
[   27.721525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.721548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.721571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.721594]  kthread+0x337/0x6f0
[   27.721612]  ? trace_preempt_on+0x20/0xc0
[   27.721634]  ? __pfx_kthread+0x10/0x10
[   27.721654]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.721675]  ? calculate_sigpending+0x7b/0xa0
[   27.721698]  ? __pfx_kthread+0x10/0x10
[   27.721719]  ret_from_fork+0x116/0x1d0
[   27.721737]  ? __pfx_kthread+0x10/0x10
[   27.721757]  ret_from_fork_asm+0x1a/0x30
[   27.721788]  </TASK>
[   27.721798] 
[   27.732590] Allocated by task 310:
[   27.732782]  kasan_save_stack+0x45/0x70
[   27.733095]  kasan_save_track+0x18/0x40
[   27.733335]  kasan_save_alloc_info+0x3b/0x50
[   27.733656]  __kasan_kmalloc+0xb7/0xc0
[   27.733855]  __kmalloc_cache_noprof+0x189/0x420
[   27.734175]  kasan_bitops_generic+0x92/0x1c0
[   27.734468]  kunit_try_run_case+0x1a5/0x480
[   27.734784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.735038]  kthread+0x337/0x6f0
[   27.735205]  ret_from_fork+0x116/0x1d0
[   27.735562]  ret_from_fork_asm+0x1a/0x30
[   27.735915] 
[   27.736006] The buggy address belongs to the object at ffff8881048d1b00
[   27.736006]  which belongs to the cache kmalloc-16 of size 16
[   27.736623] The buggy address is located 8 bytes inside of
[   27.736623]  allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09)
[   27.737271] 
[   27.737456] The buggy address belongs to the physical page:
[   27.737781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1
[   27.738199] flags: 0x200000000000000(node=0|zone=2)
[   27.738564] page_type: f5(slab)
[   27.738712] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.739182] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.739576] page dumped because: kasan: bad access detected
[   27.739792] 
[   27.739881] Memory state around the buggy address:
[   27.740101]  ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.740659]  ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.740942] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.741357]                       ^
[   27.741529]  ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.741970]  ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.742309] ==================================================================
[   27.743290] ==================================================================
[   27.743967] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.744436] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310
[   27.744956] 
[   27.745057] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   27.745137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.745148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.745184] Call Trace:
[   27.745197]  <TASK>
[   27.745211]  dump_stack_lvl+0x73/0xb0
[   27.745241]  print_report+0xd1/0x610
[   27.745262]  ? __virt_addr_valid+0x1db/0x2d0
[   27.745416]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.745444]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.745470]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.745495]  kasan_report+0x141/0x180
[   27.745517]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.745547]  kasan_check_range+0x10c/0x1c0
[   27.745571]  __kasan_check_write+0x18/0x20
[   27.745597]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.745622]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.745648]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.745672]  ? trace_hardirqs_on+0x37/0xe0
[   27.745693]  ? kasan_bitops_generic+0x92/0x1c0
[   27.745720]  kasan_bitops_generic+0x116/0x1c0
[   27.745742]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.745767]  ? __pfx_read_tsc+0x10/0x10
[   27.745787]  ? ktime_get_ts64+0x86/0x230
[   27.745810]  kunit_try_run_case+0x1a5/0x480
[   27.745834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.745856]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.745879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.745902]  ? __kthread_parkme+0x82/0x180
[   27.745933]  ? preempt_count_sub+0x50/0x80
[   27.745956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.745979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.746001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.746024]  kthread+0x337/0x6f0
[   27.746042]  ? trace_preempt_on+0x20/0xc0
[   27.746063]  ? __pfx_kthread+0x10/0x10
[   27.746093]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.746114]  ? calculate_sigpending+0x7b/0xa0
[   27.746137]  ? __pfx_kthread+0x10/0x10
[   27.746157]  ret_from_fork+0x116/0x1d0
[   27.746176]  ? __pfx_kthread+0x10/0x10
[   27.746198]  ret_from_fork_asm+0x1a/0x30
[   27.746229]  </TASK>
[   27.746240] 
[   27.757040] Allocated by task 310:
[   27.757397]  kasan_save_stack+0x45/0x70
[   27.757608]  kasan_save_track+0x18/0x40
[   27.757928]  kasan_save_alloc_info+0x3b/0x50
[   27.758293]  __kasan_kmalloc+0xb7/0xc0
[   27.758603]  __kmalloc_cache_noprof+0x189/0x420
[   27.758830]  kasan_bitops_generic+0x92/0x1c0
[   27.759166]  kunit_try_run_case+0x1a5/0x480
[   27.759415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.759745]  kthread+0x337/0x6f0
[   27.759917]  ret_from_fork+0x116/0x1d0
[   27.760095]  ret_from_fork_asm+0x1a/0x30
[   27.760282] 
[   27.760379] The buggy address belongs to the object at ffff8881048d1b00
[   27.760379]  which belongs to the cache kmalloc-16 of size 16
[   27.760872] The buggy address is located 8 bytes inside of
[   27.760872]  allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09)
[   27.761867] 
[   27.761960] The buggy address belongs to the physical page:
[   27.762347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1
[   27.762903] flags: 0x200000000000000(node=0|zone=2)
[   27.763220] page_type: f5(slab)
[   27.763467] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.763908] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.764324] page dumped because: kasan: bad access detected
[   27.764621] 
[   27.764706] Memory state around the buggy address:
[   27.765138]  ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.765617]  ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.766031] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.766359]                       ^
[   27.766710]  ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.767144]  ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.767529] ==================================================================
[   27.795277] ==================================================================
[   27.795675] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.796335] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310
[   27.796759] 
[   27.796965] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   27.797018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.797138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.797161] Call Trace:
[   27.797173]  <TASK>
[   27.797189]  dump_stack_lvl+0x73/0xb0
[   27.797219]  print_report+0xd1/0x610
[   27.797242]  ? __virt_addr_valid+0x1db/0x2d0
[   27.797264]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.797321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.797346]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.797371]  kasan_report+0x141/0x180
[   27.797391]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.797421]  kasan_check_range+0x10c/0x1c0
[   27.797444]  __kasan_check_write+0x18/0x20
[   27.797465]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.797491]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.797515]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.797538]  ? trace_hardirqs_on+0x37/0xe0
[   27.797561]  ? kasan_bitops_generic+0x92/0x1c0
[   27.797587]  kasan_bitops_generic+0x116/0x1c0
[   27.797610]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.797634]  ? __pfx_read_tsc+0x10/0x10
[   27.797655]  ? ktime_get_ts64+0x86/0x230
[   27.797679]  kunit_try_run_case+0x1a5/0x480
[   27.797702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.797723]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.797746]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.797769]  ? __kthread_parkme+0x82/0x180
[   27.797792]  ? preempt_count_sub+0x50/0x80
[   27.797814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.797837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.797859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.797882]  kthread+0x337/0x6f0
[   27.797900]  ? trace_preempt_on+0x20/0xc0
[   27.797929]  ? __pfx_kthread+0x10/0x10
[   27.797949]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.797970]  ? calculate_sigpending+0x7b/0xa0
[   27.797992]  ? __pfx_kthread+0x10/0x10
[   27.798013]  ret_from_fork+0x116/0x1d0
[   27.798031]  ? __pfx_kthread+0x10/0x10
[   27.798051]  ret_from_fork_asm+0x1a/0x30
[   27.798091]  </TASK>
[   27.798102] 
[   27.809867] Allocated by task 310:
[   27.810159]  kasan_save_stack+0x45/0x70
[   27.810464]  kasan_save_track+0x18/0x40
[   27.810664]  kasan_save_alloc_info+0x3b/0x50
[   27.810852]  __kasan_kmalloc+0xb7/0xc0
[   27.811019]  __kmalloc_cache_noprof+0x189/0x420
[   27.811227]  kasan_bitops_generic+0x92/0x1c0
[   27.811650]  kunit_try_run_case+0x1a5/0x480
[   27.812019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.812415]  kthread+0x337/0x6f0
[   27.812697]  ret_from_fork+0x116/0x1d0
[   27.812996]  ret_from_fork_asm+0x1a/0x30
[   27.813199] 
[   27.813464] The buggy address belongs to the object at ffff8881048d1b00
[   27.813464]  which belongs to the cache kmalloc-16 of size 16
[   27.813936] The buggy address is located 8 bytes inside of
[   27.813936]  allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09)
[   27.814844] 
[   27.814948] The buggy address belongs to the physical page:
[   27.815390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1
[   27.815893] flags: 0x200000000000000(node=0|zone=2)
[   27.816292] page_type: f5(slab)
[   27.816584] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.817200] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.817710] page dumped because: kasan: bad access detected
[   27.817940] 
[   27.818022] Memory state around the buggy address:
[   27.818232]  ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.818821]  ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.819434] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.819907]                       ^
[   27.820202]  ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.820650]  ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.820931] ==================================================================
[   27.821503] ==================================================================
[   27.821749] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.822274] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310
[   27.822576] 
[   27.822654] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   27.822779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.822791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.822810] Call Trace:
[   27.822823]  <TASK>
[   27.822838]  dump_stack_lvl+0x73/0xb0
[   27.822868]  print_report+0xd1/0x610
[   27.822889]  ? __virt_addr_valid+0x1db/0x2d0
[   27.822910]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.822934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.822959]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.822984]  kasan_report+0x141/0x180
[   27.823006]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.823035]  kasan_check_range+0x10c/0x1c0
[   27.823057]  __kasan_check_write+0x18/0x20
[   27.823092]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.823117]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.823143]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.823166]  ? trace_hardirqs_on+0x37/0xe0
[   27.823188]  ? kasan_bitops_generic+0x92/0x1c0
[   27.823215]  kasan_bitops_generic+0x116/0x1c0
[   27.823237]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.823323]  ? __pfx_read_tsc+0x10/0x10
[   27.823343]  ? ktime_get_ts64+0x86/0x230
[   27.823367]  kunit_try_run_case+0x1a5/0x480
[   27.823390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.823412]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.823435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.823458]  ? __kthread_parkme+0x82/0x180
[   27.823481]  ? preempt_count_sub+0x50/0x80
[   27.823504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.823527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.823549]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.823571]  kthread+0x337/0x6f0
[   27.823590]  ? trace_preempt_on+0x20/0xc0
[   27.823612]  ? __pfx_kthread+0x10/0x10
[   27.823631]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.823652]  ? calculate_sigpending+0x7b/0xa0
[   27.823675]  ? __pfx_kthread+0x10/0x10
[   27.823696]  ret_from_fork+0x116/0x1d0
[   27.823714]  ? __pfx_kthread+0x10/0x10
[   27.823734]  ret_from_fork_asm+0x1a/0x30
[   27.823765]  </TASK>
[   27.823775] 
[   27.831686] Allocated by task 310:
[   27.831811]  kasan_save_stack+0x45/0x70
[   27.832002]  kasan_save_track+0x18/0x40
[   27.832198]  kasan_save_alloc_info+0x3b/0x50
[   27.832379]  __kasan_kmalloc+0xb7/0xc0
[   27.832503]  __kmalloc_cache_noprof+0x189/0x420
[   27.832649]  kasan_bitops_generic+0x92/0x1c0
[   27.832899]  kunit_try_run_case+0x1a5/0x480
[   27.833106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.833448]  kthread+0x337/0x6f0
[   27.833611]  ret_from_fork+0x116/0x1d0
[   27.833781]  ret_from_fork_asm+0x1a/0x30
[   27.833912] 
[   27.833985] The buggy address belongs to the object at ffff8881048d1b00
[   27.833985]  which belongs to the cache kmalloc-16 of size 16
[   27.834339] The buggy address is located 8 bytes inside of
[   27.834339]  allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09)
[   27.834859] 
[   27.834966] The buggy address belongs to the physical page:
[   27.835216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1
[   27.835557] flags: 0x200000000000000(node=0|zone=2)
[   27.835719] page_type: f5(slab)
[   27.835833] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.836054] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.836828] page dumped because: kasan: bad access detected
[   27.837068] 
[   27.837138] Memory state around the buggy address:
[   27.837284]  ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.837490]  ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.837915] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.838234]                       ^
[   27.838527]  ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.838732]  ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.838937] ==================================================================
[   27.839386] ==================================================================
[   27.839718] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.840329] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310
[   27.840671] 
[   27.840777] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   27.840823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.840834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.840855] Call Trace:
[   27.840867]  <TASK>
[   27.840881]  dump_stack_lvl+0x73/0xb0
[   27.840909]  print_report+0xd1/0x610
[   27.840931]  ? __virt_addr_valid+0x1db/0x2d0
[   27.840954]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.840978]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.841004]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.841028]  kasan_report+0x141/0x180
[   27.841050]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.841092]  kasan_check_range+0x10c/0x1c0
[   27.841118]  __kasan_check_write+0x18/0x20
[   27.841142]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.841168]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.841194]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.841217]  ? trace_hardirqs_on+0x37/0xe0
[   27.841249]  ? kasan_bitops_generic+0x92/0x1c0
[   27.841275]  kasan_bitops_generic+0x116/0x1c0
[   27.841298]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.841323]  ? __pfx_read_tsc+0x10/0x10
[   27.841343]  ? ktime_get_ts64+0x86/0x230
[   27.841367]  kunit_try_run_case+0x1a5/0x480
[   27.841391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.841412]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.841436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.841459]  ? __kthread_parkme+0x82/0x180
[   27.841482]  ? preempt_count_sub+0x50/0x80
[   27.841504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.841527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.841551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.841574]  kthread+0x337/0x6f0
[   27.841593]  ? trace_preempt_on+0x20/0xc0
[   27.841615]  ? __pfx_kthread+0x10/0x10
[   27.841635]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.841655]  ? calculate_sigpending+0x7b/0xa0
[   27.841678]  ? __pfx_kthread+0x10/0x10
[   27.841699]  ret_from_fork+0x116/0x1d0
[   27.841717]  ? __pfx_kthread+0x10/0x10
[   27.841737]  ret_from_fork_asm+0x1a/0x30
[   27.841768]  </TASK>
[   27.841778] 
[   27.849458] Allocated by task 310:
[   27.849733]  kasan_save_stack+0x45/0x70
[   27.849868]  kasan_save_track+0x18/0x40
[   27.850002]  kasan_save_alloc_info+0x3b/0x50
[   27.850342]  __kasan_kmalloc+0xb7/0xc0
[   27.850523]  __kmalloc_cache_noprof+0x189/0x420
[   27.850737]  kasan_bitops_generic+0x92/0x1c0
[   27.850922]  kunit_try_run_case+0x1a5/0x480
[   27.851122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.851394]  kthread+0x337/0x6f0
[   27.851533]  ret_from_fork+0x116/0x1d0
[   27.851692]  ret_from_fork_asm+0x1a/0x30
[   27.851823] 
[   27.851885] The buggy address belongs to the object at ffff8881048d1b00
[   27.851885]  which belongs to the cache kmalloc-16 of size 16
[   27.852510] The buggy address is located 8 bytes inside of
[   27.852510]  allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09)
[   27.852975] 
[   27.853064] The buggy address belongs to the physical page:
[   27.853324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1
[   27.853592] flags: 0x200000000000000(node=0|zone=2)
[   27.853785] page_type: f5(slab)
[   27.853958] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.854287] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.854580] page dumped because: kasan: bad access detected
[   27.854804] 
[   27.854884] Memory state around the buggy address:
[   27.855064]  ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.855380]  ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.855629] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.855909]                       ^
[   27.856061]  ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.856379]  ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.856589] ==================================================================