Hay
Date
July 23, 2025, 3:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.899465] ==================================================================
[   32.899519] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   32.899571] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.899895] 
[   32.899941] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.905139]  kthread+0x328/0x630
[   32.909157]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.913593]  kasan_save_track+0x20/0x40
[   32.917157] 
[   32.920333] page dumped because: kasan: bad access detected
[   32.928407] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.931552]  kasan_bitops_generic+0x11c/0x1c8
[   32.932389]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.935181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.937252] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.938956]  kunit_try_run_case+0x170/0x3f0
[   32.940243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.941571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.942885] ==================================================================
[   32.855081] ==================================================================
[   32.855426] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   32.855510] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.855572] 
[   32.855667] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.855790] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.855882] Hardware name: linux,dummy-virt (DT)
[   32.855925] Call trace:
[   32.855979]  show_stack+0x20/0x38 (C)
[   32.856239]  dump_stack_lvl+0x8c/0xd0
[   32.856389]  print_report+0x118/0x5e8
[   32.856456]  kasan_report+0xdc/0x128
[   32.856500]  kasan_check_range+0x100/0x1a8
[   32.856678]  __kasan_check_write+0x20/0x30
[   32.856964]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   32.857049]  kasan_bitops_generic+0x110/0x1c8
[   32.857161]  kunit_try_run_case+0x170/0x3f0
[   32.857260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.857397]  kthread+0x328/0x630
[   32.857460]  ret_from_fork+0x10/0x20
[   32.857551] 
[   32.857573] Allocated by task 294:
[   32.857749]  kasan_save_stack+0x3c/0x68
[   32.857809]  kasan_save_track+0x20/0x40
[   32.857933]  kasan_save_alloc_info+0x40/0x58
[   32.858057]  __kasan_kmalloc+0xd4/0xd8
[   32.858144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.858198]  kasan_bitops_generic+0xa0/0x1c8
[   32.858401]  kunit_try_run_case+0x170/0x3f0
[   32.858454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.858529]  kthread+0x328/0x630
[   32.858643]  ret_from_fork+0x10/0x20
[   32.858685] 
[   32.858709] The buggy address belongs to the object at fff00000c60439a0
[   32.858709]  which belongs to the cache kmalloc-16 of size 16
[   32.858769] The buggy address is located 8 bytes inside of
[   32.858769]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.858867] 
[   32.858889] The buggy address belongs to the physical page:
[   32.858937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.858992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.859052] page_type: f5(slab)
[   32.859099] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.859166] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.859233] page dumped because: kasan: bad access detected
[   32.859266] 
[   32.859294] Memory state around the buggy address:
[   32.859329]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.859373]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.859422] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.859463]                                   ^
[   32.859507]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.859560]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.859605] ==================================================================
[   32.847706] ==================================================================
[   32.847822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   32.847919] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.848022] 
[   32.848056] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.848376] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.848440] Hardware name: linux,dummy-virt (DT)
[   32.848542] Call trace:
[   32.848591]  show_stack+0x20/0x38 (C)
[   32.848663]  dump_stack_lvl+0x8c/0xd0
[   32.848778]  print_report+0x118/0x5e8
[   32.848854]  kasan_report+0xdc/0x128
[   32.849048]  __asan_report_load8_noabort+0x20/0x30
[   32.849110]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   32.849277]  kasan_bitops_generic+0x110/0x1c8
[   32.849381]  kunit_try_run_case+0x170/0x3f0
[   32.849503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.849639]  kthread+0x328/0x630
[   32.849706]  ret_from_fork+0x10/0x20
[   32.850012] 
[   32.850106] Allocated by task 294:
[   32.850164]  kasan_save_stack+0x3c/0x68
[   32.850209]  kasan_save_track+0x20/0x40
[   32.850284]  kasan_save_alloc_info+0x40/0x58
[   32.850550]  __kasan_kmalloc+0xd4/0xd8
[   32.850703]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.850782]  kasan_bitops_generic+0xa0/0x1c8
[   32.850835]  kunit_try_run_case+0x170/0x3f0
[   32.851018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.851113]  kthread+0x328/0x630
[   32.851164]  ret_from_fork+0x10/0x20
[   32.851221] 
[   32.851295] The buggy address belongs to the object at fff00000c60439a0
[   32.851295]  which belongs to the cache kmalloc-16 of size 16
[   32.851372] The buggy address is located 8 bytes inside of
[   32.851372]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.851617] 
[   32.851647] The buggy address belongs to the physical page:
[   32.851700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.851864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.851960] page_type: f5(slab)
[   32.852169] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.852285] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.852373] page dumped because: kasan: bad access detected
[   32.852480] 
[   32.852614] Memory state around the buggy address:
[   32.852683]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.852730]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.852772] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.852978]                                   ^
[   32.853178]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.853245]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.853363] ==================================================================
[   32.871679] ==================================================================
[   32.871818] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   32.871925] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.871980] 
[   32.872029] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.872396] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.872462] Hardware name: linux,dummy-virt (DT)
[   32.872512] Call trace:
[   32.872547]  show_stack+0x20/0x38 (C)
[   32.872600]  dump_stack_lvl+0x8c/0xd0
[   32.872733]  print_report+0x118/0x5e8
[   32.872801]  kasan_report+0xdc/0x128
[   32.872867]  kasan_check_range+0x100/0x1a8
[   32.873001]  __kasan_check_write+0x20/0x30
[   32.873068]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   32.873307]  kasan_bitops_generic+0x110/0x1c8
[   32.873524]  kunit_try_run_case+0x170/0x3f0
[   32.873611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.873722]  kthread+0x328/0x630
[   32.873867]  ret_from_fork+0x10/0x20
[   32.874086] 
[   32.874146] Allocated by task 294:
[   32.874205]  kasan_save_stack+0x3c/0x68
[   32.874255]  kasan_save_track+0x20/0x40
[   32.874299]  kasan_save_alloc_info+0x40/0x58
[   32.874338]  __kasan_kmalloc+0xd4/0xd8
[   32.874382]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.874649]  kasan_bitops_generic+0xa0/0x1c8
[   32.874804]  kunit_try_run_case+0x170/0x3f0
[   32.874884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.875026]  kthread+0x328/0x630
[   32.875099]  ret_from_fork+0x10/0x20
[   32.875237] 
[   32.875298] The buggy address belongs to the object at fff00000c60439a0
[   32.875298]  which belongs to the cache kmalloc-16 of size 16
[   32.875564] The buggy address is located 8 bytes inside of
[   32.875564]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.875747] 
[   32.875810] The buggy address belongs to the physical page:
[   32.875991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.876064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.876296] page_type: f5(slab)
[   32.876358] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.876430] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.876504] page dumped because: kasan: bad access detected
[   32.876606] 
[   32.876665] Memory state around the buggy address:
[   32.876794]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.876922]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.876989] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.877075]                                   ^
[   32.877112]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.877158]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.877199] ==================================================================
[   32.883957] ==================================================================
[   32.884010] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   32.884133] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.884188] 
[   32.884248] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.884387] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.884423] Hardware name: linux,dummy-virt (DT)
[   32.884473] Call trace:
[   32.884499]  show_stack+0x20/0x38 (C)
[   32.884594]  dump_stack_lvl+0x8c/0xd0
[   32.884673]  print_report+0x118/0x5e8
[   32.884781]  kasan_report+0xdc/0x128
[   32.884828]  kasan_check_range+0x100/0x1a8
[   32.884875]  __kasan_check_write+0x20/0x30
[   32.885126]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   32.885285]  kasan_bitops_generic+0x110/0x1c8
[   32.885408]  kunit_try_run_case+0x170/0x3f0
[   32.885506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.885594]  kthread+0x328/0x630
[   32.885729]  ret_from_fork+0x10/0x20
[   32.885971] 
[   32.886041] Allocated by task 294:
[   32.886188]  kasan_save_stack+0x3c/0x68
[   32.886291]  kasan_save_track+0x20/0x40
[   32.886387]  kasan_save_alloc_info+0x40/0x58
[   32.886468]  __kasan_kmalloc+0xd4/0xd8
[   32.886568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.886631]  kasan_bitops_generic+0xa0/0x1c8
[   32.886876]  kunit_try_run_case+0x170/0x3f0
[   32.887049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.887098]  kthread+0x328/0x630
[   32.887133]  ret_from_fork+0x10/0x20
[   32.887347] 
[   32.887469] The buggy address belongs to the object at fff00000c60439a0
[   32.887469]  which belongs to the cache kmalloc-16 of size 16
[   32.887579] The buggy address is located 8 bytes inside of
[   32.887579]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.887734] 
[   32.887758] The buggy address belongs to the physical page:
[   32.887812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.888079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.888202] page_type: f5(slab)
[   32.888301] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.888389] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.888432] page dumped because: kasan: bad access detected
[   32.888570] 
[   32.888594] Memory state around the buggy address:
[   32.888631]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.888736]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.888804] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.888895]                                   ^
[   32.888985]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.889057]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.889098] ==================================================================
[   32.841187] ==================================================================
[   32.841254] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   32.841383] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.841556] 
[   32.841613] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.841752] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.841884] Hardware name: linux,dummy-virt (DT)
[   32.841961] Call trace:
[   32.842076]  show_stack+0x20/0x38 (C)
[   32.842184]  dump_stack_lvl+0x8c/0xd0
[   32.842255]  print_report+0x118/0x5e8
[   32.842521]  kasan_report+0xdc/0x128
[   32.842574]  kasan_check_range+0x100/0x1a8
[   32.842721]  __kasan_check_write+0x20/0x30
[   32.842807]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   32.843041]  kasan_bitops_generic+0x110/0x1c8
[   32.843199]  kunit_try_run_case+0x170/0x3f0
[   32.843264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.843354]  kthread+0x328/0x630
[   32.843606]  ret_from_fork+0x10/0x20
[   32.843683] 
[   32.843737] Allocated by task 294:
[   32.843788]  kasan_save_stack+0x3c/0x68
[   32.843856]  kasan_save_track+0x20/0x40
[   32.844628]  kasan_save_alloc_info+0x40/0x58
[   32.844760]  __kasan_kmalloc+0xd4/0xd8
[   32.844841]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.845040]  kasan_bitops_generic+0xa0/0x1c8
[   32.845107]  kunit_try_run_case+0x170/0x3f0
[   32.845147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.845236]  kthread+0x328/0x630
[   32.845282]  ret_from_fork+0x10/0x20
[   32.845331] 
[   32.845370] The buggy address belongs to the object at fff00000c60439a0
[   32.845370]  which belongs to the cache kmalloc-16 of size 16
[   32.845437] The buggy address is located 8 bytes inside of
[   32.845437]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.845506] 
[   32.845538] The buggy address belongs to the physical page:
[   32.845585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.845651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.845701] page_type: f5(slab)
[   32.845759] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.845828] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.845872] page dumped because: kasan: bad access detected
[   32.845916] 
[   32.845936] Memory state around the buggy address:
[   32.845981]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.846027]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.846081] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.846122]                                   ^
[   32.846157]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.846210]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.846261] ==================================================================
[   32.867579] ==================================================================
[   32.867783] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   32.867895] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.867977] 
[   32.868018] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.868177] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.868212] Hardware name: linux,dummy-virt (DT)
[   32.868262] Call trace:
[   32.868288]  show_stack+0x20/0x38 (C)
[   32.868418]  dump_stack_lvl+0x8c/0xd0
[   32.868472]  print_report+0x118/0x5e8
[   32.868640]  kasan_report+0xdc/0x128
[   32.868693]  kasan_check_range+0x100/0x1a8
[   32.868746]  __kasan_check_write+0x20/0x30
[   32.868988]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   32.869064]  kasan_bitops_generic+0x110/0x1c8
[   32.869125]  kunit_try_run_case+0x170/0x3f0
[   32.869173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.869228]  kthread+0x328/0x630
[   32.869271]  ret_from_fork+0x10/0x20
[   32.869320] 
[   32.869341] Allocated by task 294:
[   32.869371]  kasan_save_stack+0x3c/0x68
[   32.869411]  kasan_save_track+0x20/0x40
[   32.869449]  kasan_save_alloc_info+0x40/0x58
[   32.869489]  __kasan_kmalloc+0xd4/0xd8
[   32.869526]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.869569]  kasan_bitops_generic+0xa0/0x1c8
[   32.869612]  kunit_try_run_case+0x170/0x3f0
[   32.869651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.869696]  kthread+0x328/0x630
[   32.869731]  ret_from_fork+0x10/0x20
[   32.869769] 
[   32.869789] The buggy address belongs to the object at fff00000c60439a0
[   32.869789]  which belongs to the cache kmalloc-16 of size 16
[   32.869848] The buggy address is located 8 bytes inside of
[   32.869848]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.869922] 
[   32.869944] The buggy address belongs to the physical page:
[   32.870038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.870105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.870156] page_type: f5(slab)
[   32.870204] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.870273] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.870328] page dumped because: kasan: bad access detected
[   32.870375] 
[   32.870395] Memory state around the buggy address:
[   32.870430]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.870485]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.870538] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.870583]                                   ^
[   32.870619]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.870664]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.870702] ==================================================================
[   32.878163] ==================================================================
[   32.878373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   32.878441] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.878588] 
[   32.878646] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.878745] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.878779] Hardware name: linux,dummy-virt (DT)
[   32.878813] Call trace:
[   32.878836]  show_stack+0x20/0x38 (C)
[   32.878886]  dump_stack_lvl+0x8c/0xd0
[   32.878988]  print_report+0x118/0x5e8
[   32.879036]  kasan_report+0xdc/0x128
[   32.879088]  __asan_report_load8_noabort+0x20/0x30
[   32.879139]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   32.879193]  kasan_bitops_generic+0x110/0x1c8
[   32.879252]  kunit_try_run_case+0x170/0x3f0
[   32.879301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.879369]  kthread+0x328/0x630
[   32.879412]  ret_from_fork+0x10/0x20
[   32.879461] 
[   32.879490] Allocated by task 294:
[   32.879521]  kasan_save_stack+0x3c/0x68
[   32.879561]  kasan_save_track+0x20/0x40
[   32.879598]  kasan_save_alloc_info+0x40/0x58
[   32.879645]  __kasan_kmalloc+0xd4/0xd8
[   32.879682]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.879724]  kasan_bitops_generic+0xa0/0x1c8
[   32.879773]  kunit_try_run_case+0x170/0x3f0
[   32.879820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.879867]  kthread+0x328/0x630
[   32.880696]  ret_from_fork+0x10/0x20
[   32.881084] 
[   32.881179] The buggy address belongs to the object at fff00000c60439a0
[   32.881179]  which belongs to the cache kmalloc-16 of size 16
[   32.881343] The buggy address is located 8 bytes inside of
[   32.881343]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.881421] 
[   32.881442] The buggy address belongs to the physical page:
[   32.881605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.881670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.882086] page_type: f5(slab)
[   32.882278] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.882460] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.882547] page dumped because: kasan: bad access detected
[   32.882679] 
[   32.882737] Memory state around the buggy address:
[   32.882855]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.882926]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.883145] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.883221]                                   ^
[   32.883360]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.883419]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.883459] ==================================================================
[   32.890388] ==================================================================
[   32.890513] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   32.890578] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.890665] 
[   32.890699] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.890794] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.890826] Hardware name: linux,dummy-virt (DT)
[   32.890859] Call trace:
[   32.890883]  show_stack+0x20/0x38 (C)
[   32.890945]  dump_stack_lvl+0x8c/0xd0
[   32.890993]  print_report+0x118/0x5e8
[   32.891038]  kasan_report+0xdc/0x128
[   32.891095]  kasan_check_range+0x100/0x1a8
[   32.891317]  __kasan_check_write+0x20/0x30
[   32.891390]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   32.891789]  kasan_bitops_generic+0x110/0x1c8
[   32.891871]  kunit_try_run_case+0x170/0x3f0
[   32.891935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.891990]  kthread+0x328/0x630
[   32.892036]  ret_from_fork+0x10/0x20
[   32.892977] 
[   32.893066] Allocated by task 294:
[   32.893306]  kasan_save_stack+0x3c/0x68
[   32.893445]  kasan_save_track+0x20/0x40
[   32.893483]  kasan_save_alloc_info+0x40/0x58
[   32.893524]  __kasan_kmalloc+0xd4/0xd8
[   32.893561]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.893605]  kasan_bitops_generic+0xa0/0x1c8
[   32.893730]  kunit_try_run_case+0x170/0x3f0
[   32.894024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.894085]  kthread+0x328/0x630
[   32.894121]  ret_from_fork+0x10/0x20
[   32.894208] 
[   32.894231] The buggy address belongs to the object at fff00000c60439a0
[   32.894231]  which belongs to the cache kmalloc-16 of size 16
[   32.894375] The buggy address is located 8 bytes inside of
[   32.894375]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.894476] 
[   32.894702] The buggy address belongs to the physical page:
[   32.894742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.894998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.895343] page_type: f5(slab)
[   32.895498] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.896060] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.896485] page dumped because: kasan: bad access detected
[   32.896585] 
[   32.896826] Memory state around the buggy address:
[   32.896872]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.896932]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.897414] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.897460]                                   ^
[   32.897678]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.897738]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.897779] ==================================================================
[   32.860682] ==================================================================
[   32.860738] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   32.860875] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294
[   32.860991] 
[   32.861183] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.861342] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.861430] Hardware name: linux,dummy-virt (DT)
[   32.861491] Call trace:
[   32.861646]  show_stack+0x20/0x38 (C)
[   32.861780]  dump_stack_lvl+0x8c/0xd0
[   32.861871]  print_report+0x118/0x5e8
[   32.861998]  kasan_report+0xdc/0x128
[   32.862096]  __asan_report_load8_noabort+0x20/0x30
[   32.862197]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   32.862293]  kasan_bitops_generic+0x110/0x1c8
[   32.862590]  kunit_try_run_case+0x170/0x3f0
[   32.862689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.862809]  kthread+0x328/0x630
[   32.862858]  ret_from_fork+0x10/0x20
[   32.863085] 
[   32.863117] Allocated by task 294:
[   32.863150]  kasan_save_stack+0x3c/0x68
[   32.863227]  kasan_save_track+0x20/0x40
[   32.863292]  kasan_save_alloc_info+0x40/0x58
[   32.863367]  __kasan_kmalloc+0xd4/0xd8
[   32.863467]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.863552]  kasan_bitops_generic+0xa0/0x1c8
[   32.863651]  kunit_try_run_case+0x170/0x3f0
[   32.863729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.863864]  kthread+0x328/0x630
[   32.864283]  ret_from_fork+0x10/0x20
[   32.864349] 
[   32.864407] The buggy address belongs to the object at fff00000c60439a0
[   32.864407]  which belongs to the cache kmalloc-16 of size 16
[   32.864582] The buggy address is located 8 bytes inside of
[   32.864582]  allocated 9-byte region [fff00000c60439a0, fff00000c60439a9)
[   32.864702] 
[   32.864813] The buggy address belongs to the physical page:
[   32.864915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043
[   32.865030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.865113] page_type: f5(slab)
[   32.865363] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.865478] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.865639] page dumped because: kasan: bad access detected
[   32.865739] 
[   32.865799] Memory state around the buggy address:
[   32.865935]  fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.866036]  fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.866123] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.866270]                                   ^
[   32.866355]  fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.866401]  fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.866699] ==================================================================

[   27.463115] ==================================================================
[   27.463396] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.463822] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.464070] 
[   27.464200] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.464251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.464263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.464285] Call Trace:
[   27.464306]  <TASK>
[   27.464324]  dump_stack_lvl+0x73/0xb0
[   27.464352]  print_report+0xd1/0x640
[   27.464375]  ? __virt_addr_valid+0x1db/0x2d0
[   27.464400]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.464425]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.464452]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.464524]  kasan_report+0x141/0x180
[   27.464549]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.464579]  kasan_check_range+0x10c/0x1c0
[   27.464602]  __kasan_check_write+0x18/0x20
[   27.464625]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   27.464650]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.464678]  ? ret_from_fork_asm+0x1a/0x30
[   27.464702]  ? kthread+0x337/0x6f0
[   27.464728]  kasan_bitops_generic+0x116/0x1c0
[   27.464752]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.464779]  ? __pfx_read_tsc+0x10/0x10
[   27.464802]  ? ktime_get_ts64+0x86/0x230
[   27.464828]  kunit_try_run_case+0x1a5/0x480
[   27.464854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.464878]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.464904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.464930]  ? __kthread_parkme+0x82/0x180
[   27.464949]  ? preempt_count_sub+0x50/0x80
[   27.464972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.464996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.465020]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.465043]  kthread+0x337/0x6f0
[   27.465063]  ? trace_preempt_on+0x20/0xc0
[   27.465095]  ? __pfx_kthread+0x10/0x10
[   27.465116]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.465142]  ? calculate_sigpending+0x7b/0xa0
[   27.465180]  ? __pfx_kthread+0x10/0x10
[   27.465201]  ret_from_fork+0x116/0x1d0
[   27.465222]  ? __pfx_kthread+0x10/0x10
[   27.465243]  ret_from_fork_asm+0x1a/0x30
[   27.465274]  </TASK>
[   27.465285] 
[   27.473567] Allocated by task 310:
[   27.473747]  kasan_save_stack+0x45/0x70
[   27.473924]  kasan_save_track+0x18/0x40
[   27.474065]  kasan_save_alloc_info+0x3b/0x50
[   27.474221]  __kasan_kmalloc+0xb7/0xc0
[   27.474350]  __kmalloc_cache_noprof+0x189/0x420
[   27.474562]  kasan_bitops_generic+0x92/0x1c0
[   27.475040]  kunit_try_run_case+0x1a5/0x480
[   27.475269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.475599]  kthread+0x337/0x6f0
[   27.475784]  ret_from_fork+0x116/0x1d0
[   27.475953]  ret_from_fork_asm+0x1a/0x30
[   27.476125] 
[   27.476234] The buggy address belongs to the object at ffff8881049630a0
[   27.476234]  which belongs to the cache kmalloc-16 of size 16
[   27.476749] The buggy address is located 8 bytes inside of
[   27.476749]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.477557] 
[   27.477662] The buggy address belongs to the physical page:
[   27.477896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.478248] flags: 0x200000000000000(node=0|zone=2)
[   27.478536] page_type: f5(slab)
[   27.478707] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.478952] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.479190] page dumped because: kasan: bad access detected
[   27.479361] 
[   27.479426] Memory state around the buggy address:
[   27.479578]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.479828]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.480275] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.480581]                                   ^
[   27.480786]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.481480]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.481704] ==================================================================
[   27.364737] ==================================================================
[   27.365157] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.365745] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.366198] 
[   27.366352] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.366410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.366474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.366499] Call Trace:
[   27.366558]  <TASK>
[   27.366578]  dump_stack_lvl+0x73/0xb0
[   27.366610]  print_report+0xd1/0x640
[   27.366633]  ? __virt_addr_valid+0x1db/0x2d0
[   27.366658]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.366716]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.366742]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.366769]  kasan_report+0x141/0x180
[   27.366791]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.366822]  kasan_check_range+0x10c/0x1c0
[   27.366877]  __kasan_check_write+0x18/0x20
[   27.366900]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   27.366927]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.366966]  ? ret_from_fork_asm+0x1a/0x30
[   27.366992]  ? kthread+0x337/0x6f0
[   27.367049]  kasan_bitops_generic+0x116/0x1c0
[   27.367073]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.367098]  ? __pfx_read_tsc+0x10/0x10
[   27.367122]  ? ktime_get_ts64+0x86/0x230
[   27.367159]  kunit_try_run_case+0x1a5/0x480
[   27.367217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.367263]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.367290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.367316]  ? __kthread_parkme+0x82/0x180
[   27.367336]  ? preempt_count_sub+0x50/0x80
[   27.367360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.367430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.367490]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.367538]  kthread+0x337/0x6f0
[   27.367583]  ? trace_preempt_on+0x20/0xc0
[   27.367609]  ? __pfx_kthread+0x10/0x10
[   27.367636]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.367659]  ? calculate_sigpending+0x7b/0xa0
[   27.367684]  ? __pfx_kthread+0x10/0x10
[   27.367705]  ret_from_fork+0x116/0x1d0
[   27.367726]  ? __pfx_kthread+0x10/0x10
[   27.367786]  ret_from_fork_asm+0x1a/0x30
[   27.367819]  </TASK>
[   27.367830] 
[   27.377357] Allocated by task 310:
[   27.377547]  kasan_save_stack+0x45/0x70
[   27.377699]  kasan_save_track+0x18/0x40
[   27.377837]  kasan_save_alloc_info+0x3b/0x50
[   27.378076]  __kasan_kmalloc+0xb7/0xc0
[   27.378307]  __kmalloc_cache_noprof+0x189/0x420
[   27.378558]  kasan_bitops_generic+0x92/0x1c0
[   27.378760]  kunit_try_run_case+0x1a5/0x480
[   27.378966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.379264]  kthread+0x337/0x6f0
[   27.379379]  ret_from_fork+0x116/0x1d0
[   27.379503]  ret_from_fork_asm+0x1a/0x30
[   27.379636] 
[   27.379822] The buggy address belongs to the object at ffff8881049630a0
[   27.379822]  which belongs to the cache kmalloc-16 of size 16
[   27.380474] The buggy address is located 8 bytes inside of
[   27.380474]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.381350] 
[   27.381558] The buggy address belongs to the physical page:
[   27.381814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.382049] flags: 0x200000000000000(node=0|zone=2)
[   27.382313] page_type: f5(slab)
[   27.382544] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.383092] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.383567] page dumped because: kasan: bad access detected
[   27.383815] 
[   27.383898] Memory state around the buggy address:
[   27.384274]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.384571]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.384958] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.385287]                                   ^
[   27.385661]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.386022]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.386352] ==================================================================
[   27.439573] ==================================================================
[   27.440296] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.441020] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.441528] 
[   27.441645] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.441697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.441711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.441733] Call Trace:
[   27.441754]  <TASK>
[   27.441772]  dump_stack_lvl+0x73/0xb0
[   27.441802]  print_report+0xd1/0x640
[   27.441825]  ? __virt_addr_valid+0x1db/0x2d0
[   27.441850]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.441876]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.441903]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.441929]  kasan_report+0x141/0x180
[   27.442078]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.442198]  kasan_check_range+0x10c/0x1c0
[   27.442225]  __kasan_check_write+0x18/0x20
[   27.442249]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   27.442275]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.442303]  ? ret_from_fork_asm+0x1a/0x30
[   27.442327]  ? kthread+0x337/0x6f0
[   27.442352]  kasan_bitops_generic+0x116/0x1c0
[   27.442425]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.442453]  ? __pfx_read_tsc+0x10/0x10
[   27.442476]  ? ktime_get_ts64+0x86/0x230
[   27.442501]  kunit_try_run_case+0x1a5/0x480
[   27.442526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.442549]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.442575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.442601]  ? __kthread_parkme+0x82/0x180
[   27.442623]  ? preempt_count_sub+0x50/0x80
[   27.442647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.442671]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.442694]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.442718]  kthread+0x337/0x6f0
[   27.442738]  ? trace_preempt_on+0x20/0xc0
[   27.442762]  ? __pfx_kthread+0x10/0x10
[   27.442784]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.442807]  ? calculate_sigpending+0x7b/0xa0
[   27.442831]  ? __pfx_kthread+0x10/0x10
[   27.442853]  ret_from_fork+0x116/0x1d0
[   27.442874]  ? __pfx_kthread+0x10/0x10
[   27.442895]  ret_from_fork_asm+0x1a/0x30
[   27.442926]  </TASK>
[   27.442937] 
[   27.454023] Allocated by task 310:
[   27.454368]  kasan_save_stack+0x45/0x70
[   27.454578]  kasan_save_track+0x18/0x40
[   27.454750]  kasan_save_alloc_info+0x3b/0x50
[   27.454948]  __kasan_kmalloc+0xb7/0xc0
[   27.455608]  __kmalloc_cache_noprof+0x189/0x420
[   27.455819]  kasan_bitops_generic+0x92/0x1c0
[   27.456040]  kunit_try_run_case+0x1a5/0x480
[   27.456219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.456543]  kthread+0x337/0x6f0
[   27.456695]  ret_from_fork+0x116/0x1d0
[   27.456880]  ret_from_fork_asm+0x1a/0x30
[   27.457060] 
[   27.457130] The buggy address belongs to the object at ffff8881049630a0
[   27.457130]  which belongs to the cache kmalloc-16 of size 16
[   27.457576] The buggy address is located 8 bytes inside of
[   27.457576]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.458127] 
[   27.458218] The buggy address belongs to the physical page:
[   27.458542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.458795] flags: 0x200000000000000(node=0|zone=2)
[   27.459115] page_type: f5(slab)
[   27.459290] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.459570] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.459797] page dumped because: kasan: bad access detected
[   27.460229] 
[   27.460329] Memory state around the buggy address:
[   27.460803]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.461182]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.461433] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.461758]                                   ^
[   27.462053]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.462271]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.462607] ==================================================================
[   27.386963] ==================================================================
[   27.387225] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.387817] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.388214] 
[   27.388439] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.388526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.388540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.388563] Call Trace:
[   27.388581]  <TASK>
[   27.388598]  dump_stack_lvl+0x73/0xb0
[   27.388626]  print_report+0xd1/0x640
[   27.388649]  ? __virt_addr_valid+0x1db/0x2d0
[   27.388673]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.388699]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.388725]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.388750]  kasan_report+0x141/0x180
[   27.388773]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.388803]  kasan_check_range+0x10c/0x1c0
[   27.388827]  __kasan_check_write+0x18/0x20
[   27.388882]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   27.388908]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.388935]  ? ret_from_fork_asm+0x1a/0x30
[   27.388968]  ? kthread+0x337/0x6f0
[   27.388992]  kasan_bitops_generic+0x116/0x1c0
[   27.389016]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.389041]  ? __pfx_read_tsc+0x10/0x10
[   27.389064]  ? ktime_get_ts64+0x86/0x230
[   27.389089]  kunit_try_run_case+0x1a5/0x480
[   27.389114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.389137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.389212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.389238]  ? __kthread_parkme+0x82/0x180
[   27.389258]  ? preempt_count_sub+0x50/0x80
[   27.389282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.389306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.389360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.389385]  kthread+0x337/0x6f0
[   27.389404]  ? trace_preempt_on+0x20/0xc0
[   27.389471]  ? __pfx_kthread+0x10/0x10
[   27.389495]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.389557]  ? calculate_sigpending+0x7b/0xa0
[   27.389581]  ? __pfx_kthread+0x10/0x10
[   27.389603]  ret_from_fork+0x116/0x1d0
[   27.389623]  ? __pfx_kthread+0x10/0x10
[   27.389644]  ret_from_fork_asm+0x1a/0x30
[   27.389703]  </TASK>
[   27.389714] 
[   27.399337] Allocated by task 310:
[   27.399604]  kasan_save_stack+0x45/0x70
[   27.399817]  kasan_save_track+0x18/0x40
[   27.400088]  kasan_save_alloc_info+0x3b/0x50
[   27.400337]  __kasan_kmalloc+0xb7/0xc0
[   27.400591]  __kmalloc_cache_noprof+0x189/0x420
[   27.400744]  kasan_bitops_generic+0x92/0x1c0
[   27.400886]  kunit_try_run_case+0x1a5/0x480
[   27.401022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.401198]  kthread+0x337/0x6f0
[   27.401312]  ret_from_fork+0x116/0x1d0
[   27.401438]  ret_from_fork_asm+0x1a/0x30
[   27.401666] 
[   27.401758] The buggy address belongs to the object at ffff8881049630a0
[   27.401758]  which belongs to the cache kmalloc-16 of size 16
[   27.402399] The buggy address is located 8 bytes inside of
[   27.402399]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.403325] 
[   27.403518] The buggy address belongs to the physical page:
[   27.403786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.404519] flags: 0x200000000000000(node=0|zone=2)
[   27.404773] page_type: f5(slab)
[   27.404932] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.405196] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.405441] page dumped because: kasan: bad access detected
[   27.405690] 
[   27.406000] Memory state around the buggy address:
[   27.406253]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.406716]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.406939] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.407274]                                   ^
[   27.407680]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.407898]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.408419] ==================================================================
[   27.322529] ==================================================================
[   27.323204] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.323704] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.325113] 
[   27.325233] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.325289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.325303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.325327] Call Trace:
[   27.325341]  <TASK>
[   27.325361]  dump_stack_lvl+0x73/0xb0
[   27.325464]  print_report+0xd1/0x640
[   27.325489]  ? __virt_addr_valid+0x1db/0x2d0
[   27.325513]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.325539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.325565]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.325590]  kasan_report+0x141/0x180
[   27.325613]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.325643]  kasan_check_range+0x10c/0x1c0
[   27.325667]  __kasan_check_write+0x18/0x20
[   27.325689]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   27.325715]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.325741]  ? ret_from_fork_asm+0x1a/0x30
[   27.325765]  ? kthread+0x337/0x6f0
[   27.325790]  kasan_bitops_generic+0x116/0x1c0
[   27.325814]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.325838]  ? __pfx_read_tsc+0x10/0x10
[   27.325860]  ? ktime_get_ts64+0x86/0x230
[   27.325885]  kunit_try_run_case+0x1a5/0x480
[   27.325911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.325934]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.325961]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.325987]  ? __kthread_parkme+0x82/0x180
[   27.326007]  ? preempt_count_sub+0x50/0x80
[   27.326031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.326083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.326107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.326130]  kthread+0x337/0x6f0
[   27.326160]  ? trace_preempt_on+0x20/0xc0
[   27.326185]  ? __pfx_kthread+0x10/0x10
[   27.326205]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.326230]  ? calculate_sigpending+0x7b/0xa0
[   27.326254]  ? __pfx_kthread+0x10/0x10
[   27.326275]  ret_from_fork+0x116/0x1d0
[   27.326295]  ? __pfx_kthread+0x10/0x10
[   27.326315]  ret_from_fork_asm+0x1a/0x30
[   27.326346]  </TASK>
[   27.326357] 
[   27.334964] Allocated by task 310:
[   27.335248]  kasan_save_stack+0x45/0x70
[   27.335448]  kasan_save_track+0x18/0x40
[   27.335751]  kasan_save_alloc_info+0x3b/0x50
[   27.336009]  __kasan_kmalloc+0xb7/0xc0
[   27.336137]  __kmalloc_cache_noprof+0x189/0x420
[   27.336298]  kasan_bitops_generic+0x92/0x1c0
[   27.336440]  kunit_try_run_case+0x1a5/0x480
[   27.336597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.336767]  kthread+0x337/0x6f0
[   27.336885]  ret_from_fork+0x116/0x1d0
[   27.337012]  ret_from_fork_asm+0x1a/0x30
[   27.337158] 
[   27.337224] The buggy address belongs to the object at ffff8881049630a0
[   27.337224]  which belongs to the cache kmalloc-16 of size 16
[   27.337807] The buggy address is located 8 bytes inside of
[   27.337807]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.338732] 
[   27.338856] The buggy address belongs to the physical page:
[   27.339338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.339727] flags: 0x200000000000000(node=0|zone=2)
[   27.339936] page_type: f5(slab)
[   27.340116] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.340679] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.341048] page dumped because: kasan: bad access detected
[   27.341310] 
[   27.341462] Memory state around the buggy address:
[   27.341627]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.341852]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.342477] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.342692]                                   ^
[   27.342837]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.343349]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.343670] ==================================================================
[   27.408928] ==================================================================
[   27.409262] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.409758] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.410170] 
[   27.410273] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.410358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.410372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.410394] Call Trace:
[   27.410410]  <TASK>
[   27.410476]  dump_stack_lvl+0x73/0xb0
[   27.410544]  print_report+0xd1/0x640
[   27.410568]  ? __virt_addr_valid+0x1db/0x2d0
[   27.410592]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.410617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.410669]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.410697]  kasan_report+0x141/0x180
[   27.410720]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.410751]  kasan_check_range+0x10c/0x1c0
[   27.410775]  __kasan_check_write+0x18/0x20
[   27.410799]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   27.410824]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.410853]  ? ret_from_fork_asm+0x1a/0x30
[   27.410876]  ? kthread+0x337/0x6f0
[   27.410900]  kasan_bitops_generic+0x116/0x1c0
[   27.410924]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.410993]  ? __pfx_read_tsc+0x10/0x10
[   27.411017]  ? ktime_get_ts64+0x86/0x230
[   27.411042]  kunit_try_run_case+0x1a5/0x480
[   27.411067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.411089]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.411114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.411139]  ? __kthread_parkme+0x82/0x180
[   27.411171]  ? preempt_count_sub+0x50/0x80
[   27.411194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.411219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.411242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.411266]  kthread+0x337/0x6f0
[   27.411318]  ? trace_preempt_on+0x20/0xc0
[   27.411343]  ? __pfx_kthread+0x10/0x10
[   27.411364]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.411398]  ? calculate_sigpending+0x7b/0xa0
[   27.411423]  ? __pfx_kthread+0x10/0x10
[   27.411444]  ret_from_fork+0x116/0x1d0
[   27.411464]  ? __pfx_kthread+0x10/0x10
[   27.411550]  ret_from_fork_asm+0x1a/0x30
[   27.411582]  </TASK>
[   27.411594] 
[   27.425459] Allocated by task 310:
[   27.425933]  kasan_save_stack+0x45/0x70
[   27.426490]  kasan_save_track+0x18/0x40
[   27.427028]  kasan_save_alloc_info+0x3b/0x50
[   27.427716]  __kasan_kmalloc+0xb7/0xc0
[   27.428480]  __kmalloc_cache_noprof+0x189/0x420
[   27.428961]  kasan_bitops_generic+0x92/0x1c0
[   27.429765]  kunit_try_run_case+0x1a5/0x480
[   27.430275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.431114]  kthread+0x337/0x6f0
[   27.431278]  ret_from_fork+0x116/0x1d0
[   27.431901]  ret_from_fork_asm+0x1a/0x30
[   27.432615] 
[   27.433054] The buggy address belongs to the object at ffff8881049630a0
[   27.433054]  which belongs to the cache kmalloc-16 of size 16
[   27.433900] The buggy address is located 8 bytes inside of
[   27.433900]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.434438] 
[   27.434537] The buggy address belongs to the physical page:
[   27.434741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.435099] flags: 0x200000000000000(node=0|zone=2)
[   27.435306] page_type: f5(slab)
[   27.435469] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.435846] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.436187] page dumped because: kasan: bad access detected
[   27.436462] 
[   27.436575] Memory state around the buggy address:
[   27.436791]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.437132]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.437471] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.437980]                                   ^
[   27.438331]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.438720]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.439017] ==================================================================
[   27.482091] ==================================================================
[   27.482560] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.482947] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.483300] 
[   27.483440] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.483492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.483505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.483526] Call Trace:
[   27.483546]  <TASK>
[   27.483563]  dump_stack_lvl+0x73/0xb0
[   27.483592]  print_report+0xd1/0x640
[   27.483613]  ? __virt_addr_valid+0x1db/0x2d0
[   27.483644]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.483670]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.483696]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.483721]  kasan_report+0x141/0x180
[   27.483743]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.483774]  kasan_check_range+0x10c/0x1c0
[   27.483797]  __kasan_check_write+0x18/0x20
[   27.483821]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   27.483848]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.483875]  ? ret_from_fork_asm+0x1a/0x30
[   27.483898]  ? kthread+0x337/0x6f0
[   27.483922]  kasan_bitops_generic+0x116/0x1c0
[   27.483957]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.483982]  ? __pfx_read_tsc+0x10/0x10
[   27.484004]  ? ktime_get_ts64+0x86/0x230
[   27.484029]  kunit_try_run_case+0x1a5/0x480
[   27.484053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.484076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.484102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.484127]  ? __kthread_parkme+0x82/0x180
[   27.484159]  ? preempt_count_sub+0x50/0x80
[   27.484183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.484207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.484230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.484255]  kthread+0x337/0x6f0
[   27.484276]  ? trace_preempt_on+0x20/0xc0
[   27.484301]  ? __pfx_kthread+0x10/0x10
[   27.484322]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.484345]  ? calculate_sigpending+0x7b/0xa0
[   27.484370]  ? __pfx_kthread+0x10/0x10
[   27.484432]  ret_from_fork+0x116/0x1d0
[   27.484453]  ? __pfx_kthread+0x10/0x10
[   27.484474]  ret_from_fork_asm+0x1a/0x30
[   27.484505]  </TASK>
[   27.484517] 
[   27.492398] Allocated by task 310:
[   27.492559]  kasan_save_stack+0x45/0x70
[   27.492747]  kasan_save_track+0x18/0x40
[   27.492895]  kasan_save_alloc_info+0x3b/0x50
[   27.493184]  __kasan_kmalloc+0xb7/0xc0
[   27.493315]  __kmalloc_cache_noprof+0x189/0x420
[   27.493466]  kasan_bitops_generic+0x92/0x1c0
[   27.493610]  kunit_try_run_case+0x1a5/0x480
[   27.493754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.493926]  kthread+0x337/0x6f0
[   27.494042]  ret_from_fork+0x116/0x1d0
[   27.495322]  ret_from_fork_asm+0x1a/0x30
[   27.495918] 
[   27.496313] The buggy address belongs to the object at ffff8881049630a0
[   27.496313]  which belongs to the cache kmalloc-16 of size 16
[   27.496927] The buggy address is located 8 bytes inside of
[   27.496927]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.497841] 
[   27.497951] The buggy address belongs to the physical page:
[   27.498219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.498945] flags: 0x200000000000000(node=0|zone=2)
[   27.499232] page_type: f5(slab)
[   27.499401] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.499695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.500039] page dumped because: kasan: bad access detected
[   27.500274] 
[   27.500344] Memory state around the buggy address:
[   27.500495]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.500817]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.501172] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.501446]                                   ^
[   27.501660]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.501901]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.502314] ==================================================================
[   27.344280] ==================================================================
[   27.344679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.344941] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310
[   27.345280] 
[   27.345454] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   27.345504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.345561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.345586] Call Trace:
[   27.345605]  <TASK>
[   27.345660]  dump_stack_lvl+0x73/0xb0
[   27.345709]  print_report+0xd1/0x640
[   27.345732]  ? __virt_addr_valid+0x1db/0x2d0
[   27.345757]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.345783]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.345809]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.345836]  kasan_report+0x141/0x180
[   27.345858]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.345903]  kasan_check_range+0x10c/0x1c0
[   27.345927]  __kasan_check_write+0x18/0x20
[   27.345951]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   27.345977]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.346005]  ? ret_from_fork_asm+0x1a/0x30
[   27.346029]  ? kthread+0x337/0x6f0
[   27.346054]  kasan_bitops_generic+0x116/0x1c0
[   27.346078]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.346103]  ? __pfx_read_tsc+0x10/0x10
[   27.346125]  ? ktime_get_ts64+0x86/0x230
[   27.346162]  kunit_try_run_case+0x1a5/0x480
[   27.346187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.346209]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.346235]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.346260]  ? __kthread_parkme+0x82/0x180
[   27.346280]  ? preempt_count_sub+0x50/0x80
[   27.346303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.346328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.346351]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.346376]  kthread+0x337/0x6f0
[   27.346395]  ? trace_preempt_on+0x20/0xc0
[   27.346418]  ? __pfx_kthread+0x10/0x10
[   27.346439]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.346462]  ? calculate_sigpending+0x7b/0xa0
[   27.346486]  ? __pfx_kthread+0x10/0x10
[   27.346507]  ret_from_fork+0x116/0x1d0
[   27.346527]  ? __pfx_kthread+0x10/0x10
[   27.346548]  ret_from_fork_asm+0x1a/0x30
[   27.346578]  </TASK>
[   27.346589] 
[   27.355088] Allocated by task 310:
[   27.355300]  kasan_save_stack+0x45/0x70
[   27.355568]  kasan_save_track+0x18/0x40
[   27.355767]  kasan_save_alloc_info+0x3b/0x50
[   27.355994]  __kasan_kmalloc+0xb7/0xc0
[   27.356184]  __kmalloc_cache_noprof+0x189/0x420
[   27.356340]  kasan_bitops_generic+0x92/0x1c0
[   27.356484]  kunit_try_run_case+0x1a5/0x480
[   27.356622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.357239]  kthread+0x337/0x6f0
[   27.357492]  ret_from_fork+0x116/0x1d0
[   27.357680]  ret_from_fork_asm+0x1a/0x30
[   27.357870] 
[   27.357983] The buggy address belongs to the object at ffff8881049630a0
[   27.357983]  which belongs to the cache kmalloc-16 of size 16
[   27.358628] The buggy address is located 8 bytes inside of
[   27.358628]  allocated 9-byte region [ffff8881049630a0, ffff8881049630a9)
[   27.359392] 
[   27.359464] The buggy address belongs to the physical page:
[   27.359648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963
[   27.359987] flags: 0x200000000000000(node=0|zone=2)
[   27.360324] page_type: f5(slab)
[   27.360548] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.360884] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.361242] page dumped because: kasan: bad access detected
[   27.361678] 
[   27.361759] Memory state around the buggy address:
[   27.362059]  ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.362483]  ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.362774] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   27.363110]                                   ^
[   27.363375]  ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.363771]  ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.364153] ==================================================================