Hay
Date
July 24, 2025, 4:41 a.m.

Environment
qemu-x86_64

[   29.059938] ==================================================================
[   29.060270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   29.060644] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   29.061162] 
[   29.061277] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   29.061329] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   29.061342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.061364] Call Trace:
[   29.061385]  <TASK>
[   29.061404]  dump_stack_lvl+0x73/0xb0
[   29.061433]  print_report+0xd1/0x640
[   29.061457]  ? __virt_addr_valid+0x1db/0x2d0
[   29.061482]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   29.061506]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.061532]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   29.061557]  kasan_report+0x141/0x180
[   29.061591]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   29.061660]  kasan_check_range+0x10c/0x1c0
[   29.061686]  __kasan_check_write+0x18/0x20
[   29.061709]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   29.061735]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.061760]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.062006]  ? trace_hardirqs_on+0x37/0xe0
[   29.062032]  ? kasan_bitops_generic+0x92/0x1c0
[   29.062059]  kasan_bitops_generic+0x116/0x1c0
[   29.062085]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.062145]  ? __pfx_read_tsc+0x10/0x10
[   29.062168]  ? ktime_get_ts64+0x86/0x230
[   29.062193]  kunit_try_run_case+0x1a5/0x480
[   29.062218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.062240]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.062297]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.062322]  ? __kthread_parkme+0x82/0x180
[   29.062342]  ? preempt_count_sub+0x50/0x80
[   29.062365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.062388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.062441]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.062465]  kthread+0x337/0x6f0
[   29.062485]  ? trace_preempt_on+0x20/0xc0
[   29.062508]  ? __pfx_kthread+0x10/0x10
[   29.062527]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.062550]  ? calculate_sigpending+0x7b/0xa0
[   29.062615]  ? __pfx_kthread+0x10/0x10
[   29.062636]  ret_from_fork+0x116/0x1d0
[   29.062656]  ? __pfx_kthread+0x10/0x10
[   29.062676]  ret_from_fork_asm+0x1a/0x30
[   29.062708]  </TASK>
[   29.062719] 
[   29.071387] Allocated by task 309:
[   29.071568]  kasan_save_stack+0x45/0x70
[   29.071846]  kasan_save_track+0x18/0x40
[   29.072095]  kasan_save_alloc_info+0x3b/0x50
[   29.072305]  __kasan_kmalloc+0xb7/0xc0
[   29.072493]  __kmalloc_cache_noprof+0x189/0x420
[   29.072730]  kasan_bitops_generic+0x92/0x1c0
[   29.073003]  kunit_try_run_case+0x1a5/0x480
[   29.073236]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.073474]  kthread+0x337/0x6f0
[   29.073642]  ret_from_fork+0x116/0x1d0
[   29.073846]  ret_from_fork_asm+0x1a/0x30
[   29.074115] 
[   29.074199] The buggy address belongs to the object at ffff888104625b80
[   29.074199]  which belongs to the cache kmalloc-16 of size 16
[   29.074709] The buggy address is located 8 bytes inside of
[   29.074709]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.075439] 
[   29.075585] The buggy address belongs to the physical page:
[   29.075882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.076361] flags: 0x200000000000000(node=0|zone=2)
[   29.076602] page_type: f5(slab)
[   29.076850] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.077263] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.077604] page dumped because: kasan: bad access detected
[   29.077905] 
[   29.078045] Memory state around the buggy address:
[   29.078328]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.078659]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.079172] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.079411]                       ^
[   29.079593]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.080264]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.080568] ==================================================================
[   29.038660] ==================================================================
[   29.039315] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   29.039735] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   29.040140] 
[   29.040251] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   29.040339] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   29.040354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.040376] Call Trace:
[   29.040396]  <TASK>
[   29.040416]  dump_stack_lvl+0x73/0xb0
[   29.040446]  print_report+0xd1/0x640
[   29.040469]  ? __virt_addr_valid+0x1db/0x2d0
[   29.040512]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   29.040538]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.040563]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   29.040601]  kasan_report+0x141/0x180
[   29.040623]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   29.040653]  kasan_check_range+0x10c/0x1c0
[   29.040675]  __kasan_check_write+0x18/0x20
[   29.040716]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   29.040741]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.040767]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.040954]  ? trace_hardirqs_on+0x37/0xe0
[   29.040986]  ? kasan_bitops_generic+0x92/0x1c0
[   29.041014]  kasan_bitops_generic+0x116/0x1c0
[   29.041067]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.041091]  ? __pfx_read_tsc+0x10/0x10
[   29.041114]  ? ktime_get_ts64+0x86/0x230
[   29.041156]  kunit_try_run_case+0x1a5/0x480
[   29.041182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.041205]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.041231]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.041257]  ? __kthread_parkme+0x82/0x180
[   29.041277]  ? preempt_count_sub+0x50/0x80
[   29.041301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.041343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.041366]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.041390]  kthread+0x337/0x6f0
[   29.041409]  ? trace_preempt_on+0x20/0xc0
[   29.041431]  ? __pfx_kthread+0x10/0x10
[   29.041452]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.041476]  ? calculate_sigpending+0x7b/0xa0
[   29.041516]  ? __pfx_kthread+0x10/0x10
[   29.041537]  ret_from_fork+0x116/0x1d0
[   29.041570]  ? __pfx_kthread+0x10/0x10
[   29.041601]  ret_from_fork_asm+0x1a/0x30
[   29.041648]  </TASK>
[   29.041671] 
[   29.050458] Allocated by task 309:
[   29.050685]  kasan_save_stack+0x45/0x70
[   29.050958]  kasan_save_track+0x18/0x40
[   29.051131]  kasan_save_alloc_info+0x3b/0x50
[   29.051275]  __kasan_kmalloc+0xb7/0xc0
[   29.051397]  __kmalloc_cache_noprof+0x189/0x420
[   29.051625]  kasan_bitops_generic+0x92/0x1c0
[   29.051835]  kunit_try_run_case+0x1a5/0x480
[   29.052253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.052525]  kthread+0x337/0x6f0
[   29.052705]  ret_from_fork+0x116/0x1d0
[   29.052960]  ret_from_fork_asm+0x1a/0x30
[   29.053197] 
[   29.053286] The buggy address belongs to the object at ffff888104625b80
[   29.053286]  which belongs to the cache kmalloc-16 of size 16
[   29.053731] The buggy address is located 8 bytes inside of
[   29.053731]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.054310] 
[   29.054566] The buggy address belongs to the physical page:
[   29.055012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.055402] flags: 0x200000000000000(node=0|zone=2)
[   29.055673] page_type: f5(slab)
[   29.055861] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.056246] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.056584] page dumped because: kasan: bad access detected
[   29.056906] 
[   29.057041] Memory state around the buggy address:
[   29.057251]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.057558]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.057893] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.058427]                       ^
[   29.058648]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.059098]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.059445] ==================================================================
[   28.924766] ==================================================================
[   28.925290] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   28.925986] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   28.926415] 
[   28.926751] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   28.926950] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.926969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.926993] Call Trace:
[   28.927007]  <TASK>
[   28.927027]  dump_stack_lvl+0x73/0xb0
[   28.927056]  print_report+0xd1/0x640
[   28.927080]  ? __virt_addr_valid+0x1db/0x2d0
[   28.927104]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   28.927128]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.927155]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   28.927180]  kasan_report+0x141/0x180
[   28.927202]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   28.927232]  kasan_check_range+0x10c/0x1c0
[   28.927262]  __kasan_check_write+0x18/0x20
[   28.927286]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   28.927311]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.927336]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.927361]  ? trace_hardirqs_on+0x37/0xe0
[   28.927383]  ? kasan_bitops_generic+0x92/0x1c0
[   28.927409]  kasan_bitops_generic+0x116/0x1c0
[   28.927432]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.927456]  ? __pfx_read_tsc+0x10/0x10
[   28.927477]  ? ktime_get_ts64+0x86/0x230
[   28.927501]  kunit_try_run_case+0x1a5/0x480
[   28.927526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.927548]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.927583]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.927607]  ? __kthread_parkme+0x82/0x180
[   28.927627]  ? preempt_count_sub+0x50/0x80
[   28.927650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.927673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.927697]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.927719]  kthread+0x337/0x6f0
[   28.927738]  ? trace_preempt_on+0x20/0xc0
[   28.927760]  ? __pfx_kthread+0x10/0x10
[   28.927797]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.927820]  ? calculate_sigpending+0x7b/0xa0
[   28.927844]  ? __pfx_kthread+0x10/0x10
[   28.927866]  ret_from_fork+0x116/0x1d0
[   28.927885]  ? __pfx_kthread+0x10/0x10
[   28.927905]  ret_from_fork_asm+0x1a/0x30
[   28.927936]  </TASK>
[   28.927948] 
[   28.939882] Allocated by task 309:
[   28.940110]  kasan_save_stack+0x45/0x70
[   28.940477]  kasan_save_track+0x18/0x40
[   28.940676]  kasan_save_alloc_info+0x3b/0x50
[   28.941239]  __kasan_kmalloc+0xb7/0xc0
[   28.941476]  __kmalloc_cache_noprof+0x189/0x420
[   28.941659]  kasan_bitops_generic+0x92/0x1c0
[   28.942106]  kunit_try_run_case+0x1a5/0x480
[   28.942465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.942687]  kthread+0x337/0x6f0
[   28.942885]  ret_from_fork+0x116/0x1d0
[   28.943210]  ret_from_fork_asm+0x1a/0x30
[   28.943501] 
[   28.943703] The buggy address belongs to the object at ffff888104625b80
[   28.943703]  which belongs to the cache kmalloc-16 of size 16
[   28.944660] The buggy address is located 8 bytes inside of
[   28.944660]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   28.945407] 
[   28.945482] The buggy address belongs to the physical page:
[   28.945753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   28.946263] flags: 0x200000000000000(node=0|zone=2)
[   28.946505] page_type: f5(slab)
[   28.946737] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   28.947025] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.947466] page dumped because: kasan: bad access detected
[   28.948009] 
[   28.948091] Memory state around the buggy address:
[   28.948288]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.948602]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   28.949034] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.949358]                       ^
[   28.949530]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.949876]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.950407] ==================================================================
[   28.972591] ==================================================================
[   28.973156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   28.973540] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   28.973823] 
[   28.973910] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   28.974198] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.974215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.974238] Call Trace:
[   28.974252]  <TASK>
[   28.974271]  dump_stack_lvl+0x73/0xb0
[   28.974323]  print_report+0xd1/0x640
[   28.974347]  ? __virt_addr_valid+0x1db/0x2d0
[   28.974371]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   28.974394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.974420]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   28.974445]  kasan_report+0x141/0x180
[   28.974484]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   28.974514]  kasan_check_range+0x10c/0x1c0
[   28.974538]  __kasan_check_write+0x18/0x20
[   28.974561]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   28.974596]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.974622]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.974646]  ? trace_hardirqs_on+0x37/0xe0
[   28.974684]  ? kasan_bitops_generic+0x92/0x1c0
[   28.974723]  kasan_bitops_generic+0x116/0x1c0
[   28.974759]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.974842]  ? __pfx_read_tsc+0x10/0x10
[   28.974868]  ? ktime_get_ts64+0x86/0x230
[   28.974892]  kunit_try_run_case+0x1a5/0x480
[   28.974929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.974953]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.974978]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.975005]  ? __kthread_parkme+0x82/0x180
[   28.975026]  ? preempt_count_sub+0x50/0x80
[   28.975048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.975072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.975117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.975141]  kthread+0x337/0x6f0
[   28.975160]  ? trace_preempt_on+0x20/0xc0
[   28.975182]  ? __pfx_kthread+0x10/0x10
[   28.975201]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.975224]  ? calculate_sigpending+0x7b/0xa0
[   28.975248]  ? __pfx_kthread+0x10/0x10
[   28.975292]  ret_from_fork+0x116/0x1d0
[   28.975311]  ? __pfx_kthread+0x10/0x10
[   28.975332]  ret_from_fork_asm+0x1a/0x30
[   28.975363]  </TASK>
[   28.975374] 
[   28.984728] Allocated by task 309:
[   28.984924]  kasan_save_stack+0x45/0x70
[   28.985135]  kasan_save_track+0x18/0x40
[   28.985316]  kasan_save_alloc_info+0x3b/0x50
[   28.985647]  __kasan_kmalloc+0xb7/0xc0
[   28.986235]  __kmalloc_cache_noprof+0x189/0x420
[   28.986601]  kasan_bitops_generic+0x92/0x1c0
[   28.986827]  kunit_try_run_case+0x1a5/0x480
[   28.987128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.987392]  kthread+0x337/0x6f0
[   28.987585]  ret_from_fork+0x116/0x1d0
[   28.987763]  ret_from_fork_asm+0x1a/0x30
[   28.988123] 
[   28.988212] The buggy address belongs to the object at ffff888104625b80
[   28.988212]  which belongs to the cache kmalloc-16 of size 16
[   28.988708] The buggy address is located 8 bytes inside of
[   28.988708]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   28.989298] 
[   28.989393] The buggy address belongs to the physical page:
[   28.989626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   28.990129] flags: 0x200000000000000(node=0|zone=2)
[   28.990456] page_type: f5(slab)
[   28.990606] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   28.991127] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.991510] page dumped because: kasan: bad access detected
[   28.991759] 
[   28.991887] Memory state around the buggy address:
[   28.992148]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.992489]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   28.992810] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.993192]                       ^
[   28.993378]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.993728]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.994024] ==================================================================
[   29.015975] ==================================================================
[   29.016288] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   29.017505] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   29.019036] 
[   29.019143] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   29.019201] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   29.019216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.019239] Call Trace:
[   29.019271]  <TASK>
[   29.019290]  dump_stack_lvl+0x73/0xb0
[   29.019320]  print_report+0xd1/0x640
[   29.019345]  ? __virt_addr_valid+0x1db/0x2d0
[   29.019368]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   29.019393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.019420]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   29.019446]  kasan_report+0x141/0x180
[   29.019469]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   29.019498]  kasan_check_range+0x10c/0x1c0
[   29.019523]  __kasan_check_write+0x18/0x20
[   29.019546]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   29.019589]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.019618]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.019642]  ? trace_hardirqs_on+0x37/0xe0
[   29.019665]  ? kasan_bitops_generic+0x92/0x1c0
[   29.019721]  kasan_bitops_generic+0x116/0x1c0
[   29.019759]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.019801]  ? __pfx_read_tsc+0x10/0x10
[   29.019823]  ? ktime_get_ts64+0x86/0x230
[   29.019848]  kunit_try_run_case+0x1a5/0x480
[   29.019873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.019896]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.019922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.019964]  ? __kthread_parkme+0x82/0x180
[   29.019984]  ? preempt_count_sub+0x50/0x80
[   29.020008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.020031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.020055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.020079]  kthread+0x337/0x6f0
[   29.020099]  ? trace_preempt_on+0x20/0xc0
[   29.020121]  ? __pfx_kthread+0x10/0x10
[   29.020142]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.020165]  ? calculate_sigpending+0x7b/0xa0
[   29.020189]  ? __pfx_kthread+0x10/0x10
[   29.020210]  ret_from_fork+0x116/0x1d0
[   29.020228]  ? __pfx_kthread+0x10/0x10
[   29.020248]  ret_from_fork_asm+0x1a/0x30
[   29.020280]  </TASK>
[   29.020291] 
[   29.029314] Allocated by task 309:
[   29.029516]  kasan_save_stack+0x45/0x70
[   29.029743]  kasan_save_track+0x18/0x40
[   29.030033]  kasan_save_alloc_info+0x3b/0x50
[   29.030179]  __kasan_kmalloc+0xb7/0xc0
[   29.030351]  __kmalloc_cache_noprof+0x189/0x420
[   29.030605]  kasan_bitops_generic+0x92/0x1c0
[   29.030876]  kunit_try_run_case+0x1a5/0x480
[   29.031072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.031340]  kthread+0x337/0x6f0
[   29.031497]  ret_from_fork+0x116/0x1d0
[   29.031700]  ret_from_fork_asm+0x1a/0x30
[   29.031971] 
[   29.032164] The buggy address belongs to the object at ffff888104625b80
[   29.032164]  which belongs to the cache kmalloc-16 of size 16
[   29.032759] The buggy address is located 8 bytes inside of
[   29.032759]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.033568] 
[   29.033730] The buggy address belongs to the physical page:
[   29.034019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.034311] flags: 0x200000000000000(node=0|zone=2)
[   29.034566] page_type: f5(slab)
[   29.034766] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.035178] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.035477] page dumped because: kasan: bad access detected
[   29.035718] 
[   29.035811] Memory state around the buggy address:
[   29.036010]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.036291]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.036604] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.037164]                       ^
[   29.037355]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.037673]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.038098] ==================================================================
[   28.994519] ==================================================================
[   28.994798] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   28.995303] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   28.995644] 
[   28.995729] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   28.995784] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.995800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.995823] Call Trace:
[   28.995842]  <TASK>
[   28.995864]  dump_stack_lvl+0x73/0xb0
[   28.995891]  print_report+0xd1/0x640
[   28.995915]  ? __virt_addr_valid+0x1db/0x2d0
[   28.996201]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   28.996233]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.996279]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   28.996304]  kasan_report+0x141/0x180
[   28.996345]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   28.996374]  kasan_check_range+0x10c/0x1c0
[   28.996398]  __kasan_check_write+0x18/0x20
[   28.996420]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   28.996445]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.996471]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.996513]  ? trace_hardirqs_on+0x37/0xe0
[   28.996536]  ? kasan_bitops_generic+0x92/0x1c0
[   28.996563]  kasan_bitops_generic+0x116/0x1c0
[   28.996597]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.996621]  ? __pfx_read_tsc+0x10/0x10
[   28.996643]  ? ktime_get_ts64+0x86/0x230
[   28.996683]  kunit_try_run_case+0x1a5/0x480
[   28.996707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.996743]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.996782]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.996807]  ? __kthread_parkme+0x82/0x180
[   28.996840]  ? preempt_count_sub+0x50/0x80
[   28.996875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.996912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.996948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.996984]  kthread+0x337/0x6f0
[   28.997004]  ? trace_preempt_on+0x20/0xc0
[   28.997038]  ? __pfx_kthread+0x10/0x10
[   28.997059]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.997095]  ? calculate_sigpending+0x7b/0xa0
[   28.997197]  ? __pfx_kthread+0x10/0x10
[   28.997222]  ret_from_fork+0x116/0x1d0
[   28.997242]  ? __pfx_kthread+0x10/0x10
[   28.997263]  ret_from_fork_asm+0x1a/0x30
[   28.997294]  </TASK>
[   28.997306] 
[   29.006617] Allocated by task 309:
[   29.006760]  kasan_save_stack+0x45/0x70
[   29.007217]  kasan_save_track+0x18/0x40
[   29.007438]  kasan_save_alloc_info+0x3b/0x50
[   29.007658]  __kasan_kmalloc+0xb7/0xc0
[   29.007978]  __kmalloc_cache_noprof+0x189/0x420
[   29.008202]  kasan_bitops_generic+0x92/0x1c0
[   29.008416]  kunit_try_run_case+0x1a5/0x480
[   29.008624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.008991]  kthread+0x337/0x6f0
[   29.009179]  ret_from_fork+0x116/0x1d0
[   29.009341]  ret_from_fork_asm+0x1a/0x30
[   29.009523] 
[   29.009632] The buggy address belongs to the object at ffff888104625b80
[   29.009632]  which belongs to the cache kmalloc-16 of size 16
[   29.010162] The buggy address is located 8 bytes inside of
[   29.010162]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.010704] 
[   29.010796] The buggy address belongs to the physical page:
[   29.011041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.011611] flags: 0x200000000000000(node=0|zone=2)
[   29.011973] page_type: f5(slab)
[   29.012095] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.012312] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.012523] page dumped because: kasan: bad access detected
[   29.012820] 
[   29.012907] Memory state around the buggy address:
[   29.013127]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.013440]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.013761] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.014432]                       ^
[   29.014654]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.015060]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.015405] ==================================================================
[   28.950991] ==================================================================
[   28.951279] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   28.951662] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   28.952217] 
[   28.952342] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   28.952395] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.952408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.952430] Call Trace:
[   28.952451]  <TASK>
[   28.952470]  dump_stack_lvl+0x73/0xb0
[   28.952498]  print_report+0xd1/0x640
[   28.952521]  ? __virt_addr_valid+0x1db/0x2d0
[   28.952545]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   28.952569]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.952608]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   28.952632]  kasan_report+0x141/0x180
[   28.952654]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   28.952683]  kasan_check_range+0x10c/0x1c0
[   28.952706]  __kasan_check_write+0x18/0x20
[   28.952729]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   28.952755]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   28.952780]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.952804]  ? trace_hardirqs_on+0x37/0xe0
[   28.952826]  ? kasan_bitops_generic+0x92/0x1c0
[   28.952853]  kasan_bitops_generic+0x116/0x1c0
[   28.952897]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.952923]  ? __pfx_read_tsc+0x10/0x10
[   28.952958]  ? ktime_get_ts64+0x86/0x230
[   28.952983]  kunit_try_run_case+0x1a5/0x480
[   28.953008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.953043]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.953355]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.953384]  ? __kthread_parkme+0x82/0x180
[   28.953405]  ? preempt_count_sub+0x50/0x80
[   28.953429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.953453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.953477]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.953500]  kthread+0x337/0x6f0
[   28.953519]  ? trace_preempt_on+0x20/0xc0
[   28.953542]  ? __pfx_kthread+0x10/0x10
[   28.953561]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.953596]  ? calculate_sigpending+0x7b/0xa0
[   28.953620]  ? __pfx_kthread+0x10/0x10
[   28.953641]  ret_from_fork+0x116/0x1d0
[   28.953660]  ? __pfx_kthread+0x10/0x10
[   28.953680]  ret_from_fork_asm+0x1a/0x30
[   28.953711]  </TASK>
[   28.953722] 
[   28.962766] Allocated by task 309:
[   28.963032]  kasan_save_stack+0x45/0x70
[   28.963242]  kasan_save_track+0x18/0x40
[   28.963436]  kasan_save_alloc_info+0x3b/0x50
[   28.963595]  __kasan_kmalloc+0xb7/0xc0
[   28.963716]  __kmalloc_cache_noprof+0x189/0x420
[   28.963877]  kasan_bitops_generic+0x92/0x1c0
[   28.964499]  kunit_try_run_case+0x1a5/0x480
[   28.964742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.965089]  kthread+0x337/0x6f0
[   28.965286]  ret_from_fork+0x116/0x1d0
[   28.965454]  ret_from_fork_asm+0x1a/0x30
[   28.965671] 
[   28.965764] The buggy address belongs to the object at ffff888104625b80
[   28.965764]  which belongs to the cache kmalloc-16 of size 16
[   28.966417] The buggy address is located 8 bytes inside of
[   28.966417]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   28.967179] 
[   28.967285] The buggy address belongs to the physical page:
[   28.967555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   28.967942] flags: 0x200000000000000(node=0|zone=2)
[   28.968171] page_type: f5(slab)
[   28.968330] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   28.968664] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.969071] page dumped because: kasan: bad access detected
[   28.969284] 
[   28.969344] Memory state around the buggy address:
[   28.969487]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.970220]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   28.970601] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.971108]                       ^
[   28.971271]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.971629]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.972004] ==================================================================
[   29.081167] ==================================================================
[   29.081497] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   29.081937] Write of size 8 at addr ffff888104625b88 by task kunit_try_catch/309
[   29.082372] 
[   29.082503] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   29.082553] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   29.082566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.082603] Call Trace:
[   29.082621]  <TASK>
[   29.082638]  dump_stack_lvl+0x73/0xb0
[   29.082665]  print_report+0xd1/0x640
[   29.082688]  ? __virt_addr_valid+0x1db/0x2d0
[   29.082713]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   29.082740]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.082766]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   29.082795]  kasan_report+0x141/0x180
[   29.082818]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   29.082847]  kasan_check_range+0x10c/0x1c0
[   29.082871]  __kasan_check_write+0x18/0x20
[   29.082894]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   29.082922]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   29.082948]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.082973]  ? trace_hardirqs_on+0x37/0xe0
[   29.082995]  ? kasan_bitops_generic+0x92/0x1c0
[   29.083023]  kasan_bitops_generic+0x116/0x1c0
[   29.083049]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   29.083073]  ? __pfx_read_tsc+0x10/0x10
[   29.083095]  ? ktime_get_ts64+0x86/0x230
[   29.083120]  kunit_try_run_case+0x1a5/0x480
[   29.083144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.083166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.083191]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.083216]  ? __kthread_parkme+0x82/0x180
[   29.083236]  ? preempt_count_sub+0x50/0x80
[   29.083265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.083288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.083312]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.083335]  kthread+0x337/0x6f0
[   29.083355]  ? trace_preempt_on+0x20/0xc0
[   29.083377]  ? __pfx_kthread+0x10/0x10
[   29.083398]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.083421]  ? calculate_sigpending+0x7b/0xa0
[   29.083444]  ? __pfx_kthread+0x10/0x10
[   29.083561]  ret_from_fork+0x116/0x1d0
[   29.083595]  ? __pfx_kthread+0x10/0x10
[   29.083615]  ret_from_fork_asm+0x1a/0x30
[   29.083648]  </TASK>
[   29.083658] 
[   29.093098] Allocated by task 309:
[   29.093284]  kasan_save_stack+0x45/0x70
[   29.093481]  kasan_save_track+0x18/0x40
[   29.093685]  kasan_save_alloc_info+0x3b/0x50
[   29.093979]  __kasan_kmalloc+0xb7/0xc0
[   29.094619]  __kmalloc_cache_noprof+0x189/0x420
[   29.095074]  kasan_bitops_generic+0x92/0x1c0
[   29.095297]  kunit_try_run_case+0x1a5/0x480
[   29.095474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.095692]  kthread+0x337/0x6f0
[   29.095994]  ret_from_fork+0x116/0x1d0
[   29.096130]  ret_from_fork_asm+0x1a/0x30
[   29.096256] 
[   29.096319] The buggy address belongs to the object at ffff888104625b80
[   29.096319]  which belongs to the cache kmalloc-16 of size 16
[   29.096704] The buggy address is located 8 bytes inside of
[   29.096704]  allocated 9-byte region [ffff888104625b80, ffff888104625b89)
[   29.097204] 
[   29.097291] The buggy address belongs to the physical page:
[   29.097536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104625
[   29.098376] flags: 0x200000000000000(node=0|zone=2)
[   29.098669] page_type: f5(slab)
[   29.098843] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   29.099312] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.099527] page dumped because: kasan: bad access detected
[   29.099697] 
[   29.099760] Memory state around the buggy address:
[   29.099983]  ffff888104625a80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.100362]  ffff888104625b00: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   29.100764] >ffff888104625b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.101313]                       ^
[   29.101491]  ffff888104625c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.101750]  ffff888104625c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.102226] ==================================================================