Hay
Date
July 25, 2025, 3:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   34.798630] ==================================================================
[   34.800106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   34.800163] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293
[   34.801033] Call trace:
[   34.801668]  kasan_report+0xdc/0x128
[   34.802522]  kunit_try_run_case+0x170/0x3f0
[   34.803164] 
[   34.803395] Allocated by task 293:
[   34.803612]  kasan_save_track+0x20/0x40
[   34.804270]  kunit_try_run_case+0x170/0x3f0
[   34.805494] 
[   34.805671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2
[   34.806438]  fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.809063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   34.809188] 
[   34.809904] Call trace:
[   34.810867]  __asan_report_load8_noabort+0x20/0x30
[   34.813228] 
[   34.813843]  kasan_save_alloc_info+0x40/0x58
[   34.815900]  ret_from_fork+0x10/0x20
[   34.817116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.821294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   34.821427] 
[   34.822159] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.822731]  dump_stack_lvl+0x8c/0xd0
[   34.823283]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   34.824656] 
[   34.825185]  kasan_save_track+0x20/0x40
[   34.826286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.827239] The buggy address is located 8 bytes inside of
[   34.827239]  allocated 9-byte region [fff00000c91b2880, fff00000c91b2889)
[   34.829214] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.849545]     ok 64 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   34.856982] ==================================================================

[   28.127435] ==================================================================
[   28.127730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   28.128602] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   28.129224] 
[   28.129386] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.129431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.129442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.129463] Call Trace:
[   28.129479]  <TASK>
[   28.129494]  dump_stack_lvl+0x73/0xb0
[   28.129520]  print_report+0xd1/0x640
[   28.129708]  ? __virt_addr_valid+0x1db/0x2d0
[   28.129734]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   28.129763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.129831]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   28.129862]  kasan_report+0x141/0x180
[   28.129886]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   28.129919]  kasan_check_range+0x10c/0x1c0
[   28.129958]  __kasan_check_write+0x18/0x20
[   28.129983]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   28.130012]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.130041]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.130077]  ? trace_hardirqs_on+0x37/0xe0
[   28.130101]  ? kasan_bitops_generic+0x92/0x1c0
[   28.130129]  kasan_bitops_generic+0x121/0x1c0
[   28.130153]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.130180]  ? __pfx_read_tsc+0x10/0x10
[   28.130203]  ? ktime_get_ts64+0x86/0x230
[   28.130229]  kunit_try_run_case+0x1a5/0x480
[   28.130254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.130279]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.130302]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.130330]  ? __kthread_parkme+0x82/0x180
[   28.130351]  ? preempt_count_sub+0x50/0x80
[   28.130376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.130402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.130427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.130452]  kthread+0x337/0x6f0
[   28.130473]  ? trace_preempt_on+0x20/0xc0
[   28.130497]  ? __pfx_kthread+0x10/0x10
[   28.130519]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.130544]  ? calculate_sigpending+0x7b/0xa0
[   28.130569]  ? __pfx_kthread+0x10/0x10
[   28.130592]  ret_from_fork+0x116/0x1d0
[   28.130612]  ? __pfx_kthread+0x10/0x10
[   28.130634]  ret_from_fork_asm+0x1a/0x30
[   28.130667]  </TASK>
[   28.130678] 
[   28.146017] Allocated by task 310:
[   28.146393]  kasan_save_stack+0x45/0x70
[   28.146881]  kasan_save_track+0x18/0x40
[   28.147375]  kasan_save_alloc_info+0x3b/0x50
[   28.147751]  __kasan_kmalloc+0xb7/0xc0
[   28.148149]  __kmalloc_cache_noprof+0x189/0x420
[   28.148349]  kasan_bitops_generic+0x92/0x1c0
[   28.148493]  kunit_try_run_case+0x1a5/0x480
[   28.148635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.148982]  kthread+0x337/0x6f0
[   28.149182]  ret_from_fork+0x116/0x1d0
[   28.149356]  ret_from_fork_asm+0x1a/0x30
[   28.149555] 
[   28.149654] The buggy address belongs to the object at ffff8881057d7680
[   28.149654]  which belongs to the cache kmalloc-16 of size 16
[   28.150251] The buggy address is located 8 bytes inside of
[   28.150251]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   28.151066] 
[   28.151169] The buggy address belongs to the physical page:
[   28.151416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   28.151721] flags: 0x200000000000000(node=0|zone=2)
[   28.152010] page_type: f5(slab)
[   28.152273] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.152549] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.152992] page dumped because: kasan: bad access detected
[   28.153240] 
[   28.153336] Memory state around the buggy address:
[   28.153509]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.153830]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.154287] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.154570]                       ^
[   28.154748]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.155078]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.155472] ==================================================================
[   28.156239] ==================================================================
[   28.156572] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   28.157274] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   28.157615] 
[   28.157721] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.157769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.157789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.157810] Call Trace:
[   28.157822]  <TASK>
[   28.157837]  dump_stack_lvl+0x73/0xb0
[   28.157865]  print_report+0xd1/0x640
[   28.157888]  ? __virt_addr_valid+0x1db/0x2d0
[   28.157912]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   28.157939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.157979]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   28.158008]  kasan_report+0x141/0x180
[   28.158030]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   28.158064]  kasan_check_range+0x10c/0x1c0
[   28.158110]  __kasan_check_write+0x18/0x20
[   28.158135]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   28.158164]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.158211]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.158236]  ? trace_hardirqs_on+0x37/0xe0
[   28.158258]  ? kasan_bitops_generic+0x92/0x1c0
[   28.158287]  kasan_bitops_generic+0x121/0x1c0
[   28.158312]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.158337]  ? __pfx_read_tsc+0x10/0x10
[   28.158375]  ? ktime_get_ts64+0x86/0x230
[   28.158400]  kunit_try_run_case+0x1a5/0x480
[   28.158427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.158450]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.158473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.158500]  ? __kthread_parkme+0x82/0x180
[   28.158521]  ? preempt_count_sub+0x50/0x80
[   28.158545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.158570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.158595]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.158619]  kthread+0x337/0x6f0
[   28.158658]  ? trace_preempt_on+0x20/0xc0
[   28.158682]  ? __pfx_kthread+0x10/0x10
[   28.158703]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.158728]  ? calculate_sigpending+0x7b/0xa0
[   28.158753]  ? __pfx_kthread+0x10/0x10
[   28.158775]  ret_from_fork+0x116/0x1d0
[   28.158796]  ? __pfx_kthread+0x10/0x10
[   28.158833]  ret_from_fork_asm+0x1a/0x30
[   28.158865]  </TASK>
[   28.158876] 
[   28.167346] Allocated by task 310:
[   28.167542]  kasan_save_stack+0x45/0x70
[   28.167759]  kasan_save_track+0x18/0x40
[   28.167985]  kasan_save_alloc_info+0x3b/0x50
[   28.168217]  __kasan_kmalloc+0xb7/0xc0
[   28.168421]  __kmalloc_cache_noprof+0x189/0x420
[   28.168596]  kasan_bitops_generic+0x92/0x1c0
[   28.168741]  kunit_try_run_case+0x1a5/0x480
[   28.168951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.169407]  kthread+0x337/0x6f0
[   28.169539]  ret_from_fork+0x116/0x1d0
[   28.169741]  ret_from_fork_asm+0x1a/0x30
[   28.169935] 
[   28.170023] The buggy address belongs to the object at ffff8881057d7680
[   28.170023]  which belongs to the cache kmalloc-16 of size 16
[   28.170535] The buggy address is located 8 bytes inside of
[   28.170535]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   28.171010] 
[   28.171144] The buggy address belongs to the physical page:
[   28.171363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   28.171706] flags: 0x200000000000000(node=0|zone=2)
[   28.171937] page_type: f5(slab)
[   28.172135] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.172445] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.172781] page dumped because: kasan: bad access detected
[   28.173019] 
[   28.173130] Memory state around the buggy address:
[   28.173368]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.173792]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.174135] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.174411]                       ^
[   28.174573]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.174912]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.175238] ==================================================================
[   28.272391] ==================================================================
[   28.272760] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   28.273389] Read of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   28.273710] 
[   28.273906] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.273962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.273973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.273994] Call Trace:
[   28.274007]  <TASK>
[   28.274021]  dump_stack_lvl+0x73/0xb0
[   28.274047]  print_report+0xd1/0x640
[   28.274078]  ? __virt_addr_valid+0x1db/0x2d0
[   28.274103]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   28.274130]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.274157]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   28.274186]  kasan_report+0x141/0x180
[   28.274220]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   28.274253]  __asan_report_load8_noabort+0x18/0x20
[   28.274289]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   28.274318]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.274347]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.274372]  ? trace_hardirqs_on+0x37/0xe0
[   28.274395]  ? kasan_bitops_generic+0x92/0x1c0
[   28.274424]  kasan_bitops_generic+0x121/0x1c0
[   28.274449]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.274475]  ? __pfx_read_tsc+0x10/0x10
[   28.274498]  ? ktime_get_ts64+0x86/0x230
[   28.274522]  kunit_try_run_case+0x1a5/0x480
[   28.274547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.274571]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.274593]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.274620]  ? __kthread_parkme+0x82/0x180
[   28.274641]  ? preempt_count_sub+0x50/0x80
[   28.274664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.274690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.274724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.274750]  kthread+0x337/0x6f0
[   28.274770]  ? trace_preempt_on+0x20/0xc0
[   28.274803]  ? __pfx_kthread+0x10/0x10
[   28.274825]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.274850]  ? calculate_sigpending+0x7b/0xa0
[   28.274874]  ? __pfx_kthread+0x10/0x10
[   28.274897]  ret_from_fork+0x116/0x1d0
[   28.274916]  ? __pfx_kthread+0x10/0x10
[   28.274938]  ret_from_fork_asm+0x1a/0x30
[   28.274979]  </TASK>
[   28.274989] 
[   28.283606] Allocated by task 310:
[   28.283778]  kasan_save_stack+0x45/0x70
[   28.283937]  kasan_save_track+0x18/0x40
[   28.284082]  kasan_save_alloc_info+0x3b/0x50
[   28.284230]  __kasan_kmalloc+0xb7/0xc0
[   28.284363]  __kmalloc_cache_noprof+0x189/0x420
[   28.284519]  kasan_bitops_generic+0x92/0x1c0
[   28.284669]  kunit_try_run_case+0x1a5/0x480
[   28.284817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.285003]  kthread+0x337/0x6f0
[   28.285128]  ret_from_fork+0x116/0x1d0
[   28.285271]  ret_from_fork_asm+0x1a/0x30
[   28.285464] 
[   28.285552] The buggy address belongs to the object at ffff8881057d7680
[   28.285552]  which belongs to the cache kmalloc-16 of size 16
[   28.286089] The buggy address is located 8 bytes inside of
[   28.286089]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   28.286963] 
[   28.287061] The buggy address belongs to the physical page:
[   28.287326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   28.287684] flags: 0x200000000000000(node=0|zone=2)
[   28.287921] page_type: f5(slab)
[   28.288064] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.288339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.288570] page dumped because: kasan: bad access detected
[   28.288744] 
[   28.288808] Memory state around the buggy address:
[   28.288980]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.289624]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.289968] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.290593]                       ^
[   28.290790]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.291150]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.291473] ==================================================================
[   28.253166] ==================================================================
[   28.253646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   28.254187] Read of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   28.254508] 
[   28.254607] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.254654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.254665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.254686] Call Trace:
[   28.254709]  <TASK>
[   28.254724]  dump_stack_lvl+0x73/0xb0
[   28.254751]  print_report+0xd1/0x640
[   28.254774]  ? __virt_addr_valid+0x1db/0x2d0
[   28.254810]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   28.254837]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.254864]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   28.254900]  kasan_report+0x141/0x180
[   28.254924]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   28.254973]  kasan_check_range+0x10c/0x1c0
[   28.255000]  __kasan_check_read+0x15/0x20
[   28.255024]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   28.255063]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.255094]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.255127]  ? trace_hardirqs_on+0x37/0xe0
[   28.255149]  ? kasan_bitops_generic+0x92/0x1c0
[   28.255178]  kasan_bitops_generic+0x121/0x1c0
[   28.255213]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.255238]  ? __pfx_read_tsc+0x10/0x10
[   28.255262]  ? ktime_get_ts64+0x86/0x230
[   28.255287]  kunit_try_run_case+0x1a5/0x480
[   28.255313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.255338]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.255361]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.255388]  ? __kthread_parkme+0x82/0x180
[   28.255409]  ? preempt_count_sub+0x50/0x80
[   28.255434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.255459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.255484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.255509]  kthread+0x337/0x6f0
[   28.255529]  ? trace_preempt_on+0x20/0xc0
[   28.255553]  ? __pfx_kthread+0x10/0x10
[   28.255575]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.255600]  ? calculate_sigpending+0x7b/0xa0
[   28.255624]  ? __pfx_kthread+0x10/0x10
[   28.255646]  ret_from_fork+0x116/0x1d0
[   28.255666]  ? __pfx_kthread+0x10/0x10
[   28.255688]  ret_from_fork_asm+0x1a/0x30
[   28.255730]  </TASK>
[   28.255740] 
[   28.264154] Allocated by task 310:
[   28.264347]  kasan_save_stack+0x45/0x70
[   28.264532]  kasan_save_track+0x18/0x40
[   28.264724]  kasan_save_alloc_info+0x3b/0x50
[   28.264931]  __kasan_kmalloc+0xb7/0xc0
[   28.265075]  __kmalloc_cache_noprof+0x189/0x420
[   28.265237]  kasan_bitops_generic+0x92/0x1c0
[   28.265401]  kunit_try_run_case+0x1a5/0x480
[   28.265628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.265882]  kthread+0x337/0x6f0
[   28.266058]  ret_from_fork+0x116/0x1d0
[   28.266272]  ret_from_fork_asm+0x1a/0x30
[   28.266411] 
[   28.266476] The buggy address belongs to the object at ffff8881057d7680
[   28.266476]  which belongs to the cache kmalloc-16 of size 16
[   28.267329] The buggy address is located 8 bytes inside of
[   28.267329]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   28.267847] 
[   28.267939] The buggy address belongs to the physical page:
[   28.268272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   28.268613] flags: 0x200000000000000(node=0|zone=2)
[   28.268826] page_type: f5(slab)
[   28.269020] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.269390] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.269715] page dumped because: kasan: bad access detected
[   28.269952] 
[   28.270061] Memory state around the buggy address:
[   28.270280]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.270598]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.270916] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.271243]                       ^
[   28.271415]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.271709]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.271966] ==================================================================
[   28.229446] ==================================================================
[   28.230147] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   28.231303] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   28.231966] 
[   28.232136] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.232185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.232198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.232218] Call Trace:
[   28.232233]  <TASK>
[   28.232250]  dump_stack_lvl+0x73/0xb0
[   28.232278]  print_report+0xd1/0x640
[   28.232302]  ? __virt_addr_valid+0x1db/0x2d0
[   28.232337]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   28.232365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.232391]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   28.232431]  kasan_report+0x141/0x180
[   28.232453]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   28.232486]  kasan_check_range+0x10c/0x1c0
[   28.232510]  __kasan_check_write+0x18/0x20
[   28.232534]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   28.232562]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.232595]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.232620]  ? trace_hardirqs_on+0x37/0xe0
[   28.232653]  ? kasan_bitops_generic+0x92/0x1c0
[   28.232681]  kasan_bitops_generic+0x121/0x1c0
[   28.232705]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.232731]  ? __pfx_read_tsc+0x10/0x10
[   28.232753]  ? ktime_get_ts64+0x86/0x230
[   28.232777]  kunit_try_run_case+0x1a5/0x480
[   28.232801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.232825]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.232847]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.232874]  ? __kthread_parkme+0x82/0x180
[   28.232896]  ? preempt_count_sub+0x50/0x80
[   28.232920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.232955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.232980]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.233005]  kthread+0x337/0x6f0
[   28.233026]  ? trace_preempt_on+0x20/0xc0
[   28.233049]  ? __pfx_kthread+0x10/0x10
[   28.233080]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.233106]  ? calculate_sigpending+0x7b/0xa0
[   28.233136]  ? __pfx_kthread+0x10/0x10
[   28.233158]  ret_from_fork+0x116/0x1d0
[   28.233177]  ? __pfx_kthread+0x10/0x10
[   28.233199]  ret_from_fork_asm+0x1a/0x30
[   28.233231]  </TASK>
[   28.233243] 
[   28.245147] Allocated by task 310:
[   28.245302]  kasan_save_stack+0x45/0x70
[   28.245511]  kasan_save_track+0x18/0x40
[   28.245647]  kasan_save_alloc_info+0x3b/0x50
[   28.245797]  __kasan_kmalloc+0xb7/0xc0
[   28.245929]  __kmalloc_cache_noprof+0x189/0x420
[   28.246156]  kasan_bitops_generic+0x92/0x1c0
[   28.246361]  kunit_try_run_case+0x1a5/0x480
[   28.246572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.246823]  kthread+0x337/0x6f0
[   28.247028]  ret_from_fork+0x116/0x1d0
[   28.247222]  ret_from_fork_asm+0x1a/0x30
[   28.247363] 
[   28.247451] The buggy address belongs to the object at ffff8881057d7680
[   28.247451]  which belongs to the cache kmalloc-16 of size 16
[   28.247935] The buggy address is located 8 bytes inside of
[   28.247935]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   28.248534] 
[   28.248648] The buggy address belongs to the physical page:
[   28.248872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   28.249226] flags: 0x200000000000000(node=0|zone=2)
[   28.249476] page_type: f5(slab)
[   28.249616] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.249937] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.250404] page dumped because: kasan: bad access detected
[   28.250630] 
[   28.250741] Memory state around the buggy address:
[   28.250935]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.251274]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.251581] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.251800]                       ^
[   28.251940]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.252285]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.252631] ==================================================================
[   28.198998] ==================================================================
[   28.199605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   28.200569] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   28.201289] 
[   28.201384] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.201433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.201446] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.201467] Call Trace:
[   28.201482]  <TASK>
[   28.201497]  dump_stack_lvl+0x73/0xb0
[   28.201527]  print_report+0xd1/0x640
[   28.201549]  ? __virt_addr_valid+0x1db/0x2d0
[   28.201572]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   28.201600]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.201627]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   28.201655]  kasan_report+0x141/0x180
[   28.201678]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   28.201711]  kasan_check_range+0x10c/0x1c0
[   28.201734]  __kasan_check_write+0x18/0x20
[   28.201759]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   28.201787]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.201816]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.201840]  ? trace_hardirqs_on+0x37/0xe0
[   28.201862]  ? kasan_bitops_generic+0x92/0x1c0
[   28.201890]  kasan_bitops_generic+0x121/0x1c0
[   28.201914]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.201940]  ? __pfx_read_tsc+0x10/0x10
[   28.202193]  ? ktime_get_ts64+0x86/0x230
[   28.202236]  kunit_try_run_case+0x1a5/0x480
[   28.202262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.202318]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.202342]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.202369]  ? __kthread_parkme+0x82/0x180
[   28.202389]  ? preempt_count_sub+0x50/0x80
[   28.202414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.202439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.202464]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.202491]  kthread+0x337/0x6f0
[   28.202512]  ? trace_preempt_on+0x20/0xc0
[   28.202535]  ? __pfx_kthread+0x10/0x10
[   28.202556]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.202581]  ? calculate_sigpending+0x7b/0xa0
[   28.202606]  ? __pfx_kthread+0x10/0x10
[   28.202630]  ret_from_fork+0x116/0x1d0
[   28.202650]  ? __pfx_kthread+0x10/0x10
[   28.202672]  ret_from_fork_asm+0x1a/0x30
[   28.202704]  </TASK>
[   28.202715] 
[   28.217798] Allocated by task 310:
[   28.218178]  kasan_save_stack+0x45/0x70
[   28.218491]  kasan_save_track+0x18/0x40
[   28.218639]  kasan_save_alloc_info+0x3b/0x50
[   28.218896]  __kasan_kmalloc+0xb7/0xc0
[   28.219297]  __kmalloc_cache_noprof+0x189/0x420
[   28.219714]  kasan_bitops_generic+0x92/0x1c0
[   28.220031]  kunit_try_run_case+0x1a5/0x480
[   28.220365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.220545]  kthread+0x337/0x6f0
[   28.220664]  ret_from_fork+0x116/0x1d0
[   28.220796]  ret_from_fork_asm+0x1a/0x30
[   28.220934] 
[   28.221132] The buggy address belongs to the object at ffff8881057d7680
[   28.221132]  which belongs to the cache kmalloc-16 of size 16
[   28.222239] The buggy address is located 8 bytes inside of
[   28.222239]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   28.223302] 
[   28.223457] The buggy address belongs to the physical page:
[   28.223960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   28.224397] flags: 0x200000000000000(node=0|zone=2)
[   28.224565] page_type: f5(slab)
[   28.224686] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.224922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.225176] page dumped because: kasan: bad access detected
[   28.225352] 
[   28.225418] Memory state around the buggy address:
[   28.225574]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.225794]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.226215] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.226825]                       ^
[   28.227174]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.227796]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.228498] ==================================================================
[   28.067052] ==================================================================
[   28.067565] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   28.068022] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   28.068639] 
[   28.068807] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.068854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.068866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.068926] Call Trace:
[   28.068941]  <TASK>
[   28.068968]  dump_stack_lvl+0x73/0xb0
[   28.068997]  print_report+0xd1/0x640
[   28.069020]  ? __virt_addr_valid+0x1db/0x2d0
[   28.069044]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   28.069084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.069112]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   28.069145]  kasan_report+0x141/0x180
[   28.069168]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   28.069201]  kasan_check_range+0x10c/0x1c0
[   28.069226]  __kasan_check_write+0x18/0x20
[   28.069250]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   28.069279]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.069309]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.069334]  ? trace_hardirqs_on+0x37/0xe0
[   28.069355]  ? kasan_bitops_generic+0x92/0x1c0
[   28.069384]  kasan_bitops_generic+0x121/0x1c0
[   28.069409]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.069434]  ? __pfx_read_tsc+0x10/0x10
[   28.069456]  ? ktime_get_ts64+0x86/0x230
[   28.069482]  kunit_try_run_case+0x1a5/0x480
[   28.069508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.069532]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.069554]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.069582]  ? __kthread_parkme+0x82/0x180
[   28.069603]  ? preempt_count_sub+0x50/0x80
[   28.069628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.069654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.069679]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.069705]  kthread+0x337/0x6f0
[   28.069725]  ? trace_preempt_on+0x20/0xc0
[   28.069748]  ? __pfx_kthread+0x10/0x10
[   28.069770]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.069837]  ? calculate_sigpending+0x7b/0xa0
[   28.069863]  ? __pfx_kthread+0x10/0x10
[   28.069887]  ret_from_fork+0x116/0x1d0
[   28.069908]  ? __pfx_kthread+0x10/0x10
[   28.069930]  ret_from_fork_asm+0x1a/0x30
[   28.069972]  </TASK>
[   28.069984] 
[   28.083711] Allocated by task 310:
[   28.084107]  kasan_save_stack+0x45/0x70
[   28.084475]  kasan_save_track+0x18/0x40
[   28.084632]  kasan_save_alloc_info+0x3b/0x50
[   28.084819]  __kasan_kmalloc+0xb7/0xc0
[   28.085179]  __kmalloc_cache_noprof+0x189/0x420
[   28.085596]  kasan_bitops_generic+0x92/0x1c0
[   28.086026]  kunit_try_run_case+0x1a5/0x480
[   28.086455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.086670]  kthread+0x337/0x6f0
[   28.086808]  ret_from_fork+0x116/0x1d0
[   28.087383]  ret_from_fork_asm+0x1a/0x30
[   28.087747] 
[   28.087928] The buggy address belongs to the object at ffff8881057d7680
[   28.087928]  which belongs to the cache kmalloc-16 of size 16
[   28.088894] The buggy address is located 8 bytes inside of
[   28.088894]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   28.090116] 
[   28.090317] The buggy address belongs to the physical page:
[   28.090499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   28.090745] flags: 0x200000000000000(node=0|zone=2)
[   28.090910] page_type: f5(slab)
[   28.091213] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.091967] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.092787] page dumped because: kasan: bad access detected
[   28.093417] 
[   28.093579] Memory state around the buggy address:
[   28.094254]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.094889]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.095341] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.095567]                       ^
[   28.095692]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.096020]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.096492] ==================================================================
[   28.176547] ==================================================================
[   28.177113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   28.177536] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   28.177861] 
[   28.177952] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.178001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.178032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.178064] Call Trace:
[   28.178078]  <TASK>
[   28.178092]  dump_stack_lvl+0x73/0xb0
[   28.178120]  print_report+0xd1/0x640
[   28.178143]  ? __virt_addr_valid+0x1db/0x2d0
[   28.178185]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   28.178213]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.178240]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   28.178269]  kasan_report+0x141/0x180
[   28.178292]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   28.178345]  kasan_check_range+0x10c/0x1c0
[   28.178371]  __kasan_check_write+0x18/0x20
[   28.178396]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   28.178425]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.178454]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.178479]  ? trace_hardirqs_on+0x37/0xe0
[   28.178518]  ? kasan_bitops_generic+0x92/0x1c0
[   28.178547]  kasan_bitops_generic+0x121/0x1c0
[   28.178572]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.178598]  ? __pfx_read_tsc+0x10/0x10
[   28.178622]  ? ktime_get_ts64+0x86/0x230
[   28.178647]  kunit_try_run_case+0x1a5/0x480
[   28.178674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.178698]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.178721]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.178749]  ? __kthread_parkme+0x82/0x180
[   28.178769]  ? preempt_count_sub+0x50/0x80
[   28.178793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.178837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.178861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.178887]  kthread+0x337/0x6f0
[   28.178907]  ? trace_preempt_on+0x20/0xc0
[   28.178931]  ? __pfx_kthread+0x10/0x10
[   28.178962]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.178988]  ? calculate_sigpending+0x7b/0xa0
[   28.179029]  ? __pfx_kthread+0x10/0x10
[   28.179061]  ret_from_fork+0x116/0x1d0
[   28.179082]  ? __pfx_kthread+0x10/0x10
[   28.179104]  ret_from_fork_asm+0x1a/0x30
[   28.179137]  </TASK>
[   28.179148] 
[   28.187236] Allocated by task 310:
[   28.187434]  kasan_save_stack+0x45/0x70
[   28.187630]  kasan_save_track+0x18/0x40
[   28.187817]  kasan_save_alloc_info+0x3b/0x50
[   28.188063]  __kasan_kmalloc+0xb7/0xc0
[   28.188250]  __kmalloc_cache_noprof+0x189/0x420
[   28.188469]  kasan_bitops_generic+0x92/0x1c0
[   28.188673]  kunit_try_run_case+0x1a5/0x480
[   28.188847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.189033]  kthread+0x337/0x6f0
[   28.189213]  ret_from_fork+0x116/0x1d0
[   28.189396]  ret_from_fork_asm+0x1a/0x30
[   28.189586] 
[   28.189671] The buggy address belongs to the object at ffff8881057d7680
[   28.189671]  which belongs to the cache kmalloc-16 of size 16
[   28.190391] The buggy address is located 8 bytes inside of
[   28.190391]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   28.190878] 
[   28.190979] The buggy address belongs to the physical page:
[   28.191220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   28.191560] flags: 0x200000000000000(node=0|zone=2)
[   28.191815] page_type: f5(slab)
[   28.191932] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.192293] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.192626] page dumped because: kasan: bad access detected
[   28.192871] 
[   28.192979] Memory state around the buggy address:
[   28.193222]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.193436]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.193697] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.196036]                       ^
[   28.196376]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.196711]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.197039] ==================================================================
[   28.097332] ==================================================================
[   28.097760] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   28.098521] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310
[   28.099216] 
[   28.099405] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.099455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.099468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.099489] Call Trace:
[   28.099504]  <TASK>
[   28.099520]  dump_stack_lvl+0x73/0xb0
[   28.099547]  print_report+0xd1/0x640
[   28.099570]  ? __virt_addr_valid+0x1db/0x2d0
[   28.099595]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   28.099623]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.099650]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   28.099678]  kasan_report+0x141/0x180
[   28.099702]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   28.099736]  kasan_check_range+0x10c/0x1c0
[   28.099761]  __kasan_check_write+0x18/0x20
[   28.099799]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   28.099828]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.099858]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.099883]  ? trace_hardirqs_on+0x37/0xe0
[   28.099906]  ? kasan_bitops_generic+0x92/0x1c0
[   28.099935]  kasan_bitops_generic+0x121/0x1c0
[   28.099970]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.099996]  ? __pfx_read_tsc+0x10/0x10
[   28.100019]  ? ktime_get_ts64+0x86/0x230
[   28.100051]  kunit_try_run_case+0x1a5/0x480
[   28.100077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.100110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.100133]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.100161]  ? __kthread_parkme+0x82/0x180
[   28.100182]  ? preempt_count_sub+0x50/0x80
[   28.100207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.100232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.100256]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.100282]  kthread+0x337/0x6f0
[   28.100303]  ? trace_preempt_on+0x20/0xc0
[   28.100325]  ? __pfx_kthread+0x10/0x10
[   28.100347]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.100372]  ? calculate_sigpending+0x7b/0xa0
[   28.100397]  ? __pfx_kthread+0x10/0x10
[   28.100420]  ret_from_fork+0x116/0x1d0
[   28.100440]  ? __pfx_kthread+0x10/0x10
[   28.100462]  ret_from_fork_asm+0x1a/0x30
[   28.100495]  </TASK>
[   28.100507] 
[   28.114565] Allocated by task 310:
[   28.114913]  kasan_save_stack+0x45/0x70
[   28.115188]  kasan_save_track+0x18/0x40
[   28.115545]  kasan_save_alloc_info+0x3b/0x50
[   28.116028]  __kasan_kmalloc+0xb7/0xc0
[   28.116278]  __kmalloc_cache_noprof+0x189/0x420
[   28.116436]  kasan_bitops_generic+0x92/0x1c0
[   28.116587]  kunit_try_run_case+0x1a5/0x480
[   28.116734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.117535]  kthread+0x337/0x6f0
[   28.117961]  ret_from_fork+0x116/0x1d0
[   28.118505]  ret_from_fork_asm+0x1a/0x30
[   28.118937] 
[   28.119207] The buggy address belongs to the object at ffff8881057d7680
[   28.119207]  which belongs to the cache kmalloc-16 of size 16
[   28.120515] The buggy address is located 8 bytes inside of
[   28.120515]  allocated 9-byte region [ffff8881057d7680, ffff8881057d7689)
[   28.121397] 
[   28.121470] The buggy address belongs to the physical page:
[   28.121651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7
[   28.122178] flags: 0x200000000000000(node=0|zone=2)
[   28.122630] page_type: f5(slab)
[   28.123087] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.123762] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.124496] page dumped because: kasan: bad access detected
[   28.125063] 
[   28.125140] Memory state around the buggy address:
[   28.125300]  ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.125520]  ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.125739] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.125975]                       ^
[   28.126169]  ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.126539]  ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.126961] ==================================================================