Hay
Date
May 13, 2025, 12:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.562556] ==================================================================
[   21.562892] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   21.562968] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.563066] 
[   21.563106] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.563330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.563363] Hardware name: linux,dummy-virt (DT)
[   21.563402] Call trace:
[   21.563463]  show_stack+0x20/0x38 (C)
[   21.563577]  dump_stack_lvl+0x8c/0xd0
[   21.563644]  print_report+0x118/0x608
[   21.563759]  kasan_report+0xdc/0x128
[   21.563862]  kasan_check_range+0x100/0x1a8
[   21.563998]  __kasan_check_write+0x20/0x30
[   21.564056]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   21.564114]  kasan_bitops_generic+0x110/0x1c8
[   21.564531]  kunit_try_run_case+0x170/0x3f0
[   21.564593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.564953]  kthread+0x328/0x630
[   21.565067]  ret_from_fork+0x10/0x20
[   21.565193] 
[   21.565234] Allocated by task 261:
[   21.565276]  kasan_save_stack+0x3c/0x68
[   21.565412]  kasan_save_track+0x20/0x40
[   21.565461]  kasan_save_alloc_info+0x40/0x58
[   21.565507]  __kasan_kmalloc+0xd4/0xd8
[   21.565551]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.565598]  kasan_bitops_generic+0xa0/0x1c8
[   21.565645]  kunit_try_run_case+0x170/0x3f0
[   21.565706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.565760]  kthread+0x328/0x630
[   21.565823]  ret_from_fork+0x10/0x20
[   21.565902] 
[   21.565933] The buggy address belongs to the object at fff00000c4035140
[   21.565933]  which belongs to the cache kmalloc-16 of size 16
[   21.566021] The buggy address is located 8 bytes inside of
[   21.566021]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.566094] 
[   21.566121] The buggy address belongs to the physical page:
[   21.566160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.566492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.566568] page_type: f5(slab)
[   21.567555] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.568145] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.568225] page dumped because: kasan: bad access detected
[   21.568269] 
[   21.568311] Memory state around the buggy address:
[   21.568364]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.568432]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.568484] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.568528]                                               ^
[   21.568572]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.568628]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.568672] ==================================================================
[   21.569740] ==================================================================
[   21.569838] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   21.569921] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.570177] 
[   21.570474] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.570871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.570912] Hardware name: linux,dummy-virt (DT)
[   21.571079] Call trace:
[   21.571128]  show_stack+0x20/0x38 (C)
[   21.571202]  dump_stack_lvl+0x8c/0xd0
[   21.571258]  print_report+0x118/0x608
[   21.571314]  kasan_report+0xdc/0x128
[   21.571809]  __asan_report_load8_noabort+0x20/0x30
[   21.571996]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   21.572170]  kasan_bitops_generic+0x110/0x1c8
[   21.572377]  kunit_try_run_case+0x170/0x3f0
[   21.572573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.572645]  kthread+0x328/0x630
[   21.572864]  ret_from_fork+0x10/0x20
[   21.573164] 
[   21.573258] Allocated by task 261:
[   21.573394]  kasan_save_stack+0x3c/0x68
[   21.573606]  kasan_save_track+0x20/0x40
[   21.573667]  kasan_save_alloc_info+0x40/0x58
[   21.574087]  __kasan_kmalloc+0xd4/0xd8
[   21.574267]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.574339]  kasan_bitops_generic+0xa0/0x1c8
[   21.574543]  kunit_try_run_case+0x170/0x3f0
[   21.574606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.574849]  kthread+0x328/0x630
[   21.574949]  ret_from_fork+0x10/0x20
[   21.575103] 
[   21.575131] The buggy address belongs to the object at fff00000c4035140
[   21.575131]  which belongs to the cache kmalloc-16 of size 16
[   21.575201] The buggy address is located 8 bytes inside of
[   21.575201]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.575432] 
[   21.575468] The buggy address belongs to the physical page:
[   21.575727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.575941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.576168] page_type: f5(slab)
[   21.576253] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.576317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.576669] page dumped because: kasan: bad access detected
[   21.576978] 
[   21.577016] Memory state around the buggy address:
[   21.577071]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.577312]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.577585] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.577693]                                               ^
[   21.577754]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.578027]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.578206] ==================================================================
[   21.535510] ==================================================================
[   21.535592] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   21.535668] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.535727] 
[   21.535771] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.535870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.535902] Hardware name: linux,dummy-virt (DT)
[   21.535941] Call trace:
[   21.535987]  show_stack+0x20/0x38 (C)
[   21.536053]  dump_stack_lvl+0x8c/0xd0
[   21.536111]  print_report+0x118/0x608
[   21.536164]  kasan_report+0xdc/0x128
[   21.536217]  kasan_check_range+0x100/0x1a8
[   21.536270]  __kasan_check_write+0x20/0x30
[   21.536326]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   21.536385]  kasan_bitops_generic+0x110/0x1c8
[   21.536439]  kunit_try_run_case+0x170/0x3f0
[   21.536488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.536544]  kthread+0x328/0x630
[   21.536594]  ret_from_fork+0x10/0x20
[   21.536648] 
[   21.536671] Allocated by task 261:
[   21.536705]  kasan_save_stack+0x3c/0x68
[   21.536754]  kasan_save_track+0x20/0x40
[   21.536796]  kasan_save_alloc_info+0x40/0x58
[   21.537379]  __kasan_kmalloc+0xd4/0xd8
[   21.537507]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.537617]  kasan_bitops_generic+0xa0/0x1c8
[   21.537748]  kunit_try_run_case+0x170/0x3f0
[   21.537929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.538038]  kthread+0x328/0x630
[   21.538155]  ret_from_fork+0x10/0x20
[   21.538270] 
[   21.538343] The buggy address belongs to the object at fff00000c4035140
[   21.538343]  which belongs to the cache kmalloc-16 of size 16
[   21.538663] The buggy address is located 8 bytes inside of
[   21.538663]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.538775] 
[   21.538806] The buggy address belongs to the physical page:
[   21.538848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.539225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.539486] page_type: f5(slab)
[   21.539564] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.539630] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.539866] page dumped because: kasan: bad access detected
[   21.539963] 
[   21.540059] Memory state around the buggy address:
[   21.540114]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.540218]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.540306] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.540356]                                               ^
[   21.540402]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.540742]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.540821] ==================================================================
[   21.485671] ==================================================================
[   21.485997] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.486242] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.486307] 
[   21.486415] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.486526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.486897] Hardware name: linux,dummy-virt (DT)
[   21.486948] Call trace:
[   21.487054]  show_stack+0x20/0x38 (C)
[   21.487130]  dump_stack_lvl+0x8c/0xd0
[   21.487191]  print_report+0x118/0x608
[   21.487259]  kasan_report+0xdc/0x128
[   21.487314]  kasan_check_range+0x100/0x1a8
[   21.487371]  __kasan_check_write+0x20/0x30
[   21.488107]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.488295]  kasan_bitops_generic+0x110/0x1c8
[   21.488400]  kunit_try_run_case+0x170/0x3f0
[   21.488758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.488842]  kthread+0x328/0x630
[   21.488936]  ret_from_fork+0x10/0x20
[   21.489025] 
[   21.489072] Allocated by task 261:
[   21.489305]  kasan_save_stack+0x3c/0x68
[   21.489582]  kasan_save_track+0x20/0x40
[   21.489951]  kasan_save_alloc_info+0x40/0x58
[   21.490116]  __kasan_kmalloc+0xd4/0xd8
[   21.490252]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.490314]  kasan_bitops_generic+0xa0/0x1c8
[   21.490633]  kunit_try_run_case+0x170/0x3f0
[   21.490759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.490827]  kthread+0x328/0x630
[   21.490934]  ret_from_fork+0x10/0x20
[   21.490993] 
[   21.491024] The buggy address belongs to the object at fff00000c4035140
[   21.491024]  which belongs to the cache kmalloc-16 of size 16
[   21.491344] The buggy address is located 8 bytes inside of
[   21.491344]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.491545] 
[   21.491598] The buggy address belongs to the physical page:
[   21.491884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.492069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.492136] page_type: f5(slab)
[   21.492346] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.493299] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.493412] page dumped because: kasan: bad access detected
[   21.493455] 
[   21.493499] Memory state around the buggy address:
[   21.493546]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.493614]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.493823] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.493960]                                               ^
[   21.494024]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.494080]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.494322] ==================================================================
[   21.553925] ==================================================================
[   21.554012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   21.554086] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.554152] 
[   21.554236] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.554427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.555005] Hardware name: linux,dummy-virt (DT)
[   21.555139] Call trace:
[   21.555179]  show_stack+0x20/0x38 (C)
[   21.555308]  dump_stack_lvl+0x8c/0xd0
[   21.555404]  print_report+0x118/0x608
[   21.555463]  kasan_report+0xdc/0x128
[   21.555518]  kasan_check_range+0x100/0x1a8
[   21.555628]  __kasan_check_write+0x20/0x30
[   21.555706]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   21.555776]  kasan_bitops_generic+0x110/0x1c8
[   21.555854]  kunit_try_run_case+0x170/0x3f0
[   21.555911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.556118]  kthread+0x328/0x630
[   21.556228]  ret_from_fork+0x10/0x20
[   21.556410] 
[   21.556572] Allocated by task 261:
[   21.557017]  kasan_save_stack+0x3c/0x68
[   21.557221]  kasan_save_track+0x20/0x40
[   21.557502]  kasan_save_alloc_info+0x40/0x58
[   21.557579]  __kasan_kmalloc+0xd4/0xd8
[   21.557922]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.558276]  kasan_bitops_generic+0xa0/0x1c8
[   21.558360]  kunit_try_run_case+0x170/0x3f0
[   21.558472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.558753]  kthread+0x328/0x630
[   21.558847]  ret_from_fork+0x10/0x20
[   21.559006] 
[   21.559158] The buggy address belongs to the object at fff00000c4035140
[   21.559158]  which belongs to the cache kmalloc-16 of size 16
[   21.559237] The buggy address is located 8 bytes inside of
[   21.559237]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.559332] 
[   21.559401] The buggy address belongs to the physical page:
[   21.559488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.559764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.559832] page_type: f5(slab)
[   21.559884] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.559960] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.560025] page dumped because: kasan: bad access detected
[   21.560061] 
[   21.560085] Memory state around the buggy address:
[   21.560124]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.560176]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.560223] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.560873]                                               ^
[   21.560933]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.561049]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.561093] ==================================================================
[   21.509681] ==================================================================
[   21.509765] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.509860] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.509924] 
[   21.509991] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.510101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.510136] Hardware name: linux,dummy-virt (DT)
[   21.510178] Call trace:
[   21.510209]  show_stack+0x20/0x38 (C)
[   21.510274]  dump_stack_lvl+0x8c/0xd0
[   21.510331]  print_report+0x118/0x608
[   21.510388]  kasan_report+0xdc/0x128
[   21.510441]  kasan_check_range+0x100/0x1a8
[   21.515424]  __kasan_check_write+0x20/0x30
[   21.515912]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.516052]  kasan_bitops_generic+0x110/0x1c8
[   21.516778]  kunit_try_run_case+0x170/0x3f0
[   21.516911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.517488]  kthread+0x328/0x630
[   21.517722]  ret_from_fork+0x10/0x20
[   21.517789] 
[   21.518601] Allocated by task 261:
[   21.518999]  kasan_save_stack+0x3c/0x68
[   21.519072]  kasan_save_track+0x20/0x40
[   21.519118]  kasan_save_alloc_info+0x40/0x58
[   21.519902]  __kasan_kmalloc+0xd4/0xd8
[   21.520221]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.520499]  kasan_bitops_generic+0xa0/0x1c8
[   21.521174]  kunit_try_run_case+0x170/0x3f0
[   21.521412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.521499]  kthread+0x328/0x630
[   21.522031]  ret_from_fork+0x10/0x20
[   21.522583] 
[   21.522633] The buggy address belongs to the object at fff00000c4035140
[   21.522633]  which belongs to the cache kmalloc-16 of size 16
[   21.522713] The buggy address is located 8 bytes inside of
[   21.522713]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.523365] 
[   21.523734] The buggy address belongs to the physical page:
[   21.523905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.524468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.524556] page_type: f5(slab)
[   21.525140] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.525408] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.525465] page dumped because: kasan: bad access detected
[   21.525506] 
[   21.525530] Memory state around the buggy address:
[   21.525570]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.526153]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.526826] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.526881]                                               ^
[   21.526938]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.527001]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.527403] ==================================================================
[   21.541881] ==================================================================
[   21.542037] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   21.542192] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.542310] 
[   21.542389] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.542526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.542565] Hardware name: linux,dummy-virt (DT)
[   21.543067] Call trace:
[   21.543125]  show_stack+0x20/0x38 (C)
[   21.543218]  dump_stack_lvl+0x8c/0xd0
[   21.543278]  print_report+0x118/0x608
[   21.543361]  kasan_report+0xdc/0x128
[   21.543448]  kasan_check_range+0x100/0x1a8
[   21.543502]  __kasan_check_write+0x20/0x30
[   21.543557]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   21.543615]  kasan_bitops_generic+0x110/0x1c8
[   21.543667]  kunit_try_run_case+0x170/0x3f0
[   21.543718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.543775]  kthread+0x328/0x630
[   21.543824]  ret_from_fork+0x10/0x20
[   21.543877] 
[   21.543902] Allocated by task 261:
[   21.543936]  kasan_save_stack+0x3c/0x68
[   21.544008]  kasan_save_track+0x20/0x40
[   21.544054]  kasan_save_alloc_info+0x40/0x58
[   21.544101]  __kasan_kmalloc+0xd4/0xd8
[   21.544142]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.544183]  kasan_bitops_generic+0xa0/0x1c8
[   21.544225]  kunit_try_run_case+0x170/0x3f0
[   21.544266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.544310]  kthread+0x328/0x630
[   21.544350]  ret_from_fork+0x10/0x20
[   21.544391] 
[   21.544414] The buggy address belongs to the object at fff00000c4035140
[   21.544414]  which belongs to the cache kmalloc-16 of size 16
[   21.544476] The buggy address is located 8 bytes inside of
[   21.544476]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.544540] 
[   21.544564] The buggy address belongs to the physical page:
[   21.544597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.544653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.544705] page_type: f5(slab)
[   21.544750] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.544804] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.544850] page dumped because: kasan: bad access detected
[   21.544886] 
[   21.544908] Memory state around the buggy address:
[   21.544945]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.545233]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.545283] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.545326]                                               ^
[   21.545369]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.545431]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.545589] ==================================================================
[   21.547223] ==================================================================
[   21.547303] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   21.547379] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.547439] 
[   21.547479] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.547571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.547605] Hardware name: linux,dummy-virt (DT)
[   21.547644] Call trace:
[   21.547670]  show_stack+0x20/0x38 (C)
[   21.547726]  dump_stack_lvl+0x8c/0xd0
[   21.547777]  print_report+0x118/0x608
[   21.547832]  kasan_report+0xdc/0x128
[   21.547884]  __asan_report_load8_noabort+0x20/0x30
[   21.547942]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   21.548019]  kasan_bitops_generic+0x110/0x1c8
[   21.548079]  kunit_try_run_case+0x170/0x3f0
[   21.548132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.548193]  kthread+0x328/0x630
[   21.548249]  ret_from_fork+0x10/0x20
[   21.548308] 
[   21.548331] Allocated by task 261:
[   21.548365]  kasan_save_stack+0x3c/0x68
[   21.548417]  kasan_save_track+0x20/0x40
[   21.548463]  kasan_save_alloc_info+0x40/0x58
[   21.548511]  __kasan_kmalloc+0xd4/0xd8
[   21.548600]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.548654]  kasan_bitops_generic+0xa0/0x1c8
[   21.548702]  kunit_try_run_case+0x170/0x3f0
[   21.548746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.548804]  kthread+0x328/0x630
[   21.548848]  ret_from_fork+0x10/0x20
[   21.548894] 
[   21.549471] The buggy address belongs to the object at fff00000c4035140
[   21.549471]  which belongs to the cache kmalloc-16 of size 16
[   21.549666] The buggy address is located 8 bytes inside of
[   21.549666]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.549922] 
[   21.549954] The buggy address belongs to the physical page:
[   21.550301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.550394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.550631] page_type: f5(slab)
[   21.550816] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.550884] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.551063] page dumped because: kasan: bad access detected
[   21.551145] 
[   21.551198] Memory state around the buggy address:
[   21.551362]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.551626]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.552003] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.552704]                                               ^
[   21.552783]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.552837]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.553288] ==================================================================
[   21.495757] ==================================================================
[   21.495838] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.495916] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.496329] 
[   21.496639] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.496935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.497008] Hardware name: linux,dummy-virt (DT)
[   21.497072] Call trace:
[   21.497108]  show_stack+0x20/0x38 (C)
[   21.497366]  dump_stack_lvl+0x8c/0xd0
[   21.497606]  print_report+0x118/0x608
[   21.497714]  kasan_report+0xdc/0x128
[   21.497857]  __asan_report_load8_noabort+0x20/0x30
[   21.497928]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.498018]  kasan_bitops_generic+0x110/0x1c8
[   21.498078]  kunit_try_run_case+0x170/0x3f0
[   21.498136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.498196]  kthread+0x328/0x630
[   21.498251]  ret_from_fork+0x10/0x20
[   21.498312] 
[   21.498337] Allocated by task 261:
[   21.498375]  kasan_save_stack+0x3c/0x68
[   21.498426]  kasan_save_track+0x20/0x40
[   21.498472]  kasan_save_alloc_info+0x40/0x58
[   21.498525]  __kasan_kmalloc+0xd4/0xd8
[   21.498567]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.499863]  kasan_bitops_generic+0xa0/0x1c8
[   21.500585]  kunit_try_run_case+0x170/0x3f0
[   21.500836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.501260]  kthread+0x328/0x630
[   21.501315]  ret_from_fork+0x10/0x20
[   21.501362] 
[   21.501391] The buggy address belongs to the object at fff00000c4035140
[   21.501391]  which belongs to the cache kmalloc-16 of size 16
[   21.502548] The buggy address is located 8 bytes inside of
[   21.502548]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.502648] 
[   21.502679] The buggy address belongs to the physical page:
[   21.503377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.503458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.503521] page_type: f5(slab)
[   21.503573] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.503635] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.503685] page dumped because: kasan: bad access detected
[   21.505396] 
[   21.505649] Memory state around the buggy address:
[   21.506073]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.506206]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.506882] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.507075]                                               ^
[   21.507561]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.507661]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.507711] ==================================================================
[   21.528827] ==================================================================
[   21.528908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   21.529004] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.529066] 
[   21.529114] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.529212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.529246] Hardware name: linux,dummy-virt (DT)
[   21.529287] Call trace:
[   21.529862]  show_stack+0x20/0x38 (C)
[   21.530033]  dump_stack_lvl+0x8c/0xd0
[   21.530158]  print_report+0x118/0x608
[   21.530219]  kasan_report+0xdc/0x128
[   21.530275]  __asan_report_load8_noabort+0x20/0x30
[   21.530337]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   21.530400]  kasan_bitops_generic+0x110/0x1c8
[   21.530474]  kunit_try_run_case+0x170/0x3f0
[   21.530544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.531158]  kthread+0x328/0x630
[   21.531220]  ret_from_fork+0x10/0x20
[   21.531285] 
[   21.531310] Allocated by task 261:
[   21.531347]  kasan_save_stack+0x3c/0x68
[   21.531399]  kasan_save_track+0x20/0x40
[   21.531578]  kasan_save_alloc_info+0x40/0x58
[   21.531660]  __kasan_kmalloc+0xd4/0xd8
[   21.531725]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.531777]  kasan_bitops_generic+0xa0/0x1c8
[   21.531821]  kunit_try_run_case+0x170/0x3f0
[   21.531863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.532141]  kthread+0x328/0x630
[   21.532216]  ret_from_fork+0x10/0x20
[   21.532290] 
[   21.532337] The buggy address belongs to the object at fff00000c4035140
[   21.532337]  which belongs to the cache kmalloc-16 of size 16
[   21.532424] The buggy address is located 8 bytes inside of
[   21.532424]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.532490] 
[   21.532517] The buggy address belongs to the physical page:
[   21.532553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.532614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.532684] page_type: f5(slab)
[   21.532732] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.533241] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.533296] page dumped because: kasan: bad access detected
[   21.533336] 
[   21.533371] Memory state around the buggy address:
[   21.533415]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.533695]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.533839] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.533944]                                               ^
[   21.534066]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.534139]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.534185] ==================================================================

[   13.250036] ==================================================================
[   13.250323] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.250697] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278
[   13.251050] 
[   13.251136] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.251181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.251201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.251222] Call Trace:
[   13.251237]  <TASK>
[   13.251251]  dump_stack_lvl+0x73/0xb0
[   13.251277]  print_report+0xd1/0x650
[   13.251300]  ? __virt_addr_valid+0x1db/0x2d0
[   13.251324]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.251350]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.251373]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.251400]  kasan_report+0x141/0x180
[   13.251422]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.251453]  kasan_check_range+0x10c/0x1c0
[   13.251478]  __kasan_check_write+0x18/0x20
[   13.251498]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.251524]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.251551]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.251572]  ? trace_hardirqs_on+0x37/0xe0
[   13.251593]  ? kasan_bitops_generic+0x92/0x1c0
[   13.251630]  kasan_bitops_generic+0x116/0x1c0
[   13.251649]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.251671]  ? __pfx_read_tsc+0x10/0x10
[   13.251692]  ? ktime_get_ts64+0x86/0x230
[   13.251716]  kunit_try_run_case+0x1a5/0x480
[   13.251749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.251771]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.251794]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.251816]  ? __kthread_parkme+0x82/0x180
[   13.251836]  ? preempt_count_sub+0x50/0x80
[   13.251861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.251885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.251907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.251929]  kthread+0x337/0x6f0
[   13.251949]  ? trace_preempt_on+0x20/0xc0
[   13.251971]  ? __pfx_kthread+0x10/0x10
[   13.251992]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.252013]  ? calculate_sigpending+0x7b/0xa0
[   13.252036]  ? __pfx_kthread+0x10/0x10
[   13.252058]  ret_from_fork+0x116/0x1d0
[   13.252076]  ? __pfx_kthread+0x10/0x10
[   13.252097]  ret_from_fork_asm+0x1a/0x30
[   13.252128]  </TASK>
[   13.252137] 
[   13.260504] Allocated by task 278:
[   13.260695]  kasan_save_stack+0x45/0x70
[   13.260899]  kasan_save_track+0x18/0x40
[   13.261099]  kasan_save_alloc_info+0x3b/0x50
[   13.261346]  __kasan_kmalloc+0xb7/0xc0
[   13.261510]  __kmalloc_cache_noprof+0x189/0x420
[   13.261759]  kasan_bitops_generic+0x92/0x1c0
[   13.261909]  kunit_try_run_case+0x1a5/0x480
[   13.262080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.262566]  kthread+0x337/0x6f0
[   13.262751]  ret_from_fork+0x116/0x1d0
[   13.262947]  ret_from_fork_asm+0x1a/0x30
[   13.263101] 
[   13.263205] The buggy address belongs to the object at ffff888101d83660
[   13.263205]  which belongs to the cache kmalloc-16 of size 16
[   13.263717] The buggy address is located 8 bytes inside of
[   13.263717]  allocated 9-byte region [ffff888101d83660, ffff888101d83669)
[   13.264243] 
[   13.264337] The buggy address belongs to the physical page:
[   13.264701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83
[   13.265043] flags: 0x200000000000000(node=0|zone=2)
[   13.265297] page_type: f5(slab)
[   13.265417] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.266037] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.266359] page dumped because: kasan: bad access detected
[   13.266560] 
[   13.266673] Memory state around the buggy address:
[   13.266910]  ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.267206]  ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   13.267466] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.267720]                                                           ^
[   13.268158]  ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.268423]  ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.268833] ==================================================================
[   13.230172] ==================================================================
[   13.230535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.231200] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278
[   13.231469] 
[   13.231553] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.231599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.231622] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.231644] Call Trace:
[   13.231656]  <TASK>
[   13.231671]  dump_stack_lvl+0x73/0xb0
[   13.231696]  print_report+0xd1/0x650
[   13.231718]  ? __virt_addr_valid+0x1db/0x2d0
[   13.231742]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.231767]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.231790]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.231816]  kasan_report+0x141/0x180
[   13.231839]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.231870]  kasan_check_range+0x10c/0x1c0
[   13.231894]  __kasan_check_write+0x18/0x20
[   13.231914]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.231940]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.231967]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.232035]  ? trace_hardirqs_on+0x37/0xe0
[   13.232060]  ? kasan_bitops_generic+0x92/0x1c0
[   13.232086]  kasan_bitops_generic+0x116/0x1c0
[   13.232106]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.232127]  ? __pfx_read_tsc+0x10/0x10
[   13.232148]  ? ktime_get_ts64+0x86/0x230
[   13.232172]  kunit_try_run_case+0x1a5/0x480
[   13.232208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.232230]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.232252]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.232275]  ? __kthread_parkme+0x82/0x180
[   13.232294]  ? preempt_count_sub+0x50/0x80
[   13.232319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.232342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.232366]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.232389]  kthread+0x337/0x6f0
[   13.232408]  ? trace_preempt_on+0x20/0xc0
[   13.232431]  ? __pfx_kthread+0x10/0x10
[   13.232452]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.232472]  ? calculate_sigpending+0x7b/0xa0
[   13.232496]  ? __pfx_kthread+0x10/0x10
[   13.232519]  ret_from_fork+0x116/0x1d0
[   13.232549]  ? __pfx_kthread+0x10/0x10
[   13.232570]  ret_from_fork_asm+0x1a/0x30
[   13.232602]  </TASK>
[   13.232621] 
[   13.241071] Allocated by task 278:
[   13.241215]  kasan_save_stack+0x45/0x70
[   13.241422]  kasan_save_track+0x18/0x40
[   13.241881]  kasan_save_alloc_info+0x3b/0x50
[   13.242109]  __kasan_kmalloc+0xb7/0xc0
[   13.242406]  __kmalloc_cache_noprof+0x189/0x420
[   13.242692]  kasan_bitops_generic+0x92/0x1c0
[   13.242888]  kunit_try_run_case+0x1a5/0x480
[   13.243066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.243361]  kthread+0x337/0x6f0
[   13.243514]  ret_from_fork+0x116/0x1d0
[   13.243720]  ret_from_fork_asm+0x1a/0x30
[   13.243904] 
[   13.243985] The buggy address belongs to the object at ffff888101d83660
[   13.243985]  which belongs to the cache kmalloc-16 of size 16
[   13.244658] The buggy address is located 8 bytes inside of
[   13.244658]  allocated 9-byte region [ffff888101d83660, ffff888101d83669)
[   13.245012] 
[   13.245084] The buggy address belongs to the physical page:
[   13.245274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83
[   13.245642] flags: 0x200000000000000(node=0|zone=2)
[   13.245885] page_type: f5(slab)
[   13.246011] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.246438] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.246927] page dumped because: kasan: bad access detected
[   13.247331] 
[   13.247431] Memory state around the buggy address:
[   13.247694]  ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.247916]  ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   13.248189] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.248510]                                                           ^
[   13.248901]  ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.249283]  ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.249640] ==================================================================
[   13.190034] ==================================================================
[   13.190449] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.190879] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278
[   13.191364] 
[   13.191454] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.191502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.191514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.191535] Call Trace:
[   13.191547]  <TASK>
[   13.191561]  dump_stack_lvl+0x73/0xb0
[   13.191589]  print_report+0xd1/0x650
[   13.191625]  ? __virt_addr_valid+0x1db/0x2d0
[   13.191650]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.191676]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.191698]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.191725]  kasan_report+0x141/0x180
[   13.191747]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.191778]  kasan_check_range+0x10c/0x1c0
[   13.191803]  __kasan_check_write+0x18/0x20
[   13.191823]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.191849]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.191877]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.191897]  ? trace_hardirqs_on+0x37/0xe0
[   13.191920]  ? kasan_bitops_generic+0x92/0x1c0
[   13.191944]  kasan_bitops_generic+0x116/0x1c0
[   13.191965]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.191987]  ? __pfx_read_tsc+0x10/0x10
[   13.192008]  ? ktime_get_ts64+0x86/0x230
[   13.192033]  kunit_try_run_case+0x1a5/0x480
[   13.192057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.192079]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.192102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.192125]  ? __kthread_parkme+0x82/0x180
[   13.192145]  ? preempt_count_sub+0x50/0x80
[   13.192170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.192193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.192218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.192241]  kthread+0x337/0x6f0
[   13.192261]  ? trace_preempt_on+0x20/0xc0
[   13.192283]  ? __pfx_kthread+0x10/0x10
[   13.192304]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.192324]  ? calculate_sigpending+0x7b/0xa0
[   13.192348]  ? __pfx_kthread+0x10/0x10
[   13.192369]  ret_from_fork+0x116/0x1d0
[   13.192447]  ? __pfx_kthread+0x10/0x10
[   13.192469]  ret_from_fork_asm+0x1a/0x30
[   13.192501]  </TASK>
[   13.192511] 
[   13.200930] Allocated by task 278:
[   13.201061]  kasan_save_stack+0x45/0x70
[   13.201204]  kasan_save_track+0x18/0x40
[   13.201478]  kasan_save_alloc_info+0x3b/0x50
[   13.201842]  __kasan_kmalloc+0xb7/0xc0
[   13.202035]  __kmalloc_cache_noprof+0x189/0x420
[   13.202251]  kasan_bitops_generic+0x92/0x1c0
[   13.202460]  kunit_try_run_case+0x1a5/0x480
[   13.202687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.203002]  kthread+0x337/0x6f0
[   13.203229]  ret_from_fork+0x116/0x1d0
[   13.203397]  ret_from_fork_asm+0x1a/0x30
[   13.203779] 
[   13.203883] The buggy address belongs to the object at ffff888101d83660
[   13.203883]  which belongs to the cache kmalloc-16 of size 16
[   13.204293] The buggy address is located 8 bytes inside of
[   13.204293]  allocated 9-byte region [ffff888101d83660, ffff888101d83669)
[   13.205171] 
[   13.205282] The buggy address belongs to the physical page:
[   13.205503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83
[   13.205808] flags: 0x200000000000000(node=0|zone=2)
[   13.205973] page_type: f5(slab)
[   13.206095] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.206757] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.207023] page dumped because: kasan: bad access detected
[   13.207198] 
[   13.207347] Memory state around the buggy address:
[   13.207624]  ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.207930]  ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   13.208163] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.208375]                                                           ^
[   13.208715]  ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.209301]  ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.209783] ==================================================================
[   13.165413] ==================================================================
[   13.166411] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.166913] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278
[   13.167439] 
[   13.167552] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.167599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.167620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.167642] Call Trace:
[   13.167655]  <TASK>
[   13.167670]  dump_stack_lvl+0x73/0xb0
[   13.167856]  print_report+0xd1/0x650
[   13.167882]  ? __virt_addr_valid+0x1db/0x2d0
[   13.167905]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.167930]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.167953]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.167979]  kasan_report+0x141/0x180
[   13.168002]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.168033]  kasan_check_range+0x10c/0x1c0
[   13.168057]  __kasan_check_write+0x18/0x20
[   13.168078]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.168105]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.168132]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.168153]  ? trace_hardirqs_on+0x37/0xe0
[   13.168200]  ? kasan_bitops_generic+0x92/0x1c0
[   13.168225]  kasan_bitops_generic+0x116/0x1c0
[   13.168246]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.168268]  ? __pfx_read_tsc+0x10/0x10
[   13.168289]  ? ktime_get_ts64+0x86/0x230
[   13.168314]  kunit_try_run_case+0x1a5/0x480
[   13.168337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.168359]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.168382]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.168405]  ? __kthread_parkme+0x82/0x180
[   13.168425]  ? preempt_count_sub+0x50/0x80
[   13.168449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.168473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.168495]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.168518]  kthread+0x337/0x6f0
[   13.168554]  ? trace_preempt_on+0x20/0xc0
[   13.168577]  ? __pfx_kthread+0x10/0x10
[   13.168597]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.168626]  ? calculate_sigpending+0x7b/0xa0
[   13.168651]  ? __pfx_kthread+0x10/0x10
[   13.168673]  ret_from_fork+0x116/0x1d0
[   13.168691]  ? __pfx_kthread+0x10/0x10
[   13.168713]  ret_from_fork_asm+0x1a/0x30
[   13.168744]  </TASK>
[   13.168755] 
[   13.181485] Allocated by task 278:
[   13.181805]  kasan_save_stack+0x45/0x70
[   13.182004]  kasan_save_track+0x18/0x40
[   13.182199]  kasan_save_alloc_info+0x3b/0x50
[   13.182588]  __kasan_kmalloc+0xb7/0xc0
[   13.182868]  __kmalloc_cache_noprof+0x189/0x420
[   13.183070]  kasan_bitops_generic+0x92/0x1c0
[   13.183337]  kunit_try_run_case+0x1a5/0x480
[   13.183505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.183823]  kthread+0x337/0x6f0
[   13.183950]  ret_from_fork+0x116/0x1d0
[   13.184139]  ret_from_fork_asm+0x1a/0x30
[   13.184389] 
[   13.184463] The buggy address belongs to the object at ffff888101d83660
[   13.184463]  which belongs to the cache kmalloc-16 of size 16
[   13.185030] The buggy address is located 8 bytes inside of
[   13.185030]  allocated 9-byte region [ffff888101d83660, ffff888101d83669)
[   13.185518] 
[   13.185591] The buggy address belongs to the physical page:
[   13.185872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83
[   13.186234] flags: 0x200000000000000(node=0|zone=2)
[   13.186405] page_type: f5(slab)
[   13.186533] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.186885] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.187217] page dumped because: kasan: bad access detected
[   13.187426] 
[   13.187522] Memory state around the buggy address:
[   13.187721]  ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.188028]  ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   13.188392] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.188670]                                                           ^
[   13.188945]  ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.189265]  ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.189497] ==================================================================
[   13.269255] ==================================================================
[   13.269482] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.269842] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278
[   13.270168] 
[   13.270272] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.270317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.270329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.270349] Call Trace:
[   13.270362]  <TASK>
[   13.270375]  dump_stack_lvl+0x73/0xb0
[   13.270400]  print_report+0xd1/0x650
[   13.270422]  ? __virt_addr_valid+0x1db/0x2d0
[   13.270445]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.270474]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.270497]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.270522]  kasan_report+0x141/0x180
[   13.270544]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.270575]  kasan_check_range+0x10c/0x1c0
[   13.270599]  __kasan_check_write+0x18/0x20
[   13.270628]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.270654]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.270681]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.270702]  ? trace_hardirqs_on+0x37/0xe0
[   13.270724]  ? kasan_bitops_generic+0x92/0x1c0
[   13.270748]  kasan_bitops_generic+0x116/0x1c0
[   13.270768]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.270789]  ? __pfx_read_tsc+0x10/0x10
[   13.270809]  ? ktime_get_ts64+0x86/0x230
[   13.270833]  kunit_try_run_case+0x1a5/0x480
[   13.270857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.270892]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.270914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.270936]  ? __kthread_parkme+0x82/0x180
[   13.270957]  ? preempt_count_sub+0x50/0x80
[   13.270981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.271004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.271027]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.271049]  kthread+0x337/0x6f0
[   13.271070]  ? trace_preempt_on+0x20/0xc0
[   13.271092]  ? __pfx_kthread+0x10/0x10
[   13.271112]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.271133]  ? calculate_sigpending+0x7b/0xa0
[   13.271157]  ? __pfx_kthread+0x10/0x10
[   13.271178]  ret_from_fork+0x116/0x1d0
[   13.271196]  ? __pfx_kthread+0x10/0x10
[   13.271218]  ret_from_fork_asm+0x1a/0x30
[   13.271250]  </TASK>
[   13.271260] 
[   13.281205] Allocated by task 278:
[   13.281387]  kasan_save_stack+0x45/0x70
[   13.281708]  kasan_save_track+0x18/0x40
[   13.281909]  kasan_save_alloc_info+0x3b/0x50
[   13.282122]  __kasan_kmalloc+0xb7/0xc0
[   13.282405]  __kmalloc_cache_noprof+0x189/0x420
[   13.282689]  kasan_bitops_generic+0x92/0x1c0
[   13.282844]  kunit_try_run_case+0x1a5/0x480
[   13.282989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.283263]  kthread+0x337/0x6f0
[   13.283629]  ret_from_fork+0x116/0x1d0
[   13.283893]  ret_from_fork_asm+0x1a/0x30
[   13.284096] 
[   13.284240] The buggy address belongs to the object at ffff888101d83660
[   13.284240]  which belongs to the cache kmalloc-16 of size 16
[   13.284875] The buggy address is located 8 bytes inside of
[   13.284875]  allocated 9-byte region [ffff888101d83660, ffff888101d83669)
[   13.285586] 
[   13.285722] The buggy address belongs to the physical page:
[   13.285981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83
[   13.286388] flags: 0x200000000000000(node=0|zone=2)
[   13.286632] page_type: f5(slab)
[   13.286893] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.287188] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.287503] page dumped because: kasan: bad access detected
[   13.287784] 
[   13.287860] Memory state around the buggy address:
[   13.288045]  ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.288450]  ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   13.288997] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.289339]                                                           ^
[   13.289866]  ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.290093]  ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.290414] ==================================================================
[   13.142383] ==================================================================
[   13.143102] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.143541] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278
[   13.143969] 
[   13.144088] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.144146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.144157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.144189] Call Trace:
[   13.144202]  <TASK>
[   13.144226]  dump_stack_lvl+0x73/0xb0
[   13.144254]  print_report+0xd1/0x650
[   13.144277]  ? __virt_addr_valid+0x1db/0x2d0
[   13.144301]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.144337]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.144359]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.144386]  kasan_report+0x141/0x180
[   13.144420]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.144451]  kasan_check_range+0x10c/0x1c0
[   13.144475]  __kasan_check_write+0x18/0x20
[   13.144495]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.144522]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.144560]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.144581]  ? trace_hardirqs_on+0x37/0xe0
[   13.144604]  ? kasan_bitops_generic+0x92/0x1c0
[   13.144639]  kasan_bitops_generic+0x116/0x1c0
[   13.144659]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.144683]  ? __pfx_read_tsc+0x10/0x10
[   13.144706]  ? ktime_get_ts64+0x86/0x230
[   13.144731]  kunit_try_run_case+0x1a5/0x480
[   13.144754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.144777]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.144798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.144820]  ? __kthread_parkme+0x82/0x180
[   13.144841]  ? preempt_count_sub+0x50/0x80
[   13.144867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.144890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.144912]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.144935]  kthread+0x337/0x6f0
[   13.144955]  ? trace_preempt_on+0x20/0xc0
[   13.144978]  ? __pfx_kthread+0x10/0x10
[   13.144999]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.145019]  ? calculate_sigpending+0x7b/0xa0
[   13.145043]  ? __pfx_kthread+0x10/0x10
[   13.145065]  ret_from_fork+0x116/0x1d0
[   13.145083]  ? __pfx_kthread+0x10/0x10
[   13.145105]  ret_from_fork_asm+0x1a/0x30
[   13.145136]  </TASK>
[   13.145148] 
[   13.154039] Allocated by task 278:
[   13.154216]  kasan_save_stack+0x45/0x70
[   13.154365]  kasan_save_track+0x18/0x40
[   13.154506]  kasan_save_alloc_info+0x3b/0x50
[   13.154713]  __kasan_kmalloc+0xb7/0xc0
[   13.154997]  __kmalloc_cache_noprof+0x189/0x420
[   13.155218]  kasan_bitops_generic+0x92/0x1c0
[   13.155428]  kunit_try_run_case+0x1a5/0x480
[   13.155645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.156813]  kthread+0x337/0x6f0
[   13.156993]  ret_from_fork+0x116/0x1d0
[   13.157381]  ret_from_fork_asm+0x1a/0x30
[   13.157727] 
[   13.157822] The buggy address belongs to the object at ffff888101d83660
[   13.157822]  which belongs to the cache kmalloc-16 of size 16
[   13.158623] The buggy address is located 8 bytes inside of
[   13.158623]  allocated 9-byte region [ffff888101d83660, ffff888101d83669)
[   13.159233] 
[   13.159392] The buggy address belongs to the physical page:
[   13.159746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83
[   13.160065] flags: 0x200000000000000(node=0|zone=2)
[   13.160487] page_type: f5(slab)
[   13.160722] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.161245] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.161779] page dumped because: kasan: bad access detected
[   13.162113] 
[   13.162227] Memory state around the buggy address:
[   13.162414]  ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.162891]  ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   13.163185] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.163679]                                                           ^
[   13.164046]  ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.164444]  ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.164880] ==================================================================
[   13.210158] ==================================================================
[   13.210472] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.210904] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278
[   13.211196] 
[   13.211282] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.211327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.211340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.211360] Call Trace:
[   13.211373]  <TASK>
[   13.211388]  dump_stack_lvl+0x73/0xb0
[   13.211413]  print_report+0xd1/0x650
[   13.211435]  ? __virt_addr_valid+0x1db/0x2d0
[   13.211458]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.211483]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.211507]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.211533]  kasan_report+0x141/0x180
[   13.211556]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.211587]  kasan_check_range+0x10c/0x1c0
[   13.211624]  __kasan_check_write+0x18/0x20
[   13.211646]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.211673]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.211701]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.211721]  ? trace_hardirqs_on+0x37/0xe0
[   13.211743]  ? kasan_bitops_generic+0x92/0x1c0
[   13.211768]  kasan_bitops_generic+0x116/0x1c0
[   13.211788]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.211810]  ? __pfx_read_tsc+0x10/0x10
[   13.211875]  ? ktime_get_ts64+0x86/0x230
[   13.211901]  kunit_try_run_case+0x1a5/0x480
[   13.211926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.211949]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.211971]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.211994]  ? __kthread_parkme+0x82/0x180
[   13.212014]  ? preempt_count_sub+0x50/0x80
[   13.212040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.212063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.212086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.212109]  kthread+0x337/0x6f0
[   13.212129]  ? trace_preempt_on+0x20/0xc0
[   13.212151]  ? __pfx_kthread+0x10/0x10
[   13.212173]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.212202]  ? calculate_sigpending+0x7b/0xa0
[   13.212225]  ? __pfx_kthread+0x10/0x10
[   13.212247]  ret_from_fork+0x116/0x1d0
[   13.212265]  ? __pfx_kthread+0x10/0x10
[   13.212287]  ret_from_fork_asm+0x1a/0x30
[   13.212317]  </TASK>
[   13.212327] 
[   13.221709] Allocated by task 278:
[   13.221893]  kasan_save_stack+0x45/0x70
[   13.222094]  kasan_save_track+0x18/0x40
[   13.222318]  kasan_save_alloc_info+0x3b/0x50
[   13.222508]  __kasan_kmalloc+0xb7/0xc0
[   13.222651]  __kmalloc_cache_noprof+0x189/0x420
[   13.222804]  kasan_bitops_generic+0x92/0x1c0
[   13.223007]  kunit_try_run_case+0x1a5/0x480
[   13.223211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.223427]  kthread+0x337/0x6f0
[   13.223549]  ret_from_fork+0x116/0x1d0
[   13.223723]  ret_from_fork_asm+0x1a/0x30
[   13.223923] 
[   13.224022] The buggy address belongs to the object at ffff888101d83660
[   13.224022]  which belongs to the cache kmalloc-16 of size 16
[   13.224829] The buggy address is located 8 bytes inside of
[   13.224829]  allocated 9-byte region [ffff888101d83660, ffff888101d83669)
[   13.225310] 
[   13.225385] The buggy address belongs to the physical page:
[   13.225575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83
[   13.225948] flags: 0x200000000000000(node=0|zone=2)
[   13.226107] page_type: f5(slab)
[   13.226228] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.226454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.226928] page dumped because: kasan: bad access detected
[   13.227187] 
[   13.227281] Memory state around the buggy address:
[   13.227505]  ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.227999]  ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   13.228374] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.228787]                                                           ^
[   13.229050]  ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.229366]  ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.229582] ==================================================================
[   13.291044] ==================================================================
[   13.291428] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.291874] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278
[   13.292095] 
[   13.292177] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.292221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.292234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.292255] Call Trace:
[   13.292267]  <TASK>
[   13.292282]  dump_stack_lvl+0x73/0xb0
[   13.292320]  print_report+0xd1/0x650
[   13.292344]  ? __virt_addr_valid+0x1db/0x2d0
[   13.292367]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.292414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.292437]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.292463]  kasan_report+0x141/0x180
[   13.292502]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.292532]  kasan_check_range+0x10c/0x1c0
[   13.292570]  __kasan_check_write+0x18/0x20
[   13.292603]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.292653]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.292725]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.292748]  ? trace_hardirqs_on+0x37/0xe0
[   13.292770]  ? kasan_bitops_generic+0x92/0x1c0
[   13.292795]  kasan_bitops_generic+0x116/0x1c0
[   13.292816]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.292838]  ? __pfx_read_tsc+0x10/0x10
[   13.292859]  ? ktime_get_ts64+0x86/0x230
[   13.292883]  kunit_try_run_case+0x1a5/0x480
[   13.292906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.292928]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.292950]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.292972]  ? __kthread_parkme+0x82/0x180
[   13.292992]  ? preempt_count_sub+0x50/0x80
[   13.293017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.293041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.293064]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.293109]  kthread+0x337/0x6f0
[   13.293130]  ? trace_preempt_on+0x20/0xc0
[   13.293165]  ? __pfx_kthread+0x10/0x10
[   13.293193]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.293213]  ? calculate_sigpending+0x7b/0xa0
[   13.293237]  ? __pfx_kthread+0x10/0x10
[   13.293259]  ret_from_fork+0x116/0x1d0
[   13.293277]  ? __pfx_kthread+0x10/0x10
[   13.293297]  ret_from_fork_asm+0x1a/0x30
[   13.293345]  </TASK>
[   13.293355] 
[   13.302674] Allocated by task 278:
[   13.302957]  kasan_save_stack+0x45/0x70
[   13.303184]  kasan_save_track+0x18/0x40
[   13.303362]  kasan_save_alloc_info+0x3b/0x50
[   13.303504]  __kasan_kmalloc+0xb7/0xc0
[   13.303768]  __kmalloc_cache_noprof+0x189/0x420
[   13.304024]  kasan_bitops_generic+0x92/0x1c0
[   13.304268]  kunit_try_run_case+0x1a5/0x480
[   13.304416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.304834]  kthread+0x337/0x6f0
[   13.305019]  ret_from_fork+0x116/0x1d0
[   13.305195]  ret_from_fork_asm+0x1a/0x30
[   13.305371] 
[   13.305441] The buggy address belongs to the object at ffff888101d83660
[   13.305441]  which belongs to the cache kmalloc-16 of size 16
[   13.306136] The buggy address is located 8 bytes inside of
[   13.306136]  allocated 9-byte region [ffff888101d83660, ffff888101d83669)
[   13.306833] 
[   13.306961] The buggy address belongs to the physical page:
[   13.307173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83
[   13.307559] flags: 0x200000000000000(node=0|zone=2)
[   13.307900] page_type: f5(slab)
[   13.308233] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.308655] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.308955] page dumped because: kasan: bad access detected
[   13.309235] 
[   13.309339] Memory state around the buggy address:
[   13.309535]  ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   13.309951]  ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   13.310289] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.310658]                                                           ^
[   13.310945]  ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.311307]  ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.311590] ==================================================================