Hay
Date
May 15, 2025, 10:38 a.m.

Environment
qemu-x86_64

[   16.468403] ==================================================================
[   16.469747] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.470069] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.470316] 
[   16.470459] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.471134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.471454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.471506] Call Trace:
[   16.471551]  <TASK>
[   16.471593]  dump_stack_lvl+0x73/0xb0
[   16.471660]  print_report+0xd1/0x650
[   16.471699]  ? __virt_addr_valid+0x1db/0x2d0
[   16.471736]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.471777]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.471810]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.471835]  kasan_report+0x141/0x180
[   16.471857]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.471886]  kasan_check_range+0x10c/0x1c0
[   16.471909]  __kasan_check_write+0x18/0x20
[   16.471928]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.471951]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.471976]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.472000]  ? kasan_bitops_generic+0x92/0x1c0
[   16.472026]  kasan_bitops_generic+0x116/0x1c0
[   16.472049]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.472071]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.472098]  kunit_try_run_case+0x1a5/0x480
[   16.472123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.472144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.472167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.472188]  ? __kthread_parkme+0x82/0x180
[   16.472210]  ? preempt_count_sub+0x50/0x80
[   16.472260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.472284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.472306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.472327]  kthread+0x337/0x6f0
[   16.472347]  ? trace_preempt_on+0x20/0xc0
[   16.472369]  ? __pfx_kthread+0x10/0x10
[   16.472389]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.472408]  ? calculate_sigpending+0x7b/0xa0
[   16.472432]  ? __pfx_kthread+0x10/0x10
[   16.472454]  ret_from_fork+0x116/0x1d0
[   16.472487]  ? __pfx_kthread+0x10/0x10
[   16.472519]  ret_from_fork_asm+0x1a/0x30
[   16.472602]  </TASK>
[   16.472617] 
[   16.483856] Allocated by task 279:
[   16.484199]  kasan_save_stack+0x45/0x70
[   16.484462]  kasan_save_track+0x18/0x40
[   16.484683]  kasan_save_alloc_info+0x3b/0x50
[   16.484998]  __kasan_kmalloc+0xb7/0xc0
[   16.485389]  __kmalloc_cache_noprof+0x189/0x420
[   16.485701]  kasan_bitops_generic+0x92/0x1c0
[   16.486006]  kunit_try_run_case+0x1a5/0x480
[   16.486359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.487160]  kthread+0x337/0x6f0
[   16.487595]  ret_from_fork+0x116/0x1d0
[   16.487907]  ret_from_fork_asm+0x1a/0x30
[   16.488205] 
[   16.488373] The buggy address belongs to the object at ffff8881022a34c0
[   16.488373]  which belongs to the cache kmalloc-16 of size 16
[   16.489083] The buggy address is located 8 bytes inside of
[   16.489083]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.489746] 
[   16.489913] The buggy address belongs to the physical page:
[   16.490118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.491061] flags: 0x200000000000000(node=0|zone=2)
[   16.491429] page_type: f5(slab)
[   16.491855] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.492287] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.492781] page dumped because: kasan: bad access detected
[   16.493143] 
[   16.493306] Memory state around the buggy address:
[   16.495901]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.496252]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.497076] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.497389]                                               ^
[   16.497597]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.498018]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.498308] ==================================================================
[   16.439159] ==================================================================
[   16.439529] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.439864] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.440776] 
[   16.440977] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.441038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.441051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.441072] Call Trace:
[   16.441097]  <TASK>
[   16.441119]  dump_stack_lvl+0x73/0xb0
[   16.441154]  print_report+0xd1/0x650
[   16.441178]  ? __virt_addr_valid+0x1db/0x2d0
[   16.441202]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.441247]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.441271]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.441295]  kasan_report+0x141/0x180
[   16.441316]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.441344]  kasan_check_range+0x10c/0x1c0
[   16.441367]  __kasan_check_write+0x18/0x20
[   16.441385]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.441409]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.441433]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.441454]  ? kasan_bitops_generic+0x92/0x1c0
[   16.441480]  kasan_bitops_generic+0x116/0x1c0
[   16.441502]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.441524]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.441551]  kunit_try_run_case+0x1a5/0x480
[   16.441575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.441596]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.441619]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.441640]  ? __kthread_parkme+0x82/0x180
[   16.441660]  ? preempt_count_sub+0x50/0x80
[   16.441683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.441706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.441727]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.441748]  kthread+0x337/0x6f0
[   16.441767]  ? trace_preempt_on+0x20/0xc0
[   16.441789]  ? __pfx_kthread+0x10/0x10
[   16.441809]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.441828]  ? calculate_sigpending+0x7b/0xa0
[   16.441851]  ? __pfx_kthread+0x10/0x10
[   16.441870]  ret_from_fork+0x116/0x1d0
[   16.441889]  ? __pfx_kthread+0x10/0x10
[   16.441907]  ret_from_fork_asm+0x1a/0x30
[   16.441938]  </TASK>
[   16.441949] 
[   16.454077] Allocated by task 279:
[   16.454242]  kasan_save_stack+0x45/0x70
[   16.454878]  kasan_save_track+0x18/0x40
[   16.455283]  kasan_save_alloc_info+0x3b/0x50
[   16.455666]  __kasan_kmalloc+0xb7/0xc0
[   16.455845]  __kmalloc_cache_noprof+0x189/0x420
[   16.456074]  kasan_bitops_generic+0x92/0x1c0
[   16.456656]  kunit_try_run_case+0x1a5/0x480
[   16.457016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.457437]  kthread+0x337/0x6f0
[   16.457955]  ret_from_fork+0x116/0x1d0
[   16.458266]  ret_from_fork_asm+0x1a/0x30
[   16.459036] 
[   16.459275] The buggy address belongs to the object at ffff8881022a34c0
[   16.459275]  which belongs to the cache kmalloc-16 of size 16
[   16.460181] The buggy address is located 8 bytes inside of
[   16.460181]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.460926] 
[   16.461093] The buggy address belongs to the physical page:
[   16.461685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.462262] flags: 0x200000000000000(node=0|zone=2)
[   16.462940] page_type: f5(slab)
[   16.463183] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.463517] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.463911] page dumped because: kasan: bad access detected
[   16.464248] 
[   16.464381] Memory state around the buggy address:
[   16.464635]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.465049]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.465456] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.465862]                                               ^
[   16.466074]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.466317]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.467302] ==================================================================
[   16.499144] ==================================================================
[   16.500078] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.500687] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.501188] 
[   16.501395] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.501643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.501673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.501713] Call Trace:
[   16.501751]  <TASK>
[   16.501795]  dump_stack_lvl+0x73/0xb0
[   16.501860]  print_report+0xd1/0x650
[   16.501908]  ? __virt_addr_valid+0x1db/0x2d0
[   16.501952]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.501994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.502036]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.502087]  kasan_report+0x141/0x180
[   16.502133]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.502188]  kasan_check_range+0x10c/0x1c0
[   16.502247]  __kasan_check_write+0x18/0x20
[   16.502290]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.502349]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.502401]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.502430]  ? kasan_bitops_generic+0x92/0x1c0
[   16.502477]  kasan_bitops_generic+0x116/0x1c0
[   16.502534]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.502570]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.502630]  kunit_try_run_case+0x1a5/0x480
[   16.502661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.502683]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.502706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.502728]  ? __kthread_parkme+0x82/0x180
[   16.502750]  ? preempt_count_sub+0x50/0x80
[   16.502774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.502795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.502816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.502837]  kthread+0x337/0x6f0
[   16.502855]  ? trace_preempt_on+0x20/0xc0
[   16.502878]  ? __pfx_kthread+0x10/0x10
[   16.502898]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.502917]  ? calculate_sigpending+0x7b/0xa0
[   16.502940]  ? __pfx_kthread+0x10/0x10
[   16.502961]  ret_from_fork+0x116/0x1d0
[   16.502979]  ? __pfx_kthread+0x10/0x10
[   16.502999]  ret_from_fork_asm+0x1a/0x30
[   16.503031]  </TASK>
[   16.503043] 
[   16.512982] Allocated by task 279:
[   16.513145]  kasan_save_stack+0x45/0x70
[   16.513565]  kasan_save_track+0x18/0x40
[   16.513729]  kasan_save_alloc_info+0x3b/0x50
[   16.513911]  __kasan_kmalloc+0xb7/0xc0
[   16.514078]  __kmalloc_cache_noprof+0x189/0x420
[   16.514526]  kasan_bitops_generic+0x92/0x1c0
[   16.514887]  kunit_try_run_case+0x1a5/0x480
[   16.515231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.515727]  kthread+0x337/0x6f0
[   16.515928]  ret_from_fork+0x116/0x1d0
[   16.516100]  ret_from_fork_asm+0x1a/0x30
[   16.516280] 
[   16.516386] The buggy address belongs to the object at ffff8881022a34c0
[   16.516386]  which belongs to the cache kmalloc-16 of size 16
[   16.517688] The buggy address is located 8 bytes inside of
[   16.517688]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.519240] 
[   16.519476] The buggy address belongs to the physical page:
[   16.519966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.520281] flags: 0x200000000000000(node=0|zone=2)
[   16.520792] page_type: f5(slab)
[   16.521143] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.521813] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.522108] page dumped because: kasan: bad access detected
[   16.522321] 
[   16.522434] Memory state around the buggy address:
[   16.522636]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.522881]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.523121] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.523357]                                               ^
[   16.523555]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.523804]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.524438] ==================================================================
[   16.555743] ==================================================================
[   16.556286] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.556585] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.557074] 
[   16.557446] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.557545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.557571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.557612] Call Trace:
[   16.557655]  <TASK>
[   16.557695]  dump_stack_lvl+0x73/0xb0
[   16.557748]  print_report+0xd1/0x650
[   16.557790]  ? __virt_addr_valid+0x1db/0x2d0
[   16.557833]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.558245]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.558394]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.558449]  kasan_report+0x141/0x180
[   16.558558]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.558683]  kasan_check_range+0x10c/0x1c0
[   16.558737]  __kasan_check_write+0x18/0x20
[   16.558774]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.558832]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.558898]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.558938]  ? kasan_bitops_generic+0x92/0x1c0
[   16.558971]  kasan_bitops_generic+0x116/0x1c0
[   16.558995]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.559018]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.559045]  kunit_try_run_case+0x1a5/0x480
[   16.559072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.559105]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.559142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.559184]  ? __kthread_parkme+0x82/0x180
[   16.559233]  ? preempt_count_sub+0x50/0x80
[   16.559287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.559347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.559389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.559433]  kthread+0x337/0x6f0
[   16.559470]  ? trace_preempt_on+0x20/0xc0
[   16.559521]  ? __pfx_kthread+0x10/0x10
[   16.559564]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.559740]  ? calculate_sigpending+0x7b/0xa0
[   16.559767]  ? __pfx_kthread+0x10/0x10
[   16.559791]  ret_from_fork+0x116/0x1d0
[   16.559812]  ? __pfx_kthread+0x10/0x10
[   16.559831]  ret_from_fork_asm+0x1a/0x30
[   16.559864]  </TASK>
[   16.559877] 
[   16.571362] Allocated by task 279:
[   16.571641]  kasan_save_stack+0x45/0x70
[   16.572048]  kasan_save_track+0x18/0x40
[   16.572366]  kasan_save_alloc_info+0x3b/0x50
[   16.572583]  __kasan_kmalloc+0xb7/0xc0
[   16.572965]  __kmalloc_cache_noprof+0x189/0x420
[   16.573172]  kasan_bitops_generic+0x92/0x1c0
[   16.573365]  kunit_try_run_case+0x1a5/0x480
[   16.573547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.573815]  kthread+0x337/0x6f0
[   16.574280]  ret_from_fork+0x116/0x1d0
[   16.574700]  ret_from_fork_asm+0x1a/0x30
[   16.575026] 
[   16.575182] The buggy address belongs to the object at ffff8881022a34c0
[   16.575182]  which belongs to the cache kmalloc-16 of size 16
[   16.575904] The buggy address is located 8 bytes inside of
[   16.575904]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.577144] 
[   16.577337] The buggy address belongs to the physical page:
[   16.577805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.578173] flags: 0x200000000000000(node=0|zone=2)
[   16.578406] page_type: f5(slab)
[   16.578579] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.579386] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.580160] page dumped because: kasan: bad access detected
[   16.580643] 
[   16.581084] Memory state around the buggy address:
[   16.581301]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.581543]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.582022] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.582504]                                               ^
[   16.583069]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.583357]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.584066] ==================================================================
[   16.380156] ==================================================================
[   16.380600] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.380860] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.381162] 
[   16.381314] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.381410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.381436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.381466] Call Trace:
[   16.381490]  <TASK>
[   16.381513]  dump_stack_lvl+0x73/0xb0
[   16.381545]  print_report+0xd1/0x650
[   16.381570]  ? __virt_addr_valid+0x1db/0x2d0
[   16.381599]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.381640]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.381661]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.381685]  kasan_report+0x141/0x180
[   16.381706]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.381735]  kasan_check_range+0x10c/0x1c0
[   16.381757]  __kasan_check_write+0x18/0x20
[   16.381776]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.381799]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.381824]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.381845]  ? kasan_bitops_generic+0x92/0x1c0
[   16.381872]  kasan_bitops_generic+0x116/0x1c0
[   16.381894]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.381916]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.381942]  kunit_try_run_case+0x1a5/0x480
[   16.381968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.381988]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.382011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.382032]  ? __kthread_parkme+0x82/0x180
[   16.382053]  ? preempt_count_sub+0x50/0x80
[   16.382077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.382100]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.382121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.382143]  kthread+0x337/0x6f0
[   16.382162]  ? trace_preempt_on+0x20/0xc0
[   16.382184]  ? __pfx_kthread+0x10/0x10
[   16.382204]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.382364]  ? calculate_sigpending+0x7b/0xa0
[   16.382419]  ? __pfx_kthread+0x10/0x10
[   16.382464]  ret_from_fork+0x116/0x1d0
[   16.382500]  ? __pfx_kthread+0x10/0x10
[   16.382534]  ret_from_fork_asm+0x1a/0x30
[   16.382585]  </TASK>
[   16.382606] 
[   16.394825] Allocated by task 279:
[   16.395140]  kasan_save_stack+0x45/0x70
[   16.395672]  kasan_save_track+0x18/0x40
[   16.396018]  kasan_save_alloc_info+0x3b/0x50
[   16.396344]  __kasan_kmalloc+0xb7/0xc0
[   16.396805]  __kmalloc_cache_noprof+0x189/0x420
[   16.397174]  kasan_bitops_generic+0x92/0x1c0
[   16.398016]  kunit_try_run_case+0x1a5/0x480
[   16.398445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.398900]  kthread+0x337/0x6f0
[   16.399078]  ret_from_fork+0x116/0x1d0
[   16.399245]  ret_from_fork_asm+0x1a/0x30
[   16.399738] 
[   16.399914] The buggy address belongs to the object at ffff8881022a34c0
[   16.399914]  which belongs to the cache kmalloc-16 of size 16
[   16.400866] The buggy address is located 8 bytes inside of
[   16.400866]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.401441] 
[   16.402081] The buggy address belongs to the physical page:
[   16.402339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.403031] flags: 0x200000000000000(node=0|zone=2)
[   16.403614] page_type: f5(slab)
[   16.403912] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.404182] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.404715] page dumped because: kasan: bad access detected
[   16.405031] 
[   16.405375] Memory state around the buggy address:
[   16.406038]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.406389]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.406991] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.407419]                                               ^
[   16.407986]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.408401]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.408923] ==================================================================
[   16.350801] ==================================================================
[   16.351276] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.352061] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.352958] 
[   16.353353] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.353432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.353447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.353481] Call Trace:
[   16.353505]  <TASK>
[   16.353538]  dump_stack_lvl+0x73/0xb0
[   16.353647]  print_report+0xd1/0x650
[   16.353701]  ? __virt_addr_valid+0x1db/0x2d0
[   16.353751]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.353794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.353830]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.353873]  kasan_report+0x141/0x180
[   16.353915]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.353974]  kasan_check_range+0x10c/0x1c0
[   16.354016]  __kasan_check_write+0x18/0x20
[   16.354047]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.354073]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.354099]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.354122]  ? kasan_bitops_generic+0x92/0x1c0
[   16.354150]  kasan_bitops_generic+0x116/0x1c0
[   16.354173]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.354196]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.354246]  kunit_try_run_case+0x1a5/0x480
[   16.354277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.354298]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.354324]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.354358]  ? __kthread_parkme+0x82/0x180
[   16.354382]  ? preempt_count_sub+0x50/0x80
[   16.354412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.354437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.354474]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.354528]  kthread+0x337/0x6f0
[   16.354560]  ? trace_preempt_on+0x20/0xc0
[   16.354599]  ? __pfx_kthread+0x10/0x10
[   16.354644]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.354667]  ? calculate_sigpending+0x7b/0xa0
[   16.354693]  ? __pfx_kthread+0x10/0x10
[   16.354714]  ret_from_fork+0x116/0x1d0
[   16.354734]  ? __pfx_kthread+0x10/0x10
[   16.354754]  ret_from_fork_asm+0x1a/0x30
[   16.354788]  </TASK>
[   16.354801] 
[   16.366362] Allocated by task 279:
[   16.366754]  kasan_save_stack+0x45/0x70
[   16.367026]  kasan_save_track+0x18/0x40
[   16.367269]  kasan_save_alloc_info+0x3b/0x50
[   16.367720]  __kasan_kmalloc+0xb7/0xc0
[   16.368263]  __kmalloc_cache_noprof+0x189/0x420
[   16.368666]  kasan_bitops_generic+0x92/0x1c0
[   16.369041]  kunit_try_run_case+0x1a5/0x480
[   16.369518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.369756]  kthread+0x337/0x6f0
[   16.369914]  ret_from_fork+0x116/0x1d0
[   16.370082]  ret_from_fork_asm+0x1a/0x30
[   16.370269] 
[   16.370416] The buggy address belongs to the object at ffff8881022a34c0
[   16.370416]  which belongs to the cache kmalloc-16 of size 16
[   16.371019] The buggy address is located 8 bytes inside of
[   16.371019]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.371449] 
[   16.371601] The buggy address belongs to the physical page:
[   16.371991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.372734] flags: 0x200000000000000(node=0|zone=2)
[   16.373127] page_type: f5(slab)
[   16.373308] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.373777] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.374026] page dumped because: kasan: bad access detected
[   16.374228] 
[   16.374379] Memory state around the buggy address:
[   16.374719]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.375202]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.375920] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.376318]                                               ^
[   16.377084]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.377802]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.378351] ==================================================================
[   16.409808] ==================================================================
[   16.410923] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.411387] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.411778] 
[   16.412103] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.412204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.412240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.412298] Call Trace:
[   16.412340]  <TASK>
[   16.412387]  dump_stack_lvl+0x73/0xb0
[   16.412449]  print_report+0xd1/0x650
[   16.412523]  ? __virt_addr_valid+0x1db/0x2d0
[   16.412570]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.412617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.412662]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.412714]  kasan_report+0x141/0x180
[   16.412752]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.412810]  kasan_check_range+0x10c/0x1c0
[   16.412845]  __kasan_check_write+0x18/0x20
[   16.412895]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.412930]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.412955]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.412978]  ? kasan_bitops_generic+0x92/0x1c0
[   16.413004]  kasan_bitops_generic+0x116/0x1c0
[   16.413026]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.413048]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.413075]  kunit_try_run_case+0x1a5/0x480
[   16.413101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.413122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.413146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.413168]  ? __kthread_parkme+0x82/0x180
[   16.413190]  ? preempt_count_sub+0x50/0x80
[   16.413215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.413262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.413285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.413307]  kthread+0x337/0x6f0
[   16.413326]  ? trace_preempt_on+0x20/0xc0
[   16.413351]  ? __pfx_kthread+0x10/0x10
[   16.413371]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.413392]  ? calculate_sigpending+0x7b/0xa0
[   16.413416]  ? __pfx_kthread+0x10/0x10
[   16.413437]  ret_from_fork+0x116/0x1d0
[   16.413467]  ? __pfx_kthread+0x10/0x10
[   16.413517]  ret_from_fork_asm+0x1a/0x30
[   16.413568]  </TASK>
[   16.413588] 
[   16.423883] Allocated by task 279:
[   16.423995]  kasan_save_stack+0x45/0x70
[   16.424105]  kasan_save_track+0x18/0x40
[   16.424192]  kasan_save_alloc_info+0x3b/0x50
[   16.425099]  __kasan_kmalloc+0xb7/0xc0
[   16.426048]  __kmalloc_cache_noprof+0x189/0x420
[   16.426477]  kasan_bitops_generic+0x92/0x1c0
[   16.426826]  kunit_try_run_case+0x1a5/0x480
[   16.427133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.427524]  kthread+0x337/0x6f0
[   16.427793]  ret_from_fork+0x116/0x1d0
[   16.428081]  ret_from_fork_asm+0x1a/0x30
[   16.428706] 
[   16.428877] The buggy address belongs to the object at ffff8881022a34c0
[   16.428877]  which belongs to the cache kmalloc-16 of size 16
[   16.430082] The buggy address is located 8 bytes inside of
[   16.430082]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.430967] 
[   16.431138] The buggy address belongs to the physical page:
[   16.431697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.431986] flags: 0x200000000000000(node=0|zone=2)
[   16.432186] page_type: f5(slab)
[   16.432645] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.433154] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.434092] page dumped because: kasan: bad access detected
[   16.434670] 
[   16.434833] Memory state around the buggy address:
[   16.435173]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.435722]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.436202] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.436744]                                               ^
[   16.436978]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.437908]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.438283] ==================================================================
[   16.525908] ==================================================================
[   16.526537] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.527316] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.528090] 
[   16.528347] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.528451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.528845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.528926] Call Trace:
[   16.528973]  <TASK>
[   16.529023]  dump_stack_lvl+0x73/0xb0
[   16.529090]  print_report+0xd1/0x650
[   16.529136]  ? __virt_addr_valid+0x1db/0x2d0
[   16.529177]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.529218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.529273]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.529317]  kasan_report+0x141/0x180
[   16.529360]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.529419]  kasan_check_range+0x10c/0x1c0
[   16.529465]  __kasan_check_write+0x18/0x20
[   16.529515]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.529563]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.529615]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.529656]  ? kasan_bitops_generic+0x92/0x1c0
[   16.529861]  kasan_bitops_generic+0x116/0x1c0
[   16.529919]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.529980]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.530027]  kunit_try_run_case+0x1a5/0x480
[   16.530075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.530112]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.530167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.530237]  ? __kthread_parkme+0x82/0x180
[   16.530278]  ? preempt_count_sub+0x50/0x80
[   16.530321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.530377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.530429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.530598]  kthread+0x337/0x6f0
[   16.530657]  ? trace_preempt_on+0x20/0xc0
[   16.530714]  ? __pfx_kthread+0x10/0x10
[   16.530757]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.530815]  ? calculate_sigpending+0x7b/0xa0
[   16.530857]  ? __pfx_kthread+0x10/0x10
[   16.530894]  ret_from_fork+0x116/0x1d0
[   16.530919]  ? __pfx_kthread+0x10/0x10
[   16.530940]  ret_from_fork_asm+0x1a/0x30
[   16.530972]  </TASK>
[   16.530986] 
[   16.542000] Allocated by task 279:
[   16.542316]  kasan_save_stack+0x45/0x70
[   16.542798]  kasan_save_track+0x18/0x40
[   16.543002]  kasan_save_alloc_info+0x3b/0x50
[   16.543327]  __kasan_kmalloc+0xb7/0xc0
[   16.543791]  __kmalloc_cache_noprof+0x189/0x420
[   16.544065]  kasan_bitops_generic+0x92/0x1c0
[   16.544364]  kunit_try_run_case+0x1a5/0x480
[   16.544711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.545041]  kthread+0x337/0x6f0
[   16.545347]  ret_from_fork+0x116/0x1d0
[   16.545546]  ret_from_fork_asm+0x1a/0x30
[   16.546260] 
[   16.546421] The buggy address belongs to the object at ffff8881022a34c0
[   16.546421]  which belongs to the cache kmalloc-16 of size 16
[   16.546879] The buggy address is located 8 bytes inside of
[   16.546879]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.547892] 
[   16.548073] The buggy address belongs to the physical page:
[   16.548570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.548959] flags: 0x200000000000000(node=0|zone=2)
[   16.549307] page_type: f5(slab)
[   16.550131] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.550592] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.550858] page dumped because: kasan: bad access detected
[   16.551056] 
[   16.551159] Memory state around the buggy address:
[   16.551359]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.551605]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.552240] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.552707]                                               ^
[   16.553166]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.553874]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.554667] ==================================================================