Hay
Date
May 15, 2025, 10:38 a.m.

Environment
e850-96

[   43.046281] ==================================================================
[   43.053381] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   43.061538] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   43.068829] 
[   43.070312] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   43.070365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.070382] Hardware name: WinLink E850-96 board (DT)
[   43.070404] Call trace:
[   43.070419]  show_stack+0x20/0x38 (C)
[   43.070451]  dump_stack_lvl+0x8c/0xd0
[   43.070482]  print_report+0x118/0x608
[   43.070514]  kasan_report+0xdc/0x128
[   43.070543]  __asan_report_load8_noabort+0x20/0x30
[   43.070582]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   43.070616]  kasan_bitops_generic+0x110/0x1c8
[   43.070646]  kunit_try_run_case+0x170/0x3f0
[   43.070679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.070714]  kthread+0x328/0x630
[   43.070745]  ret_from_fork+0x10/0x20
[   43.070777] 
[   43.139835] Allocated by task 306:
[   43.143223]  kasan_save_stack+0x3c/0x68
[   43.147040]  kasan_save_track+0x20/0x40
[   43.150859]  kasan_save_alloc_info+0x40/0x58
[   43.155113]  __kasan_kmalloc+0xd4/0xd8
[   43.158845]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.163359]  kasan_bitops_generic+0xa0/0x1c8
[   43.167613]  kunit_try_run_case+0x170/0x3f0
[   43.171779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.177248]  kthread+0x328/0x630
[   43.180459]  ret_from_fork+0x10/0x20
[   43.184018] 
[   43.185494] The buggy address belongs to the object at ffff000800e200a0
[   43.185494]  which belongs to the cache kmalloc-16 of size 16
[   43.197824] The buggy address is located 8 bytes inside of
[   43.197824]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   43.210060] 
[   43.211535] The buggy address belongs to the physical page:
[   43.217095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   43.225077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.231589] page_type: f5(slab)
[   43.234720] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.242445] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.250163] page dumped because: kasan: bad access detected
[   43.255719] 
[   43.257194] Memory state around the buggy address:
[   43.261972]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.269177]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.276382] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.283583]                                   ^
[   43.288100]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.295305]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.302506] ==================================================================
[   41.448930] ==================================================================
[   41.458268] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.466424] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   41.473802] 
[   41.475288] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   41.475343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.475363] Hardware name: WinLink E850-96 board (DT)
[   41.475387] Call trace:
[   41.475402]  show_stack+0x20/0x38 (C)
[   41.475442]  dump_stack_lvl+0x8c/0xd0
[   41.475477]  print_report+0x118/0x608
[   41.475513]  kasan_report+0xdc/0x128
[   41.475546]  kasan_check_range+0x100/0x1a8
[   41.475584]  __kasan_check_write+0x20/0x30
[   41.475624]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.475657]  kasan_bitops_generic+0x110/0x1c8
[   41.475689]  kunit_try_run_case+0x170/0x3f0
[   41.475723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.475761]  kthread+0x328/0x630
[   41.475798]  ret_from_fork+0x10/0x20
[   41.475834] 
[   41.548193] Allocated by task 306:
[   41.551581]  kasan_save_stack+0x3c/0x68
[   41.555397]  kasan_save_track+0x20/0x40
[   41.559217]  kasan_save_alloc_info+0x40/0x58
[   41.563470]  __kasan_kmalloc+0xd4/0xd8
[   41.567204]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.571716]  kasan_bitops_generic+0xa0/0x1c8
[   41.575970]  kunit_try_run_case+0x170/0x3f0
[   41.580135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.585605]  kthread+0x328/0x630
[   41.588817]  ret_from_fork+0x10/0x20
[   41.592376] 
[   41.593853] The buggy address belongs to the object at ffff000800e200a0
[   41.593853]  which belongs to the cache kmalloc-16 of size 16
[   41.606180] The buggy address is located 8 bytes inside of
[   41.606180]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   41.618417] 
[   41.619897] The buggy address belongs to the physical page:
[   41.625452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   41.633437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.639946] page_type: f5(slab)
[   41.643084] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.650802] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.658523] page dumped because: kasan: bad access detected
[   41.664076] 
[   41.665551] Memory state around the buggy address:
[   41.670333]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.677535]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   41.684739] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.691940]                                   ^
[   41.696458]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.703662]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.710865] ==================================================================
[   41.981786] ==================================================================
[   41.988814] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   41.996971] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   42.004349] 
[   42.005832] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   42.005882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.005899] Hardware name: WinLink E850-96 board (DT)
[   42.005919] Call trace:
[   42.005936]  show_stack+0x20/0x38 (C)
[   42.005971]  dump_stack_lvl+0x8c/0xd0
[   42.006002]  print_report+0x118/0x608
[   42.006034]  kasan_report+0xdc/0x128
[   42.006066]  kasan_check_range+0x100/0x1a8
[   42.006100]  __kasan_check_write+0x20/0x30
[   42.006136]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   42.006170]  kasan_bitops_generic+0x110/0x1c8
[   42.006202]  kunit_try_run_case+0x170/0x3f0
[   42.006233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.006268]  kthread+0x328/0x630
[   42.006301]  ret_from_fork+0x10/0x20
[   42.006335] 
[   42.078740] Allocated by task 306:
[   42.082127]  kasan_save_stack+0x3c/0x68
[   42.085945]  kasan_save_track+0x20/0x40
[   42.089764]  kasan_save_alloc_info+0x40/0x58
[   42.094018]  __kasan_kmalloc+0xd4/0xd8
[   42.097750]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.102264]  kasan_bitops_generic+0xa0/0x1c8
[   42.106517]  kunit_try_run_case+0x170/0x3f0
[   42.110684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.116153]  kthread+0x328/0x630
[   42.119364]  ret_from_fork+0x10/0x20
[   42.122923] 
[   42.124400] The buggy address belongs to the object at ffff000800e200a0
[   42.124400]  which belongs to the cache kmalloc-16 of size 16
[   42.136728] The buggy address is located 8 bytes inside of
[   42.136728]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   42.148964] 
[   42.150442] The buggy address belongs to the physical page:
[   42.155999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   42.163985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.170493] page_type: f5(slab)
[   42.173625] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.181349] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.189070] page dumped because: kasan: bad access detected
[   42.194623] 
[   42.196098] Memory state around the buggy address:
[   42.200878]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.208082]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.215289] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.222488]                                   ^
[   42.227005]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.234210]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.241411] ==================================================================
[   43.843851] ==================================================================
[   43.850937] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.859095] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   43.866387] 
[   43.867868] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   43.867917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.867933] Hardware name: WinLink E850-96 board (DT)
[   43.867953] Call trace:
[   43.867964]  show_stack+0x20/0x38 (C)
[   43.867994]  dump_stack_lvl+0x8c/0xd0
[   43.868027]  print_report+0x118/0x608
[   43.868060]  kasan_report+0xdc/0x128
[   43.868090]  __asan_report_load8_noabort+0x20/0x30
[   43.868128]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.868163]  kasan_bitops_generic+0x110/0x1c8
[   43.868193]  kunit_try_run_case+0x170/0x3f0
[   43.868223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.868256]  kthread+0x328/0x630
[   43.868289]  ret_from_fork+0x10/0x20
[   43.868322] 
[   43.937392] Allocated by task 306:
[   43.940778]  kasan_save_stack+0x3c/0x68
[   43.944597]  kasan_save_track+0x20/0x40
[   43.948417]  kasan_save_alloc_info+0x40/0x58
[   43.952670]  __kasan_kmalloc+0xd4/0xd8
[   43.956403]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.960917]  kasan_bitops_generic+0xa0/0x1c8
[   43.965170]  kunit_try_run_case+0x170/0x3f0
[   43.969336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.974805]  kthread+0x328/0x630
[   43.978017]  ret_from_fork+0x10/0x20
[   43.981576] 
[   43.983051] The buggy address belongs to the object at ffff000800e200a0
[   43.983051]  which belongs to the cache kmalloc-16 of size 16
[   43.995380] The buggy address is located 8 bytes inside of
[   43.995380]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   44.007617] 
[   44.009093] The buggy address belongs to the physical page:
[   44.014651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   44.022635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.029144] page_type: f5(slab)
[   44.032278] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.040002] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.047721] page dumped because: kasan: bad access detected
[   44.053276] 
[   44.054752] Memory state around the buggy address:
[   44.059530]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.066735]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.073939] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.081140]                                   ^
[   44.085658]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.092863]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.100064] ==================================================================
[   42.512257] ==================================================================
[   42.519363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.527518] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   42.534896] 
[   42.536380] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   42.536430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.536447] Hardware name: WinLink E850-96 board (DT)
[   42.536467] Call trace:
[   42.536482]  show_stack+0x20/0x38 (C)
[   42.536518]  dump_stack_lvl+0x8c/0xd0
[   42.536549]  print_report+0x118/0x608
[   42.536580]  kasan_report+0xdc/0x128
[   42.536610]  kasan_check_range+0x100/0x1a8
[   42.536644]  __kasan_check_write+0x20/0x30
[   42.536678]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.536711]  kasan_bitops_generic+0x110/0x1c8
[   42.536742]  kunit_try_run_case+0x170/0x3f0
[   42.536775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.536809]  kthread+0x328/0x630
[   42.536844]  ret_from_fork+0x10/0x20
[   42.536876] 
[   42.609287] Allocated by task 306:
[   42.612675]  kasan_save_stack+0x3c/0x68
[   42.616492]  kasan_save_track+0x20/0x40
[   42.620312]  kasan_save_alloc_info+0x40/0x58
[   42.624565]  __kasan_kmalloc+0xd4/0xd8
[   42.628298]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.632811]  kasan_bitops_generic+0xa0/0x1c8
[   42.637065]  kunit_try_run_case+0x170/0x3f0
[   42.641232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.646700]  kthread+0x328/0x630
[   42.649912]  ret_from_fork+0x10/0x20
[   42.653471] 
[   42.654948] The buggy address belongs to the object at ffff000800e200a0
[   42.654948]  which belongs to the cache kmalloc-16 of size 16
[   42.667276] The buggy address is located 8 bytes inside of
[   42.667276]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   42.679512] 
[   42.680988] The buggy address belongs to the physical page:
[   42.686546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   42.694531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.701041] page_type: f5(slab)
[   42.704176] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.711897] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.719617] page dumped because: kasan: bad access detected
[   42.725171] 
[   42.726646] Memory state around the buggy address:
[   42.731428]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.738630]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.745834] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.753035]                                   ^
[   42.757553]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.764758]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.771960] ==================================================================
[   42.248710] ==================================================================
[   42.255823] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.263980] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   42.271272] 
[   42.272754] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   42.272803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.272822] Hardware name: WinLink E850-96 board (DT)
[   42.272839] Call trace:
[   42.272853]  show_stack+0x20/0x38 (C)
[   42.272884]  dump_stack_lvl+0x8c/0xd0
[   42.272914]  print_report+0x118/0x608
[   42.272946]  kasan_report+0xdc/0x128
[   42.272978]  __asan_report_load8_noabort+0x20/0x30
[   42.273016]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.273049]  kasan_bitops_generic+0x110/0x1c8
[   42.273080]  kunit_try_run_case+0x170/0x3f0
[   42.273110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.273144]  kthread+0x328/0x630
[   42.273176]  ret_from_fork+0x10/0x20
[   42.273205] 
[   42.342277] Allocated by task 306:
[   42.345665]  kasan_save_stack+0x3c/0x68
[   42.349483]  kasan_save_track+0x20/0x40
[   42.353302]  kasan_save_alloc_info+0x40/0x58
[   42.357555]  __kasan_kmalloc+0xd4/0xd8
[   42.361288]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.365801]  kasan_bitops_generic+0xa0/0x1c8
[   42.370055]  kunit_try_run_case+0x170/0x3f0
[   42.374222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.379690]  kthread+0x328/0x630
[   42.382902]  ret_from_fork+0x10/0x20
[   42.386461] 
[   42.387937] The buggy address belongs to the object at ffff000800e200a0
[   42.387937]  which belongs to the cache kmalloc-16 of size 16
[   42.400265] The buggy address is located 8 bytes inside of
[   42.400265]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   42.412502] 
[   42.413978] The buggy address belongs to the physical page:
[   42.419537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   42.427521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.434031] page_type: f5(slab)
[   42.437163] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.444887] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.452607] page dumped because: kasan: bad access detected
[   42.458161] 
[   42.459637] Memory state around the buggy address:
[   42.464418]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.471620]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.478824] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.486025]                                   ^
[   42.490543]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.497748]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.504949] ==================================================================
[   42.779268] ==================================================================
[   42.786373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.794528] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   42.801906] 
[   42.803389] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   42.803440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.803456] Hardware name: WinLink E850-96 board (DT)
[   42.803477] Call trace:
[   42.803492]  show_stack+0x20/0x38 (C)
[   42.803525]  dump_stack_lvl+0x8c/0xd0
[   42.803559]  print_report+0x118/0x608
[   42.803589]  kasan_report+0xdc/0x128
[   42.803618]  kasan_check_range+0x100/0x1a8
[   42.803651]  __kasan_check_write+0x20/0x30
[   42.803684]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.803718]  kasan_bitops_generic+0x110/0x1c8
[   42.803748]  kunit_try_run_case+0x170/0x3f0
[   42.803780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.803815]  kthread+0x328/0x630
[   42.803845]  ret_from_fork+0x10/0x20
[   42.803876] 
[   42.876298] Allocated by task 306:
[   42.879685]  kasan_save_stack+0x3c/0x68
[   42.883502]  kasan_save_track+0x20/0x40
[   42.887321]  kasan_save_alloc_info+0x40/0x58
[   42.891575]  __kasan_kmalloc+0xd4/0xd8
[   42.895307]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.899821]  kasan_bitops_generic+0xa0/0x1c8
[   42.904075]  kunit_try_run_case+0x170/0x3f0
[   42.908241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.913710]  kthread+0x328/0x630
[   42.916922]  ret_from_fork+0x10/0x20
[   42.920480] 
[   42.921958] The buggy address belongs to the object at ffff000800e200a0
[   42.921958]  which belongs to the cache kmalloc-16 of size 16
[   42.934286] The buggy address is located 8 bytes inside of
[   42.934286]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   42.946522] 
[   42.947998] The buggy address belongs to the physical page:
[   42.953557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   42.961539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.968051] page_type: f5(slab)
[   42.971184] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.978907] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.986626] page dumped because: kasan: bad access detected
[   42.992181] 
[   42.993657] Memory state around the buggy address:
[   42.998436]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.005639]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.012844] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.020045]                                   ^
[   43.024563]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.031768]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.038969] ==================================================================
[   43.576898] ==================================================================
[   43.583927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.592085] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   43.599464] 
[   43.600945] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   43.600997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.601012] Hardware name: WinLink E850-96 board (DT)
[   43.601031] Call trace:
[   43.601044]  show_stack+0x20/0x38 (C)
[   43.601074]  dump_stack_lvl+0x8c/0xd0
[   43.601107]  print_report+0x118/0x608
[   43.601138]  kasan_report+0xdc/0x128
[   43.601170]  kasan_check_range+0x100/0x1a8
[   43.601204]  __kasan_check_write+0x20/0x30
[   43.601239]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.601273]  kasan_bitops_generic+0x110/0x1c8
[   43.601302]  kunit_try_run_case+0x170/0x3f0
[   43.601330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.601365]  kthread+0x328/0x630
[   43.601396]  ret_from_fork+0x10/0x20
[   43.601427] 
[   43.673854] Allocated by task 306:
[   43.677242]  kasan_save_stack+0x3c/0x68
[   43.681060]  kasan_save_track+0x20/0x40
[   43.684879]  kasan_save_alloc_info+0x40/0x58
[   43.689132]  __kasan_kmalloc+0xd4/0xd8
[   43.692865]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.697379]  kasan_bitops_generic+0xa0/0x1c8
[   43.701632]  kunit_try_run_case+0x170/0x3f0
[   43.705799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.711267]  kthread+0x328/0x630
[   43.714479]  ret_from_fork+0x10/0x20
[   43.718038] 
[   43.719515] The buggy address belongs to the object at ffff000800e200a0
[   43.719515]  which belongs to the cache kmalloc-16 of size 16
[   43.731842] The buggy address is located 8 bytes inside of
[   43.731842]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   43.744080] 
[   43.745555] The buggy address belongs to the physical page:
[   43.751114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   43.759097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.765608] page_type: f5(slab)
[   43.768740] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.776464] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.784183] page dumped because: kasan: bad access detected
[   43.789739] 
[   43.791214] Memory state around the buggy address:
[   43.795994]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.803197]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.810402] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.817603]                                   ^
[   43.822120]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.829325]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.836526] ==================================================================
[   43.309874] ==================================================================
[   43.316918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.325076] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   43.332454] 
[   43.333935] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   43.333985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.334002] Hardware name: WinLink E850-96 board (DT)
[   43.334017] Call trace:
[   43.334031]  show_stack+0x20/0x38 (C)
[   43.334063]  dump_stack_lvl+0x8c/0xd0
[   43.334092]  print_report+0x118/0x608
[   43.334123]  kasan_report+0xdc/0x128
[   43.334151]  kasan_check_range+0x100/0x1a8
[   43.334185]  __kasan_check_write+0x20/0x30
[   43.334220]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.334252]  kasan_bitops_generic+0x110/0x1c8
[   43.334283]  kunit_try_run_case+0x170/0x3f0
[   43.334311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.334346]  kthread+0x328/0x630
[   43.334379]  ret_from_fork+0x10/0x20
[   43.334409] 
[   43.406845] Allocated by task 306:
[   43.410232]  kasan_save_stack+0x3c/0x68
[   43.414050]  kasan_save_track+0x20/0x40
[   43.417869]  kasan_save_alloc_info+0x40/0x58
[   43.422122]  __kasan_kmalloc+0xd4/0xd8
[   43.425855]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.430369]  kasan_bitops_generic+0xa0/0x1c8
[   43.434622]  kunit_try_run_case+0x170/0x3f0
[   43.438789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.444258]  kthread+0x328/0x630
[   43.447469]  ret_from_fork+0x10/0x20
[   43.451028] 
[   43.452504] The buggy address belongs to the object at ffff000800e200a0
[   43.452504]  which belongs to the cache kmalloc-16 of size 16
[   43.464830] The buggy address is located 8 bytes inside of
[   43.464830]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   43.477070] 
[   43.478545] The buggy address belongs to the physical page:
[   43.484103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   43.492087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.498598] page_type: f5(slab)
[   43.501730] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.509454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.517173] page dumped because: kasan: bad access detected
[   43.522728] 
[   43.524204] Memory state around the buggy address:
[   43.528982]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.536187]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.543392] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.550593]                                   ^
[   43.555110]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.562315]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.569516] ==================================================================
[   41.718171] ==================================================================
[   41.725277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.733432] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   41.740724] 
[   41.742211] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   41.742264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.742280] Hardware name: WinLink E850-96 board (DT)
[   41.742300] Call trace:
[   41.742316]  show_stack+0x20/0x38 (C)
[   41.742348]  dump_stack_lvl+0x8c/0xd0
[   41.742380]  print_report+0x118/0x608
[   41.742414]  kasan_report+0xdc/0x128
[   41.742445]  __asan_report_load8_noabort+0x20/0x30
[   41.742483]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.742516]  kasan_bitops_generic+0x110/0x1c8
[   41.742548]  kunit_try_run_case+0x170/0x3f0
[   41.742580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.742613]  kthread+0x328/0x630
[   41.742644]  ret_from_fork+0x10/0x20
[   41.742677] 
[   41.811730] Allocated by task 306:
[   41.815117]  kasan_save_stack+0x3c/0x68
[   41.818935]  kasan_save_track+0x20/0x40
[   41.822754]  kasan_save_alloc_info+0x40/0x58
[   41.827008]  __kasan_kmalloc+0xd4/0xd8
[   41.830740]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.835254]  kasan_bitops_generic+0xa0/0x1c8
[   41.839507]  kunit_try_run_case+0x170/0x3f0
[   41.843674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.849143]  kthread+0x328/0x630
[   41.852354]  ret_from_fork+0x10/0x20
[   41.855914] 
[   41.857391] The buggy address belongs to the object at ffff000800e200a0
[   41.857391]  which belongs to the cache kmalloc-16 of size 16
[   41.869718] The buggy address is located 8 bytes inside of
[   41.869718]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   41.881955] 
[   41.883431] The buggy address belongs to the physical page:
[   41.888989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   41.896973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.903483] page_type: f5(slab)
[   41.906615] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.914339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.922058] page dumped because: kasan: bad access detected
[   41.927613] 
[   41.929089] Memory state around the buggy address:
[   41.933869]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.941072]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   41.948277] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.955478]                                   ^
[   41.959995]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.967200]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.974402] ==================================================================