Hay
Date
May 15, 2025, 10:38 a.m.

Environment
e850-96

[   44.107415] ==================================================================
[   44.114475] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.123328] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   44.130706] 
[   44.132187] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   44.132236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.132252] Hardware name: WinLink E850-96 board (DT)
[   44.132268] Call trace:
[   44.132281]  show_stack+0x20/0x38 (C)
[   44.132313]  dump_stack_lvl+0x8c/0xd0
[   44.132343]  print_report+0x118/0x608
[   44.132373]  kasan_report+0xdc/0x128
[   44.132405]  kasan_check_range+0x100/0x1a8
[   44.132438]  __kasan_check_write+0x20/0x30
[   44.132473]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.132511]  kasan_bitops_generic+0x11c/0x1c8
[   44.132543]  kunit_try_run_case+0x170/0x3f0
[   44.132573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.132607]  kthread+0x328/0x630
[   44.132639]  ret_from_fork+0x10/0x20
[   44.132670] 
[   44.205791] Allocated by task 306:
[   44.209178]  kasan_save_stack+0x3c/0x68
[   44.212996]  kasan_save_track+0x20/0x40
[   44.216816]  kasan_save_alloc_info+0x40/0x58
[   44.221069]  __kasan_kmalloc+0xd4/0xd8
[   44.224802]  __kmalloc_cache_noprof+0x15c/0x3c0
[   44.229315]  kasan_bitops_generic+0xa0/0x1c8
[   44.233569]  kunit_try_run_case+0x170/0x3f0
[   44.237735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.243204]  kthread+0x328/0x630
[   44.246416]  ret_from_fork+0x10/0x20
[   44.249975] 
[   44.251450] The buggy address belongs to the object at ffff000800e200a0
[   44.251450]  which belongs to the cache kmalloc-16 of size 16
[   44.263780] The buggy address is located 8 bytes inside of
[   44.263780]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   44.276016] 
[   44.277492] The buggy address belongs to the physical page:
[   44.283047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   44.291033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.297545] page_type: f5(slab)
[   44.300677] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.308401] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.316120] page dumped because: kasan: bad access detected
[   44.321675] 
[   44.323150] Memory state around the buggy address:
[   44.327929]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.335133]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.342338] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.349539]                                   ^
[   44.354057]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.361261]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.368463] ==================================================================
[   45.708252] ==================================================================
[   45.715319] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.724259] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   45.731636] 
[   45.733118] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   45.733166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.733182] Hardware name: WinLink E850-96 board (DT)
[   45.733202] Call trace:
[   45.733216]  show_stack+0x20/0x38 (C)
[   45.733246]  dump_stack_lvl+0x8c/0xd0
[   45.733277]  print_report+0x118/0x608
[   45.733307]  kasan_report+0xdc/0x128
[   45.733338]  kasan_check_range+0x100/0x1a8
[   45.733371]  __kasan_check_write+0x20/0x30
[   45.733405]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.733440]  kasan_bitops_generic+0x11c/0x1c8
[   45.733472]  kunit_try_run_case+0x170/0x3f0
[   45.733504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.733538]  kthread+0x328/0x630
[   45.733572]  ret_from_fork+0x10/0x20
[   45.733602] 
[   45.806809] Allocated by task 306:
[   45.810196]  kasan_save_stack+0x3c/0x68
[   45.814014]  kasan_save_track+0x20/0x40
[   45.817833]  kasan_save_alloc_info+0x40/0x58
[   45.822087]  __kasan_kmalloc+0xd4/0xd8
[   45.825819]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.830333]  kasan_bitops_generic+0xa0/0x1c8
[   45.834586]  kunit_try_run_case+0x170/0x3f0
[   45.838753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.844222]  kthread+0x328/0x630
[   45.847433]  ret_from_fork+0x10/0x20
[   45.850992] 
[   45.852469] The buggy address belongs to the object at ffff000800e200a0
[   45.852469]  which belongs to the cache kmalloc-16 of size 16
[   45.864796] The buggy address is located 8 bytes inside of
[   45.864796]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   45.877034] 
[   45.878509] The buggy address belongs to the physical page:
[   45.884067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   45.892051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.898561] page_type: f5(slab)
[   45.901694] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.909418] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.917137] page dumped because: kasan: bad access detected
[   45.922693] 
[   45.924168] Memory state around the buggy address:
[   45.928949]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.936151]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.943356] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.950557]                                   ^
[   45.955074]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.962279]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.969480] ==================================================================
[   44.909481] ==================================================================
[   44.916546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.925486] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   44.932777] 
[   44.934257] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   44.934306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.934322] Hardware name: WinLink E850-96 board (DT)
[   44.934339] Call trace:
[   44.934352]  show_stack+0x20/0x38 (C)
[   44.934384]  dump_stack_lvl+0x8c/0xd0
[   44.934417]  print_report+0x118/0x608
[   44.934449]  kasan_report+0xdc/0x128
[   44.934477]  __asan_report_load8_noabort+0x20/0x30
[   44.934512]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.934545]  kasan_bitops_generic+0x11c/0x1c8
[   44.934575]  kunit_try_run_case+0x170/0x3f0
[   44.934605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.934638]  kthread+0x328/0x630
[   44.934670]  ret_from_fork+0x10/0x20
[   44.934701] 
[   45.004564] Allocated by task 306:
[   45.007950]  kasan_save_stack+0x3c/0x68
[   45.011769]  kasan_save_track+0x20/0x40
[   45.015588]  kasan_save_alloc_info+0x40/0x58
[   45.019841]  __kasan_kmalloc+0xd4/0xd8
[   45.023574]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.028088]  kasan_bitops_generic+0xa0/0x1c8
[   45.032341]  kunit_try_run_case+0x170/0x3f0
[   45.036508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.041977]  kthread+0x328/0x630
[   45.045189]  ret_from_fork+0x10/0x20
[   45.048748] 
[   45.050223] The buggy address belongs to the object at ffff000800e200a0
[   45.050223]  which belongs to the cache kmalloc-16 of size 16
[   45.062550] The buggy address is located 8 bytes inside of
[   45.062550]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   45.074789] 
[   45.076264] The buggy address belongs to the physical page:
[   45.081821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   45.089807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.096316] page_type: f5(slab)
[   45.099449] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.107173] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.114892] page dumped because: kasan: bad access detected
[   45.120448] 
[   45.121923] Memory state around the buggy address:
[   45.126701]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.133906]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.141111] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.148312]                                   ^
[   45.152829]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.160034]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.167235] ==================================================================
[   46.241952] ==================================================================
[   46.248991] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.257931] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   46.265222] 
[   46.266703] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   46.266751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.266766] Hardware name: WinLink E850-96 board (DT)
[   46.266784] Call trace:
[   46.266794]  show_stack+0x20/0x38 (C)
[   46.266826]  dump_stack_lvl+0x8c/0xd0
[   46.266856]  print_report+0x118/0x608
[   46.266889]  kasan_report+0xdc/0x128
[   46.266919]  __asan_report_load8_noabort+0x20/0x30
[   46.266955]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.266990]  kasan_bitops_generic+0x11c/0x1c8
[   46.267021]  kunit_try_run_case+0x170/0x3f0
[   46.267052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.267086]  kthread+0x328/0x630
[   46.267118]  ret_from_fork+0x10/0x20
[   46.267148] 
[   46.337009] Allocated by task 306:
[   46.340395]  kasan_save_stack+0x3c/0x68
[   46.344214]  kasan_save_track+0x20/0x40
[   46.348034]  kasan_save_alloc_info+0x40/0x58
[   46.352287]  __kasan_kmalloc+0xd4/0xd8
[   46.356019]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.360533]  kasan_bitops_generic+0xa0/0x1c8
[   46.364787]  kunit_try_run_case+0x170/0x3f0
[   46.368953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.374422]  kthread+0x328/0x630
[   46.377634]  ret_from_fork+0x10/0x20
[   46.381193] 
[   46.382668] The buggy address belongs to the object at ffff000800e200a0
[   46.382668]  which belongs to the cache kmalloc-16 of size 16
[   46.394995] The buggy address is located 8 bytes inside of
[   46.394995]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   46.407234] 
[   46.408710] The buggy address belongs to the physical page:
[   46.414267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   46.422251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.428761] page_type: f5(slab)
[   46.431894] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.439618] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.447338] page dumped because: kasan: bad access detected
[   46.452893] 
[   46.454368] Memory state around the buggy address:
[   46.459147]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.466352]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.473556] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.480757]                                   ^
[   46.485274]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.492480]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.499680] ==================================================================
[   44.375813] ==================================================================
[   44.382873] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.391813] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   44.399104] 
[   44.400584] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   44.400633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.400649] Hardware name: WinLink E850-96 board (DT)
[   44.400667] Call trace:
[   44.400679]  show_stack+0x20/0x38 (C)
[   44.400711]  dump_stack_lvl+0x8c/0xd0
[   44.400741]  print_report+0x118/0x608
[   44.400772]  kasan_report+0xdc/0x128
[   44.400804]  __asan_report_load8_noabort+0x20/0x30
[   44.400838]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.400877]  kasan_bitops_generic+0x11c/0x1c8
[   44.400908]  kunit_try_run_case+0x170/0x3f0
[   44.400936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.400970]  kthread+0x328/0x630
[   44.401000]  ret_from_fork+0x10/0x20
[   44.401031] 
[   44.470891] Allocated by task 306:
[   44.474277]  kasan_save_stack+0x3c/0x68
[   44.478096]  kasan_save_track+0x20/0x40
[   44.481916]  kasan_save_alloc_info+0x40/0x58
[   44.486169]  __kasan_kmalloc+0xd4/0xd8
[   44.489902]  __kmalloc_cache_noprof+0x15c/0x3c0
[   44.494416]  kasan_bitops_generic+0xa0/0x1c8
[   44.498669]  kunit_try_run_case+0x170/0x3f0
[   44.502835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.508304]  kthread+0x328/0x630
[   44.511516]  ret_from_fork+0x10/0x20
[   44.515075] 
[   44.516550] The buggy address belongs to the object at ffff000800e200a0
[   44.516550]  which belongs to the cache kmalloc-16 of size 16
[   44.528877] The buggy address is located 8 bytes inside of
[   44.528877]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   44.541116] 
[   44.542592] The buggy address belongs to the physical page:
[   44.548148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   44.556133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.562644] page_type: f5(slab)
[   44.565777] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.573501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.581220] page dumped because: kasan: bad access detected
[   44.586775] 
[   44.588250] Memory state around the buggy address:
[   44.593029]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.600234]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.607439] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.614639]                                   ^
[   44.619157]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.626362]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.633563] ==================================================================
[   45.174610] ==================================================================
[   45.181646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.190586] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   45.197964] 
[   45.199446] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   45.199496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.199513] Hardware name: WinLink E850-96 board (DT)
[   45.199532] Call trace:
[   45.199544]  show_stack+0x20/0x38 (C)
[   45.199577]  dump_stack_lvl+0x8c/0xd0
[   45.199609]  print_report+0x118/0x608
[   45.199639]  kasan_report+0xdc/0x128
[   45.199671]  kasan_check_range+0x100/0x1a8
[   45.199704]  __kasan_check_write+0x20/0x30
[   45.199737]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.199775]  kasan_bitops_generic+0x11c/0x1c8
[   45.199805]  kunit_try_run_case+0x170/0x3f0
[   45.199837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.199871]  kthread+0x328/0x630
[   45.199904]  ret_from_fork+0x10/0x20
[   45.199934] 
[   45.273136] Allocated by task 306:
[   45.276523]  kasan_save_stack+0x3c/0x68
[   45.280341]  kasan_save_track+0x20/0x40
[   45.284161]  kasan_save_alloc_info+0x40/0x58
[   45.288414]  __kasan_kmalloc+0xd4/0xd8
[   45.292147]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.296660]  kasan_bitops_generic+0xa0/0x1c8
[   45.300914]  kunit_try_run_case+0x170/0x3f0
[   45.305081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.310549]  kthread+0x328/0x630
[   45.313761]  ret_from_fork+0x10/0x20
[   45.317320] 
[   45.318795] The buggy address belongs to the object at ffff000800e200a0
[   45.318795]  which belongs to the cache kmalloc-16 of size 16
[   45.331124] The buggy address is located 8 bytes inside of
[   45.331124]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   45.343361] 
[   45.344837] The buggy address belongs to the physical page:
[   45.350396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   45.358378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.364890] page_type: f5(slab)
[   45.368021] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.375746] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.383465] page dumped because: kasan: bad access detected
[   45.389020] 
[   45.390496] Memory state around the buggy address:
[   45.395276]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.402479]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.409683] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.416884]                                   ^
[   45.421402]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.428607]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.435808] ==================================================================
[   45.443129] ==================================================================
[   45.450219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.459158] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   45.466449] 
[   45.467929] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   45.467977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.467995] Hardware name: WinLink E850-96 board (DT)
[   45.468012] Call trace:
[   45.468026]  show_stack+0x20/0x38 (C)
[   45.468059]  dump_stack_lvl+0x8c/0xd0
[   45.468088]  print_report+0x118/0x608
[   45.468120]  kasan_report+0xdc/0x128
[   45.468151]  __asan_report_load8_noabort+0x20/0x30
[   45.468188]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.468224]  kasan_bitops_generic+0x11c/0x1c8
[   45.468254]  kunit_try_run_case+0x170/0x3f0
[   45.468284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.468318]  kthread+0x328/0x630
[   45.468349]  ret_from_fork+0x10/0x20
[   45.468379] 
[   45.538236] Allocated by task 306:
[   45.541622]  kasan_save_stack+0x3c/0x68
[   45.545441]  kasan_save_track+0x20/0x40
[   45.549261]  kasan_save_alloc_info+0x40/0x58
[   45.553514]  __kasan_kmalloc+0xd4/0xd8
[   45.557247]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.561761]  kasan_bitops_generic+0xa0/0x1c8
[   45.566014]  kunit_try_run_case+0x170/0x3f0
[   45.570181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.575649]  kthread+0x328/0x630
[   45.578861]  ret_from_fork+0x10/0x20
[   45.582420] 
[   45.583896] The buggy address belongs to the object at ffff000800e200a0
[   45.583896]  which belongs to the cache kmalloc-16 of size 16
[   45.596224] The buggy address is located 8 bytes inside of
[   45.596224]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   45.608461] 
[   45.609937] The buggy address belongs to the physical page:
[   45.615493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   45.623479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.629989] page_type: f5(slab)
[   45.633122] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.640846] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.648564] page dumped because: kasan: bad access detected
[   45.654120] 
[   45.655596] Memory state around the buggy address:
[   45.660375]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.667579]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.674783] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.681984]                                   ^
[   45.686502]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.693707]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.700908] ==================================================================
[   44.640940] ==================================================================
[   44.647975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.656913] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   44.664292] 
[   44.665772] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   44.665819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.665837] Hardware name: WinLink E850-96 board (DT)
[   44.665855] Call trace:
[   44.665866]  show_stack+0x20/0x38 (C)
[   44.665898]  dump_stack_lvl+0x8c/0xd0
[   44.665929]  print_report+0x118/0x608
[   44.665960]  kasan_report+0xdc/0x128
[   44.665990]  kasan_check_range+0x100/0x1a8
[   44.666022]  __kasan_check_write+0x20/0x30
[   44.666056]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.666091]  kasan_bitops_generic+0x11c/0x1c8
[   44.666124]  kunit_try_run_case+0x170/0x3f0
[   44.666156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.666190]  kthread+0x328/0x630
[   44.666223]  ret_from_fork+0x10/0x20
[   44.666252] 
[   44.739464] Allocated by task 306:
[   44.742849]  kasan_save_stack+0x3c/0x68
[   44.746669]  kasan_save_track+0x20/0x40
[   44.750488]  kasan_save_alloc_info+0x40/0x58
[   44.754742]  __kasan_kmalloc+0xd4/0xd8
[   44.758474]  __kmalloc_cache_noprof+0x15c/0x3c0
[   44.762988]  kasan_bitops_generic+0xa0/0x1c8
[   44.767241]  kunit_try_run_case+0x170/0x3f0
[   44.771408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.776877]  kthread+0x328/0x630
[   44.780088]  ret_from_fork+0x10/0x20
[   44.783647] 
[   44.785123] The buggy address belongs to the object at ffff000800e200a0
[   44.785123]  which belongs to the cache kmalloc-16 of size 16
[   44.797449] The buggy address is located 8 bytes inside of
[   44.797449]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   44.809689] 
[   44.811164] The buggy address belongs to the physical page:
[   44.816722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   44.824709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.831216] page_type: f5(slab)
[   44.834349] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.842073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.849792] page dumped because: kasan: bad access detected
[   44.855347] 
[   44.856823] Memory state around the buggy address:
[   44.861601]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.868806]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.876011] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.883212]                                   ^
[   44.887729]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.894934]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.902135] ==================================================================
[   45.976828] ==================================================================
[   45.983891] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   45.992831] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306
[   46.000122] 
[   46.001603] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   46.001650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.001664] Hardware name: WinLink E850-96 board (DT)
[   46.001684] Call trace:
[   46.001697]  show_stack+0x20/0x38 (C)
[   46.001726]  dump_stack_lvl+0x8c/0xd0
[   46.001757]  print_report+0x118/0x608
[   46.001789]  kasan_report+0xdc/0x128
[   46.001819]  __asan_report_load8_noabort+0x20/0x30
[   46.001855]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   46.001894]  kasan_bitops_generic+0x11c/0x1c8
[   46.001925]  kunit_try_run_case+0x170/0x3f0
[   46.001955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.001988]  kthread+0x328/0x630
[   46.002019]  ret_from_fork+0x10/0x20
[   46.002049] 
[   46.071909] Allocated by task 306:
[   46.075294]  kasan_save_stack+0x3c/0x68
[   46.079114]  kasan_save_track+0x20/0x40
[   46.082934]  kasan_save_alloc_info+0x40/0x58
[   46.087187]  __kasan_kmalloc+0xd4/0xd8
[   46.090919]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.095433]  kasan_bitops_generic+0xa0/0x1c8
[   46.099686]  kunit_try_run_case+0x170/0x3f0
[   46.103853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.109322]  kthread+0x328/0x630
[   46.112533]  ret_from_fork+0x10/0x20
[   46.116093] 
[   46.117568] The buggy address belongs to the object at ffff000800e200a0
[   46.117568]  which belongs to the cache kmalloc-16 of size 16
[   46.129895] The buggy address is located 8 bytes inside of
[   46.129895]  allocated 9-byte region [ffff000800e200a0, ffff000800e200a9)
[   46.142134] 
[   46.143609] The buggy address belongs to the physical page:
[   46.149167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20
[   46.157152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.163661] page_type: f5(slab)
[   46.166794] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.174518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.182237] page dumped because: kasan: bad access detected
[   46.187792] 
[   46.189268] Memory state around the buggy address:
[   46.194048]  ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.201251]  ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.208456] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.215657]                                   ^
[   46.220174]  ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.227379]  ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.234580] ==================================================================