Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-x86_64

[   42.277191] ==================================================================
[   42.284306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.292463] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   42.299754] 
[   42.301236] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   42.301289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.301308] Hardware name: WinLink E850-96 board (DT)
[   42.301328] Call trace:
[   42.301340]  show_stack+0x20/0x38 (C)
[   42.301376]  dump_stack_lvl+0x8c/0xd0
[   42.301413]  print_report+0x118/0x608
[   42.301448]  kasan_report+0xdc/0x128
[   42.301479]  __asan_report_load8_noabort+0x20/0x30
[   42.301512]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.301547]  kasan_bitops_generic+0x110/0x1c8
[   42.301581]  kunit_try_run_case+0x170/0x3f0
[   42.301614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.301653]  kthread+0x328/0x630
[   42.301683]  ret_from_fork+0x10/0x20
[   42.301715] 
[   42.370412] Allocated by task 305:
[   42.373798]  kasan_save_stack+0x3c/0x68
[   42.377617]  kasan_save_track+0x20/0x40
[   42.381437]  kasan_save_alloc_info+0x40/0x58
[   42.385690]  __kasan_kmalloc+0xd4/0xd8
[   42.389423]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.393937]  kasan_bitops_generic+0xa0/0x1c8
[   42.398190]  kunit_try_run_case+0x170/0x3f0
[   42.402356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.407825]  kthread+0x328/0x630
[   42.411037]  ret_from_fork+0x10/0x20
[   42.414596] 
[   42.416071] The buggy address belongs to the object at ffff00080444cc20
[   42.416071]  which belongs to the cache kmalloc-16 of size 16
[   42.428398] The buggy address is located 8 bytes inside of
[   42.428398]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   42.440638] 
[   42.442113] The buggy address belongs to the physical page:
[   42.447669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   42.455657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.462165] page_type: f5(slab)
[   42.465299] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.473022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.480741] page dumped because: kasan: bad access detected
[   42.486296] 
[   42.487772] Memory state around the buggy address:
[   42.492550]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.499754]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   42.506959] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.514160]                                   ^
[   42.518678]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.525883]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.533084] ==================================================================
[   42.807042] ==================================================================
[   42.814158] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.822316] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   42.829694] 
[   42.831177] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   42.831228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.831246] Hardware name: WinLink E850-96 board (DT)
[   42.831264] Call trace:
[   42.831276]  show_stack+0x20/0x38 (C)
[   42.831313]  dump_stack_lvl+0x8c/0xd0
[   42.831349]  print_report+0x118/0x608
[   42.831384]  kasan_report+0xdc/0x128
[   42.831415]  kasan_check_range+0x100/0x1a8
[   42.831452]  __kasan_check_write+0x20/0x30
[   42.831483]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.831518]  kasan_bitops_generic+0x110/0x1c8
[   42.831550]  kunit_try_run_case+0x170/0x3f0
[   42.831583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.831622]  kthread+0x328/0x630
[   42.831647]  ret_from_fork+0x10/0x20
[   42.831677] 
[   42.903738] Allocated by task 305:
[   42.907124]  kasan_save_stack+0x3c/0x68
[   42.910943]  kasan_save_track+0x20/0x40
[   42.914762]  kasan_save_alloc_info+0x40/0x58
[   42.919015]  __kasan_kmalloc+0xd4/0xd8
[   42.922748]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.927262]  kasan_bitops_generic+0xa0/0x1c8
[   42.931515]  kunit_try_run_case+0x170/0x3f0
[   42.935682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.941150]  kthread+0x328/0x630
[   42.944362]  ret_from_fork+0x10/0x20
[   42.947921] 
[   42.949397] The buggy address belongs to the object at ffff00080444cc20
[   42.949397]  which belongs to the cache kmalloc-16 of size 16
[   42.961725] The buggy address is located 8 bytes inside of
[   42.961725]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   42.973963] 
[   42.975439] The buggy address belongs to the physical page:
[   42.980994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   42.988981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.995490] page_type: f5(slab)
[   42.998624] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.006347] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.014066] page dumped because: kasan: bad access detected
[   43.019623] 
[   43.021097] Memory state around the buggy address:
[   43.025875]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.033080]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   43.040285] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.047486]                                   ^
[   43.052003]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.059208]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.066409] ==================================================================
[   41.478615] ==================================================================
[   41.487792] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.495948] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   41.503325] 
[   41.504811] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   41.504865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.504884] Hardware name: WinLink E850-96 board (DT)
[   41.504903] Call trace:
[   41.504918]  show_stack+0x20/0x38 (C)
[   41.504956]  dump_stack_lvl+0x8c/0xd0
[   41.504996]  print_report+0x118/0x608
[   41.505036]  kasan_report+0xdc/0x128
[   41.505068]  kasan_check_range+0x100/0x1a8
[   41.505109]  __kasan_check_write+0x20/0x30
[   41.505138]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.505174]  kasan_bitops_generic+0x110/0x1c8
[   41.505208]  kunit_try_run_case+0x170/0x3f0
[   41.505247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.505287]  kthread+0x328/0x630
[   41.505315]  ret_from_fork+0x10/0x20
[   41.505354] 
[   41.577369] Allocated by task 305:
[   41.580758]  kasan_save_stack+0x3c/0x68
[   41.584574]  kasan_save_track+0x20/0x40
[   41.588393]  kasan_save_alloc_info+0x40/0x58
[   41.592647]  __kasan_kmalloc+0xd4/0xd8
[   41.596379]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.600893]  kasan_bitops_generic+0xa0/0x1c8
[   41.605146]  kunit_try_run_case+0x170/0x3f0
[   41.609313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.614782]  kthread+0x328/0x630
[   41.617993]  ret_from_fork+0x10/0x20
[   41.621552] 
[   41.623030] The buggy address belongs to the object at ffff00080444cc20
[   41.623030]  which belongs to the cache kmalloc-16 of size 16
[   41.635357] The buggy address is located 8 bytes inside of
[   41.635357]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   41.647593] 
[   41.649074] The buggy address belongs to the physical page:
[   41.654629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   41.662615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.669123] page_type: f5(slab)
[   41.672260] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.679978] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.687699] page dumped because: kasan: bad access detected
[   41.693254] 
[   41.694728] Memory state around the buggy address:
[   41.699511]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   41.706711]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   41.713917] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.721117]                                   ^
[   41.725634]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.732839]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.740040] ==================================================================
[   42.540388] ==================================================================
[   42.547496] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.555653] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   42.563031] 
[   42.564513] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   42.564565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.564582] Hardware name: WinLink E850-96 board (DT)
[   42.564602] Call trace:
[   42.564614]  show_stack+0x20/0x38 (C)
[   42.564648]  dump_stack_lvl+0x8c/0xd0
[   42.564685]  print_report+0x118/0x608
[   42.564720]  kasan_report+0xdc/0x128
[   42.564752]  kasan_check_range+0x100/0x1a8
[   42.564786]  __kasan_check_write+0x20/0x30
[   42.564817]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.564853]  kasan_bitops_generic+0x110/0x1c8
[   42.564884]  kunit_try_run_case+0x170/0x3f0
[   42.564919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.564957]  kthread+0x328/0x630
[   42.564982]  ret_from_fork+0x10/0x20
[   42.565015] 
[   42.637075] Allocated by task 305:
[   42.640460]  kasan_save_stack+0x3c/0x68
[   42.644280]  kasan_save_track+0x20/0x40
[   42.648100]  kasan_save_alloc_info+0x40/0x58
[   42.652353]  __kasan_kmalloc+0xd4/0xd8
[   42.656086]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.660599]  kasan_bitops_generic+0xa0/0x1c8
[   42.664853]  kunit_try_run_case+0x170/0x3f0
[   42.669019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.674488]  kthread+0x328/0x630
[   42.677700]  ret_from_fork+0x10/0x20
[   42.681259] 
[   42.682734] The buggy address belongs to the object at ffff00080444cc20
[   42.682734]  which belongs to the cache kmalloc-16 of size 16
[   42.695061] The buggy address is located 8 bytes inside of
[   42.695061]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   42.707300] 
[   42.708775] The buggy address belongs to the physical page:
[   42.714332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   42.722319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.728827] page_type: f5(slab)
[   42.731962] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.739685] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.747403] page dumped because: kasan: bad access detected
[   42.752960] 
[   42.754434] Memory state around the buggy address:
[   42.759213]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.766417]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   42.773622] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.780823]                                   ^
[   42.785341]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.792546]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.799746] ==================================================================
[   41.747347] ==================================================================
[   41.754454] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.762609] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   41.769901] 
[   41.771387] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   41.771444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.771463] Hardware name: WinLink E850-96 board (DT)
[   41.771483] Call trace:
[   41.771497]  show_stack+0x20/0x38 (C)
[   41.771530]  dump_stack_lvl+0x8c/0xd0
[   41.771568]  print_report+0x118/0x608
[   41.771605]  kasan_report+0xdc/0x128
[   41.771638]  __asan_report_load8_noabort+0x20/0x30
[   41.771671]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.771710]  kasan_bitops_generic+0x110/0x1c8
[   41.771744]  kunit_try_run_case+0x170/0x3f0
[   41.771780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.771822]  kthread+0x328/0x630
[   41.771848]  ret_from_fork+0x10/0x20
[   41.771883] 
[   41.840559] Allocated by task 305:
[   41.843947]  kasan_save_stack+0x3c/0x68
[   41.847764]  kasan_save_track+0x20/0x40
[   41.851584]  kasan_save_alloc_info+0x40/0x58
[   41.855837]  __kasan_kmalloc+0xd4/0xd8
[   41.859570]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.864083]  kasan_bitops_generic+0xa0/0x1c8
[   41.868337]  kunit_try_run_case+0x170/0x3f0
[   41.872503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.877972]  kthread+0x328/0x630
[   41.881184]  ret_from_fork+0x10/0x20
[   41.884743] 
[   41.886218] The buggy address belongs to the object at ffff00080444cc20
[   41.886218]  which belongs to the cache kmalloc-16 of size 16
[   41.898548] The buggy address is located 8 bytes inside of
[   41.898548]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   41.910784] 
[   41.912260] The buggy address belongs to the physical page:
[   41.917816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   41.925803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.932313] page_type: f5(slab)
[   41.935446] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.943169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.950887] page dumped because: kasan: bad access detected
[   41.956444] 
[   41.957918] Memory state around the buggy address:
[   41.962696]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   41.969902]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   41.977108] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.984307]                                   ^
[   41.988825]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.996030]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.003231] ==================================================================
[   42.010615] ==================================================================
[   42.017645] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   42.025800] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   42.033178] 
[   42.034660] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   42.034715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.034734] Hardware name: WinLink E850-96 board (DT)
[   42.034753] Call trace:
[   42.034763]  show_stack+0x20/0x38 (C)
[   42.034800]  dump_stack_lvl+0x8c/0xd0
[   42.034840]  print_report+0x118/0x608
[   42.034876]  kasan_report+0xdc/0x128
[   42.034908]  kasan_check_range+0x100/0x1a8
[   42.034946]  __kasan_check_write+0x20/0x30
[   42.034976]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   42.035015]  kasan_bitops_generic+0x110/0x1c8
[   42.035046]  kunit_try_run_case+0x170/0x3f0
[   42.035079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.035120]  kthread+0x328/0x630
[   42.035146]  ret_from_fork+0x10/0x20
[   42.035181] 
[   42.107222] Allocated by task 305:
[   42.110609]  kasan_save_stack+0x3c/0x68
[   42.114427]  kasan_save_track+0x20/0x40
[   42.118246]  kasan_save_alloc_info+0x40/0x58
[   42.122500]  __kasan_kmalloc+0xd4/0xd8
[   42.126232]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.130746]  kasan_bitops_generic+0xa0/0x1c8
[   42.134999]  kunit_try_run_case+0x170/0x3f0
[   42.139166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.144635]  kthread+0x328/0x630
[   42.147846]  ret_from_fork+0x10/0x20
[   42.151406] 
[   42.152882] The buggy address belongs to the object at ffff00080444cc20
[   42.152882]  which belongs to the cache kmalloc-16 of size 16
[   42.165208] The buggy address is located 8 bytes inside of
[   42.165208]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   42.177447] 
[   42.178923] The buggy address belongs to the physical page:
[   42.184479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   42.192466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.198974] page_type: f5(slab)
[   42.202108] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.209831] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.217550] page dumped because: kasan: bad access detected
[   42.223107] 
[   42.224581] Memory state around the buggy address:
[   42.229362]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.236564]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   42.243768] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.250970]                                   ^
[   42.255487]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.262692]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.269893] ==================================================================
[   43.073711] ==================================================================
[   43.080821] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   43.088978] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   43.096270] 
[   43.097753] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   43.097804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.097821] Hardware name: WinLink E850-96 board (DT)
[   43.097844] Call trace:
[   43.097856]  show_stack+0x20/0x38 (C)
[   43.097890]  dump_stack_lvl+0x8c/0xd0
[   43.097926]  print_report+0x118/0x608
[   43.097961]  kasan_report+0xdc/0x128
[   43.097997]  __asan_report_load8_noabort+0x20/0x30
[   43.098029]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   43.098065]  kasan_bitops_generic+0x110/0x1c8
[   43.098097]  kunit_try_run_case+0x170/0x3f0
[   43.098129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.098167]  kthread+0x328/0x630
[   43.098193]  ret_from_fork+0x10/0x20
[   43.098225] 
[   43.166928] Allocated by task 305:
[   43.170314]  kasan_save_stack+0x3c/0x68
[   43.174133]  kasan_save_track+0x20/0x40
[   43.177952]  kasan_save_alloc_info+0x40/0x58
[   43.182206]  __kasan_kmalloc+0xd4/0xd8
[   43.185939]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.190452]  kasan_bitops_generic+0xa0/0x1c8
[   43.194706]  kunit_try_run_case+0x170/0x3f0
[   43.198872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.204341]  kthread+0x328/0x630
[   43.207553]  ret_from_fork+0x10/0x20
[   43.211111] 
[   43.212589] The buggy address belongs to the object at ffff00080444cc20
[   43.212589]  which belongs to the cache kmalloc-16 of size 16
[   43.224914] The buggy address is located 8 bytes inside of
[   43.224914]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   43.237153] 
[   43.238629] The buggy address belongs to the physical page:
[   43.244185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   43.252170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.258680] page_type: f5(slab)
[   43.261813] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.269538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.277256] page dumped because: kasan: bad access detected
[   43.282813] 
[   43.284288] Memory state around the buggy address:
[   43.289067]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.296270]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   43.303475] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.310676]                                   ^
[   43.315194]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.322398]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.329600] ==================================================================
[   43.603562] ==================================================================
[   43.610675] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.618831] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   43.626210] 
[   43.627691] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   43.627740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.627758] Hardware name: WinLink E850-96 board (DT)
[   43.627775] Call trace:
[   43.627788]  show_stack+0x20/0x38 (C)
[   43.627824]  dump_stack_lvl+0x8c/0xd0
[   43.627857]  print_report+0x118/0x608
[   43.627890]  kasan_report+0xdc/0x128
[   43.627922]  kasan_check_range+0x100/0x1a8
[   43.627958]  __kasan_check_write+0x20/0x30
[   43.627987]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.628023]  kasan_bitops_generic+0x110/0x1c8
[   43.628057]  kunit_try_run_case+0x170/0x3f0
[   43.628089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.628128]  kthread+0x328/0x630
[   43.628156]  ret_from_fork+0x10/0x20
[   43.628189] 
[   43.700254] Allocated by task 305:
[   43.703640]  kasan_save_stack+0x3c/0x68
[   43.707459]  kasan_save_track+0x20/0x40
[   43.711278]  kasan_save_alloc_info+0x40/0x58
[   43.715531]  __kasan_kmalloc+0xd4/0xd8
[   43.719264]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.723778]  kasan_bitops_generic+0xa0/0x1c8
[   43.728031]  kunit_try_run_case+0x170/0x3f0
[   43.732199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.737667]  kthread+0x328/0x630
[   43.740878]  ret_from_fork+0x10/0x20
[   43.744437] 
[   43.745912] The buggy address belongs to the object at ffff00080444cc20
[   43.745912]  which belongs to the cache kmalloc-16 of size 16
[   43.758240] The buggy address is located 8 bytes inside of
[   43.758240]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   43.770478] 
[   43.771954] The buggy address belongs to the physical page:
[   43.777510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   43.785495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.792006] page_type: f5(slab)
[   43.795139] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.802863] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.810582] page dumped because: kasan: bad access detected
[   43.816139] 
[   43.817613] Memory state around the buggy address:
[   43.822391]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.829596]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   43.836800] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.844002]                                   ^
[   43.848519]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.855724]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.862925] ==================================================================
[   43.336895] ==================================================================
[   43.344012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.352169] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   43.359547] 
[   43.361030] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   43.361079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.361098] Hardware name: WinLink E850-96 board (DT)
[   43.361118] Call trace:
[   43.361130]  show_stack+0x20/0x38 (C)
[   43.361166]  dump_stack_lvl+0x8c/0xd0
[   43.361200]  print_report+0x118/0x608
[   43.361236]  kasan_report+0xdc/0x128
[   43.361269]  kasan_check_range+0x100/0x1a8
[   43.361307]  __kasan_check_write+0x20/0x30
[   43.361337]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.361372]  kasan_bitops_generic+0x110/0x1c8
[   43.361405]  kunit_try_run_case+0x170/0x3f0
[   43.361438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.361475]  kthread+0x328/0x630
[   43.361504]  ret_from_fork+0x10/0x20
[   43.361538] 
[   43.433591] Allocated by task 305:
[   43.436977]  kasan_save_stack+0x3c/0x68
[   43.440795]  kasan_save_track+0x20/0x40
[   43.444615]  kasan_save_alloc_info+0x40/0x58
[   43.448869]  __kasan_kmalloc+0xd4/0xd8
[   43.452601]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.457115]  kasan_bitops_generic+0xa0/0x1c8
[   43.461369]  kunit_try_run_case+0x170/0x3f0
[   43.465535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.471004]  kthread+0x328/0x630
[   43.474216]  ret_from_fork+0x10/0x20
[   43.477774] 
[   43.479250] The buggy address belongs to the object at ffff00080444cc20
[   43.479250]  which belongs to the cache kmalloc-16 of size 16
[   43.491577] The buggy address is located 8 bytes inside of
[   43.491577]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   43.503816] 
[   43.505291] The buggy address belongs to the physical page:
[   43.510847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   43.518835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.525343] page_type: f5(slab)
[   43.528479] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.536200] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.543919] page dumped because: kasan: bad access detected
[   43.549474] 
[   43.550950] Memory state around the buggy address:
[   43.555728]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.562933]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   43.570138] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.577339]                                   ^
[   43.581856]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.589061]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.596262] ==================================================================
[   43.870278] ==================================================================
[   43.877340] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.885494] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   43.892785] 
[   43.894268] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   43.894316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.894334] Hardware name: WinLink E850-96 board (DT)
[   43.894354] Call trace:
[   43.894368]  show_stack+0x20/0x38 (C)
[   43.894402]  dump_stack_lvl+0x8c/0xd0
[   43.894437]  print_report+0x118/0x608
[   43.894472]  kasan_report+0xdc/0x128
[   43.894506]  __asan_report_load8_noabort+0x20/0x30
[   43.894535]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.894571]  kasan_bitops_generic+0x110/0x1c8
[   43.894604]  kunit_try_run_case+0x170/0x3f0
[   43.894637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.894677]  kthread+0x328/0x630
[   43.894706]  ret_from_fork+0x10/0x20
[   43.894737] 
[   43.963444] Allocated by task 305:
[   43.966830]  kasan_save_stack+0x3c/0x68
[   43.970649]  kasan_save_track+0x20/0x40
[   43.974468]  kasan_save_alloc_info+0x40/0x58
[   43.978722]  __kasan_kmalloc+0xd4/0xd8
[   43.982454]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.986968]  kasan_bitops_generic+0xa0/0x1c8
[   43.991222]  kunit_try_run_case+0x170/0x3f0
[   43.995388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.000857]  kthread+0x328/0x630
[   44.004069]  ret_from_fork+0x10/0x20
[   44.007628] 
[   44.009103] The buggy address belongs to the object at ffff00080444cc20
[   44.009103]  which belongs to the cache kmalloc-16 of size 16
[   44.021430] The buggy address is located 8 bytes inside of
[   44.021430]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   44.033669] 
[   44.035145] The buggy address belongs to the physical page:
[   44.040701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   44.048687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.055196] page_type: f5(slab)
[   44.058329] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.066054] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.073773] page dumped because: kasan: bad access detected
[   44.079329] 
[   44.080803] Memory state around the buggy address:
[   44.085583]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.092786]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   44.099991] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.107192]                                   ^
[   44.111709]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.118914]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.126116] ==================================================================

[   21.550845] ==================================================================
[   21.551663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.552141] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   21.553625] 
[   21.553819] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   21.553922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.553986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.554035] Call Trace:
[   21.554072]  <TASK>
[   21.554109]  dump_stack_lvl+0x73/0xb0
[   21.554168]  print_report+0xd1/0x650
[   21.554221]  ? __virt_addr_valid+0x1db/0x2d0
[   21.554286]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.554346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.554398]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.554458]  kasan_report+0x141/0x180
[   21.554510]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.554576]  kasan_check_range+0x10c/0x1c0
[   21.554633]  __kasan_check_write+0x18/0x20
[   21.554683]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.554745]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.554806]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.554853]  ? trace_hardirqs_on+0x37/0xe0
[   21.554904]  ? kasan_bitops_generic+0x92/0x1c0
[   21.557131]  kasan_bitops_generic+0x116/0x1c0
[   21.558068]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.558145]  ? __pfx_read_tsc+0x10/0x10
[   21.558215]  ? ktime_get_ts64+0x86/0x230
[   21.558332]  kunit_try_run_case+0x1a5/0x480
[   21.558422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.558990]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.559072]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.559270]  ? __kthread_parkme+0x82/0x180
[   21.559336]  ? preempt_count_sub+0x50/0x80
[   21.559401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.559450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.559511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.559577]  kthread+0x337/0x6f0
[   21.559632]  ? trace_preempt_on+0x20/0xc0
[   21.559725]  ? __pfx_kthread+0x10/0x10
[   21.559777]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.559830]  ? calculate_sigpending+0x7b/0xa0
[   21.559883]  ? __pfx_kthread+0x10/0x10
[   21.559930]  ret_from_fork+0x116/0x1d0
[   21.559995]  ? __pfx_kthread+0x10/0x10
[   21.560042]  ret_from_fork_asm+0x1a/0x30
[   21.560111]  </TASK>
[   21.560136] 
[   21.575789] Allocated by task 278:
[   21.576051]  kasan_save_stack+0x45/0x70
[   21.576444]  kasan_save_track+0x18/0x40
[   21.576792]  kasan_save_alloc_info+0x3b/0x50
[   21.577233]  __kasan_kmalloc+0xb7/0xc0
[   21.577618]  __kmalloc_cache_noprof+0x189/0x420
[   21.578282]  kasan_bitops_generic+0x92/0x1c0
[   21.578627]  kunit_try_run_case+0x1a5/0x480
[   21.579061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.579680]  kthread+0x337/0x6f0
[   21.579914]  ret_from_fork+0x116/0x1d0
[   21.580282]  ret_from_fork_asm+0x1a/0x30
[   21.580719] 
[   21.580864] The buggy address belongs to the object at ffff888100fa0f20
[   21.580864]  which belongs to the cache kmalloc-16 of size 16
[   21.581537] The buggy address is located 8 bytes inside of
[   21.581537]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   21.582482] 
[   21.582728] The buggy address belongs to the physical page:
[   21.583626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   21.584334] flags: 0x200000000000000(node=0|zone=2)
[   21.584623] page_type: f5(slab)
[   21.584858] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.585253] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.585623] page dumped because: kasan: bad access detected
[   21.585908] 
[   21.586263] Memory state around the buggy address:
[   21.586534]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.587016]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.587879] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   21.588794]                                   ^
[   21.589387]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.589784]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   21.590587] ==================================================================
[   21.703694] ==================================================================
[   21.704666] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.705221] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   21.706959] 
[   21.707228] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   21.707363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.707405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.707464] Call Trace:
[   21.707493]  <TASK>
[   21.707516]  dump_stack_lvl+0x73/0xb0
[   21.707556]  print_report+0xd1/0x650
[   21.707628]  ? __virt_addr_valid+0x1db/0x2d0
[   21.707988]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.708084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.708130]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.708199]  kasan_report+0x141/0x180
[   21.708289]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.708363]  kasan_check_range+0x10c/0x1c0
[   21.708398]  __kasan_check_write+0x18/0x20
[   21.708427]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.708465]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.708503]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.708532]  ? trace_hardirqs_on+0x37/0xe0
[   21.708565]  ? kasan_bitops_generic+0x92/0x1c0
[   21.708598]  kasan_bitops_generic+0x116/0x1c0
[   21.708625]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.708670]  ? __pfx_read_tsc+0x10/0x10
[   21.708719]  ? ktime_get_ts64+0x86/0x230
[   21.708754]  kunit_try_run_case+0x1a5/0x480
[   21.708786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.708813]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.708849]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.708885]  ? __kthread_parkme+0x82/0x180
[   21.708914]  ? preempt_count_sub+0x50/0x80
[   21.708977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.709010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.709047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.709082]  kthread+0x337/0x6f0
[   21.709111]  ? trace_preempt_on+0x20/0xc0
[   21.709141]  ? __pfx_kthread+0x10/0x10
[   21.709189]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.709268]  ? calculate_sigpending+0x7b/0xa0
[   21.709317]  ? __pfx_kthread+0x10/0x10
[   21.709347]  ret_from_fork+0x116/0x1d0
[   21.709373]  ? __pfx_kthread+0x10/0x10
[   21.709402]  ret_from_fork_asm+0x1a/0x30
[   21.709447]  </TASK>
[   21.709463] 
[   21.735880] Allocated by task 278:
[   21.736979]  kasan_save_stack+0x45/0x70
[   21.737327]  kasan_save_track+0x18/0x40
[   21.737641]  kasan_save_alloc_info+0x3b/0x50
[   21.737844]  __kasan_kmalloc+0xb7/0xc0
[   21.738025]  __kmalloc_cache_noprof+0x189/0x420
[   21.738283]  kasan_bitops_generic+0x92/0x1c0
[   21.740103]  kunit_try_run_case+0x1a5/0x480
[   21.740892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.741305]  kthread+0x337/0x6f0
[   21.742065]  ret_from_fork+0x116/0x1d0
[   21.742905]  ret_from_fork_asm+0x1a/0x30
[   21.743326] 
[   21.743943] The buggy address belongs to the object at ffff888100fa0f20
[   21.743943]  which belongs to the cache kmalloc-16 of size 16
[   21.745242] The buggy address is located 8 bytes inside of
[   21.745242]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   21.746235] 
[   21.746491] The buggy address belongs to the physical page:
[   21.747801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   21.748748] flags: 0x200000000000000(node=0|zone=2)
[   21.749707] page_type: f5(slab)
[   21.750106] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.751107] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.752182] page dumped because: kasan: bad access detected
[   21.752953] 
[   21.753764] Memory state around the buggy address:
[   21.754176]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.754791]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.755642] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   21.756437]                                   ^
[   21.756644]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.756916]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   21.757423] ==================================================================
[   21.759893] ==================================================================
[   21.760511] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.761519] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   21.762721] 
[   21.762912] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   21.763002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.763022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.763055] Call Trace:
[   21.763076]  <TASK>
[   21.763097]  dump_stack_lvl+0x73/0xb0
[   21.763135]  print_report+0xd1/0x650
[   21.763182]  ? __virt_addr_valid+0x1db/0x2d0
[   21.763237]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.763279]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.763311]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.763349]  kasan_report+0x141/0x180
[   21.763381]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.763425]  kasan_check_range+0x10c/0x1c0
[   21.763459]  __kasan_check_write+0x18/0x20
[   21.763487]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.763526]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.763566]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.763594]  ? trace_hardirqs_on+0x37/0xe0
[   21.763626]  ? kasan_bitops_generic+0x92/0x1c0
[   21.763677]  kasan_bitops_generic+0x116/0x1c0
[   21.763721]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.763753]  ? __pfx_read_tsc+0x10/0x10
[   21.763785]  ? ktime_get_ts64+0x86/0x230
[   21.763820]  kunit_try_run_case+0x1a5/0x480
[   21.763851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.763877]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.763913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.764004]  ? __kthread_parkme+0x82/0x180
[   21.764078]  ? preempt_count_sub+0x50/0x80
[   21.764630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.764695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.764736]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.764772]  kthread+0x337/0x6f0
[   21.764801]  ? trace_preempt_on+0x20/0xc0
[   21.764831]  ? __pfx_kthread+0x10/0x10
[   21.764861]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.764894]  ? calculate_sigpending+0x7b/0xa0
[   21.764953]  ? __pfx_kthread+0x10/0x10
[   21.764986]  ret_from_fork+0x116/0x1d0
[   21.765011]  ? __pfx_kthread+0x10/0x10
[   21.765042]  ret_from_fork_asm+0x1a/0x30
[   21.765087]  </TASK>
[   21.765102] 
[   21.789767] Allocated by task 278:
[   21.791051]  kasan_save_stack+0x45/0x70
[   21.791540]  kasan_save_track+0x18/0x40
[   21.791874]  kasan_save_alloc_info+0x3b/0x50
[   21.793070]  __kasan_kmalloc+0xb7/0xc0
[   21.793795]  __kmalloc_cache_noprof+0x189/0x420
[   21.794171]  kasan_bitops_generic+0x92/0x1c0
[   21.794908]  kunit_try_run_case+0x1a5/0x480
[   21.795788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.796396]  kthread+0x337/0x6f0
[   21.796689]  ret_from_fork+0x116/0x1d0
[   21.797022]  ret_from_fork_asm+0x1a/0x30
[   21.797703] 
[   21.797873] The buggy address belongs to the object at ffff888100fa0f20
[   21.797873]  which belongs to the cache kmalloc-16 of size 16
[   21.799609] The buggy address is located 8 bytes inside of
[   21.799609]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   21.800603] 
[   21.801008] The buggy address belongs to the physical page:
[   21.801828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   21.802893] flags: 0x200000000000000(node=0|zone=2)
[   21.803235] page_type: f5(slab)
[   21.803956] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.804530] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.805622] page dumped because: kasan: bad access detected
[   21.806010] 
[   21.806347] Memory state around the buggy address:
[   21.807081]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.807898]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.808504] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   21.809990]                                   ^
[   21.812032]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.812981]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   21.813634] ==================================================================
[   21.814593] ==================================================================
[   21.816142] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.818423] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   21.819045] 
[   21.819385] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   21.819496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.819530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.819584] Call Trace:
[   21.819625]  <TASK>
[   21.819707]  dump_stack_lvl+0x73/0xb0
[   21.819786]  print_report+0xd1/0x650
[   21.819859]  ? __virt_addr_valid+0x1db/0x2d0
[   21.819966]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.820059]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.820143]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.820248]  kasan_report+0x141/0x180
[   21.820332]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.820430]  kasan_check_range+0x10c/0x1c0
[   21.820517]  __kasan_check_write+0x18/0x20
[   21.820581]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.820654]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.820737]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.820815]  ? trace_hardirqs_on+0x37/0xe0
[   21.820894]  ? kasan_bitops_generic+0x92/0x1c0
[   21.821782]  kasan_bitops_generic+0x116/0x1c0
[   21.821839]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.821895]  ? __pfx_read_tsc+0x10/0x10
[   21.821984]  ? ktime_get_ts64+0x86/0x230
[   21.822049]  kunit_try_run_case+0x1a5/0x480
[   21.822104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.822297]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.822392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.822474]  ? __kthread_parkme+0x82/0x180
[   21.822534]  ? preempt_count_sub+0x50/0x80
[   21.822614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.822880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.822972]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.823043]  kthread+0x337/0x6f0
[   21.823099]  ? trace_preempt_on+0x20/0xc0
[   21.823283]  ? __pfx_kthread+0x10/0x10
[   21.823349]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.823405]  ? calculate_sigpending+0x7b/0xa0
[   21.823460]  ? __pfx_kthread+0x10/0x10
[   21.823515]  ret_from_fork+0x116/0x1d0
[   21.823569]  ? __pfx_kthread+0x10/0x10
[   21.823621]  ret_from_fork_asm+0x1a/0x30
[   21.823738]  </TASK>
[   21.823767] 
[   21.847346] Allocated by task 278:
[   21.847740]  kasan_save_stack+0x45/0x70
[   21.848199]  kasan_save_track+0x18/0x40
[   21.848604]  kasan_save_alloc_info+0x3b/0x50
[   21.849351]  __kasan_kmalloc+0xb7/0xc0
[   21.850077]  __kmalloc_cache_noprof+0x189/0x420
[   21.850693]  kasan_bitops_generic+0x92/0x1c0
[   21.851302]  kunit_try_run_case+0x1a5/0x480
[   21.852116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.853153]  kthread+0x337/0x6f0
[   21.853805]  ret_from_fork+0x116/0x1d0
[   21.854193]  ret_from_fork_asm+0x1a/0x30
[   21.854920] 
[   21.855701] The buggy address belongs to the object at ffff888100fa0f20
[   21.855701]  which belongs to the cache kmalloc-16 of size 16
[   21.856718] The buggy address is located 8 bytes inside of
[   21.856718]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   21.858453] 
[   21.858666] The buggy address belongs to the physical page:
[   21.859362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   21.860706] flags: 0x200000000000000(node=0|zone=2)
[   21.861152] page_type: f5(slab)
[   21.861948] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.862901] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.863496] page dumped because: kasan: bad access detected
[   21.863994] 
[   21.864227] Memory state around the buggy address:
[   21.864675]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.866008]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.866804] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   21.867542]                                   ^
[   21.868322]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.869036]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   21.870160] ==================================================================
[   21.647917] ==================================================================
[   21.648636] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.649785] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   21.650634] 
[   21.650923] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   21.651079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.651120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.651220] Call Trace:
[   21.651278]  <TASK>
[   21.651330]  dump_stack_lvl+0x73/0xb0
[   21.651422]  print_report+0xd1/0x650
[   21.651506]  ? __virt_addr_valid+0x1db/0x2d0
[   21.651874]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.651920]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.652007]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.652096]  kasan_report+0x141/0x180
[   21.652221]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.652322]  kasan_check_range+0x10c/0x1c0
[   21.652411]  __kasan_check_write+0x18/0x20
[   21.652609]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.652717]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.652792]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.652824]  ? trace_hardirqs_on+0x37/0xe0
[   21.652857]  ? kasan_bitops_generic+0x92/0x1c0
[   21.652893]  kasan_bitops_generic+0x116/0x1c0
[   21.652924]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.652986]  ? __pfx_read_tsc+0x10/0x10
[   21.653019]  ? ktime_get_ts64+0x86/0x230
[   21.653055]  kunit_try_run_case+0x1a5/0x480
[   21.653088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.653117]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.653154]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.653268]  ? __kthread_parkme+0x82/0x180
[   21.653315]  ? preempt_count_sub+0x50/0x80
[   21.653350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.653380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.653416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.653452]  kthread+0x337/0x6f0
[   21.653479]  ? trace_preempt_on+0x20/0xc0
[   21.653511]  ? __pfx_kthread+0x10/0x10
[   21.653539]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.653572]  ? calculate_sigpending+0x7b/0xa0
[   21.653606]  ? __pfx_kthread+0x10/0x10
[   21.653636]  ret_from_fork+0x116/0x1d0
[   21.653706]  ? __pfx_kthread+0x10/0x10
[   21.653743]  ret_from_fork_asm+0x1a/0x30
[   21.653785]  </TASK>
[   21.653800] 
[   21.679431] Allocated by task 278:
[   21.679721]  kasan_save_stack+0x45/0x70
[   21.680584]  kasan_save_track+0x18/0x40
[   21.681147]  kasan_save_alloc_info+0x3b/0x50
[   21.681861]  __kasan_kmalloc+0xb7/0xc0
[   21.682732]  __kmalloc_cache_noprof+0x189/0x420
[   21.683110]  kasan_bitops_generic+0x92/0x1c0
[   21.684289]  kunit_try_run_case+0x1a5/0x480
[   21.684632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.685084]  kthread+0x337/0x6f0
[   21.685962]  ret_from_fork+0x116/0x1d0
[   21.686970]  ret_from_fork_asm+0x1a/0x30
[   21.687292] 
[   21.687424] The buggy address belongs to the object at ffff888100fa0f20
[   21.687424]  which belongs to the cache kmalloc-16 of size 16
[   21.688795] The buggy address is located 8 bytes inside of
[   21.688795]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   21.689520] 
[   21.689780] The buggy address belongs to the physical page:
[   21.691137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   21.692058] flags: 0x200000000000000(node=0|zone=2)
[   21.692753] page_type: f5(slab)
[   21.693786] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.694559] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.695431] page dumped because: kasan: bad access detected
[   21.696281] 
[   21.696614] Memory state around the buggy address:
[   21.697590]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.698731]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.699240] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   21.700197]                                   ^
[   21.700656]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.701652]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   21.702870] ==================================================================
[   21.496179] ==================================================================
[   21.497586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.498482] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   21.499173] 
[   21.499612] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   21.499750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.499794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.499860] Call Trace:
[   21.499903]  <TASK>
[   21.499976]  dump_stack_lvl+0x73/0xb0
[   21.500067]  print_report+0xd1/0x650
[   21.500320]  ? __virt_addr_valid+0x1db/0x2d0
[   21.500414]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.500498]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.500572]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.500615]  kasan_report+0x141/0x180
[   21.500651]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.500737]  kasan_check_range+0x10c/0x1c0
[   21.500773]  __kasan_check_write+0x18/0x20
[   21.500801]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.500838]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.500879]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.500911]  ? trace_hardirqs_on+0x37/0xe0
[   21.500970]  ? kasan_bitops_generic+0x92/0x1c0
[   21.501005]  kasan_bitops_generic+0x116/0x1c0
[   21.501034]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.501064]  ? __pfx_read_tsc+0x10/0x10
[   21.501098]  ? ktime_get_ts64+0x86/0x230
[   21.501133]  kunit_try_run_case+0x1a5/0x480
[   21.501166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.501232]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.501323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.501409]  ? __kthread_parkme+0x82/0x180
[   21.501481]  ? preempt_count_sub+0x50/0x80
[   21.501518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.501547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.501583]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.501619]  kthread+0x337/0x6f0
[   21.501645]  ? trace_preempt_on+0x20/0xc0
[   21.501706]  ? __pfx_kthread+0x10/0x10
[   21.501739]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.501773]  ? calculate_sigpending+0x7b/0xa0
[   21.501808]  ? __pfx_kthread+0x10/0x10
[   21.501837]  ret_from_fork+0x116/0x1d0
[   21.501863]  ? __pfx_kthread+0x10/0x10
[   21.501891]  ret_from_fork_asm+0x1a/0x30
[   21.501957]  </TASK>
[   21.501977] 
[   21.524347] Allocated by task 278:
[   21.524868]  kasan_save_stack+0x45/0x70
[   21.525733]  kasan_save_track+0x18/0x40
[   21.526675]  kasan_save_alloc_info+0x3b/0x50
[   21.527481]  __kasan_kmalloc+0xb7/0xc0
[   21.528115]  __kmalloc_cache_noprof+0x189/0x420
[   21.529163]  kasan_bitops_generic+0x92/0x1c0
[   21.529561]  kunit_try_run_case+0x1a5/0x480
[   21.530029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.530485]  kthread+0x337/0x6f0
[   21.531570]  ret_from_fork+0x116/0x1d0
[   21.531820]  ret_from_fork_asm+0x1a/0x30
[   21.532057] 
[   21.532151] The buggy address belongs to the object at ffff888100fa0f20
[   21.532151]  which belongs to the cache kmalloc-16 of size 16
[   21.534406] The buggy address is located 8 bytes inside of
[   21.534406]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   21.536021] 
[   21.536417] The buggy address belongs to the physical page:
[   21.536959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   21.538025] flags: 0x200000000000000(node=0|zone=2)
[   21.538376] page_type: f5(slab)
[   21.539168] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.539808] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.541374] page dumped because: kasan: bad access detected
[   21.541730] 
[   21.541896] Memory state around the buggy address:
[   21.542774]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.544567]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.545383] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   21.546197]                                   ^
[   21.547467]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.549533]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   21.549993] ==================================================================
[   21.592096] ==================================================================
[   21.592792] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.595702] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   21.597107] 
[   21.597416] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   21.597529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.597556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.597599] Call Trace:
[   21.597634]  <TASK>
[   21.597673]  dump_stack_lvl+0x73/0xb0
[   21.597763]  print_report+0xd1/0x650
[   21.597820]  ? __virt_addr_valid+0x1db/0x2d0
[   21.597881]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.597955]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.598009]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.598075]  kasan_report+0x141/0x180
[   21.599510]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.599619]  kasan_check_range+0x10c/0x1c0
[   21.599722]  __kasan_check_write+0x18/0x20
[   21.599801]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.599890]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.600034]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.600113]  ? trace_hardirqs_on+0x37/0xe0
[   21.600215]  ? kasan_bitops_generic+0x92/0x1c0
[   21.600301]  kasan_bitops_generic+0x116/0x1c0
[   21.600379]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.600452]  ? __pfx_read_tsc+0x10/0x10
[   21.600542]  ? ktime_get_ts64+0x86/0x230
[   21.600626]  kunit_try_run_case+0x1a5/0x480
[   21.600718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.600787]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.600867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.601277]  ? __kthread_parkme+0x82/0x180
[   21.601361]  ? preempt_count_sub+0x50/0x80
[   21.601445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.601524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.601611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.601739]  kthread+0x337/0x6f0
[   21.601816]  ? trace_preempt_on+0x20/0xc0
[   21.601877]  ? __pfx_kthread+0x10/0x10
[   21.601969]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.602028]  ? calculate_sigpending+0x7b/0xa0
[   21.602079]  ? __pfx_kthread+0x10/0x10
[   21.602127]  ret_from_fork+0x116/0x1d0
[   21.602298]  ? __pfx_kthread+0x10/0x10
[   21.602363]  ret_from_fork_asm+0x1a/0x30
[   21.602431]  </TASK>
[   21.602456] 
[   21.626611] Allocated by task 278:
[   21.627147]  kasan_save_stack+0x45/0x70
[   21.627741]  kasan_save_track+0x18/0x40
[   21.628102]  kasan_save_alloc_info+0x3b/0x50
[   21.628555]  __kasan_kmalloc+0xb7/0xc0
[   21.629560]  __kmalloc_cache_noprof+0x189/0x420
[   21.630066]  kasan_bitops_generic+0x92/0x1c0
[   21.630649]  kunit_try_run_case+0x1a5/0x480
[   21.631100]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.631650]  kthread+0x337/0x6f0
[   21.632074]  ret_from_fork+0x116/0x1d0
[   21.632719]  ret_from_fork_asm+0x1a/0x30
[   21.633098] 
[   21.633453] The buggy address belongs to the object at ffff888100fa0f20
[   21.633453]  which belongs to the cache kmalloc-16 of size 16
[   21.634923] The buggy address is located 8 bytes inside of
[   21.634923]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   21.636086] 
[   21.636309] The buggy address belongs to the physical page:
[   21.637032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   21.637697] flags: 0x200000000000000(node=0|zone=2)
[   21.638086] page_type: f5(slab)
[   21.638571] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.639736] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.640648] page dumped because: kasan: bad access detected
[   21.641138] 
[   21.641369] Memory state around the buggy address:
[   21.641893]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.642601]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.643284] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   21.644484]                                   ^
[   21.645000]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.645578]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   21.646370] ==================================================================
[   21.871847] ==================================================================
[   21.873266] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.874301] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   21.875801] 
[   21.876042] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   21.876579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.876602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.876634] Call Trace:
[   21.876674]  <TASK>
[   21.876707]  dump_stack_lvl+0x73/0xb0
[   21.876749]  print_report+0xd1/0x650
[   21.876784]  ? __virt_addr_valid+0x1db/0x2d0
[   21.876817]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.876855]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.876887]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.876949]  kasan_report+0x141/0x180
[   21.876987]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.877033]  kasan_check_range+0x10c/0x1c0
[   21.877067]  __kasan_check_write+0x18/0x20
[   21.877095]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.877135]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.877410]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.877456]  ? trace_hardirqs_on+0x37/0xe0
[   21.877494]  ? kasan_bitops_generic+0x92/0x1c0
[   21.877528]  kasan_bitops_generic+0x116/0x1c0
[   21.877558]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.877590]  ? __pfx_read_tsc+0x10/0x10
[   21.877622]  ? ktime_get_ts64+0x86/0x230
[   21.877681]  kunit_try_run_case+0x1a5/0x480
[   21.877725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.877754]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.877791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.877827]  ? __kthread_parkme+0x82/0x180
[   21.877857]  ? preempt_count_sub+0x50/0x80
[   21.877890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.877921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.878011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.878052]  kthread+0x337/0x6f0
[   21.878082]  ? trace_preempt_on+0x20/0xc0
[   21.878115]  ? __pfx_kthread+0x10/0x10
[   21.878144]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.878219]  ? calculate_sigpending+0x7b/0xa0
[   21.878272]  ? __pfx_kthread+0x10/0x10
[   21.878305]  ret_from_fork+0x116/0x1d0
[   21.878332]  ? __pfx_kthread+0x10/0x10
[   21.878362]  ret_from_fork_asm+0x1a/0x30
[   21.878407]  </TASK>
[   21.878422] 
[   21.904650] Allocated by task 278:
[   21.905576]  kasan_save_stack+0x45/0x70
[   21.905987]  kasan_save_track+0x18/0x40
[   21.906402]  kasan_save_alloc_info+0x3b/0x50
[   21.907577]  __kasan_kmalloc+0xb7/0xc0
[   21.908162]  __kmalloc_cache_noprof+0x189/0x420
[   21.909052]  kasan_bitops_generic+0x92/0x1c0
[   21.910132]  kunit_try_run_case+0x1a5/0x480
[   21.910585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.911286]  kthread+0x337/0x6f0
[   21.911995]  ret_from_fork+0x116/0x1d0
[   21.912330]  ret_from_fork_asm+0x1a/0x30
[   21.912749] 
[   21.913536] The buggy address belongs to the object at ffff888100fa0f20
[   21.913536]  which belongs to the cache kmalloc-16 of size 16
[   21.914693] The buggy address is located 8 bytes inside of
[   21.914693]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   21.916341] 
[   21.916505] The buggy address belongs to the physical page:
[   21.916869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   21.918017] flags: 0x200000000000000(node=0|zone=2)
[   21.918813] page_type: f5(slab)
[   21.919209] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.920367] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.920967] page dumped because: kasan: bad access detected
[   21.921725] 
[   21.922017] Memory state around the buggy address:
[   21.922782]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.923389]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.923957] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   21.924474]                                   ^
[   21.925133]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.925974]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   21.926722] ==================================================================