Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-x86_64

[   46.265200] ==================================================================
[   46.272267] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.281205] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   46.288496] 
[   46.289977] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   46.290025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.290040] Hardware name: WinLink E850-96 board (DT)
[   46.290058] Call trace:
[   46.290072]  show_stack+0x20/0x38 (C)
[   46.290105]  dump_stack_lvl+0x8c/0xd0
[   46.290141]  print_report+0x118/0x608
[   46.290177]  kasan_report+0xdc/0x128
[   46.290210]  __asan_report_load8_noabort+0x20/0x30
[   46.290244]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.290281]  kasan_bitops_generic+0x11c/0x1c8
[   46.290315]  kunit_try_run_case+0x170/0x3f0
[   46.290350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.290390]  kthread+0x328/0x630
[   46.290417]  ret_from_fork+0x10/0x20
[   46.290447] 
[   46.359936] Allocated by task 305:
[   46.363322]  kasan_save_stack+0x3c/0x68
[   46.367141]  kasan_save_track+0x20/0x40
[   46.370960]  kasan_save_alloc_info+0x40/0x58
[   46.375214]  __kasan_kmalloc+0xd4/0xd8
[   46.378946]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.383460]  kasan_bitops_generic+0xa0/0x1c8
[   46.387713]  kunit_try_run_case+0x170/0x3f0
[   46.391880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.397349]  kthread+0x328/0x630
[   46.400561]  ret_from_fork+0x10/0x20
[   46.404120] 
[   46.405595] The buggy address belongs to the object at ffff00080444cc20
[   46.405595]  which belongs to the cache kmalloc-16 of size 16
[   46.417922] The buggy address is located 8 bytes inside of
[   46.417922]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   46.430161] 
[   46.431636] The buggy address belongs to the physical page:
[   46.437192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   46.445178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.451688] page_type: f5(slab)
[   46.454821] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.462546] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.470264] page dumped because: kasan: bad access detected
[   46.475819] 
[   46.477295] Memory state around the buggy address:
[   46.482073]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.489278]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   46.496483] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.503684]                                   ^
[   46.508201]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.515406]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.522607] ==================================================================
[   44.934513] ==================================================================
[   44.941557] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.950496] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   44.957787] 
[   44.959269] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   44.959317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.959334] Hardware name: WinLink E850-96 board (DT)
[   44.959352] Call trace:
[   44.959364]  show_stack+0x20/0x38 (C)
[   44.959399]  dump_stack_lvl+0x8c/0xd0
[   44.959435]  print_report+0x118/0x608
[   44.959469]  kasan_report+0xdc/0x128
[   44.959502]  __asan_report_load8_noabort+0x20/0x30
[   44.959533]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.959572]  kasan_bitops_generic+0x11c/0x1c8
[   44.959604]  kunit_try_run_case+0x170/0x3f0
[   44.959638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.959680]  kthread+0x328/0x630
[   44.959706]  ret_from_fork+0x10/0x20
[   44.959738] 
[   45.029227] Allocated by task 305:
[   45.032613]  kasan_save_stack+0x3c/0x68
[   45.036432]  kasan_save_track+0x20/0x40
[   45.040251]  kasan_save_alloc_info+0x40/0x58
[   45.044505]  __kasan_kmalloc+0xd4/0xd8
[   45.048237]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.052751]  kasan_bitops_generic+0xa0/0x1c8
[   45.057004]  kunit_try_run_case+0x170/0x3f0
[   45.061171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.066639]  kthread+0x328/0x630
[   45.069851]  ret_from_fork+0x10/0x20
[   45.073410] 
[   45.074886] The buggy address belongs to the object at ffff00080444cc20
[   45.074886]  which belongs to the cache kmalloc-16 of size 16
[   45.087213] The buggy address is located 8 bytes inside of
[   45.087213]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   45.099451] 
[   45.100927] The buggy address belongs to the physical page:
[   45.106483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   45.114469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.120979] page_type: f5(slab)
[   45.124112] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.131836] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.139555] page dumped because: kasan: bad access detected
[   45.145112] 
[   45.146586] Memory state around the buggy address:
[   45.151364]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.158569]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   45.165774] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.172975]                                   ^
[   45.177492]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.184697]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.191898] ==================================================================
[   44.666269] ==================================================================
[   44.673332] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.682270] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   44.689648] 
[   44.691129] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   44.691177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.691193] Hardware name: WinLink E850-96 board (DT)
[   44.691212] Call trace:
[   44.691224]  show_stack+0x20/0x38 (C)
[   44.691259]  dump_stack_lvl+0x8c/0xd0
[   44.691293]  print_report+0x118/0x608
[   44.691326]  kasan_report+0xdc/0x128
[   44.691356]  kasan_check_range+0x100/0x1a8
[   44.691391]  __kasan_check_write+0x20/0x30
[   44.691418]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.691456]  kasan_bitops_generic+0x11c/0x1c8
[   44.691487]  kunit_try_run_case+0x170/0x3f0
[   44.691523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.691563]  kthread+0x328/0x630
[   44.691588]  ret_from_fork+0x10/0x20
[   44.691618] 
[   44.764474] Allocated by task 305:
[   44.767859]  kasan_save_stack+0x3c/0x68
[   44.771678]  kasan_save_track+0x20/0x40
[   44.775498]  kasan_save_alloc_info+0x40/0x58
[   44.779751]  __kasan_kmalloc+0xd4/0xd8
[   44.783484]  __kmalloc_cache_noprof+0x15c/0x3c0
[   44.787998]  kasan_bitops_generic+0xa0/0x1c8
[   44.792251]  kunit_try_run_case+0x170/0x3f0
[   44.796419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.801886]  kthread+0x328/0x630
[   44.805098]  ret_from_fork+0x10/0x20
[   44.808657] 
[   44.810132] The buggy address belongs to the object at ffff00080444cc20
[   44.810132]  which belongs to the cache kmalloc-16 of size 16
[   44.822459] The buggy address is located 8 bytes inside of
[   44.822459]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   44.834698] 
[   44.836174] The buggy address belongs to the physical page:
[   44.841730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   44.849716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.856226] page_type: f5(slab)
[   44.859359] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.867083] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.874802] page dumped because: kasan: bad access detected
[   44.880359] 
[   44.881833] Memory state around the buggy address:
[   44.886611]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.893816]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   44.901021] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.908222]                                   ^
[   44.912739]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.919944]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.927145] ==================================================================
[   45.199214] ==================================================================
[   45.206311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.215249] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   45.222627] 
[   45.224108] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   45.224155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.224171] Hardware name: WinLink E850-96 board (DT)
[   45.224190] Call trace:
[   45.224203]  show_stack+0x20/0x38 (C)
[   45.224237]  dump_stack_lvl+0x8c/0xd0
[   45.224272]  print_report+0x118/0x608
[   45.224307]  kasan_report+0xdc/0x128
[   45.224339]  kasan_check_range+0x100/0x1a8
[   45.224374]  __kasan_check_write+0x20/0x30
[   45.224404]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.224443]  kasan_bitops_generic+0x11c/0x1c8
[   45.224476]  kunit_try_run_case+0x170/0x3f0
[   45.224512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.224551]  kthread+0x328/0x630
[   45.224578]  ret_from_fork+0x10/0x20
[   45.224609] 
[   45.297452] Allocated by task 305:
[   45.300838]  kasan_save_stack+0x3c/0x68
[   45.304657]  kasan_save_track+0x20/0x40
[   45.308476]  kasan_save_alloc_info+0x40/0x58
[   45.312729]  __kasan_kmalloc+0xd4/0xd8
[   45.316462]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.320977]  kasan_bitops_generic+0xa0/0x1c8
[   45.325229]  kunit_try_run_case+0x170/0x3f0
[   45.329396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.334865]  kthread+0x328/0x630
[   45.338077]  ret_from_fork+0x10/0x20
[   45.341636] 
[   45.343111] The buggy address belongs to the object at ffff00080444cc20
[   45.343111]  which belongs to the cache kmalloc-16 of size 16
[   45.355438] The buggy address is located 8 bytes inside of
[   45.355438]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   45.367677] 
[   45.369153] The buggy address belongs to the physical page:
[   45.374708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   45.382694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.389204] page_type: f5(slab)
[   45.392337] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.400061] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.407780] page dumped because: kasan: bad access detected
[   45.413337] 
[   45.414811] Memory state around the buggy address:
[   45.419589]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.426794]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   45.433999] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.441200]                                   ^
[   45.445717]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.452922]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.460123] ==================================================================
[   44.133479] ==================================================================
[   44.140528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.149379] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   44.156757] 
[   44.158239] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   44.158287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.158304] Hardware name: WinLink E850-96 board (DT)
[   44.158324] Call trace:
[   44.158336]  show_stack+0x20/0x38 (C)
[   44.158371]  dump_stack_lvl+0x8c/0xd0
[   44.158404]  print_report+0x118/0x608
[   44.158438]  kasan_report+0xdc/0x128
[   44.158470]  kasan_check_range+0x100/0x1a8
[   44.158506]  __kasan_check_write+0x20/0x30
[   44.158536]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.158572]  kasan_bitops_generic+0x11c/0x1c8
[   44.158605]  kunit_try_run_case+0x170/0x3f0
[   44.158640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.158678]  kthread+0x328/0x630
[   44.158707]  ret_from_fork+0x10/0x20
[   44.158738] 
[   44.231496] Allocated by task 305:
[   44.234881]  kasan_save_stack+0x3c/0x68
[   44.238701]  kasan_save_track+0x20/0x40
[   44.242520]  kasan_save_alloc_info+0x40/0x58
[   44.246773]  __kasan_kmalloc+0xd4/0xd8
[   44.250506]  __kmalloc_cache_noprof+0x15c/0x3c0
[   44.255020]  kasan_bitops_generic+0xa0/0x1c8
[   44.259273]  kunit_try_run_case+0x170/0x3f0
[   44.263440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.268908]  kthread+0x328/0x630
[   44.272120]  ret_from_fork+0x10/0x20
[   44.275679] 
[   44.277155] The buggy address belongs to the object at ffff00080444cc20
[   44.277155]  which belongs to the cache kmalloc-16 of size 16
[   44.289481] The buggy address is located 8 bytes inside of
[   44.289481]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   44.301721] 
[   44.303198] The buggy address belongs to the physical page:
[   44.308752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   44.316738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.323248] page_type: f5(slab)
[   44.326380] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.334105] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.341824] page dumped because: kasan: bad access detected
[   44.347381] 
[   44.348855] Memory state around the buggy address:
[   44.353633]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.360838]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   44.368043] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.375244]                                   ^
[   44.379761]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.386966]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.394167] ==================================================================
[   45.732222] ==================================================================
[   45.739289] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.748227] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   45.755604] 
[   45.757086] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   45.757134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.757149] Hardware name: WinLink E850-96 board (DT)
[   45.757168] Call trace:
[   45.757180]  show_stack+0x20/0x38 (C)
[   45.757217]  dump_stack_lvl+0x8c/0xd0
[   45.757250]  print_report+0x118/0x608
[   45.757285]  kasan_report+0xdc/0x128
[   45.757317]  kasan_check_range+0x100/0x1a8
[   45.757351]  __kasan_check_write+0x20/0x30
[   45.757381]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.757418]  kasan_bitops_generic+0x11c/0x1c8
[   45.757450]  kunit_try_run_case+0x170/0x3f0
[   45.757485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.757523]  kthread+0x328/0x630
[   45.757551]  ret_from_fork+0x10/0x20
[   45.757583] 
[   45.830430] Allocated by task 305:
[   45.833816]  kasan_save_stack+0x3c/0x68
[   45.837635]  kasan_save_track+0x20/0x40
[   45.841454]  kasan_save_alloc_info+0x40/0x58
[   45.845707]  __kasan_kmalloc+0xd4/0xd8
[   45.849440]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.853954]  kasan_bitops_generic+0xa0/0x1c8
[   45.858208]  kunit_try_run_case+0x170/0x3f0
[   45.862374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.867843]  kthread+0x328/0x630
[   45.871055]  ret_from_fork+0x10/0x20
[   45.874613] 
[   45.876089] The buggy address belongs to the object at ffff00080444cc20
[   45.876089]  which belongs to the cache kmalloc-16 of size 16
[   45.888416] The buggy address is located 8 bytes inside of
[   45.888416]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   45.900655] 
[   45.902131] The buggy address belongs to the physical page:
[   45.907687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   45.915672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.922182] page_type: f5(slab)
[   45.925315] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.933040] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.940758] page dumped because: kasan: bad access detected
[   45.946314] 
[   45.947789] Memory state around the buggy address:
[   45.952567]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.959772]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   45.966977] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.974178]                                   ^
[   45.978695]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.985900]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.993101] ==================================================================
[   45.467467] ==================================================================
[   45.474534] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.483474] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   45.490765] 
[   45.492246] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   45.492293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.492310] Hardware name: WinLink E850-96 board (DT)
[   45.492329] Call trace:
[   45.492340]  show_stack+0x20/0x38 (C)
[   45.492374]  dump_stack_lvl+0x8c/0xd0
[   45.492409]  print_report+0x118/0x608
[   45.492442]  kasan_report+0xdc/0x128
[   45.492476]  __asan_report_load8_noabort+0x20/0x30
[   45.492506]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.492543]  kasan_bitops_generic+0x11c/0x1c8
[   45.492577]  kunit_try_run_case+0x170/0x3f0
[   45.492609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.492647]  kthread+0x328/0x630
[   45.492674]  ret_from_fork+0x10/0x20
[   45.492705] 
[   45.562205] Allocated by task 305:
[   45.565591]  kasan_save_stack+0x3c/0x68
[   45.569410]  kasan_save_track+0x20/0x40
[   45.573229]  kasan_save_alloc_info+0x40/0x58
[   45.577482]  __kasan_kmalloc+0xd4/0xd8
[   45.581215]  __kmalloc_cache_noprof+0x15c/0x3c0
[   45.585729]  kasan_bitops_generic+0xa0/0x1c8
[   45.589983]  kunit_try_run_case+0x170/0x3f0
[   45.594149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.599618]  kthread+0x328/0x630
[   45.602829]  ret_from_fork+0x10/0x20
[   45.606388] 
[   45.607865] The buggy address belongs to the object at ffff00080444cc20
[   45.607865]  which belongs to the cache kmalloc-16 of size 16
[   45.620190] The buggy address is located 8 bytes inside of
[   45.620190]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   45.632430] 
[   45.633906] The buggy address belongs to the physical page:
[   45.639461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   45.647447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.653957] page_type: f5(slab)
[   45.657091] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.664814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.672533] page dumped because: kasan: bad access detected
[   45.678090] 
[   45.679564] Memory state around the buggy address:
[   45.684342]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.691547]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   45.698752] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.705953]                                   ^
[   45.710470]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.717675]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.724876] ==================================================================
[   44.401545] ==================================================================
[   44.408579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.417518] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   44.424809] 
[   44.426291] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   44.426339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.426354] Hardware name: WinLink E850-96 board (DT)
[   44.426375] Call trace:
[   44.426387]  show_stack+0x20/0x38 (C)
[   44.426417]  dump_stack_lvl+0x8c/0xd0
[   44.426454]  print_report+0x118/0x608
[   44.426486]  kasan_report+0xdc/0x128
[   44.426519]  __asan_report_load8_noabort+0x20/0x30
[   44.426550]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.426590]  kasan_bitops_generic+0x11c/0x1c8
[   44.426622]  kunit_try_run_case+0x170/0x3f0
[   44.426658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.426696]  kthread+0x328/0x630
[   44.426724]  ret_from_fork+0x10/0x20
[   44.426754] 
[   44.496249] Allocated by task 305:
[   44.499634]  kasan_save_stack+0x3c/0x68
[   44.503454]  kasan_save_track+0x20/0x40
[   44.507273]  kasan_save_alloc_info+0x40/0x58
[   44.511526]  __kasan_kmalloc+0xd4/0xd8
[   44.515259]  __kmalloc_cache_noprof+0x15c/0x3c0
[   44.519773]  kasan_bitops_generic+0xa0/0x1c8
[   44.524026]  kunit_try_run_case+0x170/0x3f0
[   44.528193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.533661]  kthread+0x328/0x630
[   44.536873]  ret_from_fork+0x10/0x20
[   44.540432] 
[   44.541909] The buggy address belongs to the object at ffff00080444cc20
[   44.541909]  which belongs to the cache kmalloc-16 of size 16
[   44.554235] The buggy address is located 8 bytes inside of
[   44.554235]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   44.566473] 
[   44.567949] The buggy address belongs to the physical page:
[   44.573505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   44.581491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.588001] page_type: f5(slab)
[   44.591134] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.598858] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.606577] page dumped because: kasan: bad access detected
[   44.612134] 
[   44.613608] Memory state around the buggy address:
[   44.618388]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.625590]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   44.632795] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.639997]                                   ^
[   44.644514]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.651719]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.658920] ==================================================================
[   46.000472] ==================================================================
[   46.007514] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   46.016452] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305
[   46.023743] 
[   46.025224] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   46.025272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.025288] Hardware name: WinLink E850-96 board (DT)
[   46.025308] Call trace:
[   46.025321]  show_stack+0x20/0x38 (C)
[   46.025355]  dump_stack_lvl+0x8c/0xd0
[   46.025387]  print_report+0x118/0x608
[   46.025422]  kasan_report+0xdc/0x128
[   46.025455]  __asan_report_load8_noabort+0x20/0x30
[   46.025486]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   46.025523]  kasan_bitops_generic+0x11c/0x1c8
[   46.025558]  kunit_try_run_case+0x170/0x3f0
[   46.025592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.025630]  kthread+0x328/0x630
[   46.025656]  ret_from_fork+0x10/0x20
[   46.025687] 
[   46.095183] Allocated by task 305:
[   46.098569]  kasan_save_stack+0x3c/0x68
[   46.102388]  kasan_save_track+0x20/0x40
[   46.106207]  kasan_save_alloc_info+0x40/0x58
[   46.110461]  __kasan_kmalloc+0xd4/0xd8
[   46.114193]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.118707]  kasan_bitops_generic+0xa0/0x1c8
[   46.122960]  kunit_try_run_case+0x170/0x3f0
[   46.127127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.132596]  kthread+0x328/0x630
[   46.135807]  ret_from_fork+0x10/0x20
[   46.139366] 
[   46.140844] The buggy address belongs to the object at ffff00080444cc20
[   46.140844]  which belongs to the cache kmalloc-16 of size 16
[   46.153169] The buggy address is located 8 bytes inside of
[   46.153169]  allocated 9-byte region [ffff00080444cc20, ffff00080444cc29)
[   46.165407] 
[   46.166884] The buggy address belongs to the physical page:
[   46.172439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c
[   46.180425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.186935] page_type: f5(slab)
[   46.190068] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.197792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.205511] page dumped because: kasan: bad access detected
[   46.211067] 
[   46.212542] Memory state around the buggy address:
[   46.217321]  ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.224525]  ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   46.231730] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.238931]                                   ^
[   46.243448]  ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.250653]  ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.257854] ==================================================================

[   21.973512] ==================================================================
[   21.973988] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.974735] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   21.975647] 
[   21.975913] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   21.976061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.976100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.976162] Call Trace:
[   21.976211]  <TASK>
[   21.976256]  dump_stack_lvl+0x73/0xb0
[   21.976338]  print_report+0xd1/0x650
[   21.976417]  ? __virt_addr_valid+0x1db/0x2d0
[   21.976498]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.976580]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.976650]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.977102]  kasan_report+0x141/0x180
[   21.977161]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.977334]  kasan_check_range+0x10c/0x1c0
[   21.977400]  __kasan_check_write+0x18/0x20
[   21.977472]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.977553]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.977668]  kasan_bitops_generic+0x121/0x1c0
[   21.977745]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.977827]  ? __pfx_read_tsc+0x10/0x10
[   21.977905]  ? ktime_get_ts64+0x86/0x230
[   21.978017]  kunit_try_run_case+0x1a5/0x480
[   21.978100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.978171]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.978260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.978350]  ? __kthread_parkme+0x82/0x180
[   21.978429]  ? preempt_count_sub+0x50/0x80
[   21.978509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.978585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.978666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.978755]  kthread+0x337/0x6f0
[   21.978833]  ? trace_preempt_on+0x20/0xc0
[   21.978914]  ? __pfx_kthread+0x10/0x10
[   21.979141]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.979322]  ? calculate_sigpending+0x7b/0xa0
[   21.979409]  ? __pfx_kthread+0x10/0x10
[   21.979487]  ret_from_fork+0x116/0x1d0
[   21.979532]  ? __pfx_kthread+0x10/0x10
[   21.979567]  ret_from_fork_asm+0x1a/0x30
[   21.979612]  </TASK>
[   21.979628] 
[   21.999039] Allocated by task 278:
[   21.999771]  kasan_save_stack+0x45/0x70
[   22.000510]  kasan_save_track+0x18/0x40
[   22.000982]  kasan_save_alloc_info+0x3b/0x50
[   22.001594]  __kasan_kmalloc+0xb7/0xc0
[   22.002112]  __kmalloc_cache_noprof+0x189/0x420
[   22.002718]  kasan_bitops_generic+0x92/0x1c0
[   22.003498]  kunit_try_run_case+0x1a5/0x480
[   22.003945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.004778]  kthread+0x337/0x6f0
[   22.005314]  ret_from_fork+0x116/0x1d0
[   22.005730]  ret_from_fork_asm+0x1a/0x30
[   22.006379] 
[   22.006585] The buggy address belongs to the object at ffff888100fa0f20
[   22.006585]  which belongs to the cache kmalloc-16 of size 16
[   22.007559] The buggy address is located 8 bytes inside of
[   22.007559]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   22.008605] 
[   22.009568] The buggy address belongs to the physical page:
[   22.010530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   22.011282] flags: 0x200000000000000(node=0|zone=2)
[   22.011648] page_type: f5(slab)
[   22.012214] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.012918] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.014085] page dumped because: kasan: bad access detected
[   22.014626] 
[   22.015075] Memory state around the buggy address:
[   22.015537]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.016521]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   22.017207] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.018028]                                   ^
[   22.018453]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.019971]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   22.020563] ==================================================================
[   22.290474] ==================================================================
[   22.291107] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   22.293365] Read of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   22.293951] 
[   22.294423] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.294887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.294908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.294969] Call Trace:
[   22.294991]  <TASK>
[   22.295012]  dump_stack_lvl+0x73/0xb0
[   22.295054]  print_report+0xd1/0x650
[   22.295088]  ? __virt_addr_valid+0x1db/0x2d0
[   22.295123]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   22.295158]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.295278]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   22.295318]  kasan_report+0x141/0x180
[   22.295352]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   22.295392]  kasan_check_range+0x10c/0x1c0
[   22.295427]  __kasan_check_read+0x15/0x20
[   22.295454]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   22.295488]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.295539]  kasan_bitops_generic+0x121/0x1c0
[   22.295567]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.295596]  ? __pfx_read_tsc+0x10/0x10
[   22.295628]  ? ktime_get_ts64+0x86/0x230
[   22.295693]  kunit_try_run_case+0x1a5/0x480
[   22.295726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.295754]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.295791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.295825]  ? __kthread_parkme+0x82/0x180
[   22.295856]  ? preempt_count_sub+0x50/0x80
[   22.295890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.295942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.295984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.296021]  kthread+0x337/0x6f0
[   22.296049]  ? trace_preempt_on+0x20/0xc0
[   22.296082]  ? __pfx_kthread+0x10/0x10
[   22.296113]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.296147]  ? calculate_sigpending+0x7b/0xa0
[   22.296410]  ? __pfx_kthread+0x10/0x10
[   22.296449]  ret_from_fork+0x116/0x1d0
[   22.296479]  ? __pfx_kthread+0x10/0x10
[   22.296509]  ret_from_fork_asm+0x1a/0x30
[   22.296594]  </TASK>
[   22.296611] 
[   22.318139] Allocated by task 278:
[   22.318611]  kasan_save_stack+0x45/0x70
[   22.319790]  kasan_save_track+0x18/0x40
[   22.320277]  kasan_save_alloc_info+0x3b/0x50
[   22.320894]  __kasan_kmalloc+0xb7/0xc0
[   22.321271]  __kmalloc_cache_noprof+0x189/0x420
[   22.321953]  kasan_bitops_generic+0x92/0x1c0
[   22.322563]  kunit_try_run_case+0x1a5/0x480
[   22.323068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.323866]  kthread+0x337/0x6f0
[   22.324185]  ret_from_fork+0x116/0x1d0
[   22.324499]  ret_from_fork_asm+0x1a/0x30
[   22.325548] 
[   22.325793] The buggy address belongs to the object at ffff888100fa0f20
[   22.325793]  which belongs to the cache kmalloc-16 of size 16
[   22.326828] The buggy address is located 8 bytes inside of
[   22.326828]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   22.328297] 
[   22.328720] The buggy address belongs to the physical page:
[   22.329527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   22.331046] flags: 0x200000000000000(node=0|zone=2)
[   22.331952] page_type: f5(slab)
[   22.332631] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.332943] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.333522] page dumped because: kasan: bad access detected
[   22.334745] 
[   22.335605] Memory state around the buggy address:
[   22.336069]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.337105]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   22.337975] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.339261]                                   ^
[   22.339621]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.340566]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   22.341369] ==================================================================
[   21.929574] ==================================================================
[   21.930833] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.931812] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   21.932911] 
[   21.933171] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   21.933305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.933342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.933406] Call Trace:
[   21.933427]  <TASK>
[   21.933453]  dump_stack_lvl+0x73/0xb0
[   21.933525]  print_report+0xd1/0x650
[   21.933563]  ? __virt_addr_valid+0x1db/0x2d0
[   21.933597]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.933631]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.934114]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.934169]  kasan_report+0x141/0x180
[   21.934338]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.934382]  kasan_check_range+0x10c/0x1c0
[   21.934421]  __kasan_check_write+0x18/0x20
[   21.934450]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.934485]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.934537]  kasan_bitops_generic+0x121/0x1c0
[   21.934565]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.934595]  ? __pfx_read_tsc+0x10/0x10
[   21.934628]  ? ktime_get_ts64+0x86/0x230
[   21.934697]  kunit_try_run_case+0x1a5/0x480
[   21.934734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.934763]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.934801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.934836]  ? __kthread_parkme+0x82/0x180
[   21.934866]  ? preempt_count_sub+0x50/0x80
[   21.934899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.934953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.934996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.935034]  kthread+0x337/0x6f0
[   21.935061]  ? trace_preempt_on+0x20/0xc0
[   21.935094]  ? __pfx_kthread+0x10/0x10
[   21.935123]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.935155]  ? calculate_sigpending+0x7b/0xa0
[   21.935219]  ? __pfx_kthread+0x10/0x10
[   21.935251]  ret_from_fork+0x116/0x1d0
[   21.935279]  ? __pfx_kthread+0x10/0x10
[   21.935309]  ret_from_fork_asm+0x1a/0x30
[   21.935351]  </TASK>
[   21.935368] 
[   21.953480] Allocated by task 278:
[   21.953870]  kasan_save_stack+0x45/0x70
[   21.954348]  kasan_save_track+0x18/0x40
[   21.954771]  kasan_save_alloc_info+0x3b/0x50
[   21.955242]  __kasan_kmalloc+0xb7/0xc0
[   21.956036]  __kmalloc_cache_noprof+0x189/0x420
[   21.956430]  kasan_bitops_generic+0x92/0x1c0
[   21.956768]  kunit_try_run_case+0x1a5/0x480
[   21.957605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.958156]  kthread+0x337/0x6f0
[   21.958659]  ret_from_fork+0x116/0x1d0
[   21.959007]  ret_from_fork_asm+0x1a/0x30
[   21.959554] 
[   21.960221] The buggy address belongs to the object at ffff888100fa0f20
[   21.960221]  which belongs to the cache kmalloc-16 of size 16
[   21.961075] The buggy address is located 8 bytes inside of
[   21.961075]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   21.961911] 
[   21.962187] The buggy address belongs to the physical page:
[   21.962702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   21.963402] flags: 0x200000000000000(node=0|zone=2)
[   21.964578] page_type: f5(slab)
[   21.965012] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.965606] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.966104] page dumped because: kasan: bad access detected
[   21.966532] 
[   21.967003] Memory state around the buggy address:
[   21.967455]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.968098]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.969412] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   21.970371]                                   ^
[   21.970815]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.971408]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   21.972150] ==================================================================
[   22.022179] ==================================================================
[   22.023040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   22.024174] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   22.024807] 
[   22.025179] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.025310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.025349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.025409] Call Trace:
[   22.025462]  <TASK>
[   22.025516]  dump_stack_lvl+0x73/0xb0
[   22.025599]  print_report+0xd1/0x650
[   22.025780]  ? __virt_addr_valid+0x1db/0x2d0
[   22.025866]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   22.025970]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.026083]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   22.026173]  kasan_report+0x141/0x180
[   22.026364]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   22.026458]  kasan_check_range+0x10c/0x1c0
[   22.026541]  __kasan_check_write+0x18/0x20
[   22.026614]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   22.026714]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.026829]  kasan_bitops_generic+0x121/0x1c0
[   22.026907]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.027003]  ? __pfx_read_tsc+0x10/0x10
[   22.027084]  ? ktime_get_ts64+0x86/0x230
[   22.027171]  kunit_try_run_case+0x1a5/0x480
[   22.027510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.027543]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.027582]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.027618]  ? __kthread_parkme+0x82/0x180
[   22.027665]  ? preempt_count_sub+0x50/0x80
[   22.027720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.027752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.027789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.027825]  kthread+0x337/0x6f0
[   22.027854]  ? trace_preempt_on+0x20/0xc0
[   22.027887]  ? __pfx_kthread+0x10/0x10
[   22.027918]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.027984]  ? calculate_sigpending+0x7b/0xa0
[   22.028022]  ? __pfx_kthread+0x10/0x10
[   22.028052]  ret_from_fork+0x116/0x1d0
[   22.028078]  ? __pfx_kthread+0x10/0x10
[   22.028107]  ret_from_fork_asm+0x1a/0x30
[   22.028150]  </TASK>
[   22.028171] 
[   22.044449] Allocated by task 278:
[   22.044802]  kasan_save_stack+0x45/0x70
[   22.045278]  kasan_save_track+0x18/0x40
[   22.045768]  kasan_save_alloc_info+0x3b/0x50
[   22.046258]  __kasan_kmalloc+0xb7/0xc0
[   22.046672]  __kmalloc_cache_noprof+0x189/0x420
[   22.047667]  kasan_bitops_generic+0x92/0x1c0
[   22.048101]  kunit_try_run_case+0x1a5/0x480
[   22.048624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.049059]  kthread+0x337/0x6f0
[   22.049488]  ret_from_fork+0x116/0x1d0
[   22.049899]  ret_from_fork_asm+0x1a/0x30
[   22.050683] 
[   22.050953] The buggy address belongs to the object at ffff888100fa0f20
[   22.050953]  which belongs to the cache kmalloc-16 of size 16
[   22.053643] The buggy address is located 8 bytes inside of
[   22.053643]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   22.055695] 
[   22.055940] The buggy address belongs to the physical page:
[   22.057361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   22.058071] flags: 0x200000000000000(node=0|zone=2)
[   22.058807] page_type: f5(slab)
[   22.059135] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.059758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.060361] page dumped because: kasan: bad access detected
[   22.060801] 
[   22.061507] Memory state around the buggy address:
[   22.061913]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.062855]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   22.063604] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.064164]                                   ^
[   22.065005]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.066131]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   22.066900] ==================================================================
[   22.342896] ==================================================================
[   22.343509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   22.345480] Read of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   22.345908] 
[   22.346147] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.346273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.346312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.346368] Call Trace:
[   22.346411]  <TASK>
[   22.346452]  dump_stack_lvl+0x73/0xb0
[   22.346517]  print_report+0xd1/0x650
[   22.346585]  ? __virt_addr_valid+0x1db/0x2d0
[   22.346650]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   22.346714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.346775]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   22.346839]  kasan_report+0x141/0x180
[   22.346897]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   22.347004]  __asan_report_load8_noabort+0x18/0x20
[   22.347084]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   22.347168]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.347280]  kasan_bitops_generic+0x121/0x1c0
[   22.347360]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.347441]  ? __pfx_read_tsc+0x10/0x10
[   22.347518]  ? ktime_get_ts64+0x86/0x230
[   22.347605]  kunit_try_run_case+0x1a5/0x480
[   22.347681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.347753]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.347842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.348810]  ? __kthread_parkme+0x82/0x180
[   22.348894]  ? preempt_count_sub+0x50/0x80
[   22.348992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.349057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.349124]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.349309]  kthread+0x337/0x6f0
[   22.349385]  ? trace_preempt_on+0x20/0xc0
[   22.349456]  ? __pfx_kthread+0x10/0x10
[   22.349524]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.349592]  ? calculate_sigpending+0x7b/0xa0
[   22.349664]  ? __pfx_kthread+0x10/0x10
[   22.349729]  ret_from_fork+0x116/0x1d0
[   22.349787]  ? __pfx_kthread+0x10/0x10
[   22.349852]  ret_from_fork_asm+0x1a/0x30
[   22.349960]  </TASK>
[   22.350000] 
[   22.374196] Allocated by task 278:
[   22.375019]  kasan_save_stack+0x45/0x70
[   22.375832]  kasan_save_track+0x18/0x40
[   22.376424]  kasan_save_alloc_info+0x3b/0x50
[   22.377038]  __kasan_kmalloc+0xb7/0xc0
[   22.378559]  __kmalloc_cache_noprof+0x189/0x420
[   22.379123]  kasan_bitops_generic+0x92/0x1c0
[   22.379451]  kunit_try_run_case+0x1a5/0x480
[   22.379974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.380517]  kthread+0x337/0x6f0
[   22.381045]  ret_from_fork+0x116/0x1d0
[   22.381602]  ret_from_fork_asm+0x1a/0x30
[   22.382548] 
[   22.382794] The buggy address belongs to the object at ffff888100fa0f20
[   22.382794]  which belongs to the cache kmalloc-16 of size 16
[   22.384669] The buggy address is located 8 bytes inside of
[   22.384669]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   22.386010] 
[   22.386385] The buggy address belongs to the physical page:
[   22.386952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   22.387620] flags: 0x200000000000000(node=0|zone=2)
[   22.388627] page_type: f5(slab)
[   22.389096] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.390156] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.390937] page dumped because: kasan: bad access detected
[   22.391338] 
[   22.391574] Memory state around the buggy address:
[   22.392018]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.393275]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   22.394032] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.394874]                                   ^
[   22.395356]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.396169]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   22.397130] ==================================================================
[   22.067776] ==================================================================
[   22.068831] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   22.069657] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   22.070285] 
[   22.070527] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.070660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.070699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.070760] Call Trace:
[   22.070811]  <TASK>
[   22.070861]  dump_stack_lvl+0x73/0xb0
[   22.071107]  print_report+0xd1/0x650
[   22.071294]  ? __virt_addr_valid+0x1db/0x2d0
[   22.071380]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   22.071469]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.071556]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   22.071645]  kasan_report+0x141/0x180
[   22.071723]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   22.071815]  kasan_check_range+0x10c/0x1c0
[   22.071902]  __kasan_check_write+0x18/0x20
[   22.071999]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   22.072084]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.072191]  kasan_bitops_generic+0x121/0x1c0
[   22.072272]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.072345]  ? __pfx_read_tsc+0x10/0x10
[   22.072422]  ? ktime_get_ts64+0x86/0x230
[   22.072505]  kunit_try_run_case+0x1a5/0x480
[   22.072582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.072614]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.072961]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.073049]  ? __kthread_parkme+0x82/0x180
[   22.073088]  ? preempt_count_sub+0x50/0x80
[   22.073123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.073152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.073191]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.073225]  kthread+0x337/0x6f0
[   22.073253]  ? trace_preempt_on+0x20/0xc0
[   22.073285]  ? __pfx_kthread+0x10/0x10
[   22.073314]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.073347]  ? calculate_sigpending+0x7b/0xa0
[   22.073383]  ? __pfx_kthread+0x10/0x10
[   22.073413]  ret_from_fork+0x116/0x1d0
[   22.073439]  ? __pfx_kthread+0x10/0x10
[   22.073469]  ret_from_fork_asm+0x1a/0x30
[   22.073513]  </TASK>
[   22.073528] 
[   22.101032] Allocated by task 278:
[   22.101406]  kasan_save_stack+0x45/0x70
[   22.102572]  kasan_save_track+0x18/0x40
[   22.103072]  kasan_save_alloc_info+0x3b/0x50
[   22.103989]  __kasan_kmalloc+0xb7/0xc0
[   22.104283]  __kmalloc_cache_noprof+0x189/0x420
[   22.105231]  kasan_bitops_generic+0x92/0x1c0
[   22.106145]  kunit_try_run_case+0x1a5/0x480
[   22.106597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.107495]  kthread+0x337/0x6f0
[   22.108120]  ret_from_fork+0x116/0x1d0
[   22.108704]  ret_from_fork_asm+0x1a/0x30
[   22.109054] 
[   22.109295] The buggy address belongs to the object at ffff888100fa0f20
[   22.109295]  which belongs to the cache kmalloc-16 of size 16
[   22.111077] The buggy address is located 8 bytes inside of
[   22.111077]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   22.111986] 
[   22.112086] The buggy address belongs to the physical page:
[   22.113051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   22.114080] flags: 0x200000000000000(node=0|zone=2)
[   22.115008] page_type: f5(slab)
[   22.115616] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.116198] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.116741] page dumped because: kasan: bad access detected
[   22.117723] 
[   22.118440] Memory state around the buggy address:
[   22.118822]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.119782]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   22.120912] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.121841]                                   ^
[   22.122846]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.124100]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   22.125016] ==================================================================
[   22.235617] ==================================================================
[   22.236683] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   22.238515] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   22.239692] 
[   22.239876] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.239992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.240033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.240092] Call Trace:
[   22.240146]  <TASK>
[   22.240284]  dump_stack_lvl+0x73/0xb0
[   22.240376]  print_report+0xd1/0x650
[   22.240414]  ? __virt_addr_valid+0x1db/0x2d0
[   22.240487]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   22.240532]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.240565]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   22.240600]  kasan_report+0x141/0x180
[   22.240640]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   22.240887]  kasan_check_range+0x10c/0x1c0
[   22.240953]  __kasan_check_write+0x18/0x20
[   22.240986]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   22.241020]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.241072]  kasan_bitops_generic+0x121/0x1c0
[   22.241101]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.241131]  ? __pfx_read_tsc+0x10/0x10
[   22.241161]  ? ktime_get_ts64+0x86/0x230
[   22.241422]  kunit_try_run_case+0x1a5/0x480
[   22.241460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.241491]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.241527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.241564]  ? __kthread_parkme+0x82/0x180
[   22.241593]  ? preempt_count_sub+0x50/0x80
[   22.241627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.241689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.241729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.241765]  kthread+0x337/0x6f0
[   22.241810]  ? trace_preempt_on+0x20/0xc0
[   22.241843]  ? __pfx_kthread+0x10/0x10
[   22.241871]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.241905]  ? calculate_sigpending+0x7b/0xa0
[   22.241969]  ? __pfx_kthread+0x10/0x10
[   22.242001]  ret_from_fork+0x116/0x1d0
[   22.242027]  ? __pfx_kthread+0x10/0x10
[   22.242056]  ret_from_fork_asm+0x1a/0x30
[   22.242097]  </TASK>
[   22.242113] 
[   22.264819] Allocated by task 278:
[   22.265816]  kasan_save_stack+0x45/0x70
[   22.266177]  kasan_save_track+0x18/0x40
[   22.266831]  kasan_save_alloc_info+0x3b/0x50
[   22.267730]  __kasan_kmalloc+0xb7/0xc0
[   22.268065]  __kmalloc_cache_noprof+0x189/0x420
[   22.268973]  kasan_bitops_generic+0x92/0x1c0
[   22.269391]  kunit_try_run_case+0x1a5/0x480
[   22.269860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.270356]  kthread+0x337/0x6f0
[   22.271468]  ret_from_fork+0x116/0x1d0
[   22.271833]  ret_from_fork_asm+0x1a/0x30
[   22.272426] 
[   22.272629] The buggy address belongs to the object at ffff888100fa0f20
[   22.272629]  which belongs to the cache kmalloc-16 of size 16
[   22.274282] The buggy address is located 8 bytes inside of
[   22.274282]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   22.276549] 
[   22.276806] The buggy address belongs to the physical page:
[   22.277360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   22.278274] flags: 0x200000000000000(node=0|zone=2)
[   22.279761] page_type: f5(slab)
[   22.280153] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.281317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.282110] page dumped because: kasan: bad access detected
[   22.282757] 
[   22.283013] Memory state around the buggy address:
[   22.284199]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.284900]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   22.285897] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.287036]                                   ^
[   22.287596]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.288652]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   22.289388] ==================================================================
[   22.180046] ==================================================================
[   22.181117] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   22.182183] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   22.183042] 
[   22.183509] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.183672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.183742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.183804] Call Trace:
[   22.183856]  <TASK>
[   22.183909]  dump_stack_lvl+0x73/0xb0
[   22.184011]  print_report+0xd1/0x650
[   22.184089]  ? __virt_addr_valid+0x1db/0x2d0
[   22.184168]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   22.184249]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.184325]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   22.184607]  kasan_report+0x141/0x180
[   22.184697]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   22.185042]  kasan_check_range+0x10c/0x1c0
[   22.185138]  __kasan_check_write+0x18/0x20
[   22.185278]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   22.185335]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.185388]  kasan_bitops_generic+0x121/0x1c0
[   22.185417]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.185449]  ? __pfx_read_tsc+0x10/0x10
[   22.185483]  ? ktime_get_ts64+0x86/0x230
[   22.185518]  kunit_try_run_case+0x1a5/0x480
[   22.185550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.185578]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.185613]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.185685]  ? __kthread_parkme+0x82/0x180
[   22.185721]  ? preempt_count_sub+0x50/0x80
[   22.185755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.185784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.185821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.185858]  kthread+0x337/0x6f0
[   22.185885]  ? trace_preempt_on+0x20/0xc0
[   22.185941]  ? __pfx_kthread+0x10/0x10
[   22.185975]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.186010]  ? calculate_sigpending+0x7b/0xa0
[   22.186047]  ? __pfx_kthread+0x10/0x10
[   22.186077]  ret_from_fork+0x116/0x1d0
[   22.186104]  ? __pfx_kthread+0x10/0x10
[   22.186135]  ret_from_fork_asm+0x1a/0x30
[   22.186195]  </TASK>
[   22.186235] 
[   22.210202] Allocated by task 278:
[   22.210840]  kasan_save_stack+0x45/0x70
[   22.211553]  kasan_save_track+0x18/0x40
[   22.212080]  kasan_save_alloc_info+0x3b/0x50
[   22.212822]  __kasan_kmalloc+0xb7/0xc0
[   22.213051]  __kmalloc_cache_noprof+0x189/0x420
[   22.213577]  kasan_bitops_generic+0x92/0x1c0
[   22.214345]  kunit_try_run_case+0x1a5/0x480
[   22.214569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.215728]  kthread+0x337/0x6f0
[   22.216051]  ret_from_fork+0x116/0x1d0
[   22.216727]  ret_from_fork_asm+0x1a/0x30
[   22.217135] 
[   22.217954] The buggy address belongs to the object at ffff888100fa0f20
[   22.217954]  which belongs to the cache kmalloc-16 of size 16
[   22.219540] The buggy address is located 8 bytes inside of
[   22.219540]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   22.221070] 
[   22.221500] The buggy address belongs to the physical page:
[   22.222149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   22.223121] flags: 0x200000000000000(node=0|zone=2)
[   22.223997] page_type: f5(slab)
[   22.224832] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.225549] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.226665] page dumped because: kasan: bad access detected
[   22.227381] 
[   22.227976] Memory state around the buggy address:
[   22.228371]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.229964]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   22.230515] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.231087]                                   ^
[   22.231987]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.232839]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   22.233903] ==================================================================
[   22.126024] ==================================================================
[   22.127772] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   22.128836] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278
[   22.129912] 
[   22.130149] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.131001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.131023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.131055] Call Trace:
[   22.131078]  <TASK>
[   22.131102]  dump_stack_lvl+0x73/0xb0
[   22.131141]  print_report+0xd1/0x650
[   22.131195]  ? __virt_addr_valid+0x1db/0x2d0
[   22.131245]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   22.131281]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.131315]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   22.131348]  kasan_report+0x141/0x180
[   22.131379]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   22.131418]  kasan_check_range+0x10c/0x1c0
[   22.131452]  __kasan_check_write+0x18/0x20
[   22.131480]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   22.131514]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.131563]  kasan_bitops_generic+0x121/0x1c0
[   22.131591]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.131620]  ? __pfx_read_tsc+0x10/0x10
[   22.131757]  ? ktime_get_ts64+0x86/0x230
[   22.131803]  kunit_try_run_case+0x1a5/0x480
[   22.131837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.131866]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.131901]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.131964]  ? __kthread_parkme+0x82/0x180
[   22.131998]  ? preempt_count_sub+0x50/0x80
[   22.132031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.132061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.132096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.132132]  kthread+0x337/0x6f0
[   22.132166]  ? trace_preempt_on+0x20/0xc0
[   22.132314]  ? __pfx_kthread+0x10/0x10
[   22.132346]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.132381]  ? calculate_sigpending+0x7b/0xa0
[   22.132417]  ? __pfx_kthread+0x10/0x10
[   22.132447]  ret_from_fork+0x116/0x1d0
[   22.132474]  ? __pfx_kthread+0x10/0x10
[   22.132506]  ret_from_fork_asm+0x1a/0x30
[   22.132549]  </TASK>
[   22.132565] 
[   22.155962] Allocated by task 278:
[   22.157036]  kasan_save_stack+0x45/0x70
[   22.157675]  kasan_save_track+0x18/0x40
[   22.158458]  kasan_save_alloc_info+0x3b/0x50
[   22.159050]  __kasan_kmalloc+0xb7/0xc0
[   22.159602]  __kmalloc_cache_noprof+0x189/0x420
[   22.160262]  kasan_bitops_generic+0x92/0x1c0
[   22.161074]  kunit_try_run_case+0x1a5/0x480
[   22.161630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.162878]  kthread+0x337/0x6f0
[   22.163565]  ret_from_fork+0x116/0x1d0
[   22.163907]  ret_from_fork_asm+0x1a/0x30
[   22.164463] 
[   22.165029] The buggy address belongs to the object at ffff888100fa0f20
[   22.165029]  which belongs to the cache kmalloc-16 of size 16
[   22.165993] The buggy address is located 8 bytes inside of
[   22.165993]  allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29)
[   22.167177] 
[   22.167426] The buggy address belongs to the physical page:
[   22.167855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0
[   22.168474] flags: 0x200000000000000(node=0|zone=2)
[   22.170030] page_type: f5(slab)
[   22.170737] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.171608] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.172844] page dumped because: kasan: bad access detected
[   22.173504] 
[   22.173736] Memory state around the buggy address:
[   22.174709]  ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.175759]  ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   22.176462] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.177228]                                   ^
[   22.177664]  ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.178312]  ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   22.178968] ==================================================================