Hay
Date
June 3, 2025, 7:38 a.m.

Environment
qemu-arm64
qemu-x86_64

[   20.749832] ==================================================================
[   20.749888] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.750021] Read of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261
[   20.750185] 
[   20.750281] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.750402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.750458] Hardware name: linux,dummy-virt (DT)
[   20.750493] Call trace:
[   20.750534]  show_stack+0x20/0x38 (C)
[   20.750585]  dump_stack_lvl+0x8c/0xd0
[   20.750652]  print_report+0x118/0x608
[   20.750728]  kasan_report+0xdc/0x128
[   20.750793]  __asan_report_load8_noabort+0x20/0x30
[   20.750873]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.750926]  kasan_bitops_generic+0x110/0x1c8
[   20.750982]  kunit_try_run_case+0x170/0x3f0
[   20.751033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.751088]  kthread+0x328/0x630
[   20.751502]  ret_from_fork+0x10/0x20
[   20.751652] 
[   20.751741] Allocated by task 261:
[   20.751820]  kasan_save_stack+0x3c/0x68
[   20.751973]  kasan_save_track+0x20/0x40
[   20.752071]  kasan_save_alloc_info+0x40/0x58
[   20.752193]  __kasan_kmalloc+0xd4/0xd8
[   20.752253]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.752292]  kasan_bitops_generic+0xa0/0x1c8
[   20.752333]  kunit_try_run_case+0x170/0x3f0
[   20.752657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.752724]  kthread+0x328/0x630
[   20.753021]  ret_from_fork+0x10/0x20
[   20.753095] 
[   20.753168] The buggy address belongs to the object at fff00000c4473c00
[   20.753168]  which belongs to the cache kmalloc-16 of size 16
[   20.753256] The buggy address is located 8 bytes inside of
[   20.753256]  allocated 9-byte region [fff00000c4473c00, fff00000c4473c09)
[   20.753361] 
[   20.753470] The buggy address belongs to the physical page:
[   20.753537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473
[   20.753595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.753925] page_type: f5(slab)
[   20.754002] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.754099] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.754186] page dumped because: kasan: bad access detected
[   20.754301] 
[   20.754380] Memory state around the buggy address:
[   20.754451]  fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.754502]  fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.754548] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.754589]                       ^
[   20.754619]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.754664]  fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.754726] ==================================================================
[   20.759231] ==================================================================
[   20.759271] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   20.759330] Read of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261
[   20.759416] 
[   20.759460] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.759789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.760034] Hardware name: linux,dummy-virt (DT)
[   20.760100] Call trace:
[   20.760183]  show_stack+0x20/0x38 (C)
[   20.760868]  kasan_bitops_generic+0x110/0x1c8
[   20.762561] 
[   20.762999] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.764034]  fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.765853]  kasan_check_range+0x100/0x1a8
[   20.768716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.777506] page dumped because: kasan: bad access detected
[   20.779413] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.781880] 
[   20.782639]  dump_stack_lvl+0x8c/0xd0
[   20.783259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.784520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.785076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.786365]  fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.787478]  show_stack+0x20/0x38 (C)
[   20.788690] 
[   20.789823]  kthread+0x328/0x630
[   20.790695] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.791031]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.792588]  dump_stack_lvl+0x8c/0xd0
[   20.793200]  kthread+0x328/0x630
[   20.793808] 
[   20.794078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.794982]                       ^
[   20.795625] Write of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261
[   20.796285]  kasan_report+0xdc/0x128
[   20.797743]  kasan_save_alloc_info+0x40/0x58
[   20.800189]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.801363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   20.801839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.802023]  dump_stack_lvl+0x8c/0xd0
[   20.802220]  __asan_report_load8_noabort+0x20/0x30
[   20.803290]  kunit_try_run_case+0x170/0x3f0
[   20.805093] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.805634]  fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.806364] ==================================================================
[   20.755707] ==================================================================
[   20.755764] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   20.755816] Write of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261
[   20.755867] 
[   20.755899] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.756138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.756205] Hardware name: linux,dummy-virt (DT)
[   20.756239] Call trace:
[   20.756287]  show_stack+0x20/0x38 (C)
[   20.756339]  dump_stack_lvl+0x8c/0xd0
[   20.756406]  print_report+0x118/0x608
[   20.756526]  kasan_report+0xdc/0x128
[   20.756592]  kasan_check_range+0x100/0x1a8
[   20.756656]  __kasan_check_write+0x20/0x30
[   20.756704]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   20.756999]  kasan_bitops_generic+0x110/0x1c8
[   20.757094]  kunit_try_run_case+0x170/0x3f0
[   20.757146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.757230]  kthread+0x328/0x630
[   20.757275]  ret_from_fork+0x10/0x20
[   20.757369] 
[   20.757408] Allocated by task 261:
[   20.757468]  kasan_save_stack+0x3c/0x68
[   20.757513]  kasan_save_track+0x20/0x40
[   20.757588]  kasan_save_alloc_info+0x40/0x58
[   20.757634]  __kasan_kmalloc+0xd4/0xd8
[   20.757691]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.757745]  kasan_bitops_generic+0xa0/0x1c8
[   20.757900]  kunit_try_run_case+0x170/0x3f0
[   20.757944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.758092]  kthread+0x328/0x630
[   20.758209]  ret_from_fork+0x10/0x20
[   20.758258] 
[   20.758286] The buggy address belongs to the object at fff00000c4473c00
[   20.758286]  which belongs to the cache kmalloc-16 of size 16
[   20.758346] The buggy address is located 8 bytes inside of
[   20.758346]  allocated 9-byte region [fff00000c4473c00, fff00000c4473c09)
[   20.758409] 
[   20.758443] The buggy address belongs to the physical page:
[   20.758475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473
[   20.758527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.758576] page_type: f5(slab)
[   20.758629] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.758691] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.758740] page dumped because: kasan: bad access detected
[   20.758782] 
[   20.758805] Memory state around the buggy address:
[   20.758839]  fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.758891]  fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.758936] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.758987]                       ^
[   20.759016]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.759060]  fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.759110] ==================================================================
[   20.743230] ==================================================================
[   20.743325] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.743484] Write of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261
[   20.743572] 
[   20.743609] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.743914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.744078] Hardware name: linux,dummy-virt (DT)
[   20.744193] Call trace:
[   20.744234]  show_stack+0x20/0x38 (C)
[   20.744315]  dump_stack_lvl+0x8c/0xd0
[   20.744630]  print_report+0x118/0x608
[   20.744770]  kasan_report+0xdc/0x128
[   20.744864]  kasan_check_range+0x100/0x1a8
[   20.744916]  __kasan_check_write+0x20/0x30
[   20.745224]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.745563]  kasan_bitops_generic+0x110/0x1c8
[   20.745650]  kunit_try_run_case+0x170/0x3f0
[   20.745717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.745773]  kthread+0x328/0x630
[   20.745819]  ret_from_fork+0x10/0x20
[   20.745877] 
[   20.745901] Allocated by task 261:
[   20.745931]  kasan_save_stack+0x3c/0x68
[   20.745975]  kasan_save_track+0x20/0x40
[   20.746025]  kasan_save_alloc_info+0x40/0x58
[   20.746062]  __kasan_kmalloc+0xd4/0xd8
[   20.746100]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.746152]  kasan_bitops_generic+0xa0/0x1c8
[   20.746193]  kunit_try_run_case+0x170/0x3f0
[   20.746240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.746291]  kthread+0x328/0x630
[   20.746326]  ret_from_fork+0x10/0x20
[   20.746365] 
[   20.746395] The buggy address belongs to the object at fff00000c4473c00
[   20.746395]  which belongs to the cache kmalloc-16 of size 16
[   20.746466] The buggy address is located 8 bytes inside of
[   20.746466]  allocated 9-byte region [fff00000c4473c00, fff00000c4473c09)
[   20.746531] 
[   20.746554] The buggy address belongs to the physical page:
[   20.746589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473
[   20.746775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.747049] page_type: f5(slab)
[   20.747247] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.747373] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.747606] page dumped because: kasan: bad access detected
[   20.747687] 
[   20.747720] Memory state around the buggy address:
[   20.747793]  fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.747862]  fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.747907] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.747945]                       ^
[   20.748039]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.748203]  fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.748296] ==================================================================


[   17.105579] ==================================================================
[   17.106220] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.107558] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.108275] 
[   17.108581] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.108741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.108771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.108820] Call Trace:
[   17.108859]  <TASK>
[   17.108900]  dump_stack_lvl+0x73/0xb0
[   17.108967]  print_report+0xd1/0x650
[   17.109020]  ? __virt_addr_valid+0x1db/0x2d0
[   17.109072]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.109372]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.109425]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.109482]  kasan_report+0x141/0x180
[   17.109561]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.109621]  kasan_check_range+0x10c/0x1c0
[   17.109673]  __kasan_check_write+0x18/0x20
[   17.109716]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.109773]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.109831]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.109885]  ? kasan_bitops_generic+0x92/0x1c0
[   17.109949]  kasan_bitops_generic+0x116/0x1c0
[   17.110000]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.110102]  ? __pfx_read_tsc+0x10/0x10
[   17.110150]  ? ktime_get_ts64+0x86/0x230
[   17.110203]  kunit_try_run_case+0x1a5/0x480
[   17.110250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.110293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.110350]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.110410]  ? __kthread_parkme+0x82/0x180
[   17.110471]  ? preempt_count_sub+0x50/0x80
[   17.110526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.110566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.110608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.110654]  kthread+0x337/0x6f0
[   17.110695]  ? trace_preempt_on+0x20/0xc0
[   17.110737]  ? __pfx_kthread+0x10/0x10
[   17.110775]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.110815]  ? calculate_sigpending+0x7b/0xa0
[   17.110865]  ? __pfx_kthread+0x10/0x10
[   17.110906]  ret_from_fork+0x116/0x1d0
[   17.110943]  ? __pfx_kthread+0x10/0x10
[   17.110976]  ret_from_fork_asm+0x1a/0x30
[   17.112008]  </TASK>
[   17.112037] 
[   17.126705] Allocated by task 278:
[   17.126948]  kasan_save_stack+0x45/0x70
[   17.127186]  kasan_save_track+0x18/0x40
[   17.127382]  kasan_save_alloc_info+0x3b/0x50
[   17.127601]  __kasan_kmalloc+0xb7/0xc0
[   17.127782]  __kmalloc_cache_noprof+0x189/0x420
[   17.127977]  kasan_bitops_generic+0x92/0x1c0
[   17.128425]  kunit_try_run_case+0x1a5/0x480
[   17.128881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.129135]  kthread+0x337/0x6f0
[   17.129315]  ret_from_fork+0x116/0x1d0
[   17.129524]  ret_from_fork_asm+0x1a/0x30
[   17.129734] 
[   17.129863] The buggy address belongs to the object at ffff8881023809a0
[   17.129863]  which belongs to the cache kmalloc-16 of size 16
[   17.130251] The buggy address is located 8 bytes inside of
[   17.130251]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.130660] 
[   17.132361] The buggy address belongs to the physical page:
[   17.134198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.134878] flags: 0x200000000000000(node=0|zone=2)
[   17.135730] page_type: f5(slab)
[   17.136074] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.137671] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.138518] page dumped because: kasan: bad access detected
[   17.139089] 
[   17.139317] Memory state around the buggy address:
[   17.139980]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.141075]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.142228] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.142681]                                   ^
[   17.143517]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.144170]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.144677] ==================================================================
[   17.063618] ==================================================================
[   17.064488] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   17.065153] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.065870] 
[   17.066469] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.066872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.066908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.066962] Call Trace:
[   17.067011]  <TASK>
[   17.067052]  dump_stack_lvl+0x73/0xb0
[   17.067119]  print_report+0xd1/0x650
[   17.067150]  ? __virt_addr_valid+0x1db/0x2d0
[   17.067178]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   17.067217]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.067307]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   17.067365]  kasan_report+0x141/0x180
[   17.067404]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   17.067468]  kasan_check_range+0x10c/0x1c0
[   17.067514]  __kasan_check_write+0x18/0x20
[   17.067549]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   17.067614]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.067663]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.067775]  ? kasan_bitops_generic+0x92/0x1c0
[   17.067812]  kasan_bitops_generic+0x116/0x1c0
[   17.067841]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.067871]  ? __pfx_read_tsc+0x10/0x10
[   17.067898]  ? ktime_get_ts64+0x86/0x230
[   17.067930]  kunit_try_run_case+0x1a5/0x480
[   17.067955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.067978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.068008]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.068036]  ? __kthread_parkme+0x82/0x180
[   17.068060]  ? preempt_count_sub+0x50/0x80
[   17.068087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.068111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.068139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.068168]  kthread+0x337/0x6f0
[   17.068193]  ? trace_preempt_on+0x20/0xc0
[   17.068249]  ? __pfx_kthread+0x10/0x10
[   17.068274]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.068300]  ? calculate_sigpending+0x7b/0xa0
[   17.068331]  ? __pfx_kthread+0x10/0x10
[   17.068356]  ret_from_fork+0x116/0x1d0
[   17.068378]  ? __pfx_kthread+0x10/0x10
[   17.068402]  ret_from_fork_asm+0x1a/0x30
[   17.068439]  </TASK>
[   17.068468] 
[   17.085665] Allocated by task 278:
[   17.086345]  kasan_save_stack+0x45/0x70
[   17.086779]  kasan_save_track+0x18/0x40
[   17.087112]  kasan_save_alloc_info+0x3b/0x50
[   17.087980]  __kasan_kmalloc+0xb7/0xc0
[   17.088513]  __kmalloc_cache_noprof+0x189/0x420
[   17.088911]  kasan_bitops_generic+0x92/0x1c0
[   17.089605]  kunit_try_run_case+0x1a5/0x480
[   17.090419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.090668]  kthread+0x337/0x6f0
[   17.091007]  ret_from_fork+0x116/0x1d0
[   17.091697]  ret_from_fork_asm+0x1a/0x30
[   17.092179] 
[   17.092572] The buggy address belongs to the object at ffff8881023809a0
[   17.092572]  which belongs to the cache kmalloc-16 of size 16
[   17.093269] The buggy address is located 8 bytes inside of
[   17.093269]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.094321] 
[   17.094672] The buggy address belongs to the physical page:
[   17.095572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.096110] flags: 0x200000000000000(node=0|zone=2)
[   17.096801] page_type: f5(slab)
[   17.097058] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.098249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.098949] page dumped because: kasan: bad access detected
[   17.099402] 
[   17.099528] Memory state around the buggy address:
[   17.099932]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.100796]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.101341] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.101969]                                   ^
[   17.102757]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.103129]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.104048] ==================================================================
[   17.225597] ==================================================================
[   17.227149] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.228118] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.229414] 
[   17.229692] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.229826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.229854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.229900] Call Trace:
[   17.229945]  <TASK>
[   17.229987]  dump_stack_lvl+0x73/0xb0
[   17.230068]  print_report+0xd1/0x650
[   17.230119]  ? __virt_addr_valid+0x1db/0x2d0
[   17.230160]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.230191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.230646]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.230726]  kasan_report+0x141/0x180
[   17.230771]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.230829]  kasan_check_range+0x10c/0x1c0
[   17.230865]  __kasan_check_write+0x18/0x20
[   17.230887]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.230917]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.230946]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.230971]  ? kasan_bitops_generic+0x92/0x1c0
[   17.231002]  kasan_bitops_generic+0x116/0x1c0
[   17.231029]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.231056]  ? __pfx_read_tsc+0x10/0x10
[   17.231081]  ? ktime_get_ts64+0x86/0x230
[   17.231109]  kunit_try_run_case+0x1a5/0x480
[   17.231134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.231157]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.231185]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.231226]  ? __kthread_parkme+0x82/0x180
[   17.231251]  ? preempt_count_sub+0x50/0x80
[   17.231278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.231303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.231331]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.231377]  kthread+0x337/0x6f0
[   17.231401]  ? trace_preempt_on+0x20/0xc0
[   17.231428]  ? __pfx_kthread+0x10/0x10
[   17.231451]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.231493]  ? calculate_sigpending+0x7b/0xa0
[   17.231524]  ? __pfx_kthread+0x10/0x10
[   17.231548]  ret_from_fork+0x116/0x1d0
[   17.231570]  ? __pfx_kthread+0x10/0x10
[   17.231594]  ret_from_fork_asm+0x1a/0x30
[   17.231630]  </TASK>
[   17.231645] 
[   17.248434] Allocated by task 278:
[   17.248947]  kasan_save_stack+0x45/0x70
[   17.249478]  kasan_save_track+0x18/0x40
[   17.249957]  kasan_save_alloc_info+0x3b/0x50
[   17.250295]  __kasan_kmalloc+0xb7/0xc0
[   17.251271]  __kmalloc_cache_noprof+0x189/0x420
[   17.251963]  kasan_bitops_generic+0x92/0x1c0
[   17.252626]  kunit_try_run_case+0x1a5/0x480
[   17.253656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.254157]  kthread+0x337/0x6f0
[   17.254567]  ret_from_fork+0x116/0x1d0
[   17.255619]  ret_from_fork_asm+0x1a/0x30
[   17.256308] 
[   17.256620] The buggy address belongs to the object at ffff8881023809a0
[   17.256620]  which belongs to the cache kmalloc-16 of size 16
[   17.257557] The buggy address is located 8 bytes inside of
[   17.257557]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.258608] 
[   17.258892] The buggy address belongs to the physical page:
[   17.259287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.259596] flags: 0x200000000000000(node=0|zone=2)
[   17.259805] page_type: f5(slab)
[   17.259995] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.260191] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.260346] page dumped because: kasan: bad access detected
[   17.260494] 
[   17.260620] Memory state around the buggy address:
[   17.261053]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.261875]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.262559] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.263072]                                   ^
[   17.263301]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.263623]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.263893] ==================================================================
[   17.022296] ==================================================================
[   17.022711] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   17.024068] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.024916] 
[   17.025178] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.025296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.025572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.025630] Call Trace:
[   17.025676]  <TASK>
[   17.025748]  dump_stack_lvl+0x73/0xb0
[   17.025832]  print_report+0xd1/0x650
[   17.025865]  ? __virt_addr_valid+0x1db/0x2d0
[   17.025895]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   17.025927]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.025952]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   17.025983]  kasan_report+0x141/0x180
[   17.026008]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   17.026042]  kasan_check_range+0x10c/0x1c0
[   17.026070]  __kasan_check_write+0x18/0x20
[   17.026092]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   17.026121]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.026151]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.026177]  ? kasan_bitops_generic+0x92/0x1c0
[   17.026219]  kasan_bitops_generic+0x116/0x1c0
[   17.026260]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.026302]  ? __pfx_read_tsc+0x10/0x10
[   17.026341]  ? ktime_get_ts64+0x86/0x230
[   17.026405]  kunit_try_run_case+0x1a5/0x480
[   17.026435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.026478]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.026512]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.026541]  ? __kthread_parkme+0x82/0x180
[   17.026566]  ? preempt_count_sub+0x50/0x80
[   17.026595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.026619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.026649]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.026676]  kthread+0x337/0x6f0
[   17.026726]  ? trace_preempt_on+0x20/0xc0
[   17.026773]  ? __pfx_kthread+0x10/0x10
[   17.026807]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.026833]  ? calculate_sigpending+0x7b/0xa0
[   17.026862]  ? __pfx_kthread+0x10/0x10
[   17.026886]  ret_from_fork+0x116/0x1d0
[   17.026907]  ? __pfx_kthread+0x10/0x10
[   17.026930]  ret_from_fork_asm+0x1a/0x30
[   17.026967]  </TASK>
[   17.026981] 
[   17.043382] Allocated by task 278:
[   17.044543]  kasan_save_stack+0x45/0x70
[   17.045179]  kasan_save_track+0x18/0x40
[   17.045558]  kasan_save_alloc_info+0x3b/0x50
[   17.045961]  __kasan_kmalloc+0xb7/0xc0
[   17.046333]  __kmalloc_cache_noprof+0x189/0x420
[   17.046842]  kasan_bitops_generic+0x92/0x1c0
[   17.047414]  kunit_try_run_case+0x1a5/0x480
[   17.047735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.048531]  kthread+0x337/0x6f0
[   17.048926]  ret_from_fork+0x116/0x1d0
[   17.049851]  ret_from_fork_asm+0x1a/0x30
[   17.050061] 
[   17.050285] The buggy address belongs to the object at ffff8881023809a0
[   17.050285]  which belongs to the cache kmalloc-16 of size 16
[   17.051422] The buggy address is located 8 bytes inside of
[   17.051422]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.052662] 
[   17.052923] The buggy address belongs to the physical page:
[   17.053500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.054185] flags: 0x200000000000000(node=0|zone=2)
[   17.054576] page_type: f5(slab)
[   17.054884] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.055861] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.056883] page dumped because: kasan: bad access detected
[   17.057626] 
[   17.057997] Memory state around the buggy address:
[   17.058316]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.059147]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.059537] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.060193]                                   ^
[   17.060740]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.061635]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.062194] ==================================================================
[   16.980899] ==================================================================
[   16.982419] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.983107] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   16.983881] 
[   16.984063] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.984887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.984915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.984944] Call Trace:
[   16.984962]  <TASK>
[   16.984987]  dump_stack_lvl+0x73/0xb0
[   16.985035]  print_report+0xd1/0x650
[   16.985062]  ? __virt_addr_valid+0x1db/0x2d0
[   16.985089]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.985119]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.985144]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.985173]  kasan_report+0x141/0x180
[   16.985203]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.985289]  kasan_check_range+0x10c/0x1c0
[   16.985334]  __kasan_check_write+0x18/0x20
[   16.985372]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.985403]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.985432]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.985481]  ? kasan_bitops_generic+0x92/0x1c0
[   16.985539]  kasan_bitops_generic+0x116/0x1c0
[   16.985567]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.985596]  ? __pfx_read_tsc+0x10/0x10
[   16.985621]  ? ktime_get_ts64+0x86/0x230
[   16.985651]  kunit_try_run_case+0x1a5/0x480
[   16.985676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.986021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.986066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.986095]  ? __kthread_parkme+0x82/0x180
[   16.986120]  ? preempt_count_sub+0x50/0x80
[   16.986148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.986172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.986210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.986263]  kthread+0x337/0x6f0
[   16.986287]  ? trace_preempt_on+0x20/0xc0
[   16.986313]  ? __pfx_kthread+0x10/0x10
[   16.986336]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.986362]  ? calculate_sigpending+0x7b/0xa0
[   16.986389]  ? __pfx_kthread+0x10/0x10
[   16.986412]  ret_from_fork+0x116/0x1d0
[   16.986435]  ? __pfx_kthread+0x10/0x10
[   16.986477]  ret_from_fork_asm+0x1a/0x30
[   16.986515]  </TASK>
[   16.986528] 
[   17.001330] Allocated by task 278:
[   17.001736]  kasan_save_stack+0x45/0x70
[   17.002136]  kasan_save_track+0x18/0x40
[   17.003490]  kasan_save_alloc_info+0x3b/0x50
[   17.004122]  __kasan_kmalloc+0xb7/0xc0
[   17.004839]  __kmalloc_cache_noprof+0x189/0x420
[   17.005445]  kasan_bitops_generic+0x92/0x1c0
[   17.006017]  kunit_try_run_case+0x1a5/0x480
[   17.006619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.007144]  kthread+0x337/0x6f0
[   17.007452]  ret_from_fork+0x116/0x1d0
[   17.008501]  ret_from_fork_asm+0x1a/0x30
[   17.008946] 
[   17.009194] The buggy address belongs to the object at ffff8881023809a0
[   17.009194]  which belongs to the cache kmalloc-16 of size 16
[   17.009897] The buggy address is located 8 bytes inside of
[   17.009897]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.010865] 
[   17.011074] The buggy address belongs to the physical page:
[   17.011431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.011833] flags: 0x200000000000000(node=0|zone=2)
[   17.012104] page_type: f5(slab)
[   17.013298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.014097] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.014639] page dumped because: kasan: bad access detected
[   17.015251] 
[   17.015482] Memory state around the buggy address:
[   17.016424]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.017153]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.017735] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.018216]                                   ^
[   17.018584]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.019418]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.019925] ==================================================================
[   17.186370] ==================================================================
[   17.186949] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.187572] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.188405] 
[   17.188729] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.188864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.188896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.188950] Call Trace:
[   17.188997]  <TASK>
[   17.189043]  dump_stack_lvl+0x73/0xb0
[   17.189123]  print_report+0xd1/0x650
[   17.189178]  ? __virt_addr_valid+0x1db/0x2d0
[   17.189228]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.189268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.189295]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.189325]  kasan_report+0x141/0x180
[   17.189350]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.189383]  kasan_check_range+0x10c/0x1c0
[   17.189410]  __kasan_check_write+0x18/0x20
[   17.189432]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.189487]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.190275]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.190312]  ? kasan_bitops_generic+0x92/0x1c0
[   17.190345]  kasan_bitops_generic+0x116/0x1c0
[   17.190375]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.190402]  ? __pfx_read_tsc+0x10/0x10
[   17.190428]  ? ktime_get_ts64+0x86/0x230
[   17.190474]  kunit_try_run_case+0x1a5/0x480
[   17.190506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.190528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.190559]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.190587]  ? __kthread_parkme+0x82/0x180
[   17.190612]  ? preempt_count_sub+0x50/0x80
[   17.190643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.190667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.190702]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.190745]  kthread+0x337/0x6f0
[   17.190779]  ? trace_preempt_on+0x20/0xc0
[   17.190819]  ? __pfx_kthread+0x10/0x10
[   17.190868]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.190893]  ? calculate_sigpending+0x7b/0xa0
[   17.190921]  ? __pfx_kthread+0x10/0x10
[   17.190945]  ret_from_fork+0x116/0x1d0
[   17.190966]  ? __pfx_kthread+0x10/0x10
[   17.190990]  ret_from_fork_asm+0x1a/0x30
[   17.191025]  </TASK>
[   17.191039] 
[   17.208722] Allocated by task 278:
[   17.209158]  kasan_save_stack+0x45/0x70
[   17.209686]  kasan_save_track+0x18/0x40
[   17.210201]  kasan_save_alloc_info+0x3b/0x50
[   17.210864]  __kasan_kmalloc+0xb7/0xc0
[   17.211076]  __kmalloc_cache_noprof+0x189/0x420
[   17.211310]  kasan_bitops_generic+0x92/0x1c0
[   17.211729]  kunit_try_run_case+0x1a5/0x480
[   17.212053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.212850]  kthread+0x337/0x6f0
[   17.213179]  ret_from_fork+0x116/0x1d0
[   17.213532]  ret_from_fork_asm+0x1a/0x30
[   17.213746] 
[   17.213946] The buggy address belongs to the object at ffff8881023809a0
[   17.213946]  which belongs to the cache kmalloc-16 of size 16
[   17.215025] The buggy address is located 8 bytes inside of
[   17.215025]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.215679] 
[   17.215818] The buggy address belongs to the physical page:
[   17.216208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.216811] flags: 0x200000000000000(node=0|zone=2)
[   17.217105] page_type: f5(slab)
[   17.217410] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.219195] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.219597] page dumped because: kasan: bad access detected
[   17.219841] 
[   17.220020] Memory state around the buggy address:
[   17.220410]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.221464]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.222596] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.222963]                                   ^
[   17.223227]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.224212]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.224617] ==================================================================
[   17.145636] ==================================================================
[   17.146715] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.147240] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.147699] 
[   17.147909] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.148302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.148342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.148396] Call Trace:
[   17.148442]  <TASK>
[   17.148497]  dump_stack_lvl+0x73/0xb0
[   17.148570]  print_report+0xd1/0x650
[   17.148623]  ? __virt_addr_valid+0x1db/0x2d0
[   17.148673]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.148729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.148779]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.148829]  kasan_report+0x141/0x180
[   17.148877]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.148973]  kasan_check_range+0x10c/0x1c0
[   17.149032]  __kasan_check_write+0x18/0x20
[   17.149083]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.149146]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.149250]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.149297]  ? kasan_bitops_generic+0x92/0x1c0
[   17.149338]  kasan_bitops_generic+0x116/0x1c0
[   17.149370]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.149400]  ? __pfx_read_tsc+0x10/0x10
[   17.149426]  ? ktime_get_ts64+0x86/0x230
[   17.149482]  kunit_try_run_case+0x1a5/0x480
[   17.149513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.149537]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.149568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.149597]  ? __kthread_parkme+0x82/0x180
[   17.149621]  ? preempt_count_sub+0x50/0x80
[   17.149649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.149672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.149700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.149728]  kthread+0x337/0x6f0
[   17.149750]  ? trace_preempt_on+0x20/0xc0
[   17.149777]  ? __pfx_kthread+0x10/0x10
[   17.149800]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.149825]  ? calculate_sigpending+0x7b/0xa0
[   17.149856]  ? __pfx_kthread+0x10/0x10
[   17.149881]  ret_from_fork+0x116/0x1d0
[   17.149903]  ? __pfx_kthread+0x10/0x10
[   17.149926]  ret_from_fork_asm+0x1a/0x30
[   17.149962]  </TASK>
[   17.149976] 
[   17.165751] Allocated by task 278:
[   17.166119]  kasan_save_stack+0x45/0x70
[   17.166956]  kasan_save_track+0x18/0x40
[   17.167662]  kasan_save_alloc_info+0x3b/0x50
[   17.167908]  __kasan_kmalloc+0xb7/0xc0
[   17.168340]  __kmalloc_cache_noprof+0x189/0x420
[   17.169169]  kasan_bitops_generic+0x92/0x1c0
[   17.169982]  kunit_try_run_case+0x1a5/0x480
[   17.170177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.171330]  kthread+0x337/0x6f0
[   17.171602]  ret_from_fork+0x116/0x1d0
[   17.172391]  ret_from_fork_asm+0x1a/0x30
[   17.172666] 
[   17.173574] The buggy address belongs to the object at ffff8881023809a0
[   17.173574]  which belongs to the cache kmalloc-16 of size 16
[   17.174070] The buggy address is located 8 bytes inside of
[   17.174070]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.175258] 
[   17.176024] The buggy address belongs to the physical page:
[   17.176291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.178018] flags: 0x200000000000000(node=0|zone=2)
[   17.178269] page_type: f5(slab)
[   17.178541] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.179537] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.180102] page dumped because: kasan: bad access detected
[   17.180629] 
[   17.180914] Memory state around the buggy address:
[   17.181326]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.181961]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.182673] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.183091]                                   ^
[   17.183575]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.184316]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.185006] ==================================================================
[   16.940041] ==================================================================
[   16.940605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.941578] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   16.941782] 
[   16.941879] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.941943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.941959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.941987] Call Trace:
[   16.942003]  <TASK>
[   16.942029]  dump_stack_lvl+0x73/0xb0
[   16.942070]  print_report+0xd1/0x650
[   16.942098]  ? __virt_addr_valid+0x1db/0x2d0
[   16.942128]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.942158]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.942183]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.942418]  kasan_report+0x141/0x180
[   16.942448]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.942499]  kasan_check_range+0x10c/0x1c0
[   16.942528]  __kasan_check_write+0x18/0x20
[   16.942552]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.942582]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.942613]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.942639]  ? kasan_bitops_generic+0x92/0x1c0
[   16.942671]  kasan_bitops_generic+0x116/0x1c0
[   16.942769]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.942800]  ? __pfx_read_tsc+0x10/0x10
[   16.942828]  ? ktime_get_ts64+0x86/0x230
[   16.942857]  kunit_try_run_case+0x1a5/0x480
[   16.942885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.942906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.942936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.942963]  ? __kthread_parkme+0x82/0x180
[   16.942986]  ? preempt_count_sub+0x50/0x80
[   16.943013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.943036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.943065]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.943099]  kthread+0x337/0x6f0
[   16.943122]  ? trace_preempt_on+0x20/0xc0
[   16.943149]  ? __pfx_kthread+0x10/0x10
[   16.943171]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.943196]  ? calculate_sigpending+0x7b/0xa0
[   16.943244]  ? __pfx_kthread+0x10/0x10
[   16.943272]  ret_from_fork+0x116/0x1d0
[   16.943294]  ? __pfx_kthread+0x10/0x10
[   16.943317]  ret_from_fork_asm+0x1a/0x30
[   16.943387]  </TASK>
[   16.943403] 
[   16.961222] Allocated by task 278:
[   16.961972]  kasan_save_stack+0x45/0x70
[   16.962722]  kasan_save_track+0x18/0x40
[   16.962998]  kasan_save_alloc_info+0x3b/0x50
[   16.963186]  __kasan_kmalloc+0xb7/0xc0
[   16.963500]  __kmalloc_cache_noprof+0x189/0x420
[   16.963875]  kasan_bitops_generic+0x92/0x1c0
[   16.964081]  kunit_try_run_case+0x1a5/0x480
[   16.965535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.965874]  kthread+0x337/0x6f0
[   16.966288]  ret_from_fork+0x116/0x1d0
[   16.966450]  ret_from_fork_asm+0x1a/0x30
[   16.966679] 
[   16.967326] The buggy address belongs to the object at ffff8881023809a0
[   16.967326]  which belongs to the cache kmalloc-16 of size 16
[   16.969088] The buggy address is located 8 bytes inside of
[   16.969088]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   16.969651] 
[   16.969854] The buggy address belongs to the physical page:
[   16.971262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   16.971656] flags: 0x200000000000000(node=0|zone=2)
[   16.972290] page_type: f5(slab)
[   16.972570] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.972961] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.973795] page dumped because: kasan: bad access detected
[   16.974719] 
[   16.975099] Memory state around the buggy address:
[   16.975398]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.976109]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   16.976530] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.977092]                                   ^
[   16.977696]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.978241]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.978596] ==================================================================