Hay
Date
May 12, 2025, 11:48 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.089946] ==================================================================
[   19.090008] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.090753] Read of size 8 at addr fff00000c5f09c48 by task kunit_try_catch/261
[   19.090837] 
[   19.090960] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.091107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.091174] Hardware name: linux,dummy-virt (DT)
[   19.091256] Call trace:
[   19.091284]  show_stack+0x20/0x38 (C)
[   19.091634]  dump_stack_lvl+0x8c/0xd0
[   19.092323]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.094120]  kthread+0x328/0x630
[   19.094409]  ret_from_fork+0x10/0x20
[   19.094711] 
[   19.094768] The buggy address belongs to the object at fff00000c5f09c40
[   19.094768]  which belongs to the cache kmalloc-16 of size 16
[   19.095252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.095769] page dumped because: kasan: bad access detected
[   19.096185] >fff00000c5f09c00: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   19.096910] ==================================================================
[   19.065257] ==================================================================
[   19.065340] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.065403] Write of size 8 at addr fff00000c5f09c48 by task kunit_try_catch/261
[   19.066608] 
[   19.066834] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.066960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.067273] Hardware name: linux,dummy-virt (DT)
[   19.067520] Call trace:
[   19.067559]  show_stack+0x20/0x38 (C)
[   19.067711]  dump_stack_lvl+0x8c/0xd0
[   19.067790]  print_report+0x118/0x608
[   19.067839]  kasan_report+0xdc/0x128
[   19.067886]  kasan_check_range+0x100/0x1a8
[   19.067933]  __kasan_check_write+0x20/0x30
[   19.068552]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.068732]  kasan_bitops_generic+0x110/0x1c8
[   19.068959]  kunit_try_run_case+0x170/0x3f0
[   19.069109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.069173]  kthread+0x328/0x630
[   19.069374]  ret_from_fork+0x10/0x20
[   19.069555] 
[   19.069613] Allocated by task 261:
[   19.069652]  kasan_save_stack+0x3c/0x68
[   19.069723]  kasan_save_track+0x20/0x40
[   19.069942]  kasan_save_alloc_info+0x40/0x58
[   19.070116]  __kasan_kmalloc+0xd4/0xd8
[   19.070171]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.070214]  kasan_bitops_generic+0xa0/0x1c8
[   19.070261]  kunit_try_run_case+0x170/0x3f0
[   19.070305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.070501]  kthread+0x328/0x630
[   19.070661]  ret_from_fork+0x10/0x20
[   19.070715] 
[   19.070742] The buggy address belongs to the object at fff00000c5f09c40
[   19.070742]  which belongs to the cache kmalloc-16 of size 16
[   19.070804] The buggy address is located 8 bytes inside of
[   19.070804]  allocated 9-byte region [fff00000c5f09c40, fff00000c5f09c49)
[   19.070864] 
[   19.070887] The buggy address belongs to the physical page:
[   19.071080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f09
[   19.071285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.071655] page_type: f5(slab)
[   19.071745] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.071834] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.072184] page dumped because: kasan: bad access detected
[   19.072229] 
[   19.072255] Memory state around the buggy address:
[   19.072375]  fff00000c5f09b00: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   19.072580]  fff00000c5f09b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.072760] >fff00000c5f09c00: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   19.072868]                                               ^
[   19.072913]  fff00000c5f09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.072958]  fff00000c5f09d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.073185] ==================================================================
[   19.080965] ==================================================================
[   19.081029] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.081102] Write of size 8 at addr fff00000c5f09c48 by task kunit_try_catch/261
[   19.081441] 
[   19.081490] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.081609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.081645] Hardware name: linux,dummy-virt (DT)
[   19.081802] Call trace:
[   19.081838]  show_stack+0x20/0x38 (C)
[   19.082364]  dump_stack_lvl+0x8c/0xd0
[   19.082587]  print_report+0x118/0x608
[   19.082696]  kasan_report+0xdc/0x128
[   19.082777]  kasan_check_range+0x100/0x1a8
[   19.082842]  __kasan_check_write+0x20/0x30
[   19.082892]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.082945]  kasan_bitops_generic+0x110/0x1c8
[   19.082992]  kunit_try_run_case+0x170/0x3f0
[   19.083375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.083470]  kthread+0x328/0x630
[   19.083520]  ret_from_fork+0x10/0x20
[   19.083865] 
[   19.083946] Allocated by task 261:
[   19.083986]  kasan_save_stack+0x3c/0x68
[   19.084319]  kasan_save_track+0x20/0x40
[   19.084374]  kasan_save_alloc_info+0x40/0x58
[   19.084417]  __kasan_kmalloc+0xd4/0xd8
[   19.084455]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.084693]  kasan_bitops_generic+0xa0/0x1c8
[   19.085012]  kunit_try_run_case+0x170/0x3f0
[   19.085100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.085470]  kthread+0x328/0x630
[   19.085532]  ret_from_fork+0x10/0x20
[   19.085581] 
[   19.085608] The buggy address belongs to the object at fff00000c5f09c40
[   19.085608]  which belongs to the cache kmalloc-16 of size 16
[   19.085997] The buggy address is located 8 bytes inside of
[   19.085997]  allocated 9-byte region [fff00000c5f09c40, fff00000c5f09c49)
[   19.086264] 
[   19.086368] The buggy address belongs to the physical page:
[   19.086410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f09
[   19.086539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.086616] page_type: f5(slab)
[   19.086879] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.087110] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.087173] page dumped because: kasan: bad access detected
[   19.087332] 
[   19.087463] Memory state around the buggy address:
[   19.087554]  fff00000c5f09b00: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   19.087814]  fff00000c5f09b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.088035] >fff00000c5f09c00: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   19.088101]                                               ^
[   19.088370]  fff00000c5f09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.088460]  fff00000c5f09d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.088534] ==================================================================
[   19.075372] ==================================================================
[   19.075435] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.075496] Read of size 8 at addr fff00000c5f09c48 by task kunit_try_catch/261
[   19.075548] 
[   19.076053] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.076572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.076636] Hardware name: linux,dummy-virt (DT)
[   19.076674] Call trace:
[   19.076699]  show_stack+0x20/0x38 (C)
[   19.076759]  dump_stack_lvl+0x8c/0xd0
[   19.076809]  print_report+0x118/0x608
[   19.076894]  kasan_report+0xdc/0x128
[   19.076946]  __asan_report_load8_noabort+0x20/0x30
[   19.076997]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.077303]  kasan_bitops_generic+0x110/0x1c8
[   19.077437]  kunit_try_run_case+0x170/0x3f0
[   19.077493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.077743]  kthread+0x328/0x630
[   19.077838]  ret_from_fork+0x10/0x20
[   19.077891] 
[   19.077938] Allocated by task 261:
[   19.077974]  kasan_save_stack+0x3c/0x68
[   19.078022]  kasan_save_track+0x20/0x40
[   19.078074]  kasan_save_alloc_info+0x40/0x58
[   19.078405]  __kasan_kmalloc+0xd4/0xd8
[   19.078703]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.078758]  kasan_bitops_generic+0xa0/0x1c8
[   19.078827]  kunit_try_run_case+0x170/0x3f0
[   19.078866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.078909]  kthread+0x328/0x630
[   19.078946]  ret_from_fork+0x10/0x20
[   19.078981] 
[   19.079011] The buggy address belongs to the object at fff00000c5f09c40
[   19.079011]  which belongs to the cache kmalloc-16 of size 16
[   19.079085] The buggy address is located 8 bytes inside of
[   19.079085]  allocated 9-byte region [fff00000c5f09c40, fff00000c5f09c49)
[   19.079149] 
[   19.079173] The buggy address belongs to the physical page:
[   19.079205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f09
[   19.079259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.079313] page_type: f5(slab)
[   19.079356] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.079411] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.079451] page dumped because: kasan: bad access detected
[   19.079482] 
[   19.079518] Memory state around the buggy address:
[   19.079556]  fff00000c5f09b00: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   19.079610]  fff00000c5f09b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.079669] >fff00000c5f09c00: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   19.079709]                                               ^
[   19.079766]  fff00000c5f09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.079815]  fff00000c5f09d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.079855] ==================================================================

[   19.320612] ==================================================================
[   19.321021] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   19.321384] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.321639] 
[   19.321803] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.321892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.321914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.321959] Call Trace:
[   19.321980]  <TASK>
[   19.322014]  dump_stack_lvl+0x73/0xb0
[   19.322069]  print_report+0xd1/0x650
[   19.322114]  ? __virt_addr_valid+0x1db/0x2d0
[   19.322160]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   19.322210]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.322255]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   19.322324]  kasan_report+0x141/0x180
[   19.322369]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   19.322465]  kasan_check_range+0x10c/0x1c0
[   19.322521]  __kasan_check_write+0x18/0x20
[   19.322554]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   19.322594]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.322637]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.322672]  ? trace_hardirqs_on+0x37/0xe0
[   19.322709]  ? kasan_bitops_generic+0x92/0x1c0
[   19.322752]  kasan_bitops_generic+0x116/0x1c0
[   19.322792]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.322834]  ? __pfx_read_tsc+0x10/0x10
[   19.322868]  ? ktime_get_ts64+0x86/0x230
[   19.322915]  kunit_try_run_case+0x1a5/0x480
[   19.322961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.323040]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.323102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.323151]  ? __kthread_parkme+0x82/0x180
[   19.323198]  ? preempt_count_sub+0x50/0x80
[   19.323252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.323316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.323367]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.323419]  kthread+0x337/0x6f0
[   19.323464]  ? trace_preempt_on+0x20/0xc0
[   19.323513]  ? __pfx_kthread+0x10/0x10
[   19.323556]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.323839]  ? calculate_sigpending+0x7b/0xa0
[   19.323899]  ? __pfx_kthread+0x10/0x10
[   19.323941]  ret_from_fork+0x116/0x1d0
[   19.323981]  ? __pfx_kthread+0x10/0x10
[   19.324009]  ret_from_fork_asm+0x1a/0x30
[   19.324050]  </TASK>
[   19.324168] 
[   19.340817] Allocated by task 278:
[   19.341080]  kasan_save_stack+0x45/0x70
[   19.341539]  kasan_save_track+0x18/0x40
[   19.342205]  kasan_save_alloc_info+0x3b/0x50
[   19.342579]  __kasan_kmalloc+0xb7/0xc0
[   19.342934]  __kmalloc_cache_noprof+0x189/0x420
[   19.343412]  kasan_bitops_generic+0x92/0x1c0
[   19.343939]  kunit_try_run_case+0x1a5/0x480
[   19.344223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.345015]  kthread+0x337/0x6f0
[   19.345411]  ret_from_fork+0x116/0x1d0
[   19.345683]  ret_from_fork_asm+0x1a/0x30
[   19.346275] 
[   19.346508] The buggy address belongs to the object at ffff8881026fb960
[   19.346508]  which belongs to the cache kmalloc-16 of size 16
[   19.347152] The buggy address is located 8 bytes inside of
[   19.347152]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.348101] 
[   19.348736] The buggy address belongs to the physical page:
[   19.349172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.349586] flags: 0x200000000000000(node=0|zone=2)
[   19.349899] page_type: f5(slab)
[   19.350086] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.350678] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.351665] page dumped because: kasan: bad access detected
[   19.351916] 
[   19.352314] Memory state around the buggy address:
[   19.353038]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.353648]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.354621] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.355290]                                                           ^
[   19.355906]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.356419]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.357316] ==================================================================
[   19.134936] ==================================================================
[   19.135680] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   19.136611] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.137657] 
[   19.137999] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.138096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.138118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.138155] Call Trace:
[   19.138180]  <TASK>
[   19.138214]  dump_stack_lvl+0x73/0xb0
[   19.138290]  print_report+0xd1/0x650
[   19.138332]  ? __virt_addr_valid+0x1db/0x2d0
[   19.138372]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   19.138416]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.138454]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   19.138482]  kasan_report+0x141/0x180
[   19.138506]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   19.138537]  kasan_check_range+0x10c/0x1c0
[   19.138562]  __kasan_check_write+0x18/0x20
[   19.138583]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   19.138610]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.138639]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.138667]  ? trace_hardirqs_on+0x37/0xe0
[   19.139000]  ? kasan_bitops_generic+0x92/0x1c0
[   19.139085]  kasan_bitops_generic+0x116/0x1c0
[   19.139175]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.139222]  ? __pfx_read_tsc+0x10/0x10
[   19.139272]  ? ktime_get_ts64+0x86/0x230
[   19.139317]  kunit_try_run_case+0x1a5/0x480
[   19.139360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.139387]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.139412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.139437]  ? __kthread_parkme+0x82/0x180
[   19.139460]  ? preempt_count_sub+0x50/0x80
[   19.139485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.139510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.139535]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.139560]  kthread+0x337/0x6f0
[   19.139581]  ? trace_preempt_on+0x20/0xc0
[   19.139606]  ? __pfx_kthread+0x10/0x10
[   19.139628]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.139649]  ? calculate_sigpending+0x7b/0xa0
[   19.139687]  ? __pfx_kthread+0x10/0x10
[   19.139733]  ret_from_fork+0x116/0x1d0
[   19.139754]  ? __pfx_kthread+0x10/0x10
[   19.139776]  ret_from_fork_asm+0x1a/0x30
[   19.139808]  </TASK>
[   19.139821] 
[   19.157015] Allocated by task 278:
[   19.157845]  kasan_save_stack+0x45/0x70
[   19.158150]  kasan_save_track+0x18/0x40
[   19.158539]  kasan_save_alloc_info+0x3b/0x50
[   19.159070]  __kasan_kmalloc+0xb7/0xc0
[   19.159483]  __kmalloc_cache_noprof+0x189/0x420
[   19.159877]  kasan_bitops_generic+0x92/0x1c0
[   19.160176]  kunit_try_run_case+0x1a5/0x480
[   19.160800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.161375]  kthread+0x337/0x6f0
[   19.161591]  ret_from_fork+0x116/0x1d0
[   19.161954]  ret_from_fork_asm+0x1a/0x30
[   19.163045] 
[   19.163322] The buggy address belongs to the object at ffff8881026fb960
[   19.163322]  which belongs to the cache kmalloc-16 of size 16
[   19.163952] The buggy address is located 8 bytes inside of
[   19.163952]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.165452] 
[   19.165611] The buggy address belongs to the physical page:
[   19.166067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.167194] flags: 0x200000000000000(node=0|zone=2)
[   19.167618] page_type: f5(slab)
[   19.167965] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.168734] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.169328] page dumped because: kasan: bad access detected
[   19.169602] 
[   19.169813] Memory state around the buggy address:
[   19.170324]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.170725]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.171807] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.172410]                                                           ^
[   19.172889]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.173451]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.173862] ==================================================================
[   19.244216] ==================================================================
[   19.244897] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   19.246272] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.246982] 
[   19.247371] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.247485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.247513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.247589] Call Trace:
[   19.247644]  <TASK>
[   19.247686]  dump_stack_lvl+0x73/0xb0
[   19.247771]  print_report+0xd1/0x650
[   19.247819]  ? __virt_addr_valid+0x1db/0x2d0
[   19.247874]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   19.247939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.247990]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   19.248049]  kasan_report+0x141/0x180
[   19.248113]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   19.248178]  kasan_check_range+0x10c/0x1c0
[   19.248230]  __kasan_check_write+0x18/0x20
[   19.248414]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   19.248491]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.248559]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.248602]  ? trace_hardirqs_on+0x37/0xe0
[   19.248654]  ? kasan_bitops_generic+0x92/0x1c0
[   19.248734]  kasan_bitops_generic+0x116/0x1c0
[   19.248787]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.248840]  ? __pfx_read_tsc+0x10/0x10
[   19.248887]  ? ktime_get_ts64+0x86/0x230
[   19.248926]  kunit_try_run_case+0x1a5/0x480
[   19.248954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.248978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.249003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.249026]  ? __kthread_parkme+0x82/0x180
[   19.249057]  ? preempt_count_sub+0x50/0x80
[   19.249367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.249413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.249442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.249467]  kthread+0x337/0x6f0
[   19.249490]  ? trace_preempt_on+0x20/0xc0
[   19.249515]  ? __pfx_kthread+0x10/0x10
[   19.249537]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.249559]  ? calculate_sigpending+0x7b/0xa0
[   19.249584]  ? __pfx_kthread+0x10/0x10
[   19.249606]  ret_from_fork+0x116/0x1d0
[   19.249626]  ? __pfx_kthread+0x10/0x10
[   19.249646]  ret_from_fork_asm+0x1a/0x30
[   19.249723]  </TASK>
[   19.249738] 
[   19.263827] Allocated by task 278:
[   19.264391]  kasan_save_stack+0x45/0x70
[   19.264661]  kasan_save_track+0x18/0x40
[   19.265688]  kasan_save_alloc_info+0x3b/0x50
[   19.265935]  __kasan_kmalloc+0xb7/0xc0
[   19.266401]  __kmalloc_cache_noprof+0x189/0x420
[   19.266868]  kasan_bitops_generic+0x92/0x1c0
[   19.267145]  kunit_try_run_case+0x1a5/0x480
[   19.267395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.267712]  kthread+0x337/0x6f0
[   19.268160]  ret_from_fork+0x116/0x1d0
[   19.268529]  ret_from_fork_asm+0x1a/0x30
[   19.268963] 
[   19.269569] The buggy address belongs to the object at ffff8881026fb960
[   19.269569]  which belongs to the cache kmalloc-16 of size 16
[   19.270983] The buggy address is located 8 bytes inside of
[   19.270983]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.271688] 
[   19.271818] The buggy address belongs to the physical page:
[   19.272038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.272807] flags: 0x200000000000000(node=0|zone=2)
[   19.273556] page_type: f5(slab)
[   19.274303] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.275002] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.275577] page dumped because: kasan: bad access detected
[   19.275999] 
[   19.276328] Memory state around the buggy address:
[   19.276758]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.277525]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.277970] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.278245]                                                           ^
[   19.279415]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.279978]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.281064] ==================================================================
[   19.175029] ==================================================================
[   19.175944] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   19.176614] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.176912] 
[   19.177145] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.177501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.177533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.177578] Call Trace:
[   19.177619]  <TASK>
[   19.177658]  dump_stack_lvl+0x73/0xb0
[   19.177721]  print_report+0xd1/0x650
[   19.177765]  ? __virt_addr_valid+0x1db/0x2d0
[   19.177833]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   19.177882]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.177929]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   19.177976]  kasan_report+0x141/0x180
[   19.178018]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   19.178184]  kasan_check_range+0x10c/0x1c0
[   19.178239]  __kasan_check_write+0x18/0x20
[   19.178292]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   19.178342]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.178391]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.178430]  ? trace_hardirqs_on+0x37/0xe0
[   19.178470]  ? kasan_bitops_generic+0x92/0x1c0
[   19.178520]  kasan_bitops_generic+0x116/0x1c0
[   19.178557]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.178597]  ? __pfx_read_tsc+0x10/0x10
[   19.178637]  ? ktime_get_ts64+0x86/0x230
[   19.178679]  kunit_try_run_case+0x1a5/0x480
[   19.178751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.178799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.178835]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.178860]  ? __kthread_parkme+0x82/0x180
[   19.178884]  ? preempt_count_sub+0x50/0x80
[   19.178909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.178935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.178960]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.178985]  kthread+0x337/0x6f0
[   19.179020]  ? trace_preempt_on+0x20/0xc0
[   19.179053]  ? __pfx_kthread+0x10/0x10
[   19.179359]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.179393]  ? calculate_sigpending+0x7b/0xa0
[   19.179421]  ? __pfx_kthread+0x10/0x10
[   19.179444]  ret_from_fork+0x116/0x1d0
[   19.179468]  ? __pfx_kthread+0x10/0x10
[   19.179490]  ret_from_fork_asm+0x1a/0x30
[   19.179522]  </TASK>
[   19.179536] 
[   19.194950] Allocated by task 278:
[   19.195813]  kasan_save_stack+0x45/0x70
[   19.196342]  kasan_save_track+0x18/0x40
[   19.196731]  kasan_save_alloc_info+0x3b/0x50
[   19.197029]  __kasan_kmalloc+0xb7/0xc0
[   19.197624]  __kmalloc_cache_noprof+0x189/0x420
[   19.198029]  kasan_bitops_generic+0x92/0x1c0
[   19.198611]  kunit_try_run_case+0x1a5/0x480
[   19.199021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.199880]  kthread+0x337/0x6f0
[   19.200131]  ret_from_fork+0x116/0x1d0
[   19.200480]  ret_from_fork_asm+0x1a/0x30
[   19.200873] 
[   19.201269] The buggy address belongs to the object at ffff8881026fb960
[   19.201269]  which belongs to the cache kmalloc-16 of size 16
[   19.201997] The buggy address is located 8 bytes inside of
[   19.201997]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.202939] 
[   19.203515] The buggy address belongs to the physical page:
[   19.203905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.204353] flags: 0x200000000000000(node=0|zone=2)
[   19.204923] page_type: f5(slab)
[   19.205430] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.206269] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.206833] page dumped because: kasan: bad access detected
[   19.207156] 
[   19.207279] Memory state around the buggy address:
[   19.207670]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.208552]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.209341] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.209862]                                                           ^
[   19.210379]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.211170]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.211663] ==================================================================
[   19.282132] ==================================================================
[   19.282629] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   19.283351] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.284490] 
[   19.284682] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.284792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.284820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.284865] Call Trace:
[   19.284902]  <TASK>
[   19.284956]  dump_stack_lvl+0x73/0xb0
[   19.285382]  print_report+0xd1/0x650
[   19.285435]  ? __virt_addr_valid+0x1db/0x2d0
[   19.285478]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   19.285530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.285574]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   19.285652]  kasan_report+0x141/0x180
[   19.285714]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   19.285776]  kasan_check_range+0x10c/0x1c0
[   19.285844]  __kasan_check_write+0x18/0x20
[   19.285885]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   19.285930]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.285982]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.286026]  ? trace_hardirqs_on+0x37/0xe0
[   19.286069]  ? kasan_bitops_generic+0x92/0x1c0
[   19.286124]  kasan_bitops_generic+0x116/0x1c0
[   19.286168]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.286349]  ? __pfx_read_tsc+0x10/0x10
[   19.286375]  ? ktime_get_ts64+0x86/0x230
[   19.286402]  kunit_try_run_case+0x1a5/0x480
[   19.286430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.286454]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.286479]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.286503]  ? __kthread_parkme+0x82/0x180
[   19.286525]  ? preempt_count_sub+0x50/0x80
[   19.286550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.286575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.286599]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.286624]  kthread+0x337/0x6f0
[   19.286644]  ? trace_preempt_on+0x20/0xc0
[   19.286695]  ? __pfx_kthread+0x10/0x10
[   19.286722]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.286745]  ? calculate_sigpending+0x7b/0xa0
[   19.286771]  ? __pfx_kthread+0x10/0x10
[   19.286794]  ret_from_fork+0x116/0x1d0
[   19.286814]  ? __pfx_kthread+0x10/0x10
[   19.286836]  ret_from_fork_asm+0x1a/0x30
[   19.286869]  </TASK>
[   19.286882] 
[   19.302040] Allocated by task 278:
[   19.302418]  kasan_save_stack+0x45/0x70
[   19.302897]  kasan_save_track+0x18/0x40
[   19.303442]  kasan_save_alloc_info+0x3b/0x50
[   19.303992]  __kasan_kmalloc+0xb7/0xc0
[   19.304402]  __kmalloc_cache_noprof+0x189/0x420
[   19.304988]  kasan_bitops_generic+0x92/0x1c0
[   19.305720]  kunit_try_run_case+0x1a5/0x480
[   19.306323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.306920]  kthread+0x337/0x6f0
[   19.307435]  ret_from_fork+0x116/0x1d0
[   19.307715]  ret_from_fork_asm+0x1a/0x30
[   19.308095] 
[   19.308431] The buggy address belongs to the object at ffff8881026fb960
[   19.308431]  which belongs to the cache kmalloc-16 of size 16
[   19.309213] The buggy address is located 8 bytes inside of
[   19.309213]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.310150] 
[   19.310786] The buggy address belongs to the physical page:
[   19.311461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.312093] flags: 0x200000000000000(node=0|zone=2)
[   19.312459] page_type: f5(slab)
[   19.312832] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.313831] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.314105] page dumped because: kasan: bad access detected
[   19.314688] 
[   19.314880] Memory state around the buggy address:
[   19.315241]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.315568]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.316001] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.316459]                                                           ^
[   19.317139]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.318019]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.318778] ==================================================================
[   19.358549] ==================================================================
[   19.359079] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   19.359763] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.360362] 
[   19.361203] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.361515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.361545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.361572] Call Trace:
[   19.361595]  <TASK>
[   19.361620]  dump_stack_lvl+0x73/0xb0
[   19.361675]  print_report+0xd1/0x650
[   19.361734]  ? __virt_addr_valid+0x1db/0x2d0
[   19.361778]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   19.361826]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.361908]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   19.361998]  kasan_report+0x141/0x180
[   19.362168]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   19.362240]  kasan_check_range+0x10c/0x1c0
[   19.362302]  __kasan_check_write+0x18/0x20
[   19.362329]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   19.362357]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.362386]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.362409]  ? trace_hardirqs_on+0x37/0xe0
[   19.362435]  ? kasan_bitops_generic+0x92/0x1c0
[   19.362464]  kasan_bitops_generic+0x116/0x1c0
[   19.362489]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.362516]  ? __pfx_read_tsc+0x10/0x10
[   19.362539]  ? ktime_get_ts64+0x86/0x230
[   19.362564]  kunit_try_run_case+0x1a5/0x480
[   19.362590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.362614]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.362638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.362667]  ? __kthread_parkme+0x82/0x180
[   19.362713]  ? preempt_count_sub+0x50/0x80
[   19.362739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.362764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.362789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.362813]  kthread+0x337/0x6f0
[   19.362835]  ? trace_preempt_on+0x20/0xc0
[   19.362858]  ? __pfx_kthread+0x10/0x10
[   19.362881]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.362903]  ? calculate_sigpending+0x7b/0xa0
[   19.362929]  ? __pfx_kthread+0x10/0x10
[   19.362952]  ret_from_fork+0x116/0x1d0
[   19.362972]  ? __pfx_kthread+0x10/0x10
[   19.363004]  ret_from_fork_asm+0x1a/0x30
[   19.363050]  </TASK>
[   19.363071] 
[   19.380220] Allocated by task 278:
[   19.380617]  kasan_save_stack+0x45/0x70
[   19.380907]  kasan_save_track+0x18/0x40
[   19.381165]  kasan_save_alloc_info+0x3b/0x50
[   19.381484]  __kasan_kmalloc+0xb7/0xc0
[   19.381730]  __kmalloc_cache_noprof+0x189/0x420
[   19.381979]  kasan_bitops_generic+0x92/0x1c0
[   19.382244]  kunit_try_run_case+0x1a5/0x480
[   19.383238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.383576]  kthread+0x337/0x6f0
[   19.383882]  ret_from_fork+0x116/0x1d0
[   19.384071]  ret_from_fork_asm+0x1a/0x30
[   19.384280] 
[   19.384401] The buggy address belongs to the object at ffff8881026fb960
[   19.384401]  which belongs to the cache kmalloc-16 of size 16
[   19.385247] The buggy address is located 8 bytes inside of
[   19.385247]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.386186] 
[   19.386387] The buggy address belongs to the physical page:
[   19.386827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.388313] flags: 0x200000000000000(node=0|zone=2)
[   19.389069] page_type: f5(slab)
[   19.389316] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.389867] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.390600] page dumped because: kasan: bad access detected
[   19.391084] 
[   19.391798] Memory state around the buggy address:
[   19.392022]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.392494]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.393415] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.393743]                                                           ^
[   19.394443]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.395350]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.395816] ==================================================================
[   19.098851] ==================================================================
[   19.100099] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   19.100586] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.101353] 
[   19.101971] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.102105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.102134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.102165] Call Trace:
[   19.102184]  <TASK>
[   19.102208]  dump_stack_lvl+0x73/0xb0
[   19.102251]  print_report+0xd1/0x650
[   19.102303]  ? __virt_addr_valid+0x1db/0x2d0
[   19.102328]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   19.102357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.102381]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   19.102409]  kasan_report+0x141/0x180
[   19.102433]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   19.102465]  kasan_check_range+0x10c/0x1c0
[   19.102491]  __kasan_check_write+0x18/0x20
[   19.102512]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   19.102540]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.102569]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.102592]  ? trace_hardirqs_on+0x37/0xe0
[   19.102617]  ? kasan_bitops_generic+0x92/0x1c0
[   19.102646]  kasan_bitops_generic+0x116/0x1c0
[   19.102685]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.102727]  ? __pfx_read_tsc+0x10/0x10
[   19.102770]  ? ktime_get_ts64+0x86/0x230
[   19.102814]  kunit_try_run_case+0x1a5/0x480
[   19.102854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.102888]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.102924]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.102978]  ? __kthread_parkme+0x82/0x180
[   19.103017]  ? preempt_count_sub+0x50/0x80
[   19.103053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.103111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.103151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.103186]  kthread+0x337/0x6f0
[   19.103219]  ? trace_preempt_on+0x20/0xc0
[   19.103267]  ? __pfx_kthread+0x10/0x10
[   19.103304]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.103336]  ? calculate_sigpending+0x7b/0xa0
[   19.103377]  ? __pfx_kthread+0x10/0x10
[   19.103410]  ret_from_fork+0x116/0x1d0
[   19.103431]  ? __pfx_kthread+0x10/0x10
[   19.103453]  ret_from_fork_asm+0x1a/0x30
[   19.103486]  </TASK>
[   19.103500] 
[   19.116693] Allocated by task 278:
[   19.117408]  kasan_save_stack+0x45/0x70
[   19.117803]  kasan_save_track+0x18/0x40
[   19.118130]  kasan_save_alloc_info+0x3b/0x50
[   19.118342]  __kasan_kmalloc+0xb7/0xc0
[   19.119383]  __kmalloc_cache_noprof+0x189/0x420
[   19.119614]  kasan_bitops_generic+0x92/0x1c0
[   19.120277]  kunit_try_run_case+0x1a5/0x480
[   19.120522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.120915]  kthread+0x337/0x6f0
[   19.121439]  ret_from_fork+0x116/0x1d0
[   19.121875]  ret_from_fork_asm+0x1a/0x30
[   19.122762] 
[   19.122879] The buggy address belongs to the object at ffff8881026fb960
[   19.122879]  which belongs to the cache kmalloc-16 of size 16
[   19.123642] The buggy address is located 8 bytes inside of
[   19.123642]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.124484] 
[   19.125208] The buggy address belongs to the physical page:
[   19.126027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.126368] flags: 0x200000000000000(node=0|zone=2)
[   19.127004] page_type: f5(slab)
[   19.127908] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.128329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.129250] page dumped because: kasan: bad access detected
[   19.129585] 
[   19.129745] Memory state around the buggy address:
[   19.130132]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.130606]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.131698] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.132182]                                                           ^
[   19.132909]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.133673]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.134031] ==================================================================
[   19.212824] ==================================================================
[   19.213230] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   19.214486] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278
[   19.215199] 
[   19.215467] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.215575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.215604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.215650] Call Trace:
[   19.215724]  <TASK>
[   19.215765]  dump_stack_lvl+0x73/0xb0
[   19.215824]  print_report+0xd1/0x650
[   19.215865]  ? __virt_addr_valid+0x1db/0x2d0
[   19.215910]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   19.215963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.216013]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   19.216099]  kasan_report+0x141/0x180
[   19.216148]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   19.216203]  kasan_check_range+0x10c/0x1c0
[   19.216242]  __kasan_check_write+0x18/0x20
[   19.216289]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   19.216333]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.216375]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.216408]  ? trace_hardirqs_on+0x37/0xe0
[   19.216446]  ? kasan_bitops_generic+0x92/0x1c0
[   19.216491]  kasan_bitops_generic+0x116/0x1c0
[   19.216529]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.216570]  ? __pfx_read_tsc+0x10/0x10
[   19.216598]  ? ktime_get_ts64+0x86/0x230
[   19.216623]  kunit_try_run_case+0x1a5/0x480
[   19.216650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.216720]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.216748]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.216772]  ? __kthread_parkme+0x82/0x180
[   19.216794]  ? preempt_count_sub+0x50/0x80
[   19.216819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.216843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.216867]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.216891]  kthread+0x337/0x6f0
[   19.216912]  ? trace_preempt_on+0x20/0xc0
[   19.216935]  ? __pfx_kthread+0x10/0x10
[   19.216958]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.216979]  ? calculate_sigpending+0x7b/0xa0
[   19.217005]  ? __pfx_kthread+0x10/0x10
[   19.217027]  ret_from_fork+0x116/0x1d0
[   19.217055]  ? __pfx_kthread+0x10/0x10
[   19.217112]  ret_from_fork_asm+0x1a/0x30
[   19.217162]  </TASK>
[   19.217180] 
[   19.227697] Allocated by task 278:
[   19.227892]  kasan_save_stack+0x45/0x70
[   19.228102]  kasan_save_track+0x18/0x40
[   19.228966]  kasan_save_alloc_info+0x3b/0x50
[   19.229619]  __kasan_kmalloc+0xb7/0xc0
[   19.229975]  __kmalloc_cache_noprof+0x189/0x420
[   19.230581]  kasan_bitops_generic+0x92/0x1c0
[   19.231197]  kunit_try_run_case+0x1a5/0x480
[   19.231584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.232590]  kthread+0x337/0x6f0
[   19.232818]  ret_from_fork+0x116/0x1d0
[   19.233336]  ret_from_fork_asm+0x1a/0x30
[   19.233602] 
[   19.233826] The buggy address belongs to the object at ffff8881026fb960
[   19.233826]  which belongs to the cache kmalloc-16 of size 16
[   19.234644] The buggy address is located 8 bytes inside of
[   19.234644]  allocated 9-byte region [ffff8881026fb960, ffff8881026fb969)
[   19.235522] 
[   19.235662] The buggy address belongs to the physical page:
[   19.236011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb
[   19.236361] flags: 0x200000000000000(node=0|zone=2)
[   19.237176] page_type: f5(slab)
[   19.237537] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.238131] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.238628] page dumped because: kasan: bad access detected
[   19.238941] 
[   19.239239] Memory state around the buggy address:
[   19.239642]  ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc
[   19.239973]  ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   19.240246] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.240521]                                                           ^
[   19.240769]  ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.241289]  ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.242107] ==================================================================