Hay
Date
May 26, 2025, 9:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   20.445874] ==================================================================
[   20.447492] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   20.447746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.448162]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   20.448411]  kthread+0x328/0x630
[   20.448532] 
[   20.448725]  __kasan_kmalloc+0xd4/0xd8
[   20.448764]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.449123] The buggy address is located 8 bytes inside of
[   20.449123]  allocated 9-byte region [fff00000c3eeb5e0, fff00000c3eeb5e9)
[   20.450412] page dumped because: kasan: bad access detected
[   20.450978]  fff00000c3eeb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.451123] ==================================================================


[   13.233239] ==================================================================
[   13.233571] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.234126] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.234467] 
[   13.234646] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.234692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.234728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.234773] Call Trace:
[   13.234816]  <TASK>
[   13.234831]  dump_stack_lvl+0x73/0xb0
[   13.234857]  print_report+0xd1/0x650
[   13.234880]  ? __virt_addr_valid+0x1db/0x2d0
[   13.234902]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.234929]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.234952]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.234979]  kasan_report+0x141/0x180
[   13.235002]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.235034]  kasan_check_range+0x10c/0x1c0
[   13.235058]  __kasan_check_write+0x18/0x20
[   13.235078]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.235106]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.235134]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.235154]  ? trace_hardirqs_on+0x37/0xe0
[   13.235175]  ? kasan_bitops_generic+0x92/0x1c0
[   13.235199]  kasan_bitops_generic+0x121/0x1c0
[   13.235219]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.235244]  ? __pfx_read_tsc+0x10/0x10
[   13.235265]  ? ktime_get_ts64+0x86/0x230
[   13.235289]  kunit_try_run_case+0x1a5/0x480
[   13.235310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.235330]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.235354]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.235392]  ? __kthread_parkme+0x82/0x180
[   13.235412]  ? preempt_count_sub+0x50/0x80
[   13.235435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.235456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.235481]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.235505]  kthread+0x337/0x6f0
[   13.235524]  ? trace_preempt_on+0x20/0xc0
[   13.235546]  ? __pfx_kthread+0x10/0x10
[   13.235567]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.235590]  ? calculate_sigpending+0x7b/0xa0
[   13.235614]  ? __pfx_kthread+0x10/0x10
[   13.235635]  ret_from_fork+0x116/0x1d0
[   13.235654]  ? __pfx_kthread+0x10/0x10
[   13.235674]  ret_from_fork_asm+0x1a/0x30
[   13.235704]  </TASK>
[   13.235715] 
[   13.246136] Allocated by task 279:
[   13.246370]  kasan_save_stack+0x45/0x70
[   13.246705]  kasan_save_track+0x18/0x40
[   13.246951]  kasan_save_alloc_info+0x3b/0x50
[   13.247244]  __kasan_kmalloc+0xb7/0xc0
[   13.247427]  __kmalloc_cache_noprof+0x189/0x420
[   13.247584]  kasan_bitops_generic+0x92/0x1c0
[   13.247925]  kunit_try_run_case+0x1a5/0x480
[   13.248240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.248566]  kthread+0x337/0x6f0
[   13.248760]  ret_from_fork+0x116/0x1d0
[   13.248907]  ret_from_fork_asm+0x1a/0x30
[   13.249347] 
[   13.249478] The buggy address belongs to the object at ffff888101892d40
[   13.249478]  which belongs to the cache kmalloc-16 of size 16
[   13.250151] The buggy address is located 8 bytes inside of
[   13.250151]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.250748] 
[   13.250851] The buggy address belongs to the physical page:
[   13.251206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.251586] flags: 0x200000000000000(node=0|zone=2)
[   13.251903] page_type: f5(slab)
[   13.252201] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.252589] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.253015] page dumped because: kasan: bad access detected
[   13.253192] 
[   13.253291] Memory state around the buggy address:
[   13.253534]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.253929]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.254264] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.254729]                                               ^
[   13.254917]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.255488]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.256147] ==================================================================
[   13.344323] ==================================================================
[   13.344688] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.345143] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.345409] 
[   13.345514] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.345557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.345569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.345590] Call Trace:
[   13.345607]  <TASK>
[   13.345623]  dump_stack_lvl+0x73/0xb0
[   13.345650]  print_report+0xd1/0x650
[   13.345674]  ? __virt_addr_valid+0x1db/0x2d0
[   13.345695]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.345723]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.345754]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.345781]  kasan_report+0x141/0x180
[   13.345804]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.345836]  kasan_check_range+0x10c/0x1c0
[   13.345860]  __kasan_check_write+0x18/0x20
[   13.345880]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.345907]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.345936]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.345956]  ? trace_hardirqs_on+0x37/0xe0
[   13.345980]  ? kasan_bitops_generic+0x92/0x1c0
[   13.346004]  kasan_bitops_generic+0x121/0x1c0
[   13.346031]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.346057]  ? __pfx_read_tsc+0x10/0x10
[   13.346078]  ? ktime_get_ts64+0x86/0x230
[   13.346103]  kunit_try_run_case+0x1a5/0x480
[   13.346124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.346144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.346170]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.346195]  ? __kthread_parkme+0x82/0x180
[   13.346215]  ? preempt_count_sub+0x50/0x80
[   13.346239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.346259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.346284]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.346308]  kthread+0x337/0x6f0
[   13.346327]  ? trace_preempt_on+0x20/0xc0
[   13.346349]  ? __pfx_kthread+0x10/0x10
[   13.346371]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.346403]  ? calculate_sigpending+0x7b/0xa0
[   13.346428]  ? __pfx_kthread+0x10/0x10
[   13.346449]  ret_from_fork+0x116/0x1d0
[   13.346467]  ? __pfx_kthread+0x10/0x10
[   13.346488]  ret_from_fork_asm+0x1a/0x30
[   13.346518]  </TASK>
[   13.346528] 
[   13.355729] Allocated by task 279:
[   13.355987]  kasan_save_stack+0x45/0x70
[   13.356155]  kasan_save_track+0x18/0x40
[   13.356292]  kasan_save_alloc_info+0x3b/0x50
[   13.356482]  __kasan_kmalloc+0xb7/0xc0
[   13.356675]  __kmalloc_cache_noprof+0x189/0x420
[   13.356902]  kasan_bitops_generic+0x92/0x1c0
[   13.357205]  kunit_try_run_case+0x1a5/0x480
[   13.357462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.357686]  kthread+0x337/0x6f0
[   13.357849]  ret_from_fork+0x116/0x1d0
[   13.358197]  ret_from_fork_asm+0x1a/0x30
[   13.358387] 
[   13.358463] The buggy address belongs to the object at ffff888101892d40
[   13.358463]  which belongs to the cache kmalloc-16 of size 16
[   13.358878] The buggy address is located 8 bytes inside of
[   13.358878]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.359500] 
[   13.359714] The buggy address belongs to the physical page:
[   13.359952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.360283] flags: 0x200000000000000(node=0|zone=2)
[   13.360463] page_type: f5(slab)
[   13.360585] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.361210] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.361576] page dumped because: kasan: bad access detected
[   13.361797] 
[   13.361903] Memory state around the buggy address:
[   13.362162]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.362397]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.362727] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.363251]                                               ^
[   13.363508]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.363802]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.364315] ==================================================================
[   13.324603] ==================================================================
[   13.324939] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.325517] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.325866] 
[   13.325976] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.326022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.326037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.326057] Call Trace:
[   13.326071]  <TASK>
[   13.326085]  dump_stack_lvl+0x73/0xb0
[   13.326112]  print_report+0xd1/0x650
[   13.326135]  ? __virt_addr_valid+0x1db/0x2d0
[   13.326156]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.326183]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.326205]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.326233]  kasan_report+0x141/0x180
[   13.326255]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.326287]  kasan_check_range+0x10c/0x1c0
[   13.326311]  __kasan_check_write+0x18/0x20
[   13.326331]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.326358]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.326398]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.326418]  ? trace_hardirqs_on+0x37/0xe0
[   13.326439]  ? kasan_bitops_generic+0x92/0x1c0
[   13.326464]  kasan_bitops_generic+0x121/0x1c0
[   13.326484]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.326509]  ? __pfx_read_tsc+0x10/0x10
[   13.326530]  ? ktime_get_ts64+0x86/0x230
[   13.326554]  kunit_try_run_case+0x1a5/0x480
[   13.326575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.326595]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.326620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.326646]  ? __kthread_parkme+0x82/0x180
[   13.326666]  ? preempt_count_sub+0x50/0x80
[   13.326690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.326711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.326791]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.326816]  kthread+0x337/0x6f0
[   13.326836]  ? trace_preempt_on+0x20/0xc0
[   13.326859]  ? __pfx_kthread+0x10/0x10
[   13.326879]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.326903]  ? calculate_sigpending+0x7b/0xa0
[   13.326926]  ? __pfx_kthread+0x10/0x10
[   13.326947]  ret_from_fork+0x116/0x1d0
[   13.326966]  ? __pfx_kthread+0x10/0x10
[   13.326986]  ret_from_fork_asm+0x1a/0x30
[   13.327050]  </TASK>
[   13.327062] 
[   13.335428] Allocated by task 279:
[   13.335617]  kasan_save_stack+0x45/0x70
[   13.335810]  kasan_save_track+0x18/0x40
[   13.336011]  kasan_save_alloc_info+0x3b/0x50
[   13.336199]  __kasan_kmalloc+0xb7/0xc0
[   13.336399]  __kmalloc_cache_noprof+0x189/0x420
[   13.336607]  kasan_bitops_generic+0x92/0x1c0
[   13.336792]  kunit_try_run_case+0x1a5/0x480
[   13.336936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.337114]  kthread+0x337/0x6f0
[   13.337235]  ret_from_fork+0x116/0x1d0
[   13.337477]  ret_from_fork_asm+0x1a/0x30
[   13.337682] 
[   13.337824] The buggy address belongs to the object at ffff888101892d40
[   13.337824]  which belongs to the cache kmalloc-16 of size 16
[   13.338542] The buggy address is located 8 bytes inside of
[   13.338542]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.338898] 
[   13.338970] The buggy address belongs to the physical page:
[   13.339292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.339671] flags: 0x200000000000000(node=0|zone=2)
[   13.339972] page_type: f5(slab)
[   13.340390] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.340782] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.341162] page dumped because: kasan: bad access detected
[   13.341412] 
[   13.341488] Memory state around the buggy address:
[   13.341731]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.342068]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.342356] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.342597]                                               ^
[   13.342776]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.343168]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.343669] ==================================================================
[   13.280401] ==================================================================
[   13.280728] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.281220] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.281561] 
[   13.281678] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.281733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.281745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.281766] Call Trace:
[   13.281779]  <TASK>
[   13.281792]  dump_stack_lvl+0x73/0xb0
[   13.281842]  print_report+0xd1/0x650
[   13.281866]  ? __virt_addr_valid+0x1db/0x2d0
[   13.281888]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.281915]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.281938]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.281965]  kasan_report+0x141/0x180
[   13.282003]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.282060]  kasan_check_range+0x10c/0x1c0
[   13.282084]  __kasan_check_write+0x18/0x20
[   13.282104]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.282133]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.282162]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.282183]  ? trace_hardirqs_on+0x37/0xe0
[   13.282206]  ? kasan_bitops_generic+0x92/0x1c0
[   13.282230]  kasan_bitops_generic+0x121/0x1c0
[   13.282250]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.282275]  ? __pfx_read_tsc+0x10/0x10
[   13.282295]  ? ktime_get_ts64+0x86/0x230
[   13.282320]  kunit_try_run_case+0x1a5/0x480
[   13.282340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.282360]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.282396]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.282421]  ? __kthread_parkme+0x82/0x180
[   13.282442]  ? preempt_count_sub+0x50/0x80
[   13.282465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.282486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.282511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.282538]  kthread+0x337/0x6f0
[   13.282557]  ? trace_preempt_on+0x20/0xc0
[   13.282579]  ? __pfx_kthread+0x10/0x10
[   13.282599]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.282623]  ? calculate_sigpending+0x7b/0xa0
[   13.282647]  ? __pfx_kthread+0x10/0x10
[   13.282668]  ret_from_fork+0x116/0x1d0
[   13.282687]  ? __pfx_kthread+0x10/0x10
[   13.282710]  ret_from_fork_asm+0x1a/0x30
[   13.282741]  </TASK>
[   13.282751] 
[   13.293425] Allocated by task 279:
[   13.293565]  kasan_save_stack+0x45/0x70
[   13.293826]  kasan_save_track+0x18/0x40
[   13.294033]  kasan_save_alloc_info+0x3b/0x50
[   13.294283]  __kasan_kmalloc+0xb7/0xc0
[   13.294479]  __kmalloc_cache_noprof+0x189/0x420
[   13.294668]  kasan_bitops_generic+0x92/0x1c0
[   13.294819]  kunit_try_run_case+0x1a5/0x480
[   13.294969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.295265]  kthread+0x337/0x6f0
[   13.295457]  ret_from_fork+0x116/0x1d0
[   13.295636]  ret_from_fork_asm+0x1a/0x30
[   13.295933] 
[   13.296058] The buggy address belongs to the object at ffff888101892d40
[   13.296058]  which belongs to the cache kmalloc-16 of size 16
[   13.296535] The buggy address is located 8 bytes inside of
[   13.296535]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.297252] 
[   13.297363] The buggy address belongs to the physical page:
[   13.297588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.297917] flags: 0x200000000000000(node=0|zone=2)
[   13.298187] page_type: f5(slab)
[   13.298368] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.298728] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.299149] page dumped because: kasan: bad access detected
[   13.299411] 
[   13.299491] Memory state around the buggy address:
[   13.299700]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.299953]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.300191] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.300518]                                               ^
[   13.300848]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.301342]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.301633] ==================================================================
[   13.302037] ==================================================================
[   13.302549] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.302916] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.303185] 
[   13.303473] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.303524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.303536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.303558] Call Trace:
[   13.303572]  <TASK>
[   13.303588]  dump_stack_lvl+0x73/0xb0
[   13.303615]  print_report+0xd1/0x650
[   13.303639]  ? __virt_addr_valid+0x1db/0x2d0
[   13.303661]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.303689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.303711]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.303740]  kasan_report+0x141/0x180
[   13.303763]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.303795]  kasan_check_range+0x10c/0x1c0
[   13.303819]  __kasan_check_write+0x18/0x20
[   13.303839]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.303867]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.303895]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.303916]  ? trace_hardirqs_on+0x37/0xe0
[   13.303937]  ? kasan_bitops_generic+0x92/0x1c0
[   13.303961]  kasan_bitops_generic+0x121/0x1c0
[   13.303981]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.304007]  ? __pfx_read_tsc+0x10/0x10
[   13.304027]  ? ktime_get_ts64+0x86/0x230
[   13.304051]  kunit_try_run_case+0x1a5/0x480
[   13.304072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.304091]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.304117]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.304142]  ? __kthread_parkme+0x82/0x180
[   13.304163]  ? preempt_count_sub+0x50/0x80
[   13.304186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.304208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.304232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.304256]  kthread+0x337/0x6f0
[   13.304276]  ? trace_preempt_on+0x20/0xc0
[   13.304298]  ? __pfx_kthread+0x10/0x10
[   13.304318]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.304342]  ? calculate_sigpending+0x7b/0xa0
[   13.304365]  ? __pfx_kthread+0x10/0x10
[   13.304396]  ret_from_fork+0x116/0x1d0
[   13.304415]  ? __pfx_kthread+0x10/0x10
[   13.304435]  ret_from_fork_asm+0x1a/0x30
[   13.304465]  </TASK>
[   13.304475] 
[   13.314627] Allocated by task 279:
[   13.315077]  kasan_save_stack+0x45/0x70
[   13.315325]  kasan_save_track+0x18/0x40
[   13.315629]  kasan_save_alloc_info+0x3b/0x50
[   13.315971]  __kasan_kmalloc+0xb7/0xc0
[   13.316258]  __kmalloc_cache_noprof+0x189/0x420
[   13.316476]  kasan_bitops_generic+0x92/0x1c0
[   13.316677]  kunit_try_run_case+0x1a5/0x480
[   13.317315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.317643]  kthread+0x337/0x6f0
[   13.317910]  ret_from_fork+0x116/0x1d0
[   13.318246]  ret_from_fork_asm+0x1a/0x30
[   13.318446] 
[   13.318534] The buggy address belongs to the object at ffff888101892d40
[   13.318534]  which belongs to the cache kmalloc-16 of size 16
[   13.318985] The buggy address is located 8 bytes inside of
[   13.318985]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.319720] 
[   13.319830] The buggy address belongs to the physical page:
[   13.320123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.320452] flags: 0x200000000000000(node=0|zone=2)
[   13.320680] page_type: f5(slab)
[   13.320895] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.321174] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.321578] page dumped because: kasan: bad access detected
[   13.321913] 
[   13.321995] Memory state around the buggy address:
[   13.322194]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.322512]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.322814] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.323223]                                               ^
[   13.323435]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.323707]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.324100] ==================================================================
[   13.364690] ==================================================================
[   13.365026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.365533] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.365905] 
[   13.366057] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.366102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.366114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.366134] Call Trace:
[   13.366148]  <TASK>
[   13.366162]  dump_stack_lvl+0x73/0xb0
[   13.366189]  print_report+0xd1/0x650
[   13.366212]  ? __virt_addr_valid+0x1db/0x2d0
[   13.366234]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.366261]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.366283]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.366311]  kasan_report+0x141/0x180
[   13.366334]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.366367]  kasan_check_range+0x10c/0x1c0
[   13.366404]  __kasan_check_write+0x18/0x20
[   13.366427]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.366454]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.366483]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.366503]  ? trace_hardirqs_on+0x37/0xe0
[   13.366525]  ? kasan_bitops_generic+0x92/0x1c0
[   13.366549]  kasan_bitops_generic+0x121/0x1c0
[   13.366569]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.366594]  ? __pfx_read_tsc+0x10/0x10
[   13.366615]  ? ktime_get_ts64+0x86/0x230
[   13.366638]  kunit_try_run_case+0x1a5/0x480
[   13.366660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.366679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.366704]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.366728]  ? __kthread_parkme+0x82/0x180
[   13.366748]  ? preempt_count_sub+0x50/0x80
[   13.366772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.366793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.366817]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.366841]  kthread+0x337/0x6f0
[   13.366860]  ? trace_preempt_on+0x20/0xc0
[   13.366881]  ? __pfx_kthread+0x10/0x10
[   13.366912]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.366935]  ? calculate_sigpending+0x7b/0xa0
[   13.366958]  ? __pfx_kthread+0x10/0x10
[   13.366980]  ret_from_fork+0x116/0x1d0
[   13.366998]  ? __pfx_kthread+0x10/0x10
[   13.367028]  ret_from_fork_asm+0x1a/0x30
[   13.367058]  </TASK>
[   13.367068] 
[   13.377347] Allocated by task 279:
[   13.377536]  kasan_save_stack+0x45/0x70
[   13.377729]  kasan_save_track+0x18/0x40
[   13.377914]  kasan_save_alloc_info+0x3b/0x50
[   13.378428]  __kasan_kmalloc+0xb7/0xc0
[   13.378818]  __kmalloc_cache_noprof+0x189/0x420
[   13.379300]  kasan_bitops_generic+0x92/0x1c0
[   13.379530]  kunit_try_run_case+0x1a5/0x480
[   13.379724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.379952]  kthread+0x337/0x6f0
[   13.380588]  ret_from_fork+0x116/0x1d0
[   13.381104]  ret_from_fork_asm+0x1a/0x30
[   13.381392] 
[   13.381495] The buggy address belongs to the object at ffff888101892d40
[   13.381495]  which belongs to the cache kmalloc-16 of size 16
[   13.382333] The buggy address is located 8 bytes inside of
[   13.382333]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.383265] 
[   13.383517] The buggy address belongs to the physical page:
[   13.383848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.384355] flags: 0x200000000000000(node=0|zone=2)
[   13.384585] page_type: f5(slab)
[   13.384923] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.385883] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.386275] page dumped because: kasan: bad access detected
[   13.386523] 
[   13.386613] Memory state around the buggy address:
[   13.387053]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.387683]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.388028] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.388319]                                               ^
[   13.388567]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.389188]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.389658] ==================================================================
[   13.390740] ==================================================================
[   13.391387] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.391878] Read of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.392609] 
[   13.392732] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.392781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.392793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.392816] Call Trace:
[   13.392830]  <TASK>
[   13.392846]  dump_stack_lvl+0x73/0xb0
[   13.392874]  print_report+0xd1/0x650
[   13.392898]  ? __virt_addr_valid+0x1db/0x2d0
[   13.392920]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.392947]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.392970]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.392997]  kasan_report+0x141/0x180
[   13.393021]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.393053]  kasan_check_range+0x10c/0x1c0
[   13.393077]  __kasan_check_read+0x15/0x20
[   13.393097]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.393125]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.393154]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.393174]  ? trace_hardirqs_on+0x37/0xe0
[   13.393196]  ? kasan_bitops_generic+0x92/0x1c0
[   13.393219]  kasan_bitops_generic+0x121/0x1c0
[   13.393239]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.393264]  ? __pfx_read_tsc+0x10/0x10
[   13.393284]  ? ktime_get_ts64+0x86/0x230
[   13.393309]  kunit_try_run_case+0x1a5/0x480
[   13.393330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.393349]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.393383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.393408]  ? __kthread_parkme+0x82/0x180
[   13.393429]  ? preempt_count_sub+0x50/0x80
[   13.393452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.393473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.393496]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.393521]  kthread+0x337/0x6f0
[   13.393540]  ? trace_preempt_on+0x20/0xc0
[   13.393562]  ? __pfx_kthread+0x10/0x10
[   13.393583]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.393605]  ? calculate_sigpending+0x7b/0xa0
[   13.393629]  ? __pfx_kthread+0x10/0x10
[   13.393650]  ret_from_fork+0x116/0x1d0
[   13.393671]  ? __pfx_kthread+0x10/0x10
[   13.393693]  ret_from_fork_asm+0x1a/0x30
[   13.393735]  </TASK>
[   13.393745] 
[   13.402542] Allocated by task 279:
[   13.402705]  kasan_save_stack+0x45/0x70
[   13.402910]  kasan_save_track+0x18/0x40
[   13.403139]  kasan_save_alloc_info+0x3b/0x50
[   13.403294]  __kasan_kmalloc+0xb7/0xc0
[   13.403456]  __kmalloc_cache_noprof+0x189/0x420
[   13.403678]  kasan_bitops_generic+0x92/0x1c0
[   13.403929]  kunit_try_run_case+0x1a5/0x480
[   13.404263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.405131]  kthread+0x337/0x6f0
[   13.405282]  ret_from_fork+0x116/0x1d0
[   13.405431]  ret_from_fork_asm+0x1a/0x30
[   13.405575] 
[   13.405674] The buggy address belongs to the object at ffff888101892d40
[   13.405674]  which belongs to the cache kmalloc-16 of size 16
[   13.406343] The buggy address is located 8 bytes inside of
[   13.406343]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.406887] 
[   13.406964] The buggy address belongs to the physical page:
[   13.407209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.407706] flags: 0x200000000000000(node=0|zone=2)
[   13.407901] page_type: f5(slab)
[   13.408192] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.408533] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.408890] page dumped because: kasan: bad access detected
[   13.409067] 
[   13.409162] Memory state around the buggy address:
[   13.409411]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.409909]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.410220] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.410524]                                               ^
[   13.410789]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.411129]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.411628] ==================================================================
[   13.412017] ==================================================================
[   13.412493] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.412975] Read of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.413314] 
[   13.413479] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.413527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.413539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.413561] Call Trace:
[   13.413574]  <TASK>
[   13.413589]  dump_stack_lvl+0x73/0xb0
[   13.413615]  print_report+0xd1/0x650
[   13.413638]  ? __virt_addr_valid+0x1db/0x2d0
[   13.413661]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.413688]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.413711]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.413747]  kasan_report+0x141/0x180
[   13.413770]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.413803]  __asan_report_load8_noabort+0x18/0x20
[   13.413824]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.413852]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.413881]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.413901]  ? trace_hardirqs_on+0x37/0xe0
[   13.413923]  ? kasan_bitops_generic+0x92/0x1c0
[   13.413947]  kasan_bitops_generic+0x121/0x1c0
[   13.413967]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.413992]  ? __pfx_read_tsc+0x10/0x10
[   13.414012]  ? ktime_get_ts64+0x86/0x230
[   13.414083]  kunit_try_run_case+0x1a5/0x480
[   13.414105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.414125]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.414149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.414174]  ? __kthread_parkme+0x82/0x180
[   13.414195]  ? preempt_count_sub+0x50/0x80
[   13.414218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.414239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.414264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.414288]  kthread+0x337/0x6f0
[   13.414307]  ? trace_preempt_on+0x20/0xc0
[   13.414330]  ? __pfx_kthread+0x10/0x10
[   13.414350]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.414385]  ? calculate_sigpending+0x7b/0xa0
[   13.414409]  ? __pfx_kthread+0x10/0x10
[   13.414431]  ret_from_fork+0x116/0x1d0
[   13.414449]  ? __pfx_kthread+0x10/0x10
[   13.414469]  ret_from_fork_asm+0x1a/0x30
[   13.414499]  </TASK>
[   13.414510] 
[   13.423109] Allocated by task 279:
[   13.423244]  kasan_save_stack+0x45/0x70
[   13.423456]  kasan_save_track+0x18/0x40
[   13.423663]  kasan_save_alloc_info+0x3b/0x50
[   13.424121]  __kasan_kmalloc+0xb7/0xc0
[   13.424323]  __kmalloc_cache_noprof+0x189/0x420
[   13.424522]  kasan_bitops_generic+0x92/0x1c0
[   13.424721]  kunit_try_run_case+0x1a5/0x480
[   13.424932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.425282]  kthread+0x337/0x6f0
[   13.425461]  ret_from_fork+0x116/0x1d0
[   13.425612]  ret_from_fork_asm+0x1a/0x30
[   13.425924] 
[   13.426251] The buggy address belongs to the object at ffff888101892d40
[   13.426251]  which belongs to the cache kmalloc-16 of size 16
[   13.426791] The buggy address is located 8 bytes inside of
[   13.426791]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.427366] 
[   13.427477] The buggy address belongs to the physical page:
[   13.427668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.428141] flags: 0x200000000000000(node=0|zone=2)
[   13.428448] page_type: f5(slab)
[   13.428664] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.428918] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.429144] page dumped because: kasan: bad access detected
[   13.429397] 
[   13.429490] Memory state around the buggy address:
[   13.429842]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.430262]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.430499] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.430720]                                               ^
[   13.430979]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.431501]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.431991] ==================================================================
[   13.256935] ==================================================================
[   13.257349] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.257972] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279
[   13.258372] 
[   13.258504] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.258587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.258600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.258621] Call Trace:
[   13.258638]  <TASK>
[   13.258656]  dump_stack_lvl+0x73/0xb0
[   13.258684]  print_report+0xd1/0x650
[   13.258707]  ? __virt_addr_valid+0x1db/0x2d0
[   13.258770]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.258798]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.258821]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.258848]  kasan_report+0x141/0x180
[   13.258871]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.258902]  kasan_check_range+0x10c/0x1c0
[   13.258926]  __kasan_check_write+0x18/0x20
[   13.258946]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.258974]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.259004]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.259100]  ? trace_hardirqs_on+0x37/0xe0
[   13.259125]  ? kasan_bitops_generic+0x92/0x1c0
[   13.259150]  kasan_bitops_generic+0x121/0x1c0
[   13.259170]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.259231]  ? __pfx_read_tsc+0x10/0x10
[   13.259252]  ? ktime_get_ts64+0x86/0x230
[   13.259276]  kunit_try_run_case+0x1a5/0x480
[   13.259299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.259318]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.259387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.259413]  ? __kthread_parkme+0x82/0x180
[   13.259433]  ? preempt_count_sub+0x50/0x80
[   13.259457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.259478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.259503]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.259528]  kthread+0x337/0x6f0
[   13.259547]  ? trace_preempt_on+0x20/0xc0
[   13.259569]  ? __pfx_kthread+0x10/0x10
[   13.259590]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.259613]  ? calculate_sigpending+0x7b/0xa0
[   13.259636]  ? __pfx_kthread+0x10/0x10
[   13.259658]  ret_from_fork+0x116/0x1d0
[   13.259677]  ? __pfx_kthread+0x10/0x10
[   13.259698]  ret_from_fork_asm+0x1a/0x30
[   13.259740]  </TASK>
[   13.259751] 
[   13.269813] Allocated by task 279:
[   13.270046]  kasan_save_stack+0x45/0x70
[   13.270336]  kasan_save_track+0x18/0x40
[   13.270836]  kasan_save_alloc_info+0x3b/0x50
[   13.271097]  __kasan_kmalloc+0xb7/0xc0
[   13.271235]  __kmalloc_cache_noprof+0x189/0x420
[   13.271400]  kasan_bitops_generic+0x92/0x1c0
[   13.271651]  kunit_try_run_case+0x1a5/0x480
[   13.272134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.272467]  kthread+0x337/0x6f0
[   13.272666]  ret_from_fork+0x116/0x1d0
[   13.272905]  ret_from_fork_asm+0x1a/0x30
[   13.273160] 
[   13.273235] The buggy address belongs to the object at ffff888101892d40
[   13.273235]  which belongs to the cache kmalloc-16 of size 16
[   13.273758] The buggy address is located 8 bytes inside of
[   13.273758]  allocated 9-byte region [ffff888101892d40, ffff888101892d49)
[   13.274421] 
[   13.274499] The buggy address belongs to the physical page:
[   13.274993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892
[   13.275474] flags: 0x200000000000000(node=0|zone=2)
[   13.275644] page_type: f5(slab)
[   13.275838] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.276254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.276921] page dumped because: kasan: bad access detected
[   13.277116] 
[   13.277240] Memory state around the buggy address:
[   13.277523]  ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.277901]  ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.278282] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.278627]                                               ^
[   13.278952]  ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.279525]  ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.279812] ==================================================================