Date
May 15, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 |
[ 43.046281] ================================================================== [ 43.053381] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 43.061538] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 43.068829] [ 43.070312] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 43.070365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.070382] Hardware name: WinLink E850-96 board (DT) [ 43.070404] Call trace: [ 43.070419] show_stack+0x20/0x38 (C) [ 43.070451] dump_stack_lvl+0x8c/0xd0 [ 43.070482] print_report+0x118/0x608 [ 43.070514] kasan_report+0xdc/0x128 [ 43.070543] __asan_report_load8_noabort+0x20/0x30 [ 43.070582] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 43.070616] kasan_bitops_generic+0x110/0x1c8 [ 43.070646] kunit_try_run_case+0x170/0x3f0 [ 43.070679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.070714] kthread+0x328/0x630 [ 43.070745] ret_from_fork+0x10/0x20 [ 43.070777] [ 43.139835] Allocated by task 306: [ 43.143223] kasan_save_stack+0x3c/0x68 [ 43.147040] kasan_save_track+0x20/0x40 [ 43.150859] kasan_save_alloc_info+0x40/0x58 [ 43.155113] __kasan_kmalloc+0xd4/0xd8 [ 43.158845] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.163359] kasan_bitops_generic+0xa0/0x1c8 [ 43.167613] kunit_try_run_case+0x170/0x3f0 [ 43.171779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.177248] kthread+0x328/0x630 [ 43.180459] ret_from_fork+0x10/0x20 [ 43.184018] [ 43.185494] The buggy address belongs to the object at ffff000800e200a0 [ 43.185494] which belongs to the cache kmalloc-16 of size 16 [ 43.197824] The buggy address is located 8 bytes inside of [ 43.197824] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 43.210060] [ 43.211535] The buggy address belongs to the physical page: [ 43.217095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 43.225077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.231589] page_type: f5(slab) [ 43.234720] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.242445] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.250163] page dumped because: kasan: bad access detected [ 43.255719] [ 43.257194] Memory state around the buggy address: [ 43.261972] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.269177] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.276382] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.283583] ^ [ 43.288100] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.295305] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.302506] ================================================================== [ 41.448930] ================================================================== [ 41.458268] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.466424] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 41.473802] [ 41.475288] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 41.475343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.475363] Hardware name: WinLink E850-96 board (DT) [ 41.475387] Call trace: [ 41.475402] show_stack+0x20/0x38 (C) [ 41.475442] dump_stack_lvl+0x8c/0xd0 [ 41.475477] print_report+0x118/0x608 [ 41.475513] kasan_report+0xdc/0x128 [ 41.475546] kasan_check_range+0x100/0x1a8 [ 41.475584] __kasan_check_write+0x20/0x30 [ 41.475624] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.475657] kasan_bitops_generic+0x110/0x1c8 [ 41.475689] kunit_try_run_case+0x170/0x3f0 [ 41.475723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.475761] kthread+0x328/0x630 [ 41.475798] ret_from_fork+0x10/0x20 [ 41.475834] [ 41.548193] Allocated by task 306: [ 41.551581] kasan_save_stack+0x3c/0x68 [ 41.555397] kasan_save_track+0x20/0x40 [ 41.559217] kasan_save_alloc_info+0x40/0x58 [ 41.563470] __kasan_kmalloc+0xd4/0xd8 [ 41.567204] __kmalloc_cache_noprof+0x15c/0x3c0 [ 41.571716] kasan_bitops_generic+0xa0/0x1c8 [ 41.575970] kunit_try_run_case+0x170/0x3f0 [ 41.580135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.585605] kthread+0x328/0x630 [ 41.588817] ret_from_fork+0x10/0x20 [ 41.592376] [ 41.593853] The buggy address belongs to the object at ffff000800e200a0 [ 41.593853] which belongs to the cache kmalloc-16 of size 16 [ 41.606180] The buggy address is located 8 bytes inside of [ 41.606180] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 41.618417] [ 41.619897] The buggy address belongs to the physical page: [ 41.625452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 41.633437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.639946] page_type: f5(slab) [ 41.643084] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.650802] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.658523] page dumped because: kasan: bad access detected [ 41.664076] [ 41.665551] Memory state around the buggy address: [ 41.670333] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.677535] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 41.684739] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.691940] ^ [ 41.696458] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.703662] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.710865] ================================================================== [ 41.981786] ================================================================== [ 41.988814] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 41.996971] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 42.004349] [ 42.005832] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 42.005882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.005899] Hardware name: WinLink E850-96 board (DT) [ 42.005919] Call trace: [ 42.005936] show_stack+0x20/0x38 (C) [ 42.005971] dump_stack_lvl+0x8c/0xd0 [ 42.006002] print_report+0x118/0x608 [ 42.006034] kasan_report+0xdc/0x128 [ 42.006066] kasan_check_range+0x100/0x1a8 [ 42.006100] __kasan_check_write+0x20/0x30 [ 42.006136] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 42.006170] kasan_bitops_generic+0x110/0x1c8 [ 42.006202] kunit_try_run_case+0x170/0x3f0 [ 42.006233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.006268] kthread+0x328/0x630 [ 42.006301] ret_from_fork+0x10/0x20 [ 42.006335] [ 42.078740] Allocated by task 306: [ 42.082127] kasan_save_stack+0x3c/0x68 [ 42.085945] kasan_save_track+0x20/0x40 [ 42.089764] kasan_save_alloc_info+0x40/0x58 [ 42.094018] __kasan_kmalloc+0xd4/0xd8 [ 42.097750] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.102264] kasan_bitops_generic+0xa0/0x1c8 [ 42.106517] kunit_try_run_case+0x170/0x3f0 [ 42.110684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.116153] kthread+0x328/0x630 [ 42.119364] ret_from_fork+0x10/0x20 [ 42.122923] [ 42.124400] The buggy address belongs to the object at ffff000800e200a0 [ 42.124400] which belongs to the cache kmalloc-16 of size 16 [ 42.136728] The buggy address is located 8 bytes inside of [ 42.136728] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 42.148964] [ 42.150442] The buggy address belongs to the physical page: [ 42.155999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 42.163985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.170493] page_type: f5(slab) [ 42.173625] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.181349] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.189070] page dumped because: kasan: bad access detected [ 42.194623] [ 42.196098] Memory state around the buggy address: [ 42.200878] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.208082] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.215289] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.222488] ^ [ 42.227005] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.234210] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.241411] ================================================================== [ 43.843851] ================================================================== [ 43.850937] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.859095] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 43.866387] [ 43.867868] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 43.867917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.867933] Hardware name: WinLink E850-96 board (DT) [ 43.867953] Call trace: [ 43.867964] show_stack+0x20/0x38 (C) [ 43.867994] dump_stack_lvl+0x8c/0xd0 [ 43.868027] print_report+0x118/0x608 [ 43.868060] kasan_report+0xdc/0x128 [ 43.868090] __asan_report_load8_noabort+0x20/0x30 [ 43.868128] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.868163] kasan_bitops_generic+0x110/0x1c8 [ 43.868193] kunit_try_run_case+0x170/0x3f0 [ 43.868223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.868256] kthread+0x328/0x630 [ 43.868289] ret_from_fork+0x10/0x20 [ 43.868322] [ 43.937392] Allocated by task 306: [ 43.940778] kasan_save_stack+0x3c/0x68 [ 43.944597] kasan_save_track+0x20/0x40 [ 43.948417] kasan_save_alloc_info+0x40/0x58 [ 43.952670] __kasan_kmalloc+0xd4/0xd8 [ 43.956403] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.960917] kasan_bitops_generic+0xa0/0x1c8 [ 43.965170] kunit_try_run_case+0x170/0x3f0 [ 43.969336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.974805] kthread+0x328/0x630 [ 43.978017] ret_from_fork+0x10/0x20 [ 43.981576] [ 43.983051] The buggy address belongs to the object at ffff000800e200a0 [ 43.983051] which belongs to the cache kmalloc-16 of size 16 [ 43.995380] The buggy address is located 8 bytes inside of [ 43.995380] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 44.007617] [ 44.009093] The buggy address belongs to the physical page: [ 44.014651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 44.022635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.029144] page_type: f5(slab) [ 44.032278] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.040002] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.047721] page dumped because: kasan: bad access detected [ 44.053276] [ 44.054752] Memory state around the buggy address: [ 44.059530] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.066735] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.073939] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.081140] ^ [ 44.085658] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.092863] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.100064] ================================================================== [ 42.512257] ================================================================== [ 42.519363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.527518] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 42.534896] [ 42.536380] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 42.536430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.536447] Hardware name: WinLink E850-96 board (DT) [ 42.536467] Call trace: [ 42.536482] show_stack+0x20/0x38 (C) [ 42.536518] dump_stack_lvl+0x8c/0xd0 [ 42.536549] print_report+0x118/0x608 [ 42.536580] kasan_report+0xdc/0x128 [ 42.536610] kasan_check_range+0x100/0x1a8 [ 42.536644] __kasan_check_write+0x20/0x30 [ 42.536678] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.536711] kasan_bitops_generic+0x110/0x1c8 [ 42.536742] kunit_try_run_case+0x170/0x3f0 [ 42.536775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.536809] kthread+0x328/0x630 [ 42.536844] ret_from_fork+0x10/0x20 [ 42.536876] [ 42.609287] Allocated by task 306: [ 42.612675] kasan_save_stack+0x3c/0x68 [ 42.616492] kasan_save_track+0x20/0x40 [ 42.620312] kasan_save_alloc_info+0x40/0x58 [ 42.624565] __kasan_kmalloc+0xd4/0xd8 [ 42.628298] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.632811] kasan_bitops_generic+0xa0/0x1c8 [ 42.637065] kunit_try_run_case+0x170/0x3f0 [ 42.641232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.646700] kthread+0x328/0x630 [ 42.649912] ret_from_fork+0x10/0x20 [ 42.653471] [ 42.654948] The buggy address belongs to the object at ffff000800e200a0 [ 42.654948] which belongs to the cache kmalloc-16 of size 16 [ 42.667276] The buggy address is located 8 bytes inside of [ 42.667276] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 42.679512] [ 42.680988] The buggy address belongs to the physical page: [ 42.686546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 42.694531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.701041] page_type: f5(slab) [ 42.704176] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.711897] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.719617] page dumped because: kasan: bad access detected [ 42.725171] [ 42.726646] Memory state around the buggy address: [ 42.731428] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.738630] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.745834] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.753035] ^ [ 42.757553] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.764758] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.771960] ================================================================== [ 42.248710] ================================================================== [ 42.255823] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.263980] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 42.271272] [ 42.272754] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 42.272803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.272822] Hardware name: WinLink E850-96 board (DT) [ 42.272839] Call trace: [ 42.272853] show_stack+0x20/0x38 (C) [ 42.272884] dump_stack_lvl+0x8c/0xd0 [ 42.272914] print_report+0x118/0x608 [ 42.272946] kasan_report+0xdc/0x128 [ 42.272978] __asan_report_load8_noabort+0x20/0x30 [ 42.273016] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.273049] kasan_bitops_generic+0x110/0x1c8 [ 42.273080] kunit_try_run_case+0x170/0x3f0 [ 42.273110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.273144] kthread+0x328/0x630 [ 42.273176] ret_from_fork+0x10/0x20 [ 42.273205] [ 42.342277] Allocated by task 306: [ 42.345665] kasan_save_stack+0x3c/0x68 [ 42.349483] kasan_save_track+0x20/0x40 [ 42.353302] kasan_save_alloc_info+0x40/0x58 [ 42.357555] __kasan_kmalloc+0xd4/0xd8 [ 42.361288] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.365801] kasan_bitops_generic+0xa0/0x1c8 [ 42.370055] kunit_try_run_case+0x170/0x3f0 [ 42.374222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.379690] kthread+0x328/0x630 [ 42.382902] ret_from_fork+0x10/0x20 [ 42.386461] [ 42.387937] The buggy address belongs to the object at ffff000800e200a0 [ 42.387937] which belongs to the cache kmalloc-16 of size 16 [ 42.400265] The buggy address is located 8 bytes inside of [ 42.400265] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 42.412502] [ 42.413978] The buggy address belongs to the physical page: [ 42.419537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 42.427521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.434031] page_type: f5(slab) [ 42.437163] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.444887] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.452607] page dumped because: kasan: bad access detected [ 42.458161] [ 42.459637] Memory state around the buggy address: [ 42.464418] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.471620] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.478824] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.486025] ^ [ 42.490543] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.497748] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.504949] ================================================================== [ 42.779268] ================================================================== [ 42.786373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.794528] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 42.801906] [ 42.803389] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 42.803440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.803456] Hardware name: WinLink E850-96 board (DT) [ 42.803477] Call trace: [ 42.803492] show_stack+0x20/0x38 (C) [ 42.803525] dump_stack_lvl+0x8c/0xd0 [ 42.803559] print_report+0x118/0x608 [ 42.803589] kasan_report+0xdc/0x128 [ 42.803618] kasan_check_range+0x100/0x1a8 [ 42.803651] __kasan_check_write+0x20/0x30 [ 42.803684] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.803718] kasan_bitops_generic+0x110/0x1c8 [ 42.803748] kunit_try_run_case+0x170/0x3f0 [ 42.803780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.803815] kthread+0x328/0x630 [ 42.803845] ret_from_fork+0x10/0x20 [ 42.803876] [ 42.876298] Allocated by task 306: [ 42.879685] kasan_save_stack+0x3c/0x68 [ 42.883502] kasan_save_track+0x20/0x40 [ 42.887321] kasan_save_alloc_info+0x40/0x58 [ 42.891575] __kasan_kmalloc+0xd4/0xd8 [ 42.895307] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.899821] kasan_bitops_generic+0xa0/0x1c8 [ 42.904075] kunit_try_run_case+0x170/0x3f0 [ 42.908241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.913710] kthread+0x328/0x630 [ 42.916922] ret_from_fork+0x10/0x20 [ 42.920480] [ 42.921958] The buggy address belongs to the object at ffff000800e200a0 [ 42.921958] which belongs to the cache kmalloc-16 of size 16 [ 42.934286] The buggy address is located 8 bytes inside of [ 42.934286] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 42.946522] [ 42.947998] The buggy address belongs to the physical page: [ 42.953557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 42.961539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.968051] page_type: f5(slab) [ 42.971184] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.978907] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.986626] page dumped because: kasan: bad access detected [ 42.992181] [ 42.993657] Memory state around the buggy address: [ 42.998436] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.005639] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.012844] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.020045] ^ [ 43.024563] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.031768] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.038969] ================================================================== [ 43.576898] ================================================================== [ 43.583927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.592085] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 43.599464] [ 43.600945] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 43.600997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.601012] Hardware name: WinLink E850-96 board (DT) [ 43.601031] Call trace: [ 43.601044] show_stack+0x20/0x38 (C) [ 43.601074] dump_stack_lvl+0x8c/0xd0 [ 43.601107] print_report+0x118/0x608 [ 43.601138] kasan_report+0xdc/0x128 [ 43.601170] kasan_check_range+0x100/0x1a8 [ 43.601204] __kasan_check_write+0x20/0x30 [ 43.601239] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.601273] kasan_bitops_generic+0x110/0x1c8 [ 43.601302] kunit_try_run_case+0x170/0x3f0 [ 43.601330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.601365] kthread+0x328/0x630 [ 43.601396] ret_from_fork+0x10/0x20 [ 43.601427] [ 43.673854] Allocated by task 306: [ 43.677242] kasan_save_stack+0x3c/0x68 [ 43.681060] kasan_save_track+0x20/0x40 [ 43.684879] kasan_save_alloc_info+0x40/0x58 [ 43.689132] __kasan_kmalloc+0xd4/0xd8 [ 43.692865] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.697379] kasan_bitops_generic+0xa0/0x1c8 [ 43.701632] kunit_try_run_case+0x170/0x3f0 [ 43.705799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.711267] kthread+0x328/0x630 [ 43.714479] ret_from_fork+0x10/0x20 [ 43.718038] [ 43.719515] The buggy address belongs to the object at ffff000800e200a0 [ 43.719515] which belongs to the cache kmalloc-16 of size 16 [ 43.731842] The buggy address is located 8 bytes inside of [ 43.731842] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 43.744080] [ 43.745555] The buggy address belongs to the physical page: [ 43.751114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 43.759097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.765608] page_type: f5(slab) [ 43.768740] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.776464] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.784183] page dumped because: kasan: bad access detected [ 43.789739] [ 43.791214] Memory state around the buggy address: [ 43.795994] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.803197] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.810402] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.817603] ^ [ 43.822120] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.829325] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.836526] ================================================================== [ 43.309874] ================================================================== [ 43.316918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.325076] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 43.332454] [ 43.333935] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 43.333985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.334002] Hardware name: WinLink E850-96 board (DT) [ 43.334017] Call trace: [ 43.334031] show_stack+0x20/0x38 (C) [ 43.334063] dump_stack_lvl+0x8c/0xd0 [ 43.334092] print_report+0x118/0x608 [ 43.334123] kasan_report+0xdc/0x128 [ 43.334151] kasan_check_range+0x100/0x1a8 [ 43.334185] __kasan_check_write+0x20/0x30 [ 43.334220] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.334252] kasan_bitops_generic+0x110/0x1c8 [ 43.334283] kunit_try_run_case+0x170/0x3f0 [ 43.334311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.334346] kthread+0x328/0x630 [ 43.334379] ret_from_fork+0x10/0x20 [ 43.334409] [ 43.406845] Allocated by task 306: [ 43.410232] kasan_save_stack+0x3c/0x68 [ 43.414050] kasan_save_track+0x20/0x40 [ 43.417869] kasan_save_alloc_info+0x40/0x58 [ 43.422122] __kasan_kmalloc+0xd4/0xd8 [ 43.425855] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.430369] kasan_bitops_generic+0xa0/0x1c8 [ 43.434622] kunit_try_run_case+0x170/0x3f0 [ 43.438789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.444258] kthread+0x328/0x630 [ 43.447469] ret_from_fork+0x10/0x20 [ 43.451028] [ 43.452504] The buggy address belongs to the object at ffff000800e200a0 [ 43.452504] which belongs to the cache kmalloc-16 of size 16 [ 43.464830] The buggy address is located 8 bytes inside of [ 43.464830] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 43.477070] [ 43.478545] The buggy address belongs to the physical page: [ 43.484103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 43.492087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.498598] page_type: f5(slab) [ 43.501730] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.509454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.517173] page dumped because: kasan: bad access detected [ 43.522728] [ 43.524204] Memory state around the buggy address: [ 43.528982] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.536187] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.543392] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.550593] ^ [ 43.555110] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.562315] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.569516] ================================================================== [ 41.718171] ================================================================== [ 41.725277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.733432] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 41.740724] [ 41.742211] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 41.742264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.742280] Hardware name: WinLink E850-96 board (DT) [ 41.742300] Call trace: [ 41.742316] show_stack+0x20/0x38 (C) [ 41.742348] dump_stack_lvl+0x8c/0xd0 [ 41.742380] print_report+0x118/0x608 [ 41.742414] kasan_report+0xdc/0x128 [ 41.742445] __asan_report_load8_noabort+0x20/0x30 [ 41.742483] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.742516] kasan_bitops_generic+0x110/0x1c8 [ 41.742548] kunit_try_run_case+0x170/0x3f0 [ 41.742580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.742613] kthread+0x328/0x630 [ 41.742644] ret_from_fork+0x10/0x20 [ 41.742677] [ 41.811730] Allocated by task 306: [ 41.815117] kasan_save_stack+0x3c/0x68 [ 41.818935] kasan_save_track+0x20/0x40 [ 41.822754] kasan_save_alloc_info+0x40/0x58 [ 41.827008] __kasan_kmalloc+0xd4/0xd8 [ 41.830740] __kmalloc_cache_noprof+0x15c/0x3c0 [ 41.835254] kasan_bitops_generic+0xa0/0x1c8 [ 41.839507] kunit_try_run_case+0x170/0x3f0 [ 41.843674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.849143] kthread+0x328/0x630 [ 41.852354] ret_from_fork+0x10/0x20 [ 41.855914] [ 41.857391] The buggy address belongs to the object at ffff000800e200a0 [ 41.857391] which belongs to the cache kmalloc-16 of size 16 [ 41.869718] The buggy address is located 8 bytes inside of [ 41.869718] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 41.881955] [ 41.883431] The buggy address belongs to the physical page: [ 41.888989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 41.896973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.903483] page_type: f5(slab) [ 41.906615] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.914339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.922058] page dumped because: kasan: bad access detected [ 41.927613] [ 41.929089] Memory state around the buggy address: [ 41.933869] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.941072] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 41.948277] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.955478] ^ [ 41.959995] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.967200] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.974402] ==================================================================