Date
May 15, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 |
[ 44.107415] ================================================================== [ 44.114475] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.123328] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 44.130706] [ 44.132187] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 44.132236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.132252] Hardware name: WinLink E850-96 board (DT) [ 44.132268] Call trace: [ 44.132281] show_stack+0x20/0x38 (C) [ 44.132313] dump_stack_lvl+0x8c/0xd0 [ 44.132343] print_report+0x118/0x608 [ 44.132373] kasan_report+0xdc/0x128 [ 44.132405] kasan_check_range+0x100/0x1a8 [ 44.132438] __kasan_check_write+0x20/0x30 [ 44.132473] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.132511] kasan_bitops_generic+0x11c/0x1c8 [ 44.132543] kunit_try_run_case+0x170/0x3f0 [ 44.132573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.132607] kthread+0x328/0x630 [ 44.132639] ret_from_fork+0x10/0x20 [ 44.132670] [ 44.205791] Allocated by task 306: [ 44.209178] kasan_save_stack+0x3c/0x68 [ 44.212996] kasan_save_track+0x20/0x40 [ 44.216816] kasan_save_alloc_info+0x40/0x58 [ 44.221069] __kasan_kmalloc+0xd4/0xd8 [ 44.224802] __kmalloc_cache_noprof+0x15c/0x3c0 [ 44.229315] kasan_bitops_generic+0xa0/0x1c8 [ 44.233569] kunit_try_run_case+0x170/0x3f0 [ 44.237735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.243204] kthread+0x328/0x630 [ 44.246416] ret_from_fork+0x10/0x20 [ 44.249975] [ 44.251450] The buggy address belongs to the object at ffff000800e200a0 [ 44.251450] which belongs to the cache kmalloc-16 of size 16 [ 44.263780] The buggy address is located 8 bytes inside of [ 44.263780] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 44.276016] [ 44.277492] The buggy address belongs to the physical page: [ 44.283047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 44.291033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.297545] page_type: f5(slab) [ 44.300677] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.308401] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.316120] page dumped because: kasan: bad access detected [ 44.321675] [ 44.323150] Memory state around the buggy address: [ 44.327929] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.335133] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.342338] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.349539] ^ [ 44.354057] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.361261] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.368463] ================================================================== [ 45.708252] ================================================================== [ 45.715319] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.724259] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 45.731636] [ 45.733118] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 45.733166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.733182] Hardware name: WinLink E850-96 board (DT) [ 45.733202] Call trace: [ 45.733216] show_stack+0x20/0x38 (C) [ 45.733246] dump_stack_lvl+0x8c/0xd0 [ 45.733277] print_report+0x118/0x608 [ 45.733307] kasan_report+0xdc/0x128 [ 45.733338] kasan_check_range+0x100/0x1a8 [ 45.733371] __kasan_check_write+0x20/0x30 [ 45.733405] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.733440] kasan_bitops_generic+0x11c/0x1c8 [ 45.733472] kunit_try_run_case+0x170/0x3f0 [ 45.733504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.733538] kthread+0x328/0x630 [ 45.733572] ret_from_fork+0x10/0x20 [ 45.733602] [ 45.806809] Allocated by task 306: [ 45.810196] kasan_save_stack+0x3c/0x68 [ 45.814014] kasan_save_track+0x20/0x40 [ 45.817833] kasan_save_alloc_info+0x40/0x58 [ 45.822087] __kasan_kmalloc+0xd4/0xd8 [ 45.825819] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.830333] kasan_bitops_generic+0xa0/0x1c8 [ 45.834586] kunit_try_run_case+0x170/0x3f0 [ 45.838753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.844222] kthread+0x328/0x630 [ 45.847433] ret_from_fork+0x10/0x20 [ 45.850992] [ 45.852469] The buggy address belongs to the object at ffff000800e200a0 [ 45.852469] which belongs to the cache kmalloc-16 of size 16 [ 45.864796] The buggy address is located 8 bytes inside of [ 45.864796] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 45.877034] [ 45.878509] The buggy address belongs to the physical page: [ 45.884067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 45.892051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.898561] page_type: f5(slab) [ 45.901694] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.909418] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.917137] page dumped because: kasan: bad access detected [ 45.922693] [ 45.924168] Memory state around the buggy address: [ 45.928949] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.936151] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.943356] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.950557] ^ [ 45.955074] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.962279] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.969480] ================================================================== [ 44.909481] ================================================================== [ 44.916546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.925486] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 44.932777] [ 44.934257] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 44.934306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.934322] Hardware name: WinLink E850-96 board (DT) [ 44.934339] Call trace: [ 44.934352] show_stack+0x20/0x38 (C) [ 44.934384] dump_stack_lvl+0x8c/0xd0 [ 44.934417] print_report+0x118/0x608 [ 44.934449] kasan_report+0xdc/0x128 [ 44.934477] __asan_report_load8_noabort+0x20/0x30 [ 44.934512] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.934545] kasan_bitops_generic+0x11c/0x1c8 [ 44.934575] kunit_try_run_case+0x170/0x3f0 [ 44.934605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.934638] kthread+0x328/0x630 [ 44.934670] ret_from_fork+0x10/0x20 [ 44.934701] [ 45.004564] Allocated by task 306: [ 45.007950] kasan_save_stack+0x3c/0x68 [ 45.011769] kasan_save_track+0x20/0x40 [ 45.015588] kasan_save_alloc_info+0x40/0x58 [ 45.019841] __kasan_kmalloc+0xd4/0xd8 [ 45.023574] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.028088] kasan_bitops_generic+0xa0/0x1c8 [ 45.032341] kunit_try_run_case+0x170/0x3f0 [ 45.036508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.041977] kthread+0x328/0x630 [ 45.045189] ret_from_fork+0x10/0x20 [ 45.048748] [ 45.050223] The buggy address belongs to the object at ffff000800e200a0 [ 45.050223] which belongs to the cache kmalloc-16 of size 16 [ 45.062550] The buggy address is located 8 bytes inside of [ 45.062550] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 45.074789] [ 45.076264] The buggy address belongs to the physical page: [ 45.081821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 45.089807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.096316] page_type: f5(slab) [ 45.099449] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.107173] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.114892] page dumped because: kasan: bad access detected [ 45.120448] [ 45.121923] Memory state around the buggy address: [ 45.126701] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.133906] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.141111] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.148312] ^ [ 45.152829] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.160034] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.167235] ================================================================== [ 46.241952] ================================================================== [ 46.248991] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.257931] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 46.265222] [ 46.266703] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 46.266751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.266766] Hardware name: WinLink E850-96 board (DT) [ 46.266784] Call trace: [ 46.266794] show_stack+0x20/0x38 (C) [ 46.266826] dump_stack_lvl+0x8c/0xd0 [ 46.266856] print_report+0x118/0x608 [ 46.266889] kasan_report+0xdc/0x128 [ 46.266919] __asan_report_load8_noabort+0x20/0x30 [ 46.266955] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.266990] kasan_bitops_generic+0x11c/0x1c8 [ 46.267021] kunit_try_run_case+0x170/0x3f0 [ 46.267052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.267086] kthread+0x328/0x630 [ 46.267118] ret_from_fork+0x10/0x20 [ 46.267148] [ 46.337009] Allocated by task 306: [ 46.340395] kasan_save_stack+0x3c/0x68 [ 46.344214] kasan_save_track+0x20/0x40 [ 46.348034] kasan_save_alloc_info+0x40/0x58 [ 46.352287] __kasan_kmalloc+0xd4/0xd8 [ 46.356019] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.360533] kasan_bitops_generic+0xa0/0x1c8 [ 46.364787] kunit_try_run_case+0x170/0x3f0 [ 46.368953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.374422] kthread+0x328/0x630 [ 46.377634] ret_from_fork+0x10/0x20 [ 46.381193] [ 46.382668] The buggy address belongs to the object at ffff000800e200a0 [ 46.382668] which belongs to the cache kmalloc-16 of size 16 [ 46.394995] The buggy address is located 8 bytes inside of [ 46.394995] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 46.407234] [ 46.408710] The buggy address belongs to the physical page: [ 46.414267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 46.422251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.428761] page_type: f5(slab) [ 46.431894] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.439618] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.447338] page dumped because: kasan: bad access detected [ 46.452893] [ 46.454368] Memory state around the buggy address: [ 46.459147] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.466352] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.473556] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.480757] ^ [ 46.485274] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.492480] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.499680] ================================================================== [ 44.375813] ================================================================== [ 44.382873] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.391813] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 44.399104] [ 44.400584] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 44.400633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.400649] Hardware name: WinLink E850-96 board (DT) [ 44.400667] Call trace: [ 44.400679] show_stack+0x20/0x38 (C) [ 44.400711] dump_stack_lvl+0x8c/0xd0 [ 44.400741] print_report+0x118/0x608 [ 44.400772] kasan_report+0xdc/0x128 [ 44.400804] __asan_report_load8_noabort+0x20/0x30 [ 44.400838] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.400877] kasan_bitops_generic+0x11c/0x1c8 [ 44.400908] kunit_try_run_case+0x170/0x3f0 [ 44.400936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.400970] kthread+0x328/0x630 [ 44.401000] ret_from_fork+0x10/0x20 [ 44.401031] [ 44.470891] Allocated by task 306: [ 44.474277] kasan_save_stack+0x3c/0x68 [ 44.478096] kasan_save_track+0x20/0x40 [ 44.481916] kasan_save_alloc_info+0x40/0x58 [ 44.486169] __kasan_kmalloc+0xd4/0xd8 [ 44.489902] __kmalloc_cache_noprof+0x15c/0x3c0 [ 44.494416] kasan_bitops_generic+0xa0/0x1c8 [ 44.498669] kunit_try_run_case+0x170/0x3f0 [ 44.502835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.508304] kthread+0x328/0x630 [ 44.511516] ret_from_fork+0x10/0x20 [ 44.515075] [ 44.516550] The buggy address belongs to the object at ffff000800e200a0 [ 44.516550] which belongs to the cache kmalloc-16 of size 16 [ 44.528877] The buggy address is located 8 bytes inside of [ 44.528877] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 44.541116] [ 44.542592] The buggy address belongs to the physical page: [ 44.548148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 44.556133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.562644] page_type: f5(slab) [ 44.565777] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.573501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.581220] page dumped because: kasan: bad access detected [ 44.586775] [ 44.588250] Memory state around the buggy address: [ 44.593029] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.600234] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.607439] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.614639] ^ [ 44.619157] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.626362] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.633563] ================================================================== [ 45.174610] ================================================================== [ 45.181646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.190586] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 45.197964] [ 45.199446] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 45.199496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.199513] Hardware name: WinLink E850-96 board (DT) [ 45.199532] Call trace: [ 45.199544] show_stack+0x20/0x38 (C) [ 45.199577] dump_stack_lvl+0x8c/0xd0 [ 45.199609] print_report+0x118/0x608 [ 45.199639] kasan_report+0xdc/0x128 [ 45.199671] kasan_check_range+0x100/0x1a8 [ 45.199704] __kasan_check_write+0x20/0x30 [ 45.199737] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.199775] kasan_bitops_generic+0x11c/0x1c8 [ 45.199805] kunit_try_run_case+0x170/0x3f0 [ 45.199837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.199871] kthread+0x328/0x630 [ 45.199904] ret_from_fork+0x10/0x20 [ 45.199934] [ 45.273136] Allocated by task 306: [ 45.276523] kasan_save_stack+0x3c/0x68 [ 45.280341] kasan_save_track+0x20/0x40 [ 45.284161] kasan_save_alloc_info+0x40/0x58 [ 45.288414] __kasan_kmalloc+0xd4/0xd8 [ 45.292147] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.296660] kasan_bitops_generic+0xa0/0x1c8 [ 45.300914] kunit_try_run_case+0x170/0x3f0 [ 45.305081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.310549] kthread+0x328/0x630 [ 45.313761] ret_from_fork+0x10/0x20 [ 45.317320] [ 45.318795] The buggy address belongs to the object at ffff000800e200a0 [ 45.318795] which belongs to the cache kmalloc-16 of size 16 [ 45.331124] The buggy address is located 8 bytes inside of [ 45.331124] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 45.343361] [ 45.344837] The buggy address belongs to the physical page: [ 45.350396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 45.358378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.364890] page_type: f5(slab) [ 45.368021] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.375746] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.383465] page dumped because: kasan: bad access detected [ 45.389020] [ 45.390496] Memory state around the buggy address: [ 45.395276] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.402479] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.409683] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.416884] ^ [ 45.421402] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.428607] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.435808] ================================================================== [ 45.443129] ================================================================== [ 45.450219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.459158] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 45.466449] [ 45.467929] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 45.467977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.467995] Hardware name: WinLink E850-96 board (DT) [ 45.468012] Call trace: [ 45.468026] show_stack+0x20/0x38 (C) [ 45.468059] dump_stack_lvl+0x8c/0xd0 [ 45.468088] print_report+0x118/0x608 [ 45.468120] kasan_report+0xdc/0x128 [ 45.468151] __asan_report_load8_noabort+0x20/0x30 [ 45.468188] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.468224] kasan_bitops_generic+0x11c/0x1c8 [ 45.468254] kunit_try_run_case+0x170/0x3f0 [ 45.468284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.468318] kthread+0x328/0x630 [ 45.468349] ret_from_fork+0x10/0x20 [ 45.468379] [ 45.538236] Allocated by task 306: [ 45.541622] kasan_save_stack+0x3c/0x68 [ 45.545441] kasan_save_track+0x20/0x40 [ 45.549261] kasan_save_alloc_info+0x40/0x58 [ 45.553514] __kasan_kmalloc+0xd4/0xd8 [ 45.557247] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.561761] kasan_bitops_generic+0xa0/0x1c8 [ 45.566014] kunit_try_run_case+0x170/0x3f0 [ 45.570181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.575649] kthread+0x328/0x630 [ 45.578861] ret_from_fork+0x10/0x20 [ 45.582420] [ 45.583896] The buggy address belongs to the object at ffff000800e200a0 [ 45.583896] which belongs to the cache kmalloc-16 of size 16 [ 45.596224] The buggy address is located 8 bytes inside of [ 45.596224] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 45.608461] [ 45.609937] The buggy address belongs to the physical page: [ 45.615493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 45.623479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.629989] page_type: f5(slab) [ 45.633122] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.640846] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.648564] page dumped because: kasan: bad access detected [ 45.654120] [ 45.655596] Memory state around the buggy address: [ 45.660375] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.667579] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.674783] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.681984] ^ [ 45.686502] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.693707] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.700908] ================================================================== [ 44.640940] ================================================================== [ 44.647975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.656913] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 44.664292] [ 44.665772] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 44.665819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.665837] Hardware name: WinLink E850-96 board (DT) [ 44.665855] Call trace: [ 44.665866] show_stack+0x20/0x38 (C) [ 44.665898] dump_stack_lvl+0x8c/0xd0 [ 44.665929] print_report+0x118/0x608 [ 44.665960] kasan_report+0xdc/0x128 [ 44.665990] kasan_check_range+0x100/0x1a8 [ 44.666022] __kasan_check_write+0x20/0x30 [ 44.666056] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.666091] kasan_bitops_generic+0x11c/0x1c8 [ 44.666124] kunit_try_run_case+0x170/0x3f0 [ 44.666156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.666190] kthread+0x328/0x630 [ 44.666223] ret_from_fork+0x10/0x20 [ 44.666252] [ 44.739464] Allocated by task 306: [ 44.742849] kasan_save_stack+0x3c/0x68 [ 44.746669] kasan_save_track+0x20/0x40 [ 44.750488] kasan_save_alloc_info+0x40/0x58 [ 44.754742] __kasan_kmalloc+0xd4/0xd8 [ 44.758474] __kmalloc_cache_noprof+0x15c/0x3c0 [ 44.762988] kasan_bitops_generic+0xa0/0x1c8 [ 44.767241] kunit_try_run_case+0x170/0x3f0 [ 44.771408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.776877] kthread+0x328/0x630 [ 44.780088] ret_from_fork+0x10/0x20 [ 44.783647] [ 44.785123] The buggy address belongs to the object at ffff000800e200a0 [ 44.785123] which belongs to the cache kmalloc-16 of size 16 [ 44.797449] The buggy address is located 8 bytes inside of [ 44.797449] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 44.809689] [ 44.811164] The buggy address belongs to the physical page: [ 44.816722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 44.824709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.831216] page_type: f5(slab) [ 44.834349] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.842073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.849792] page dumped because: kasan: bad access detected [ 44.855347] [ 44.856823] Memory state around the buggy address: [ 44.861601] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.868806] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.876011] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.883212] ^ [ 44.887729] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.894934] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.902135] ================================================================== [ 45.976828] ================================================================== [ 45.983891] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 45.992831] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 46.000122] [ 46.001603] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 46.001650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.001664] Hardware name: WinLink E850-96 board (DT) [ 46.001684] Call trace: [ 46.001697] show_stack+0x20/0x38 (C) [ 46.001726] dump_stack_lvl+0x8c/0xd0 [ 46.001757] print_report+0x118/0x608 [ 46.001789] kasan_report+0xdc/0x128 [ 46.001819] __asan_report_load8_noabort+0x20/0x30 [ 46.001855] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 46.001894] kasan_bitops_generic+0x11c/0x1c8 [ 46.001925] kunit_try_run_case+0x170/0x3f0 [ 46.001955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.001988] kthread+0x328/0x630 [ 46.002019] ret_from_fork+0x10/0x20 [ 46.002049] [ 46.071909] Allocated by task 306: [ 46.075294] kasan_save_stack+0x3c/0x68 [ 46.079114] kasan_save_track+0x20/0x40 [ 46.082934] kasan_save_alloc_info+0x40/0x58 [ 46.087187] __kasan_kmalloc+0xd4/0xd8 [ 46.090919] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.095433] kasan_bitops_generic+0xa0/0x1c8 [ 46.099686] kunit_try_run_case+0x170/0x3f0 [ 46.103853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.109322] kthread+0x328/0x630 [ 46.112533] ret_from_fork+0x10/0x20 [ 46.116093] [ 46.117568] The buggy address belongs to the object at ffff000800e200a0 [ 46.117568] which belongs to the cache kmalloc-16 of size 16 [ 46.129895] The buggy address is located 8 bytes inside of [ 46.129895] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 46.142134] [ 46.143609] The buggy address belongs to the physical page: [ 46.149167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 46.157152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.163661] page_type: f5(slab) [ 46.166794] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.174518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.182237] page dumped because: kasan: bad access detected [ 46.187792] [ 46.189268] Memory state around the buggy address: [ 46.194048] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.201251] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.208456] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.215657] ^ [ 46.220174] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.227379] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.234580] ==================================================================