Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 |
[ 70.005340] ================================================================== [ 70.012603] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b10/0x1d70 [ 70.020050] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 70.026733] [ 70.028228] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 70.028259] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.028259] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.028289] Call trace: [ 70.028289] unwind_backtrace from show_stack+0x18/0x1c [ 70.028320] show_stack from dump_stack_lvl+0x70/0x90 [ 70.028350] dump_stack_lvl from print_report+0x158/0x528 [ 70.028350] print_report from kasan_report+0xdc/0x118 [ 70.028381] kasan_report from kasan_bitops_generic+0x1b10/0x1d70 [ 70.028411] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.028442] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.028472] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.028503] kthread from ret_from_fork+0x14/0x20 [ 70.028503] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 70.028533] 3fa0: 00000000 00000000 00000000 00000000 [ 70.028533] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.028564] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.028564] [ 70.134155] Allocated by task 317: [ 70.137573] kasan_save_track+0x30/0x5c [ 70.141448] __kasan_kmalloc+0x8c/0x94 [ 70.145233] kasan_bitops_generic+0xd4/0x1d70 [ 70.149627] kunit_try_run_case+0x22c/0x5a8 [ 70.153839] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.159362] kthread+0x464/0x810 [ 70.162628] ret_from_fork+0x14/0x20 [ 70.166229] [ 70.167724] The buggy address belongs to the object at cc23d380 [ 70.167724] which belongs to the cache kmalloc-64 of size 64 [ 70.179443] The buggy address is located 4 bytes inside of [ 70.179443] allocated 5-byte region [cc23d380, cc23d385) [ 70.190399] [ 70.191894] The buggy address belongs to the physical page: [ 70.197509] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 70.204772] flags: 0x0(zone=0) [ 70.207855] page_type: f5(slab) [ 70.211029] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 70.219177] raw: 00000000 [ 70.221832] page dumped because: kasan: bad access detected [ 70.227416] [ 70.228942] Memory state around the buggy address: [ 70.233764] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.240325] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.246887] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.253479] ^ [ 70.256011] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.262603] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.269165] ================================================================== [ 71.400177] ================================================================== [ 71.407440] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bac/0x1d70 [ 71.414916] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 71.421569] [ 71.423065] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 71.423095] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.423126] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.423126] Call trace: [ 71.423126] unwind_backtrace from show_stack+0x18/0x1c [ 71.423156] show_stack from dump_stack_lvl+0x70/0x90 [ 71.423187] dump_stack_lvl from print_report+0x158/0x528 [ 71.423217] print_report from kasan_report+0xdc/0x118 [ 71.423217] kasan_report from kasan_bitops_generic+0x1bac/0x1d70 [ 71.423248] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.423278] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.423309] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.423339] kthread from ret_from_fork+0x14/0x20 [ 71.423339] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 71.423370] 3fa0: 00000000 00000000 00000000 00000000 [ 71.423400] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.423400] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.423431] [ 71.528991] Allocated by task 317: [ 71.532409] kasan_save_track+0x30/0x5c [ 71.536285] __kasan_kmalloc+0x8c/0x94 [ 71.540069] kasan_bitops_generic+0xd4/0x1d70 [ 71.544464] kunit_try_run_case+0x22c/0x5a8 [ 71.548675] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.554199] kthread+0x464/0x810 [ 71.557464] ret_from_fork+0x14/0x20 [ 71.561065] [ 71.562591] The buggy address belongs to the object at cc23d380 [ 71.562591] which belongs to the cache kmalloc-64 of size 64 [ 71.574310] The buggy address is located 4 bytes inside of [ 71.574310] allocated 5-byte region [cc23d380, cc23d385) [ 71.585235] [ 71.586730] The buggy address belongs to the physical page: [ 71.592346] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 71.599639] flags: 0x0(zone=0) [ 71.602691] page_type: f5(slab) [ 71.605865] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 71.614013] raw: 00000000 [ 71.616668] page dumped because: kasan: bad access detected [ 71.622283] [ 71.623779] Memory state around the buggy address: [ 71.628601] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.635162] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.641754] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.648315] ^ [ 71.650878] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.657440] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.664001] ================================================================== [ 70.547943] ================================================================== [ 70.571197] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bb8/0x1d70 [ 70.578643] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 70.585296] [ 70.586822] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 70.586853] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.586853] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.586853] Call trace: [ 70.586883] unwind_backtrace from show_stack+0x18/0x1c [ 70.586883] show_stack from dump_stack_lvl+0x70/0x90 [ 70.586914] dump_stack_lvl from print_report+0x158/0x528 [ 70.586944] print_report from kasan_report+0xdc/0x118 [ 70.586975] kasan_report from kasan_bitops_generic+0x1bb8/0x1d70 [ 70.587005] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.587005] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.587036] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.587066] kthread from ret_from_fork+0x14/0x20 [ 70.587097] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 70.587097] 3fa0: 00000000 00000000 00000000 00000000 [ 70.587127] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.587158] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.587158] [ 70.692718] Allocated by task 317: [ 70.696166] kasan_save_track+0x30/0x5c [ 70.700012] __kasan_kmalloc+0x8c/0x94 [ 70.703796] kasan_bitops_generic+0xd4/0x1d70 [ 70.708190] kunit_try_run_case+0x22c/0x5a8 [ 70.712432] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.717956] kthread+0x464/0x810 [ 70.721221] ret_from_fork+0x14/0x20 [ 70.724822] [ 70.726318] The buggy address belongs to the object at cc23d380 [ 70.726318] which belongs to the cache kmalloc-64 of size 64 [ 70.738037] The buggy address is located 4 bytes inside of [ 70.738037] allocated 5-byte region [cc23d380, cc23d385) [ 70.748992] [ 70.750488] The buggy address belongs to the physical page: [ 70.756103] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 70.763366] flags: 0x0(zone=0) [ 70.766448] page_type: f5(slab) [ 70.769622] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 70.777770] raw: 00000000 [ 70.780395] page dumped because: kasan: bad access detected [ 70.786010] [ 70.787506] Memory state around the buggy address: [ 70.792327] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.798919] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.805480] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.812042] ^ [ 70.814605] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.821197] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.827758] ================================================================== [ 70.835296] ================================================================== [ 70.859069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b88/0x1d70 [ 70.866516] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 70.873168] [ 70.874664] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 70.874694] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.874725] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.874725] Call trace: [ 70.874725] unwind_backtrace from show_stack+0x18/0x1c [ 70.874755] show_stack from dump_stack_lvl+0x70/0x90 [ 70.874786] dump_stack_lvl from print_report+0x158/0x528 [ 70.874816] print_report from kasan_report+0xdc/0x118 [ 70.874847] kasan_report from kasan_bitops_generic+0x1b88/0x1d70 [ 70.874847] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.874877] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.874908] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.874938] kthread from ret_from_fork+0x14/0x20 [ 70.874969] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 70.874969] 3fa0: 00000000 00000000 00000000 00000000 [ 70.874999] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.874999] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.875030] [ 70.980590] Allocated by task 317: [ 70.984008] kasan_save_track+0x30/0x5c [ 70.987884] __kasan_kmalloc+0x8c/0x94 [ 70.991668] kasan_bitops_generic+0xd4/0x1d70 [ 70.996063] kunit_try_run_case+0x22c/0x5a8 [ 71.000274] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.005828] kthread+0x464/0x810 [ 71.009063] ret_from_fork+0x14/0x20 [ 71.012664] [ 71.014190] The buggy address belongs to the object at cc23d380 [ 71.014190] which belongs to the cache kmalloc-64 of size 64 [ 71.025909] The buggy address is located 4 bytes inside of [ 71.025909] allocated 5-byte region [cc23d380, cc23d385) [ 71.036834] [ 71.038360] The buggy address belongs to the physical page: [ 71.043945] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 71.051239] flags: 0x0(zone=0) [ 71.054321] page_type: f5(slab) [ 71.057495] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 71.065612] raw: 00000000 [ 71.068267] page dumped because: kasan: bad access detected [ 71.073883] [ 71.075378] Memory state around the buggy address: [ 71.080200] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.086761] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.093353] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.099914] ^ [ 71.102478] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.109039] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.115631] ================================================================== [ 72.247497] ================================================================== [ 72.254791] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b34/0x1d70 [ 72.262237] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 72.268890] [ 72.270416] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 72.270416] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 72.270446] Hardware name: Generic DRA74X (Flattened Device Tree) [ 72.270446] Call trace: [ 72.270446] unwind_backtrace from show_stack+0x18/0x1c [ 72.270477] show_stack from dump_stack_lvl+0x70/0x90 [ 72.270507] dump_stack_lvl from print_report+0x158/0x528 [ 72.270538] print_report from kasan_report+0xdc/0x118 [ 72.270568] kasan_report from kasan_bitops_generic+0x1b34/0x1d70 [ 72.270599] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 72.270599] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.270629] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 72.270660] kthread from ret_from_fork+0x14/0x20 [ 72.270690] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 72.270690] 3fa0: 00000000 00000000 00000000 00000000 [ 72.270721] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 72.270721] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 72.270751] [ 72.376312] Allocated by task 317: [ 72.379730] kasan_save_track+0x30/0x5c [ 72.383605] __kasan_kmalloc+0x8c/0x94 [ 72.387390] kasan_bitops_generic+0xd4/0x1d70 [ 72.391784] kunit_try_run_case+0x22c/0x5a8 [ 72.395996] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.401550] kthread+0x464/0x810 [ 72.404785] ret_from_fork+0x14/0x20 [ 72.408386] [ 72.409912] The buggy address belongs to the object at cc23d380 [ 72.409912] which belongs to the cache kmalloc-64 of size 64 [ 72.421630] The buggy address is located 4 bytes inside of [ 72.421630] allocated 5-byte region [cc23d380, cc23d385) [ 72.432556] [ 72.434082] The buggy address belongs to the physical page: [ 72.439666] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 72.446960] flags: 0x0(zone=0) [ 72.450042] page_type: f5(slab) [ 72.453216] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 72.461364] raw: 00000000 [ 72.463989] page dumped because: kasan: bad access detected [ 72.469604] [ 72.471099] Memory state around the buggy address: [ 72.475921] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.482513] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.489074] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.495635] ^ [ 72.498199] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.504760] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.511352] ================================================================== [ 71.959594] ================================================================== [ 71.983612] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1abc/0x1d70 [ 71.991058] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 71.997741] [ 71.999237] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 71.999267] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.999267] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.999298] Call trace: [ 71.999298] unwind_backtrace from show_stack+0x18/0x1c [ 71.999328] show_stack from dump_stack_lvl+0x70/0x90 [ 71.999359] dump_stack_lvl from print_report+0x158/0x528 [ 71.999359] print_report from kasan_report+0xdc/0x118 [ 71.999389] kasan_report from kasan_bitops_generic+0x1abc/0x1d70 [ 71.999420] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.999450] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.999481] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.999511] kthread from ret_from_fork+0x14/0x20 [ 71.999511] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 71.999542] 3fa0: 00000000 00000000 00000000 00000000 [ 71.999542] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.999572] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.999572] [ 72.105163] Allocated by task 317: [ 72.108581] kasan_save_track+0x30/0x5c [ 72.112457] __kasan_kmalloc+0x8c/0x94 [ 72.116241] kasan_bitops_generic+0xd4/0x1d70 [ 72.120635] kunit_try_run_case+0x22c/0x5a8 [ 72.124847] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.130371] kthread+0x464/0x810 [ 72.133636] ret_from_fork+0x14/0x20 [ 72.137237] [ 72.138732] The buggy address belongs to the object at cc23d380 [ 72.138732] which belongs to the cache kmalloc-64 of size 64 [ 72.150482] The buggy address is located 4 bytes inside of [ 72.150482] allocated 5-byte region [cc23d380, cc23d385) [ 72.161407] [ 72.162902] The buggy address belongs to the physical page: [ 72.168518] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 72.175811] flags: 0x0(zone=0) [ 72.178863] page_type: f5(slab) [ 72.182037] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 72.190185] raw: 00000000 [ 72.192840] page dumped because: kasan: bad access detected [ 72.198425] [ 72.199951] Memory state around the buggy address: [ 72.204772] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.211334] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.217895] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.224487] ^ [ 72.227020] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.233612] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.240173] ================================================================== [ 69.450897] ================================================================== [ 69.458190] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x438/0x1d70 [ 69.465545] Write of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 69.472290] [ 69.473785] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 69.473815] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.473846] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.473846] Call trace: [ 69.473846] unwind_backtrace from show_stack+0x18/0x1c [ 69.473876] show_stack from dump_stack_lvl+0x70/0x90 [ 69.473907] dump_stack_lvl from print_report+0x158/0x528 [ 69.473937] print_report from kasan_report+0xdc/0x118 [ 69.473968] kasan_report from kasan_check_range+0x14c/0x198 [ 69.473968] kasan_check_range from kasan_bitops_generic+0x438/0x1d70 [ 69.473999] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.474029] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.474060] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.474090] kthread from ret_from_fork+0x14/0x20 [ 69.474090] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 69.474121] 3fa0: 00000000 00000000 00000000 00000000 [ 69.474151] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.474151] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.474182] [ 69.585754] Allocated by task 317: [ 69.589202] kasan_save_track+0x30/0x5c [ 69.593048] __kasan_kmalloc+0x8c/0x94 [ 69.596832] kasan_bitops_generic+0xd4/0x1d70 [ 69.601257] kunit_try_run_case+0x22c/0x5a8 [ 69.605468] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.610992] kthread+0x464/0x810 [ 69.614257] ret_from_fork+0x14/0x20 [ 69.617858] [ 69.619354] The buggy address belongs to the object at cc23d380 [ 69.619354] which belongs to the cache kmalloc-64 of size 64 [ 69.631072] The buggy address is located 4 bytes inside of [ 69.631072] allocated 5-byte region [cc23d380, cc23d385) [ 69.642028] [ 69.643524] The buggy address belongs to the physical page: [ 69.649139] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 69.656402] flags: 0x0(zone=0) [ 69.659484] page_type: f5(slab) [ 69.662658] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 69.670806] raw: 00000000 [ 69.673431] page dumped because: kasan: bad access detected [ 69.679046] [ 69.680541] Memory state around the buggy address: [ 69.685363] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.691955] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.698516] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.705108] ^ [ 69.707641] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.714233] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.720794] ================================================================== [ 71.122955] ================================================================== [ 71.130218] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x874/0x1d70 [ 71.137603] Write of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 71.144348] [ 71.145843] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 71.145874] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.145874] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.145904] Call trace: [ 71.145904] unwind_backtrace from show_stack+0x18/0x1c [ 71.145935] show_stack from dump_stack_lvl+0x70/0x90 [ 71.145965] dump_stack_lvl from print_report+0x158/0x528 [ 71.145996] print_report from kasan_report+0xdc/0x118 [ 71.145996] kasan_report from kasan_check_range+0x14c/0x198 [ 71.146026] kasan_check_range from kasan_bitops_generic+0x874/0x1d70 [ 71.146057] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.146087] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.146118] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.146148] kthread from ret_from_fork+0x14/0x20 [ 71.146148] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 71.146179] 3fa0: 00000000 00000000 00000000 00000000 [ 71.146179] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.146209] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.146209] [ 71.257812] Allocated by task 317: [ 71.261230] kasan_save_track+0x30/0x5c [ 71.265106] __kasan_kmalloc+0x8c/0x94 [ 71.268890] kasan_bitops_generic+0xd4/0x1d70 [ 71.273284] kunit_try_run_case+0x22c/0x5a8 [ 71.277526] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.283050] kthread+0x464/0x810 [ 71.286285] ret_from_fork+0x14/0x20 [ 71.289916] [ 71.291412] The buggy address belongs to the object at cc23d380 [ 71.291412] which belongs to the cache kmalloc-64 of size 64 [ 71.303131] The buggy address is located 4 bytes inside of [ 71.303131] allocated 5-byte region [cc23d380, cc23d385) [ 71.314086] [ 71.315582] The buggy address belongs to the physical page: [ 71.321197] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 71.328460] flags: 0x0(zone=0) [ 71.331542] page_type: f5(slab) [ 71.334716] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 71.342864] raw: 00000000 [ 71.345489] page dumped because: kasan: bad access detected [ 71.351104] [ 71.352600] Memory state around the buggy address: [ 71.357421] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.364013] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.370574] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.377136] ^ [ 71.379699] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.386291] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.392852] ================================================================== [ 69.163848] ================================================================== [ 69.187011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bd0/0x1d70 [ 69.194458] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 69.201141] [ 69.202636] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 69.202667] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.202667] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.202697] Call trace: [ 69.202697] unwind_backtrace from show_stack+0x18/0x1c [ 69.202728] show_stack from dump_stack_lvl+0x70/0x90 [ 69.202758] dump_stack_lvl from print_report+0x158/0x528 [ 69.202758] print_report from kasan_report+0xdc/0x118 [ 69.202789] kasan_report from kasan_bitops_generic+0x1bd0/0x1d70 [ 69.202819] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.202850] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.202880] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.202911] kthread from ret_from_fork+0x14/0x20 [ 69.202911] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 69.202941] 3fa0: 00000000 00000000 00000000 00000000 [ 69.202941] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.202972] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.202972] [ 69.308563] Allocated by task 317: [ 69.311981] kasan_save_track+0x30/0x5c [ 69.315856] __kasan_kmalloc+0x8c/0x94 [ 69.319641] kasan_bitops_generic+0xd4/0x1d70 [ 69.324035] kunit_try_run_case+0x22c/0x5a8 [ 69.328247] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.333770] kthread+0x464/0x810 [ 69.337036] ret_from_fork+0x14/0x20 [ 69.340637] [ 69.342132] The buggy address belongs to the object at cc23d380 [ 69.342132] which belongs to the cache kmalloc-64 of size 64 [ 69.353851] The buggy address is located 4 bytes inside of [ 69.353851] allocated 5-byte region [cc23d380, cc23d385) [ 69.364807] [ 69.366302] The buggy address belongs to the physical page: [ 69.371917] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 69.379180] flags: 0x0(zone=0) [ 69.382263] page_type: f5(slab) [ 69.385437] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 69.393585] raw: 00000000 [ 69.396209] page dumped because: kasan: bad access detected [ 69.401824] [ 69.403320] Memory state around the buggy address: [ 69.408172] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.414733] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.421295] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.427886] ^ [ 69.430419] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.437011] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.443572] ================================================================== [ 71.671539] ================================================================== [ 71.695495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a80/0x1d70 [ 71.702941] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 71.709594] [ 71.711120] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 71.711151] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.711151] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.711151] Call trace: [ 71.711181] unwind_backtrace from show_stack+0x18/0x1c [ 71.711181] show_stack from dump_stack_lvl+0x70/0x90 [ 71.711212] dump_stack_lvl from print_report+0x158/0x528 [ 71.711242] print_report from kasan_report+0xdc/0x118 [ 71.711273] kasan_report from kasan_bitops_generic+0x1a80/0x1d70 [ 71.711303] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.711303] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.711334] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.711364] kthread from ret_from_fork+0x14/0x20 [ 71.711395] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 71.711395] 3fa0: 00000000 00000000 00000000 00000000 [ 71.711425] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.711456] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.711456] [ 71.817016] Allocated by task 317: [ 71.820465] kasan_save_track+0x30/0x5c [ 71.824310] __kasan_kmalloc+0x8c/0x94 [ 71.828094] kasan_bitops_generic+0xd4/0x1d70 [ 71.832489] kunit_try_run_case+0x22c/0x5a8 [ 71.836730] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.842254] kthread+0x464/0x810 [ 71.845489] ret_from_fork+0x14/0x20 [ 71.849121] [ 71.850616] The buggy address belongs to the object at cc23d380 [ 71.850616] which belongs to the cache kmalloc-64 of size 64 [ 71.862335] The buggy address is located 4 bytes inside of [ 71.862335] allocated 5-byte region [cc23d380, cc23d385) [ 71.873291] [ 71.874786] The buggy address belongs to the physical page: [ 71.880401] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 71.887664] flags: 0x0(zone=0) [ 71.890747] page_type: f5(slab) [ 71.893920] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 71.902069] raw: 00000000 [ 71.904693] page dumped because: kasan: bad access detected [ 71.910308] [ 71.911804] Memory state around the buggy address: [ 71.916625] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.923217] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.929779] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.936340] ^ [ 71.938903] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.945495] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.952056] ================================================================== [ 69.728118] ================================================================== [ 69.735382] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4e8/0x1d70 [ 69.742767] Write of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 69.749511] [ 69.751007] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 69.751037] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.751068] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.751068] Call trace: [ 69.751068] unwind_backtrace from show_stack+0x18/0x1c [ 69.751098] show_stack from dump_stack_lvl+0x70/0x90 [ 69.751129] dump_stack_lvl from print_report+0x158/0x528 [ 69.751159] print_report from kasan_report+0xdc/0x118 [ 69.751159] kasan_report from kasan_check_range+0x14c/0x198 [ 69.751190] kasan_check_range from kasan_bitops_generic+0x4e8/0x1d70 [ 69.751220] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.751251] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.751281] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.751312] kthread from ret_from_fork+0x14/0x20 [ 69.751312] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 69.751342] 3fa0: 00000000 00000000 00000000 00000000 [ 69.751342] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.751373] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.751373] [ 69.862976] Allocated by task 317: [ 69.866394] kasan_save_track+0x30/0x5c [ 69.870269] __kasan_kmalloc+0x8c/0x94 [ 69.874053] kasan_bitops_generic+0xd4/0x1d70 [ 69.878448] kunit_try_run_case+0x22c/0x5a8 [ 69.882659] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.888214] kthread+0x464/0x810 [ 69.891448] ret_from_fork+0x14/0x20 [ 69.895050] [ 69.896575] The buggy address belongs to the object at cc23d380 [ 69.896575] which belongs to the cache kmalloc-64 of size 64 [ 69.908294] The buggy address is located 4 bytes inside of [ 69.908294] allocated 5-byte region [cc23d380, cc23d385) [ 69.919250] [ 69.920745] The buggy address belongs to the physical page: [ 69.926361] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 69.933624] flags: 0x0(zone=0) [ 69.936706] page_type: f5(slab) [ 69.939880] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 69.948028] raw: 00000000 [ 69.950653] page dumped because: kasan: bad access detected [ 69.956268] [ 69.957763] Memory state around the buggy address: [ 69.962585] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.969177] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.975738] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.982299] ^ [ 69.984863] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.991424] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.998016] ================================================================== [ 68.876464] ================================================================== [ 68.899444] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a50/0x1d70 [ 68.906890] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 68.913543] [ 68.915069] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 68.915100] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 68.915100] Hardware name: Generic DRA74X (Flattened Device Tree) [ 68.915100] Call trace: [ 68.915130] unwind_backtrace from show_stack+0x18/0x1c [ 68.915161] show_stack from dump_stack_lvl+0x70/0x90 [ 68.915161] dump_stack_lvl from print_report+0x158/0x528 [ 68.915191] print_report from kasan_report+0xdc/0x118 [ 68.915222] kasan_report from kasan_bitops_generic+0x1a50/0x1d70 [ 68.915252] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 68.915283] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.915313] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 68.915313] kthread from ret_from_fork+0x14/0x20 [ 68.915344] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 68.915374] 3fa0: 00000000 00000000 00000000 00000000 [ 68.915374] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 68.915405] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 68.915405] [ 69.020996] Allocated by task 317: [ 69.024414] kasan_save_track+0x30/0x5c [ 69.028289] __kasan_kmalloc+0x8c/0x94 [ 69.032073] kasan_bitops_generic+0xd4/0x1d70 [ 69.036468] kunit_try_run_case+0x22c/0x5a8 [ 69.040679] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.046203] kthread+0x464/0x810 [ 69.049468] ret_from_fork+0x14/0x20 [ 69.053070] [ 69.054565] The buggy address belongs to the object at cc23d380 [ 69.054565] which belongs to the cache kmalloc-64 of size 64 [ 69.066314] The buggy address is located 4 bytes inside of [ 69.066314] allocated 5-byte region [cc23d380, cc23d385) [ 69.077239] [ 69.078735] The buggy address belongs to the physical page: [ 69.084350] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 69.091644] flags: 0x0(zone=0) [ 69.094696] page_type: f5(slab) [ 69.097869] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 69.106018] raw: 00000000 [ 69.108673] page dumped because: kasan: bad access detected [ 69.114288] [ 69.115783] Memory state around the buggy address: [ 69.120605] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.127166] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.133758] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.140319] ^ [ 69.142883] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.149444] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.156005] ================================================================== [ 70.276489] ================================================================== [ 70.283782] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19f8/0x1d70 [ 70.291229] Write of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 70.297973] [ 70.299468] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 70.299499] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.299530] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.299530] Call trace: [ 70.299530] unwind_backtrace from show_stack+0x18/0x1c [ 70.299560] show_stack from dump_stack_lvl+0x70/0x90 [ 70.299591] dump_stack_lvl from print_report+0x158/0x528 [ 70.299621] print_report from kasan_report+0xdc/0x118 [ 70.299652] kasan_report from kasan_bitops_generic+0x19f8/0x1d70 [ 70.299652] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.299682] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.299713] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.299743] kthread from ret_from_fork+0x14/0x20 [ 70.299774] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 70.299774] 3fa0: 00000000 00000000 00000000 00000000 [ 70.299804] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.299804] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.299835] [ 70.405395] Allocated by task 317: [ 70.408813] kasan_save_track+0x30/0x5c [ 70.412689] __kasan_kmalloc+0x8c/0x94 [ 70.416473] kasan_bitops_generic+0xd4/0x1d70 [ 70.420867] kunit_try_run_case+0x22c/0x5a8 [ 70.425079] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.430603] kthread+0x464/0x810 [ 70.433868] ret_from_fork+0x14/0x20 [ 70.437469] [ 70.438964] The buggy address belongs to the object at cc23d380 [ 70.438964] which belongs to the cache kmalloc-64 of size 64 [ 70.450714] The buggy address is located 4 bytes inside of [ 70.450714] allocated 5-byte region [cc23d380, cc23d385) [ 70.461639] [ 70.463134] The buggy address belongs to the physical page: [ 70.468749] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 70.476043] flags: 0x0(zone=0) [ 70.479095] page_type: f5(slab) [ 70.482269] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 70.490417] raw: 00000000 [ 70.493072] page dumped because: kasan: bad access detected [ 70.498687] [ 70.500183] Memory state around the buggy address: [ 70.505004] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.511566] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.518157] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.524719] ^ [ 70.527282] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.533843] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.540405] ==================================================================