Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15

[   70.005340] ==================================================================
[   70.012603] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b10/0x1d70
[   70.020050] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   70.026733] 
[   70.028228] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   70.028259] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.028259] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.028289] Call trace: 
[   70.028289]  unwind_backtrace from show_stack+0x18/0x1c
[   70.028320]  show_stack from dump_stack_lvl+0x70/0x90
[   70.028350]  dump_stack_lvl from print_report+0x158/0x528
[   70.028350]  print_report from kasan_report+0xdc/0x118
[   70.028381]  kasan_report from kasan_bitops_generic+0x1b10/0x1d70
[   70.028411]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.028442]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.028472]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.028503]  kthread from ret_from_fork+0x14/0x20
[   70.028503] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   70.028533] 3fa0:                                     00000000 00000000 00000000 00000000
[   70.028533] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.028564] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.028564] 
[   70.134155] Allocated by task 317:
[   70.137573]  kasan_save_track+0x30/0x5c
[   70.141448]  __kasan_kmalloc+0x8c/0x94
[   70.145233]  kasan_bitops_generic+0xd4/0x1d70
[   70.149627]  kunit_try_run_case+0x22c/0x5a8
[   70.153839]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.159362]  kthread+0x464/0x810
[   70.162628]  ret_from_fork+0x14/0x20
[   70.166229] 
[   70.167724] The buggy address belongs to the object at cc23d380
[   70.167724]  which belongs to the cache kmalloc-64 of size 64
[   70.179443] The buggy address is located 4 bytes inside of
[   70.179443]  allocated 5-byte region [cc23d380, cc23d385)
[   70.190399] 
[   70.191894] The buggy address belongs to the physical page:
[   70.197509] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   70.204772] flags: 0x0(zone=0)
[   70.207855] page_type: f5(slab)
[   70.211029] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   70.219177] raw: 00000000
[   70.221832] page dumped because: kasan: bad access detected
[   70.227416] 
[   70.228942] Memory state around the buggy address:
[   70.233764]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.240325]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.246887] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.253479]            ^
[   70.256011]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.262603]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.269165] ==================================================================
[   71.400177] ==================================================================
[   71.407440] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bac/0x1d70
[   71.414916] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   71.421569] 
[   71.423065] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   71.423095] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.423126] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.423126] Call trace: 
[   71.423126]  unwind_backtrace from show_stack+0x18/0x1c
[   71.423156]  show_stack from dump_stack_lvl+0x70/0x90
[   71.423187]  dump_stack_lvl from print_report+0x158/0x528
[   71.423217]  print_report from kasan_report+0xdc/0x118
[   71.423217]  kasan_report from kasan_bitops_generic+0x1bac/0x1d70
[   71.423248]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.423278]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.423309]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.423339]  kthread from ret_from_fork+0x14/0x20
[   71.423339] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   71.423370] 3fa0:                                     00000000 00000000 00000000 00000000
[   71.423400] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.423400] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.423431] 
[   71.528991] Allocated by task 317:
[   71.532409]  kasan_save_track+0x30/0x5c
[   71.536285]  __kasan_kmalloc+0x8c/0x94
[   71.540069]  kasan_bitops_generic+0xd4/0x1d70
[   71.544464]  kunit_try_run_case+0x22c/0x5a8
[   71.548675]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.554199]  kthread+0x464/0x810
[   71.557464]  ret_from_fork+0x14/0x20
[   71.561065] 
[   71.562591] The buggy address belongs to the object at cc23d380
[   71.562591]  which belongs to the cache kmalloc-64 of size 64
[   71.574310] The buggy address is located 4 bytes inside of
[   71.574310]  allocated 5-byte region [cc23d380, cc23d385)
[   71.585235] 
[   71.586730] The buggy address belongs to the physical page:
[   71.592346] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   71.599639] flags: 0x0(zone=0)
[   71.602691] page_type: f5(slab)
[   71.605865] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   71.614013] raw: 00000000
[   71.616668] page dumped because: kasan: bad access detected
[   71.622283] 
[   71.623779] Memory state around the buggy address:
[   71.628601]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.635162]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.641754] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.648315]            ^
[   71.650878]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.657440]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.664001] ==================================================================
[   70.547943] ==================================================================
[   70.571197] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bb8/0x1d70
[   70.578643] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   70.585296] 
[   70.586822] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   70.586853] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.586853] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.586853] Call trace: 
[   70.586883]  unwind_backtrace from show_stack+0x18/0x1c
[   70.586883]  show_stack from dump_stack_lvl+0x70/0x90
[   70.586914]  dump_stack_lvl from print_report+0x158/0x528
[   70.586944]  print_report from kasan_report+0xdc/0x118
[   70.586975]  kasan_report from kasan_bitops_generic+0x1bb8/0x1d70
[   70.587005]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.587005]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.587036]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.587066]  kthread from ret_from_fork+0x14/0x20
[   70.587097] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   70.587097] 3fa0:                                     00000000 00000000 00000000 00000000
[   70.587127] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.587158] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.587158] 
[   70.692718] Allocated by task 317:
[   70.696166]  kasan_save_track+0x30/0x5c
[   70.700012]  __kasan_kmalloc+0x8c/0x94
[   70.703796]  kasan_bitops_generic+0xd4/0x1d70
[   70.708190]  kunit_try_run_case+0x22c/0x5a8
[   70.712432]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.717956]  kthread+0x464/0x810
[   70.721221]  ret_from_fork+0x14/0x20
[   70.724822] 
[   70.726318] The buggy address belongs to the object at cc23d380
[   70.726318]  which belongs to the cache kmalloc-64 of size 64
[   70.738037] The buggy address is located 4 bytes inside of
[   70.738037]  allocated 5-byte region [cc23d380, cc23d385)
[   70.748992] 
[   70.750488] The buggy address belongs to the physical page:
[   70.756103] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   70.763366] flags: 0x0(zone=0)
[   70.766448] page_type: f5(slab)
[   70.769622] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   70.777770] raw: 00000000
[   70.780395] page dumped because: kasan: bad access detected
[   70.786010] 
[   70.787506] Memory state around the buggy address:
[   70.792327]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.798919]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.805480] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.812042]            ^
[   70.814605]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.821197]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.827758] ==================================================================
[   70.835296] ==================================================================
[   70.859069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b88/0x1d70
[   70.866516] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   70.873168] 
[   70.874664] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   70.874694] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.874725] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.874725] Call trace: 
[   70.874725]  unwind_backtrace from show_stack+0x18/0x1c
[   70.874755]  show_stack from dump_stack_lvl+0x70/0x90
[   70.874786]  dump_stack_lvl from print_report+0x158/0x528
[   70.874816]  print_report from kasan_report+0xdc/0x118
[   70.874847]  kasan_report from kasan_bitops_generic+0x1b88/0x1d70
[   70.874847]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.874877]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.874908]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.874938]  kthread from ret_from_fork+0x14/0x20
[   70.874969] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   70.874969] 3fa0:                                     00000000 00000000 00000000 00000000
[   70.874999] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.874999] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.875030] 
[   70.980590] Allocated by task 317:
[   70.984008]  kasan_save_track+0x30/0x5c
[   70.987884]  __kasan_kmalloc+0x8c/0x94
[   70.991668]  kasan_bitops_generic+0xd4/0x1d70
[   70.996063]  kunit_try_run_case+0x22c/0x5a8
[   71.000274]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.005828]  kthread+0x464/0x810
[   71.009063]  ret_from_fork+0x14/0x20
[   71.012664] 
[   71.014190] The buggy address belongs to the object at cc23d380
[   71.014190]  which belongs to the cache kmalloc-64 of size 64
[   71.025909] The buggy address is located 4 bytes inside of
[   71.025909]  allocated 5-byte region [cc23d380, cc23d385)
[   71.036834] 
[   71.038360] The buggy address belongs to the physical page:
[   71.043945] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   71.051239] flags: 0x0(zone=0)
[   71.054321] page_type: f5(slab)
[   71.057495] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   71.065612] raw: 00000000
[   71.068267] page dumped because: kasan: bad access detected
[   71.073883] 
[   71.075378] Memory state around the buggy address:
[   71.080200]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.086761]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.093353] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.099914]            ^
[   71.102478]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.109039]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.115631] ==================================================================
[   72.247497] ==================================================================
[   72.254791] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b34/0x1d70
[   72.262237] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   72.268890] 
[   72.270416] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   72.270416] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   72.270446] Hardware name: Generic DRA74X (Flattened Device Tree)
[   72.270446] Call trace: 
[   72.270446]  unwind_backtrace from show_stack+0x18/0x1c
[   72.270477]  show_stack from dump_stack_lvl+0x70/0x90
[   72.270507]  dump_stack_lvl from print_report+0x158/0x528
[   72.270538]  print_report from kasan_report+0xdc/0x118
[   72.270568]  kasan_report from kasan_bitops_generic+0x1b34/0x1d70
[   72.270599]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   72.270599]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.270629]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   72.270660]  kthread from ret_from_fork+0x14/0x20
[   72.270690] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   72.270690] 3fa0:                                     00000000 00000000 00000000 00000000
[   72.270721] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   72.270721] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   72.270751] 
[   72.376312] Allocated by task 317:
[   72.379730]  kasan_save_track+0x30/0x5c
[   72.383605]  __kasan_kmalloc+0x8c/0x94
[   72.387390]  kasan_bitops_generic+0xd4/0x1d70
[   72.391784]  kunit_try_run_case+0x22c/0x5a8
[   72.395996]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.401550]  kthread+0x464/0x810
[   72.404785]  ret_from_fork+0x14/0x20
[   72.408386] 
[   72.409912] The buggy address belongs to the object at cc23d380
[   72.409912]  which belongs to the cache kmalloc-64 of size 64
[   72.421630] The buggy address is located 4 bytes inside of
[   72.421630]  allocated 5-byte region [cc23d380, cc23d385)
[   72.432556] 
[   72.434082] The buggy address belongs to the physical page:
[   72.439666] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   72.446960] flags: 0x0(zone=0)
[   72.450042] page_type: f5(slab)
[   72.453216] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   72.461364] raw: 00000000
[   72.463989] page dumped because: kasan: bad access detected
[   72.469604] 
[   72.471099] Memory state around the buggy address:
[   72.475921]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.482513]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.489074] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.495635]            ^
[   72.498199]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.504760]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.511352] ==================================================================
[   71.959594] ==================================================================
[   71.983612] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1abc/0x1d70
[   71.991058] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   71.997741] 
[   71.999237] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   71.999267] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.999267] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.999298] Call trace: 
[   71.999298]  unwind_backtrace from show_stack+0x18/0x1c
[   71.999328]  show_stack from dump_stack_lvl+0x70/0x90
[   71.999359]  dump_stack_lvl from print_report+0x158/0x528
[   71.999359]  print_report from kasan_report+0xdc/0x118
[   71.999389]  kasan_report from kasan_bitops_generic+0x1abc/0x1d70
[   71.999420]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.999450]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.999481]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.999511]  kthread from ret_from_fork+0x14/0x20
[   71.999511] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   71.999542] 3fa0:                                     00000000 00000000 00000000 00000000
[   71.999542] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.999572] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.999572] 
[   72.105163] Allocated by task 317:
[   72.108581]  kasan_save_track+0x30/0x5c
[   72.112457]  __kasan_kmalloc+0x8c/0x94
[   72.116241]  kasan_bitops_generic+0xd4/0x1d70
[   72.120635]  kunit_try_run_case+0x22c/0x5a8
[   72.124847]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.130371]  kthread+0x464/0x810
[   72.133636]  ret_from_fork+0x14/0x20
[   72.137237] 
[   72.138732] The buggy address belongs to the object at cc23d380
[   72.138732]  which belongs to the cache kmalloc-64 of size 64
[   72.150482] The buggy address is located 4 bytes inside of
[   72.150482]  allocated 5-byte region [cc23d380, cc23d385)
[   72.161407] 
[   72.162902] The buggy address belongs to the physical page:
[   72.168518] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   72.175811] flags: 0x0(zone=0)
[   72.178863] page_type: f5(slab)
[   72.182037] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   72.190185] raw: 00000000
[   72.192840] page dumped because: kasan: bad access detected
[   72.198425] 
[   72.199951] Memory state around the buggy address:
[   72.204772]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.211334]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.217895] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.224487]            ^
[   72.227020]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.233612]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.240173] ==================================================================
[   69.450897] ==================================================================
[   69.458190] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x438/0x1d70
[   69.465545] Write of size 4 at addr cc23d384 by task kunit_try_catch/317
[   69.472290] 
[   69.473785] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   69.473815] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.473846] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.473846] Call trace: 
[   69.473846]  unwind_backtrace from show_stack+0x18/0x1c
[   69.473876]  show_stack from dump_stack_lvl+0x70/0x90
[   69.473907]  dump_stack_lvl from print_report+0x158/0x528
[   69.473937]  print_report from kasan_report+0xdc/0x118
[   69.473968]  kasan_report from kasan_check_range+0x14c/0x198
[   69.473968]  kasan_check_range from kasan_bitops_generic+0x438/0x1d70
[   69.473999]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.474029]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.474060]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.474090]  kthread from ret_from_fork+0x14/0x20
[   69.474090] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   69.474121] 3fa0:                                     00000000 00000000 00000000 00000000
[   69.474151] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.474151] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.474182] 
[   69.585754] Allocated by task 317:
[   69.589202]  kasan_save_track+0x30/0x5c
[   69.593048]  __kasan_kmalloc+0x8c/0x94
[   69.596832]  kasan_bitops_generic+0xd4/0x1d70
[   69.601257]  kunit_try_run_case+0x22c/0x5a8
[   69.605468]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.610992]  kthread+0x464/0x810
[   69.614257]  ret_from_fork+0x14/0x20
[   69.617858] 
[   69.619354] The buggy address belongs to the object at cc23d380
[   69.619354]  which belongs to the cache kmalloc-64 of size 64
[   69.631072] The buggy address is located 4 bytes inside of
[   69.631072]  allocated 5-byte region [cc23d380, cc23d385)
[   69.642028] 
[   69.643524] The buggy address belongs to the physical page:
[   69.649139] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   69.656402] flags: 0x0(zone=0)
[   69.659484] page_type: f5(slab)
[   69.662658] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   69.670806] raw: 00000000
[   69.673431] page dumped because: kasan: bad access detected
[   69.679046] 
[   69.680541] Memory state around the buggy address:
[   69.685363]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.691955]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.698516] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.705108]            ^
[   69.707641]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.714233]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.720794] ==================================================================
[   71.122955] ==================================================================
[   71.130218] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x874/0x1d70
[   71.137603] Write of size 4 at addr cc23d384 by task kunit_try_catch/317
[   71.144348] 
[   71.145843] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   71.145874] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.145874] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.145904] Call trace: 
[   71.145904]  unwind_backtrace from show_stack+0x18/0x1c
[   71.145935]  show_stack from dump_stack_lvl+0x70/0x90
[   71.145965]  dump_stack_lvl from print_report+0x158/0x528
[   71.145996]  print_report from kasan_report+0xdc/0x118
[   71.145996]  kasan_report from kasan_check_range+0x14c/0x198
[   71.146026]  kasan_check_range from kasan_bitops_generic+0x874/0x1d70
[   71.146057]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.146087]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.146118]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.146148]  kthread from ret_from_fork+0x14/0x20
[   71.146148] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   71.146179] 3fa0:                                     00000000 00000000 00000000 00000000
[   71.146179] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.146209] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.146209] 
[   71.257812] Allocated by task 317:
[   71.261230]  kasan_save_track+0x30/0x5c
[   71.265106]  __kasan_kmalloc+0x8c/0x94
[   71.268890]  kasan_bitops_generic+0xd4/0x1d70
[   71.273284]  kunit_try_run_case+0x22c/0x5a8
[   71.277526]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.283050]  kthread+0x464/0x810
[   71.286285]  ret_from_fork+0x14/0x20
[   71.289916] 
[   71.291412] The buggy address belongs to the object at cc23d380
[   71.291412]  which belongs to the cache kmalloc-64 of size 64
[   71.303131] The buggy address is located 4 bytes inside of
[   71.303131]  allocated 5-byte region [cc23d380, cc23d385)
[   71.314086] 
[   71.315582] The buggy address belongs to the physical page:
[   71.321197] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   71.328460] flags: 0x0(zone=0)
[   71.331542] page_type: f5(slab)
[   71.334716] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   71.342864] raw: 00000000
[   71.345489] page dumped because: kasan: bad access detected
[   71.351104] 
[   71.352600] Memory state around the buggy address:
[   71.357421]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.364013]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.370574] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.377136]            ^
[   71.379699]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.386291]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.392852] ==================================================================
[   69.163848] ==================================================================
[   69.187011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bd0/0x1d70
[   69.194458] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   69.201141] 
[   69.202636] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   69.202667] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.202667] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.202697] Call trace: 
[   69.202697]  unwind_backtrace from show_stack+0x18/0x1c
[   69.202728]  show_stack from dump_stack_lvl+0x70/0x90
[   69.202758]  dump_stack_lvl from print_report+0x158/0x528
[   69.202758]  print_report from kasan_report+0xdc/0x118
[   69.202789]  kasan_report from kasan_bitops_generic+0x1bd0/0x1d70
[   69.202819]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.202850]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.202880]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.202911]  kthread from ret_from_fork+0x14/0x20
[   69.202911] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   69.202941] 3fa0:                                     00000000 00000000 00000000 00000000
[   69.202941] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.202972] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.202972] 
[   69.308563] Allocated by task 317:
[   69.311981]  kasan_save_track+0x30/0x5c
[   69.315856]  __kasan_kmalloc+0x8c/0x94
[   69.319641]  kasan_bitops_generic+0xd4/0x1d70
[   69.324035]  kunit_try_run_case+0x22c/0x5a8
[   69.328247]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.333770]  kthread+0x464/0x810
[   69.337036]  ret_from_fork+0x14/0x20
[   69.340637] 
[   69.342132] The buggy address belongs to the object at cc23d380
[   69.342132]  which belongs to the cache kmalloc-64 of size 64
[   69.353851] The buggy address is located 4 bytes inside of
[   69.353851]  allocated 5-byte region [cc23d380, cc23d385)
[   69.364807] 
[   69.366302] The buggy address belongs to the physical page:
[   69.371917] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   69.379180] flags: 0x0(zone=0)
[   69.382263] page_type: f5(slab)
[   69.385437] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   69.393585] raw: 00000000
[   69.396209] page dumped because: kasan: bad access detected
[   69.401824] 
[   69.403320] Memory state around the buggy address:
[   69.408172]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.414733]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.421295] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.427886]            ^
[   69.430419]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.437011]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.443572] ==================================================================
[   71.671539] ==================================================================
[   71.695495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a80/0x1d70
[   71.702941] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   71.709594] 
[   71.711120] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   71.711151] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.711151] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.711151] Call trace: 
[   71.711181]  unwind_backtrace from show_stack+0x18/0x1c
[   71.711181]  show_stack from dump_stack_lvl+0x70/0x90
[   71.711212]  dump_stack_lvl from print_report+0x158/0x528
[   71.711242]  print_report from kasan_report+0xdc/0x118
[   71.711273]  kasan_report from kasan_bitops_generic+0x1a80/0x1d70
[   71.711303]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.711303]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.711334]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.711364]  kthread from ret_from_fork+0x14/0x20
[   71.711395] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   71.711395] 3fa0:                                     00000000 00000000 00000000 00000000
[   71.711425] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.711456] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.711456] 
[   71.817016] Allocated by task 317:
[   71.820465]  kasan_save_track+0x30/0x5c
[   71.824310]  __kasan_kmalloc+0x8c/0x94
[   71.828094]  kasan_bitops_generic+0xd4/0x1d70
[   71.832489]  kunit_try_run_case+0x22c/0x5a8
[   71.836730]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.842254]  kthread+0x464/0x810
[   71.845489]  ret_from_fork+0x14/0x20
[   71.849121] 
[   71.850616] The buggy address belongs to the object at cc23d380
[   71.850616]  which belongs to the cache kmalloc-64 of size 64
[   71.862335] The buggy address is located 4 bytes inside of
[   71.862335]  allocated 5-byte region [cc23d380, cc23d385)
[   71.873291] 
[   71.874786] The buggy address belongs to the physical page:
[   71.880401] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   71.887664] flags: 0x0(zone=0)
[   71.890747] page_type: f5(slab)
[   71.893920] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   71.902069] raw: 00000000
[   71.904693] page dumped because: kasan: bad access detected
[   71.910308] 
[   71.911804] Memory state around the buggy address:
[   71.916625]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.923217]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.929779] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.936340]            ^
[   71.938903]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.945495]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.952056] ==================================================================
[   69.728118] ==================================================================
[   69.735382] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4e8/0x1d70
[   69.742767] Write of size 4 at addr cc23d384 by task kunit_try_catch/317
[   69.749511] 
[   69.751007] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   69.751037] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.751068] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.751068] Call trace: 
[   69.751068]  unwind_backtrace from show_stack+0x18/0x1c
[   69.751098]  show_stack from dump_stack_lvl+0x70/0x90
[   69.751129]  dump_stack_lvl from print_report+0x158/0x528
[   69.751159]  print_report from kasan_report+0xdc/0x118
[   69.751159]  kasan_report from kasan_check_range+0x14c/0x198
[   69.751190]  kasan_check_range from kasan_bitops_generic+0x4e8/0x1d70
[   69.751220]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.751251]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.751281]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.751312]  kthread from ret_from_fork+0x14/0x20
[   69.751312] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   69.751342] 3fa0:                                     00000000 00000000 00000000 00000000
[   69.751342] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.751373] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.751373] 
[   69.862976] Allocated by task 317:
[   69.866394]  kasan_save_track+0x30/0x5c
[   69.870269]  __kasan_kmalloc+0x8c/0x94
[   69.874053]  kasan_bitops_generic+0xd4/0x1d70
[   69.878448]  kunit_try_run_case+0x22c/0x5a8
[   69.882659]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.888214]  kthread+0x464/0x810
[   69.891448]  ret_from_fork+0x14/0x20
[   69.895050] 
[   69.896575] The buggy address belongs to the object at cc23d380
[   69.896575]  which belongs to the cache kmalloc-64 of size 64
[   69.908294] The buggy address is located 4 bytes inside of
[   69.908294]  allocated 5-byte region [cc23d380, cc23d385)
[   69.919250] 
[   69.920745] The buggy address belongs to the physical page:
[   69.926361] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   69.933624] flags: 0x0(zone=0)
[   69.936706] page_type: f5(slab)
[   69.939880] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   69.948028] raw: 00000000
[   69.950653] page dumped because: kasan: bad access detected
[   69.956268] 
[   69.957763] Memory state around the buggy address:
[   69.962585]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.969177]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.975738] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.982299]            ^
[   69.984863]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.991424]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.998016] ==================================================================
[   68.876464] ==================================================================
[   68.899444] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a50/0x1d70
[   68.906890] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   68.913543] 
[   68.915069] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   68.915100] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   68.915100] Hardware name: Generic DRA74X (Flattened Device Tree)
[   68.915100] Call trace: 
[   68.915130]  unwind_backtrace from show_stack+0x18/0x1c
[   68.915161]  show_stack from dump_stack_lvl+0x70/0x90
[   68.915161]  dump_stack_lvl from print_report+0x158/0x528
[   68.915191]  print_report from kasan_report+0xdc/0x118
[   68.915222]  kasan_report from kasan_bitops_generic+0x1a50/0x1d70
[   68.915252]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   68.915283]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.915313]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   68.915313]  kthread from ret_from_fork+0x14/0x20
[   68.915344] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   68.915374] 3fa0:                                     00000000 00000000 00000000 00000000
[   68.915374] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   68.915405] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   68.915405] 
[   69.020996] Allocated by task 317:
[   69.024414]  kasan_save_track+0x30/0x5c
[   69.028289]  __kasan_kmalloc+0x8c/0x94
[   69.032073]  kasan_bitops_generic+0xd4/0x1d70
[   69.036468]  kunit_try_run_case+0x22c/0x5a8
[   69.040679]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.046203]  kthread+0x464/0x810
[   69.049468]  ret_from_fork+0x14/0x20
[   69.053070] 
[   69.054565] The buggy address belongs to the object at cc23d380
[   69.054565]  which belongs to the cache kmalloc-64 of size 64
[   69.066314] The buggy address is located 4 bytes inside of
[   69.066314]  allocated 5-byte region [cc23d380, cc23d385)
[   69.077239] 
[   69.078735] The buggy address belongs to the physical page:
[   69.084350] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   69.091644] flags: 0x0(zone=0)
[   69.094696] page_type: f5(slab)
[   69.097869] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   69.106018] raw: 00000000
[   69.108673] page dumped because: kasan: bad access detected
[   69.114288] 
[   69.115783] Memory state around the buggy address:
[   69.120605]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.127166]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.133758] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.140319]            ^
[   69.142883]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.149444]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.156005] ==================================================================
[   70.276489] ==================================================================
[   70.283782] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19f8/0x1d70
[   70.291229] Write of size 4 at addr cc23d384 by task kunit_try_catch/317
[   70.297973] 
[   70.299468] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   70.299499] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.299530] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.299530] Call trace: 
[   70.299530]  unwind_backtrace from show_stack+0x18/0x1c
[   70.299560]  show_stack from dump_stack_lvl+0x70/0x90
[   70.299591]  dump_stack_lvl from print_report+0x158/0x528
[   70.299621]  print_report from kasan_report+0xdc/0x118
[   70.299652]  kasan_report from kasan_bitops_generic+0x19f8/0x1d70
[   70.299652]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.299682]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.299713]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.299743]  kthread from ret_from_fork+0x14/0x20
[   70.299774] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   70.299774] 3fa0:                                     00000000 00000000 00000000 00000000
[   70.299804] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.299804] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.299835] 
[   70.405395] Allocated by task 317:
[   70.408813]  kasan_save_track+0x30/0x5c
[   70.412689]  __kasan_kmalloc+0x8c/0x94
[   70.416473]  kasan_bitops_generic+0xd4/0x1d70
[   70.420867]  kunit_try_run_case+0x22c/0x5a8
[   70.425079]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.430603]  kthread+0x464/0x810
[   70.433868]  ret_from_fork+0x14/0x20
[   70.437469] 
[   70.438964] The buggy address belongs to the object at cc23d380
[   70.438964]  which belongs to the cache kmalloc-64 of size 64
[   70.450714] The buggy address is located 4 bytes inside of
[   70.450714]  allocated 5-byte region [cc23d380, cc23d385)
[   70.461639] 
[   70.463134] The buggy address belongs to the physical page:
[   70.468749] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   70.476043] flags: 0x0(zone=0)
[   70.479095] page_type: f5(slab)
[   70.482269] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   70.490417] raw: 00000000
[   70.493072] page dumped because: kasan: bad access detected
[   70.498687] 
[   70.500183] Memory state around the buggy address:
[   70.505004]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.511566]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.518157] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.524719]            ^
[   70.527282]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.533843]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.540405] ==================================================================