Hay
Date
May 30, 2025, 4:14 a.m.

Environment
x15

[   69.420867] ==================================================================
[   69.428131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4e8/0x1d70
[   69.435485] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   69.442260] 
[   69.443756] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   69.443786] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.443786] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.443786] Call trace: 
[   69.443817]  unwind_backtrace from show_stack+0x18/0x1c
[   69.443847]  show_stack from dump_stack_lvl+0x70/0x90
[   69.443847]  dump_stack_lvl from print_report+0x158/0x528
[   69.443878]  print_report from kasan_report+0xdc/0x118
[   69.443908]  kasan_report from kasan_check_range+0x14c/0x198
[   69.443939]  kasan_check_range from kasan_bitops_generic+0x4e8/0x1d70
[   69.443939]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.443969]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.444000]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.444030]  kthread from ret_from_fork+0x14/0x20
[   69.444061] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   69.444061] bfa0:                                     00000000 00000000 00000000 00000000
[   69.444091] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.444091] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.444122] 
[   69.556579] Allocated by task 313:
[   69.560028]  kasan_save_track+0x30/0x5c
[   69.563873]  __kasan_kmalloc+0x8c/0x94
[   69.567657]  kasan_bitops_generic+0xd4/0x1d70
[   69.572052]  kunit_try_run_case+0x22c/0x5a8
[   69.576263]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.581817]  kthread+0x464/0x810
[   69.585052]  ret_from_fork+0x14/0x20
[   69.588653] 
[   69.590179] The buggy address belongs to the object at cc90ae80
[   69.590179]  which belongs to the cache kmalloc-64 of size 64
[   69.601898] The buggy address is located 4 bytes inside of
[   69.601898]  allocated 5-byte region [cc90ae80, cc90ae85)
[   69.612823] 
[   69.614318] The buggy address belongs to the physical page:
[   69.619934] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   69.627197] flags: 0x0(zone=0)
[   69.630279] page_type: f5(slab)
[   69.633453] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   69.641601] raw: 00000000
[   69.644226] page dumped because: kasan: bad access detected
[   69.649841] 
[   69.651336] Memory state around the buggy address:
[   69.656188]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.662750]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.669311] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.675903]            ^
[   69.678436]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.685028]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.691589] ==================================================================
[   70.243133] ==================================================================
[   70.266387] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bb8/0x1d70
[   70.273834] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   70.280487] 
[   70.282012] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   70.282012] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.282043] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.282043] Call trace: 
[   70.282043]  unwind_backtrace from show_stack+0x18/0x1c
[   70.282073]  show_stack from dump_stack_lvl+0x70/0x90
[   70.282104]  dump_stack_lvl from print_report+0x158/0x528
[   70.282135]  print_report from kasan_report+0xdc/0x118
[   70.282165]  kasan_report from kasan_bitops_generic+0x1bb8/0x1d70
[   70.282165]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.282196]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.282226]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.282257]  kthread from ret_from_fork+0x14/0x20
[   70.282287] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   70.282287] bfa0:                                     00000000 00000000 00000000 00000000
[   70.282318] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.282318] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.282348] 
[   70.388793] Allocated by task 313:
[   70.392211]  kasan_save_track+0x30/0x5c
[   70.396087]  __kasan_kmalloc+0x8c/0x94
[   70.399841]  kasan_bitops_generic+0xd4/0x1d70
[   70.404266]  kunit_try_run_case+0x22c/0x5a8
[   70.408477]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.414001]  kthread+0x464/0x810
[   70.417266]  ret_from_fork+0x14/0x20
[   70.420867] 
[   70.422363] The buggy address belongs to the object at cc90ae80
[   70.422363]  which belongs to the cache kmalloc-64 of size 64
[   70.434082] The buggy address is located 4 bytes inside of
[   70.434082]  allocated 5-byte region [cc90ae80, cc90ae85)
[   70.445037] 
[   70.446533] The buggy address belongs to the physical page:
[   70.452148] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   70.459411] flags: 0x0(zone=0)
[   70.462493] page_type: f5(slab)
[   70.465667] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   70.473815] raw: 00000000
[   70.476440] page dumped because: kasan: bad access detected
[   70.482055] 
[   70.483551] Memory state around the buggy address:
[   70.488372]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.494934]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.501525] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.508087]            ^
[   70.510650]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.517211]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.523773] ==================================================================
[   71.369964] ==================================================================
[   71.393920] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a80/0x1d70
[   71.401367] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   71.408020] 
[   71.409545] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   71.409576] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.409576] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.409576] Call trace: 
[   71.409606]  unwind_backtrace from show_stack+0x18/0x1c
[   71.409606]  show_stack from dump_stack_lvl+0x70/0x90
[   71.409637]  dump_stack_lvl from print_report+0x158/0x528
[   71.409667]  print_report from kasan_report+0xdc/0x118
[   71.409698]  kasan_report from kasan_bitops_generic+0x1a80/0x1d70
[   71.409729]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.409759]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.409759]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.409790]  kthread from ret_from_fork+0x14/0x20
[   71.409820] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   71.409820] bfa0:                                     00000000 00000000 00000000 00000000
[   71.409851] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.409881] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.409881] 
[   71.516326] Allocated by task 313:
[   71.519744]  kasan_save_track+0x30/0x5c
[   71.523620]  __kasan_kmalloc+0x8c/0x94
[   71.527404]  kasan_bitops_generic+0xd4/0x1d70
[   71.531799]  kunit_try_run_case+0x22c/0x5a8
[   71.536010]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.541534]  kthread+0x464/0x810
[   71.544799]  ret_from_fork+0x14/0x20
[   71.548400] 
[   71.549896] The buggy address belongs to the object at cc90ae80
[   71.549896]  which belongs to the cache kmalloc-64 of size 64
[   71.561614] The buggy address is located 4 bytes inside of
[   71.561614]  allocated 5-byte region [cc90ae80, cc90ae85)
[   71.572570] 
[   71.574066] The buggy address belongs to the physical page:
[   71.579681] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   71.586944] flags: 0x0(zone=0)
[   71.590026] page_type: f5(slab)
[   71.593200] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   71.601348] raw: 00000000
[   71.603973] page dumped because: kasan: bad access detected
[   71.609588] 
[   71.611083] Memory state around the buggy address:
[   71.615905]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.622497]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.629058] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.635620]            ^
[   71.638183]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.644744]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.651336] ==================================================================
[   68.854827] ==================================================================
[   68.877990] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bd0/0x1d70
[   68.885437] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   68.892089] 
[   68.893615] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   68.893646] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   68.893646] Hardware name: Generic DRA74X (Flattened Device Tree)
[   68.893646] Call trace: 
[   68.893676]  unwind_backtrace from show_stack+0x18/0x1c
[   68.893676]  show_stack from dump_stack_lvl+0x70/0x90
[   68.893707]  dump_stack_lvl from print_report+0x158/0x528
[   68.893737]  print_report from kasan_report+0xdc/0x118
[   68.893768]  kasan_report from kasan_bitops_generic+0x1bd0/0x1d70
[   68.893798]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   68.893829]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.893859]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   68.893859]  kthread from ret_from_fork+0x14/0x20
[   68.893890] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   68.893920] bfa0:                                     00000000 00000000 00000000 00000000
[   68.893920] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   68.893951] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   68.893951] 
[   69.000396] Allocated by task 313:
[   69.003814]  kasan_save_track+0x30/0x5c
[   69.007690]  __kasan_kmalloc+0x8c/0x94
[   69.011474]  kasan_bitops_generic+0xd4/0x1d70
[   69.015869]  kunit_try_run_case+0x22c/0x5a8
[   69.020080]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.025604]  kthread+0x464/0x810
[   69.028869]  ret_from_fork+0x14/0x20
[   69.032470] 
[   69.033966] The buggy address belongs to the object at cc90ae80
[   69.033966]  which belongs to the cache kmalloc-64 of size 64
[   69.045715] The buggy address is located 4 bytes inside of
[   69.045715]  allocated 5-byte region [cc90ae80, cc90ae85)
[   69.056640] 
[   69.058135] The buggy address belongs to the physical page:
[   69.063751] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   69.071014] flags: 0x0(zone=0)
[   69.074096] page_type: f5(slab)
[   69.077270] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   69.085418] raw: 00000000
[   69.088043] page dumped because: kasan: bad access detected
[   69.093658] 
[   69.095153] Memory state around the buggy address:
[   69.099975]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.106567]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.113128] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.119720]            ^
[   69.122253]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.128845]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.135406] ==================================================================
[   70.531280] ==================================================================
[   70.555053] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b88/0x1d70
[   70.562499] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   70.569152] 
[   70.570678] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   70.570709] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.570709] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.570709] Call trace: 
[   70.570739]  unwind_backtrace from show_stack+0x18/0x1c
[   70.570770]  show_stack from dump_stack_lvl+0x70/0x90
[   70.570770]  dump_stack_lvl from print_report+0x158/0x528
[   70.570800]  print_report from kasan_report+0xdc/0x118
[   70.570831]  kasan_report from kasan_bitops_generic+0x1b88/0x1d70
[   70.570861]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.570892]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.570922]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.570922]  kthread from ret_from_fork+0x14/0x20
[   70.570953] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   70.570983] bfa0:                                     00000000 00000000 00000000 00000000
[   70.570983] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.571014] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.571014] 
[   70.677459] Allocated by task 313:
[   70.680877]  kasan_save_track+0x30/0x5c
[   70.684753]  __kasan_kmalloc+0x8c/0x94
[   70.688537]  kasan_bitops_generic+0xd4/0x1d70
[   70.692932]  kunit_try_run_case+0x22c/0x5a8
[   70.697143]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.702667]  kthread+0x464/0x810
[   70.705932]  ret_from_fork+0x14/0x20
[   70.709533] 
[   70.711029] The buggy address belongs to the object at cc90ae80
[   70.711029]  which belongs to the cache kmalloc-64 of size 64
[   70.722747] The buggy address is located 4 bytes inside of
[   70.722747]  allocated 5-byte region [cc90ae80, cc90ae85)
[   70.733703] 
[   70.735198] The buggy address belongs to the physical page:
[   70.740814] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   70.748077] flags: 0x0(zone=0)
[   70.751159] page_type: f5(slab)
[   70.754333] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   70.762481] raw: 00000000
[   70.765106] page dumped because: kasan: bad access detected
[   70.770721] 
[   70.772216] Memory state around the buggy address:
[   70.777038]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.783630]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.790191] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.796752]            ^
[   70.799316]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.805877]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.812469] ==================================================================
[   69.142822] ==================================================================
[   69.150085] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x438/0x1d70
[   69.157440] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   69.164215] 
[   69.165710] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   69.165740] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.165740] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.165771] Call trace: 
[   69.165771]  unwind_backtrace from show_stack+0x18/0x1c
[   69.165802]  show_stack from dump_stack_lvl+0x70/0x90
[   69.165802]  dump_stack_lvl from print_report+0x158/0x528
[   69.165832]  print_report from kasan_report+0xdc/0x118
[   69.165863]  kasan_report from kasan_check_range+0x14c/0x198
[   69.165893]  kasan_check_range from kasan_bitops_generic+0x438/0x1d70
[   69.165924]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.165924]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.165954]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.165985]  kthread from ret_from_fork+0x14/0x20
[   69.166015] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   69.166015] bfa0:                                     00000000 00000000 00000000 00000000
[   69.166046] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.166046] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.166076] 
[   69.278533] Allocated by task 313:
[   69.281982]  kasan_save_track+0x30/0x5c
[   69.285827]  __kasan_kmalloc+0x8c/0x94
[   69.289611]  kasan_bitops_generic+0xd4/0x1d70
[   69.294006]  kunit_try_run_case+0x22c/0x5a8
[   69.298217]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.303741]  kthread+0x464/0x810
[   69.307006]  ret_from_fork+0x14/0x20
[   69.310607] 
[   69.312133] The buggy address belongs to the object at cc90ae80
[   69.312133]  which belongs to the cache kmalloc-64 of size 64
[   69.323852] The buggy address is located 4 bytes inside of
[   69.323852]  allocated 5-byte region [cc90ae80, cc90ae85)
[   69.334777] 
[   69.336273] The buggy address belongs to the physical page:
[   69.341888] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   69.349182] flags: 0x0(zone=0)
[   69.352233] page_type: f5(slab)
[   69.355407] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   69.363555] raw: 00000000
[   69.366210] page dumped because: kasan: bad access detected
[   69.371826] 
[   69.373321] Memory state around the buggy address:
[   69.378143]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.384704]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.391296] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.397857]            ^
[   69.400390]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.406982]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.413543] ==================================================================
[   71.658813] ==================================================================
[   71.682861] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1abc/0x1d70
[   71.690307] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   71.696960] 
[   71.698486] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   71.698516] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.698516] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.698516] Call trace: 
[   71.698547]  unwind_backtrace from show_stack+0x18/0x1c
[   71.698577]  show_stack from dump_stack_lvl+0x70/0x90
[   71.698577]  dump_stack_lvl from print_report+0x158/0x528
[   71.698608]  print_report from kasan_report+0xdc/0x118
[   71.698638]  kasan_report from kasan_bitops_generic+0x1abc/0x1d70
[   71.698669]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.698699]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.698730]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.698760]  kthread from ret_from_fork+0x14/0x20
[   71.698760] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   71.698791] bfa0:                                     00000000 00000000 00000000 00000000
[   71.698791] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.698822] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.698822] 
[   71.805267] Allocated by task 313:
[   71.808685]  kasan_save_track+0x30/0x5c
[   71.812561]  __kasan_kmalloc+0x8c/0x94
[   71.816345]  kasan_bitops_generic+0xd4/0x1d70
[   71.820739]  kunit_try_run_case+0x22c/0x5a8
[   71.824951]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.830474]  kthread+0x464/0x810
[   71.833740]  ret_from_fork+0x14/0x20
[   71.837341] 
[   71.838836] The buggy address belongs to the object at cc90ae80
[   71.838836]  which belongs to the cache kmalloc-64 of size 64
[   71.850585] The buggy address is located 4 bytes inside of
[   71.850585]  allocated 5-byte region [cc90ae80, cc90ae85)
[   71.861511] 
[   71.863006] The buggy address belongs to the physical page:
[   71.868621] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   71.875885] flags: 0x0(zone=0)
[   71.878967] page_type: f5(slab)
[   71.882141] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   71.890289] raw: 00000000
[   71.892913] page dumped because: kasan: bad access detected
[   71.898529] 
[   71.900024] Memory state around the buggy address:
[   71.904846]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.911437]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.917999] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.924560]            ^
[   71.927124]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.933685]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.940277] ==================================================================
[   69.698913] ==================================================================
[   69.706176] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b10/0x1d70
[   69.713623] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   69.720275] 
[   69.721801] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   69.721832] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.721832] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.721832] Call trace: 
[   69.721862]  unwind_backtrace from show_stack+0x18/0x1c
[   69.721862]  show_stack from dump_stack_lvl+0x70/0x90
[   69.721893]  dump_stack_lvl from print_report+0x158/0x528
[   69.721923]  print_report from kasan_report+0xdc/0x118
[   69.721954]  kasan_report from kasan_bitops_generic+0x1b10/0x1d70
[   69.721984]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.721984]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.722015]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.722045]  kthread from ret_from_fork+0x14/0x20
[   69.722076] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   69.722076] bfa0:                                     00000000 00000000 00000000 00000000
[   69.722106] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.722106] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.722137] 
[   69.828582] Allocated by task 313:
[   69.832000]  kasan_save_track+0x30/0x5c
[   69.835876]  __kasan_kmalloc+0x8c/0x94
[   69.839630]  kasan_bitops_generic+0xd4/0x1d70
[   69.844024]  kunit_try_run_case+0x22c/0x5a8
[   69.848266]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.853790]  kthread+0x464/0x810
[   69.857055]  ret_from_fork+0x14/0x20
[   69.860656] 
[   69.862152] The buggy address belongs to the object at cc90ae80
[   69.862152]  which belongs to the cache kmalloc-64 of size 64
[   69.873870] The buggy address is located 4 bytes inside of
[   69.873870]  allocated 5-byte region [cc90ae80, cc90ae85)
[   69.884826] 
[   69.886322] The buggy address belongs to the physical page:
[   69.891906] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   69.899200] flags: 0x0(zone=0)
[   69.902282] page_type: f5(slab)
[   69.905456] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   69.913574] raw: 00000000
[   69.916229] page dumped because: kasan: bad access detected
[   69.921844] 
[   69.923339] Memory state around the buggy address:
[   69.928161]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.934722]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.941314] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.947875]            ^
[   69.950408]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.957000]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.963562] ==================================================================
[   71.947570] ==================================================================
[   71.954864] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b34/0x1d70
[   71.962310] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   71.968963] 
[   71.970458] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   71.970489] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.970520] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.970520] Call trace: 
[   71.970520]  unwind_backtrace from show_stack+0x18/0x1c
[   71.970550]  show_stack from dump_stack_lvl+0x70/0x90
[   71.970581]  dump_stack_lvl from print_report+0x158/0x528
[   71.970611]  print_report from kasan_report+0xdc/0x118
[   71.970611]  kasan_report from kasan_bitops_generic+0x1b34/0x1d70
[   71.970642]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.970672]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.970703]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.970733]  kthread from ret_from_fork+0x14/0x20
[   71.970764] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   71.970764] bfa0:                                     00000000 00000000 00000000 00000000
[   71.970794] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.970794] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.970825] 
[   72.077239] Allocated by task 313:
[   72.080688]  kasan_save_track+0x30/0x5c
[   72.084533]  __kasan_kmalloc+0x8c/0x94
[   72.088317]  kasan_bitops_generic+0xd4/0x1d70
[   72.092712]  kunit_try_run_case+0x22c/0x5a8
[   72.096954]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.102478]  kthread+0x464/0x810
[   72.105712]  ret_from_fork+0x14/0x20
[   72.109313] 
[   72.110839] The buggy address belongs to the object at cc90ae80
[   72.110839]  which belongs to the cache kmalloc-64 of size 64
[   72.122558] The buggy address is located 4 bytes inside of
[   72.122558]  allocated 5-byte region [cc90ae80, cc90ae85)
[   72.133483] 
[   72.135009] The buggy address belongs to the physical page:
[   72.140594] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   72.147888] flags: 0x0(zone=0)
[   72.150970] page_type: f5(slab)
[   72.154113] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   72.162261] raw: 00000000
[   72.164916] page dumped because: kasan: bad access detected
[   72.170501] 
[   72.172027] Memory state around the buggy address:
[   72.176849]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.183410]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.190002] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.196563]            ^
[   72.199127]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.205688]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.212249] ==================================================================
[   71.097808] ==================================================================
[   71.105072] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bac/0x1d70
[   71.112518] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   71.119201] 
[   71.120697] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   71.120727] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.120727] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.120758] Call trace: 
[   71.120758]  unwind_backtrace from show_stack+0x18/0x1c
[   71.120788]  show_stack from dump_stack_lvl+0x70/0x90
[   71.120788]  dump_stack_lvl from print_report+0x158/0x528
[   71.120819]  print_report from kasan_report+0xdc/0x118
[   71.120849]  kasan_report from kasan_bitops_generic+0x1bac/0x1d70
[   71.120880]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.120910]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.120941]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.120971]  kthread from ret_from_fork+0x14/0x20
[   71.120971] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   71.121002] bfa0:                                     00000000 00000000 00000000 00000000
[   71.121002] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.121032] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.121032] 
[   71.227478] Allocated by task 313:
[   71.230895]  kasan_save_track+0x30/0x5c
[   71.234771]  __kasan_kmalloc+0x8c/0x94
[   71.238555]  kasan_bitops_generic+0xd4/0x1d70
[   71.242950]  kunit_try_run_case+0x22c/0x5a8
[   71.247161]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.252685]  kthread+0x464/0x810
[   71.255950]  ret_from_fork+0x14/0x20
[   71.259552] 
[   71.261047] The buggy address belongs to the object at cc90ae80
[   71.261047]  which belongs to the cache kmalloc-64 of size 64
[   71.272766] The buggy address is located 4 bytes inside of
[   71.272766]  allocated 5-byte region [cc90ae80, cc90ae85)
[   71.283721] 
[   71.285217] The buggy address belongs to the physical page:
[   71.290832] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   71.298095] flags: 0x0(zone=0)
[   71.301177] page_type: f5(slab)
[   71.304351] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   71.312499] raw: 00000000
[   71.315124] page dumped because: kasan: bad access detected
[   71.320739] 
[   71.322235] Memory state around the buggy address:
[   71.327056]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.333648]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.340209] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.346771]            ^
[   71.349334]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.355895]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.362457] ==================================================================
[   70.819763] ==================================================================
[   70.827026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x874/0x1d70
[   70.834411] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   70.841156] 
[   70.842651] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   70.842681] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.842712] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.842712] Call trace: 
[   70.842712]  unwind_backtrace from show_stack+0x18/0x1c
[   70.842742]  show_stack from dump_stack_lvl+0x70/0x90
[   70.842773]  dump_stack_lvl from print_report+0x158/0x528
[   70.842803]  print_report from kasan_report+0xdc/0x118
[   70.842803]  kasan_report from kasan_check_range+0x14c/0x198
[   70.842834]  kasan_check_range from kasan_bitops_generic+0x874/0x1d70
[   70.842864]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.842895]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.842926]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.842956]  kthread from ret_from_fork+0x14/0x20
[   70.842956] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   70.842987] bfa0:                                     00000000 00000000 00000000 00000000
[   70.842987] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.843017] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.843017] 
[   70.955505] Allocated by task 313:
[   70.958923]  kasan_save_track+0x30/0x5c
[   70.962799]  __kasan_kmalloc+0x8c/0x94
[   70.966552]  kasan_bitops_generic+0xd4/0x1d70
[   70.970947]  kunit_try_run_case+0x22c/0x5a8
[   70.975189]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.980712]  kthread+0x464/0x810
[   70.983978]  ret_from_fork+0x14/0x20
[   70.987579] 
[   70.989074] The buggy address belongs to the object at cc90ae80
[   70.989074]  which belongs to the cache kmalloc-64 of size 64
[   71.000793] The buggy address is located 4 bytes inside of
[   71.000793]  allocated 5-byte region [cc90ae80, cc90ae85)
[   71.011749] 
[   71.013244] The buggy address belongs to the physical page:
[   71.018859] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   71.026123] flags: 0x0(zone=0)
[   71.029205] page_type: f5(slab)
[   71.032379] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   71.040496] raw: 00000000
[   71.043151] page dumped because: kasan: bad access detected
[   71.048767] 
[   71.050262] Memory state around the buggy address:
[   71.055084]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.061645]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.068237] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.074798]            ^
[   71.077362]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.083923]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.090484] ==================================================================
[   68.566680] ==================================================================
[   68.589691] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a50/0x1d70
[   68.597137] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   68.603790] 
[   68.605285] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   68.605316] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   68.605346] Hardware name: Generic DRA74X (Flattened Device Tree)
[   68.605346] Call trace: 
[   68.605346]  unwind_backtrace from show_stack+0x18/0x1c
[   68.605377]  show_stack from dump_stack_lvl+0x70/0x90
[   68.605407]  dump_stack_lvl from print_report+0x158/0x528
[   68.605438]  print_report from kasan_report+0xdc/0x118
[   68.605438]  kasan_report from kasan_bitops_generic+0x1a50/0x1d70
[   68.605468]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   68.605499]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.605529]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   68.605560]  kthread from ret_from_fork+0x14/0x20
[   68.605590] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   68.605590] bfa0:                                     00000000 00000000 00000000 00000000
[   68.605621] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   68.605621] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   68.605651] 
[   68.712066] Allocated by task 313:
[   68.715515]  kasan_save_track+0x30/0x5c
[   68.719360]  __kasan_kmalloc+0x8c/0x94
[   68.723144]  kasan_bitops_generic+0xd4/0x1d70
[   68.727539]  kunit_try_run_case+0x22c/0x5a8
[   68.731750]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.737304]  kthread+0x464/0x810
[   68.740539]  ret_from_fork+0x14/0x20
[   68.744140] 
[   68.745666] The buggy address belongs to the object at cc90ae80
[   68.745666]  which belongs to the cache kmalloc-64 of size 64
[   68.757385] The buggy address is located 4 bytes inside of
[   68.757385]  allocated 5-byte region [cc90ae80, cc90ae85)
[   68.768310] 
[   68.769836] The buggy address belongs to the physical page:
[   68.775451] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   68.782714] flags: 0x0(zone=0)
[   68.785797] page_type: f5(slab)
[   68.788970] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   68.797088] raw: 00000000
[   68.799743] page dumped because: kasan: bad access detected
[   68.805358] 
[   68.806854] Memory state around the buggy address:
[   68.811676]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.818237]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.824798] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.831390]            ^
[   68.833923]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.840515]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.847076] ==================================================================
[   69.970886] ==================================================================
[   69.978149] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19f8/0x1d70
[   69.985595] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   69.992340] 
[   69.993865] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   69.993896] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.993896] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.993896] Call trace: 
[   69.993927]  unwind_backtrace from show_stack+0x18/0x1c
[   69.993927]  show_stack from dump_stack_lvl+0x70/0x90
[   69.993957]  dump_stack_lvl from print_report+0x158/0x528
[   69.993988]  print_report from kasan_report+0xdc/0x118
[   69.994018]  kasan_report from kasan_bitops_generic+0x19f8/0x1d70
[   69.994049]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.994049]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.994079]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.994110]  kthread from ret_from_fork+0x14/0x20
[   69.994140] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   69.994140] bfa0:                                     00000000 00000000 00000000 00000000
[   69.994171] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.994171] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.994201] 
[   70.100646] Allocated by task 313:
[   70.104064]  kasan_save_track+0x30/0x5c
[   70.107940]  __kasan_kmalloc+0x8c/0x94
[   70.111694]  kasan_bitops_generic+0xd4/0x1d70
[   70.116088]  kunit_try_run_case+0x22c/0x5a8
[   70.120330]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.125854]  kthread+0x464/0x810
[   70.129119]  ret_from_fork+0x14/0x20
[   70.132720] 
[   70.134216] The buggy address belongs to the object at cc90ae80
[   70.134216]  which belongs to the cache kmalloc-64 of size 64
[   70.145935] The buggy address is located 4 bytes inside of
[   70.145935]  allocated 5-byte region [cc90ae80, cc90ae85)
[   70.156890] 
[   70.158386] The buggy address belongs to the physical page:
[   70.163970] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   70.171264] flags: 0x0(zone=0)
[   70.174346] page_type: f5(slab)
[   70.177490] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   70.185638] raw: 00000000
[   70.188293] page dumped because: kasan: bad access detected
[   70.193908] 
[   70.195404] Memory state around the buggy address:
[   70.200225]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.206787]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.213378] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.219940]            ^
[   70.222473]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.229064]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.235626] ==================================================================