Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
x15 |
[ 69.420867] ================================================================== [ 69.428131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4e8/0x1d70 [ 69.435485] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 69.442260] [ 69.443756] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 69.443786] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.443786] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.443786] Call trace: [ 69.443817] unwind_backtrace from show_stack+0x18/0x1c [ 69.443847] show_stack from dump_stack_lvl+0x70/0x90 [ 69.443847] dump_stack_lvl from print_report+0x158/0x528 [ 69.443878] print_report from kasan_report+0xdc/0x118 [ 69.443908] kasan_report from kasan_check_range+0x14c/0x198 [ 69.443939] kasan_check_range from kasan_bitops_generic+0x4e8/0x1d70 [ 69.443939] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.443969] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.444000] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.444030] kthread from ret_from_fork+0x14/0x20 [ 69.444061] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 69.444061] bfa0: 00000000 00000000 00000000 00000000 [ 69.444091] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.444091] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.444122] [ 69.556579] Allocated by task 313: [ 69.560028] kasan_save_track+0x30/0x5c [ 69.563873] __kasan_kmalloc+0x8c/0x94 [ 69.567657] kasan_bitops_generic+0xd4/0x1d70 [ 69.572052] kunit_try_run_case+0x22c/0x5a8 [ 69.576263] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.581817] kthread+0x464/0x810 [ 69.585052] ret_from_fork+0x14/0x20 [ 69.588653] [ 69.590179] The buggy address belongs to the object at cc90ae80 [ 69.590179] which belongs to the cache kmalloc-64 of size 64 [ 69.601898] The buggy address is located 4 bytes inside of [ 69.601898] allocated 5-byte region [cc90ae80, cc90ae85) [ 69.612823] [ 69.614318] The buggy address belongs to the physical page: [ 69.619934] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 69.627197] flags: 0x0(zone=0) [ 69.630279] page_type: f5(slab) [ 69.633453] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 69.641601] raw: 00000000 [ 69.644226] page dumped because: kasan: bad access detected [ 69.649841] [ 69.651336] Memory state around the buggy address: [ 69.656188] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.662750] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.669311] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.675903] ^ [ 69.678436] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.685028] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.691589] ================================================================== [ 70.243133] ================================================================== [ 70.266387] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bb8/0x1d70 [ 70.273834] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 70.280487] [ 70.282012] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 70.282012] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.282043] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.282043] Call trace: [ 70.282043] unwind_backtrace from show_stack+0x18/0x1c [ 70.282073] show_stack from dump_stack_lvl+0x70/0x90 [ 70.282104] dump_stack_lvl from print_report+0x158/0x528 [ 70.282135] print_report from kasan_report+0xdc/0x118 [ 70.282165] kasan_report from kasan_bitops_generic+0x1bb8/0x1d70 [ 70.282165] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.282196] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.282226] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.282257] kthread from ret_from_fork+0x14/0x20 [ 70.282287] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 70.282287] bfa0: 00000000 00000000 00000000 00000000 [ 70.282318] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.282318] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.282348] [ 70.388793] Allocated by task 313: [ 70.392211] kasan_save_track+0x30/0x5c [ 70.396087] __kasan_kmalloc+0x8c/0x94 [ 70.399841] kasan_bitops_generic+0xd4/0x1d70 [ 70.404266] kunit_try_run_case+0x22c/0x5a8 [ 70.408477] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.414001] kthread+0x464/0x810 [ 70.417266] ret_from_fork+0x14/0x20 [ 70.420867] [ 70.422363] The buggy address belongs to the object at cc90ae80 [ 70.422363] which belongs to the cache kmalloc-64 of size 64 [ 70.434082] The buggy address is located 4 bytes inside of [ 70.434082] allocated 5-byte region [cc90ae80, cc90ae85) [ 70.445037] [ 70.446533] The buggy address belongs to the physical page: [ 70.452148] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 70.459411] flags: 0x0(zone=0) [ 70.462493] page_type: f5(slab) [ 70.465667] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 70.473815] raw: 00000000 [ 70.476440] page dumped because: kasan: bad access detected [ 70.482055] [ 70.483551] Memory state around the buggy address: [ 70.488372] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.494934] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.501525] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.508087] ^ [ 70.510650] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.517211] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.523773] ================================================================== [ 71.369964] ================================================================== [ 71.393920] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a80/0x1d70 [ 71.401367] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 71.408020] [ 71.409545] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 71.409576] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.409576] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.409576] Call trace: [ 71.409606] unwind_backtrace from show_stack+0x18/0x1c [ 71.409606] show_stack from dump_stack_lvl+0x70/0x90 [ 71.409637] dump_stack_lvl from print_report+0x158/0x528 [ 71.409667] print_report from kasan_report+0xdc/0x118 [ 71.409698] kasan_report from kasan_bitops_generic+0x1a80/0x1d70 [ 71.409729] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.409759] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.409759] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.409790] kthread from ret_from_fork+0x14/0x20 [ 71.409820] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 71.409820] bfa0: 00000000 00000000 00000000 00000000 [ 71.409851] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.409881] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.409881] [ 71.516326] Allocated by task 313: [ 71.519744] kasan_save_track+0x30/0x5c [ 71.523620] __kasan_kmalloc+0x8c/0x94 [ 71.527404] kasan_bitops_generic+0xd4/0x1d70 [ 71.531799] kunit_try_run_case+0x22c/0x5a8 [ 71.536010] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.541534] kthread+0x464/0x810 [ 71.544799] ret_from_fork+0x14/0x20 [ 71.548400] [ 71.549896] The buggy address belongs to the object at cc90ae80 [ 71.549896] which belongs to the cache kmalloc-64 of size 64 [ 71.561614] The buggy address is located 4 bytes inside of [ 71.561614] allocated 5-byte region [cc90ae80, cc90ae85) [ 71.572570] [ 71.574066] The buggy address belongs to the physical page: [ 71.579681] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 71.586944] flags: 0x0(zone=0) [ 71.590026] page_type: f5(slab) [ 71.593200] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 71.601348] raw: 00000000 [ 71.603973] page dumped because: kasan: bad access detected [ 71.609588] [ 71.611083] Memory state around the buggy address: [ 71.615905] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.622497] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.629058] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.635620] ^ [ 71.638183] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.644744] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.651336] ================================================================== [ 68.854827] ================================================================== [ 68.877990] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bd0/0x1d70 [ 68.885437] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 68.892089] [ 68.893615] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 68.893646] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 68.893646] Hardware name: Generic DRA74X (Flattened Device Tree) [ 68.893646] Call trace: [ 68.893676] unwind_backtrace from show_stack+0x18/0x1c [ 68.893676] show_stack from dump_stack_lvl+0x70/0x90 [ 68.893707] dump_stack_lvl from print_report+0x158/0x528 [ 68.893737] print_report from kasan_report+0xdc/0x118 [ 68.893768] kasan_report from kasan_bitops_generic+0x1bd0/0x1d70 [ 68.893798] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 68.893829] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.893859] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 68.893859] kthread from ret_from_fork+0x14/0x20 [ 68.893890] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 68.893920] bfa0: 00000000 00000000 00000000 00000000 [ 68.893920] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 68.893951] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 68.893951] [ 69.000396] Allocated by task 313: [ 69.003814] kasan_save_track+0x30/0x5c [ 69.007690] __kasan_kmalloc+0x8c/0x94 [ 69.011474] kasan_bitops_generic+0xd4/0x1d70 [ 69.015869] kunit_try_run_case+0x22c/0x5a8 [ 69.020080] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.025604] kthread+0x464/0x810 [ 69.028869] ret_from_fork+0x14/0x20 [ 69.032470] [ 69.033966] The buggy address belongs to the object at cc90ae80 [ 69.033966] which belongs to the cache kmalloc-64 of size 64 [ 69.045715] The buggy address is located 4 bytes inside of [ 69.045715] allocated 5-byte region [cc90ae80, cc90ae85) [ 69.056640] [ 69.058135] The buggy address belongs to the physical page: [ 69.063751] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 69.071014] flags: 0x0(zone=0) [ 69.074096] page_type: f5(slab) [ 69.077270] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 69.085418] raw: 00000000 [ 69.088043] page dumped because: kasan: bad access detected [ 69.093658] [ 69.095153] Memory state around the buggy address: [ 69.099975] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.106567] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.113128] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.119720] ^ [ 69.122253] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.128845] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.135406] ================================================================== [ 70.531280] ================================================================== [ 70.555053] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b88/0x1d70 [ 70.562499] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 70.569152] [ 70.570678] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 70.570709] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.570709] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.570709] Call trace: [ 70.570739] unwind_backtrace from show_stack+0x18/0x1c [ 70.570770] show_stack from dump_stack_lvl+0x70/0x90 [ 70.570770] dump_stack_lvl from print_report+0x158/0x528 [ 70.570800] print_report from kasan_report+0xdc/0x118 [ 70.570831] kasan_report from kasan_bitops_generic+0x1b88/0x1d70 [ 70.570861] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.570892] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.570922] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.570922] kthread from ret_from_fork+0x14/0x20 [ 70.570953] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 70.570983] bfa0: 00000000 00000000 00000000 00000000 [ 70.570983] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.571014] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.571014] [ 70.677459] Allocated by task 313: [ 70.680877] kasan_save_track+0x30/0x5c [ 70.684753] __kasan_kmalloc+0x8c/0x94 [ 70.688537] kasan_bitops_generic+0xd4/0x1d70 [ 70.692932] kunit_try_run_case+0x22c/0x5a8 [ 70.697143] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.702667] kthread+0x464/0x810 [ 70.705932] ret_from_fork+0x14/0x20 [ 70.709533] [ 70.711029] The buggy address belongs to the object at cc90ae80 [ 70.711029] which belongs to the cache kmalloc-64 of size 64 [ 70.722747] The buggy address is located 4 bytes inside of [ 70.722747] allocated 5-byte region [cc90ae80, cc90ae85) [ 70.733703] [ 70.735198] The buggy address belongs to the physical page: [ 70.740814] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 70.748077] flags: 0x0(zone=0) [ 70.751159] page_type: f5(slab) [ 70.754333] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 70.762481] raw: 00000000 [ 70.765106] page dumped because: kasan: bad access detected [ 70.770721] [ 70.772216] Memory state around the buggy address: [ 70.777038] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.783630] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.790191] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.796752] ^ [ 70.799316] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.805877] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.812469] ================================================================== [ 69.142822] ================================================================== [ 69.150085] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x438/0x1d70 [ 69.157440] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 69.164215] [ 69.165710] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 69.165740] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.165740] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.165771] Call trace: [ 69.165771] unwind_backtrace from show_stack+0x18/0x1c [ 69.165802] show_stack from dump_stack_lvl+0x70/0x90 [ 69.165802] dump_stack_lvl from print_report+0x158/0x528 [ 69.165832] print_report from kasan_report+0xdc/0x118 [ 69.165863] kasan_report from kasan_check_range+0x14c/0x198 [ 69.165893] kasan_check_range from kasan_bitops_generic+0x438/0x1d70 [ 69.165924] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.165924] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.165954] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.165985] kthread from ret_from_fork+0x14/0x20 [ 69.166015] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 69.166015] bfa0: 00000000 00000000 00000000 00000000 [ 69.166046] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.166046] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.166076] [ 69.278533] Allocated by task 313: [ 69.281982] kasan_save_track+0x30/0x5c [ 69.285827] __kasan_kmalloc+0x8c/0x94 [ 69.289611] kasan_bitops_generic+0xd4/0x1d70 [ 69.294006] kunit_try_run_case+0x22c/0x5a8 [ 69.298217] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.303741] kthread+0x464/0x810 [ 69.307006] ret_from_fork+0x14/0x20 [ 69.310607] [ 69.312133] The buggy address belongs to the object at cc90ae80 [ 69.312133] which belongs to the cache kmalloc-64 of size 64 [ 69.323852] The buggy address is located 4 bytes inside of [ 69.323852] allocated 5-byte region [cc90ae80, cc90ae85) [ 69.334777] [ 69.336273] The buggy address belongs to the physical page: [ 69.341888] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 69.349182] flags: 0x0(zone=0) [ 69.352233] page_type: f5(slab) [ 69.355407] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 69.363555] raw: 00000000 [ 69.366210] page dumped because: kasan: bad access detected [ 69.371826] [ 69.373321] Memory state around the buggy address: [ 69.378143] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.384704] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.391296] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.397857] ^ [ 69.400390] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.406982] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.413543] ================================================================== [ 71.658813] ================================================================== [ 71.682861] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1abc/0x1d70 [ 71.690307] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 71.696960] [ 71.698486] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 71.698516] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.698516] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.698516] Call trace: [ 71.698547] unwind_backtrace from show_stack+0x18/0x1c [ 71.698577] show_stack from dump_stack_lvl+0x70/0x90 [ 71.698577] dump_stack_lvl from print_report+0x158/0x528 [ 71.698608] print_report from kasan_report+0xdc/0x118 [ 71.698638] kasan_report from kasan_bitops_generic+0x1abc/0x1d70 [ 71.698669] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.698699] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.698730] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.698760] kthread from ret_from_fork+0x14/0x20 [ 71.698760] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 71.698791] bfa0: 00000000 00000000 00000000 00000000 [ 71.698791] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.698822] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.698822] [ 71.805267] Allocated by task 313: [ 71.808685] kasan_save_track+0x30/0x5c [ 71.812561] __kasan_kmalloc+0x8c/0x94 [ 71.816345] kasan_bitops_generic+0xd4/0x1d70 [ 71.820739] kunit_try_run_case+0x22c/0x5a8 [ 71.824951] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.830474] kthread+0x464/0x810 [ 71.833740] ret_from_fork+0x14/0x20 [ 71.837341] [ 71.838836] The buggy address belongs to the object at cc90ae80 [ 71.838836] which belongs to the cache kmalloc-64 of size 64 [ 71.850585] The buggy address is located 4 bytes inside of [ 71.850585] allocated 5-byte region [cc90ae80, cc90ae85) [ 71.861511] [ 71.863006] The buggy address belongs to the physical page: [ 71.868621] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 71.875885] flags: 0x0(zone=0) [ 71.878967] page_type: f5(slab) [ 71.882141] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 71.890289] raw: 00000000 [ 71.892913] page dumped because: kasan: bad access detected [ 71.898529] [ 71.900024] Memory state around the buggy address: [ 71.904846] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.911437] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.917999] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.924560] ^ [ 71.927124] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.933685] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.940277] ================================================================== [ 69.698913] ================================================================== [ 69.706176] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b10/0x1d70 [ 69.713623] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 69.720275] [ 69.721801] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 69.721832] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.721832] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.721832] Call trace: [ 69.721862] unwind_backtrace from show_stack+0x18/0x1c [ 69.721862] show_stack from dump_stack_lvl+0x70/0x90 [ 69.721893] dump_stack_lvl from print_report+0x158/0x528 [ 69.721923] print_report from kasan_report+0xdc/0x118 [ 69.721954] kasan_report from kasan_bitops_generic+0x1b10/0x1d70 [ 69.721984] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.721984] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.722015] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.722045] kthread from ret_from_fork+0x14/0x20 [ 69.722076] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 69.722076] bfa0: 00000000 00000000 00000000 00000000 [ 69.722106] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.722106] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.722137] [ 69.828582] Allocated by task 313: [ 69.832000] kasan_save_track+0x30/0x5c [ 69.835876] __kasan_kmalloc+0x8c/0x94 [ 69.839630] kasan_bitops_generic+0xd4/0x1d70 [ 69.844024] kunit_try_run_case+0x22c/0x5a8 [ 69.848266] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.853790] kthread+0x464/0x810 [ 69.857055] ret_from_fork+0x14/0x20 [ 69.860656] [ 69.862152] The buggy address belongs to the object at cc90ae80 [ 69.862152] which belongs to the cache kmalloc-64 of size 64 [ 69.873870] The buggy address is located 4 bytes inside of [ 69.873870] allocated 5-byte region [cc90ae80, cc90ae85) [ 69.884826] [ 69.886322] The buggy address belongs to the physical page: [ 69.891906] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 69.899200] flags: 0x0(zone=0) [ 69.902282] page_type: f5(slab) [ 69.905456] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 69.913574] raw: 00000000 [ 69.916229] page dumped because: kasan: bad access detected [ 69.921844] [ 69.923339] Memory state around the buggy address: [ 69.928161] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.934722] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.941314] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.947875] ^ [ 69.950408] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.957000] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.963562] ================================================================== [ 71.947570] ================================================================== [ 71.954864] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b34/0x1d70 [ 71.962310] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 71.968963] [ 71.970458] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 71.970489] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.970520] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.970520] Call trace: [ 71.970520] unwind_backtrace from show_stack+0x18/0x1c [ 71.970550] show_stack from dump_stack_lvl+0x70/0x90 [ 71.970581] dump_stack_lvl from print_report+0x158/0x528 [ 71.970611] print_report from kasan_report+0xdc/0x118 [ 71.970611] kasan_report from kasan_bitops_generic+0x1b34/0x1d70 [ 71.970642] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.970672] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.970703] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.970733] kthread from ret_from_fork+0x14/0x20 [ 71.970764] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 71.970764] bfa0: 00000000 00000000 00000000 00000000 [ 71.970794] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.970794] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.970825] [ 72.077239] Allocated by task 313: [ 72.080688] kasan_save_track+0x30/0x5c [ 72.084533] __kasan_kmalloc+0x8c/0x94 [ 72.088317] kasan_bitops_generic+0xd4/0x1d70 [ 72.092712] kunit_try_run_case+0x22c/0x5a8 [ 72.096954] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.102478] kthread+0x464/0x810 [ 72.105712] ret_from_fork+0x14/0x20 [ 72.109313] [ 72.110839] The buggy address belongs to the object at cc90ae80 [ 72.110839] which belongs to the cache kmalloc-64 of size 64 [ 72.122558] The buggy address is located 4 bytes inside of [ 72.122558] allocated 5-byte region [cc90ae80, cc90ae85) [ 72.133483] [ 72.135009] The buggy address belongs to the physical page: [ 72.140594] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 72.147888] flags: 0x0(zone=0) [ 72.150970] page_type: f5(slab) [ 72.154113] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 72.162261] raw: 00000000 [ 72.164916] page dumped because: kasan: bad access detected [ 72.170501] [ 72.172027] Memory state around the buggy address: [ 72.176849] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.183410] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.190002] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.196563] ^ [ 72.199127] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.205688] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.212249] ================================================================== [ 71.097808] ================================================================== [ 71.105072] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bac/0x1d70 [ 71.112518] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 71.119201] [ 71.120697] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 71.120727] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.120727] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.120758] Call trace: [ 71.120758] unwind_backtrace from show_stack+0x18/0x1c [ 71.120788] show_stack from dump_stack_lvl+0x70/0x90 [ 71.120788] dump_stack_lvl from print_report+0x158/0x528 [ 71.120819] print_report from kasan_report+0xdc/0x118 [ 71.120849] kasan_report from kasan_bitops_generic+0x1bac/0x1d70 [ 71.120880] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.120910] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.120941] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.120971] kthread from ret_from_fork+0x14/0x20 [ 71.120971] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 71.121002] bfa0: 00000000 00000000 00000000 00000000 [ 71.121002] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.121032] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.121032] [ 71.227478] Allocated by task 313: [ 71.230895] kasan_save_track+0x30/0x5c [ 71.234771] __kasan_kmalloc+0x8c/0x94 [ 71.238555] kasan_bitops_generic+0xd4/0x1d70 [ 71.242950] kunit_try_run_case+0x22c/0x5a8 [ 71.247161] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.252685] kthread+0x464/0x810 [ 71.255950] ret_from_fork+0x14/0x20 [ 71.259552] [ 71.261047] The buggy address belongs to the object at cc90ae80 [ 71.261047] which belongs to the cache kmalloc-64 of size 64 [ 71.272766] The buggy address is located 4 bytes inside of [ 71.272766] allocated 5-byte region [cc90ae80, cc90ae85) [ 71.283721] [ 71.285217] The buggy address belongs to the physical page: [ 71.290832] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 71.298095] flags: 0x0(zone=0) [ 71.301177] page_type: f5(slab) [ 71.304351] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 71.312499] raw: 00000000 [ 71.315124] page dumped because: kasan: bad access detected [ 71.320739] [ 71.322235] Memory state around the buggy address: [ 71.327056] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.333648] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.340209] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.346771] ^ [ 71.349334] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.355895] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.362457] ================================================================== [ 70.819763] ================================================================== [ 70.827026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x874/0x1d70 [ 70.834411] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 70.841156] [ 70.842651] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 70.842681] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.842712] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.842712] Call trace: [ 70.842712] unwind_backtrace from show_stack+0x18/0x1c [ 70.842742] show_stack from dump_stack_lvl+0x70/0x90 [ 70.842773] dump_stack_lvl from print_report+0x158/0x528 [ 70.842803] print_report from kasan_report+0xdc/0x118 [ 70.842803] kasan_report from kasan_check_range+0x14c/0x198 [ 70.842834] kasan_check_range from kasan_bitops_generic+0x874/0x1d70 [ 70.842864] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.842895] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.842926] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.842956] kthread from ret_from_fork+0x14/0x20 [ 70.842956] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 70.842987] bfa0: 00000000 00000000 00000000 00000000 [ 70.842987] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.843017] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.843017] [ 70.955505] Allocated by task 313: [ 70.958923] kasan_save_track+0x30/0x5c [ 70.962799] __kasan_kmalloc+0x8c/0x94 [ 70.966552] kasan_bitops_generic+0xd4/0x1d70 [ 70.970947] kunit_try_run_case+0x22c/0x5a8 [ 70.975189] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.980712] kthread+0x464/0x810 [ 70.983978] ret_from_fork+0x14/0x20 [ 70.987579] [ 70.989074] The buggy address belongs to the object at cc90ae80 [ 70.989074] which belongs to the cache kmalloc-64 of size 64 [ 71.000793] The buggy address is located 4 bytes inside of [ 71.000793] allocated 5-byte region [cc90ae80, cc90ae85) [ 71.011749] [ 71.013244] The buggy address belongs to the physical page: [ 71.018859] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 71.026123] flags: 0x0(zone=0) [ 71.029205] page_type: f5(slab) [ 71.032379] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 71.040496] raw: 00000000 [ 71.043151] page dumped because: kasan: bad access detected [ 71.048767] [ 71.050262] Memory state around the buggy address: [ 71.055084] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.061645] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.068237] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.074798] ^ [ 71.077362] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.083923] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.090484] ================================================================== [ 68.566680] ================================================================== [ 68.589691] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a50/0x1d70 [ 68.597137] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 68.603790] [ 68.605285] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 68.605316] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 68.605346] Hardware name: Generic DRA74X (Flattened Device Tree) [ 68.605346] Call trace: [ 68.605346] unwind_backtrace from show_stack+0x18/0x1c [ 68.605377] show_stack from dump_stack_lvl+0x70/0x90 [ 68.605407] dump_stack_lvl from print_report+0x158/0x528 [ 68.605438] print_report from kasan_report+0xdc/0x118 [ 68.605438] kasan_report from kasan_bitops_generic+0x1a50/0x1d70 [ 68.605468] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 68.605499] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.605529] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 68.605560] kthread from ret_from_fork+0x14/0x20 [ 68.605590] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 68.605590] bfa0: 00000000 00000000 00000000 00000000 [ 68.605621] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 68.605621] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 68.605651] [ 68.712066] Allocated by task 313: [ 68.715515] kasan_save_track+0x30/0x5c [ 68.719360] __kasan_kmalloc+0x8c/0x94 [ 68.723144] kasan_bitops_generic+0xd4/0x1d70 [ 68.727539] kunit_try_run_case+0x22c/0x5a8 [ 68.731750] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.737304] kthread+0x464/0x810 [ 68.740539] ret_from_fork+0x14/0x20 [ 68.744140] [ 68.745666] The buggy address belongs to the object at cc90ae80 [ 68.745666] which belongs to the cache kmalloc-64 of size 64 [ 68.757385] The buggy address is located 4 bytes inside of [ 68.757385] allocated 5-byte region [cc90ae80, cc90ae85) [ 68.768310] [ 68.769836] The buggy address belongs to the physical page: [ 68.775451] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 68.782714] flags: 0x0(zone=0) [ 68.785797] page_type: f5(slab) [ 68.788970] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 68.797088] raw: 00000000 [ 68.799743] page dumped because: kasan: bad access detected [ 68.805358] [ 68.806854] Memory state around the buggy address: [ 68.811676] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.818237] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.824798] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.831390] ^ [ 68.833923] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.840515] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.847076] ================================================================== [ 69.970886] ================================================================== [ 69.978149] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19f8/0x1d70 [ 69.985595] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 69.992340] [ 69.993865] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 69.993896] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.993896] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.993896] Call trace: [ 69.993927] unwind_backtrace from show_stack+0x18/0x1c [ 69.993927] show_stack from dump_stack_lvl+0x70/0x90 [ 69.993957] dump_stack_lvl from print_report+0x158/0x528 [ 69.993988] print_report from kasan_report+0xdc/0x118 [ 69.994018] kasan_report from kasan_bitops_generic+0x19f8/0x1d70 [ 69.994049] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.994049] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.994079] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.994110] kthread from ret_from_fork+0x14/0x20 [ 69.994140] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 69.994140] bfa0: 00000000 00000000 00000000 00000000 [ 69.994171] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.994171] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.994201] [ 70.100646] Allocated by task 313: [ 70.104064] kasan_save_track+0x30/0x5c [ 70.107940] __kasan_kmalloc+0x8c/0x94 [ 70.111694] kasan_bitops_generic+0xd4/0x1d70 [ 70.116088] kunit_try_run_case+0x22c/0x5a8 [ 70.120330] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.125854] kthread+0x464/0x810 [ 70.129119] ret_from_fork+0x14/0x20 [ 70.132720] [ 70.134216] The buggy address belongs to the object at cc90ae80 [ 70.134216] which belongs to the cache kmalloc-64 of size 64 [ 70.145935] The buggy address is located 4 bytes inside of [ 70.145935] allocated 5-byte region [cc90ae80, cc90ae85) [ 70.156890] [ 70.158386] The buggy address belongs to the physical page: [ 70.163970] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 70.171264] flags: 0x0(zone=0) [ 70.174346] page_type: f5(slab) [ 70.177490] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 70.185638] raw: 00000000 [ 70.188293] page dumped because: kasan: bad access detected [ 70.193908] [ 70.195404] Memory state around the buggy address: [ 70.200225] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.206787] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.213378] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.219940] ^ [ 70.222473] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.229064] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.235626] ==================================================================