Hay
Date
April 20, 2025, 11:09 p.m.
Failure - log-parser-test/fault-unhandled-fault-asynchronous-external-abort-at
[  912.284637] Unhandled fault: asynchronous external abort (0x1211) at 0x00000000
Failure - log-parser-test/panic-multiline-kernel-panic-not-syncing-attempted-to-kill-init-exitcode
[  912.297912] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000007
[  912.305725] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000007 ]---
Failure - log-parser-test/kasan-bug-kasan-stack-out-of-bounds-in-test_cache_read
[  168.648071] ==================================================================
[  168.655334] BUG: KASAN: stack-out-of-bounds in test_cache_read+0x3c8/0x3fc
[  168.662292] Read of size 4 at addr f303bd10 by task kunit_try_catch/3840
[  168.669036] 
[  168.670532] CPU: 1 UID: 0 PID: 3840 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  168.670562] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  168.670593] Hardware name: Generic DRA74X (Flattened Device Tree)
[  168.670593] Call trace: 
[  168.670593]  unwind_backtrace from show_stack+0x18/0x1c
[  168.670623]  show_stack from dump_stack_lvl+0x70/0x90
[  168.670654]  dump_stack_lvl from print_report+0x158/0x528
[  168.670684]  print_report from kasan_report+0xdc/0x118
[  168.670715]  kasan_report from test_cache_read+0x3c8/0x3fc
[  168.670715]  test_cache_read from vcap_addr_keysets+0x1d8/0x3b4
[  168.670745]  vcap_addr_keysets from vcap_api_addr_keyset_test+0x238/0x6cc
[  168.670776]  vcap_api_addr_keyset_test from kunit_try_run_case+0x22c/0x5a8
[  168.670806]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  168.670837]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  168.670837]  kthread from ret_from_fork+0x14/0x20
[  168.670867] Exception stack(0xf303bfb0 to 0xf303bff8)
[  168.670898] bfa0:                                     00000000 00000000 00000000 00000000
[  168.670898] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  168.670898] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  168.670928] 
[  168.789947] The buggy address belongs to stack of task kunit_try_catch/3840
[  168.796966]  and is located at offset 496 in frame:
[  168.801879]  vcap_api_addr_keyset_test+0x0/0x6cc
[  168.806518] 
[  168.808044] This frame has 7 objects:
[  168.811737]  [48, 60) 'matches'
[  168.811737]  [80, 104) '__assertion'
[  168.814910]  [144, 252) 'admin'
[  168.818511]  [288, 328) 'keysets'
[  168.821655]  [368, 416) 'keydata'
[  168.825012]  [448, 496) 'mskdata'
[  168.828338]  [528, 576) 'actdata'
[  168.831695] 
[  168.836517] The buggy address belongs to the virtual mapping at
[  168.836517]  [f3038000, f303d000) created by:
[  168.836517]  kernel_clone+0x174/0x794
[  168.850524] 
[  168.852020] The buggy address belongs to the physical page:
[  168.857635] page: refcount:1 mapcount:0 mapping:00000000 index:0xa3 pfn:0xb0d7f
[  168.864990] flags: 0x80000000(zone=2)
[  168.868682] raw: 80000000 00000000 00000122 00000000 000000a3 00000000 ffffffff 00000001
[  168.876831] raw: 00000000
[  168.879455] page dumped because: kasan: bad access detected
[  168.885070] 
[  168.886566] Memory state around the buggy address:
[  168.891387]  f303bc00: 00 00 00 04 f2 f2 f2 f2 00 00 00 00 00 f2 f2 f2
[  168.897979]  f303bc80: f2 f2 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00
[  168.904541] >f303bd00: 00 00 f2 f2 f2 f2 00 00 00 00 00 00 f3 f3 f3 f3
[  168.911102]                  ^
[  168.914184]  f303bd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  168.920745]  f303be00: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2
[  168.927337] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   93.214752] ==================================================================
[   93.222015] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x248/0x260
[   93.229034] Write of size 1 at addr cc23f278 by task kunit_try_catch/341
[   93.235778] 
[   93.237274] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   93.237304] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   93.237304] Hardware name: Generic DRA74X (Flattened Device Tree)
[   93.237335] Call trace: 
[   93.237335]  unwind_backtrace from show_stack+0x18/0x1c
[   93.237365]  show_stack from dump_stack_lvl+0x70/0x90
[   93.237396]  dump_stack_lvl from print_report+0x158/0x528
[   93.237426]  print_report from kasan_report+0xdc/0x118
[   93.237426]  kasan_report from strncpy_from_user+0x248/0x260
[   93.237457]  strncpy_from_user from copy_user_test_oob+0x7a4/0x12b0
[   93.237487]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   93.237518]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   93.237548]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   93.237548]  kthread from ret_from_fork+0x14/0x20
[   93.237579] Exception stack(0xf277bfb0 to 0xf277bff8)
[   93.237609] bfa0:                                     00000000 00000000 00000000 00000000
[   93.237609] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   93.237640] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   93.237640] 
[   93.348907] Allocated by task 341:
[   93.352325]  kasan_save_track+0x30/0x5c
[   93.356201]  __kasan_kmalloc+0x8c/0x94
[   93.359985]  __kmalloc_noprof+0x20c/0x488
[   93.364013]  kunit_kmalloc_array+0x28/0x60
[   93.368133]  copy_user_test_oob+0xac/0x12b0
[   93.372375]  kunit_try_run_case+0x22c/0x5a8
[   93.376586]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   93.382110]  kthread+0x464/0x810
[   93.385375]  ret_from_fork+0x14/0x20
[   93.388977] 
[   93.390472] The buggy address belongs to the object at cc23f200
[   93.390472]  which belongs to the cache kmalloc-128 of size 128
[   93.402374] The buggy address is located 0 bytes to the right of
[   93.402374]  allocated 120-byte region [cc23f200, cc23f278)
[   93.414001] 
[   93.415527] The buggy address belongs to the physical page:
[   93.421112] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   93.428405] flags: 0x0(zone=0)
[   93.431488] page_type: f5(slab)
[   93.434661] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   93.442779] raw: 00000000
[   93.445434] page dumped because: kasan: bad access detected
[   93.451049] 
[   93.452545] Memory state around the buggy address:
[   93.457366]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   93.463928]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.470520] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   93.477081]                                                         ^
[   93.483581]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.490142]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.496704] ==================================================================
[   92.919830] ==================================================================
[   92.927093] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x20/0x260
[   92.934020] Write of size 121 at addr cc23f200 by task kunit_try_catch/341
[   92.940948] 
[   92.942474] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   92.942504] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   92.942504] Hardware name: Generic DRA74X (Flattened Device Tree)
[   92.942504] Call trace: 
[   92.942535]  unwind_backtrace from show_stack+0x18/0x1c
[   92.942535]  show_stack from dump_stack_lvl+0x70/0x90
[   92.942565]  dump_stack_lvl from print_report+0x158/0x528
[   92.942596]  print_report from kasan_report+0xdc/0x118
[   92.942626]  kasan_report from kasan_check_range+0x14c/0x198
[   92.942626]  kasan_check_range from strncpy_from_user+0x20/0x260
[   92.942657]  strncpy_from_user from copy_user_test_oob+0x7a4/0x12b0
[   92.942687]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   92.942718]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.942749]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   92.942779]  kthread from ret_from_fork+0x14/0x20
[   92.942779] Exception stack(0xf277bfb0 to 0xf277bff8)
[   92.942810] bfa0:                                     00000000 00000000 00000000 00000000
[   92.942810] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   92.942840] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   92.942840] 
[   93.060119] Allocated by task 341:
[   93.063568]  kasan_save_track+0x30/0x5c
[   93.067413]  __kasan_kmalloc+0x8c/0x94
[   93.071197]  __kmalloc_noprof+0x20c/0x488
[   93.075256]  kunit_kmalloc_array+0x28/0x60
[   93.079376]  copy_user_test_oob+0xac/0x12b0
[   93.083618]  kunit_try_run_case+0x22c/0x5a8
[   93.087829]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   93.093353]  kthread+0x464/0x810
[   93.096618]  ret_from_fork+0x14/0x20
[   93.100219] 
[   93.101715] The buggy address belongs to the object at cc23f200
[   93.101715]  which belongs to the cache kmalloc-128 of size 128
[   93.113616] The buggy address is located 0 bytes inside of
[   93.113616]  allocated 120-byte region [cc23f200, cc23f278)
[   93.124725] 
[   93.126220] The buggy address belongs to the physical page:
[   93.131835] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   93.139099] flags: 0x0(zone=0)
[   93.142181] page_type: f5(slab)
[   93.145355] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   93.153503] raw: 00000000
[   93.156158] page dumped because: kasan: bad access detected
[   93.161743] 
[   93.163269] Memory state around the buggy address:
[   93.168090]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   93.174652]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.181213] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   93.187805]                                                         ^
[   93.194274]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.200866]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.207427] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   92.341705] ==================================================================
[   92.348968] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x544/0x12b0
[   92.356170] Write of size 121 at addr cc23f200 by task kunit_try_catch/341
[   92.363098] 
[   92.364593] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   92.364624] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   92.364624] Hardware name: Generic DRA74X (Flattened Device Tree)
[   92.364654] Call trace: 
[   92.364654]  unwind_backtrace from show_stack+0x18/0x1c
[   92.364685]  show_stack from dump_stack_lvl+0x70/0x90
[   92.364715]  dump_stack_lvl from print_report+0x158/0x528
[   92.364715]  print_report from kasan_report+0xdc/0x118
[   92.364746]  kasan_report from kasan_check_range+0x14c/0x198
[   92.364776]  kasan_check_range from copy_user_test_oob+0x544/0x12b0
[   92.364807]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   92.364807]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.364837]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   92.364868]  kthread from ret_from_fork+0x14/0x20
[   92.364898] Exception stack(0xf277bfb0 to 0xf277bff8)
[   92.364898] bfa0:                                     00000000 00000000 00000000 00000000
[   92.364929] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   92.364959] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   92.364959] 
[   92.476226] Allocated by task 341:
[   92.479644]  kasan_save_track+0x30/0x5c
[   92.483489]  __kasan_kmalloc+0x8c/0x94
[   92.487274]  __kmalloc_noprof+0x20c/0x488
[   92.491333]  kunit_kmalloc_array+0x28/0x60
[   92.495452]  copy_user_test_oob+0xac/0x12b0
[   92.499694]  kunit_try_run_case+0x22c/0x5a8
[   92.503906]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.509429]  kthread+0x464/0x810
[   92.512695]  ret_from_fork+0x14/0x20
[   92.516296] 
[   92.517791] The buggy address belongs to the object at cc23f200
[   92.517791]  which belongs to the cache kmalloc-128 of size 128
[   92.529693] The buggy address is located 0 bytes inside of
[   92.529693]  allocated 120-byte region [cc23f200, cc23f278)
[   92.540802] 
[   92.542327] The buggy address belongs to the physical page:
[   92.547912] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   92.555206] flags: 0x0(zone=0)
[   92.558288] page_type: f5(slab)
[   92.561431] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   92.569580] raw: 00000000
[   92.572235] page dumped because: kasan: bad access detected
[   92.577850] 
[   92.579345] Memory state around the buggy address:
[   92.584167]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   92.590728]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.597320] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   92.603881]                                                         ^
[   92.610351]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.616943]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.623504] ==================================================================
[   91.474090] ==================================================================
[   91.481353] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x800/0x12b0
[   91.488555] Read of size 121 at addr cc23f200 by task kunit_try_catch/341
[   91.495391] 
[   91.496887] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   91.496917] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   91.496917] Hardware name: Generic DRA74X (Flattened Device Tree)
[   91.496948] Call trace: 
[   91.496948]  unwind_backtrace from show_stack+0x18/0x1c
[   91.496978]  show_stack from dump_stack_lvl+0x70/0x90
[   91.497009]  dump_stack_lvl from print_report+0x158/0x528
[   91.497039]  print_report from kasan_report+0xdc/0x118
[   91.497039]  kasan_report from kasan_check_range+0x14c/0x198
[   91.497070]  kasan_check_range from copy_user_test_oob+0x800/0x12b0
[   91.497100]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   91.497131]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.497161]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   91.497161]  kthread from ret_from_fork+0x14/0x20
[   91.497192] Exception stack(0xf277bfb0 to 0xf277bff8)
[   91.497222] bfa0:                                     00000000 00000000 00000000 00000000
[   91.497222] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   91.497253] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   91.497253] 
[   91.608520] Allocated by task 341:
[   91.611938]  kasan_save_track+0x30/0x5c
[   91.615814]  __kasan_kmalloc+0x8c/0x94
[   91.619598]  __kmalloc_noprof+0x20c/0x488
[   91.623626]  kunit_kmalloc_array+0x28/0x60
[   91.627777]  copy_user_test_oob+0xac/0x12b0
[   91.631988]  kunit_try_run_case+0x22c/0x5a8
[   91.636199]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.641723]  kthread+0x464/0x810
[   91.644989]  ret_from_fork+0x14/0x20
[   91.648590] 
[   91.650085] The buggy address belongs to the object at cc23f200
[   91.650085]  which belongs to the cache kmalloc-128 of size 128
[   91.661987] The buggy address is located 0 bytes inside of
[   91.661987]  allocated 120-byte region [cc23f200, cc23f278)
[   91.673126] 
[   91.674621] The buggy address belongs to the physical page:
[   91.680236] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   91.687499] flags: 0x0(zone=0)
[   91.690582] page_type: f5(slab)
[   91.693756] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   91.701904] raw: 00000000
[   91.704528] page dumped because: kasan: bad access detected
[   91.710144] 
[   91.711639] Memory state around the buggy address:
[   91.716461]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   91.723052]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.729614] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   91.736175]                                                         ^
[   91.742675]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.749237]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.755798] ==================================================================
[   91.178466] ==================================================================
[   91.191864] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x24c/0x12b0
[   91.199066] Write of size 121 at addr cc23f200 by task kunit_try_catch/341
[   91.205993] 
[   91.207519] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   91.207550] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   91.207550] Hardware name: Generic DRA74X (Flattened Device Tree)
[   91.207550] Call trace: 
[   91.207580]  unwind_backtrace from show_stack+0x18/0x1c
[   91.207580]  show_stack from dump_stack_lvl+0x70/0x90
[   91.207611]  dump_stack_lvl from print_report+0x158/0x528
[   91.207641]  print_report from kasan_report+0xdc/0x118
[   91.207672]  kasan_report from kasan_check_range+0x14c/0x198
[   91.207702]  kasan_check_range from copy_user_test_oob+0x24c/0x12b0
[   91.207702]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   91.207733]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.207763]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   91.207794]  kthread from ret_from_fork+0x14/0x20
[   91.207824] Exception stack(0xf277bfb0 to 0xf277bff8)
[   91.207824] bfa0:                                     00000000 00000000 00000000 00000000
[   91.207855] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   91.207855] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   91.207885] 
[   91.319122] Allocated by task 341:
[   91.322570]  kasan_save_track+0x30/0x5c
[   91.326416]  __kasan_kmalloc+0x8c/0x94
[   91.330200]  __kmalloc_noprof+0x20c/0x488
[   91.334259]  kunit_kmalloc_array+0x28/0x60
[   91.338378]  copy_user_test_oob+0xac/0x12b0
[   91.342620]  kunit_try_run_case+0x22c/0x5a8
[   91.346832]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.352355]  kthread+0x464/0x810
[   91.355621]  ret_from_fork+0x14/0x20
[   91.359222] 
[   91.360717] The buggy address belongs to the object at cc23f200
[   91.360717]  which belongs to the cache kmalloc-128 of size 128
[   91.372619] The buggy address is located 0 bytes inside of
[   91.372619]  allocated 120-byte region [cc23f200, cc23f278)
[   91.383728] 
[   91.385253] The buggy address belongs to the physical page:
[   91.390838] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   91.398132] flags: 0x0(zone=0)
[   91.401214] page_type: f5(slab)
[   91.404388] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   91.412506] raw: 00000000
[   91.415161] page dumped because: kasan: bad access detected
[   91.420776] 
[   91.422271] Memory state around the buggy address:
[   91.427093]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   91.433654]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.440246] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   91.446807]                                                         ^
[   91.453308]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.459869]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.466430] ==================================================================
[   92.052673] ==================================================================
[   92.059936] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x484/0x12b0
[   92.067138] Read of size 121 at addr cc23f200 by task kunit_try_catch/341
[   92.073974] 
[   92.075469] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   92.075500] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   92.075500] Hardware name: Generic DRA74X (Flattened Device Tree)
[   92.075531] Call trace: 
[   92.075531]  unwind_backtrace from show_stack+0x18/0x1c
[   92.075561]  show_stack from dump_stack_lvl+0x70/0x90
[   92.075561]  dump_stack_lvl from print_report+0x158/0x528
[   92.075592]  print_report from kasan_report+0xdc/0x118
[   92.075622]  kasan_report from kasan_check_range+0x14c/0x198
[   92.075653]  kasan_check_range from copy_user_test_oob+0x484/0x12b0
[   92.075683]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   92.075683]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.075714]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   92.075744]  kthread from ret_from_fork+0x14/0x20
[   92.075775] Exception stack(0xf277bfb0 to 0xf277bff8)
[   92.075775] bfa0:                                     00000000 00000000 00000000 00000000
[   92.075805] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   92.075805] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   92.075836] 
[   92.187072] Allocated by task 341:
[   92.190521]  kasan_save_track+0x30/0x5c
[   92.194366]  __kasan_kmalloc+0x8c/0x94
[   92.198150]  __kmalloc_noprof+0x20c/0x488
[   92.202209]  kunit_kmalloc_array+0x28/0x60
[   92.206329]  copy_user_test_oob+0xac/0x12b0
[   92.210540]  kunit_try_run_case+0x22c/0x5a8
[   92.214782]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.220306]  kthread+0x464/0x810
[   92.223571]  ret_from_fork+0x14/0x20
[   92.227172] 
[   92.228668] The buggy address belongs to the object at cc23f200
[   92.228668]  which belongs to the cache kmalloc-128 of size 128
[   92.240570] The buggy address is located 0 bytes inside of
[   92.240570]  allocated 120-byte region [cc23f200, cc23f278)
[   92.251678] 
[   92.253204] The buggy address belongs to the physical page:
[   92.258789] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   92.266082] flags: 0x0(zone=0)
[   92.269165] page_type: f5(slab)
[   92.272338] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   92.280456] raw: 00000000
[   92.283111] page dumped because: kasan: bad access detected
[   92.288726] 
[   92.290222] Memory state around the buggy address:
[   92.295043]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   92.301605]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.308197] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   92.314758]                                                         ^
[   92.321228]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.327819]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.334381] ==================================================================
[   92.630828] ==================================================================
[   92.638092] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x12b0
[   92.645263] Read of size 121 at addr cc23f200 by task kunit_try_catch/341
[   92.652130] 
[   92.653625] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   92.653656] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   92.653656] Hardware name: Generic DRA74X (Flattened Device Tree)
[   92.653686] Call trace: 
[   92.653686]  unwind_backtrace from show_stack+0x18/0x1c
[   92.653717]  show_stack from dump_stack_lvl+0x70/0x90
[   92.653717]  dump_stack_lvl from print_report+0x158/0x528
[   92.653747]  print_report from kasan_report+0xdc/0x118
[   92.653778]  kasan_report from kasan_check_range+0x14c/0x198
[   92.653808]  kasan_check_range from copy_user_test_oob+0x604/0x12b0
[   92.653839]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   92.653839]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.653869]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   92.653900]  kthread from ret_from_fork+0x14/0x20
[   92.653930] Exception stack(0xf277bfb0 to 0xf277bff8)
[   92.653930] bfa0:                                     00000000 00000000 00000000 00000000
[   92.653961] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   92.653961] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   92.653991] 
[   92.765228] Allocated by task 341:
[   92.768676]  kasan_save_track+0x30/0x5c
[   92.772521]  __kasan_kmalloc+0x8c/0x94
[   92.776306]  __kmalloc_noprof+0x20c/0x488
[   92.780364]  kunit_kmalloc_array+0x28/0x60
[   92.784484]  copy_user_test_oob+0xac/0x12b0
[   92.788696]  kunit_try_run_case+0x22c/0x5a8
[   92.792938]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.798461]  kthread+0x464/0x810
[   92.801696]  ret_from_fork+0x14/0x20
[   92.805328] 
[   92.806823] The buggy address belongs to the object at cc23f200
[   92.806823]  which belongs to the cache kmalloc-128 of size 128
[   92.818725] The buggy address is located 0 bytes inside of
[   92.818725]  allocated 120-byte region [cc23f200, cc23f278)
[   92.829833] 
[   92.831329] The buggy address belongs to the physical page:
[   92.836944] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   92.844207] flags: 0x0(zone=0)
[   92.847290] page_type: f5(slab)
[   92.850463] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   92.858612] raw: 00000000
[   92.861236] page dumped because: kasan: bad access detected
[   92.866851] 
[   92.868347] Memory state around the buggy address:
[   92.873168]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   92.879760]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.886322] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   92.892883]                                                         ^
[   92.899383]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.905944]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.912536] ==================================================================
[   91.763458] ==================================================================
[   91.770721] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c4/0x12b0
[   91.777923] Write of size 121 at addr cc23f200 by task kunit_try_catch/341
[   91.784851] 
[   91.786346] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   91.786376] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   91.786407] Hardware name: Generic DRA74X (Flattened Device Tree)
[   91.786407] Call trace: 
[   91.786407]  unwind_backtrace from show_stack+0x18/0x1c
[   91.786437]  show_stack from dump_stack_lvl+0x70/0x90
[   91.786468]  dump_stack_lvl from print_report+0x158/0x528
[   91.786499]  print_report from kasan_report+0xdc/0x118
[   91.786499]  kasan_report from kasan_check_range+0x14c/0x198
[   91.786529]  kasan_check_range from copy_user_test_oob+0x3c4/0x12b0
[   91.786560]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   91.786590]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.786621]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   91.786651]  kthread from ret_from_fork+0x14/0x20
[   91.786651] Exception stack(0xf277bfb0 to 0xf277bff8)
[   91.786682] bfa0:                                     00000000 00000000 00000000 00000000
[   91.786682] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   91.786712] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   91.786712] 
[   91.897979] Allocated by task 341:
[   91.901397]  kasan_save_track+0x30/0x5c
[   91.905273]  __kasan_kmalloc+0x8c/0x94
[   91.909057]  __kmalloc_noprof+0x20c/0x488
[   91.913116]  kunit_kmalloc_array+0x28/0x60
[   91.917236]  copy_user_test_oob+0xac/0x12b0
[   91.921447]  kunit_try_run_case+0x22c/0x5a8
[   91.925659]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.931213]  kthread+0x464/0x810
[   91.934448]  ret_from_fork+0x14/0x20
[   91.938049] 
[   91.939575] The buggy address belongs to the object at cc23f200
[   91.939575]  which belongs to the cache kmalloc-128 of size 128
[   91.951477] The buggy address is located 0 bytes inside of
[   91.951477]  allocated 120-byte region [cc23f200, cc23f278)
[   91.962585] 
[   91.964080] The buggy address belongs to the physical page:
[   91.969696] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   91.976959] flags: 0x0(zone=0)
[   91.980041] page_type: f5(slab)
[   91.983215] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   91.991363] raw: 00000000
[   91.993988] page dumped because: kasan: bad access detected
[   91.999603] 
[   92.001098] Memory state around the buggy address:
[   92.005920]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   92.012512]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.019073] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   92.025634]                                                         ^
[   92.032135]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.038696]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.045257] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   90.881469] ==================================================================
[   90.888732] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x144/0x3fc
[   90.896179] Write of size 8 at addr cc23f178 by task kunit_try_catch/337
[   90.902923] 
[   90.904449] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   90.904479] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   90.904479] Hardware name: Generic DRA74X (Flattened Device Tree)
[   90.904479] Call trace: 
[   90.904510]  unwind_backtrace from show_stack+0x18/0x1c
[   90.904510]  show_stack from dump_stack_lvl+0x70/0x90
[   90.904541]  dump_stack_lvl from print_report+0x158/0x528
[   90.904571]  print_report from kasan_report+0xdc/0x118
[   90.904602]  kasan_report from kasan_check_range+0x14c/0x198
[   90.904632]  kasan_check_range from copy_to_kernel_nofault+0x144/0x3fc
[   90.904632]  copy_to_kernel_nofault from copy_to_kernel_nofault_oob+0x258/0x4fc
[   90.904663]  copy_to_kernel_nofault_oob from kunit_try_run_case+0x22c/0x5a8
[   90.904693]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.904724]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   90.904754]  kthread from ret_from_fork+0x14/0x20
[   90.904785] Exception stack(0xf2763fb0 to 0xf2763ff8)
[   90.904785] 3fa0:                                     00000000 00000000 00000000 00000000
[   90.904815] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   90.904815] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   90.904846] 
[   91.024383] Allocated by task 337:
[   91.027801]  kasan_save_track+0x30/0x5c
[   91.031677]  __kasan_kmalloc+0x8c/0x94
[   91.035461]  copy_to_kernel_nofault_oob+0xf0/0x4fc
[   91.040283]  kunit_try_run_case+0x22c/0x5a8
[   91.044525]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.050048]  kthread+0x464/0x810
[   91.053283]  ret_from_fork+0x14/0x20
[   91.056915] 
[   91.058410] The buggy address belongs to the object at cc23f100
[   91.058410]  which belongs to the cache kmalloc-128 of size 128
[   91.070312] The buggy address is located 0 bytes to the right of
[   91.070312]  allocated 120-byte region [cc23f100, cc23f178)
[   91.081939] 
[   91.083435] The buggy address belongs to the physical page:
[   91.089050] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   91.096313] flags: 0x0(zone=0)
[   91.099395] page_type: f5(slab)
[   91.102569] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   91.110717] raw: 00000000
[   91.113372] page dumped because: kasan: bad access detected
[   91.118957] 
[   91.120483] Memory state around the buggy address:
[   91.125305]  cc23f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc
[   91.131866]  cc23f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.138427] >cc23f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   91.145019]                                                         ^
[   91.151489]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.158050]  cc23f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.164642] ==================================================================
[   90.589233] ==================================================================
[   90.604187] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x37c/0x3fc
[   90.611663] Read of size 8 at addr cc23f178 by task kunit_try_catch/337
[   90.618316] 
[   90.619812] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   90.619842] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   90.619873] Hardware name: Generic DRA74X (Flattened Device Tree)
[   90.619873] Call trace: 
[   90.619873]  unwind_backtrace from show_stack+0x18/0x1c
[   90.619903]  show_stack from dump_stack_lvl+0x70/0x90
[   90.619934]  dump_stack_lvl from print_report+0x158/0x528
[   90.619964]  print_report from kasan_report+0xdc/0x118
[   90.619995]  kasan_report from copy_to_kernel_nofault+0x37c/0x3fc
[   90.620025]  copy_to_kernel_nofault from copy_to_kernel_nofault_oob+0x1c0/0x4fc
[   90.620056]  copy_to_kernel_nofault_oob from kunit_try_run_case+0x22c/0x5a8
[   90.620056]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.620086]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   90.620117]  kthread from ret_from_fork+0x14/0x20
[   90.620147] Exception stack(0xf2763fb0 to 0xf2763ff8)
[   90.620147] 3fa0:                                     00000000 00000000 00000000 00000000
[   90.620178] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   90.620208] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   90.620208] 
[   90.733642] Allocated by task 337:
[   90.737060]  kasan_save_track+0x30/0x5c
[   90.740936]  __kasan_kmalloc+0x8c/0x94
[   90.744720]  copy_to_kernel_nofault_oob+0xf0/0x4fc
[   90.749542]  kunit_try_run_case+0x22c/0x5a8
[   90.753784]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.759307]  kthread+0x464/0x810
[   90.762542]  ret_from_fork+0x14/0x20
[   90.766174] 
[   90.767669] The buggy address belongs to the object at cc23f100
[   90.767669]  which belongs to the cache kmalloc-128 of size 128
[   90.779571] The buggy address is located 0 bytes to the right of
[   90.779571]  allocated 120-byte region [cc23f100, cc23f178)
[   90.791198] 
[   90.792724] The buggy address belongs to the physical page:
[   90.798309] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   90.805603] flags: 0x0(zone=0)
[   90.808685] page_type: f5(slab)
[   90.811828] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   90.819976] raw: 00000000
[   90.822631] page dumped because: kasan: bad access detected
[   90.828247] 
[   90.829742] Memory state around the buggy address:
[   90.834564]  cc23f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc
[   90.841125]  cc23f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.847717] >cc23f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   90.854278]                                                         ^
[   90.860778]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.867340]  cc23f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.873901] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   90.310516] ==================================================================
[   90.317810] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x6a8/0x6fc
[   90.324554] Read of size 1 at addr f02b57f8 by task kunit_try_catch/325
[   90.331207] 
[   90.332733] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   90.332763] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   90.332763] Hardware name: Generic DRA74X (Flattened Device Tree)
[   90.332763] Call trace: 
[   90.332763]  unwind_backtrace from show_stack+0x18/0x1c
[   90.332794]  show_stack from dump_stack_lvl+0x70/0x90
[   90.332824]  dump_stack_lvl from print_report+0x158/0x528
[   90.332855]  print_report from kasan_report+0xdc/0x118
[   90.332885]  kasan_report from vmalloc_oob+0x6a8/0x6fc
[   90.332885]  vmalloc_oob from kunit_try_run_case+0x22c/0x5a8
[   90.332916]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.332946]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   90.332977]  kthread from ret_from_fork+0x14/0x20
[   90.333007] Exception stack(0xf270bfb0 to 0xf270bff8)
[   90.333007] bfa0:                                     00000000 00000000 00000000 00000000
[   90.333038] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   90.333038] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   90.333068] 
[   90.436889] The buggy address belongs to the virtual mapping at
[   90.436889]  [f02b5000, f02b7000) created by:
[   90.436889]  vmalloc_oob+0x88/0x6fc
[   90.450714] 
[   90.452209] The buggy address belongs to the physical page:
[   90.457824] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0d9a
[   90.465087] flags: 0x80000000(zone=2)
[   90.468780] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   90.476928] raw: 00000000
[   90.479583] page dumped because: kasan: bad access detected
[   90.485168] 
[   90.486694] Memory state around the buggy address:
[   90.491516]  f02b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   90.498077]  f02b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   90.504638] >f02b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   90.511230]                                                         ^
[   90.517700]  f02b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   90.524291]  f02b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   90.530853] ==================================================================
[   90.074859] ==================================================================
[   90.090087] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x6a0/0x6fc
[   90.096862] Read of size 1 at addr f02b57f3 by task kunit_try_catch/325
[   90.103515] 
[   90.105010] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   90.105041] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   90.105041] Hardware name: Generic DRA74X (Flattened Device Tree)
[   90.105072] Call trace: 
[   90.105072]  unwind_backtrace from show_stack+0x18/0x1c
[   90.105102]  show_stack from dump_stack_lvl+0x70/0x90
[   90.105133]  dump_stack_lvl from print_report+0x158/0x528
[   90.105163]  print_report from kasan_report+0xdc/0x118
[   90.105163]  kasan_report from vmalloc_oob+0x6a0/0x6fc
[   90.105194]  vmalloc_oob from kunit_try_run_case+0x22c/0x5a8
[   90.105224]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.105255]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   90.105285]  kthread from ret_from_fork+0x14/0x20
[   90.105285] Exception stack(0xf270bfb0 to 0xf270bff8)
[   90.105316] bfa0:                                     00000000 00000000 00000000 00000000
[   90.105316] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   90.105346] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   90.105377] 
[   90.209197] The buggy address belongs to the virtual mapping at
[   90.209197]  [f02b5000, f02b7000) created by:
[   90.209197]  vmalloc_oob+0x88/0x6fc
[   90.223022] 
[   90.224517] The buggy address belongs to the physical page:
[   90.230133] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0d9a
[   90.237396] flags: 0x80000000(zone=2)
[   90.241119] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   90.249237] raw: 00000000
[   90.251892] page dumped because: kasan: bad access detected
[   90.257507] 
[   90.259002] Memory state around the buggy address:
[   90.263824]  f02b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   90.270416]  f02b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   90.276977] >f02b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   90.283538]                                                      ^
[   90.289764]  f02b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   90.296325]  f02b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   90.302917] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   81.858337] ==================================================================
[   81.865600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x5ab0
[   81.873046] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   81.879730] 
[   81.881225] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   81.881256] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.881256] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.881286] Call trace: 
[   81.881286]  unwind_backtrace from show_stack+0x18/0x1c
[   81.881317]  show_stack from dump_stack_lvl+0x70/0x90
[   81.881317]  dump_stack_lvl from print_report+0x158/0x528
[   81.881347]  print_report from kasan_report+0xdc/0x118
[   81.881378]  kasan_report from kasan_check_range+0x14c/0x198
[   81.881408]  kasan_check_range from kasan_atomics_helper+0x154c/0x5ab0
[   81.881439]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.881439]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.881469]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.881500]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.881530]  kthread from ret_from_fork+0x14/0x20
[   81.881561] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   81.881561] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.881591] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.881591] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.881622] 
[   81.998718] Allocated by task 321:
[   82.002136]  kasan_save_track+0x30/0x5c
[   82.006011]  __kasan_kmalloc+0x8c/0x94
[   82.009796]  kasan_atomics+0xc0/0x33c
[   82.013488]  kunit_try_run_case+0x22c/0x5a8
[   82.017700]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.023223]  kthread+0x464/0x810
[   82.026489]  ret_from_fork+0x14/0x20
[   82.030090] 
[   82.031616] The buggy address belongs to the object at cc23e880
[   82.031616]  which belongs to the cache kmalloc-64 of size 64
[   82.043334] The buggy address is located 0 bytes to the right of
[   82.043334]  allocated 48-byte region [cc23e880, cc23e8b0)
[   82.054870] 
[   82.056396] The buggy address belongs to the physical page:
[   82.061981] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   82.069274] flags: 0x0(zone=0)
[   82.072357] page_type: f5(slab)
[   82.075500] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.083648] raw: 00000000
[   82.086303] page dumped because: kasan: bad access detected
[   82.091918] 
[   82.093414] Memory state around the buggy address:
[   82.098236]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.104797]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.111389] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.117950]                              ^
[   82.122070]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.128662]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.135223] ==================================================================
[   83.267395] ==================================================================
[   83.274658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1774/0x5ab0
[   83.282104] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   83.288879] 
[   83.290374] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   83.290405] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.290405] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.290435] Call trace: 
[   83.290435]  unwind_backtrace from show_stack+0x18/0x1c
[   83.290466]  show_stack from dump_stack_lvl+0x70/0x90
[   83.290466]  dump_stack_lvl from print_report+0x158/0x528
[   83.290496]  print_report from kasan_report+0xdc/0x118
[   83.290527]  kasan_report from kasan_check_range+0x14c/0x198
[   83.290557]  kasan_check_range from kasan_atomics_helper+0x1774/0x5ab0
[   83.290588]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.290588]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.290618]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.290649]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.290679]  kthread from ret_from_fork+0x14/0x20
[   83.290710] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   83.290710] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.290740] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.290740] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.290771] 
[   83.407867] Allocated by task 321:
[   83.411285]  kasan_save_track+0x30/0x5c
[   83.415161]  __kasan_kmalloc+0x8c/0x94
[   83.418945]  kasan_atomics+0xc0/0x33c
[   83.422637]  kunit_try_run_case+0x22c/0x5a8
[   83.426849]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.432403]  kthread+0x464/0x810
[   83.435638]  ret_from_fork+0x14/0x20
[   83.439239] 
[   83.440765] The buggy address belongs to the object at cc23e880
[   83.440765]  which belongs to the cache kmalloc-64 of size 64
[   83.452484] The buggy address is located 0 bytes to the right of
[   83.452484]  allocated 48-byte region [cc23e880, cc23e8b0)
[   83.464019] 
[   83.465545] The buggy address belongs to the physical page:
[   83.471130] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   83.478424] flags: 0x0(zone=0)
[   83.481506] page_type: f5(slab)
[   83.484680] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   83.492797] raw: 00000000
[   83.495452] page dumped because: kasan: bad access detected
[   83.501068] 
[   83.502563] Memory state around the buggy address:
[   83.507385]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.513946]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.520538] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   83.527099]                              ^
[   83.531219]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.537811]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.544372] ==================================================================
[   75.062286] ==================================================================
[   75.069549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x648/0x5ab0
[   75.076904] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   75.083648] 
[   75.085174] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   75.085205] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.085205] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.085205] Call trace: 
[   75.085235]  unwind_backtrace from show_stack+0x18/0x1c
[   75.085235]  show_stack from dump_stack_lvl+0x70/0x90
[   75.085266]  dump_stack_lvl from print_report+0x158/0x528
[   75.085296]  print_report from kasan_report+0xdc/0x118
[   75.085327]  kasan_report from kasan_check_range+0x14c/0x198
[   75.085357]  kasan_check_range from kasan_atomics_helper+0x648/0x5ab0
[   75.085357]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.085388]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.085418]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.085449]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.085479]  kthread from ret_from_fork+0x14/0x20
[   75.085510] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   75.085510] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.085540] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.085540] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.085571] 
[   75.202575] Allocated by task 321:
[   75.205993]  kasan_save_track+0x30/0x5c
[   75.209869]  __kasan_kmalloc+0x8c/0x94
[   75.213653]  kasan_atomics+0xc0/0x33c
[   75.217346]  kunit_try_run_case+0x22c/0x5a8
[   75.221557]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.227111]  kthread+0x464/0x810
[   75.230346]  ret_from_fork+0x14/0x20
[   75.233947] 
[   75.235473] The buggy address belongs to the object at cc23e880
[   75.235473]  which belongs to the cache kmalloc-64 of size 64
[   75.247192] The buggy address is located 0 bytes to the right of
[   75.247192]  allocated 48-byte region [cc23e880, cc23e8b0)
[   75.258728] 
[   75.260253] The buggy address belongs to the physical page:
[   75.265838] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   75.273132] flags: 0x0(zone=0)
[   75.276214] page_type: f5(slab)
[   75.279388] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.287536] raw: 00000000
[   75.290161] page dumped because: kasan: bad access detected
[   75.295776] 
[   75.297271] Memory state around the buggy address:
[   75.302093]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.308685]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.315246] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.321807]                              ^
[   75.325927]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.332519]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.339080] ==================================================================
[   79.886871] ==================================================================
[   79.894134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11a4/0x5ab0
[   79.901611] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   79.908355] 
[   79.909851] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   79.909881] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.909881] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.909912] Call trace: 
[   79.909912]  unwind_backtrace from show_stack+0x18/0x1c
[   79.909942]  show_stack from dump_stack_lvl+0x70/0x90
[   79.909973]  dump_stack_lvl from print_report+0x158/0x528
[   79.910003]  print_report from kasan_report+0xdc/0x118
[   79.910003]  kasan_report from kasan_check_range+0x14c/0x198
[   79.910034]  kasan_check_range from kasan_atomics_helper+0x11a4/0x5ab0
[   79.910064]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.910095]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.910125]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.910125]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.910156]  kthread from ret_from_fork+0x14/0x20
[   79.910186] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   79.910186] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.910217] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.910247] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.910247] 
[   80.027343] Allocated by task 321:
[   80.030792]  kasan_save_track+0x30/0x5c
[   80.034667]  __kasan_kmalloc+0x8c/0x94
[   80.038452]  kasan_atomics+0xc0/0x33c
[   80.042144]  kunit_try_run_case+0x22c/0x5a8
[   80.046356]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.051879]  kthread+0x464/0x810
[   80.055145]  ret_from_fork+0x14/0x20
[   80.058746] 
[   80.060241] The buggy address belongs to the object at cc23e880
[   80.060241]  which belongs to the cache kmalloc-64 of size 64
[   80.071960] The buggy address is located 0 bytes to the right of
[   80.071960]  allocated 48-byte region [cc23e880, cc23e8b0)
[   80.083526] 
[   80.085021] The buggy address belongs to the physical page:
[   80.090637] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   80.097900] flags: 0x0(zone=0)
[   80.100982] page_type: f5(slab)
[   80.104156] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.112304] raw: 00000000
[   80.114929] page dumped because: kasan: bad access detected
[   80.120544] 
[   80.122039] Memory state around the buggy address:
[   80.126861]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.133453]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.140014] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.146575]                              ^
[   80.150726]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.157287]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.163848] ==================================================================
[   73.937713] ==================================================================
[   73.945007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5200/0x5ab0
[   73.952453] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   73.959106] 
[   73.960632] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   73.960632] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.960662] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.960662] Call trace: 
[   73.960662]  unwind_backtrace from show_stack+0x18/0x1c
[   73.960693]  show_stack from dump_stack_lvl+0x70/0x90
[   73.960723]  dump_stack_lvl from print_report+0x158/0x528
[   73.960754]  print_report from kasan_report+0xdc/0x118
[   73.960784]  kasan_report from kasan_atomics_helper+0x5200/0x5ab0
[   73.960815]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.960815]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.960845]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.960876]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.960906]  kthread from ret_from_fork+0x14/0x20
[   73.960937] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   73.960937] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.960968] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.960968] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.960998] 
[   74.071990] Allocated by task 321:
[   74.075408]  kasan_save_track+0x30/0x5c
[   74.079284]  __kasan_kmalloc+0x8c/0x94
[   74.083068]  kasan_atomics+0xc0/0x33c
[   74.086761]  kunit_try_run_case+0x22c/0x5a8
[   74.090972]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.096496]  kthread+0x464/0x810
[   74.099761]  ret_from_fork+0x14/0x20
[   74.103363] 
[   74.104858] The buggy address belongs to the object at cc23e880
[   74.104858]  which belongs to the cache kmalloc-64 of size 64
[   74.116607] The buggy address is located 0 bytes to the right of
[   74.116607]  allocated 48-byte region [cc23e880, cc23e8b0)
[   74.128143] 
[   74.129638] The buggy address belongs to the physical page:
[   74.135253] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   74.142517] flags: 0x0(zone=0)
[   74.145599] page_type: f5(slab)
[   74.148773] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.156921] raw: 00000000
[   74.159545] page dumped because: kasan: bad access detected
[   74.165161] 
[   74.166687] Memory state around the buggy address:
[   74.171508]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.178070]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.184631] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.191223]                              ^
[   74.195343]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.201904]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.208496] ==================================================================
[   82.142547] ==================================================================
[   82.149810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52e4/0x5ab0
[   82.157287] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   82.163940] 
[   82.165435] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   82.165466] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   82.165466] Hardware name: Generic DRA74X (Flattened Device Tree)
[   82.165496] Call trace: 
[   82.165496]  unwind_backtrace from show_stack+0x18/0x1c
[   82.165527]  show_stack from dump_stack_lvl+0x70/0x90
[   82.165557]  dump_stack_lvl from print_report+0x158/0x528
[   82.165588]  print_report from kasan_report+0xdc/0x118
[   82.165588]  kasan_report from kasan_atomics_helper+0x52e4/0x5ab0
[   82.165618]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   82.165649]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   82.165679]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.165710]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   82.165710]  kthread from ret_from_fork+0x14/0x20
[   82.165740] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   82.165771] 3fa0:                                     00000000 00000000 00000000 00000000
[   82.165771] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   82.165802] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   82.165802] 
[   82.276794] Allocated by task 321:
[   82.280212]  kasan_save_track+0x30/0x5c
[   82.284088]  __kasan_kmalloc+0x8c/0x94
[   82.287872]  kasan_atomics+0xc0/0x33c
[   82.291564]  kunit_try_run_case+0x22c/0x5a8
[   82.295776]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.301330]  kthread+0x464/0x810
[   82.304565]  ret_from_fork+0x14/0x20
[   82.308197] 
[   82.309692] The buggy address belongs to the object at cc23e880
[   82.309692]  which belongs to the cache kmalloc-64 of size 64
[   82.321411] The buggy address is located 0 bytes to the right of
[   82.321411]  allocated 48-byte region [cc23e880, cc23e8b0)
[   82.332946] 
[   82.334472] The buggy address belongs to the physical page:
[   82.340057] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   82.347351] flags: 0x0(zone=0)
[   82.350433] page_type: f5(slab)
[   82.353576] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.361724] raw: 00000000
[   82.364379] page dumped because: kasan: bad access detected
[   82.369995] 
[   82.371490] Memory state around the buggy address:
[   82.376312]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.382873]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.389465] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.396026]                              ^
[   82.400146]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.406738]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.413299] ==================================================================
[   77.051239] ==================================================================
[   77.058502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac4/0x5ab0
[   77.065887] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   77.072631] 
[   77.074127] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   77.074157] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.074157] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.074188] Call trace: 
[   77.074188]  unwind_backtrace from show_stack+0x18/0x1c
[   77.074218]  show_stack from dump_stack_lvl+0x70/0x90
[   77.074249]  dump_stack_lvl from print_report+0x158/0x528
[   77.074279]  print_report from kasan_report+0xdc/0x118
[   77.074279]  kasan_report from kasan_check_range+0x14c/0x198
[   77.074310]  kasan_check_range from kasan_atomics_helper+0xac4/0x5ab0
[   77.074340]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.074371]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.074401]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.074401]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.074432]  kthread from ret_from_fork+0x14/0x20
[   77.074462] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   77.074462] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.074493] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.074523] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.074523] 
[   77.191528] Allocated by task 321:
[   77.194976]  kasan_save_track+0x30/0x5c
[   77.198822]  __kasan_kmalloc+0x8c/0x94
[   77.202606]  kasan_atomics+0xc0/0x33c
[   77.206298]  kunit_try_run_case+0x22c/0x5a8
[   77.210540]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.216064]  kthread+0x464/0x810
[   77.219329]  ret_from_fork+0x14/0x20
[   77.222930] 
[   77.224426] The buggy address belongs to the object at cc23e880
[   77.224426]  which belongs to the cache kmalloc-64 of size 64
[   77.236145] The buggy address is located 0 bytes to the right of
[   77.236145]  allocated 48-byte region [cc23e880, cc23e8b0)
[   77.247711] 
[   77.249206] The buggy address belongs to the physical page:
[   77.254821] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   77.262084] flags: 0x0(zone=0)
[   77.265167] page_type: f5(slab)
[   77.268341] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   77.276489] raw: 00000000
[   77.279113] page dumped because: kasan: bad access detected
[   77.284729] 
[   77.286224] Memory state around the buggy address:
[   77.291046]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.297637]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.304199] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.310760]                              ^
[   77.314910]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.321472]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.328033] ==================================================================
[   85.257537] ==================================================================
[   85.264801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1bf0/0x5ab0
[   85.272247] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   85.278991] 
[   85.280517] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   85.280548] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.280548] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.280548] Call trace: 
[   85.280578]  unwind_backtrace from show_stack+0x18/0x1c
[   85.280578]  show_stack from dump_stack_lvl+0x70/0x90
[   85.280609]  dump_stack_lvl from print_report+0x158/0x528
[   85.280639]  print_report from kasan_report+0xdc/0x118
[   85.280670]  kasan_report from kasan_check_range+0x14c/0x198
[   85.280700]  kasan_check_range from kasan_atomics_helper+0x1bf0/0x5ab0
[   85.280700]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.280731]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.280761]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.280792]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.280822]  kthread from ret_from_fork+0x14/0x20
[   85.280822] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   85.280853] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.280883] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.280883] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.280914] 
[   85.398010] Allocated by task 321:
[   85.401428]  kasan_save_track+0x30/0x5c
[   85.405303]  __kasan_kmalloc+0x8c/0x94
[   85.409088]  kasan_atomics+0xc0/0x33c
[   85.412780]  kunit_try_run_case+0x22c/0x5a8
[   85.416992]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.422515]  kthread+0x464/0x810
[   85.425781]  ret_from_fork+0x14/0x20
[   85.429382] 
[   85.430877] The buggy address belongs to the object at cc23e880
[   85.430877]  which belongs to the cache kmalloc-64 of size 64
[   85.442626] The buggy address is located 0 bytes to the right of
[   85.442626]  allocated 48-byte region [cc23e880, cc23e8b0)
[   85.454162] 
[   85.455657] The buggy address belongs to the physical page:
[   85.461273] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   85.468536] flags: 0x0(zone=0)
[   85.471618] page_type: f5(slab)
[   85.474792] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   85.482940] raw: 00000000
[   85.485595] page dumped because: kasan: bad access detected
[   85.491180] 
[   85.492706] Memory state around the buggy address:
[   85.497528]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.504089]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.510650] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   85.517242]                              ^
[   85.521362]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.527923]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.534515] ==================================================================
[   77.903656] ==================================================================
[   77.910949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x5ab0
[   77.918304] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   77.925048] 
[   77.926544] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   77.926574] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.926605] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.926605] Call trace: 
[   77.926605]  unwind_backtrace from show_stack+0x18/0x1c
[   77.926635]  show_stack from dump_stack_lvl+0x70/0x90
[   77.926666]  dump_stack_lvl from print_report+0x158/0x528
[   77.926696]  print_report from kasan_report+0xdc/0x118
[   77.926727]  kasan_report from kasan_check_range+0x14c/0x198
[   77.926727]  kasan_check_range from kasan_atomics_helper+0xd3c/0x5ab0
[   77.926757]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.926788]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.926818]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.926849]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.926879]  kthread from ret_from_fork+0x14/0x20
[   77.926879] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   77.926910] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.926910] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.926940] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.926940] 
[   78.043975] Allocated by task 321:
[   78.047393]  kasan_save_track+0x30/0x5c
[   78.051269]  __kasan_kmalloc+0x8c/0x94
[   78.055053]  kasan_atomics+0xc0/0x33c
[   78.058746]  kunit_try_run_case+0x22c/0x5a8
[   78.062957]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.068481]  kthread+0x464/0x810
[   78.071746]  ret_from_fork+0x14/0x20
[   78.075347] 
[   78.076843] The buggy address belongs to the object at cc23e880
[   78.076843]  which belongs to the cache kmalloc-64 of size 64
[   78.088592] The buggy address is located 0 bytes to the right of
[   78.088592]  allocated 48-byte region [cc23e880, cc23e8b0)
[   78.100128] 
[   78.101623] The buggy address belongs to the physical page:
[   78.107238] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   78.114532] flags: 0x0(zone=0)
[   78.117584] page_type: f5(slab)
[   78.120758] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.128906] raw: 00000000
[   78.131561] page dumped because: kasan: bad access detected
[   78.137145] 
[   78.138671] Memory state around the buggy address:
[   78.143493]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.150054]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.156616] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.163208]                              ^
[   78.167327]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.173889]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.180480] ==================================================================
[   80.171173] ==================================================================
[   80.178466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1268/0x5ab0
[   80.185913] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   80.192657] 
[   80.194152] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   80.194183] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   80.194183] Hardware name: Generic DRA74X (Flattened Device Tree)
[   80.194213] Call trace: 
[   80.194213]  unwind_backtrace from show_stack+0x18/0x1c
[   80.194244]  show_stack from dump_stack_lvl+0x70/0x90
[   80.194274]  dump_stack_lvl from print_report+0x158/0x528
[   80.194305]  print_report from kasan_report+0xdc/0x118
[   80.194305]  kasan_report from kasan_check_range+0x14c/0x198
[   80.194335]  kasan_check_range from kasan_atomics_helper+0x1268/0x5ab0
[   80.194366]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   80.194396]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   80.194427]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.194427]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   80.194458]  kthread from ret_from_fork+0x14/0x20
[   80.194488] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   80.194488] 3fa0:                                     00000000 00000000 00000000 00000000
[   80.194519] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   80.194549] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   80.194549] 
[   80.311645] Allocated by task 321:
[   80.315093]  kasan_save_track+0x30/0x5c
[   80.318939]  __kasan_kmalloc+0x8c/0x94
[   80.322723]  kasan_atomics+0xc0/0x33c
[   80.326416]  kunit_try_run_case+0x22c/0x5a8
[   80.330657]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.336181]  kthread+0x464/0x810
[   80.339447]  ret_from_fork+0x14/0x20
[   80.343048] 
[   80.344543] The buggy address belongs to the object at cc23e880
[   80.344543]  which belongs to the cache kmalloc-64 of size 64
[   80.356262] The buggy address is located 0 bytes to the right of
[   80.356262]  allocated 48-byte region [cc23e880, cc23e8b0)
[   80.367828] 
[   80.369323] The buggy address belongs to the physical page:
[   80.374938] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   80.382202] flags: 0x0(zone=0)
[   80.385284] page_type: f5(slab)
[   80.388458] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.396606] raw: 00000000
[   80.399230] page dumped because: kasan: bad access detected
[   80.404846] 
[   80.406341] Memory state around the buggy address:
[   80.411163]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.417755]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.424316] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.430877]                              ^
[   80.435028]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.441589]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.448150] ==================================================================
[   86.957092] ==================================================================
[   86.964355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ffc/0x5ab0
[   86.971801] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   86.978546] 
[   86.980072] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   86.980102] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.980102] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.980102] Call trace: 
[   86.980133]  unwind_backtrace from show_stack+0x18/0x1c
[   86.980163]  show_stack from dump_stack_lvl+0x70/0x90
[   86.980163]  dump_stack_lvl from print_report+0x158/0x528
[   86.980194]  print_report from kasan_report+0xdc/0x118
[   86.980224]  kasan_report from kasan_check_range+0x14c/0x198
[   86.980255]  kasan_check_range from kasan_atomics_helper+0x1ffc/0x5ab0
[   86.980285]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.980285]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.980316]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.980346]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.980377]  kthread from ret_from_fork+0x14/0x20
[   86.980407] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   86.980407] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.980438] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.980438] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.980468] 
[   87.097564] Allocated by task 321:
[   87.100982]  kasan_save_track+0x30/0x5c
[   87.104858]  __kasan_kmalloc+0x8c/0x94
[   87.108642]  kasan_atomics+0xc0/0x33c
[   87.112335]  kunit_try_run_case+0x22c/0x5a8
[   87.116546]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.122070]  kthread+0x464/0x810
[   87.125335]  ret_from_fork+0x14/0x20
[   87.128936] 
[   87.130432] The buggy address belongs to the object at cc23e880
[   87.130432]  which belongs to the cache kmalloc-64 of size 64
[   87.142150] The buggy address is located 0 bytes to the right of
[   87.142150]  allocated 48-byte region [cc23e880, cc23e8b0)
[   87.153717] 
[   87.155212] The buggy address belongs to the physical page:
[   87.160827] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   87.168090] flags: 0x0(zone=0)
[   87.171173] page_type: f5(slab)
[   87.174346] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   87.182495] raw: 00000000
[   87.185150] page dumped because: kasan: bad access detected
[   87.190734] 
[   87.192230] Memory state around the buggy address:
[   87.197082]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.203643]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.210205] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   87.216766]                              ^
[   87.220916]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.227478]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.234039] ==================================================================
[   85.826110] ==================================================================
[   85.833404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d50/0x5ab0
[   85.840850] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   85.847595] 
[   85.849090] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   85.849121] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.849121] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.849151] Call trace: 
[   85.849151]  unwind_backtrace from show_stack+0x18/0x1c
[   85.849182]  show_stack from dump_stack_lvl+0x70/0x90
[   85.849212]  dump_stack_lvl from print_report+0x158/0x528
[   85.849243]  print_report from kasan_report+0xdc/0x118
[   85.849243]  kasan_report from kasan_check_range+0x14c/0x198
[   85.849273]  kasan_check_range from kasan_atomics_helper+0x1d50/0x5ab0
[   85.849304]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.849334]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.849365]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.849365]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.849395]  kthread from ret_from_fork+0x14/0x20
[   85.849426] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   85.849426] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.849456] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.849487] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.849487] 
[   85.966583] Allocated by task 321:
[   85.970031]  kasan_save_track+0x30/0x5c
[   85.973876]  __kasan_kmalloc+0x8c/0x94
[   85.977661]  kasan_atomics+0xc0/0x33c
[   85.981353]  kunit_try_run_case+0x22c/0x5a8
[   85.985595]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.991119]  kthread+0x464/0x810
[   85.994354]  ret_from_fork+0x14/0x20
[   85.997985] 
[   85.999481] The buggy address belongs to the object at cc23e880
[   85.999481]  which belongs to the cache kmalloc-64 of size 64
[   86.011199] The buggy address is located 0 bytes to the right of
[   86.011199]  allocated 48-byte region [cc23e880, cc23e8b0)
[   86.022766] 
[   86.024261] The buggy address belongs to the physical page:
[   86.029876] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   86.037139] flags: 0x0(zone=0)
[   86.040222] page_type: f5(slab)
[   86.043395] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.051513] raw: 00000000
[   86.054168] page dumped because: kasan: bad access detected
[   86.059783] 
[   86.061279] Memory state around the buggy address:
[   86.066101]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.072662]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.079254] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.085815]                              ^
[   86.089935]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.096527]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.103088] ==================================================================
[   79.602569] ==================================================================
[   79.609832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10e0/0x5ab0
[   79.617279] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   79.624023] 
[   79.625549] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   79.625579] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.625579] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.625579] Call trace: 
[   79.625610]  unwind_backtrace from show_stack+0x18/0x1c
[   79.625640]  show_stack from dump_stack_lvl+0x70/0x90
[   79.625640]  dump_stack_lvl from print_report+0x158/0x528
[   79.625671]  print_report from kasan_report+0xdc/0x118
[   79.625701]  kasan_report from kasan_check_range+0x14c/0x198
[   79.625732]  kasan_check_range from kasan_atomics_helper+0x10e0/0x5ab0
[   79.625762]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.625762]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.625793]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.625823]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.625854]  kthread from ret_from_fork+0x14/0x20
[   79.625885] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   79.625885] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.625915] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.625915] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.625946] 
[   79.743041] Allocated by task 321:
[   79.746459]  kasan_save_track+0x30/0x5c
[   79.750335]  __kasan_kmalloc+0x8c/0x94
[   79.754119]  kasan_atomics+0xc0/0x33c
[   79.757812]  kunit_try_run_case+0x22c/0x5a8
[   79.762023]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.767578]  kthread+0x464/0x810
[   79.770812]  ret_from_fork+0x14/0x20
[   79.774414] 
[   79.775939] The buggy address belongs to the object at cc23e880
[   79.775939]  which belongs to the cache kmalloc-64 of size 64
[   79.787658] The buggy address is located 0 bytes to the right of
[   79.787658]  allocated 48-byte region [cc23e880, cc23e8b0)
[   79.799194] 
[   79.800720] The buggy address belongs to the physical page:
[   79.806304] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   79.813598] flags: 0x0(zone=0)
[   79.816680] page_type: f5(slab)
[   79.819824] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   79.827972] raw: 00000000
[   79.830627] page dumped because: kasan: bad access detected
[   79.836242] 
[   79.837738] Memory state around the buggy address:
[   79.842559]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.849121]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.855712] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.862274]                              ^
[   79.866394]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.872985]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.879547] ==================================================================
[   87.809936] ==================================================================
[   87.817230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2200/0x5ab0
[   87.824676] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   87.831420] 
[   87.832916] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   87.832946] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.832946] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.832977] Call trace: 
[   87.832977]  unwind_backtrace from show_stack+0x18/0x1c
[   87.833007]  show_stack from dump_stack_lvl+0x70/0x90
[   87.833038]  dump_stack_lvl from print_report+0x158/0x528
[   87.833068]  print_report from kasan_report+0xdc/0x118
[   87.833068]  kasan_report from kasan_check_range+0x14c/0x198
[   87.833099]  kasan_check_range from kasan_atomics_helper+0x2200/0x5ab0
[   87.833129]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.833160]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.833190]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.833190]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.833221]  kthread from ret_from_fork+0x14/0x20
[   87.833251] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   87.833251] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.833282] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.833312] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.833312] 
[   87.950408] Allocated by task 321:
[   87.953857]  kasan_save_track+0x30/0x5c
[   87.957702]  __kasan_kmalloc+0x8c/0x94
[   87.961486]  kasan_atomics+0xc0/0x33c
[   87.965179]  kunit_try_run_case+0x22c/0x5a8
[   87.969421]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.974945]  kthread+0x464/0x810
[   87.978210]  ret_from_fork+0x14/0x20
[   87.981811] 
[   87.983306] The buggy address belongs to the object at cc23e880
[   87.983306]  which belongs to the cache kmalloc-64 of size 64
[   87.995025] The buggy address is located 0 bytes to the right of
[   87.995025]  allocated 48-byte region [cc23e880, cc23e8b0)
[   88.006591] 
[   88.008087] The buggy address belongs to the physical page:
[   88.013702] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   88.020965] flags: 0x0(zone=0)
[   88.024047] page_type: f5(slab)
[   88.027221] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.035369] raw: 00000000
[   88.037994] page dumped because: kasan: bad access detected
[   88.043609] 
[   88.045104] Memory state around the buggy address:
[   88.049926]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.056488]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.063079] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.069641]                              ^
[   88.073760]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.080352]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.086914] ==================================================================
[   86.110412] ==================================================================
[   86.117706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e5c/0x5ab0
[   86.125152] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   86.131896] 
[   86.133392] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   86.133422] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.133453] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.133453] Call trace: 
[   86.133453]  unwind_backtrace from show_stack+0x18/0x1c
[   86.133483]  show_stack from dump_stack_lvl+0x70/0x90
[   86.133514]  dump_stack_lvl from print_report+0x158/0x528
[   86.133544]  print_report from kasan_report+0xdc/0x118
[   86.133575]  kasan_report from kasan_check_range+0x14c/0x198
[   86.133575]  kasan_check_range from kasan_atomics_helper+0x1e5c/0x5ab0
[   86.133605]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.133636]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.133666]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.133697]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.133697]  kthread from ret_from_fork+0x14/0x20
[   86.133728] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   86.133758] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.133758] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.133789] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.133789] 
[   86.250915] Allocated by task 321:
[   86.254333]  kasan_save_track+0x30/0x5c
[   86.258209]  __kasan_kmalloc+0x8c/0x94
[   86.261993]  kasan_atomics+0xc0/0x33c
[   86.265686]  kunit_try_run_case+0x22c/0x5a8
[   86.269897]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.275421]  kthread+0x464/0x810
[   86.278686]  ret_from_fork+0x14/0x20
[   86.282287] 
[   86.283782] The buggy address belongs to the object at cc23e880
[   86.283782]  which belongs to the cache kmalloc-64 of size 64
[   86.295501] The buggy address is located 0 bytes to the right of
[   86.295501]  allocated 48-byte region [cc23e880, cc23e8b0)
[   86.307067] 
[   86.308563] The buggy address belongs to the physical page:
[   86.314178] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   86.321441] flags: 0x0(zone=0)
[   86.324523] page_type: f5(slab)
[   86.327697] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.335845] raw: 00000000
[   86.338470] page dumped because: kasan: bad access detected
[   86.344085] 
[   86.345581] Memory state around the buggy address:
[   86.350402]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.356994]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.363555] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.370117]                              ^
[   86.374237]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.380828]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.387390] ==================================================================
[   89.225158] ==================================================================
[   89.232421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54f4/0x5ab0
[   89.239898] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   89.246551] 
[   89.248046] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   89.248077] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   89.248107] Hardware name: Generic DRA74X (Flattened Device Tree)
[   89.248107] Call trace: 
[   89.248107]  unwind_backtrace from show_stack+0x18/0x1c
[   89.248138]  show_stack from dump_stack_lvl+0x70/0x90
[   89.248168]  dump_stack_lvl from print_report+0x158/0x528
[   89.248199]  print_report from kasan_report+0xdc/0x118
[   89.248199]  kasan_report from kasan_atomics_helper+0x54f4/0x5ab0
[   89.248229]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   89.248260]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   89.248291]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.248321]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   89.248352]  kthread from ret_from_fork+0x14/0x20
[   89.248352] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   89.248382] 3fa0:                                     00000000 00000000 00000000 00000000
[   89.248382] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   89.248413] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   89.248413] 
[   89.359405] Allocated by task 321:
[   89.362823]  kasan_save_track+0x30/0x5c
[   89.366699]  __kasan_kmalloc+0x8c/0x94
[   89.370483]  kasan_atomics+0xc0/0x33c
[   89.374176]  kunit_try_run_case+0x22c/0x5a8
[   89.378387]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.383941]  kthread+0x464/0x810
[   89.387176]  ret_from_fork+0x14/0x20
[   89.390777] 
[   89.392303] The buggy address belongs to the object at cc23e880
[   89.392303]  which belongs to the cache kmalloc-64 of size 64
[   89.404022] The buggy address is located 0 bytes to the right of
[   89.404022]  allocated 48-byte region [cc23e880, cc23e8b0)
[   89.415557] 
[   89.417083] The buggy address belongs to the physical page:
[   89.422668] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   89.429962] flags: 0x0(zone=0)
[   89.433044] page_type: f5(slab)
[   89.436187] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   89.444335] raw: 00000000
[   89.446990] page dumped because: kasan: bad access detected
[   89.452606] 
[   89.454101] Memory state around the buggy address:
[   89.458923]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.465484]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.472076] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   89.478637]                              ^
[   89.482757]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.489318]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.495910] ==================================================================
[   88.094238] ==================================================================
[   88.101501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x22c4/0x5ab0
[   88.108947] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   88.115692] 
[   88.117218] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   88.117248] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.117248] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.117279] Call trace: 
[   88.117279]  unwind_backtrace from show_stack+0x18/0x1c
[   88.117309]  show_stack from dump_stack_lvl+0x70/0x90
[   88.117309]  dump_stack_lvl from print_report+0x158/0x528
[   88.117340]  print_report from kasan_report+0xdc/0x118
[   88.117370]  kasan_report from kasan_check_range+0x14c/0x198
[   88.117401]  kasan_check_range from kasan_atomics_helper+0x22c4/0x5ab0
[   88.117431]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.117431]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.117462]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.117492]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.117523]  kthread from ret_from_fork+0x14/0x20
[   88.117553] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   88.117553] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.117584] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.117584] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.117614] 
[   88.234710] Allocated by task 321:
[   88.238128]  kasan_save_track+0x30/0x5c
[   88.242004]  __kasan_kmalloc+0x8c/0x94
[   88.245788]  kasan_atomics+0xc0/0x33c
[   88.249481]  kunit_try_run_case+0x22c/0x5a8
[   88.253692]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.259216]  kthread+0x464/0x810
[   88.262481]  ret_from_fork+0x14/0x20
[   88.266082] 
[   88.267578] The buggy address belongs to the object at cc23e880
[   88.267578]  which belongs to the cache kmalloc-64 of size 64
[   88.279296] The buggy address is located 0 bytes to the right of
[   88.279296]  allocated 48-byte region [cc23e880, cc23e8b0)
[   88.290863] 
[   88.292358] The buggy address belongs to the physical page:
[   88.297973] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   88.305236] flags: 0x0(zone=0)
[   88.308319] page_type: f5(slab)
[   88.311492] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.319641] raw: 00000000
[   88.322265] page dumped because: kasan: bad access detected
[   88.327880] 
[   88.329376] Memory state around the buggy address:
[   88.334197]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.340789]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.347351] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.353912]                              ^
[   88.358062]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.364624]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.371185] ==================================================================
[   81.295959] ==================================================================
[   81.303222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1458/0x5ab0
[   81.310668] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   81.317413] 
[   81.318939] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   81.318969] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.318969] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.318969] Call trace: 
[   81.318969]  unwind_backtrace from show_stack+0x18/0x1c
[   81.319000]  show_stack from dump_stack_lvl+0x70/0x90
[   81.319030]  dump_stack_lvl from print_report+0x158/0x528
[   81.319061]  print_report from kasan_report+0xdc/0x118
[   81.319091]  kasan_report from kasan_check_range+0x14c/0x198
[   81.319091]  kasan_check_range from kasan_atomics_helper+0x1458/0x5ab0
[   81.319122]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.319152]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.319183]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.319213]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.319244]  kthread from ret_from_fork+0x14/0x20
[   81.319244] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   81.319274] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.319305] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.319305] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.319335] 
[   81.436431] Allocated by task 321:
[   81.439849]  kasan_save_track+0x30/0x5c
[   81.443725]  __kasan_kmalloc+0x8c/0x94
[   81.447509]  kasan_atomics+0xc0/0x33c
[   81.451202]  kunit_try_run_case+0x22c/0x5a8
[   81.455413]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.460937]  kthread+0x464/0x810
[   81.464202]  ret_from_fork+0x14/0x20
[   81.467803] 
[   81.469299] The buggy address belongs to the object at cc23e880
[   81.469299]  which belongs to the cache kmalloc-64 of size 64
[   81.481048] The buggy address is located 0 bytes to the right of
[   81.481048]  allocated 48-byte region [cc23e880, cc23e8b0)
[   81.492584] 
[   81.494079] The buggy address belongs to the physical page:
[   81.499694] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   81.506958] flags: 0x0(zone=0)
[   81.510040] page_type: f5(slab)
[   81.513214] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   81.521362] raw: 00000000
[   81.523986] page dumped because: kasan: bad access detected
[   81.529602] 
[   81.531127] Memory state around the buggy address:
[   81.535949]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.542510]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.549072] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   81.555664]                              ^
[   81.559783]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.566345]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.572937] ==================================================================
[   76.482971] ==================================================================
[   76.490234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x97c/0x5ab0
[   76.497589] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   76.504333] 
[   76.505859] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   76.505889] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   76.505889] Hardware name: Generic DRA74X (Flattened Device Tree)
[   76.505889] Call trace: 
[   76.505920]  unwind_backtrace from show_stack+0x18/0x1c
[   76.505950]  show_stack from dump_stack_lvl+0x70/0x90
[   76.505950]  dump_stack_lvl from print_report+0x158/0x528
[   76.505981]  print_report from kasan_report+0xdc/0x118
[   76.506011]  kasan_report from kasan_check_range+0x14c/0x198
[   76.506042]  kasan_check_range from kasan_atomics_helper+0x97c/0x5ab0
[   76.506072]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   76.506072]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   76.506103]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.506134]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   76.506164]  kthread from ret_from_fork+0x14/0x20
[   76.506195] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   76.506195] 3fa0:                                     00000000 00000000 00000000 00000000
[   76.506225] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   76.506225] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   76.506256] 
[   76.623260] Allocated by task 321:
[   76.626678]  kasan_save_track+0x30/0x5c
[   76.630554]  __kasan_kmalloc+0x8c/0x94
[   76.634338]  kasan_atomics+0xc0/0x33c
[   76.638031]  kunit_try_run_case+0x22c/0x5a8
[   76.642242]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.647796]  kthread+0x464/0x810
[   76.651031]  ret_from_fork+0x14/0x20
[   76.654632] 
[   76.656158] The buggy address belongs to the object at cc23e880
[   76.656158]  which belongs to the cache kmalloc-64 of size 64
[   76.667877] The buggy address is located 0 bytes to the right of
[   76.667877]  allocated 48-byte region [cc23e880, cc23e8b0)
[   76.679412] 
[   76.680938] The buggy address belongs to the physical page:
[   76.686523] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   76.693817] flags: 0x0(zone=0)
[   76.696899] page_type: f5(slab)
[   76.700073] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.708190] raw: 00000000
[   76.710845] page dumped because: kasan: bad access detected
[   76.716461] 
[   76.717956] Memory state around the buggy address:
[   76.722778]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.729339]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.735931] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.742492]                              ^
[   76.746612]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.753204]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.759765] ==================================================================
[   88.378540] ==================================================================
[   88.385803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2388/0x5ab0
[   88.393249] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   88.399993] 
[   88.401489] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   88.401519] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.401550] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.401550] Call trace: 
[   88.401550]  unwind_backtrace from show_stack+0x18/0x1c
[   88.401580]  show_stack from dump_stack_lvl+0x70/0x90
[   88.401611]  dump_stack_lvl from print_report+0x158/0x528
[   88.401641]  print_report from kasan_report+0xdc/0x118
[   88.401672]  kasan_report from kasan_check_range+0x14c/0x198
[   88.401672]  kasan_check_range from kasan_atomics_helper+0x2388/0x5ab0
[   88.401702]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.401733]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.401763]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.401794]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.401794]  kthread from ret_from_fork+0x14/0x20
[   88.401824] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   88.401855] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.401855] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.401885] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.401885] 
[   88.518981] Allocated by task 321:
[   88.522430]  kasan_save_track+0x30/0x5c
[   88.526275]  __kasan_kmalloc+0x8c/0x94
[   88.530059]  kasan_atomics+0xc0/0x33c
[   88.533782]  kunit_try_run_case+0x22c/0x5a8
[   88.537994]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.543518]  kthread+0x464/0x810
[   88.546783]  ret_from_fork+0x14/0x20
[   88.550384] 
[   88.551879] The buggy address belongs to the object at cc23e880
[   88.551879]  which belongs to the cache kmalloc-64 of size 64
[   88.563598] The buggy address is located 0 bytes to the right of
[   88.563598]  allocated 48-byte region [cc23e880, cc23e8b0)
[   88.575164] 
[   88.576660] The buggy address belongs to the physical page:
[   88.582275] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   88.589538] flags: 0x0(zone=0)
[   88.592620] page_type: f5(slab)
[   88.595794] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.603942] raw: 00000000
[   88.606567] page dumped because: kasan: bad access detected
[   88.612182] 
[   88.613677] Memory state around the buggy address:
[   88.618499]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.625061]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.631652] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.638214]                              ^
[   88.642333]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.648925]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.655487] ==================================================================
[   85.541839] ==================================================================
[   85.549102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c9c/0x5ab0
[   85.556549] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   85.563293] 
[   85.564819] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   85.564849] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.564849] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.564849] Call trace: 
[   85.564849]  unwind_backtrace from show_stack+0x18/0x1c
[   85.564880]  show_stack from dump_stack_lvl+0x70/0x90
[   85.564910]  dump_stack_lvl from print_report+0x158/0x528
[   85.564941]  print_report from kasan_report+0xdc/0x118
[   85.564971]  kasan_report from kasan_check_range+0x14c/0x198
[   85.564971]  kasan_check_range from kasan_atomics_helper+0x1c9c/0x5ab0
[   85.565002]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.565032]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.565063]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.565093]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.565124]  kthread from ret_from_fork+0x14/0x20
[   85.565124] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   85.565155] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.565155] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.565185] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.565185] 
[   85.682312] Allocated by task 321:
[   85.685729]  kasan_save_track+0x30/0x5c
[   85.689605]  __kasan_kmalloc+0x8c/0x94
[   85.693389]  kasan_atomics+0xc0/0x33c
[   85.697082]  kunit_try_run_case+0x22c/0x5a8
[   85.701293]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.706817]  kthread+0x464/0x810
[   85.710083]  ret_from_fork+0x14/0x20
[   85.713684] 
[   85.715179] The buggy address belongs to the object at cc23e880
[   85.715179]  which belongs to the cache kmalloc-64 of size 64
[   85.726928] The buggy address is located 0 bytes to the right of
[   85.726928]  allocated 48-byte region [cc23e880, cc23e8b0)
[   85.738464] 
[   85.739959] The buggy address belongs to the physical page:
[   85.745574] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   85.752838] flags: 0x0(zone=0)
[   85.755920] page_type: f5(slab)
[   85.759094] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   85.767242] raw: 00000000
[   85.769897] page dumped because: kasan: bad access detected
[   85.775482] 
[   85.776977] Memory state around the buggy address:
[   85.781799]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.788391]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.794952] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   85.801544]                              ^
[   85.805664]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.812225]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.818786] ==================================================================
[   78.749999] ==================================================================
[   78.757263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xedc/0x5ab0
[   78.764648] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   78.771392] 
[   78.772888] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   78.772918] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   78.772918] Hardware name: Generic DRA74X (Flattened Device Tree)
[   78.772949] Call trace: 
[   78.772949]  unwind_backtrace from show_stack+0x18/0x1c
[   78.772979]  show_stack from dump_stack_lvl+0x70/0x90
[   78.773010]  dump_stack_lvl from print_report+0x158/0x528
[   78.773040]  print_report from kasan_report+0xdc/0x118
[   78.773040]  kasan_report from kasan_check_range+0x14c/0x198
[   78.773071]  kasan_check_range from kasan_atomics_helper+0xedc/0x5ab0
[   78.773101]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   78.773132]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   78.773162]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.773162]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   78.773193]  kthread from ret_from_fork+0x14/0x20
[   78.773223] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   78.773223] 3fa0:                                     00000000 00000000 00000000 00000000
[   78.773254] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   78.773284] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   78.773284] 
[   78.890289] Allocated by task 321:
[   78.893737]  kasan_save_track+0x30/0x5c
[   78.897613]  __kasan_kmalloc+0x8c/0x94
[   78.901367]  kasan_atomics+0xc0/0x33c
[   78.905090]  kunit_try_run_case+0x22c/0x5a8
[   78.909301]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.914825]  kthread+0x464/0x810
[   78.918090]  ret_from_fork+0x14/0x20
[   78.921691] 
[   78.923187] The buggy address belongs to the object at cc23e880
[   78.923187]  which belongs to the cache kmalloc-64 of size 64
[   78.934906] The buggy address is located 0 bytes to the right of
[   78.934906]  allocated 48-byte region [cc23e880, cc23e8b0)
[   78.946472] 
[   78.947967] The buggy address belongs to the physical page:
[   78.953582] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   78.960845] flags: 0x0(zone=0)
[   78.963928] page_type: f5(slab)
[   78.967102] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.975250] raw: 00000000
[   78.977874] page dumped because: kasan: bad access detected
[   78.983489] 
[   78.984985] Memory state around the buggy address:
[   78.989807]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.996398]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.002960] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.009521]                              ^
[   79.013671]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.020233]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.026794] ==================================================================
[   74.499969] ==================================================================
[   74.507232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50bc/0x5ab0
[   74.514678] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   74.521423] 
[   74.522949] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   74.522979] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   74.522979] Hardware name: Generic DRA74X (Flattened Device Tree)
[   74.522979] Call trace: 
[   74.523010]  unwind_backtrace from show_stack+0x18/0x1c
[   74.523040]  show_stack from dump_stack_lvl+0x70/0x90
[   74.523040]  dump_stack_lvl from print_report+0x158/0x528
[   74.523071]  print_report from kasan_report+0xdc/0x118
[   74.523101]  kasan_report from kasan_atomics_helper+0x50bc/0x5ab0
[   74.523132]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   74.523162]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   74.523162]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.523193]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   74.523223]  kthread from ret_from_fork+0x14/0x20
[   74.523254] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   74.523254] 3fa0:                                     00000000 00000000 00000000 00000000
[   74.523284] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   74.523315] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   74.523315] 
[   74.634307] Allocated by task 321:
[   74.637725]  kasan_save_track+0x30/0x5c
[   74.641601]  __kasan_kmalloc+0x8c/0x94
[   74.645385]  kasan_atomics+0xc0/0x33c
[   74.649078]  kunit_try_run_case+0x22c/0x5a8
[   74.653289]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.658813]  kthread+0x464/0x810
[   74.662078]  ret_from_fork+0x14/0x20
[   74.665679] 
[   74.667175] The buggy address belongs to the object at cc23e880
[   74.667175]  which belongs to the cache kmalloc-64 of size 64
[   74.678924] The buggy address is located 0 bytes to the right of
[   74.678924]  allocated 48-byte region [cc23e880, cc23e8b0)
[   74.690460] 
[   74.691955] The buggy address belongs to the physical page:
[   74.697570] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   74.704833] flags: 0x0(zone=0)
[   74.707916] page_type: f5(slab)
[   74.711090] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.719238] raw: 00000000
[   74.721893] page dumped because: kasan: bad access detected
[   74.727478] 
[   74.729003] Memory state around the buggy address:
[   74.733825]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.740386]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.746948] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.753540]                              ^
[   74.757659]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.764221]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.770812] ==================================================================
[   82.704925] ==================================================================
[   82.712188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52cc/0x5ab0
[   82.719635] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   82.726409] 
[   82.727905] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   82.727935] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   82.727935] Hardware name: Generic DRA74X (Flattened Device Tree)
[   82.727966] Call trace: 
[   82.727966]  unwind_backtrace from show_stack+0x18/0x1c
[   82.727996]  show_stack from dump_stack_lvl+0x70/0x90
[   82.727996]  dump_stack_lvl from print_report+0x158/0x528
[   82.728027]  print_report from kasan_report+0xdc/0x118
[   82.728057]  kasan_report from kasan_atomics_helper+0x52cc/0x5ab0
[   82.728088]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   82.728118]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   82.728149]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.728149]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   82.728179]  kthread from ret_from_fork+0x14/0x20
[   82.728210] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   82.728210] 3fa0:                                     00000000 00000000 00000000 00000000
[   82.728240] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   82.728271] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   82.728271] 
[   82.839263] Allocated by task 321:
[   82.842681]  kasan_save_track+0x30/0x5c
[   82.846557]  __kasan_kmalloc+0x8c/0x94
[   82.850341]  kasan_atomics+0xc0/0x33c
[   82.854034]  kunit_try_run_case+0x22c/0x5a8
[   82.858245]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.863769]  kthread+0x464/0x810
[   82.867034]  ret_from_fork+0x14/0x20
[   82.870635] 
[   82.872131] The buggy address belongs to the object at cc23e880
[   82.872131]  which belongs to the cache kmalloc-64 of size 64
[   82.883880] The buggy address is located 0 bytes to the right of
[   82.883880]  allocated 48-byte region [cc23e880, cc23e8b0)
[   82.895416] 
[   82.896911] The buggy address belongs to the physical page:
[   82.902526] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   82.909790] flags: 0x0(zone=0)
[   82.912872] page_type: f5(slab)
[   82.916046] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.924194] raw: 00000000
[   82.926849] page dumped because: kasan: bad access detected
[   82.932434] 
[   82.933959] Memory state around the buggy address:
[   82.938781]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.945343]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.951934] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.958496]                              ^
[   82.962615]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.969177]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.975769] ==================================================================
[   86.672790] ==================================================================
[   86.680053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f50/0x5ab0
[   86.687530] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   86.694274] 
[   86.695770] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   86.695800] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.695800] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.695831] Call trace: 
[   86.695831]  unwind_backtrace from show_stack+0x18/0x1c
[   86.695861]  show_stack from dump_stack_lvl+0x70/0x90
[   86.695892]  dump_stack_lvl from print_report+0x158/0x528
[   86.695892]  print_report from kasan_report+0xdc/0x118
[   86.695922]  kasan_report from kasan_check_range+0x14c/0x198
[   86.695953]  kasan_check_range from kasan_atomics_helper+0x1f50/0x5ab0
[   86.695983]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.696014]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.696014]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.696044]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.696075]  kthread from ret_from_fork+0x14/0x20
[   86.696105] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   86.696105] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.696136] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.696136] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.696166] 
[   86.813262] Allocated by task 321:
[   86.816680]  kasan_save_track+0x30/0x5c
[   86.820556]  __kasan_kmalloc+0x8c/0x94
[   86.824340]  kasan_atomics+0xc0/0x33c
[   86.828033]  kunit_try_run_case+0x22c/0x5a8
[   86.832244]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.837799]  kthread+0x464/0x810
[   86.841033]  ret_from_fork+0x14/0x20
[   86.844635] 
[   86.846160] The buggy address belongs to the object at cc23e880
[   86.846160]  which belongs to the cache kmalloc-64 of size 64
[   86.857879] The buggy address is located 0 bytes to the right of
[   86.857879]  allocated 48-byte region [cc23e880, cc23e8b0)
[   86.869415] 
[   86.870941] The buggy address belongs to the physical page:
[   86.876525] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   86.883819] flags: 0x0(zone=0)
[   86.886901] page_type: f5(slab)
[   86.890075] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.898193] raw: 00000000
[   86.900848] page dumped because: kasan: bad access detected
[   86.906463] 
[   86.907958] Memory state around the buggy address:
[   86.912780]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.919342]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.925933] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.932495]                              ^
[   86.936614]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.943206]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.949768] ==================================================================
[   79.034149] ==================================================================
[   79.041412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x5ab0
[   79.048767] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   79.055511] 
[   79.057037] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   79.057037] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.057067] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.057067] Call trace: 
[   79.057067]  unwind_backtrace from show_stack+0x18/0x1c
[   79.057098]  show_stack from dump_stack_lvl+0x70/0x90
[   79.057128]  dump_stack_lvl from print_report+0x158/0x528
[   79.057159]  print_report from kasan_report+0xdc/0x118
[   79.057189]  kasan_report from kasan_check_range+0x14c/0x198
[   79.057189]  kasan_check_range from kasan_atomics_helper+0xf88/0x5ab0
[   79.057220]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.057250]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.057281]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.057312]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.057342]  kthread from ret_from_fork+0x14/0x20
[   79.057342] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   79.057373] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.057373] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.057403] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.057403] 
[   79.174438] Allocated by task 321:
[   79.177856]  kasan_save_track+0x30/0x5c
[   79.181732]  __kasan_kmalloc+0x8c/0x94
[   79.185516]  kasan_atomics+0xc0/0x33c
[   79.189208]  kunit_try_run_case+0x22c/0x5a8
[   79.193420]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.198944]  kthread+0x464/0x810
[   79.202209]  ret_from_fork+0x14/0x20
[   79.205810] 
[   79.207305] The buggy address belongs to the object at cc23e880
[   79.207305]  which belongs to the cache kmalloc-64 of size 64
[   79.219055] The buggy address is located 0 bytes to the right of
[   79.219055]  allocated 48-byte region [cc23e880, cc23e8b0)
[   79.230590] 
[   79.232086] The buggy address belongs to the physical page:
[   79.237701] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   79.244964] flags: 0x0(zone=0)
[   79.248046] page_type: f5(slab)
[   79.251220] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   79.259368] raw: 00000000
[   79.262023] page dumped because: kasan: bad access detected
[   79.267608] 
[   79.269134] Memory state around the buggy address:
[   79.273956]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.280517]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.287078] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.293670]                              ^
[   79.297790]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.304351]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.310943] ==================================================================
[   79.318267] ==================================================================
[   79.325531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1034/0x5ab0
[   79.332977] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   79.339721] 
[   79.341247] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   79.341278] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.341278] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.341278] Call trace: 
[   79.341308]  unwind_backtrace from show_stack+0x18/0x1c
[   79.341308]  show_stack from dump_stack_lvl+0x70/0x90
[   79.341339]  dump_stack_lvl from print_report+0x158/0x528
[   79.341369]  print_report from kasan_report+0xdc/0x118
[   79.341400]  kasan_report from kasan_check_range+0x14c/0x198
[   79.341430]  kasan_check_range from kasan_atomics_helper+0x1034/0x5ab0
[   79.341430]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.341461]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.341491]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.341522]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.341552]  kthread from ret_from_fork+0x14/0x20
[   79.341552] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   79.341583] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.341613] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.341613] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.341644] 
[   79.458740] Allocated by task 321:
[   79.462158]  kasan_save_track+0x30/0x5c
[   79.466033]  __kasan_kmalloc+0x8c/0x94
[   79.469818]  kasan_atomics+0xc0/0x33c
[   79.473510]  kunit_try_run_case+0x22c/0x5a8
[   79.477722]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.483245]  kthread+0x464/0x810
[   79.486511]  ret_from_fork+0x14/0x20
[   79.490112] 
[   79.491638] The buggy address belongs to the object at cc23e880
[   79.491638]  which belongs to the cache kmalloc-64 of size 64
[   79.503356] The buggy address is located 0 bytes to the right of
[   79.503356]  allocated 48-byte region [cc23e880, cc23e8b0)
[   79.514892] 
[   79.516418] The buggy address belongs to the physical page:
[   79.522003] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   79.529296] flags: 0x0(zone=0)
[   79.532379] page_type: f5(slab)
[   79.535522] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   79.543670] raw: 00000000
[   79.546325] page dumped because: kasan: bad access detected
[   79.551940] 
[   79.553436] Memory state around the buggy address:
[   79.558258]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.564819]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.571380] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.577972]                              ^
[   79.582092]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.588653]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.595245] ==================================================================
[   80.733581] ==================================================================
[   80.740844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1360/0x5ab0
[   80.748291] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   80.755035] 
[   80.756561] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   80.756561] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   80.756591] Hardware name: Generic DRA74X (Flattened Device Tree)
[   80.756591] Call trace: 
[   80.756591]  unwind_backtrace from show_stack+0x18/0x1c
[   80.756622]  show_stack from dump_stack_lvl+0x70/0x90
[   80.756652]  dump_stack_lvl from print_report+0x158/0x528
[   80.756683]  print_report from kasan_report+0xdc/0x118
[   80.756713]  kasan_report from kasan_check_range+0x14c/0x198
[   80.756713]  kasan_check_range from kasan_atomics_helper+0x1360/0x5ab0
[   80.756744]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   80.756774]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   80.756805]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.756835]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   80.756866]  kthread from ret_from_fork+0x14/0x20
[   80.756866] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   80.756896] 3fa0:                                     00000000 00000000 00000000 00000000
[   80.756896] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   80.756927] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   80.756927] 
[   80.874053] Allocated by task 321:
[   80.877471]  kasan_save_track+0x30/0x5c
[   80.881347]  __kasan_kmalloc+0x8c/0x94
[   80.885131]  kasan_atomics+0xc0/0x33c
[   80.888824]  kunit_try_run_case+0x22c/0x5a8
[   80.893035]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.898559]  kthread+0x464/0x810
[   80.901824]  ret_from_fork+0x14/0x20
[   80.905426] 
[   80.906921] The buggy address belongs to the object at cc23e880
[   80.906921]  which belongs to the cache kmalloc-64 of size 64
[   80.918640] The buggy address is located 0 bytes to the right of
[   80.918640]  allocated 48-byte region [cc23e880, cc23e8b0)
[   80.930206] 
[   80.931701] The buggy address belongs to the physical page:
[   80.937316] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   80.944580] flags: 0x0(zone=0)
[   80.947662] page_type: f5(slab)
[   80.950836] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.958984] raw: 00000000
[   80.961608] page dumped because: kasan: bad access detected
[   80.967224] 
[   80.968719] Memory state around the buggy address:
[   80.973541]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.980133]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.986694] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.993286]                              ^
[   80.997406]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.003967]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.010528] ==================================================================
[   75.630554] ==================================================================
[   75.637817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x790/0x5ab0
[   75.645202] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   75.651947] 
[   75.653442] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   75.653472] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.653472] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.653503] Call trace: 
[   75.653503]  unwind_backtrace from show_stack+0x18/0x1c
[   75.653533]  show_stack from dump_stack_lvl+0x70/0x90
[   75.653564]  dump_stack_lvl from print_report+0x158/0x528
[   75.653564]  print_report from kasan_report+0xdc/0x118
[   75.653594]  kasan_report from kasan_check_range+0x14c/0x198
[   75.653625]  kasan_check_range from kasan_atomics_helper+0x790/0x5ab0
[   75.653656]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.653686]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.653686]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.653717]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.653747]  kthread from ret_from_fork+0x14/0x20
[   75.653778] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   75.653778] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.653808] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.653839] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.653839] 
[   75.770843] Allocated by task 321:
[   75.774291]  kasan_save_track+0x30/0x5c
[   75.778137]  __kasan_kmalloc+0x8c/0x94
[   75.781951]  kasan_atomics+0xc0/0x33c
[   75.785644]  kunit_try_run_case+0x22c/0x5a8
[   75.789855]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.795379]  kthread+0x464/0x810
[   75.798645]  ret_from_fork+0x14/0x20
[   75.802246] 
[   75.803741] The buggy address belongs to the object at cc23e880
[   75.803741]  which belongs to the cache kmalloc-64 of size 64
[   75.815490] The buggy address is located 0 bytes to the right of
[   75.815490]  allocated 48-byte region [cc23e880, cc23e8b0)
[   75.827026] 
[   75.828521] The buggy address belongs to the physical page:
[   75.834136] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   75.841400] flags: 0x0(zone=0)
[   75.844482] page_type: f5(slab)
[   75.847656] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.855804] raw: 00000000
[   75.858459] page dumped because: kasan: bad access detected
[   75.864044] 
[   75.865570] Memory state around the buggy address:
[   75.870391]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.876953]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.883514] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.890106]                              ^
[   75.894226]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.900787]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.907379] ==================================================================
[   86.394714] ==================================================================
[   86.401977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x544c/0x5ab0
[   86.409454] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   86.416107] 
[   86.417602] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   86.417633] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.417633] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.417663] Call trace: 
[   86.417663]  unwind_backtrace from show_stack+0x18/0x1c
[   86.417694]  show_stack from dump_stack_lvl+0x70/0x90
[   86.417724]  dump_stack_lvl from print_report+0x158/0x528
[   86.417755]  print_report from kasan_report+0xdc/0x118
[   86.417755]  kasan_report from kasan_atomics_helper+0x544c/0x5ab0
[   86.417785]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.417816]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.417846]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.417877]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.417907]  kthread from ret_from_fork+0x14/0x20
[   86.417907] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   86.417938] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.417938] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.417968] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.417968] 
[   86.528961] Allocated by task 321:
[   86.532379]  kasan_save_track+0x30/0x5c
[   86.536254]  __kasan_kmalloc+0x8c/0x94
[   86.540039]  kasan_atomics+0xc0/0x33c
[   86.543731]  kunit_try_run_case+0x22c/0x5a8
[   86.547943]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.553497]  kthread+0x464/0x810
[   86.556732]  ret_from_fork+0x14/0x20
[   86.560333] 
[   86.561859] The buggy address belongs to the object at cc23e880
[   86.561859]  which belongs to the cache kmalloc-64 of size 64
[   86.573577] The buggy address is located 0 bytes to the right of
[   86.573577]  allocated 48-byte region [cc23e880, cc23e8b0)
[   86.585113] 
[   86.586639] The buggy address belongs to the physical page:
[   86.592224] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   86.599517] flags: 0x0(zone=0)
[   86.602600] page_type: f5(slab)
[   86.605773] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.613891] raw: 00000000
[   86.616546] page dumped because: kasan: bad access detected
[   86.622161] 
[   86.623657] Memory state around the buggy address:
[   86.628479]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.635040]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.641632] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.648193]                              ^
[   86.652313]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.658905]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.665466] ==================================================================
[   74.778137] ==================================================================
[   74.785400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5a4/0x5ab0
[   74.792785] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   74.799530] 
[   74.801025] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   74.801055] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   74.801055] Hardware name: Generic DRA74X (Flattened Device Tree)
[   74.801086] Call trace: 
[   74.801086]  unwind_backtrace from show_stack+0x18/0x1c
[   74.801116]  show_stack from dump_stack_lvl+0x70/0x90
[   74.801147]  dump_stack_lvl from print_report+0x158/0x528
[   74.801177]  print_report from kasan_report+0xdc/0x118
[   74.801177]  kasan_report from kasan_check_range+0x14c/0x198
[   74.801208]  kasan_check_range from kasan_atomics_helper+0x5a4/0x5ab0
[   74.801239]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   74.801269]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   74.801269]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.801300]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   74.801330]  kthread from ret_from_fork+0x14/0x20
[   74.801361] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   74.801361] 3fa0:                                     00000000 00000000 00000000 00000000
[   74.801391] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   74.801422] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   74.801422] 
[   74.918426] Allocated by task 321:
[   74.921874]  kasan_save_track+0x30/0x5c
[   74.925720]  __kasan_kmalloc+0x8c/0x94
[   74.929504]  kasan_atomics+0xc0/0x33c
[   74.933227]  kunit_try_run_case+0x22c/0x5a8
[   74.937438]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.942962]  kthread+0x464/0x810
[   74.946228]  ret_from_fork+0x14/0x20
[   74.949829] 
[   74.951324] The buggy address belongs to the object at cc23e880
[   74.951324]  which belongs to the cache kmalloc-64 of size 64
[   74.963043] The buggy address is located 0 bytes to the right of
[   74.963043]  allocated 48-byte region [cc23e880, cc23e8b0)
[   74.974609] 
[   74.976104] The buggy address belongs to the physical page:
[   74.981719] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   74.988983] flags: 0x0(zone=0)
[   74.992065] page_type: f5(slab)
[   74.995239] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.003387] raw: 00000000
[   75.006011] page dumped because: kasan: bad access detected
[   75.011627] 
[   75.013153] Memory state around the buggy address:
[   75.017974]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.024536]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.031097] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.037689]                              ^
[   75.041809]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.048370]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.054962] ==================================================================
[   84.404602] ==================================================================
[   84.411865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a04/0x5ab0
[   84.419342] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   84.426086] 
[   84.427581] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   84.427612] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.427612] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.427642] Call trace: 
[   84.427642]  unwind_backtrace from show_stack+0x18/0x1c
[   84.427673]  show_stack from dump_stack_lvl+0x70/0x90
[   84.427703]  dump_stack_lvl from print_report+0x158/0x528
[   84.427734]  print_report from kasan_report+0xdc/0x118
[   84.427734]  kasan_report from kasan_check_range+0x14c/0x198
[   84.427764]  kasan_check_range from kasan_atomics_helper+0x1a04/0x5ab0
[   84.427795]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.427825]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.427856]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.427856]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.427886]  kthread from ret_from_fork+0x14/0x20
[   84.427917] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   84.427917] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.427947] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.427978] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.427978] 
[   84.545074] Allocated by task 321:
[   84.548522]  kasan_save_track+0x30/0x5c
[   84.552368]  __kasan_kmalloc+0x8c/0x94
[   84.556152]  kasan_atomics+0xc0/0x33c
[   84.559875]  kunit_try_run_case+0x22c/0x5a8
[   84.564086]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.569610]  kthread+0x464/0x810
[   84.572875]  ret_from_fork+0x14/0x20
[   84.576477] 
[   84.577972] The buggy address belongs to the object at cc23e880
[   84.577972]  which belongs to the cache kmalloc-64 of size 64
[   84.589691] The buggy address is located 0 bytes to the right of
[   84.589691]  allocated 48-byte region [cc23e880, cc23e8b0)
[   84.601257] 
[   84.602752] The buggy address belongs to the physical page:
[   84.608367] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   84.615631] flags: 0x0(zone=0)
[   84.618713] page_type: f5(slab)
[   84.621887] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.630035] raw: 00000000
[   84.632659] page dumped because: kasan: bad access detected
[   84.638275] 
[   84.639770] Memory state around the buggy address:
[   84.644592]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.651184]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.657745] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.664306]                              ^
[   84.668457]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.675018]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.681579] ==================================================================
[   88.662811] ==================================================================
[   88.670074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9c/0x5ab0
[   88.677520] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   88.684204] 
[   88.685699] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   88.685729] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.685729] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.685760] Call trace: 
[   88.685760]  unwind_backtrace from show_stack+0x18/0x1c
[   88.685791]  show_stack from dump_stack_lvl+0x70/0x90
[   88.685791]  dump_stack_lvl from print_report+0x158/0x528
[   88.685821]  print_report from kasan_report+0xdc/0x118
[   88.685852]  kasan_report from kasan_atomics_helper+0x4f9c/0x5ab0
[   88.685882]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.685913]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.685943]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.685943]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.685974]  kthread from ret_from_fork+0x14/0x20
[   88.686004] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   88.686004] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.686035] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.686065] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.686065] 
[   88.797058] Allocated by task 321:
[   88.800476]  kasan_save_track+0x30/0x5c
[   88.804351]  __kasan_kmalloc+0x8c/0x94
[   88.808135]  kasan_atomics+0xc0/0x33c
[   88.811828]  kunit_try_run_case+0x22c/0x5a8
[   88.816040]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.821563]  kthread+0x464/0x810
[   88.824829]  ret_from_fork+0x14/0x20
[   88.828430] 
[   88.829925] The buggy address belongs to the object at cc23e880
[   88.829925]  which belongs to the cache kmalloc-64 of size 64
[   88.841644] The buggy address is located 0 bytes to the right of
[   88.841644]  allocated 48-byte region [cc23e880, cc23e8b0)
[   88.853210] 
[   88.854705] The buggy address belongs to the physical page:
[   88.860321] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   88.867584] flags: 0x0(zone=0)
[   88.870666] page_type: f5(slab)
[   88.873840] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.881988] raw: 00000000
[   88.884613] page dumped because: kasan: bad access detected
[   88.890228] 
[   88.891723] Memory state around the buggy address:
[   88.896545]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.903137]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.909698] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.916259]                              ^
[   88.920379]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.926971]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.933532] ==================================================================
[   82.983093] ==================================================================
[   82.990356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x5ab0
[   82.997802] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   83.004547] 
[   83.006072] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   83.006103] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.006103] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.006103] Call trace: 
[   83.006134]  unwind_backtrace from show_stack+0x18/0x1c
[   83.006134]  show_stack from dump_stack_lvl+0x70/0x90
[   83.006164]  dump_stack_lvl from print_report+0x158/0x528
[   83.006195]  print_report from kasan_report+0xdc/0x118
[   83.006225]  kasan_report from kasan_check_range+0x14c/0x198
[   83.006256]  kasan_check_range from kasan_atomics_helper+0x16d0/0x5ab0
[   83.006256]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.006286]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.006317]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.006347]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.006378]  kthread from ret_from_fork+0x14/0x20
[   83.006378] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   83.006408] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.006439] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.006439] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.006469] 
[   83.123565] Allocated by task 321:
[   83.126983]  kasan_save_track+0x30/0x5c
[   83.130859]  __kasan_kmalloc+0x8c/0x94
[   83.134643]  kasan_atomics+0xc0/0x33c
[   83.138336]  kunit_try_run_case+0x22c/0x5a8
[   83.142547]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.148071]  kthread+0x464/0x810
[   83.151336]  ret_from_fork+0x14/0x20
[   83.154937] 
[   83.156433] The buggy address belongs to the object at cc23e880
[   83.156433]  which belongs to the cache kmalloc-64 of size 64
[   83.168182] The buggy address is located 0 bytes to the right of
[   83.168182]  allocated 48-byte region [cc23e880, cc23e8b0)
[   83.179718] 
[   83.181213] The buggy address belongs to the physical page:
[   83.186828] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   83.194091] flags: 0x0(zone=0)
[   83.197174] page_type: f5(slab)
[   83.200347] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   83.208496] raw: 00000000
[   83.211151] page dumped because: kasan: bad access detected
[   83.216735] 
[   83.218261] Memory state around the buggy address:
[   83.223083]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.229644]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.236206] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   83.242797]                              ^
[   83.246917]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.253479]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.260070] ==================================================================
[   74.215820] ==================================================================
[   74.223083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e0/0x5ab0
[   74.230468] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   74.237213] 
[   74.238708] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   74.238739] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   74.238769] Hardware name: Generic DRA74X (Flattened Device Tree)
[   74.238769] Call trace: 
[   74.238769]  unwind_backtrace from show_stack+0x18/0x1c
[   74.238800]  show_stack from dump_stack_lvl+0x70/0x90
[   74.238830]  dump_stack_lvl from print_report+0x158/0x528
[   74.238861]  print_report from kasan_report+0xdc/0x118
[   74.238891]  kasan_report from kasan_check_range+0x14c/0x198
[   74.238891]  kasan_check_range from kasan_atomics_helper+0x4e0/0x5ab0
[   74.238922]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   74.238952]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   74.238983]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.239013]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   74.239044]  kthread from ret_from_fork+0x14/0x20
[   74.239044] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   74.239074] 3fa0:                                     00000000 00000000 00000000 00000000
[   74.239074] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   74.239105] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   74.239105] 
[   74.356140] Allocated by task 321:
[   74.359558]  kasan_save_track+0x30/0x5c
[   74.363433]  __kasan_kmalloc+0x8c/0x94
[   74.367218]  kasan_atomics+0xc0/0x33c
[   74.370910]  kunit_try_run_case+0x22c/0x5a8
[   74.375122]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.380645]  kthread+0x464/0x810
[   74.383911]  ret_from_fork+0x14/0x20
[   74.387512] 
[   74.389007] The buggy address belongs to the object at cc23e880
[   74.389007]  which belongs to the cache kmalloc-64 of size 64
[   74.400756] The buggy address is located 0 bytes to the right of
[   74.400756]  allocated 48-byte region [cc23e880, cc23e8b0)
[   74.412292] 
[   74.413818] The buggy address belongs to the physical page:
[   74.419403] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   74.426696] flags: 0x0(zone=0)
[   74.429779] page_type: f5(slab)
[   74.432922] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.441070] raw: 00000000
[   74.443725] page dumped because: kasan: bad access detected
[   74.449340] 
[   74.450836] Memory state around the buggy address:
[   74.455657]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.462219]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.468811] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.475372]                              ^
[   74.479492]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.486083]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.492645] ==================================================================
[   75.914703] ==================================================================
[   75.921966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x834/0x5ab0
[   75.929321] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   75.936065] 
[   75.937591] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   75.937622] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.937622] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.937652] Call trace: 
[   75.937652]  unwind_backtrace from show_stack+0x18/0x1c
[   75.937683]  show_stack from dump_stack_lvl+0x70/0x90
[   75.937683]  dump_stack_lvl from print_report+0x158/0x528
[   75.937713]  print_report from kasan_report+0xdc/0x118
[   75.937744]  kasan_report from kasan_check_range+0x14c/0x198
[   75.937774]  kasan_check_range from kasan_atomics_helper+0x834/0x5ab0
[   75.937805]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.937805]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.937835]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.937866]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.937896]  kthread from ret_from_fork+0x14/0x20
[   75.937927] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   75.937927] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.937957] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.937957] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.937988] 
[   76.054992] Allocated by task 321:
[   76.058410]  kasan_save_track+0x30/0x5c
[   76.062286]  __kasan_kmalloc+0x8c/0x94
[   76.066070]  kasan_atomics+0xc0/0x33c
[   76.069763]  kunit_try_run_case+0x22c/0x5a8
[   76.073974]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.079528]  kthread+0x464/0x810
[   76.082763]  ret_from_fork+0x14/0x20
[   76.086364] 
[   76.087890] The buggy address belongs to the object at cc23e880
[   76.087890]  which belongs to the cache kmalloc-64 of size 64
[   76.099609] The buggy address is located 0 bytes to the right of
[   76.099609]  allocated 48-byte region [cc23e880, cc23e8b0)
[   76.111145] 
[   76.112670] The buggy address belongs to the physical page:
[   76.118255] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   76.125549] flags: 0x0(zone=0)
[   76.128631] page_type: f5(slab)
[   76.131805] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.139953] raw: 00000000
[   76.142578] page dumped because: kasan: bad access detected
[   76.148193] 
[   76.149688] Memory state around the buggy address:
[   76.154510]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.161071]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.167663] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.174224]                              ^
[   76.178344]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.184936]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.191497] ==================================================================
[   73.653686] ==================================================================
[   73.660949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x420/0x5ab0
[   73.668304] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   73.674957] 
[   73.676483] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   73.676513] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.676513] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.676513] Call trace: 
[   73.676544]  unwind_backtrace from show_stack+0x18/0x1c
[   73.676574]  show_stack from dump_stack_lvl+0x70/0x90
[   73.676574]  dump_stack_lvl from print_report+0x158/0x528
[   73.676605]  print_report from kasan_report+0xdc/0x118
[   73.676635]  kasan_report from kasan_check_range+0x14c/0x198
[   73.676666]  kasan_check_range from kasan_atomics_helper+0x420/0x5ab0
[   73.676696]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.676696]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.676727]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.676757]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.676788]  kthread from ret_from_fork+0x14/0x20
[   73.676818] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   73.676818] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.676849] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.676849] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.676879] 
[   73.793884] Allocated by task 321:
[   73.797302]  kasan_save_track+0x30/0x5c
[   73.801177]  __kasan_kmalloc+0x8c/0x94
[   73.804962]  kasan_atomics+0xc0/0x33c
[   73.808654]  kunit_try_run_case+0x22c/0x5a8
[   73.812866]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.818420]  kthread+0x464/0x810
[   73.821655]  ret_from_fork+0x14/0x20
[   73.825286] 
[   73.826782] The buggy address belongs to the object at cc23e880
[   73.826782]  which belongs to the cache kmalloc-64 of size 64
[   73.838500] The buggy address is located 0 bytes to the right of
[   73.838500]  allocated 48-byte region [cc23e880, cc23e8b0)
[   73.850067] 
[   73.851562] The buggy address belongs to the physical page:
[   73.857177] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   73.864440] flags: 0x0(zone=0)
[   73.867523] page_type: f5(slab)
[   73.870697] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.878845] raw: 00000000
[   73.881469] page dumped because: kasan: bad access detected
[   73.887084] 
[   73.888580] Memory state around the buggy address:
[   73.893402]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.899993]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.906555] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.913116]                              ^
[   73.917266]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.923828]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.930389] ==================================================================
[   81.580261] ==================================================================
[   81.587524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52d8/0x5ab0
[   81.594970] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   81.601623] 
[   81.603149] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   81.603179] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.603179] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.603179] Call trace: 
[   81.603210]  unwind_backtrace from show_stack+0x18/0x1c
[   81.603210]  show_stack from dump_stack_lvl+0x70/0x90
[   81.603240]  dump_stack_lvl from print_report+0x158/0x528
[   81.603271]  print_report from kasan_report+0xdc/0x118
[   81.603302]  kasan_report from kasan_atomics_helper+0x52d8/0x5ab0
[   81.603332]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.603332]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.603363]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.603393]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.603424]  kthread from ret_from_fork+0x14/0x20
[   81.603454] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   81.603454] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.603485] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.603485] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.603515] 
[   81.714508] Allocated by task 321:
[   81.717926]  kasan_save_track+0x30/0x5c
[   81.721801]  __kasan_kmalloc+0x8c/0x94
[   81.725585]  kasan_atomics+0xc0/0x33c
[   81.729278]  kunit_try_run_case+0x22c/0x5a8
[   81.733489]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.739013]  kthread+0x464/0x810
[   81.742279]  ret_from_fork+0x14/0x20
[   81.745880] 
[   81.747375] The buggy address belongs to the object at cc23e880
[   81.747375]  which belongs to the cache kmalloc-64 of size 64
[   81.759094] The buggy address is located 0 bytes to the right of
[   81.759094]  allocated 48-byte region [cc23e880, cc23e8b0)
[   81.770660] 
[   81.772155] The buggy address belongs to the physical page:
[   81.777770] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   81.785034] flags: 0x0(zone=0)
[   81.788116] page_type: f5(slab)
[   81.791290] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   81.799438] raw: 00000000
[   81.802093] page dumped because: kasan: bad access detected
[   81.807678] 
[   81.809204] Memory state around the buggy address:
[   81.814025]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.820587]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.827148] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   81.833740]                              ^
[   81.837860]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.844421]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.850982] ==================================================================
[   83.551696] ==================================================================
[   83.558959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5ab0
[   83.566436] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   83.573181] 
[   83.574676] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   83.574707] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.574707] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.574737] Call trace: 
[   83.574737]  unwind_backtrace from show_stack+0x18/0x1c
[   83.574768]  show_stack from dump_stack_lvl+0x70/0x90
[   83.574798]  dump_stack_lvl from print_report+0x158/0x528
[   83.574829]  print_report from kasan_report+0xdc/0x118
[   83.574829]  kasan_report from kasan_check_range+0x14c/0x198
[   83.574859]  kasan_check_range from kasan_atomics_helper+0x1818/0x5ab0
[   83.574890]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.574920]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.574920]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.574951]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.574981]  kthread from ret_from_fork+0x14/0x20
[   83.575012] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   83.575012] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.575042] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.575073] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.575073] 
[   83.692169] Allocated by task 321:
[   83.695617]  kasan_save_track+0x30/0x5c
[   83.699462]  __kasan_kmalloc+0x8c/0x94
[   83.703247]  kasan_atomics+0xc0/0x33c
[   83.706939]  kunit_try_run_case+0x22c/0x5a8
[   83.711181]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.716705]  kthread+0x464/0x810
[   83.719940]  ret_from_fork+0x14/0x20
[   83.723571] 
[   83.725067] The buggy address belongs to the object at cc23e880
[   83.725067]  which belongs to the cache kmalloc-64 of size 64
[   83.736785] The buggy address is located 0 bytes to the right of
[   83.736785]  allocated 48-byte region [cc23e880, cc23e8b0)
[   83.748321] 
[   83.749847] The buggy address belongs to the physical page:
[   83.755432] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   83.762725] flags: 0x0(zone=0)
[   83.765808] page_type: f5(slab)
[   83.768981] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   83.777099] raw: 00000000
[   83.779754] page dumped because: kasan: bad access detected
[   83.785369] 
[   83.786865] Memory state around the buggy address:
[   83.791687]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.798248]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.804840] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   83.811401]                              ^
[   83.815521]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.822113]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.828674] ==================================================================
[   72.819213] ==================================================================
[   72.826477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x514c/0x5ab0
[   72.833923] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   72.840667] 
[   72.842193] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   72.842224] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   72.842224] Hardware name: Generic DRA74X (Flattened Device Tree)
[   72.842254] Call trace: 
[   72.842254]  unwind_backtrace from show_stack+0x18/0x1c
[   72.842285]  show_stack from dump_stack_lvl+0x70/0x90
[   72.842285]  dump_stack_lvl from print_report+0x158/0x528
[   72.842315]  print_report from kasan_report+0xdc/0x118
[   72.842346]  kasan_report from kasan_atomics_helper+0x514c/0x5ab0
[   72.842376]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   72.842407]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   72.842437]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.842437]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   72.842468]  kthread from ret_from_fork+0x14/0x20
[   72.842498] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   72.842498] 3fa0:                                     00000000 00000000 00000000 00000000
[   72.842529] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   72.842559] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   72.842559] 
[   72.953552] Allocated by task 321:
[   72.956970]  kasan_save_track+0x30/0x5c
[   72.960845]  __kasan_kmalloc+0x8c/0x94
[   72.964630]  kasan_atomics+0xc0/0x33c
[   72.968322]  kunit_try_run_case+0x22c/0x5a8
[   72.972534]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.978088]  kthread+0x464/0x810
[   72.981323]  ret_from_fork+0x14/0x20
[   72.984924] 
[   72.986450] The buggy address belongs to the object at cc23e880
[   72.986450]  which belongs to the cache kmalloc-64 of size 64
[   72.998168] The buggy address is located 0 bytes to the right of
[   72.998168]  allocated 48-byte region [cc23e880, cc23e8b0)
[   73.009735] 
[   73.011230] The buggy address belongs to the physical page:
[   73.016845] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   73.024108] flags: 0x0(zone=0)
[   73.027191] page_type: f5(slab)
[   73.030364] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.038513] raw: 00000000
[   73.041137] page dumped because: kasan: bad access detected
[   73.046752] 
[   73.048248] Memory state around the buggy address:
[   73.053070]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.059661]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.066223] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.072784]                              ^
[   73.076904]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.083496]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.090057] ==================================================================
[   77.335388] ==================================================================
[   77.342651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x5ab0
[   77.350036] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   77.356781] 
[   77.358276] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   77.358306] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.358306] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.358337] Call trace: 
[   77.358337]  unwind_backtrace from show_stack+0x18/0x1c
[   77.358367]  show_stack from dump_stack_lvl+0x70/0x90
[   77.358398]  dump_stack_lvl from print_report+0x158/0x528
[   77.358428]  print_report from kasan_report+0xdc/0x118
[   77.358428]  kasan_report from kasan_check_range+0x14c/0x198
[   77.358459]  kasan_check_range from kasan_atomics_helper+0xb70/0x5ab0
[   77.358489]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.358520]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.358551]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.358551]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.358581]  kthread from ret_from_fork+0x14/0x20
[   77.358612] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   77.358642] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.358642] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.358673] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.358673] 
[   77.475708] Allocated by task 321:
[   77.479125]  kasan_save_track+0x30/0x5c
[   77.483001]  __kasan_kmalloc+0x8c/0x94
[   77.486755]  kasan_atomics+0xc0/0x33c
[   77.490478]  kunit_try_run_case+0x22c/0x5a8
[   77.494689]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.500213]  kthread+0x464/0x810
[   77.503479]  ret_from_fork+0x14/0x20
[   77.507080] 
[   77.508575] The buggy address belongs to the object at cc23e880
[   77.508575]  which belongs to the cache kmalloc-64 of size 64
[   77.520294] The buggy address is located 0 bytes to the right of
[   77.520294]  allocated 48-byte region [cc23e880, cc23e8b0)
[   77.531860] 
[   77.533355] The buggy address belongs to the physical page:
[   77.538970] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   77.546234] flags: 0x0(zone=0)
[   77.549316] page_type: f5(slab)
[   77.552490] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   77.560638] raw: 00000000
[   77.563262] page dumped because: kasan: bad access detected
[   77.568878] 
[   77.570373] Memory state around the buggy address:
[   77.575195]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.581787]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.588348] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.594940]                              ^
[   77.599060]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.605621]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.612182] ==================================================================
[   84.688934] ==================================================================
[   84.696197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1aa8/0x5ab0
[   84.703643] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   84.710388] 
[   84.711914] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   84.711944] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.711944] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.711944] Call trace: 
[   84.711944]  unwind_backtrace from show_stack+0x18/0x1c
[   84.711975]  show_stack from dump_stack_lvl+0x70/0x90
[   84.712005]  dump_stack_lvl from print_report+0x158/0x528
[   84.712036]  print_report from kasan_report+0xdc/0x118
[   84.712066]  kasan_report from kasan_check_range+0x14c/0x198
[   84.712066]  kasan_check_range from kasan_atomics_helper+0x1aa8/0x5ab0
[   84.712097]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.712127]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.712158]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.712188]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.712219]  kthread from ret_from_fork+0x14/0x20
[   84.712219] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   84.712249] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.712249] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.712280] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.712280] 
[   84.829406] Allocated by task 321:
[   84.832824]  kasan_save_track+0x30/0x5c
[   84.836700]  __kasan_kmalloc+0x8c/0x94
[   84.840484]  kasan_atomics+0xc0/0x33c
[   84.844177]  kunit_try_run_case+0x22c/0x5a8
[   84.848388]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.853912]  kthread+0x464/0x810
[   84.857177]  ret_from_fork+0x14/0x20
[   84.860778] 
[   84.862274] The buggy address belongs to the object at cc23e880
[   84.862274]  which belongs to the cache kmalloc-64 of size 64
[   84.873992] The buggy address is located 0 bytes to the right of
[   84.873992]  allocated 48-byte region [cc23e880, cc23e8b0)
[   84.885559] 
[   84.887054] The buggy address belongs to the physical page:
[   84.892669] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   84.899932] flags: 0x0(zone=0)
[   84.903015] page_type: f5(slab)
[   84.906188] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.914337] raw: 00000000
[   84.916961] page dumped because: kasan: bad access detected
[   84.922576] 
[   84.924072] Memory state around the buggy address:
[   84.928924]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.935485]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.942047] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.948638]                              ^
[   84.952758]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.959320]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.965881] ==================================================================
[   88.940856] ==================================================================
[   88.948150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2480/0x5ab0
[   88.955596] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   88.962341] 
[   88.963836] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   88.963867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.963897] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.963897] Call trace: 
[   88.963897]  unwind_backtrace from show_stack+0x18/0x1c
[   88.963928]  show_stack from dump_stack_lvl+0x70/0x90
[   88.963958]  dump_stack_lvl from print_report+0x158/0x528
[   88.963989]  print_report from kasan_report+0xdc/0x118
[   88.964019]  kasan_report from kasan_check_range+0x14c/0x198
[   88.964019]  kasan_check_range from kasan_atomics_helper+0x2480/0x5ab0
[   88.964050]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.964080]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.964111]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.964141]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.964141]  kthread from ret_from_fork+0x14/0x20
[   88.964172] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   88.964202] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.964202] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.964233] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.964233] 
[   89.081359] Allocated by task 321:
[   89.084777]  kasan_save_track+0x30/0x5c
[   89.088653]  __kasan_kmalloc+0x8c/0x94
[   89.092437]  kasan_atomics+0xc0/0x33c
[   89.096130]  kunit_try_run_case+0x22c/0x5a8
[   89.100341]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.105865]  kthread+0x464/0x810
[   89.109130]  ret_from_fork+0x14/0x20
[   89.112731] 
[   89.114227] The buggy address belongs to the object at cc23e880
[   89.114227]  which belongs to the cache kmalloc-64 of size 64
[   89.125946] The buggy address is located 0 bytes to the right of
[   89.125946]  allocated 48-byte region [cc23e880, cc23e8b0)
[   89.137512] 
[   89.139007] The buggy address belongs to the physical page:
[   89.144622] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   89.151885] flags: 0x0(zone=0)
[   89.154968] page_type: f5(slab)
[   89.158142] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   89.166290] raw: 00000000
[   89.168914] page dumped because: kasan: bad access detected
[   89.174530] 
[   89.176025] Memory state around the buggy address:
[   89.180847]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.187438]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.194000] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   89.200561]                              ^
[   89.204681]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.211273]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.217834] ==================================================================
[   76.767089] ==================================================================
[   76.774353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa20/0x5ab0
[   76.781738] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   76.788482] 
[   76.789978] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   76.790008] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   76.790039] Hardware name: Generic DRA74X (Flattened Device Tree)
[   76.790039] Call trace: 
[   76.790039]  unwind_backtrace from show_stack+0x18/0x1c
[   76.790069]  show_stack from dump_stack_lvl+0x70/0x90
[   76.790100]  dump_stack_lvl from print_report+0x158/0x528
[   76.790130]  print_report from kasan_report+0xdc/0x118
[   76.790130]  kasan_report from kasan_check_range+0x14c/0x198
[   76.790161]  kasan_check_range from kasan_atomics_helper+0xa20/0x5ab0
[   76.790191]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   76.790222]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   76.790252]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.790283]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   76.790283]  kthread from ret_from_fork+0x14/0x20
[   76.790313] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   76.790344] 3fa0:                                     00000000 00000000 00000000 00000000
[   76.790344] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   76.790374] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   76.790374] 
[   76.907409] Allocated by task 321:
[   76.910827]  kasan_save_track+0x30/0x5c
[   76.914703]  __kasan_kmalloc+0x8c/0x94
[   76.918487]  kasan_atomics+0xc0/0x33c
[   76.922180]  kunit_try_run_case+0x22c/0x5a8
[   76.926391]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.931915]  kthread+0x464/0x810
[   76.935180]  ret_from_fork+0x14/0x20
[   76.938781] 
[   76.940277] The buggy address belongs to the object at cc23e880
[   76.940277]  which belongs to the cache kmalloc-64 of size 64
[   76.951995] The buggy address is located 0 bytes to the right of
[   76.951995]  allocated 48-byte region [cc23e880, cc23e8b0)
[   76.963562] 
[   76.965057] The buggy address belongs to the physical page:
[   76.970672] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   76.977935] flags: 0x0(zone=0)
[   76.981018] page_type: f5(slab)
[   76.984191] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.992340] raw: 00000000
[   76.994995] page dumped because: kasan: bad access detected
[   77.000579] 
[   77.002105] Memory state around the buggy address:
[   77.006927]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.013488]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.020050] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.026641]                              ^
[   77.030761]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.037322]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.043914] ==================================================================
[   73.375488] ==================================================================
[   73.382751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x550c/0x5ab0
[   73.390197] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   73.396972] 
[   73.398468] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   73.398498] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.398498] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.398529] Call trace: 
[   73.398529]  unwind_backtrace from show_stack+0x18/0x1c
[   73.398559]  show_stack from dump_stack_lvl+0x70/0x90
[   73.398590]  dump_stack_lvl from print_report+0x158/0x528
[   73.398590]  print_report from kasan_report+0xdc/0x118
[   73.398620]  kasan_report from kasan_atomics_helper+0x550c/0x5ab0
[   73.398651]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.398681]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.398712]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.398712]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.398742]  kthread from ret_from_fork+0x14/0x20
[   73.398773] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   73.398803] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.398803] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.398834] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.398834] 
[   73.509826] Allocated by task 321:
[   73.513244]  kasan_save_track+0x30/0x5c
[   73.517120]  __kasan_kmalloc+0x8c/0x94
[   73.520904]  kasan_atomics+0xc0/0x33c
[   73.524597]  kunit_try_run_case+0x22c/0x5a8
[   73.528808]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.534332]  kthread+0x464/0x810
[   73.537597]  ret_from_fork+0x14/0x20
[   73.541198] 
[   73.542724] The buggy address belongs to the object at cc23e880
[   73.542724]  which belongs to the cache kmalloc-64 of size 64
[   73.554443] The buggy address is located 0 bytes to the right of
[   73.554443]  allocated 48-byte region [cc23e880, cc23e8b0)
[   73.565979] 
[   73.567504] The buggy address belongs to the physical page:
[   73.573089] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   73.580383] flags: 0x0(zone=0)
[   73.583465] page_type: f5(slab)
[   73.586639] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.594787] raw: 00000000
[   73.597412] page dumped because: kasan: bad access detected
[   73.603027] 
[   73.604522] Memory state around the buggy address:
[   73.609344]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.615905]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.622497] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.629058]                              ^
[   73.633178]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.639770]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.646331] ==================================================================
[   75.346405] ==================================================================
[   75.353698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x5ab0
[   75.361053] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   75.367797] 
[   75.369323] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   75.369323] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.369354] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.369354] Call trace: 
[   75.369354]  unwind_backtrace from show_stack+0x18/0x1c
[   75.369384]  show_stack from dump_stack_lvl+0x70/0x90
[   75.369415]  dump_stack_lvl from print_report+0x158/0x528
[   75.369445]  print_report from kasan_report+0xdc/0x118
[   75.369476]  kasan_report from kasan_check_range+0x14c/0x198
[   75.369476]  kasan_check_range from kasan_atomics_helper+0x6ec/0x5ab0
[   75.369506]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.369537]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.369567]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.369598]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.369628]  kthread from ret_from_fork+0x14/0x20
[   75.369628] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   75.369659] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.369659] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.369689] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.369689] 
[   75.486724] Allocated by task 321:
[   75.490142]  kasan_save_track+0x30/0x5c
[   75.494018]  __kasan_kmalloc+0x8c/0x94
[   75.497802]  kasan_atomics+0xc0/0x33c
[   75.501495]  kunit_try_run_case+0x22c/0x5a8
[   75.505706]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.511230]  kthread+0x464/0x810
[   75.514495]  ret_from_fork+0x14/0x20
[   75.518096] 
[   75.519592] The buggy address belongs to the object at cc23e880
[   75.519592]  which belongs to the cache kmalloc-64 of size 64
[   75.531311] The buggy address is located 0 bytes to the right of
[   75.531311]  allocated 48-byte region [cc23e880, cc23e8b0)
[   75.542877] 
[   75.544372] The buggy address belongs to the physical page:
[   75.549987] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   75.557250] flags: 0x0(zone=0)
[   75.560333] page_type: f5(slab)
[   75.563507] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.571655] raw: 00000000
[   75.574310] page dumped because: kasan: bad access detected
[   75.579895] 
[   75.581420] Memory state around the buggy address:
[   75.586242]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.592803]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.599365] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.605957]                              ^
[   75.610076]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.616638]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.623229] ==================================================================
[   78.465881] ==================================================================
[   78.473144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe30/0x5ab0
[   78.480499] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   78.487243] 
[   78.488769] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   78.488800] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   78.488800] Hardware name: Generic DRA74X (Flattened Device Tree)
[   78.488800] Call trace: 
[   78.488830]  unwind_backtrace from show_stack+0x18/0x1c
[   78.488861]  show_stack from dump_stack_lvl+0x70/0x90
[   78.488861]  dump_stack_lvl from print_report+0x158/0x528
[   78.488891]  print_report from kasan_report+0xdc/0x118
[   78.488922]  kasan_report from kasan_check_range+0x14c/0x198
[   78.488952]  kasan_check_range from kasan_atomics_helper+0xe30/0x5ab0
[   78.488952]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   78.488983]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   78.489013]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.489044]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   78.489074]  kthread from ret_from_fork+0x14/0x20
[   78.489105] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   78.489105] 3fa0:                                     00000000 00000000 00000000 00000000
[   78.489135] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   78.489135] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   78.489166] 
[   78.606170] Allocated by task 321:
[   78.609588]  kasan_save_track+0x30/0x5c
[   78.613464]  __kasan_kmalloc+0x8c/0x94
[   78.617248]  kasan_atomics+0xc0/0x33c
[   78.620941]  kunit_try_run_case+0x22c/0x5a8
[   78.625152]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.630706]  kthread+0x464/0x810
[   78.633941]  ret_from_fork+0x14/0x20
[   78.637542] 
[   78.639068] The buggy address belongs to the object at cc23e880
[   78.639068]  which belongs to the cache kmalloc-64 of size 64
[   78.650787] The buggy address is located 0 bytes to the right of
[   78.650787]  allocated 48-byte region [cc23e880, cc23e8b0)
[   78.662322] 
[   78.663848] The buggy address belongs to the physical page:
[   78.669433] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   78.676727] flags: 0x0(zone=0)
[   78.679809] page_type: f5(slab)
[   78.682983] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.691101] raw: 00000000
[   78.693756] page dumped because: kasan: bad access detected
[   78.699371] 
[   78.700866] Memory state around the buggy address:
[   78.705688]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.712249]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.718841] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.725402]                              ^
[   78.729522]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.736114]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.742675] ==================================================================
[   89.503234] ==================================================================
[   89.510498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2578/0x5ab0
[   89.517944] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   89.524688] 
[   89.526214] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   89.526245] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   89.526245] Hardware name: Generic DRA74X (Flattened Device Tree)
[   89.526245] Call trace: 
[   89.526275]  unwind_backtrace from show_stack+0x18/0x1c
[   89.526275]  show_stack from dump_stack_lvl+0x70/0x90
[   89.526306]  dump_stack_lvl from print_report+0x158/0x528
[   89.526336]  print_report from kasan_report+0xdc/0x118
[   89.526367]  kasan_report from kasan_check_range+0x14c/0x198
[   89.526397]  kasan_check_range from kasan_atomics_helper+0x2578/0x5ab0
[   89.526397]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   89.526428]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   89.526458]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.526489]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   89.526519]  kthread from ret_from_fork+0x14/0x20
[   89.526519] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   89.526550] 3fa0:                                     00000000 00000000 00000000 00000000
[   89.526580] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   89.526580] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   89.526611] 
[   89.643707] Allocated by task 321:
[   89.647125]  kasan_save_track+0x30/0x5c
[   89.651000]  __kasan_kmalloc+0x8c/0x94
[   89.654785]  kasan_atomics+0xc0/0x33c
[   89.658477]  kunit_try_run_case+0x22c/0x5a8
[   89.662689]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.668212]  kthread+0x464/0x810
[   89.671478]  ret_from_fork+0x14/0x20
[   89.675079] 
[   89.676574] The buggy address belongs to the object at cc23e880
[   89.676574]  which belongs to the cache kmalloc-64 of size 64
[   89.688293] The buggy address is located 0 bytes to the right of
[   89.688293]  allocated 48-byte region [cc23e880, cc23e8b0)
[   89.699859] 
[   89.701354] The buggy address belongs to the physical page:
[   89.706970] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   89.714233] flags: 0x0(zone=0)
[   89.717315] page_type: f5(slab)
[   89.720489] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   89.728637] raw: 00000000
[   89.731262] page dumped because: kasan: bad access detected
[   89.736877] 
[   89.738372] Memory state around the buggy address:
[   89.743194]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.749786]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.756347] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   89.762908]                              ^
[   89.767028]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.773620]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.780181] ==================================================================
[   82.420623] ==================================================================
[   82.427886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x160c/0x5ab0
[   82.435333] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   82.442108] 
[   82.443603] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   82.443634] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   82.443634] Hardware name: Generic DRA74X (Flattened Device Tree)
[   82.443664] Call trace: 
[   82.443664]  unwind_backtrace from show_stack+0x18/0x1c
[   82.443695]  show_stack from dump_stack_lvl+0x70/0x90
[   82.443725]  dump_stack_lvl from print_report+0x158/0x528
[   82.443725]  print_report from kasan_report+0xdc/0x118
[   82.443756]  kasan_report from kasan_check_range+0x14c/0x198
[   82.443786]  kasan_check_range from kasan_atomics_helper+0x160c/0x5ab0
[   82.443817]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   82.443847]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   82.443847]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.443878]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   82.443908]  kthread from ret_from_fork+0x14/0x20
[   82.443939] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   82.443939] 3fa0:                                     00000000 00000000 00000000 00000000
[   82.443969] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   82.443969] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   82.444000] 
[   82.561096] Allocated by task 321:
[   82.564514]  kasan_save_track+0x30/0x5c
[   82.568389]  __kasan_kmalloc+0x8c/0x94
[   82.572174]  kasan_atomics+0xc0/0x33c
[   82.575866]  kunit_try_run_case+0x22c/0x5a8
[   82.580078]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.585632]  kthread+0x464/0x810
[   82.588867]  ret_from_fork+0x14/0x20
[   82.592468] 
[   82.593994] The buggy address belongs to the object at cc23e880
[   82.593994]  which belongs to the cache kmalloc-64 of size 64
[   82.605712] The buggy address is located 0 bytes to the right of
[   82.605712]  allocated 48-byte region [cc23e880, cc23e8b0)
[   82.617248] 
[   82.618774] The buggy address belongs to the physical page:
[   82.624359] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   82.631652] flags: 0x0(zone=0)
[   82.634735] page_type: f5(slab)
[   82.637878] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.646026] raw: 00000000
[   82.648681] page dumped because: kasan: bad access detected
[   82.654296] 
[   82.655792] Memory state around the buggy address:
[   82.660614]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.667175]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.673767] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.680328]                              ^
[   82.684448]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.691009]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.697601] ==================================================================
[   87.241363] ==================================================================
[   87.248657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20a8/0x5ab0
[   87.256103] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   87.262847] 
[   87.264343] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   87.264373] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.264404] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.264404] Call trace: 
[   87.264404]  unwind_backtrace from show_stack+0x18/0x1c
[   87.264434]  show_stack from dump_stack_lvl+0x70/0x90
[   87.264465]  dump_stack_lvl from print_report+0x158/0x528
[   87.264495]  print_report from kasan_report+0xdc/0x118
[   87.264495]  kasan_report from kasan_check_range+0x14c/0x198
[   87.264526]  kasan_check_range from kasan_atomics_helper+0x20a8/0x5ab0
[   87.264556]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.264587]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.264617]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.264648]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.264648]  kthread from ret_from_fork+0x14/0x20
[   87.264678] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   87.264709] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.264709] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.264739] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.264739] 
[   87.381835] Allocated by task 321:
[   87.385284]  kasan_save_track+0x30/0x5c
[   87.389129]  __kasan_kmalloc+0x8c/0x94
[   87.392913]  kasan_atomics+0xc0/0x33c
[   87.396606]  kunit_try_run_case+0x22c/0x5a8
[   87.400848]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.406372]  kthread+0x464/0x810
[   87.409606]  ret_from_fork+0x14/0x20
[   87.413238] 
[   87.414733] The buggy address belongs to the object at cc23e880
[   87.414733]  which belongs to the cache kmalloc-64 of size 64
[   87.426452] The buggy address is located 0 bytes to the right of
[   87.426452]  allocated 48-byte region [cc23e880, cc23e8b0)
[   87.437988] 
[   87.439514] The buggy address belongs to the physical page:
[   87.445098] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   87.452392] flags: 0x0(zone=0)
[   87.455474] page_type: f5(slab)
[   87.458648] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   87.466766] raw: 00000000
[   87.469421] page dumped because: kasan: bad access detected
[   87.475036] 
[   87.476531] Memory state around the buggy address:
[   87.481353]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.487915]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.494506] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   87.501068]                              ^
[   87.505187]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.511749]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.518341] ==================================================================
[   83.835998] ==================================================================
[   83.843261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18bc/0x5ab0
[   83.850738] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   83.857482] 
[   83.858978] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   83.859008] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.859008] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.859039] Call trace: 
[   83.859039]  unwind_backtrace from show_stack+0x18/0x1c
[   83.859069]  show_stack from dump_stack_lvl+0x70/0x90
[   83.859100]  dump_stack_lvl from print_report+0x158/0x528
[   83.859130]  print_report from kasan_report+0xdc/0x118
[   83.859130]  kasan_report from kasan_check_range+0x14c/0x198
[   83.859161]  kasan_check_range from kasan_atomics_helper+0x18bc/0x5ab0
[   83.859191]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.859222]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.859252]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.859252]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.859283]  kthread from ret_from_fork+0x14/0x20
[   83.859313] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   83.859313] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.859344] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.859374] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.859374] 
[   83.976470] Allocated by task 321:
[   83.979919]  kasan_save_track+0x30/0x5c
[   83.983764]  __kasan_kmalloc+0x8c/0x94
[   83.987548]  kasan_atomics+0xc0/0x33c
[   83.991241]  kunit_try_run_case+0x22c/0x5a8
[   83.995483]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.001007]  kthread+0x464/0x810
[   84.004272]  ret_from_fork+0x14/0x20
[   84.007873] 
[   84.009368] The buggy address belongs to the object at cc23e880
[   84.009368]  which belongs to the cache kmalloc-64 of size 64
[   84.021087] The buggy address is located 0 bytes to the right of
[   84.021087]  allocated 48-byte region [cc23e880, cc23e8b0)
[   84.032653] 
[   84.034149] The buggy address belongs to the physical page:
[   84.039764] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   84.047027] flags: 0x0(zone=0)
[   84.050109] page_type: f5(slab)
[   84.053283] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.061431] raw: 00000000
[   84.064056] page dumped because: kasan: bad access detected
[   84.069671] 
[   84.071166] Memory state around the buggy address:
[   84.075988]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.082580]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.089141] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.095703]                              ^
[   84.099822]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.106414]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.112976] ==================================================================
[   81.017883] ==================================================================
[   81.025146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x520c/0x5ab0
[   81.032592] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   81.039245] 
[   81.040771] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   81.040802] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.040802] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.040802] Call trace: 
[   81.040832]  unwind_backtrace from show_stack+0x18/0x1c
[   81.040832]  show_stack from dump_stack_lvl+0x70/0x90
[   81.040863]  dump_stack_lvl from print_report+0x158/0x528
[   81.040893]  print_report from kasan_report+0xdc/0x118
[   81.040924]  kasan_report from kasan_atomics_helper+0x520c/0x5ab0
[   81.040954]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.040954]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.040985]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.041015]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.041046]  kthread from ret_from_fork+0x14/0x20
[   81.041076] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   81.041076] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.041107] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.041107] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.041137] 
[   81.152130] Allocated by task 321:
[   81.155548]  kasan_save_track+0x30/0x5c
[   81.159423]  __kasan_kmalloc+0x8c/0x94
[   81.163208]  kasan_atomics+0xc0/0x33c
[   81.166900]  kunit_try_run_case+0x22c/0x5a8
[   81.171112]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.176635]  kthread+0x464/0x810
[   81.179901]  ret_from_fork+0x14/0x20
[   81.183502] 
[   81.184997] The buggy address belongs to the object at cc23e880
[   81.184997]  which belongs to the cache kmalloc-64 of size 64
[   81.196716] The buggy address is located 0 bytes to the right of
[   81.196716]  allocated 48-byte region [cc23e880, cc23e8b0)
[   81.208282] 
[   81.209777] The buggy address belongs to the physical page:
[   81.215393] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   81.222656] flags: 0x0(zone=0)
[   81.225738] page_type: f5(slab)
[   81.228912] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   81.237060] raw: 00000000
[   81.239715] page dumped because: kasan: bad access detected
[   81.245300] 
[   81.246826] Memory state around the buggy address:
[   81.251647]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.258209]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.264770] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   81.271362]                              ^
[   81.275482]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.282043]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.288635] ==================================================================
[   84.973236] ==================================================================
[   84.980499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b4c/0x5ab0
[   84.987945] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   84.994689] 
[   84.996215] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   84.996215] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.996246] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.996246] Call trace: 
[   84.996246]  unwind_backtrace from show_stack+0x18/0x1c
[   84.996276]  show_stack from dump_stack_lvl+0x70/0x90
[   84.996307]  dump_stack_lvl from print_report+0x158/0x528
[   84.996337]  print_report from kasan_report+0xdc/0x118
[   84.996368]  kasan_report from kasan_check_range+0x14c/0x198
[   84.996368]  kasan_check_range from kasan_atomics_helper+0x1b4c/0x5ab0
[   84.996398]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.996429]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.996459]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.996490]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.996520]  kthread from ret_from_fork+0x14/0x20
[   84.996520] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   84.996551] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.996551] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.996582] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.996582] 
[   85.113708] Allocated by task 321:
[   85.117126]  kasan_save_track+0x30/0x5c
[   85.121002]  __kasan_kmalloc+0x8c/0x94
[   85.124786]  kasan_atomics+0xc0/0x33c
[   85.128479]  kunit_try_run_case+0x22c/0x5a8
[   85.132690]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.138214]  kthread+0x464/0x810
[   85.141479]  ret_from_fork+0x14/0x20
[   85.145080] 
[   85.146575] The buggy address belongs to the object at cc23e880
[   85.146575]  which belongs to the cache kmalloc-64 of size 64
[   85.158294] The buggy address is located 0 bytes to the right of
[   85.158294]  allocated 48-byte region [cc23e880, cc23e8b0)
[   85.169860] 
[   85.171356] The buggy address belongs to the physical page:
[   85.176971] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   85.184234] flags: 0x0(zone=0)
[   85.187316] page_type: f5(slab)
[   85.190490] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   85.198638] raw: 00000000
[   85.201263] page dumped because: kasan: bad access detected
[   85.206878] 
[   85.208374] Memory state around the buggy address:
[   85.213226]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.219787]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.226348] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   85.232940]                              ^
[   85.237060]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.243621]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.250213] ==================================================================
[   73.097381] ==================================================================
[   73.104644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5170/0x5ab0
[   73.112091] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   73.118743] 
[   73.120269] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   73.120300] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.120300] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.120330] Call trace: 
[   73.120330]  unwind_backtrace from show_stack+0x18/0x1c
[   73.120361]  show_stack from dump_stack_lvl+0x70/0x90
[   73.120361]  dump_stack_lvl from print_report+0x158/0x528
[   73.120391]  print_report from kasan_report+0xdc/0x118
[   73.120422]  kasan_report from kasan_atomics_helper+0x5170/0x5ab0
[   73.120452]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.120483]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.120483]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.120513]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.120544]  kthread from ret_from_fork+0x14/0x20
[   73.120574] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   73.120574] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.120605] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.120635] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.120635] 
[   73.231628] Allocated by task 321:
[   73.235046]  kasan_save_track+0x30/0x5c
[   73.238922]  __kasan_kmalloc+0x8c/0x94
[   73.242706]  kasan_atomics+0xc0/0x33c
[   73.246398]  kunit_try_run_case+0x22c/0x5a8
[   73.250610]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.256134]  kthread+0x464/0x810
[   73.259399]  ret_from_fork+0x14/0x20
[   73.263000] 
[   73.264495] The buggy address belongs to the object at cc23e880
[   73.264495]  which belongs to the cache kmalloc-64 of size 64
[   73.276245] The buggy address is located 0 bytes to the right of
[   73.276245]  allocated 48-byte region [cc23e880, cc23e8b0)
[   73.287780] 
[   73.289276] The buggy address belongs to the physical page:
[   73.294891] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   73.302154] flags: 0x0(zone=0)
[   73.305236] page_type: f5(slab)
[   73.308410] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.316558] raw: 00000000
[   73.319213] page dumped because: kasan: bad access detected
[   73.324798] 
[   73.326324] Memory state around the buggy address:
[   73.331146]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.337707]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.344299] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.350860]                              ^
[   73.354980]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.361541]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.368133] ==================================================================
[   78.187805] ==================================================================
[   78.195068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5404/0x5ab0
[   78.202514] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   78.209197] 
[   78.210693] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   78.210723] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   78.210723] Hardware name: Generic DRA74X (Flattened Device Tree)
[   78.210754] Call trace: 
[   78.210754]  unwind_backtrace from show_stack+0x18/0x1c
[   78.210784]  show_stack from dump_stack_lvl+0x70/0x90
[   78.210784]  dump_stack_lvl from print_report+0x158/0x528
[   78.210815]  print_report from kasan_report+0xdc/0x118
[   78.210845]  kasan_report from kasan_atomics_helper+0x5404/0x5ab0
[   78.210876]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   78.210906]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   78.210937]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.210937]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   78.210968]  kthread from ret_from_fork+0x14/0x20
[   78.210998] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   78.210998] 3fa0:                                     00000000 00000000 00000000 00000000
[   78.211029] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   78.211059] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   78.211059] 
[   78.322052] Allocated by task 321:
[   78.325469]  kasan_save_track+0x30/0x5c
[   78.329345]  __kasan_kmalloc+0x8c/0x94
[   78.333129]  kasan_atomics+0xc0/0x33c
[   78.336822]  kunit_try_run_case+0x22c/0x5a8
[   78.341033]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.346557]  kthread+0x464/0x810
[   78.349822]  ret_from_fork+0x14/0x20
[   78.353424] 
[   78.354919] The buggy address belongs to the object at cc23e880
[   78.354919]  which belongs to the cache kmalloc-64 of size 64
[   78.366668] The buggy address is located 0 bytes to the right of
[   78.366668]  allocated 48-byte region [cc23e880, cc23e8b0)
[   78.378204] 
[   78.379699] The buggy address belongs to the physical page:
[   78.385314] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   78.392578] flags: 0x0(zone=0)
[   78.395660] page_type: f5(slab)
[   78.398834] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.406982] raw: 00000000
[   78.409637] page dumped because: kasan: bad access detected
[   78.415222] 
[   78.416748] Memory state around the buggy address:
[   78.421569]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.428131]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.434692] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.441284]                              ^
[   78.445404]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.451965]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.458557] ==================================================================
[   84.120300] ==================================================================
[   84.127563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1960/0x5ab0
[   84.135009] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   84.141784] 
[   84.143280] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   84.143310] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.143310] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.143341] Call trace: 
[   84.143341]  unwind_backtrace from show_stack+0x18/0x1c
[   84.143371]  show_stack from dump_stack_lvl+0x70/0x90
[   84.143402]  dump_stack_lvl from print_report+0x158/0x528
[   84.143402]  print_report from kasan_report+0xdc/0x118
[   84.143432]  kasan_report from kasan_check_range+0x14c/0x198
[   84.143463]  kasan_check_range from kasan_atomics_helper+0x1960/0x5ab0
[   84.143493]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.143524]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.143524]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.143554]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.143585]  kthread from ret_from_fork+0x14/0x20
[   84.143615] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   84.143615] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.143646] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.143646] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.143676] 
[   84.260772] Allocated by task 321:
[   84.264190]  kasan_save_track+0x30/0x5c
[   84.268066]  __kasan_kmalloc+0x8c/0x94
[   84.271850]  kasan_atomics+0xc0/0x33c
[   84.275543]  kunit_try_run_case+0x22c/0x5a8
[   84.279754]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.285308]  kthread+0x464/0x810
[   84.288543]  ret_from_fork+0x14/0x20
[   84.292144] 
[   84.293670] The buggy address belongs to the object at cc23e880
[   84.293670]  which belongs to the cache kmalloc-64 of size 64
[   84.305389] The buggy address is located 0 bytes to the right of
[   84.305389]  allocated 48-byte region [cc23e880, cc23e8b0)
[   84.316925] 
[   84.318450] The buggy address belongs to the physical page:
[   84.324035] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   84.331329] flags: 0x0(zone=0)
[   84.334411] page_type: f5(slab)
[   84.337585] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.345733] raw: 00000000
[   84.348358] page dumped because: kasan: bad access detected
[   84.353973] 
[   84.355468] Memory state around the buggy address:
[   84.360290]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.366882]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.373443] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.380004]                              ^
[   84.384124]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.390716]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.397277] ==================================================================
[   87.525665] ==================================================================
[   87.532928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2154/0x5ab0
[   87.540405] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   87.547149] 
[   87.548645] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   87.548675] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.548675] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.548706] Call trace: 
[   87.548706]  unwind_backtrace from show_stack+0x18/0x1c
[   87.548736]  show_stack from dump_stack_lvl+0x70/0x90
[   87.548736]  dump_stack_lvl from print_report+0x158/0x528
[   87.548767]  print_report from kasan_report+0xdc/0x118
[   87.548797]  kasan_report from kasan_check_range+0x14c/0x198
[   87.548828]  kasan_check_range from kasan_atomics_helper+0x2154/0x5ab0
[   87.548858]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.548858]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.548889]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.548919]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.548950]  kthread from ret_from_fork+0x14/0x20
[   87.548980] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   87.548980] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.549011] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.549011] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.549041] 
[   87.666137] Allocated by task 321:
[   87.669555]  kasan_save_track+0x30/0x5c
[   87.673431]  __kasan_kmalloc+0x8c/0x94
[   87.677215]  kasan_atomics+0xc0/0x33c
[   87.680908]  kunit_try_run_case+0x22c/0x5a8
[   87.685119]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.690643]  kthread+0x464/0x810
[   87.693908]  ret_from_fork+0x14/0x20
[   87.697509] 
[   87.699005] The buggy address belongs to the object at cc23e880
[   87.699005]  which belongs to the cache kmalloc-64 of size 64
[   87.710723] The buggy address is located 0 bytes to the right of
[   87.710723]  allocated 48-byte region [cc23e880, cc23e8b0)
[   87.722290] 
[   87.723785] The buggy address belongs to the physical page:
[   87.729400] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   87.736663] flags: 0x0(zone=0)
[   87.739746] page_type: f5(slab)
[   87.742919] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   87.751068] raw: 00000000
[   87.753692] page dumped because: kasan: bad access detected
[   87.759307] 
[   87.760803] Memory state around the buggy address:
[   87.765624]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.772216]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.778778] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   87.785339]                              ^
[   87.789489]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.796051]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.802612] ==================================================================
[   76.198822] ==================================================================
[   76.206115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x5ab0
[   76.213470] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   76.220214] 
[   76.221710] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   76.221740] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   76.221771] Hardware name: Generic DRA74X (Flattened Device Tree)
[   76.221771] Call trace: 
[   76.221771]  unwind_backtrace from show_stack+0x18/0x1c
[   76.221801]  show_stack from dump_stack_lvl+0x70/0x90
[   76.221832]  dump_stack_lvl from print_report+0x158/0x528
[   76.221862]  print_report from kasan_report+0xdc/0x118
[   76.221893]  kasan_report from kasan_check_range+0x14c/0x198
[   76.221893]  kasan_check_range from kasan_atomics_helper+0x8d8/0x5ab0
[   76.221923]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   76.221954]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   76.221984]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.222015]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   76.222045]  kthread from ret_from_fork+0x14/0x20
[   76.222045] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   76.222076] 3fa0:                                     00000000 00000000 00000000 00000000
[   76.222076] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   76.222106] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   76.222106] 
[   76.339141] Allocated by task 321:
[   76.342559]  kasan_save_track+0x30/0x5c
[   76.346435]  __kasan_kmalloc+0x8c/0x94
[   76.350219]  kasan_atomics+0xc0/0x33c
[   76.353912]  kunit_try_run_case+0x22c/0x5a8
[   76.358123]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.363647]  kthread+0x464/0x810
[   76.366912]  ret_from_fork+0x14/0x20
[   76.370513] 
[   76.372009] The buggy address belongs to the object at cc23e880
[   76.372009]  which belongs to the cache kmalloc-64 of size 64
[   76.383728] The buggy address is located 0 bytes to the right of
[   76.383728]  allocated 48-byte region [cc23e880, cc23e8b0)
[   76.395294] 
[   76.396789] The buggy address belongs to the physical page:
[   76.402404] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   76.409667] flags: 0x0(zone=0)
[   76.412750] page_type: f5(slab)
[   76.415924] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.424072] raw: 00000000
[   76.426696] page dumped because: kasan: bad access detected
[   76.432312] 
[   76.433837] Memory state around the buggy address:
[   76.438659]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.445220]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.451782] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.458374]                              ^
[   76.462493]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.469055]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.475646] ==================================================================
[   80.455474] ==================================================================
[   80.462768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5218/0x5ab0
[   80.470214] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   80.476867] 
[   80.478393] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   80.478393] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   80.478424] Hardware name: Generic DRA74X (Flattened Device Tree)
[   80.478424] Call trace: 
[   80.478424]  unwind_backtrace from show_stack+0x18/0x1c
[   80.478454]  show_stack from dump_stack_lvl+0x70/0x90
[   80.478485]  dump_stack_lvl from print_report+0x158/0x528
[   80.478515]  print_report from kasan_report+0xdc/0x118
[   80.478546]  kasan_report from kasan_atomics_helper+0x5218/0x5ab0
[   80.478576]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   80.478576]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   80.478607]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.478637]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   80.478668]  kthread from ret_from_fork+0x14/0x20
[   80.478698] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   80.478698] 3fa0:                                     00000000 00000000 00000000 00000000
[   80.478729] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   80.478729] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   80.478759] 
[   80.589721] Allocated by task 321:
[   80.593170]  kasan_save_track+0x30/0x5c
[   80.597015]  __kasan_kmalloc+0x8c/0x94
[   80.600799]  kasan_atomics+0xc0/0x33c
[   80.604492]  kunit_try_run_case+0x22c/0x5a8
[   80.608734]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.614257]  kthread+0x464/0x810
[   80.617523]  ret_from_fork+0x14/0x20
[   80.621124] 
[   80.622619] The buggy address belongs to the object at cc23e880
[   80.622619]  which belongs to the cache kmalloc-64 of size 64
[   80.634338] The buggy address is located 0 bytes to the right of
[   80.634338]  allocated 48-byte region [cc23e880, cc23e8b0)
[   80.645904] 
[   80.647399] The buggy address belongs to the physical page:
[   80.653015] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   80.660278] flags: 0x0(zone=0)
[   80.663360] page_type: f5(slab)
[   80.666534] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.674682] raw: 00000000
[   80.677307] page dumped because: kasan: bad access detected
[   80.682922] 
[   80.684417] Memory state around the buggy address:
[   80.689239]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.695831]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.702392] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.708953]                              ^
[   80.713104]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.719665]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.726226] ==================================================================
[   72.533111] ==================================================================
[   72.548065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5044/0x5ab0
[   72.555541] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   72.562194] 
[   72.563690] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   72.563720] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   72.563751] Hardware name: Generic DRA74X (Flattened Device Tree)
[   72.563751] Call trace: 
[   72.563751]  unwind_backtrace from show_stack+0x18/0x1c
[   72.563781]  show_stack from dump_stack_lvl+0x70/0x90
[   72.563812]  dump_stack_lvl from print_report+0x158/0x528
[   72.563842]  print_report from kasan_report+0xdc/0x118
[   72.563873]  kasan_report from kasan_atomics_helper+0x5044/0x5ab0
[   72.563873]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   72.563903]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   72.563934]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.563964]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   72.563995]  kthread from ret_from_fork+0x14/0x20
[   72.564025] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   72.564025] 3fa0:                                     00000000 00000000 00000000 00000000
[   72.564056] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   72.564056] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   72.564086] 
[   72.675079] Allocated by task 321:
[   72.678497]  kasan_save_track+0x30/0x5c
[   72.682373]  __kasan_kmalloc+0x8c/0x94
[   72.686157]  kasan_atomics+0xc0/0x33c
[   72.689849]  kunit_try_run_case+0x22c/0x5a8
[   72.694061]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.699584]  kthread+0x464/0x810
[   72.702850]  ret_from_fork+0x14/0x20
[   72.706451] 
[   72.707977] The buggy address belongs to the object at cc23e880
[   72.707977]  which belongs to the cache kmalloc-64 of size 64
[   72.719696] The buggy address is located 0 bytes to the right of
[   72.719696]  allocated 48-byte region [cc23e880, cc23e8b0)
[   72.731231] 
[   72.732757] The buggy address belongs to the physical page:
[   72.738342] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   72.745635] flags: 0x0(zone=0)
[   72.748718] page_type: f5(slab)
[   72.751892] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   72.760009] raw: 00000000
[   72.762664] page dumped because: kasan: bad access detected
[   72.768280] 
[   72.769775] Memory state around the buggy address:
[   72.774597]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.781158]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.787750] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.794311]                              ^
[   72.798431]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.805023]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.811584] ==================================================================
[   77.619537] ==================================================================
[   77.626800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc24/0x5ab0
[   77.634185] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   77.640930] 
[   77.642425] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   77.642456] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.642456] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.642486] Call trace: 
[   77.642486]  unwind_backtrace from show_stack+0x18/0x1c
[   77.642517]  show_stack from dump_stack_lvl+0x70/0x90
[   77.642547]  dump_stack_lvl from print_report+0x158/0x528
[   77.642547]  print_report from kasan_report+0xdc/0x118
[   77.642578]  kasan_report from kasan_check_range+0x14c/0x198
[   77.642608]  kasan_check_range from kasan_atomics_helper+0xc24/0x5ab0
[   77.642639]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.642669]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.642669]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.642700]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.642730]  kthread from ret_from_fork+0x14/0x20
[   77.642761] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   77.642761] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.642791] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.642822] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.642822] 
[   77.759826] Allocated by task 321:
[   77.763275]  kasan_save_track+0x30/0x5c
[   77.767120]  __kasan_kmalloc+0x8c/0x94
[   77.770904]  kasan_atomics+0xc0/0x33c
[   77.774597]  kunit_try_run_case+0x22c/0x5a8
[   77.778839]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.784362]  kthread+0x464/0x810
[   77.787597]  ret_from_fork+0x14/0x20
[   77.791229] 
[   77.792724] The buggy address belongs to the object at cc23e880
[   77.792724]  which belongs to the cache kmalloc-64 of size 64
[   77.804443] The buggy address is located 0 bytes to the right of
[   77.804443]  allocated 48-byte region [cc23e880, cc23e8b0)
[   77.816009] 
[   77.817504] The buggy address belongs to the physical page:
[   77.823120] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   77.830383] flags: 0x0(zone=0)
[   77.833465] page_type: f5(slab)
[   77.836639] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   77.844787] raw: 00000000
[   77.847412] page dumped because: kasan: bad access detected
[   77.853027] 
[   77.854522] Memory state around the buggy address:
[   77.859344]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.865936]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.872497] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.879058]                              ^
[   77.883209]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.889770]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.896331] ==================================================================
[   89.787506] ==================================================================
[   89.794769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5500/0x5ab0
[   89.802215] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   89.808898] 
[   89.810394] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   89.810424] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   89.810424] Hardware name: Generic DRA74X (Flattened Device Tree)
[   89.810455] Call trace: 
[   89.810455]  unwind_backtrace from show_stack+0x18/0x1c
[   89.810485]  show_stack from dump_stack_lvl+0x70/0x90
[   89.810516]  dump_stack_lvl from print_report+0x158/0x528
[   89.810516]  print_report from kasan_report+0xdc/0x118
[   89.810546]  kasan_report from kasan_atomics_helper+0x5500/0x5ab0
[   89.810577]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   89.810607]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   89.810638]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.810638]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   89.810668]  kthread from ret_from_fork+0x14/0x20
[   89.810699] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   89.810729] 3fa0:                                     00000000 00000000 00000000 00000000
[   89.810729] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   89.810760] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   89.810760] 
[   89.921752] Allocated by task 321:
[   89.925170]  kasan_save_track+0x30/0x5c
[   89.929046]  __kasan_kmalloc+0x8c/0x94
[   89.932830]  kasan_atomics+0xc0/0x33c
[   89.936523]  kunit_try_run_case+0x22c/0x5a8
[   89.940734]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.946258]  kthread+0x464/0x810
[   89.949523]  ret_from_fork+0x14/0x20
[   89.953124] 
[   89.954620] The buggy address belongs to the object at cc23e880
[   89.954620]  which belongs to the cache kmalloc-64 of size 64
[   89.966369] The buggy address is located 0 bytes to the right of
[   89.966369]  allocated 48-byte region [cc23e880, cc23e8b0)
[   89.977905] 
[   89.979400] The buggy address belongs to the physical page:
[   89.985015] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   89.992279] flags: 0x0(zone=0)
[   89.995361] page_type: f5(slab)
[   89.998535] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   90.006683] raw: 00000000
[   90.009338] page dumped because: kasan: bad access detected
[   90.014923] 
[   90.016448] Memory state around the buggy address:
[   90.021270]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.027832]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.034393] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   90.040985]                              ^
[   90.045104]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.051666]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.058227] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_generic
[   70.005340] ==================================================================
[   70.012603] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b10/0x1d70
[   70.020050] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   70.026733] 
[   70.028228] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   70.028259] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.028259] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.028289] Call trace: 
[   70.028289]  unwind_backtrace from show_stack+0x18/0x1c
[   70.028320]  show_stack from dump_stack_lvl+0x70/0x90
[   70.028350]  dump_stack_lvl from print_report+0x158/0x528
[   70.028350]  print_report from kasan_report+0xdc/0x118
[   70.028381]  kasan_report from kasan_bitops_generic+0x1b10/0x1d70
[   70.028411]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.028442]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.028472]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.028503]  kthread from ret_from_fork+0x14/0x20
[   70.028503] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   70.028533] 3fa0:                                     00000000 00000000 00000000 00000000
[   70.028533] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.028564] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.028564] 
[   70.134155] Allocated by task 317:
[   70.137573]  kasan_save_track+0x30/0x5c
[   70.141448]  __kasan_kmalloc+0x8c/0x94
[   70.145233]  kasan_bitops_generic+0xd4/0x1d70
[   70.149627]  kunit_try_run_case+0x22c/0x5a8
[   70.153839]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.159362]  kthread+0x464/0x810
[   70.162628]  ret_from_fork+0x14/0x20
[   70.166229] 
[   70.167724] The buggy address belongs to the object at cc23d380
[   70.167724]  which belongs to the cache kmalloc-64 of size 64
[   70.179443] The buggy address is located 4 bytes inside of
[   70.179443]  allocated 5-byte region [cc23d380, cc23d385)
[   70.190399] 
[   70.191894] The buggy address belongs to the physical page:
[   70.197509] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   70.204772] flags: 0x0(zone=0)
[   70.207855] page_type: f5(slab)
[   70.211029] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   70.219177] raw: 00000000
[   70.221832] page dumped because: kasan: bad access detected
[   70.227416] 
[   70.228942] Memory state around the buggy address:
[   70.233764]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.240325]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.246887] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.253479]            ^
[   70.256011]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.262603]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.269165] ==================================================================
[   71.400177] ==================================================================
[   71.407440] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bac/0x1d70
[   71.414916] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   71.421569] 
[   71.423065] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   71.423095] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.423126] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.423126] Call trace: 
[   71.423126]  unwind_backtrace from show_stack+0x18/0x1c
[   71.423156]  show_stack from dump_stack_lvl+0x70/0x90
[   71.423187]  dump_stack_lvl from print_report+0x158/0x528
[   71.423217]  print_report from kasan_report+0xdc/0x118
[   71.423217]  kasan_report from kasan_bitops_generic+0x1bac/0x1d70
[   71.423248]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.423278]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.423309]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.423339]  kthread from ret_from_fork+0x14/0x20
[   71.423339] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   71.423370] 3fa0:                                     00000000 00000000 00000000 00000000
[   71.423400] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.423400] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.423431] 
[   71.528991] Allocated by task 317:
[   71.532409]  kasan_save_track+0x30/0x5c
[   71.536285]  __kasan_kmalloc+0x8c/0x94
[   71.540069]  kasan_bitops_generic+0xd4/0x1d70
[   71.544464]  kunit_try_run_case+0x22c/0x5a8
[   71.548675]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.554199]  kthread+0x464/0x810
[   71.557464]  ret_from_fork+0x14/0x20
[   71.561065] 
[   71.562591] The buggy address belongs to the object at cc23d380
[   71.562591]  which belongs to the cache kmalloc-64 of size 64
[   71.574310] The buggy address is located 4 bytes inside of
[   71.574310]  allocated 5-byte region [cc23d380, cc23d385)
[   71.585235] 
[   71.586730] The buggy address belongs to the physical page:
[   71.592346] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   71.599639] flags: 0x0(zone=0)
[   71.602691] page_type: f5(slab)
[   71.605865] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   71.614013] raw: 00000000
[   71.616668] page dumped because: kasan: bad access detected
[   71.622283] 
[   71.623779] Memory state around the buggy address:
[   71.628601]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.635162]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.641754] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.648315]            ^
[   71.650878]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.657440]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.664001] ==================================================================
[   70.547943] ==================================================================
[   70.571197] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bb8/0x1d70
[   70.578643] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   70.585296] 
[   70.586822] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   70.586853] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.586853] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.586853] Call trace: 
[   70.586883]  unwind_backtrace from show_stack+0x18/0x1c
[   70.586883]  show_stack from dump_stack_lvl+0x70/0x90
[   70.586914]  dump_stack_lvl from print_report+0x158/0x528
[   70.586944]  print_report from kasan_report+0xdc/0x118
[   70.586975]  kasan_report from kasan_bitops_generic+0x1bb8/0x1d70
[   70.587005]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.587005]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.587036]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.587066]  kthread from ret_from_fork+0x14/0x20
[   70.587097] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   70.587097] 3fa0:                                     00000000 00000000 00000000 00000000
[   70.587127] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.587158] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.587158] 
[   70.692718] Allocated by task 317:
[   70.696166]  kasan_save_track+0x30/0x5c
[   70.700012]  __kasan_kmalloc+0x8c/0x94
[   70.703796]  kasan_bitops_generic+0xd4/0x1d70
[   70.708190]  kunit_try_run_case+0x22c/0x5a8
[   70.712432]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.717956]  kthread+0x464/0x810
[   70.721221]  ret_from_fork+0x14/0x20
[   70.724822] 
[   70.726318] The buggy address belongs to the object at cc23d380
[   70.726318]  which belongs to the cache kmalloc-64 of size 64
[   70.738037] The buggy address is located 4 bytes inside of
[   70.738037]  allocated 5-byte region [cc23d380, cc23d385)
[   70.748992] 
[   70.750488] The buggy address belongs to the physical page:
[   70.756103] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   70.763366] flags: 0x0(zone=0)
[   70.766448] page_type: f5(slab)
[   70.769622] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   70.777770] raw: 00000000
[   70.780395] page dumped because: kasan: bad access detected
[   70.786010] 
[   70.787506] Memory state around the buggy address:
[   70.792327]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.798919]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.805480] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.812042]            ^
[   70.814605]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.821197]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.827758] ==================================================================
[   70.835296] ==================================================================
[   70.859069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b88/0x1d70
[   70.866516] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   70.873168] 
[   70.874664] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   70.874694] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.874725] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.874725] Call trace: 
[   70.874725]  unwind_backtrace from show_stack+0x18/0x1c
[   70.874755]  show_stack from dump_stack_lvl+0x70/0x90
[   70.874786]  dump_stack_lvl from print_report+0x158/0x528
[   70.874816]  print_report from kasan_report+0xdc/0x118
[   70.874847]  kasan_report from kasan_bitops_generic+0x1b88/0x1d70
[   70.874847]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.874877]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.874908]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.874938]  kthread from ret_from_fork+0x14/0x20
[   70.874969] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   70.874969] 3fa0:                                     00000000 00000000 00000000 00000000
[   70.874999] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.874999] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.875030] 
[   70.980590] Allocated by task 317:
[   70.984008]  kasan_save_track+0x30/0x5c
[   70.987884]  __kasan_kmalloc+0x8c/0x94
[   70.991668]  kasan_bitops_generic+0xd4/0x1d70
[   70.996063]  kunit_try_run_case+0x22c/0x5a8
[   71.000274]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.005828]  kthread+0x464/0x810
[   71.009063]  ret_from_fork+0x14/0x20
[   71.012664] 
[   71.014190] The buggy address belongs to the object at cc23d380
[   71.014190]  which belongs to the cache kmalloc-64 of size 64
[   71.025909] The buggy address is located 4 bytes inside of
[   71.025909]  allocated 5-byte region [cc23d380, cc23d385)
[   71.036834] 
[   71.038360] The buggy address belongs to the physical page:
[   71.043945] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   71.051239] flags: 0x0(zone=0)
[   71.054321] page_type: f5(slab)
[   71.057495] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   71.065612] raw: 00000000
[   71.068267] page dumped because: kasan: bad access detected
[   71.073883] 
[   71.075378] Memory state around the buggy address:
[   71.080200]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.086761]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.093353] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.099914]            ^
[   71.102478]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.109039]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.115631] ==================================================================
[   72.247497] ==================================================================
[   72.254791] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b34/0x1d70
[   72.262237] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   72.268890] 
[   72.270416] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   72.270416] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   72.270446] Hardware name: Generic DRA74X (Flattened Device Tree)
[   72.270446] Call trace: 
[   72.270446]  unwind_backtrace from show_stack+0x18/0x1c
[   72.270477]  show_stack from dump_stack_lvl+0x70/0x90
[   72.270507]  dump_stack_lvl from print_report+0x158/0x528
[   72.270538]  print_report from kasan_report+0xdc/0x118
[   72.270568]  kasan_report from kasan_bitops_generic+0x1b34/0x1d70
[   72.270599]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   72.270599]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.270629]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   72.270660]  kthread from ret_from_fork+0x14/0x20
[   72.270690] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   72.270690] 3fa0:                                     00000000 00000000 00000000 00000000
[   72.270721] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   72.270721] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   72.270751] 
[   72.376312] Allocated by task 317:
[   72.379730]  kasan_save_track+0x30/0x5c
[   72.383605]  __kasan_kmalloc+0x8c/0x94
[   72.387390]  kasan_bitops_generic+0xd4/0x1d70
[   72.391784]  kunit_try_run_case+0x22c/0x5a8
[   72.395996]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.401550]  kthread+0x464/0x810
[   72.404785]  ret_from_fork+0x14/0x20
[   72.408386] 
[   72.409912] The buggy address belongs to the object at cc23d380
[   72.409912]  which belongs to the cache kmalloc-64 of size 64
[   72.421630] The buggy address is located 4 bytes inside of
[   72.421630]  allocated 5-byte region [cc23d380, cc23d385)
[   72.432556] 
[   72.434082] The buggy address belongs to the physical page:
[   72.439666] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   72.446960] flags: 0x0(zone=0)
[   72.450042] page_type: f5(slab)
[   72.453216] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   72.461364] raw: 00000000
[   72.463989] page dumped because: kasan: bad access detected
[   72.469604] 
[   72.471099] Memory state around the buggy address:
[   72.475921]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.482513]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.489074] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.495635]            ^
[   72.498199]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.504760]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.511352] ==================================================================
[   71.959594] ==================================================================
[   71.983612] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1abc/0x1d70
[   71.991058] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   71.997741] 
[   71.999237] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   71.999267] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.999267] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.999298] Call trace: 
[   71.999298]  unwind_backtrace from show_stack+0x18/0x1c
[   71.999328]  show_stack from dump_stack_lvl+0x70/0x90
[   71.999359]  dump_stack_lvl from print_report+0x158/0x528
[   71.999359]  print_report from kasan_report+0xdc/0x118
[   71.999389]  kasan_report from kasan_bitops_generic+0x1abc/0x1d70
[   71.999420]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.999450]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.999481]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.999511]  kthread from ret_from_fork+0x14/0x20
[   71.999511] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   71.999542] 3fa0:                                     00000000 00000000 00000000 00000000
[   71.999542] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.999572] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.999572] 
[   72.105163] Allocated by task 317:
[   72.108581]  kasan_save_track+0x30/0x5c
[   72.112457]  __kasan_kmalloc+0x8c/0x94
[   72.116241]  kasan_bitops_generic+0xd4/0x1d70
[   72.120635]  kunit_try_run_case+0x22c/0x5a8
[   72.124847]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.130371]  kthread+0x464/0x810
[   72.133636]  ret_from_fork+0x14/0x20
[   72.137237] 
[   72.138732] The buggy address belongs to the object at cc23d380
[   72.138732]  which belongs to the cache kmalloc-64 of size 64
[   72.150482] The buggy address is located 4 bytes inside of
[   72.150482]  allocated 5-byte region [cc23d380, cc23d385)
[   72.161407] 
[   72.162902] The buggy address belongs to the physical page:
[   72.168518] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   72.175811] flags: 0x0(zone=0)
[   72.178863] page_type: f5(slab)
[   72.182037] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   72.190185] raw: 00000000
[   72.192840] page dumped because: kasan: bad access detected
[   72.198425] 
[   72.199951] Memory state around the buggy address:
[   72.204772]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.211334]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.217895] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.224487]            ^
[   72.227020]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.233612]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.240173] ==================================================================
[   69.450897] ==================================================================
[   69.458190] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x438/0x1d70
[   69.465545] Write of size 4 at addr cc23d384 by task kunit_try_catch/317
[   69.472290] 
[   69.473785] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   69.473815] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.473846] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.473846] Call trace: 
[   69.473846]  unwind_backtrace from show_stack+0x18/0x1c
[   69.473876]  show_stack from dump_stack_lvl+0x70/0x90
[   69.473907]  dump_stack_lvl from print_report+0x158/0x528
[   69.473937]  print_report from kasan_report+0xdc/0x118
[   69.473968]  kasan_report from kasan_check_range+0x14c/0x198
[   69.473968]  kasan_check_range from kasan_bitops_generic+0x438/0x1d70
[   69.473999]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.474029]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.474060]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.474090]  kthread from ret_from_fork+0x14/0x20
[   69.474090] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   69.474121] 3fa0:                                     00000000 00000000 00000000 00000000
[   69.474151] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.474151] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.474182] 
[   69.585754] Allocated by task 317:
[   69.589202]  kasan_save_track+0x30/0x5c
[   69.593048]  __kasan_kmalloc+0x8c/0x94
[   69.596832]  kasan_bitops_generic+0xd4/0x1d70
[   69.601257]  kunit_try_run_case+0x22c/0x5a8
[   69.605468]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.610992]  kthread+0x464/0x810
[   69.614257]  ret_from_fork+0x14/0x20
[   69.617858] 
[   69.619354] The buggy address belongs to the object at cc23d380
[   69.619354]  which belongs to the cache kmalloc-64 of size 64
[   69.631072] The buggy address is located 4 bytes inside of
[   69.631072]  allocated 5-byte region [cc23d380, cc23d385)
[   69.642028] 
[   69.643524] The buggy address belongs to the physical page:
[   69.649139] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   69.656402] flags: 0x0(zone=0)
[   69.659484] page_type: f5(slab)
[   69.662658] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   69.670806] raw: 00000000
[   69.673431] page dumped because: kasan: bad access detected
[   69.679046] 
[   69.680541] Memory state around the buggy address:
[   69.685363]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.691955]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.698516] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.705108]            ^
[   69.707641]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.714233]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.720794] ==================================================================
[   71.122955] ==================================================================
[   71.130218] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x874/0x1d70
[   71.137603] Write of size 4 at addr cc23d384 by task kunit_try_catch/317
[   71.144348] 
[   71.145843] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   71.145874] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.145874] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.145904] Call trace: 
[   71.145904]  unwind_backtrace from show_stack+0x18/0x1c
[   71.145935]  show_stack from dump_stack_lvl+0x70/0x90
[   71.145965]  dump_stack_lvl from print_report+0x158/0x528
[   71.145996]  print_report from kasan_report+0xdc/0x118
[   71.145996]  kasan_report from kasan_check_range+0x14c/0x198
[   71.146026]  kasan_check_range from kasan_bitops_generic+0x874/0x1d70
[   71.146057]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.146087]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.146118]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.146148]  kthread from ret_from_fork+0x14/0x20
[   71.146148] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   71.146179] 3fa0:                                     00000000 00000000 00000000 00000000
[   71.146179] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.146209] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.146209] 
[   71.257812] Allocated by task 317:
[   71.261230]  kasan_save_track+0x30/0x5c
[   71.265106]  __kasan_kmalloc+0x8c/0x94
[   71.268890]  kasan_bitops_generic+0xd4/0x1d70
[   71.273284]  kunit_try_run_case+0x22c/0x5a8
[   71.277526]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.283050]  kthread+0x464/0x810
[   71.286285]  ret_from_fork+0x14/0x20
[   71.289916] 
[   71.291412] The buggy address belongs to the object at cc23d380
[   71.291412]  which belongs to the cache kmalloc-64 of size 64
[   71.303131] The buggy address is located 4 bytes inside of
[   71.303131]  allocated 5-byte region [cc23d380, cc23d385)
[   71.314086] 
[   71.315582] The buggy address belongs to the physical page:
[   71.321197] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   71.328460] flags: 0x0(zone=0)
[   71.331542] page_type: f5(slab)
[   71.334716] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   71.342864] raw: 00000000
[   71.345489] page dumped because: kasan: bad access detected
[   71.351104] 
[   71.352600] Memory state around the buggy address:
[   71.357421]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.364013]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.370574] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.377136]            ^
[   71.379699]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.386291]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.392852] ==================================================================
[   69.163848] ==================================================================
[   69.187011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bd0/0x1d70
[   69.194458] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   69.201141] 
[   69.202636] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   69.202667] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.202667] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.202697] Call trace: 
[   69.202697]  unwind_backtrace from show_stack+0x18/0x1c
[   69.202728]  show_stack from dump_stack_lvl+0x70/0x90
[   69.202758]  dump_stack_lvl from print_report+0x158/0x528
[   69.202758]  print_report from kasan_report+0xdc/0x118
[   69.202789]  kasan_report from kasan_bitops_generic+0x1bd0/0x1d70
[   69.202819]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.202850]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.202880]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.202911]  kthread from ret_from_fork+0x14/0x20
[   69.202911] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   69.202941] 3fa0:                                     00000000 00000000 00000000 00000000
[   69.202941] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.202972] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.202972] 
[   69.308563] Allocated by task 317:
[   69.311981]  kasan_save_track+0x30/0x5c
[   69.315856]  __kasan_kmalloc+0x8c/0x94
[   69.319641]  kasan_bitops_generic+0xd4/0x1d70
[   69.324035]  kunit_try_run_case+0x22c/0x5a8
[   69.328247]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.333770]  kthread+0x464/0x810
[   69.337036]  ret_from_fork+0x14/0x20
[   69.340637] 
[   69.342132] The buggy address belongs to the object at cc23d380
[   69.342132]  which belongs to the cache kmalloc-64 of size 64
[   69.353851] The buggy address is located 4 bytes inside of
[   69.353851]  allocated 5-byte region [cc23d380, cc23d385)
[   69.364807] 
[   69.366302] The buggy address belongs to the physical page:
[   69.371917] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   69.379180] flags: 0x0(zone=0)
[   69.382263] page_type: f5(slab)
[   69.385437] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   69.393585] raw: 00000000
[   69.396209] page dumped because: kasan: bad access detected
[   69.401824] 
[   69.403320] Memory state around the buggy address:
[   69.408172]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.414733]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.421295] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.427886]            ^
[   69.430419]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.437011]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.443572] ==================================================================
[   71.671539] ==================================================================
[   71.695495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a80/0x1d70
[   71.702941] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   71.709594] 
[   71.711120] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   71.711151] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.711151] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.711151] Call trace: 
[   71.711181]  unwind_backtrace from show_stack+0x18/0x1c
[   71.711181]  show_stack from dump_stack_lvl+0x70/0x90
[   71.711212]  dump_stack_lvl from print_report+0x158/0x528
[   71.711242]  print_report from kasan_report+0xdc/0x118
[   71.711273]  kasan_report from kasan_bitops_generic+0x1a80/0x1d70
[   71.711303]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.711303]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.711334]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.711364]  kthread from ret_from_fork+0x14/0x20
[   71.711395] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   71.711395] 3fa0:                                     00000000 00000000 00000000 00000000
[   71.711425] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.711456] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.711456] 
[   71.817016] Allocated by task 317:
[   71.820465]  kasan_save_track+0x30/0x5c
[   71.824310]  __kasan_kmalloc+0x8c/0x94
[   71.828094]  kasan_bitops_generic+0xd4/0x1d70
[   71.832489]  kunit_try_run_case+0x22c/0x5a8
[   71.836730]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.842254]  kthread+0x464/0x810
[   71.845489]  ret_from_fork+0x14/0x20
[   71.849121] 
[   71.850616] The buggy address belongs to the object at cc23d380
[   71.850616]  which belongs to the cache kmalloc-64 of size 64
[   71.862335] The buggy address is located 4 bytes inside of
[   71.862335]  allocated 5-byte region [cc23d380, cc23d385)
[   71.873291] 
[   71.874786] The buggy address belongs to the physical page:
[   71.880401] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   71.887664] flags: 0x0(zone=0)
[   71.890747] page_type: f5(slab)
[   71.893920] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   71.902069] raw: 00000000
[   71.904693] page dumped because: kasan: bad access detected
[   71.910308] 
[   71.911804] Memory state around the buggy address:
[   71.916625]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.923217]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.929779] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.936340]            ^
[   71.938903]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.945495]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.952056] ==================================================================
[   69.728118] ==================================================================
[   69.735382] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4e8/0x1d70
[   69.742767] Write of size 4 at addr cc23d384 by task kunit_try_catch/317
[   69.749511] 
[   69.751007] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   69.751037] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.751068] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.751068] Call trace: 
[   69.751068]  unwind_backtrace from show_stack+0x18/0x1c
[   69.751098]  show_stack from dump_stack_lvl+0x70/0x90
[   69.751129]  dump_stack_lvl from print_report+0x158/0x528
[   69.751159]  print_report from kasan_report+0xdc/0x118
[   69.751159]  kasan_report from kasan_check_range+0x14c/0x198
[   69.751190]  kasan_check_range from kasan_bitops_generic+0x4e8/0x1d70
[   69.751220]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.751251]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.751281]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.751312]  kthread from ret_from_fork+0x14/0x20
[   69.751312] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   69.751342] 3fa0:                                     00000000 00000000 00000000 00000000
[   69.751342] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.751373] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.751373] 
[   69.862976] Allocated by task 317:
[   69.866394]  kasan_save_track+0x30/0x5c
[   69.870269]  __kasan_kmalloc+0x8c/0x94
[   69.874053]  kasan_bitops_generic+0xd4/0x1d70
[   69.878448]  kunit_try_run_case+0x22c/0x5a8
[   69.882659]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.888214]  kthread+0x464/0x810
[   69.891448]  ret_from_fork+0x14/0x20
[   69.895050] 
[   69.896575] The buggy address belongs to the object at cc23d380
[   69.896575]  which belongs to the cache kmalloc-64 of size 64
[   69.908294] The buggy address is located 4 bytes inside of
[   69.908294]  allocated 5-byte region [cc23d380, cc23d385)
[   69.919250] 
[   69.920745] The buggy address belongs to the physical page:
[   69.926361] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   69.933624] flags: 0x0(zone=0)
[   69.936706] page_type: f5(slab)
[   69.939880] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   69.948028] raw: 00000000
[   69.950653] page dumped because: kasan: bad access detected
[   69.956268] 
[   69.957763] Memory state around the buggy address:
[   69.962585]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.969177]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.975738] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.982299]            ^
[   69.984863]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.991424]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.998016] ==================================================================
[   68.876464] ==================================================================
[   68.899444] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a50/0x1d70
[   68.906890] Read of size 4 at addr cc23d384 by task kunit_try_catch/317
[   68.913543] 
[   68.915069] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   68.915100] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   68.915100] Hardware name: Generic DRA74X (Flattened Device Tree)
[   68.915100] Call trace: 
[   68.915130]  unwind_backtrace from show_stack+0x18/0x1c
[   68.915161]  show_stack from dump_stack_lvl+0x70/0x90
[   68.915161]  dump_stack_lvl from print_report+0x158/0x528
[   68.915191]  print_report from kasan_report+0xdc/0x118
[   68.915222]  kasan_report from kasan_bitops_generic+0x1a50/0x1d70
[   68.915252]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   68.915283]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.915313]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   68.915313]  kthread from ret_from_fork+0x14/0x20
[   68.915344] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   68.915374] 3fa0:                                     00000000 00000000 00000000 00000000
[   68.915374] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   68.915405] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   68.915405] 
[   69.020996] Allocated by task 317:
[   69.024414]  kasan_save_track+0x30/0x5c
[   69.028289]  __kasan_kmalloc+0x8c/0x94
[   69.032073]  kasan_bitops_generic+0xd4/0x1d70
[   69.036468]  kunit_try_run_case+0x22c/0x5a8
[   69.040679]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.046203]  kthread+0x464/0x810
[   69.049468]  ret_from_fork+0x14/0x20
[   69.053070] 
[   69.054565] The buggy address belongs to the object at cc23d380
[   69.054565]  which belongs to the cache kmalloc-64 of size 64
[   69.066314] The buggy address is located 4 bytes inside of
[   69.066314]  allocated 5-byte region [cc23d380, cc23d385)
[   69.077239] 
[   69.078735] The buggy address belongs to the physical page:
[   69.084350] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   69.091644] flags: 0x0(zone=0)
[   69.094696] page_type: f5(slab)
[   69.097869] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   69.106018] raw: 00000000
[   69.108673] page dumped because: kasan: bad access detected
[   69.114288] 
[   69.115783] Memory state around the buggy address:
[   69.120605]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.127166]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.133758] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.140319]            ^
[   69.142883]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.149444]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.156005] ==================================================================
[   70.276489] ==================================================================
[   70.283782] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19f8/0x1d70
[   70.291229] Write of size 4 at addr cc23d384 by task kunit_try_catch/317
[   70.297973] 
[   70.299468] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   70.299499] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.299530] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.299530] Call trace: 
[   70.299530]  unwind_backtrace from show_stack+0x18/0x1c
[   70.299560]  show_stack from dump_stack_lvl+0x70/0x90
[   70.299591]  dump_stack_lvl from print_report+0x158/0x528
[   70.299621]  print_report from kasan_report+0xdc/0x118
[   70.299652]  kasan_report from kasan_bitops_generic+0x19f8/0x1d70
[   70.299652]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.299682]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.299713]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.299743]  kthread from ret_from_fork+0x14/0x20
[   70.299774] Exception stack(0xf26d3fb0 to 0xf26d3ff8)
[   70.299774] 3fa0:                                     00000000 00000000 00000000 00000000
[   70.299804] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.299804] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.299835] 
[   70.405395] Allocated by task 317:
[   70.408813]  kasan_save_track+0x30/0x5c
[   70.412689]  __kasan_kmalloc+0x8c/0x94
[   70.416473]  kasan_bitops_generic+0xd4/0x1d70
[   70.420867]  kunit_try_run_case+0x22c/0x5a8
[   70.425079]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.430603]  kthread+0x464/0x810
[   70.433868]  ret_from_fork+0x14/0x20
[   70.437469] 
[   70.438964] The buggy address belongs to the object at cc23d380
[   70.438964]  which belongs to the cache kmalloc-64 of size 64
[   70.450714] The buggy address is located 4 bytes inside of
[   70.450714]  allocated 5-byte region [cc23d380, cc23d385)
[   70.461639] 
[   70.463134] The buggy address belongs to the physical page:
[   70.468749] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d
[   70.476043] flags: 0x0(zone=0)
[   70.479095] page_type: f5(slab)
[   70.482269] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   70.490417] raw: 00000000
[   70.493072] page dumped because: kasan: bad access detected
[   70.498687] 
[   70.500183] Memory state around the buggy address:
[   70.505004]  cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.511566]  cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.518157] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.524719]            ^
[   70.527282]  cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.533843]  cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.540405] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   68.559356] ==================================================================
[   68.566650] BUG: KASAN: slab-use-after-free in strnlen+0x94/0x9c
[   68.572692] Read of size 1 at addr cc23b890 by task kunit_try_catch/315
[   68.579345] 
[   68.580871] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   68.580902] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   68.580902] Hardware name: Generic DRA74X (Flattened Device Tree)
[   68.580902] Call trace: 
[   68.580902]  unwind_backtrace from show_stack+0x18/0x1c
[   68.580932]  show_stack from dump_stack_lvl+0x70/0x90
[   68.580963]  dump_stack_lvl from print_report+0x158/0x528
[   68.580993]  print_report from kasan_report+0xdc/0x118
[   68.581024]  kasan_report from strnlen+0x94/0x9c
[   68.581024]  strnlen from kasan_strings+0x670/0xf00
[   68.581054]  kasan_strings from kunit_try_run_case+0x22c/0x5a8
[   68.581085]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.581115]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   68.581146]  kthread from ret_from_fork+0x14/0x20
[   68.581146] Exception stack(0xf26c3fb0 to 0xf26c3ff8)
[   68.581176] 3fa0:                                     00000000 00000000 00000000 00000000
[   68.581207] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   68.581207] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   68.581237] 
[   68.689605] Allocated by task 315:
[   68.693023]  kasan_save_track+0x30/0x5c
[   68.696899]  __kasan_kmalloc+0x8c/0x94
[   68.700683]  kasan_strings+0xe8/0xf00
[   68.704376]  kunit_try_run_case+0x22c/0x5a8
[   68.708587]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.714111]  kthread+0x464/0x810
[   68.717376]  ret_from_fork+0x14/0x20
[   68.720977] 
[   68.722473] Freed by task 315:
[   68.725555]  kasan_save_track+0x30/0x5c
[   68.729431]  kasan_save_free_info+0x3c/0x48
[   68.733642]  __kasan_slab_free+0x40/0x50
[   68.737579]  kfree+0xe8/0x384
[   68.740600]  kasan_strings+0x310/0xf00
[   68.744384]  kunit_try_run_case+0x22c/0x5a8
[   68.748596]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.754119]  kthread+0x464/0x810
[   68.757385]  ret_from_fork+0x14/0x20
[   68.760986] 
[   68.762481] The buggy address belongs to the object at cc23b880
[   68.762481]  which belongs to the cache kmalloc-64 of size 64
[   68.774200] The buggy address is located 16 bytes inside of
[   68.774200]  freed 64-byte region [cc23b880, cc23b8c0)
[   68.784973] 
[   68.786468] The buggy address belongs to the physical page:
[   68.792083] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23b
[   68.799377] flags: 0x0(zone=0)
[   68.802429] page_type: f5(slab)
[   68.805603] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   68.813751] raw: 00000000
[   68.816406] page dumped because: kasan: bad access detected
[   68.822021] 
[   68.823516] Memory state around the buggy address:
[   68.828338]  cc23b780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.834899]  cc23b800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.841491] >cc23b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.848052]                  ^
[   68.851135]  cc23b900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.857696]  cc23b980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.864288] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strlen
[   68.247375] ==================================================================
[   68.254638] BUG: KASAN: slab-use-after-free in strlen+0xb0/0xb4
[   68.260620] Read of size 1 at addr cc23b890 by task kunit_try_catch/315
[   68.267272] 
[   68.268798] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   68.268829] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   68.268829] Hardware name: Generic DRA74X (Flattened Device Tree)
[   68.268829] Call trace: 
[   68.268859]  unwind_backtrace from show_stack+0x18/0x1c
[   68.268859]  show_stack from dump_stack_lvl+0x70/0x90
[   68.268890]  dump_stack_lvl from print_report+0x158/0x528
[   68.268920]  print_report from kasan_report+0xdc/0x118
[   68.268951]  kasan_report from strlen+0xb0/0xb4
[   68.268981]  strlen from kasan_strings+0x5dc/0xf00
[   68.268981]  kasan_strings from kunit_try_run_case+0x22c/0x5a8
[   68.269012]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.269042]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   68.269073]  kthread from ret_from_fork+0x14/0x20
[   68.269104] Exception stack(0xf26c3fb0 to 0xf26c3ff8)
[   68.269104] 3fa0:                                     00000000 00000000 00000000 00000000
[   68.269134] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   68.269134] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   68.269165] 
[   68.377349] Allocated by task 315:
[   68.380767]  kasan_save_track+0x30/0x5c
[   68.384643]  __kasan_kmalloc+0x8c/0x94
[   68.388427]  kasan_strings+0xe8/0xf00
[   68.392120]  kunit_try_run_case+0x22c/0x5a8
[   68.396331]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.401855]  kthread+0x464/0x810
[   68.405120]  ret_from_fork+0x14/0x20
[   68.408721] 
[   68.410247] Freed by task 315:
[   68.413299]  kasan_save_track+0x30/0x5c
[   68.417175]  kasan_save_free_info+0x3c/0x48
[   68.421386]  __kasan_slab_free+0x40/0x50
[   68.425354]  kfree+0xe8/0x384
[   68.428344]  kasan_strings+0x310/0xf00
[   68.432128]  kunit_try_run_case+0x22c/0x5a8
[   68.436340]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.441864]  kthread+0x464/0x810
[   68.445129]  ret_from_fork+0x14/0x20
[   68.448730] 
[   68.450256] The buggy address belongs to the object at cc23b880
[   68.450256]  which belongs to the cache kmalloc-64 of size 64
[   68.461975] The buggy address is located 16 bytes inside of
[   68.461975]  freed 64-byte region [cc23b880, cc23b8c0)
[   68.472747] 
[   68.474243] The buggy address belongs to the physical page:
[   68.479858] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23b
[   68.487121] flags: 0x0(zone=0)
[   68.490203] page_type: f5(slab)
[   68.493377] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   68.501525] raw: 00000000
[   68.504150] page dumped because: kasan: bad access detected
[   68.509765] 
[   68.511260] Memory state around the buggy address:
[   68.516082]  cc23b780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.522674]  cc23b800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.529235] >cc23b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.535797]                  ^
[   68.538879]  cc23b900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.545471]  cc23b980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.552032] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   67.938629] ==================================================================
[   67.945922] BUG: KASAN: slab-use-after-free in kasan_strings+0xd0c/0xf00
[   67.952667] Read of size 1 at addr cc23b890 by task kunit_try_catch/315
[   67.959320] 
[   67.960845] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   67.960876] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   67.960876] Hardware name: Generic DRA74X (Flattened Device Tree)
[   67.960876] Call trace: 
[   67.960906]  unwind_backtrace from show_stack+0x18/0x1c
[   67.960937]  show_stack from dump_stack_lvl+0x70/0x90
[   67.960937]  dump_stack_lvl from print_report+0x158/0x528
[   67.960968]  print_report from kasan_report+0xdc/0x118
[   67.960998]  kasan_report from kasan_strings+0xd0c/0xf00
[   67.961029]  kasan_strings from kunit_try_run_case+0x22c/0x5a8
[   67.961029]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.961059]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   67.961090]  kthread from ret_from_fork+0x14/0x20
[   67.961120] Exception stack(0xf26c3fb0 to 0xf26c3ff8)
[   67.961120] 3fa0:                                     00000000 00000000 00000000 00000000
[   67.961151] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   67.961181] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   67.961181] 
[   68.065368] Allocated by task 315:
[   68.068786]  kasan_save_track+0x30/0x5c
[   68.072662]  __kasan_kmalloc+0x8c/0x94
[   68.076446]  kasan_strings+0xe8/0xf00
[   68.080139]  kunit_try_run_case+0x22c/0x5a8
[   68.084350]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.089874]  kthread+0x464/0x810
[   68.093139]  ret_from_fork+0x14/0x20
[   68.096740] 
[   68.098236] Freed by task 315:
[   68.101318]  kasan_save_track+0x30/0x5c
[   68.105194]  kasan_save_free_info+0x3c/0x48
[   68.109405]  __kasan_slab_free+0x40/0x50
[   68.113372]  kfree+0xe8/0x384
[   68.116363]  kasan_strings+0x310/0xf00
[   68.120147]  kunit_try_run_case+0x22c/0x5a8
[   68.124359]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.129882]  kthread+0x464/0x810
[   68.133148]  ret_from_fork+0x14/0x20
[   68.136749] 
[   68.138244] The buggy address belongs to the object at cc23b880
[   68.138244]  which belongs to the cache kmalloc-64 of size 64
[   68.149993] The buggy address is located 16 bytes inside of
[   68.149993]  freed 64-byte region [cc23b880, cc23b8c0)
[   68.160736] 
[   68.162261] The buggy address belongs to the physical page:
[   68.167846] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23b
[   68.175140] flags: 0x0(zone=0)
[   68.178222] page_type: f5(slab)
[   68.181365] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   68.189514] raw: 00000000
[   68.192169] page dumped because: kasan: bad access detected
[   68.197784] 
[   68.199279] Memory state around the buggy address:
[   68.204101]  cc23b780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.210662]  cc23b800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.217254] >cc23b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.223815]                  ^
[   68.226898]  cc23b900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.233459]  cc23b980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.240051] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   67.609863] ==================================================================
[   67.633911] BUG: KASAN: slab-use-after-free in strcmp+0xcc/0xd4
[   67.639862] Read of size 1 at addr cc23b890 by task kunit_try_catch/315
[   67.646545] 
[   67.648040] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   67.648071] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   67.648071] Hardware name: Generic DRA74X (Flattened Device Tree)
[   67.648101] Call trace: 
[   67.648101]  unwind_backtrace from show_stack+0x18/0x1c
[   67.648132]  show_stack from dump_stack_lvl+0x70/0x90
[   67.648162]  dump_stack_lvl from print_report+0x158/0x528
[   67.648193]  print_report from kasan_report+0xdc/0x118
[   67.648193]  kasan_report from strcmp+0xcc/0xd4
[   67.648223]  strcmp from kasan_strings+0x490/0xf00
[   67.648254]  kasan_strings from kunit_try_run_case+0x22c/0x5a8
[   67.648284]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.648284]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   67.648315]  kthread from ret_from_fork+0x14/0x20
[   67.648345] Exception stack(0xf26c3fb0 to 0xf26c3ff8)
[   67.648376] 3fa0:                                     00000000 00000000 00000000 00000000
[   67.648376] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   67.648406] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   67.648406] 
[   67.756622] Allocated by task 315:
[   67.760040]  kasan_save_track+0x30/0x5c
[   67.763916]  __kasan_kmalloc+0x8c/0x94
[   67.767700]  kasan_strings+0xe8/0xf00
[   67.771392]  kunit_try_run_case+0x22c/0x5a8
[   67.775604]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.781127]  kthread+0x464/0x810
[   67.784393]  ret_from_fork+0x14/0x20
[   67.787994] 
[   67.789489] Freed by task 315:
[   67.792572]  kasan_save_track+0x30/0x5c
[   67.796447]  kasan_save_free_info+0x3c/0x48
[   67.800659]  __kasan_slab_free+0x40/0x50
[   67.804626]  kfree+0xe8/0x384
[   67.807617]  kasan_strings+0x310/0xf00
[   67.811401]  kunit_try_run_case+0x22c/0x5a8
[   67.815612]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.821136]  kthread+0x464/0x810
[   67.824401]  ret_from_fork+0x14/0x20
[   67.828002] 
[   67.829528] The buggy address belongs to the object at cc23b880
[   67.829528]  which belongs to the cache kmalloc-64 of size 64
[   67.841247] The buggy address is located 16 bytes inside of
[   67.841247]  freed 64-byte region [cc23b880, cc23b8c0)
[   67.852020] 
[   67.853515] The buggy address belongs to the physical page:
[   67.859130] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23b
[   67.866394] flags: 0x0(zone=0)
[   67.869476] page_type: f5(slab)
[   67.872650] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   67.880798] raw: 00000000
[   67.883422] page dumped because: kasan: bad access detected
[   67.889038] 
[   67.890533] Memory state around the buggy address:
[   67.895355]  cc23b780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.901947]  cc23b800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.908508] >cc23b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.915069]                  ^
[   67.918151]  cc23b900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.924743]  cc23b980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.931304] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   67.292022] ==================================================================
[   67.303039] BUG: KASAN: slab-out-of-bounds in memcmp+0x19c/0x1b0
[   67.309112] Read of size 1 at addr cc23b718 by task kunit_try_catch/313
[   67.315765] 
[   67.317291] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   67.317321] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   67.317321] Hardware name: Generic DRA74X (Flattened Device Tree)
[   67.317321] Call trace: 
[   67.317352]  unwind_backtrace from show_stack+0x18/0x1c
[   67.317382]  show_stack from dump_stack_lvl+0x70/0x90
[   67.317382]  dump_stack_lvl from print_report+0x158/0x528
[   67.317413]  print_report from kasan_report+0xdc/0x118
[   67.317443]  kasan_report from memcmp+0x19c/0x1b0
[   67.317474]  memcmp from kasan_memcmp+0x1d0/0x388
[   67.317504]  kasan_memcmp from kunit_try_run_case+0x22c/0x5a8
[   67.317504]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.317535]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   67.317565]  kthread from ret_from_fork+0x14/0x20
[   67.317596] Exception stack(0xf26b3fb0 to 0xf26b3ff8)
[   67.317596] 3fa0:                                     00000000 00000000 00000000 00000000
[   67.317626] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   67.317626] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   67.317657] 
[   67.425842] Allocated by task 313:
[   67.429290]  kasan_save_track+0x30/0x5c
[   67.433135]  __kasan_kmalloc+0x8c/0x94
[   67.436920]  kasan_memcmp+0xe0/0x388
[   67.440551]  kunit_try_run_case+0x22c/0x5a8
[   67.444763]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.450286]  kthread+0x464/0x810
[   67.453552]  ret_from_fork+0x14/0x20
[   67.457153] 
[   67.458648] The buggy address belongs to the object at cc23b700
[   67.458648]  which belongs to the cache kmalloc-64 of size 64
[   67.470367] The buggy address is located 0 bytes to the right of
[   67.470367]  allocated 24-byte region [cc23b700, cc23b718)
[   67.481933] 
[   67.483428] The buggy address belongs to the physical page:
[   67.489044] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23b
[   67.496307] flags: 0x0(zone=0)
[   67.499389] page_type: f5(slab)
[   67.502563] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   67.510711] raw: 00000000
[   67.513366] page dumped because: kasan: bad access detected
[   67.518951] 
[   67.520477] Memory state around the buggy address:
[   67.525299]  cc23b600: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.531860]  cc23b680: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.538421] >cc23b700: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.545013]                     ^
[   67.548339]  cc23b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.554931]  cc23b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.561492] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   67.028442] ==================================================================
[   67.039916] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x314/0x34c
[   67.047546] Read of size 1 at addr f2693c8a by task kunit_try_catch/309
[   67.054199] 
[   67.055694] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   67.055725] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   67.055755] Hardware name: Generic DRA74X (Flattened Device Tree)
[   67.055755] Call trace: 
[   67.055755]  unwind_backtrace from show_stack+0x18/0x1c
[   67.055786]  show_stack from dump_stack_lvl+0x70/0x90
[   67.055816]  dump_stack_lvl from print_report+0x158/0x528
[   67.055847]  print_report from kasan_report+0xdc/0x118
[   67.055877]  kasan_report from kasan_alloca_oob_right+0x314/0x34c
[   67.055877]  kasan_alloca_oob_right from kunit_try_run_case+0x22c/0x5a8
[   67.055908]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.055938]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   67.055969]  kthread from ret_from_fork+0x14/0x20
[   67.055999] Exception stack(0xf2693fb0 to 0xf2693ff8)
[   67.055999] 3fa0:                                     00000000 00000000 00000000 00000000
[   67.056030] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   67.056030] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   67.056060] 
[   67.161804] The buggy address belongs to stack of task kunit_try_catch/309
[   67.168731] 
[   67.170227] The buggy address belongs to the virtual mapping at
[   67.170227]  [f2690000, f2695000) created by:
[   67.170227]  kernel_clone+0x174/0x794
[   67.184234] 
[   67.185729] The buggy address belongs to the physical page:
[   67.191345] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0d7a
[   67.198638] flags: 0x80000000(zone=2)
[   67.202331] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   67.210479] raw: 00000000
[   67.213104] page dumped because: kasan: bad access detected
[   67.218719] 
[   67.220214] Memory state around the buggy address:
[   67.225036]  f2693b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.231628]  f2693c00: 00 00 00 00 00 00 00 00 00 00 00 00 ca ca ca ca
[   67.238189] >f2693c80: 00 02 cb cb cb cb cb cb 00 00 00 00 00 00 00 00
[   67.244750]               ^
[   67.247589]  f2693d00: f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2 00 f3 f3 f3
[   67.254150]  f2693d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.260711] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   66.785125] ==================================================================
[   66.796081] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x304/0x33c
[   66.803619] Read of size 1 at addr f268bc7f by task kunit_try_catch/307
[   66.810302] 
[   66.811798] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   66.811828] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   66.811828] Hardware name: Generic DRA74X (Flattened Device Tree)
[   66.811859] Call trace: 
[   66.811859]  unwind_backtrace from show_stack+0x18/0x1c
[   66.811889]  show_stack from dump_stack_lvl+0x70/0x90
[   66.811920]  dump_stack_lvl from print_report+0x158/0x528
[   66.811950]  print_report from kasan_report+0xdc/0x118
[   66.811950]  kasan_report from kasan_alloca_oob_left+0x304/0x33c
[   66.811981]  kasan_alloca_oob_left from kunit_try_run_case+0x22c/0x5a8
[   66.812011]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   66.812042]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   66.812072]  kthread from ret_from_fork+0x14/0x20
[   66.812103] Exception stack(0xf268bfb0 to 0xf268bff8)
[   66.812103] bfa0:                                     00000000 00000000 00000000 00000000
[   66.812133] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   66.812133] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   66.812164] 
[   66.917755] The buggy address belongs to stack of task kunit_try_catch/307
[   66.924652] 
[   66.926177] The buggy address belongs to the virtual mapping at
[   66.926177]  [f2688000, f268d000) created by:
[   66.926177]  kernel_clone+0x174/0x794
[   66.940185] 
[   66.941680] The buggy address belongs to the physical page:
[   66.947296] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0d76
[   66.954559] flags: 0x80000000(zone=2)
[   66.958251] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   66.966400] raw: 00000000
[   66.969055] page dumped because: kasan: bad access detected
[   66.974670] 
[   66.976165] Memory state around the buggy address:
[   66.980987]  f268bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.987548]  f268bb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.994140] >f268bc00: 00 00 00 00 00 00 00 00 00 00 00 00 ca ca ca ca
[   67.000701]                                                         ^
[   67.007202]  f268bc80: 00 02 cb cb cb cb cb cb 00 00 00 00 00 00 00 00
[   67.013763]  f268bd00: f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2 00 f3 f3 f3
[   67.020324] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   66.512145] ==================================================================
[   66.527313] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2a8/0x2dc
[   66.534240] Read of size 1 at addr f2683d6a by task kunit_try_catch/305
[   66.540893] 
[   66.542388] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   66.542419] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   66.542449] Hardware name: Generic DRA74X (Flattened Device Tree)
[   66.542449] Call trace: 
[   66.542449]  unwind_backtrace from show_stack+0x18/0x1c
[   66.542480]  show_stack from dump_stack_lvl+0x70/0x90
[   66.542510]  dump_stack_lvl from print_report+0x158/0x528
[   66.542541]  print_report from kasan_report+0xdc/0x118
[   66.542572]  kasan_report from kasan_stack_oob+0x2a8/0x2dc
[   66.542572]  kasan_stack_oob from kunit_try_run_case+0x22c/0x5a8
[   66.542602]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   66.542633]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   66.542663]  kthread from ret_from_fork+0x14/0x20
[   66.542663] Exception stack(0xf2683fb0 to 0xf2683ff8)
[   66.542694] 3fa0:                                     00000000 00000000 00000000 00000000
[   66.542724] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   66.542724] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   66.542755] 
[   66.647277] The buggy address belongs to stack of task kunit_try_catch/305
[   66.654174]  and is located at offset 106 in frame:
[   66.659088]  kasan_stack_oob+0x0/0x2dc
[   66.662872] 
[   66.664398] This frame has 4 objects:
[   66.668090]  [32, 33) '__assertion'
[   66.668090]  [48, 52) 'array'
[   66.671600]  [64, 72) '__assertion'
[   66.674591]  [96, 106) 'stack_array'
[   66.678100] 
[   66.683197] The buggy address belongs to the virtual mapping at
[   66.683197]  [f2680000, f2685000) created by:
[   66.683197]  kernel_clone+0x174/0x794
[   66.697204] 
[   66.698730] The buggy address belongs to the physical page:
[   66.704315] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0d72
[   66.711608] flags: 0x80000000(zone=2)
[   66.715301] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   66.723449] raw: 00000000
[   66.726074] page dumped because: kasan: bad access detected
[   66.731689] 
[   66.733184] Memory state around the buggy address:
[   66.738006]  f2683c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.744598]  f2683c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.751159] >f2683d00: f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 02 f3 f3
[   66.757720]                                                   ^
[   66.763702]  f2683d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.770263]  f2683e00: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2
[   66.776824] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   66.276733] ==================================================================
[   66.289337] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x284/0x2bc
[   66.296966] Read of size 1 at addr c6a6ec4d by task kunit_try_catch/301
[   66.303619] 
[   66.305145] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   66.305175] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   66.305175] Hardware name: Generic DRA74X (Flattened Device Tree)
[   66.305175] Call trace: 
[   66.305175]  unwind_backtrace from show_stack+0x18/0x1c
[   66.305206]  show_stack from dump_stack_lvl+0x70/0x90
[   66.305236]  dump_stack_lvl from print_report+0x158/0x528
[   66.305267]  print_report from kasan_report+0xdc/0x118
[   66.305297]  kasan_report from kasan_global_oob_right+0x284/0x2bc
[   66.305328]  kasan_global_oob_right from kunit_try_run_case+0x22c/0x5a8
[   66.305328]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   66.305358]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   66.305389]  kthread from ret_from_fork+0x14/0x20
[   66.305419] Exception stack(0xf2663fb0 to 0xf2663ff8)
[   66.305419] 3fa0:                                     00000000 00000000 00000000 00000000
[   66.305450] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   66.305450] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   66.305480] 
[   66.411224] The buggy address belongs to the variable:
[   66.416412]  global_array+0xd/0x40
[   66.419830] 
[   66.421325] The buggy address belongs to the physical page:
[   66.426940] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x86a6e
[   66.434234] flags: 0x2000(reserved|zone=0)
[   66.438354] raw: 00002000 eeaee77c eeaee77c 00000000 00000000 00000000 ffffffff 00000001
[   66.446502] raw: 00000000
[   66.449157] page dumped because: kasan: bad access detected
[   66.454742] 
[   66.456237] Memory state around the buggy address:
[   66.461090]  c6a6eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.467651]  c6a6eb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.474212] >c6a6ec00: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   66.480804]                                       ^
[   66.485717]  c6a6ec80: 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   66.492279]  c6a6ed00: 01 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   66.498840] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   66.002136] ==================================================================
[   66.014221] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x15c/0x2f8
[   66.022308] Free of addr ccc10001 by task kunit_try_catch/299
[   66.028076] 
[   66.029602] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   66.029632] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   66.029632] Hardware name: Generic DRA74X (Flattened Device Tree)
[   66.029632] Call trace: 
[   66.029663]  unwind_backtrace from show_stack+0x18/0x1c
[   66.029663]  show_stack from dump_stack_lvl+0x70/0x90
[   66.029693]  dump_stack_lvl from print_report+0x158/0x528
[   66.029724]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   66.029754]  kasan_report_invalid_free from __kasan_mempool_poison_object+0xd0/0x128
[   66.029785]  __kasan_mempool_poison_object from mempool_free+0x360/0x440
[   66.029785]  mempool_free from mempool_kmalloc_invalid_free_helper+0x15c/0x2f8
[   66.029815]  mempool_kmalloc_invalid_free_helper from mempool_kmalloc_large_invalid_free+0xb8/0x104
[   66.029846]  mempool_kmalloc_large_invalid_free from kunit_try_run_case+0x22c/0x5a8
[   66.029876]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   66.029907]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   66.029937]  kthread from ret_from_fork+0x14/0x20
[   66.029968] Exception stack(0xf2653fb0 to 0xf2653ff8)
[   66.029968] 3fa0:                                     00000000 00000000 00000000 00000000
[   66.029998] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   66.029998] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   66.030029] 
[   66.162567] The buggy address belongs to the physical page:
[   66.168182] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc10
[   66.175476] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.183166] flags: 0x40(head|zone=0)
[   66.186767] page_type: f8(unknown)
[   66.190216] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   66.198364] raw: 00000000
[   66.200988] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   66.209228] head: 00000000 00000002 eebca241 ffffffff 00000000 ffffffff 00000000 ffffffff
[   66.217468] head: 00000000 00000004
[   66.220977] page dumped because: kasan: bad access detected
[   66.226593] 
[   66.228088] Memory state around the buggy address:
[   66.232910]  ccc0ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.239501]  ccc0ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.246063] >ccc10000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.252624]            ^
[   66.255187]  ccc10080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.261749]  ccc10100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.268341] ==================================================================
[   65.681884] ==================================================================
[   65.694152] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x15c/0x2f8
[   65.702209] Free of addr cc22df01 by task kunit_try_catch/297
[   65.708007] 
[   65.709503] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   65.709533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   65.709533] Hardware name: Generic DRA74X (Flattened Device Tree)
[   65.709564] Call trace: 
[   65.709564]  unwind_backtrace from show_stack+0x18/0x1c
[   65.709594]  show_stack from dump_stack_lvl+0x70/0x90
[   65.709625]  dump_stack_lvl from print_report+0x158/0x528
[   65.709625]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   65.709655]  kasan_report_invalid_free from check_slab_allocation+0xd0/0xd8
[   65.709686]  check_slab_allocation from __kasan_mempool_poison_object+0x54/0x128
[   65.709716]  __kasan_mempool_poison_object from mempool_free+0x360/0x440
[   65.709747]  mempool_free from mempool_kmalloc_invalid_free_helper+0x15c/0x2f8
[   65.709777]  mempool_kmalloc_invalid_free_helper from mempool_kmalloc_invalid_free+0xb8/0x104
[   65.709777]  mempool_kmalloc_invalid_free from kunit_try_run_case+0x22c/0x5a8
[   65.709808]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   65.709838]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   65.709869]  kthread from ret_from_fork+0x14/0x20
[   65.709899] Exception stack(0xf2643fb0 to 0xf2643ff8)
[   65.709899] 3fa0:                                     00000000 00000000 00000000 00000000
[   65.709930] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   65.709930] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   65.709960] 
[   65.848114] Allocated by task 297:
[   65.851531]  kasan_save_track+0x30/0x5c
[   65.855407]  remove_element+0x180/0x264
[   65.859283]  mempool_alloc_preallocated+0x60/0x9c
[   65.864013]  mempool_kmalloc_invalid_free_helper+0x90/0x2f8
[   65.869628]  mempool_kmalloc_invalid_free+0xb8/0x104
[   65.874633]  kunit_try_run_case+0x22c/0x5a8
[   65.878845]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   65.884399]  kthread+0x464/0x810
[   65.887634]  ret_from_fork+0x14/0x20
[   65.891265] 
[   65.892761] The buggy address belongs to the object at cc22df00
[   65.892761]  which belongs to the cache kmalloc-128 of size 128
[   65.904663] The buggy address is located 1 bytes inside of
[   65.904663]  128-byte region [cc22df00, cc22df80)
[   65.914886] 
[   65.916412] The buggy address belongs to the physical page:
[   65.921997] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22d
[   65.929290] flags: 0x0(zone=0)
[   65.932373] page_type: f5(slab)
[   65.935546] raw: 00000000 c7001400 00000122 00000000 00000000 00100010 f5000000 00000000
[   65.943664] raw: 00000000
[   65.946319] page dumped because: kasan: bad access detected
[   65.951934] 
[   65.953430] Memory state around the buggy address:
[   65.958251]  cc22de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.964813]  cc22de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.971405] >cc22df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.977966]            ^
[   65.980529]  cc22df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.987091]  cc22e000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.993682] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   65.169555] ==================================================================
[   65.181579] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368
[   65.188751] Free of addr ccc0c000 by task kunit_try_catch/293
[   65.194549] 
[   65.196044] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   65.196075] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   65.196075] Hardware name: Generic DRA74X (Flattened Device Tree)
[   65.196105] Call trace: 
[   65.196105]  unwind_backtrace from show_stack+0x18/0x1c
[   65.196136]  show_stack from dump_stack_lvl+0x70/0x90
[   65.196166]  dump_stack_lvl from print_report+0x158/0x528
[   65.196197]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   65.196197]  kasan_report_invalid_free from __kasan_mempool_poison_object+0x124/0x128
[   65.196228]  __kasan_mempool_poison_object from mempool_free+0x360/0x440
[   65.196258]  mempool_free from mempool_double_free_helper+0x1c4/0x368
[   65.196289]  mempool_double_free_helper from mempool_kmalloc_large_double_free+0xb8/0x104
[   65.196319]  mempool_kmalloc_large_double_free from kunit_try_run_case+0x22c/0x5a8
[   65.196350]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   65.196350]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   65.196380]  kthread from ret_from_fork+0x14/0x20
[   65.196411] Exception stack(0xf2623fb0 to 0xf2623ff8)
[   65.196411] 3fa0:                                     00000000 00000000 00000000 00000000
[   65.196441] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   65.196472] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   65.196472] 
[   65.327392] The buggy address belongs to the physical page:
[   65.332977] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c
[   65.340270] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.347961] flags: 0x40(head|zone=0)
[   65.351562] page_type: f8(unknown)
[   65.355010] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   65.363128] raw: 00000000
[   65.365783] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   65.374023] head: 00000000 00000002 eebca1b1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   65.382263] head: 00000000 00000004
[   65.385772] page dumped because: kasan: bad access detected
[   65.391387] 
[   65.392883] Memory state around the buggy address:
[   65.397705]  ccc0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.404266]  ccc0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.410858] >ccc0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.417419]            ^
[   65.419952]  ccc0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.426544]  ccc0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.433105] ==================================================================
[   65.441894] ==================================================================
[   65.454406] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368
[   65.461608] Free of addr ccc0c000 by task kunit_try_catch/295
[   65.467407] 
[   65.468902] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   65.468933] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   65.468933] Hardware name: Generic DRA74X (Flattened Device Tree)
[   65.468963] Call trace: 
[   65.468963]  unwind_backtrace from show_stack+0x18/0x1c
[   65.468994]  show_stack from dump_stack_lvl+0x70/0x90
[   65.469024]  dump_stack_lvl from print_report+0x158/0x528
[   65.469024]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   65.469055]  kasan_report_invalid_free from __kasan_mempool_poison_pages+0xdc/0xe0
[   65.469085]  __kasan_mempool_poison_pages from mempool_free+0x314/0x440
[   65.469116]  mempool_free from mempool_double_free_helper+0x1c4/0x368
[   65.469116]  mempool_double_free_helper from mempool_page_alloc_double_free+0xb4/0x100
[   65.469146]  mempool_page_alloc_double_free from kunit_try_run_case+0x22c/0x5a8
[   65.469177]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   65.469207]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   65.469238]  kthread from ret_from_fork+0x14/0x20
[   65.469268] Exception stack(0xf2633fb0 to 0xf2633ff8)
[   65.469268] 3fa0:                                     00000000 00000000 00000000 00000000
[   65.469299] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   65.469299] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   65.469329] 
[   65.599365] The buggy address belongs to the physical page:
[   65.604949] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c
[   65.612243] flags: 0x0(zone=0)
[   65.615325] raw: 00000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   65.623474] raw: 00000000
[   65.626098] page dumped because: kasan: bad access detected
[   65.631713] 
[   65.633209] Memory state around the buggy address:
[   65.638031]  ccc0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.644592]  ccc0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.651184] >ccc0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.657745]            ^
[   65.660308]  ccc0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.666870]  ccc0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.673431] ==================================================================
[   64.805633] ==================================================================
[   64.817199] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368
[   64.824401] Free of addr cc22db00 by task kunit_try_catch/291
[   64.830169] 
[   64.831695] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   64.831695] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   64.831726] Hardware name: Generic DRA74X (Flattened Device Tree)
[   64.831726] Call trace: 
[   64.831726]  unwind_backtrace from show_stack+0x18/0x1c
[   64.831756]  show_stack from dump_stack_lvl+0x70/0x90
[   64.831787]  dump_stack_lvl from print_report+0x158/0x528
[   64.831817]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   64.831848]  kasan_report_invalid_free from check_slab_allocation+0xb8/0xd8
[   64.831878]  check_slab_allocation from __kasan_mempool_poison_object+0x54/0x128
[   64.831909]  __kasan_mempool_poison_object from mempool_free+0x360/0x440
[   64.831909]  mempool_free from mempool_double_free_helper+0x1c4/0x368
[   64.831939]  mempool_double_free_helper from mempool_kmalloc_double_free+0xb8/0x104
[   64.831970]  mempool_kmalloc_double_free from kunit_try_run_case+0x22c/0x5a8
[   64.832000]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.832031]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   64.832061]  kthread from ret_from_fork+0x14/0x20
[   64.832061] Exception stack(0xf2613fb0 to 0xf2613ff8)
[   64.832092] 3fa0:                                     00000000 00000000 00000000 00000000
[   64.832092] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   64.832122] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   64.832122] 
[   64.968536] Allocated by task 291:
[   64.971984]  kasan_save_track+0x30/0x5c
[   64.975830]  remove_element+0x180/0x264
[   64.979705]  mempool_alloc_preallocated+0x60/0x9c
[   64.984436]  mempool_double_free_helper+0x8c/0x368
[   64.989288]  mempool_kmalloc_double_free+0xb8/0x104
[   64.994201]  kunit_try_run_case+0x22c/0x5a8
[   64.998413]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   65.003936]  kthread+0x464/0x810
[   65.007202]  ret_from_fork+0x14/0x20
[   65.010803] 
[   65.012298] Freed by task 291:
[   65.015380]  kasan_save_track+0x30/0x5c
[   65.019256]  kasan_save_free_info+0x3c/0x48
[   65.023468]  __kasan_mempool_poison_object+0x94/0x128
[   65.028564]  mempool_free+0x360/0x440
[   65.032257]  mempool_double_free_helper+0x13c/0x368
[   65.037170]  mempool_kmalloc_double_free+0xb8/0x104
[   65.042083]  kunit_try_run_case+0x22c/0x5a8
[   65.046295]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   65.051818]  kthread+0x464/0x810
[   65.055084]  ret_from_fork+0x14/0x20
[   65.058685] 
[   65.060180] The buggy address belongs to the object at cc22db00
[   65.060180]  which belongs to the cache kmalloc-128 of size 128
[   65.072082] The buggy address is located 0 bytes inside of
[   65.072082]  128-byte region [cc22db00, cc22db80)
[   65.082336] 
[   65.083831] The buggy address belongs to the physical page:
[   65.089447] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22d
[   65.096710] flags: 0x0(zone=0)
[   65.099792] page_type: f5(slab)
[   65.102966] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   65.111114] raw: 00000000
[   65.113739] page dumped because: kasan: bad access detected
[   65.119354] 
[   65.120849] Memory state around the buggy address:
[   65.125671]  cc22da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.132263]  cc22da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.138824] >cc22db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.145385]            ^
[   65.147949]  cc22db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.154541]  cc22dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.161102] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   64.584930] ==================================================================
[   64.595977] BUG: KASAN: use-after-free in mempool_uaf_helper+0x388/0x3b8
[   64.602752] Read of size 1 at addr ccc0c000 by task kunit_try_catch/289
[   64.609405] 
[   64.610900] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   64.610931] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   64.610961] Hardware name: Generic DRA74X (Flattened Device Tree)
[   64.610961] Call trace: 
[   64.610961]  unwind_backtrace from show_stack+0x18/0x1c
[   64.610992]  show_stack from dump_stack_lvl+0x70/0x90
[   64.611022]  dump_stack_lvl from print_report+0x158/0x528
[   64.611053]  print_report from kasan_report+0xdc/0x118
[   64.611083]  kasan_report from mempool_uaf_helper+0x388/0x3b8
[   64.611083]  mempool_uaf_helper from mempool_page_alloc_uaf+0xb8/0x104
[   64.611114]  mempool_page_alloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   64.611145]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.611175]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   64.611206]  kthread from ret_from_fork+0x14/0x20
[   64.611236] Exception stack(0xf2603fb0 to 0xf2603ff8)
[   64.611236] 3fa0:                                     00000000 00000000 00000000 00000000
[   64.611267] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   64.611267] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   64.611297] 
[   64.723236] The buggy address belongs to the physical page:
[   64.728851] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c
[   64.736114] flags: 0x0(zone=0)
[   64.739227] raw: 00000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   64.747375] raw: 00000000
[   64.749999] page dumped because: kasan: bad access detected
[   64.755615] 
[   64.757110] Memory state around the buggy address:
[   64.761932]  ccc0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.768524]  ccc0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.775085] >ccc0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.781646]            ^
[   64.784210]  ccc0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.790771]  ccc0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.797332] ==================================================================
[   63.982269] ==================================================================
[   63.993560] BUG: KASAN: use-after-free in mempool_uaf_helper+0x388/0x3b8
[   64.000305] Read of size 1 at addr ccc0c000 by task kunit_try_catch/285
[   64.006958] 
[   64.008483] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   64.008514] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   64.008514] Hardware name: Generic DRA74X (Flattened Device Tree)
[   64.008514] Call trace: 
[   64.008544]  unwind_backtrace from show_stack+0x18/0x1c
[   64.008575]  show_stack from dump_stack_lvl+0x70/0x90
[   64.008575]  dump_stack_lvl from print_report+0x158/0x528
[   64.008605]  print_report from kasan_report+0xdc/0x118
[   64.008636]  kasan_report from mempool_uaf_helper+0x388/0x3b8
[   64.008666]  mempool_uaf_helper from mempool_kmalloc_large_uaf+0xbc/0x108
[   64.008697]  mempool_kmalloc_large_uaf from kunit_try_run_case+0x22c/0x5a8
[   64.008697]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.008728]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   64.008758]  kthread from ret_from_fork+0x14/0x20
[   64.008789] Exception stack(0xf25e3fb0 to 0xf25e3ff8)
[   64.008789] 3fa0:                                     00000000 00000000 00000000 00000000
[   64.008819] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   64.008819] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   64.008850] 
[   64.121307] The buggy address belongs to the physical page:
[   64.126922] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c
[   64.134185] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.141906] flags: 0x40(head|zone=0)
[   64.145507] page_type: f8(unknown)
[   64.148956] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   64.157073] raw: 00000000
[   64.159729] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   64.167968] head: 00000000 00000002 eebca1b1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   64.176208] head: 00000000 00000004
[   64.179718] page dumped because: kasan: bad access detected
[   64.185302] 
[   64.186828] Memory state around the buggy address:
[   64.191650]  ccc0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.198211]  ccc0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.204772] >ccc0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.211364]            ^
[   64.213897]  ccc0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.220489]  ccc0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.227050] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   63.645019] ==================================================================
[   63.656585] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x388/0x3b8
[   63.663787] Read of size 1 at addr cc22d700 by task kunit_try_catch/283
[   63.670471] 
[   63.671966] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   63.671997] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.671997] Hardware name: Generic DRA74X (Flattened Device Tree)
[   63.672027] Call trace: 
[   63.672027]  unwind_backtrace from show_stack+0x18/0x1c
[   63.672058]  show_stack from dump_stack_lvl+0x70/0x90
[   63.672088]  dump_stack_lvl from print_report+0x158/0x528
[   63.672119]  print_report from kasan_report+0xdc/0x118
[   63.672119]  kasan_report from mempool_uaf_helper+0x388/0x3b8
[   63.672149]  mempool_uaf_helper from mempool_kmalloc_uaf+0xbc/0x108
[   63.672180]  mempool_kmalloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   63.672210]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.672241]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   63.672271]  kthread from ret_from_fork+0x14/0x20
[   63.672271] Exception stack(0xf25d3fb0 to 0xf25d3ff8)
[   63.672302] 3fa0:                                     00000000 00000000 00000000 00000000
[   63.672302] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   63.672332] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   63.672332] 
[   63.783782] Allocated by task 283:
[   63.787200]  kasan_save_track+0x30/0x5c
[   63.791076]  remove_element+0x180/0x264
[   63.794952]  mempool_alloc_preallocated+0x60/0x9c
[   63.799682]  mempool_uaf_helper+0x90/0x3b8
[   63.803802]  mempool_kmalloc_uaf+0xbc/0x108
[   63.808044]  kunit_try_run_case+0x22c/0x5a8
[   63.812255]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.817779]  kthread+0x464/0x810
[   63.821044]  ret_from_fork+0x14/0x20
[   63.824645] 
[   63.826141] Freed by task 283:
[   63.829223]  kasan_save_track+0x30/0x5c
[   63.833099]  kasan_save_free_info+0x3c/0x48
[   63.837310]  __kasan_mempool_poison_object+0x94/0x128
[   63.842407]  mempool_free+0x360/0x440
[   63.846099]  mempool_uaf_helper+0x13c/0x3b8
[   63.850311]  mempool_kmalloc_uaf+0xbc/0x108
[   63.854522]  kunit_try_run_case+0x22c/0x5a8
[   63.858734]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.864257]  kthread+0x464/0x810
[   63.867523]  ret_from_fork+0x14/0x20
[   63.871124] 
[   63.872619] The buggy address belongs to the object at cc22d700
[   63.872619]  which belongs to the cache kmalloc-128 of size 128
[   63.884521] The buggy address is located 0 bytes inside of
[   63.884521]  freed 128-byte region [cc22d700, cc22d780)
[   63.895294] 
[   63.896789] The buggy address belongs to the physical page:
[   63.902404] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22d
[   63.909698] flags: 0x0(zone=0)
[   63.912780] page_type: f5(slab)
[   63.915924] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   63.924072] raw: 00000000
[   63.926727] page dumped because: kasan: bad access detected
[   63.932342] 
[   63.933837] Memory state around the buggy address:
[   63.938659]  cc22d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.945220]  cc22d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.951812] >cc22d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.958374]            ^
[   63.960937]  cc22d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.967498]  cc22d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.974060] ==================================================================
[   64.235748] ==================================================================
[   64.247589] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x388/0x3b8
[   64.254760] Read of size 1 at addr cc23a240 by task kunit_try_catch/287
[   64.261444] 
[   64.262939] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   64.262969] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   64.262969] Hardware name: Generic DRA74X (Flattened Device Tree)
[   64.263000] Call trace: 
[   64.263000]  unwind_backtrace from show_stack+0x18/0x1c
[   64.263031]  show_stack from dump_stack_lvl+0x70/0x90
[   64.263061]  dump_stack_lvl from print_report+0x158/0x528
[   64.263061]  print_report from kasan_report+0xdc/0x118
[   64.263092]  kasan_report from mempool_uaf_helper+0x388/0x3b8
[   64.263122]  mempool_uaf_helper from mempool_slab_uaf+0xb8/0x100
[   64.263153]  mempool_slab_uaf from kunit_try_run_case+0x22c/0x5a8
[   64.263153]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.263183]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   64.263214]  kthread from ret_from_fork+0x14/0x20
[   64.263244] Exception stack(0xf25f3fb0 to 0xf25f3ff8)
[   64.263244] 3fa0:                                     00000000 00000000 00000000 00000000
[   64.263275] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   64.263305] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   64.263305] 
[   64.374206] Allocated by task 287:
[   64.377624]  kasan_save_track+0x30/0x5c
[   64.381500]  __kasan_mempool_unpoison_object+0xec/0x14c
[   64.386749]  remove_element+0x1d4/0x264
[   64.390624]  mempool_alloc_preallocated+0x60/0x9c
[   64.395355]  mempool_uaf_helper+0x90/0x3b8
[   64.399505]  mempool_slab_uaf+0xb8/0x100
[   64.403442]  kunit_try_run_case+0x22c/0x5a8
[   64.407684]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.413208]  kthread+0x464/0x810
[   64.416473]  ret_from_fork+0x14/0x20
[   64.420074] 
[   64.421569] Freed by task 287:
[   64.424652]  kasan_save_track+0x30/0x5c
[   64.428497]  kasan_save_free_info+0x3c/0x48
[   64.432708]  __kasan_mempool_poison_object+0x94/0x128
[   64.437805]  mempool_free+0x360/0x440
[   64.441497]  mempool_uaf_helper+0x13c/0x3b8
[   64.445709]  mempool_slab_uaf+0xb8/0x100
[   64.449676]  kunit_try_run_case+0x22c/0x5a8
[   64.453887]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.459442]  kthread+0x464/0x810
[   64.462677]  ret_from_fork+0x14/0x20
[   64.466278] 
[   64.467803] The buggy address belongs to the object at cc23a240
[   64.467803]  which belongs to the cache test_cache of size 123
[   64.479614] The buggy address is located 0 bytes inside of
[   64.479614]  freed 123-byte region [cc23a240, cc23a2bb)
[   64.490356] 
[   64.491882] The buggy address belongs to the physical page:
[   64.497467] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23a
[   64.504760] flags: 0x0(zone=0)
[   64.507843] page_type: f5(slab)
[   64.511016] raw: 00000000 cc22f800 00000122 00000000 00000000 80150015 f5000000 00000000
[   64.519134] raw: 00000000
[   64.521789] page dumped because: kasan: bad access detected
[   64.527404] 
[   64.528900] Memory state around the buggy address:
[   64.533721]  cc23a100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.540283]  cc23a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.546874] >cc23a200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   64.553436]                                    ^
[   64.558074]  cc23a280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.564666]  cc23a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.571228] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   62.782592] ==================================================================
[   62.793579] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334
[   62.801208] Read of size 1 at addr cc22d373 by task kunit_try_catch/277
[   62.807891] 
[   62.809387] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   62.809448] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   62.809448] Hardware name: Generic DRA74X (Flattened Device Tree)
[   62.809448] Call trace: 
[   62.809478]  unwind_backtrace from show_stack+0x18/0x1c
[   62.809509]  show_stack from dump_stack_lvl+0x70/0x90
[   62.809539]  dump_stack_lvl from print_report+0x158/0x528
[   62.809570]  print_report from kasan_report+0xdc/0x118
[   62.809600]  kasan_report from mempool_oob_right_helper+0x2f8/0x334
[   62.809631]  mempool_oob_right_helper from mempool_kmalloc_oob_right+0xbc/0x108
[   62.809661]  mempool_kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   62.809692]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   62.809722]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   62.809783]  kthread from ret_from_fork+0x14/0x20
[   62.809814] Exception stack(0xf25b3fb0 to 0xf25b3ff8)
[   62.809814] 3fa0:                                     00000000 00000000 00000000 00000000
[   62.809844] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   62.809875] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   62.809875] 
[   62.923431] Allocated by task 277:
[   62.926849]  kasan_save_track+0x30/0x5c
[   62.930725]  remove_element+0x180/0x264
[   62.934600]  mempool_alloc_preallocated+0x60/0x9c
[   62.939331]  mempool_oob_right_helper+0x94/0x334
[   62.944000]  mempool_kmalloc_oob_right+0xbc/0x108
[   62.948730]  kunit_try_run_case+0x22c/0x5a8
[   62.952941]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   62.958465]  kthread+0x464/0x810
[   62.961730]  ret_from_fork+0x14/0x20
[   62.965332] 
[   62.966827] The buggy address belongs to the object at cc22d300
[   62.966827]  which belongs to the cache kmalloc-128 of size 128
[   62.978729] The buggy address is located 0 bytes to the right of
[   62.978729]  allocated 115-byte region [cc22d300, cc22d373)
[   62.990386] 
[   62.991882] The buggy address belongs to the physical page:
[   62.997497] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22d
[   63.004760] flags: 0x0(zone=0)
[   63.007843] page_type: f5(slab)
[   63.011016] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   63.019165] raw: 00000000
[   63.021820] page dumped because: kasan: bad access detected
[   63.027404] 
[   63.028900] Memory state around the buggy address:
[   63.033752]  cc22d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.040313]  cc22d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.046874] >cc22d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   63.053466]                                                      ^
[   63.059661]  cc22d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.066253]  cc22d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   63.072814] ==================================================================
[   63.081176] ==================================================================
[   63.092987] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334
[   63.100616] Read of size 1 at addr ccc0e001 by task kunit_try_catch/279
[   63.107299] 
[   63.108795] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   63.108825] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.108825] Hardware name: Generic DRA74X (Flattened Device Tree)
[   63.108856] Call trace: 
[   63.108856]  unwind_backtrace from show_stack+0x18/0x1c
[   63.108886]  show_stack from dump_stack_lvl+0x70/0x90
[   63.108917]  dump_stack_lvl from print_report+0x158/0x528
[   63.108917]  print_report from kasan_report+0xdc/0x118
[   63.108947]  kasan_report from mempool_oob_right_helper+0x2f8/0x334
[   63.108978]  mempool_oob_right_helper from mempool_kmalloc_large_oob_right+0xbc/0x108
[   63.109008]  mempool_kmalloc_large_oob_right from kunit_try_run_case+0x22c/0x5a8
[   63.109039]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.109069]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   63.109069]  kthread from ret_from_fork+0x14/0x20
[   63.109100] Exception stack(0xf25bbfb0 to 0xf25bbff8)
[   63.109130] bfa0:                                     00000000 00000000 00000000 00000000
[   63.109130] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   63.109161] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   63.109161] 
[   63.223724] The buggy address belongs to the physical page:
[   63.229339] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c
[   63.236602] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.244323] flags: 0x40(head|zone=0)
[   63.247924] page_type: f8(unknown)
[   63.251373] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   63.259521] raw: 00000000
[   63.262145] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   63.270385] head: 00000000 00000002 eebca1b1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   63.278625] head: 00000000 00000004
[   63.282135] page dumped because: kasan: bad access detected
[   63.287750] 
[   63.289245] Memory state around the buggy address:
[   63.294067]  ccc0df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.300628]  ccc0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.307220] >ccc0e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   63.313781]            ^
[   63.316345]  ccc0e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   63.322906]  ccc0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   63.329467] ==================================================================
[   63.338226] ==================================================================
[   63.350585] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334
[   63.358215] Read of size 1 at addr cc2382bb by task kunit_try_catch/281
[   63.364868] 
[   63.366363] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   63.366394] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.366424] Hardware name: Generic DRA74X (Flattened Device Tree)
[   63.366424] Call trace: 
[   63.366424]  unwind_backtrace from show_stack+0x18/0x1c
[   63.366455]  show_stack from dump_stack_lvl+0x70/0x90
[   63.366485]  dump_stack_lvl from print_report+0x158/0x528
[   63.366516]  print_report from kasan_report+0xdc/0x118
[   63.366516]  kasan_report from mempool_oob_right_helper+0x2f8/0x334
[   63.366546]  mempool_oob_right_helper from mempool_slab_oob_right+0xb8/0x100
[   63.366577]  mempool_slab_oob_right from kunit_try_run_case+0x22c/0x5a8
[   63.366607]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.366638]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   63.366668]  kthread from ret_from_fork+0x14/0x20
[   63.366668] Exception stack(0xf25c3fb0 to 0xf25c3ff8)
[   63.366699] 3fa0:                                     00000000 00000000 00000000 00000000
[   63.366699] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   63.366729] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   63.366729] 
[   63.479736] Allocated by task 281:
[   63.483154]  kasan_save_track+0x30/0x5c
[   63.487030]  __kasan_mempool_unpoison_object+0xec/0x14c
[   63.492309]  remove_element+0x1d4/0x264
[   63.496154]  mempool_alloc_preallocated+0x60/0x9c
[   63.500915]  mempool_oob_right_helper+0x94/0x334
[   63.505554]  mempool_slab_oob_right+0xb8/0x100
[   63.510040]  kunit_try_run_case+0x22c/0x5a8
[   63.514251]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.519805]  kthread+0x464/0x810
[   63.523040]  ret_from_fork+0x14/0x20
[   63.526672] 
[   63.528167] The buggy address belongs to the object at cc238240
[   63.528167]  which belongs to the cache test_cache of size 123
[   63.539978] The buggy address is located 0 bytes to the right of
[   63.539978]  allocated 123-byte region [cc238240, cc2382bb)
[   63.551605] 
[   63.553100] The buggy address belongs to the physical page:
[   63.558715] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c238
[   63.566009] flags: 0x0(zone=0)
[   63.569061] page_type: f5(slab)
[   63.572235] raw: 00000000 cc22f700 00000122 00000000 00000000 80150015 f5000000 00000000
[   63.580383] raw: 00000000
[   63.583038] page dumped because: kasan: bad access detected
[   63.588623] 
[   63.590148] Memory state around the buggy address:
[   63.594970]  cc238180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.601531]  cc238200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   63.608093] >cc238280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   63.614685]                                 ^
[   63.619049]  cc238300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.625640]  cc238380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.632202] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   61.872985] ==================================================================
[   61.884216] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1e8/0x398
[   61.892059] Read of size 1 at addr cc22f400 by task kunit_try_catch/271
[   61.898742] 
[   61.900238] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   61.900299] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   61.900299] Hardware name: Generic DRA74X (Flattened Device Tree)
[   61.900329] Call trace: 
[   61.900329]  unwind_backtrace from show_stack+0x18/0x1c
[   61.900390]  show_stack from dump_stack_lvl+0x70/0x90
[   61.900421]  dump_stack_lvl from print_report+0x158/0x528
[   61.900451]  print_report from kasan_report+0xdc/0x118
[   61.900482]  kasan_report from __kasan_check_byte+0x34/0x3c
[   61.900512]  __kasan_check_byte from kmem_cache_destroy+0x24/0x1ec
[   61.900543]  kmem_cache_destroy from kmem_cache_double_destroy+0x1e8/0x398
[   61.900604]  kmem_cache_double_destroy from kunit_try_run_case+0x22c/0x5a8
[   61.900634]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   61.900665]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   61.900726]  kthread from ret_from_fork+0x14/0x20
[   61.900756] Exception stack(0xf258bfb0 to 0xf258bff8)
[   61.900756] bfa0:                                     00000000 00000000 00000000 00000000
[   61.900787] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   61.900817] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   61.900848] 
[   62.019500] Allocated by task 271:
[   62.022918]  kasan_save_track+0x30/0x5c
[   62.026794]  __kasan_slab_alloc+0x60/0x68
[   62.030822]  kmem_cache_alloc_noprof+0x17c/0x36c
[   62.035491]  __kmem_cache_create_args+0x1c0/0x2c0
[   62.040222]  kmem_cache_double_destroy+0xc0/0x398
[   62.044982]  kunit_try_run_case+0x22c/0x5a8
[   62.049194]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   62.054718]  kthread+0x464/0x810
[   62.057983]  ret_from_fork+0x14/0x20
[   62.061584] 
[   62.063079] Freed by task 271:
[   62.066162]  kasan_save_track+0x30/0x5c
[   62.070037]  kasan_save_free_info+0x3c/0x48
[   62.074249]  __kasan_slab_free+0x40/0x50
[   62.078186]  kmem_cache_free+0x100/0x470
[   62.082153]  kobject_put+0x21c/0x678
[   62.085754]  kmem_cache_double_destroy+0x168/0x398
[   62.090576]  kunit_try_run_case+0x22c/0x5a8
[   62.094818]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   62.100341]  kthread+0x464/0x810
[   62.103607]  ret_from_fork+0x14/0x20
[   62.107208] 
[   62.108703] The buggy address belongs to the object at cc22f400
[   62.108703]  which belongs to the cache kmem_cache of size 132
[   62.120513] The buggy address is located 0 bytes inside of
[   62.120513]  freed 132-byte region [cc22f400, cc22f484)
[   62.131286] 
[   62.132781] The buggy address belongs to the physical page:
[   62.138397] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22f
[   62.145660] flags: 0x0(zone=0)
[   62.148742] page_type: f5(slab)
[   62.151916] raw: 00000000 c7001000 00000122 00000000 00000000 80100010 f5000000 00000000
[   62.160064] raw: 00000000
[   62.162689] page dumped because: kasan: bad access detected
[   62.168304] 
[   62.169799] Memory state around the buggy address:
[   62.174621]  cc22f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.181213]  cc22f380: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.187774] >cc22f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.194335]            ^
[   62.196899]  cc22f480: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.203460]  cc22f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.210052] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   61.430297] ==================================================================
[   61.441955] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x430/0x550
[   61.449188] Read of size 1 at addr cc235000 by task kunit_try_catch/269
[   61.455841] 
[   61.457366] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   61.457397] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   61.457427] Hardware name: Generic DRA74X (Flattened Device Tree)
[   61.457427] Call trace: 
[   61.457458]  unwind_backtrace from show_stack+0x18/0x1c
[   61.457489]  show_stack from dump_stack_lvl+0x70/0x90
[   61.457519]  dump_stack_lvl from print_report+0x158/0x528
[   61.457580]  print_report from kasan_report+0xdc/0x118
[   61.457611]  kasan_report from kmem_cache_rcu_uaf+0x430/0x550
[   61.457641]  kmem_cache_rcu_uaf from kunit_try_run_case+0x22c/0x5a8
[   61.457672]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   61.457733]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   61.457763]  kthread from ret_from_fork+0x14/0x20
[   61.457794] Exception stack(0xf257bfb0 to 0xf257bff8)
[   61.457824] bfa0:                                     00000000 00000000 00000000 00000000
[   61.457824] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   61.457855] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   61.457885] 
[   61.562988] Allocated by task 269:
[   61.566406]  kasan_save_track+0x30/0x5c
[   61.570312]  __kasan_slab_alloc+0x60/0x68
[   61.574340]  kmem_cache_alloc_noprof+0x17c/0x36c
[   61.579040]  kmem_cache_rcu_uaf+0x174/0x550
[   61.583251]  kunit_try_run_case+0x22c/0x5a8
[   61.587493]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   61.593017]  kthread+0x464/0x810
[   61.596282]  ret_from_fork+0x14/0x20
[   61.599914] 
[   61.601409] Freed by task 22:
[   61.604431]  kasan_save_track+0x30/0x5c
[   61.608306]  kasan_save_free_info+0x3c/0x48
[   61.612518]  __kasan_slab_free+0x40/0x50
[   61.616485]  slab_free_after_rcu_debug+0xb0/0x290
[   61.621246]  rcu_core+0x84c/0x1aa4
[   61.624694]  handle_softirqs+0x3d8/0xc7c
[   61.628662]  run_ksoftirqd+0x7c/0x9c
[   61.632263]  smpboot_thread_fn+0x46c/0xa68
[   61.636413]  kthread+0x464/0x810
[   61.639678]  ret_from_fork+0x14/0x20
[   61.643310] 
[   61.644805] Last potentially related work creation:
[   61.649719]  kasan_save_stack+0x30/0x4c
[   61.653625]  kasan_record_aux_stack+0x80/0x88
[   61.658020]  kmem_cache_free+0x1f0/0x470
[   61.661987]  kmem_cache_rcu_uaf+0x1b8/0x550
[   61.666198]  kunit_try_run_case+0x22c/0x5a8
[   61.670440]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   61.675994]  kthread+0x464/0x810
[   61.679260]  ret_from_fork+0x14/0x20
[   61.682861] 
[   61.684387] The buggy address belongs to the object at cc235000
[   61.684387]  which belongs to the cache test_cache of size 200
[   61.696197] The buggy address is located 0 bytes inside of
[   61.696197]  freed 200-byte region [cc235000, cc2350c8)
[   61.706970] 
[   61.708496] The buggy address belongs to the physical page:
[   61.714111] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c235
[   61.721405] flags: 0x0(zone=0)
[   61.724487] page_type: f5(slab)
[   61.727661] raw: 00000000 cc22f300 00000122 00000000 00000000 800f000f f5000000 00000000
[   61.735809] raw: 00000000
[   61.738464] page dumped because: kasan: bad access detected
[   61.744079] 
[   61.745605] Memory state around the buggy address:
[   61.750427]  cc234f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.757019]  cc234f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.763610] >cc235000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.770172]            ^
[   61.772735]  cc235080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   61.779327]  cc235100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.785919] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   60.927276] ==================================================================
[   60.938873] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x200/0x4c0
[   60.945892] Free of addr cc234001 by task kunit_try_catch/267
[   60.951660] 
[   60.953186] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   60.953216] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   60.953216] Hardware name: Generic DRA74X (Flattened Device Tree)
[   60.953216] Call trace: 
[   60.953247]  unwind_backtrace from show_stack+0x18/0x1c
[   60.953277]  show_stack from dump_stack_lvl+0x70/0x90
[   60.953308]  dump_stack_lvl from print_report+0x158/0x528
[   60.953308]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   60.953338]  kasan_report_invalid_free from check_slab_allocation+0xd0/0xd8
[   60.953369]  check_slab_allocation from kmem_cache_free+0x1c0/0x470
[   60.953399]  kmem_cache_free from kmem_cache_invalid_free+0x200/0x4c0
[   60.953430]  kmem_cache_invalid_free from kunit_try_run_case+0x22c/0x5a8
[   60.953460]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.953491]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   60.953491]  kthread from ret_from_fork+0x14/0x20
[   60.953521] Exception stack(0xf256bfb0 to 0xf256bff8)
[   60.953552] bfa0:                                     00000000 00000000 00000000 00000000
[   60.953552] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   60.953582] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   60.953582] 
[   61.074096] Allocated by task 267:
[   61.077545]  kasan_save_track+0x30/0x5c
[   61.081390]  __kasan_slab_alloc+0x60/0x68
[   61.085449]  kmem_cache_alloc_noprof+0x17c/0x36c
[   61.090087]  kmem_cache_invalid_free+0x16c/0x4c0
[   61.094757]  kunit_try_run_case+0x22c/0x5a8
[   61.098968]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   61.104492]  kthread+0x464/0x810
[   61.107757]  ret_from_fork+0x14/0x20
[   61.111358] 
[   61.112854] The buggy address belongs to the object at cc234000
[   61.112854]  which belongs to the cache test_cache of size 200
[   61.124694] The buggy address is located 1 bytes inside of
[   61.124694]  200-byte region [cc234000, cc2340c8)
[   61.134918] 
[   61.136413] The buggy address belongs to the physical page:
[   61.142028] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c234
[   61.149291] flags: 0x0(zone=0)
[   61.152374] page_type: f5(slab)
[   61.155548] raw: 00000000 cc22f200 00000122 00000000 00000000 800f000f f5000000 00000000
[   61.163696] raw: 00000000
[   61.166351] page dumped because: kasan: bad access detected
[   61.171936] 
[   61.173461] Memory state around the buggy address:
[   61.178283]  cc233f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.184844]  cc233f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.191406] >cc234000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.197998]            ^
[   61.200531]  cc234080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   61.207122]  cc234100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.213684] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   60.587066] ==================================================================
[   60.597961] BUG: KASAN: double-free in kmem_cache_double_free+0x208/0x4bc
[   60.604827] Free of addr cc232000 by task kunit_try_catch/265
[   60.610626] 
[   60.612152] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   60.612182] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   60.612213] Hardware name: Generic DRA74X (Flattened Device Tree)
[   60.612213] Call trace: 
[   60.612213]  unwind_backtrace from show_stack+0x18/0x1c
[   60.612274]  show_stack from dump_stack_lvl+0x70/0x90
[   60.612304]  dump_stack_lvl from print_report+0x158/0x528
[   60.612335]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   60.612396]  kasan_report_invalid_free from check_slab_allocation+0xb8/0xd8
[   60.612426]  check_slab_allocation from kmem_cache_free+0xe0/0x470
[   60.612457]  kmem_cache_free from kmem_cache_double_free+0x208/0x4bc
[   60.612487]  kmem_cache_double_free from kunit_try_run_case+0x22c/0x5a8
[   60.612548]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.612579]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   60.612609]  kthread from ret_from_fork+0x14/0x20
[   60.612640] Exception stack(0xf255bfb0 to 0xf255bff8)
[   60.612670] bfa0:                                     00000000 00000000 00000000 00000000
[   60.612701] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   60.612731] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   60.612731] 
[   60.733032] Allocated by task 265:
[   60.736450]  kasan_save_track+0x30/0x5c
[   60.740325]  __kasan_slab_alloc+0x60/0x68
[   60.744354]  kmem_cache_alloc_noprof+0x17c/0x36c
[   60.749023]  kmem_cache_double_free+0x16c/0x4bc
[   60.753601]  kunit_try_run_case+0x22c/0x5a8
[   60.757812]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.763336]  kthread+0x464/0x810
[   60.766601]  ret_from_fork+0x14/0x20
[   60.770202] 
[   60.771697] Freed by task 265:
[   60.774780]  kasan_save_track+0x30/0x5c
[   60.778656]  kasan_save_free_info+0x3c/0x48
[   60.782867]  __kasan_slab_free+0x40/0x50
[   60.786834]  kmem_cache_free+0x100/0x470
[   60.790771]  kmem_cache_double_free+0x184/0x4bc
[   60.795349]  kunit_try_run_case+0x22c/0x5a8
[   60.799560]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.805084]  kthread+0x464/0x810
[   60.808349]  ret_from_fork+0x14/0x20
[   60.811950] 
[   60.813446] The buggy address belongs to the object at cc232000
[   60.813446]  which belongs to the cache test_cache of size 200
[   60.825256] The buggy address is located 0 bytes inside of
[   60.825256]  200-byte region [cc232000, cc2320c8)
[   60.835510] 
[   60.837005] The buggy address belongs to the physical page:
[   60.842620] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c232
[   60.849884] flags: 0x0(zone=0)
[   60.852966] page_type: f5(slab)
[   60.856140] raw: 00000000 cc22f100 00000122 00000000 00000000 800f000f f5000000 00000000
[   60.864288] raw: 00000000
[   60.866943] page dumped because: kasan: bad access detected
[   60.872528] 
[   60.874053] Memory state around the buggy address:
[   60.878875]  cc231f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.885437]  cc231f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.891998] >cc232000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.898590]            ^
[   60.901123]  cc232080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   60.907714]  cc232100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.914276] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   60.273284] ==================================================================
[   60.284179] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x3e0/0x524
[   60.290924] Read of size 1 at addr cc2310c8 by task kunit_try_catch/263
[   60.297576] 
[   60.299102] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   60.299133] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   60.299133] Hardware name: Generic DRA74X (Flattened Device Tree)
[   60.299133] Call trace: 
[   60.299163]  unwind_backtrace from show_stack+0x18/0x1c
[   60.299163]  show_stack from dump_stack_lvl+0x70/0x90
[   60.299194]  dump_stack_lvl from print_report+0x158/0x528
[   60.299224]  print_report from kasan_report+0xdc/0x118
[   60.299255]  kasan_report from kmem_cache_oob+0x3e0/0x524
[   60.299285]  kmem_cache_oob from kunit_try_run_case+0x22c/0x5a8
[   60.299285]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.299316]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   60.299346]  kthread from ret_from_fork+0x14/0x20
[   60.299377] Exception stack(0xf254bfb0 to 0xf254bff8)
[   60.299377] bfa0:                                     00000000 00000000 00000000 00000000
[   60.299407] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   60.299407] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   60.299438] 
[   60.403778] Allocated by task 263:
[   60.407226]  kasan_save_track+0x30/0x5c
[   60.411071]  __kasan_slab_alloc+0x60/0x68
[   60.415130]  kmem_cache_alloc_noprof+0x17c/0x36c
[   60.419769]  kmem_cache_oob+0x170/0x524
[   60.423645]  kunit_try_run_case+0x22c/0x5a8
[   60.427856]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.433410]  kthread+0x464/0x810
[   60.436645]  ret_from_fork+0x14/0x20
[   60.440246] 
[   60.441772] The buggy address belongs to the object at cc231000
[   60.441772]  which belongs to the cache test_cache of size 200
[   60.453582] The buggy address is located 0 bytes to the right of
[   60.453582]  allocated 200-byte region [cc231000, cc2310c8)
[   60.465209] 
[   60.466735] The buggy address belongs to the physical page:
[   60.472320] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c231
[   60.479614] flags: 0x0(zone=0)
[   60.482666] page_type: f5(slab)
[   60.485839] raw: 00000000 cc22f000 00000122 00000000 00000000 800f000f f5000000 00000000
[   60.493988] raw: 00000000
[   60.496643] page dumped because: kasan: bad access detected
[   60.502258] 
[   60.503753] Memory state around the buggy address:
[   60.508575]  cc230f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.515136]  cc231000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   60.521697] >cc231080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   60.528289]                                       ^
[   60.533203]  cc231100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.539764]  cc231180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.546325] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   59.915161] ==================================================================
[   59.925415] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x580/0x5b8
[   59.932159] Read of size 4 at addr cc22cc00 by task kunit_try_catch/256
[   59.938842] 
[   59.940338] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   59.940368] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   59.940368] Hardware name: Generic DRA74X (Flattened Device Tree)
[   59.940399] Call trace: 
[   59.940399]  unwind_backtrace from show_stack+0x18/0x1c
[   59.940429]  show_stack from dump_stack_lvl+0x70/0x90
[   59.940460]  dump_stack_lvl from print_report+0x158/0x528
[   59.940460]  print_report from kasan_report+0xdc/0x118
[   59.940490]  kasan_report from workqueue_uaf+0x580/0x5b8
[   59.940521]  workqueue_uaf from kunit_try_run_case+0x22c/0x5a8
[   59.940551]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.940582]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   59.940582]  kthread from ret_from_fork+0x14/0x20
[   59.940612] Exception stack(0xf2513fb0 to 0xf2513ff8)
[   59.940643] 3fa0:                                     00000000 00000000 00000000 00000000
[   59.940643] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   59.940673] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   59.940673] 
[   60.044860] Allocated by task 256:
[   60.048278]  kasan_save_track+0x30/0x5c
[   60.052154]  __kasan_kmalloc+0x8c/0x94
[   60.055938]  workqueue_uaf+0x184/0x5b8
[   60.059722]  kunit_try_run_case+0x22c/0x5a8
[   60.063934]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.069458]  kthread+0x464/0x810
[   60.072723]  ret_from_fork+0x14/0x20
[   60.076324] 
[   60.077819] Freed by task 80:
[   60.080810]  kasan_save_track+0x30/0x5c
[   60.084686]  kasan_save_free_info+0x3c/0x48
[   60.088897]  __kasan_slab_free+0x40/0x50
[   60.092864]  kfree+0xe8/0x384
[   60.095855]  process_one_work+0x7dc/0x1304
[   60.099975]  worker_thread+0xb98/0x1658
[   60.103851]  kthread+0x464/0x810
[   60.107116]  ret_from_fork+0x14/0x20
[   60.110717] 
[   60.112213] Last potentially related work creation:
[   60.117126]  kasan_save_stack+0x30/0x4c
[   60.121002]  kasan_record_aux_stack+0x80/0x88
[   60.125396]  __queue_work+0x878/0x1780
[   60.129150]  queue_work_on+0xbc/0xc0
[   60.132781]  workqueue_uaf+0x2e4/0x5b8
[   60.136535]  kunit_try_run_case+0x22c/0x5a8
[   60.140777]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.146301]  kthread+0x464/0x810
[   60.149536]  ret_from_fork+0x14/0x20
[   60.153167] 
[   60.154663] The buggy address belongs to the object at cc22cc00
[   60.154663]  which belongs to the cache kmalloc-64 of size 64
[   60.166381] The buggy address is located 0 bytes inside of
[   60.166381]  freed 64-byte region [cc22cc00, cc22cc40)
[   60.177062] 
[   60.178558] The buggy address belongs to the physical page:
[   60.184173] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22c
[   60.191436] flags: 0x0(zone=0)
[   60.194519] page_type: f5(slab)
[   60.197692] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   60.205841] raw: 00000000
[   60.208496] page dumped because: kasan: bad access detected
[   60.214080] 
[   60.215576] Memory state around the buggy address:
[   60.220428]  cc22cb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.226989]  cc22cb80: 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc
[   60.233551] >cc22cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.240142]            ^
[   60.242675]  cc22cc80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.249267]  cc22cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.255828] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   59.540405] ==================================================================
[   59.550842] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x5c/0x60
[   59.557617] Read of size 4 at addr cc22c700 by task ksoftirqd/1/22
[   59.563842] 
[   59.565368] CPU: 1 UID: 0 PID: 22 Comm: ksoftirqd/1 Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   59.565399] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   59.565429] Hardware name: Generic DRA74X (Flattened Device Tree)
[   59.565429] Call trace: 
[   59.565460]  unwind_backtrace from show_stack+0x18/0x1c
[   59.565490]  show_stack from dump_stack_lvl+0x70/0x90
[   59.565521]  dump_stack_lvl from print_report+0x158/0x528
[   59.565551]  print_report from kasan_report+0xdc/0x118
[   59.565582]  kasan_report from rcu_uaf_reclaim+0x5c/0x60
[   59.565612]  rcu_uaf_reclaim from rcu_core+0x84c/0x1aa4
[   59.565673]  rcu_core from handle_softirqs+0x3d8/0xc7c
[   59.565704]  handle_softirqs from run_ksoftirqd+0x7c/0x9c
[   59.565734]  run_ksoftirqd from smpboot_thread_fn+0x46c/0xa68
[   59.565765]  smpboot_thread_fn from kthread+0x464/0x810
[   59.565795]  kthread from ret_from_fork+0x14/0x20
[   59.565826] Exception stack(0xf00c3fb0 to 0xf00c3ff8)
[   59.565856] 3fa0:                                     00000000 00000000 00000000 00000000
[   59.565887] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   59.565917] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   59.565917] 
[   59.676361] Allocated by task 254:
[   59.679809]  kasan_save_track+0x30/0x5c
[   59.683685]  __kasan_kmalloc+0x8c/0x94
[   59.687469]  rcu_uaf+0xd0/0x354
[   59.690673]  kunit_try_run_case+0x22c/0x5a8
[   59.694885]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.700439]  kthread+0x464/0x810
[   59.703704]  ret_from_fork+0x14/0x20
[   59.707305] 
[   59.708831] Freed by task 22:
[   59.711822]  kasan_save_track+0x30/0x5c
[   59.715698]  kasan_save_free_info+0x3c/0x48
[   59.719940]  __kasan_slab_free+0x40/0x50
[   59.723876]  kfree+0xe8/0x384
[   59.726898]  rcu_uaf_reclaim+0x1c/0x60
[   59.730682]  rcu_core+0x84c/0x1aa4
[   59.734130]  handle_softirqs+0x3d8/0xc7c
[   59.738098]  run_ksoftirqd+0x7c/0x9c
[   59.741729]  smpboot_thread_fn+0x46c/0xa68
[   59.745849]  kthread+0x464/0x810
[   59.749114]  ret_from_fork+0x14/0x20
[   59.752746] 
[   59.754241] Last potentially related work creation:
[   59.759155]  kasan_save_stack+0x30/0x4c
[   59.763061]  kasan_record_aux_stack+0x80/0x88
[   59.767456]  __call_rcu_common.constprop.0+0x98/0xb80
[   59.772552]  rcu_uaf+0x1a4/0x354
[   59.775817]  kunit_try_run_case+0x22c/0x5a8
[   59.780059]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.785614]  kthread+0x464/0x810
[   59.788879]  ret_from_fork+0x14/0x20
[   59.792480] 
[   59.793975] The buggy address belongs to the object at cc22c700
[   59.793975]  which belongs to the cache kmalloc-64 of size 64
[   59.805725] The buggy address is located 0 bytes inside of
[   59.805725]  freed 64-byte region [cc22c700, cc22c740)
[   59.816406] 
[   59.817932] The buggy address belongs to the physical page:
[   59.823547] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22c
[   59.830841] flags: 0x0(zone=0)
[   59.833923] page_type: f5(slab)
[   59.837097] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   59.845275] raw: 00000000
[   59.847900] page dumped because: kasan: bad access detected
[   59.853515] 
[   59.855041] Memory state around the buggy address:
[   59.859863]  cc22c600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.866455]  cc22c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.873046] >cc22c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.879608]            ^
[   59.882171]  cc22c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.888763]  cc22c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.895355] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   59.175659] ==================================================================
[   59.182922] BUG: KASAN: slab-use-after-free in ksize_uaf+0x68c/0x740
[   59.189331] Read of size 1 at addr cc228f78 by task kunit_try_catch/252
[   59.195983] 
[   59.197509] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   59.197540] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   59.197540] Hardware name: Generic DRA74X (Flattened Device Tree)
[   59.197540] Call trace: 
[   59.197570]  unwind_backtrace from show_stack+0x18/0x1c
[   59.197601]  show_stack from dump_stack_lvl+0x70/0x90
[   59.197601]  dump_stack_lvl from print_report+0x158/0x528
[   59.197631]  print_report from kasan_report+0xdc/0x118
[   59.197662]  kasan_report from ksize_uaf+0x68c/0x740
[   59.197692]  ksize_uaf from kunit_try_run_case+0x22c/0x5a8
[   59.197692]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.197723]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   59.197753]  kthread from ret_from_fork+0x14/0x20
[   59.197784] Exception stack(0xf24fbfb0 to 0xf24fbff8)
[   59.197784] bfa0:                                     00000000 00000000 00000000 00000000
[   59.197814] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   59.197814] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   59.197845] 
[   59.301300] Allocated by task 252:
[   59.304748]  kasan_save_track+0x30/0x5c
[   59.308593]  __kasan_kmalloc+0x8c/0x94
[   59.312377]  ksize_uaf+0xd0/0x740
[   59.315734]  kunit_try_run_case+0x22c/0x5a8
[   59.319946]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.325469]  kthread+0x464/0x810
[   59.328735]  ret_from_fork+0x14/0x20
[   59.332336] 
[   59.333831] Freed by task 252:
[   59.336914]  kasan_save_track+0x30/0x5c
[   59.340789]  kasan_save_free_info+0x3c/0x48
[   59.345001]  __kasan_slab_free+0x40/0x50
[   59.348937]  kfree+0xe8/0x384
[   59.351959]  ksize_uaf+0x174/0x740
[   59.355377]  kunit_try_run_case+0x22c/0x5a8
[   59.359588]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.365112]  kthread+0x464/0x810
[   59.368377]  ret_from_fork+0x14/0x20
[   59.371978] 
[   59.373474] The buggy address belongs to the object at cc228f00
[   59.373474]  which belongs to the cache kmalloc-128 of size 128
[   59.385375] The buggy address is located 120 bytes inside of
[   59.385375]  freed 128-byte region [cc228f00, cc228f80)
[   59.396331] 
[   59.397827] The buggy address belongs to the physical page:
[   59.403442] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   59.410705] flags: 0x0(zone=0)
[   59.413787] page_type: f5(slab)
[   59.416961] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   59.425079] raw: 00000000
[   59.427734] page dumped because: kasan: bad access detected
[   59.433349] 
[   59.434844] Memory state around the buggy address:
[   59.439666]  cc228e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.446228]  cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.452819] >cc228f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.459381]                                                         ^
[   59.465850]  cc228f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.472442]  cc229000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.479003] ==================================================================
[   58.547912] ==================================================================
[   58.559448] BUG: KASAN: slab-use-after-free in ksize_uaf+0x1f0/0x740
[   58.565856] Read of size 1 at addr cc228f00 by task kunit_try_catch/252
[   58.572509] 
[   58.574035] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   58.574066] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.574066] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.574066] Call trace: 
[   58.574066]  unwind_backtrace from show_stack+0x18/0x1c
[   58.574096]  show_stack from dump_stack_lvl+0x70/0x90
[   58.574127]  dump_stack_lvl from print_report+0x158/0x528
[   58.574157]  print_report from kasan_report+0xdc/0x118
[   58.574188]  kasan_report from __kasan_check_byte+0x34/0x3c
[   58.574188]  __kasan_check_byte from ksize+0x20/0x3c
[   58.574218]  ksize from ksize_uaf+0x1f0/0x740
[   58.574249]  ksize_uaf from kunit_try_run_case+0x22c/0x5a8
[   58.574249]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.574279]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.574310]  kthread from ret_from_fork+0x14/0x20
[   58.574340] Exception stack(0xf24fbfb0 to 0xf24fbff8)
[   58.574340] bfa0:                                     00000000 00000000 00000000 00000000
[   58.574371] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.574371] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.574401] 
[   58.687835] Allocated by task 252:
[   58.691253]  kasan_save_track+0x30/0x5c
[   58.695129]  __kasan_kmalloc+0x8c/0x94
[   58.698913]  ksize_uaf+0xd0/0x740
[   58.702270]  kunit_try_run_case+0x22c/0x5a8
[   58.706481]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.712005]  kthread+0x464/0x810
[   58.715270]  ret_from_fork+0x14/0x20
[   58.718872] 
[   58.720367] Freed by task 252:
[   58.723449]  kasan_save_track+0x30/0x5c
[   58.727294]  kasan_save_free_info+0x3c/0x48
[   58.731536]  __kasan_slab_free+0x40/0x50
[   58.735473]  kfree+0xe8/0x384
[   58.738464]  ksize_uaf+0x174/0x740
[   58.741912]  kunit_try_run_case+0x22c/0x5a8
[   58.746124]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.751647]  kthread+0x464/0x810
[   58.754913]  ret_from_fork+0x14/0x20
[   58.758514] 
[   58.760009] The buggy address belongs to the object at cc228f00
[   58.760009]  which belongs to the cache kmalloc-128 of size 128
[   58.771911] The buggy address is located 0 bytes inside of
[   58.771911]  freed 128-byte region [cc228f00, cc228f80)
[   58.782684] 
[   58.784179] The buggy address belongs to the physical page:
[   58.789794] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   58.797058] flags: 0x0(zone=0)
[   58.800140] page_type: f5(slab)
[   58.803314] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   58.811462] raw: 00000000
[   58.814086] page dumped because: kasan: bad access detected
[   58.819702] 
[   58.821197] Memory state around the buggy address:
[   58.826019]  cc228e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.832611]  cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.839172] >cc228f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.845733]            ^
[   58.848297]  cc228f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.854858]  cc229000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.861450] ==================================================================
[   58.869079] ==================================================================
[   58.876373] BUG: KASAN: slab-use-after-free in ksize_uaf+0x6c8/0x740
[   58.882751] Read of size 1 at addr cc228f00 by task kunit_try_catch/252
[   58.889434] 
[   58.890930] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   58.890960] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.890960] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.890991] Call trace: 
[   58.890991]  unwind_backtrace from show_stack+0x18/0x1c
[   58.891021]  show_stack from dump_stack_lvl+0x70/0x90
[   58.891021]  dump_stack_lvl from print_report+0x158/0x528
[   58.891052]  print_report from kasan_report+0xdc/0x118
[   58.891082]  kasan_report from ksize_uaf+0x6c8/0x740
[   58.891113]  ksize_uaf from kunit_try_run_case+0x22c/0x5a8
[   58.891113]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.891143]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.891174]  kthread from ret_from_fork+0x14/0x20
[   58.891204] Exception stack(0xf24fbfb0 to 0xf24fbff8)
[   58.891204] bfa0:                                     00000000 00000000 00000000 00000000
[   58.891235] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.891235] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.891265] 
[   58.994720] Allocated by task 252:
[   58.998168]  kasan_save_track+0x30/0x5c
[   59.002014]  __kasan_kmalloc+0x8c/0x94
[   59.005828]  ksize_uaf+0xd0/0x740
[   59.009155]  kunit_try_run_case+0x22c/0x5a8
[   59.013366]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.018890]  kthread+0x464/0x810
[   59.022155]  ret_from_fork+0x14/0x20
[   59.025756] 
[   59.027252] Freed by task 252:
[   59.030334]  kasan_save_track+0x30/0x5c
[   59.034210]  kasan_save_free_info+0x3c/0x48
[   59.038421]  __kasan_slab_free+0x40/0x50
[   59.042358]  kfree+0xe8/0x384
[   59.045379]  ksize_uaf+0x174/0x740
[   59.048797]  kunit_try_run_case+0x22c/0x5a8
[   59.053009]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.058532]  kthread+0x464/0x810
[   59.061798]  ret_from_fork+0x14/0x20
[   59.065399] 
[   59.066894] The buggy address belongs to the object at cc228f00
[   59.066894]  which belongs to the cache kmalloc-128 of size 128
[   59.078796] The buggy address is located 0 bytes inside of
[   59.078796]  freed 128-byte region [cc228f00, cc228f80)
[   59.089569] 
[   59.091064] The buggy address belongs to the physical page:
[   59.096679] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   59.103973] flags: 0x0(zone=0)
[   59.107025] page_type: f5(slab)
[   59.110198] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   59.118347] raw: 00000000
[   59.121002] page dumped because: kasan: bad access detected
[   59.126586] 
[   59.128112] Memory state around the buggy address:
[   59.132934]  cc228e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.139495]  cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.146057] >cc228f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.152648]            ^
[   59.155181]  cc228f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.161773]  cc229000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.168334] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   57.994628] ==================================================================
[   58.001892] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f0/0x908
[   58.009338] Read of size 1 at addr cc228e78 by task kunit_try_catch/250
[   58.016021] 
[   58.017517] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   58.017547] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.017547] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.017578] Call trace: 
[   58.017578]  unwind_backtrace from show_stack+0x18/0x1c
[   58.017608]  show_stack from dump_stack_lvl+0x70/0x90
[   58.017608]  dump_stack_lvl from print_report+0x158/0x528
[   58.017639]  print_report from kasan_report+0xdc/0x118
[   58.017669]  kasan_report from ksize_unpoisons_memory+0x7f0/0x908
[   58.017700]  ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8
[   58.017730]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.017730]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.017761]  kthread from ret_from_fork+0x14/0x20
[   58.017791] Exception stack(0xf24ebfb0 to 0xf24ebff8)
[   58.017791] bfa0:                                     00000000 00000000 00000000 00000000
[   58.017822] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.017852] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.017852] 
[   58.123596] Allocated by task 250:
[   58.127014]  kasan_save_track+0x30/0x5c
[   58.130889]  __kasan_kmalloc+0x8c/0x94
[   58.134674]  ksize_unpoisons_memory+0xe8/0x908
[   58.139160]  kunit_try_run_case+0x22c/0x5a8
[   58.143371]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.148895]  kthread+0x464/0x810
[   58.152160]  ret_from_fork+0x14/0x20
[   58.155761] 
[   58.157257] The buggy address belongs to the object at cc228e00
[   58.157257]  which belongs to the cache kmalloc-128 of size 128
[   58.169158] The buggy address is located 5 bytes to the right of
[   58.169158]  allocated 115-byte region [cc228e00, cc228e73)
[   58.180816] 
[   58.182312] The buggy address belongs to the physical page:
[   58.187927] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   58.195190] flags: 0x0(zone=0)
[   58.198272] page_type: f5(slab)
[   58.201446] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   58.209594] raw: 00000000
[   58.212219] page dumped because: kasan: bad access detected
[   58.217834] 
[   58.219329] Memory state around the buggy address:
[   58.224151]  cc228d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.230712]  cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.237304] >cc228e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   58.243865]                                                         ^
[   58.250366]  cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.256927]  cc228f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.263488] ==================================================================
[   57.713684] ==================================================================
[   57.725158] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f8/0x908
[   57.732604] Read of size 1 at addr cc228e73 by task kunit_try_catch/250
[   57.739288] 
[   57.740783] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   57.740814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   57.740814] Hardware name: Generic DRA74X (Flattened Device Tree)
[   57.740844] Call trace: 
[   57.740844]  unwind_backtrace from show_stack+0x18/0x1c
[   57.740875]  show_stack from dump_stack_lvl+0x70/0x90
[   57.740905]  dump_stack_lvl from print_report+0x158/0x528
[   57.740905]  print_report from kasan_report+0xdc/0x118
[   57.740936]  kasan_report from ksize_unpoisons_memory+0x7f8/0x908
[   57.740966]  ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8
[   57.740997]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.741027]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   57.741027]  kthread from ret_from_fork+0x14/0x20
[   57.741058] Exception stack(0xf24ebfb0 to 0xf24ebff8)
[   57.741088] bfa0:                                     00000000 00000000 00000000 00000000
[   57.741088] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   57.741119] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   57.741119] 
[   57.846862] Allocated by task 250:
[   57.850280]  kasan_save_track+0x30/0x5c
[   57.854156]  __kasan_kmalloc+0x8c/0x94
[   57.857940]  ksize_unpoisons_memory+0xe8/0x908
[   57.862426]  kunit_try_run_case+0x22c/0x5a8
[   57.866638]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.872161]  kthread+0x464/0x810
[   57.875427]  ret_from_fork+0x14/0x20
[   57.879028] 
[   57.880523] The buggy address belongs to the object at cc228e00
[   57.880523]  which belongs to the cache kmalloc-128 of size 128
[   57.892425] The buggy address is located 0 bytes to the right of
[   57.892425]  allocated 115-byte region [cc228e00, cc228e73)
[   57.904083] 
[   57.905578] The buggy address belongs to the physical page:
[   57.911193] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   57.918457] flags: 0x0(zone=0)
[   57.921539] page_type: f5(slab)
[   57.924713] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   57.932861] raw: 00000000
[   57.935485] page dumped because: kasan: bad access detected
[   57.941101] 
[   57.942596] Memory state around the buggy address:
[   57.947418]  cc228d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   57.953979]  cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.960571] >cc228e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   57.967132]                                                      ^
[   57.973358]  cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.979919]  cc228f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.986511] ==================================================================
[   58.270843] ==================================================================
[   58.278106] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x858/0x908
[   58.285552] Read of size 1 at addr cc228e7f by task kunit_try_catch/250
[   58.292205] 
[   58.293731] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   58.293762] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.293762] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.293762] Call trace: 
[   58.293792]  unwind_backtrace from show_stack+0x18/0x1c
[   58.293792]  show_stack from dump_stack_lvl+0x70/0x90
[   58.293823]  dump_stack_lvl from print_report+0x158/0x528
[   58.293853]  print_report from kasan_report+0xdc/0x118
[   58.293884]  kasan_report from ksize_unpoisons_memory+0x858/0x908
[   58.293884]  ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8
[   58.293914]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.293945]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.293975]  kthread from ret_from_fork+0x14/0x20
[   58.294006] Exception stack(0xf24ebfb0 to 0xf24ebff8)
[   58.294006] bfa0:                                     00000000 00000000 00000000 00000000
[   58.294036] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.294036] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.294067] 
[   58.399810] Allocated by task 250:
[   58.403228]  kasan_save_track+0x30/0x5c
[   58.407104]  __kasan_kmalloc+0x8c/0x94
[   58.410888]  ksize_unpoisons_memory+0xe8/0x908
[   58.415374]  kunit_try_run_case+0x22c/0x5a8
[   58.419586]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.425109]  kthread+0x464/0x810
[   58.428375]  ret_from_fork+0x14/0x20
[   58.431976] 
[   58.433471] The buggy address belongs to the object at cc228e00
[   58.433471]  which belongs to the cache kmalloc-128 of size 128
[   58.445373] The buggy address is located 12 bytes to the right of
[   58.445373]  allocated 115-byte region [cc228e00, cc228e73)
[   58.457092] 
[   58.458587] The buggy address belongs to the physical page:
[   58.464202] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   58.471466] flags: 0x0(zone=0)
[   58.474548] page_type: f5(slab)
[   58.477722] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   58.485870] raw: 00000000
[   58.488494] page dumped because: kasan: bad access detected
[   58.494110] 
[   58.495605] Memory state around the buggy address:
[   58.500427]  cc228d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.507019]  cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.513580] >cc228e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   58.520141]                                                         ^
[   58.526641]  cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.533203]  cc228f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.539764] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-double-free-in-kmalloc_double_kzfree
[   57.390624] ==================================================================
[   57.397918] BUG: KASAN: double-free in kmalloc_double_kzfree+0x1f4/0x3a8
[   57.404663] Free of addr cc22c380 by task kunit_try_catch/248
[   57.410461] 
[   57.411956] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   57.411987] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   57.411987] Hardware name: Generic DRA74X (Flattened Device Tree)
[   57.411987] Call trace: 
[   57.412017]  unwind_backtrace from show_stack+0x18/0x1c
[   57.412048]  show_stack from dump_stack_lvl+0x70/0x90
[   57.412048]  dump_stack_lvl from print_report+0x158/0x528
[   57.412078]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   57.412109]  kasan_report_invalid_free from check_slab_allocation+0xb8/0xd8
[   57.412139]  check_slab_allocation from kfree+0xc8/0x384
[   57.412170]  kfree from kmalloc_double_kzfree+0x1f4/0x3a8
[   57.412200]  kmalloc_double_kzfree from kunit_try_run_case+0x22c/0x5a8
[   57.412200]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.412231]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   57.412261]  kthread from ret_from_fork+0x14/0x20
[   57.412292] Exception stack(0xf24dbfb0 to 0xf24dbff8)
[   57.412292] bfa0:                                     00000000 00000000 00000000 00000000
[   57.412322] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   57.412322] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   57.412353] 
[   57.530670] Allocated by task 248:
[   57.534088]  kasan_save_track+0x30/0x5c
[   57.537963]  __kasan_kmalloc+0x8c/0x94
[   57.541748]  kmalloc_double_kzfree+0xcc/0x3a8
[   57.546142]  kunit_try_run_case+0x22c/0x5a8
[   57.550354]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.555877]  kthread+0x464/0x810
[   57.559143]  ret_from_fork+0x14/0x20
[   57.562744] 
[   57.564239] Freed by task 248:
[   57.567321]  kasan_save_track+0x30/0x5c
[   57.571197]  kasan_save_free_info+0x3c/0x48
[   57.575408]  __kasan_slab_free+0x40/0x50
[   57.579345]  kfree+0xe8/0x384
[   57.582366]  kmalloc_double_kzfree+0x174/0x3a8
[   57.586822]  kunit_try_run_case+0x22c/0x5a8
[   57.591033]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.596588]  kthread+0x464/0x810
[   57.599822]  ret_from_fork+0x14/0x20
[   57.603424] 
[   57.604949] The buggy address belongs to the object at cc22c380
[   57.604949]  which belongs to the cache kmalloc-64 of size 64
[   57.616668] The buggy address is located 0 bytes inside of
[   57.616668]  64-byte region [cc22c380, cc22c3c0)
[   57.626831] 
[   57.628326] The buggy address belongs to the physical page:
[   57.633941] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22c
[   57.641204] flags: 0x0(zone=0)
[   57.644287] page_type: f5(slab)
[   57.647430] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   57.655578] raw: 00000000
[   57.658233] page dumped because: kasan: bad access detected
[   57.663818] 
[   57.665344] Memory state around the buggy address:
[   57.670166]  cc22c280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.676727]  cc22c300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.683288] >cc22c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.689880]            ^
[   57.692413]  cc22c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.699005]  cc22c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.705566] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   57.059814] ==================================================================
[   57.074340] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x1f4/0x3a8
[   57.081787] Read of size 1 at addr cc22c380 by task kunit_try_catch/248
[   57.088439] 
[   57.089935] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   57.089965] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   57.089996] Hardware name: Generic DRA74X (Flattened Device Tree)
[   57.089996] Call trace: 
[   57.089996]  unwind_backtrace from show_stack+0x18/0x1c
[   57.090026]  show_stack from dump_stack_lvl+0x70/0x90
[   57.090057]  dump_stack_lvl from print_report+0x158/0x528
[   57.090087]  print_report from kasan_report+0xdc/0x118
[   57.090087]  kasan_report from __kasan_check_byte+0x34/0x3c
[   57.090118]  __kasan_check_byte from kfree_sensitive+0x20/0x6c
[   57.090148]  kfree_sensitive from kmalloc_double_kzfree+0x1f4/0x3a8
[   57.090179]  kmalloc_double_kzfree from kunit_try_run_case+0x22c/0x5a8
[   57.090209]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.090209]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   57.090240]  kthread from ret_from_fork+0x14/0x20
[   57.090270] Exception stack(0xf24dbfb0 to 0xf24dbff8)
[   57.090270] bfa0:                                     00000000 00000000 00000000 00000000
[   57.090301] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   57.090332] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   57.090332] 
[   57.207611] Allocated by task 248:
[   57.211029]  kasan_save_track+0x30/0x5c
[   57.214904]  __kasan_kmalloc+0x8c/0x94
[   57.218688]  kmalloc_double_kzfree+0xcc/0x3a8
[   57.223083]  kunit_try_run_case+0x22c/0x5a8
[   57.227294]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.232818]  kthread+0x464/0x810
[   57.236083]  ret_from_fork+0x14/0x20
[   57.239685] 
[   57.241180] Freed by task 248:
[   57.244262]  kasan_save_track+0x30/0x5c
[   57.248138]  kasan_save_free_info+0x3c/0x48
[   57.252349]  __kasan_slab_free+0x40/0x50
[   57.256317]  kfree+0xe8/0x384
[   57.259307]  kmalloc_double_kzfree+0x174/0x3a8
[   57.263793]  kunit_try_run_case+0x22c/0x5a8
[   57.268005]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.273529]  kthread+0x464/0x810
[   57.276794]  ret_from_fork+0x14/0x20
[   57.280395] 
[   57.281890] The buggy address belongs to the object at cc22c380
[   57.281890]  which belongs to the cache kmalloc-64 of size 64
[   57.293609] The buggy address is located 0 bytes inside of
[   57.293609]  freed 64-byte region [cc22c380, cc22c3c0)
[   57.304290] 
[   57.305786] The buggy address belongs to the physical page:
[   57.311401] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22c
[   57.318664] flags: 0x0(zone=0)
[   57.321746] page_type: f5(slab)
[   57.324920] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   57.333068] raw: 00000000
[   57.335693] page dumped because: kasan: bad access detected
[   57.341308] 
[   57.342803] Memory state around the buggy address:
[   57.347625]  cc22c280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.354217]  cc22c300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.360778] >cc22c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.367340]            ^
[   57.369903]  cc22c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.376464]  cc22c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.383056] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   56.741607] ==================================================================
[   56.752838] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4d0/0x550
[   56.759490] Read of size 1 at addr cc22c0a8 by task kunit_try_catch/244
[   56.766143] 
[   56.767669] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   56.767700] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   56.767700] Hardware name: Generic DRA74X (Flattened Device Tree)
[   56.767700] Call trace: 
[   56.767730]  unwind_backtrace from show_stack+0x18/0x1c
[   56.767761]  show_stack from dump_stack_lvl+0x70/0x90
[   56.767761]  dump_stack_lvl from print_report+0x158/0x528
[   56.767791]  print_report from kasan_report+0xdc/0x118
[   56.767822]  kasan_report from kmalloc_uaf2+0x4d0/0x550
[   56.767852]  kmalloc_uaf2 from kunit_try_run_case+0x22c/0x5a8
[   56.767852]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.767883]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   56.767913]  kthread from ret_from_fork+0x14/0x20
[   56.767944] Exception stack(0xf24bbfb0 to 0xf24bbff8)
[   56.767944] bfa0:                                     00000000 00000000 00000000 00000000
[   56.767974] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   56.767974] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   56.768005] 
[   56.872009] Allocated by task 244:
[   56.875427]  kasan_save_track+0x30/0x5c
[   56.879302]  __kasan_kmalloc+0x8c/0x94
[   56.883087]  kmalloc_uaf2+0xd8/0x550
[   56.886688]  kunit_try_run_case+0x22c/0x5a8
[   56.890899]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.896423]  kthread+0x464/0x810
[   56.899688]  ret_from_fork+0x14/0x20
[   56.903289] 
[   56.904785] Freed by task 244:
[   56.907867]  kasan_save_track+0x30/0x5c
[   56.911743]  kasan_save_free_info+0x3c/0x48
[   56.915954]  __kasan_slab_free+0x40/0x50
[   56.919891]  kfree+0xe8/0x384
[   56.922912]  kmalloc_uaf2+0x184/0x550
[   56.926605]  kunit_try_run_case+0x22c/0x5a8
[   56.930816]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.936340]  kthread+0x464/0x810
[   56.939605]  ret_from_fork+0x14/0x20
[   56.943206] 
[   56.944702] The buggy address belongs to the object at cc22c080
[   56.944702]  which belongs to the cache kmalloc-64 of size 64
[   56.956420] The buggy address is located 40 bytes inside of
[   56.956420]  freed 64-byte region [cc22c080, cc22c0c0)
[   56.967193] 
[   56.968688] The buggy address belongs to the physical page:
[   56.974304] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22c
[   56.981567] flags: 0x0(zone=0)
[   56.984649] page_type: f5(slab)
[   56.987823] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   56.995971] raw: 00000000
[   56.998596] page dumped because: kasan: bad access detected
[   57.004211] 
[   57.005706] Memory state around the buggy address:
[   57.010528]  cc22bf80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.017120]  cc22c000: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.023681] >cc22c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.030242]                           ^
[   57.034118]  cc22c100: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   57.040679]  cc22c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.047271] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   56.415374] ==================================================================
[   56.425994] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1fc/0x3b0
[   56.433166] Write of size 33 at addr cc22bf00 by task kunit_try_catch/242
[   56.440002] 
[   56.441528] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   56.441558] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   56.441558] Hardware name: Generic DRA74X (Flattened Device Tree)
[   56.441558] Call trace: 
[   56.441558]  unwind_backtrace from show_stack+0x18/0x1c
[   56.441589]  show_stack from dump_stack_lvl+0x70/0x90
[   56.441619]  dump_stack_lvl from print_report+0x158/0x528
[   56.441650]  print_report from kasan_report+0xdc/0x118
[   56.441680]  kasan_report from kasan_check_range+0x14c/0x198
[   56.441680]  kasan_check_range from __asan_memset+0x20/0x3c
[   56.441711]  __asan_memset from kmalloc_uaf_memset+0x1fc/0x3b0
[   56.441741]  kmalloc_uaf_memset from kunit_try_run_case+0x22c/0x5a8
[   56.441772]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.441772]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   56.441802]  kthread from ret_from_fork+0x14/0x20
[   56.441833] Exception stack(0xf24abfb0 to 0xf24abff8)
[   56.441833] bfa0:                                     00000000 00000000 00000000 00000000
[   56.441864] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   56.441894] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   56.441894] 
[   56.558319] Allocated by task 242:
[   56.561737]  kasan_save_track+0x30/0x5c
[   56.565612]  __kasan_kmalloc+0x8c/0x94
[   56.569396]  kmalloc_uaf_memset+0xcc/0x3b0
[   56.573516]  kunit_try_run_case+0x22c/0x5a8
[   56.577728]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.583251]  kthread+0x464/0x810
[   56.586517]  ret_from_fork+0x14/0x20
[   56.590118] 
[   56.591613] Freed by task 242:
[   56.594696]  kasan_save_track+0x30/0x5c
[   56.598571]  kasan_save_free_info+0x3c/0x48
[   56.602783]  __kasan_slab_free+0x40/0x50
[   56.606750]  kfree+0xe8/0x384
[   56.609741]  kmalloc_uaf_memset+0x174/0x3b0
[   56.613952]  kunit_try_run_case+0x22c/0x5a8
[   56.618164]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.623687]  kthread+0x464/0x810
[   56.626953]  ret_from_fork+0x14/0x20
[   56.630554] 
[   56.632049] The buggy address belongs to the object at cc22bf00
[   56.632049]  which belongs to the cache kmalloc-64 of size 64
[   56.643768] The buggy address is located 0 bytes inside of
[   56.643768]  freed 64-byte region [cc22bf00, cc22bf40)
[   56.654449] 
[   56.655975] The buggy address belongs to the physical page:
[   56.661560] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b
[   56.668853] flags: 0x0(zone=0)
[   56.671905] page_type: f5(slab)
[   56.675079] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   56.683227] raw: 00000000
[   56.685882] page dumped because: kasan: bad access detected
[   56.691467] 
[   56.692993] Memory state around the buggy address:
[   56.697814]  cc22be00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.704376]  cc22be80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.710937] >cc22bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.717529]            ^
[   56.720062]  cc22bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.726654]  cc22c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   56.733215] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   56.102111] ==================================================================
[   56.114196] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x398/0x3d8
[   56.120788] Read of size 1 at addr cc22bd88 by task kunit_try_catch/240
[   56.127441] 
[   56.128936] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   56.128967] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   56.128997] Hardware name: Generic DRA74X (Flattened Device Tree)
[   56.128997] Call trace: 
[   56.128997]  unwind_backtrace from show_stack+0x18/0x1c
[   56.129028]  show_stack from dump_stack_lvl+0x70/0x90
[   56.129058]  dump_stack_lvl from print_report+0x158/0x528
[   56.129089]  print_report from kasan_report+0xdc/0x118
[   56.129089]  kasan_report from kmalloc_uaf+0x398/0x3d8
[   56.129119]  kmalloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   56.129150]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.129180]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   56.129211]  kthread from ret_from_fork+0x14/0x20
[   56.129211] Exception stack(0xf249bfb0 to 0xf249bff8)
[   56.129241] bfa0:                                     00000000 00000000 00000000 00000000
[   56.129241] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   56.129272] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   56.129272] 
[   56.233093] Allocated by task 240:
[   56.236541]  kasan_save_track+0x30/0x5c
[   56.240386]  __kasan_kmalloc+0x8c/0x94
[   56.244171]  kmalloc_uaf+0xcc/0x3d8
[   56.247711]  kunit_try_run_case+0x22c/0x5a8
[   56.251922]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.257446]  kthread+0x464/0x810
[   56.260711]  ret_from_fork+0x14/0x20
[   56.264312] 
[   56.265808] Freed by task 240:
[   56.268890]  kasan_save_track+0x30/0x5c
[   56.272735]  kasan_save_free_info+0x3c/0x48
[   56.276977]  __kasan_slab_free+0x40/0x50
[   56.280914]  kfree+0xe8/0x384
[   56.283905]  kmalloc_uaf+0x174/0x3d8
[   56.287536]  kunit_try_run_case+0x22c/0x5a8
[   56.291748]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.297271]  kthread+0x464/0x810
[   56.300537]  ret_from_fork+0x14/0x20
[   56.304138] 
[   56.305633] The buggy address belongs to the object at cc22bd80
[   56.305633]  which belongs to the cache kmalloc-64 of size 64
[   56.317352] The buggy address is located 8 bytes inside of
[   56.317352]  freed 64-byte region [cc22bd80, cc22bdc0)
[   56.328033] 
[   56.329528] The buggy address belongs to the physical page:
[   56.335144] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b
[   56.342407] flags: 0x0(zone=0)
[   56.345489] page_type: f5(slab)
[   56.348663] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   56.356811] raw: 00000000
[   56.359436] page dumped because: kasan: bad access detected
[   56.365051] 
[   56.366546] Memory state around the buggy address:
[   56.371368]  cc22bc80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.377960]  cc22bd00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.384521] >cc22bd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.391082]               ^
[   56.393920]  cc22be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.400482]  cc22be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.407043] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   55.808807] ==================================================================
[   55.820983] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x1b4/0x360
[   55.828979] Read of size 64 at addr cc22bc04 by task kunit_try_catch/238
[   55.835723] 
[   55.837219] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   55.837249] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   55.837249] Hardware name: Generic DRA74X (Flattened Device Tree)
[   55.837280] Call trace: 
[   55.837280]  unwind_backtrace from show_stack+0x18/0x1c
[   55.837310]  show_stack from dump_stack_lvl+0x70/0x90
[   55.837341]  dump_stack_lvl from print_report+0x158/0x528
[   55.837371]  print_report from kasan_report+0xdc/0x118
[   55.837371]  kasan_report from kasan_check_range+0x14c/0x198
[   55.837402]  kasan_check_range from __asan_memmove+0x28/0x68
[   55.837432]  __asan_memmove from kmalloc_memmove_invalid_size+0x1b4/0x360
[   55.837463]  kmalloc_memmove_invalid_size from kunit_try_run_case+0x22c/0x5a8
[   55.837463]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.837493]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   55.837524]  kthread from ret_from_fork+0x14/0x20
[   55.837554] Exception stack(0xf248bfb0 to 0xf248bff8)
[   55.837554] bfa0:                                     00000000 00000000 00000000 00000000
[   55.837585] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   55.837585] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   55.837615] 
[   55.955932] Allocated by task 238:
[   55.959350]  kasan_save_track+0x30/0x5c
[   55.963226]  __kasan_kmalloc+0x8c/0x94
[   55.967010]  kmalloc_memmove_invalid_size+0xd0/0x360
[   55.972015]  kunit_try_run_case+0x22c/0x5a8
[   55.976226]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.981750]  kthread+0x464/0x810
[   55.985015]  ret_from_fork+0x14/0x20
[   55.988616] 
[   55.990142] The buggy address belongs to the object at cc22bc00
[   55.990142]  which belongs to the cache kmalloc-64 of size 64
[   56.001861] The buggy address is located 4 bytes inside of
[   56.001861]  allocated 64-byte region [cc22bc00, cc22bc40)
[   56.012878] 
[   56.014373] The buggy address belongs to the physical page:
[   56.019989] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b
[   56.027252] flags: 0x0(zone=0)
[   56.030334] page_type: f5(slab)
[   56.033508] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   56.041656] raw: 00000000
[   56.044281] page dumped because: kasan: bad access detected
[   56.049896] 
[   56.051391] Memory state around the buggy address:
[   56.056243]  cc22bb00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.062805]  cc22bb80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.069366] >cc22bc00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   56.075958]                                    ^
[   56.080596]  cc22bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.087158]  cc22bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.093749] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   55.518432] ==================================================================
[   55.529907] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x1b4/0x360
[   55.537536] Read of size 4294967294 at addr cc22ba84 by task kunit_try_catch/236
[   55.544982] 
[   55.546508] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   55.546508] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   55.546539] Hardware name: Generic DRA74X (Flattened Device Tree)
[   55.546539] Call trace: 
[   55.546539]  unwind_backtrace from show_stack+0x18/0x1c
[   55.546569]  show_stack from dump_stack_lvl+0x70/0x90
[   55.546600]  dump_stack_lvl from print_report+0x158/0x528
[   55.546630]  print_report from kasan_report+0xdc/0x118
[   55.546661]  kasan_report from kasan_check_range+0x14c/0x198
[   55.546661]  kasan_check_range from __asan_memmove+0x28/0x68
[   55.546691]  __asan_memmove from kmalloc_memmove_negative_size+0x1b4/0x360
[   55.546722]  kmalloc_memmove_negative_size from kunit_try_run_case+0x22c/0x5a8
[   55.546752]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.546783]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   55.546783]  kthread from ret_from_fork+0x14/0x20
[   55.546813] Exception stack(0xf247bfb0 to 0xf247bff8)
[   55.546844] bfa0:                                     00000000 00000000 00000000 00000000
[   55.546844] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   55.546874] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   55.546874] 
[   55.665374] Allocated by task 236:
[   55.668823]  kasan_save_track+0x30/0x5c
[   55.672668]  __kasan_kmalloc+0x8c/0x94
[   55.676452]  kmalloc_memmove_negative_size+0xd0/0x360
[   55.681549]  kunit_try_run_case+0x22c/0x5a8
[   55.685760]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.691314]  kthread+0x464/0x810
[   55.694549]  ret_from_fork+0x14/0x20
[   55.698150] 
[   55.699676] The buggy address belongs to the object at cc22ba80
[   55.699676]  which belongs to the cache kmalloc-64 of size 64
[   55.711395] The buggy address is located 4 bytes inside of
[   55.711395]  64-byte region [cc22ba80, cc22bac0)
[   55.721557] 
[   55.723052] The buggy address belongs to the physical page:
[   55.728637] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b
[   55.735931] flags: 0x0(zone=0)
[   55.739013] page_type: f5(slab)
[   55.742187] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   55.750305] raw: 00000000
[   55.752960] page dumped because: kasan: bad access detected
[   55.758575] 
[   55.760070] Memory state around the buggy address:
[   55.764892]  cc22b980: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.771453]  cc22ba00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.778045] >cc22ba80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   55.784606]            ^
[   55.787170]  cc22bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.793731]  cc22bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.800292] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   55.226196] ==================================================================
[   55.237579] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x1b0/0x35c
[   55.244964] Write of size 16 at addr cc228d69 by task kunit_try_catch/234
[   55.251800] 
[   55.253295] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   55.253326] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   55.253326] Hardware name: Generic DRA74X (Flattened Device Tree)
[   55.253356] Call trace: 
[   55.253356]  unwind_backtrace from show_stack+0x18/0x1c
[   55.253387]  show_stack from dump_stack_lvl+0x70/0x90
[   55.253417]  dump_stack_lvl from print_report+0x158/0x528
[   55.253417]  print_report from kasan_report+0xdc/0x118
[   55.253448]  kasan_report from kasan_check_range+0x14c/0x198
[   55.253479]  kasan_check_range from __asan_memset+0x20/0x3c
[   55.253479]  __asan_memset from kmalloc_oob_memset_16+0x1b0/0x35c
[   55.253509]  kmalloc_oob_memset_16 from kunit_try_run_case+0x22c/0x5a8
[   55.253540]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.253570]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   55.253601]  kthread from ret_from_fork+0x14/0x20
[   55.253601] Exception stack(0xf246bfb0 to 0xf246bff8)
[   55.253631] bfa0:                                     00000000 00000000 00000000 00000000
[   55.253631] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   55.253662] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   55.253662] 
[   55.370605] Allocated by task 234:
[   55.374023]  kasan_save_track+0x30/0x5c
[   55.377899]  __kasan_kmalloc+0x8c/0x94
[   55.381683]  kmalloc_oob_memset_16+0xcc/0x35c
[   55.386047]  kunit_try_run_case+0x22c/0x5a8
[   55.390289]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.395812]  kthread+0x464/0x810
[   55.399047]  ret_from_fork+0x14/0x20
[   55.402679] 
[   55.404174] The buggy address belongs to the object at cc228d00
[   55.404174]  which belongs to the cache kmalloc-128 of size 128
[   55.416076] The buggy address is located 105 bytes inside of
[   55.416076]  allocated 120-byte region [cc228d00, cc228d78)
[   55.427337] 
[   55.428863] The buggy address belongs to the physical page:
[   55.434448] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   55.441741] flags: 0x0(zone=0)
[   55.444824] page_type: f5(slab)
[   55.447998] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   55.456115] raw: 00000000
[   55.458770] page dumped because: kasan: bad access detected
[   55.464355] 
[   55.465881] Memory state around the buggy address:
[   55.470703]  cc228c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.477264]  cc228c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.483825] >cc228d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   55.490417]                                                         ^
[   55.496887]  cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.503479]  cc228e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.510040] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   54.934478] ==================================================================
[   54.945861] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x1b0/0x35c
[   54.953124] Write of size 8 at addr cc228c71 by task kunit_try_catch/232
[   54.959869] 
[   54.961395] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   54.961425] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   54.961425] Hardware name: Generic DRA74X (Flattened Device Tree)
[   54.961425] Call trace: 
[   54.961425]  unwind_backtrace from show_stack+0x18/0x1c
[   54.961456]  show_stack from dump_stack_lvl+0x70/0x90
[   54.961486]  dump_stack_lvl from print_report+0x158/0x528
[   54.961517]  print_report from kasan_report+0xdc/0x118
[   54.961547]  kasan_report from kasan_check_range+0x14c/0x198
[   54.961547]  kasan_check_range from __asan_memset+0x20/0x3c
[   54.961578]  __asan_memset from kmalloc_oob_memset_8+0x1b0/0x35c
[   54.961608]  kmalloc_oob_memset_8 from kunit_try_run_case+0x22c/0x5a8
[   54.961608]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.961639]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   54.961669]  kthread from ret_from_fork+0x14/0x20
[   54.961700] Exception stack(0xf245bfb0 to 0xf245bff8)
[   54.961700] bfa0:                                     00000000 00000000 00000000 00000000
[   54.961730] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   54.961730] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   54.961761] 
[   55.078491] Allocated by task 232:
[   55.081939]  kasan_save_track+0x30/0x5c
[   55.085784]  __kasan_kmalloc+0x8c/0x94
[   55.089569]  kmalloc_oob_memset_8+0xcc/0x35c
[   55.093872]  kunit_try_run_case+0x22c/0x5a8
[   55.098114]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.103637]  kthread+0x464/0x810
[   55.106872]  ret_from_fork+0x14/0x20
[   55.110473] 
[   55.111999] The buggy address belongs to the object at cc228c00
[   55.111999]  which belongs to the cache kmalloc-128 of size 128
[   55.123901] The buggy address is located 113 bytes inside of
[   55.123901]  allocated 120-byte region [cc228c00, cc228c78)
[   55.135162] 
[   55.136688] The buggy address belongs to the physical page:
[   55.142272] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   55.149566] flags: 0x0(zone=0)
[   55.152648] page_type: f5(slab)
[   55.155792] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   55.163940] raw: 00000000
[   55.166595] page dumped because: kasan: bad access detected
[   55.172180] 
[   55.173706] Memory state around the buggy address:
[   55.178527]  cc228b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.185089]  cc228b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.191650] >cc228c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   55.198242]                                                         ^
[   55.204711]  cc228c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.211273]  cc228d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.217864] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   54.642669] ==================================================================
[   54.654052] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x1b0/0x35c
[   54.661346] Write of size 4 at addr cc228b75 by task kunit_try_catch/230
[   54.668090] 
[   54.669586] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   54.669616] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   54.669616] Hardware name: Generic DRA74X (Flattened Device Tree)
[   54.669647] Call trace: 
[   54.669647]  unwind_backtrace from show_stack+0x18/0x1c
[   54.669677]  show_stack from dump_stack_lvl+0x70/0x90
[   54.669677]  dump_stack_lvl from print_report+0x158/0x528
[   54.669708]  print_report from kasan_report+0xdc/0x118
[   54.669738]  kasan_report from kasan_check_range+0x14c/0x198
[   54.669769]  kasan_check_range from __asan_memset+0x20/0x3c
[   54.669769]  __asan_memset from kmalloc_oob_memset_4+0x1b0/0x35c
[   54.669799]  kmalloc_oob_memset_4 from kunit_try_run_case+0x22c/0x5a8
[   54.669830]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.669860]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   54.669860]  kthread from ret_from_fork+0x14/0x20
[   54.669891] Exception stack(0xf244bfb0 to 0xf244bff8)
[   54.669921] bfa0:                                     00000000 00000000 00000000 00000000
[   54.669921] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   54.669952] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   54.669952] 
[   54.786712] Allocated by task 230:
[   54.790130]  kasan_save_track+0x30/0x5c
[   54.794006]  __kasan_kmalloc+0x8c/0x94
[   54.797790]  kmalloc_oob_memset_4+0xcc/0x35c
[   54.802093]  kunit_try_run_case+0x22c/0x5a8
[   54.806304]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.811828]  kthread+0x464/0x810
[   54.815093]  ret_from_fork+0x14/0x20
[   54.818695] 
[   54.820190] The buggy address belongs to the object at cc228b00
[   54.820190]  which belongs to the cache kmalloc-128 of size 128
[   54.832092] The buggy address is located 117 bytes inside of
[   54.832092]  allocated 120-byte region [cc228b00, cc228b78)
[   54.843383] 
[   54.844879] The buggy address belongs to the physical page:
[   54.850494] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   54.857757] flags: 0x0(zone=0)
[   54.860839] page_type: f5(slab)
[   54.864013] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   54.872161] raw: 00000000
[   54.874786] page dumped because: kasan: bad access detected
[   54.880401] 
[   54.881896] Memory state around the buggy address:
[   54.886718]  cc228a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.893310]  cc228a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.899871] >cc228b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.906433]                                                         ^
[   54.912902]  cc228b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.919494]  cc228c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.926055] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   54.350830] ==================================================================
[   54.362304] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x1b0/0x35c
[   54.369567] Write of size 2 at addr cc228a77 by task kunit_try_catch/228
[   54.376312] 
[   54.377838] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   54.377868] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   54.377868] Hardware name: Generic DRA74X (Flattened Device Tree)
[   54.377868] Call trace: 
[   54.377899]  unwind_backtrace from show_stack+0x18/0x1c
[   54.377899]  show_stack from dump_stack_lvl+0x70/0x90
[   54.377929]  dump_stack_lvl from print_report+0x158/0x528
[   54.377960]  print_report from kasan_report+0xdc/0x118
[   54.377990]  kasan_report from kasan_check_range+0x14c/0x198
[   54.377990]  kasan_check_range from __asan_memset+0x20/0x3c
[   54.378021]  __asan_memset from kmalloc_oob_memset_2+0x1b0/0x35c
[   54.378051]  kmalloc_oob_memset_2 from kunit_try_run_case+0x22c/0x5a8
[   54.378051]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.378082]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   54.378112]  kthread from ret_from_fork+0x14/0x20
[   54.378143] Exception stack(0xf243bfb0 to 0xf243bff8)
[   54.378143] bfa0:                                     00000000 00000000 00000000 00000000
[   54.378173] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   54.378173] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   54.378204] 
[   54.494934] Allocated by task 228:
[   54.498382]  kasan_save_track+0x30/0x5c
[   54.502227]  __kasan_kmalloc+0x8c/0x94
[   54.506011]  kmalloc_oob_memset_2+0xcc/0x35c
[   54.510314]  kunit_try_run_case+0x22c/0x5a8
[   54.514556]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.520080]  kthread+0x464/0x810
[   54.523315]  ret_from_fork+0x14/0x20
[   54.526947] 
[   54.528442] The buggy address belongs to the object at cc228a00
[   54.528442]  which belongs to the cache kmalloc-128 of size 128
[   54.540344] The buggy address is located 119 bytes inside of
[   54.540344]  allocated 120-byte region [cc228a00, cc228a78)
[   54.551635] 
[   54.553131] The buggy address belongs to the physical page:
[   54.558746] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   54.566009] flags: 0x0(zone=0)
[   54.569091] page_type: f5(slab)
[   54.572265] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   54.580383] raw: 00000000
[   54.583038] page dumped because: kasan: bad access detected
[   54.588653] 
[   54.590148] Memory state around the buggy address:
[   54.594970]  cc228900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.601531]  cc228980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.608093] >cc228a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.614685]                                                         ^
[   54.621154]  cc228a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.627716]  cc228b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.634307] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   54.059204] ==================================================================
[   54.070068] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x1a4/0x350
[   54.077423] Write of size 128 at addr cc228900 by task kunit_try_catch/226
[   54.084350] 
[   54.085845] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   54.085876] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   54.085906] Hardware name: Generic DRA74X (Flattened Device Tree)
[   54.085906] Call trace: 
[   54.085906]  unwind_backtrace from show_stack+0x18/0x1c
[   54.085937]  show_stack from dump_stack_lvl+0x70/0x90
[   54.085968]  dump_stack_lvl from print_report+0x158/0x528
[   54.085998]  print_report from kasan_report+0xdc/0x118
[   54.085998]  kasan_report from kasan_check_range+0x14c/0x198
[   54.086029]  kasan_check_range from __asan_memset+0x20/0x3c
[   54.086059]  __asan_memset from kmalloc_oob_in_memset+0x1a4/0x350
[   54.086059]  kmalloc_oob_in_memset from kunit_try_run_case+0x22c/0x5a8
[   54.086090]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.086120]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   54.086151]  kthread from ret_from_fork+0x14/0x20
[   54.086181] Exception stack(0xf242bfb0 to 0xf242bff8)
[   54.086181] bfa0:                                     00000000 00000000 00000000 00000000
[   54.086212] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   54.086212] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   54.086242] 
[   54.203155] Allocated by task 226:
[   54.206573]  kasan_save_track+0x30/0x5c
[   54.210449]  __kasan_kmalloc+0x8c/0x94
[   54.214233]  kmalloc_oob_in_memset+0xd0/0x350
[   54.218627]  kunit_try_run_case+0x22c/0x5a8
[   54.222839]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.228363]  kthread+0x464/0x810
[   54.231628]  ret_from_fork+0x14/0x20
[   54.235229] 
[   54.236724] The buggy address belongs to the object at cc228900
[   54.236724]  which belongs to the cache kmalloc-128 of size 128
[   54.248626] The buggy address is located 0 bytes inside of
[   54.248626]  allocated 120-byte region [cc228900, cc228978)
[   54.259735] 
[   54.261230] The buggy address belongs to the physical page:
[   54.266845] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   54.274108] flags: 0x0(zone=0)
[   54.277191] page_type: f5(slab)
[   54.280364] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   54.288513] raw: 00000000
[   54.291137] page dumped because: kasan: bad access detected
[   54.296752] 
[   54.298248] Memory state around the buggy address:
[   54.303070]  cc228800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.309661]  cc228880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.316223] >cc228900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.322784]                                                         ^
[   54.329284]  cc228980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.335845]  cc228a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.342407] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   53.746002] ==================================================================
[   53.756866] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x484/0x518
[   53.763702] Read of size 16 at addr cc22b400 by task kunit_try_catch/224
[   53.770446] 
[   53.771972] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   53.772003] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   53.772003] Hardware name: Generic DRA74X (Flattened Device Tree)
[   53.772003] Call trace: 
[   53.772003]  unwind_backtrace from show_stack+0x18/0x1c
[   53.772033]  show_stack from dump_stack_lvl+0x70/0x90
[   53.772064]  dump_stack_lvl from print_report+0x158/0x528
[   53.772094]  print_report from kasan_report+0xdc/0x118
[   53.772125]  kasan_report from kmalloc_uaf_16+0x484/0x518
[   53.772125]  kmalloc_uaf_16 from kunit_try_run_case+0x22c/0x5a8
[   53.772155]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.772186]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   53.772216]  kthread from ret_from_fork+0x14/0x20
[   53.772216] Exception stack(0xf241bfb0 to 0xf241bff8)
[   53.772247] bfa0:                                     00000000 00000000 00000000 00000000
[   53.772247] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   53.772277] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   53.772277] 
[   53.876617] Allocated by task 224:
[   53.880065]  kasan_save_track+0x30/0x5c
[   53.883911]  __kasan_kmalloc+0x8c/0x94
[   53.887695]  kmalloc_uaf_16+0x1b0/0x518
[   53.891571]  kunit_try_run_case+0x22c/0x5a8
[   53.895782]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.901306]  kthread+0x464/0x810
[   53.904571]  ret_from_fork+0x14/0x20
[   53.908172] 
[   53.909667] Freed by task 224:
[   53.912750]  kasan_save_track+0x30/0x5c
[   53.916625]  kasan_save_free_info+0x3c/0x48
[   53.920837]  __kasan_slab_free+0x40/0x50
[   53.924774]  kfree+0xe8/0x384
[   53.927795]  kmalloc_uaf_16+0x234/0x518
[   53.931640]  kunit_try_run_case+0x22c/0x5a8
[   53.935852]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.941406]  kthread+0x464/0x810
[   53.944641]  ret_from_fork+0x14/0x20
[   53.948242] 
[   53.949768] The buggy address belongs to the object at cc22b400
[   53.949768]  which belongs to the cache kmalloc-64 of size 64
[   53.961486] The buggy address is located 0 bytes inside of
[   53.961486]  freed 64-byte region [cc22b400, cc22b440)
[   53.972167] 
[   53.973663] The buggy address belongs to the physical page:
[   53.979248] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b
[   53.986541] flags: 0x0(zone=0)
[   53.989624] page_type: f5(slab)
[   53.992797] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   54.000915] raw: 00000000
[   54.003570] page dumped because: kasan: bad access detected
[   54.009185] 
[   54.010681] Memory state around the buggy address:
[   54.015502]  cc22b300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.022064]  cc22b380: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.028656] >cc22b400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.035217]            ^
[   54.037750]  cc22b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.044342]  cc22b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.050903] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   53.472595] ==================================================================
[   53.483306] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x4b0/0x520
[   53.490051] Write of size 16 at addr cc22b180 by task kunit_try_catch/222
[   53.496887] 
[   53.498382] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   53.498413] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   53.498413] Hardware name: Generic DRA74X (Flattened Device Tree)
[   53.498443] Call trace: 
[   53.498443]  unwind_backtrace from show_stack+0x18/0x1c
[   53.498474]  show_stack from dump_stack_lvl+0x70/0x90
[   53.498504]  dump_stack_lvl from print_report+0x158/0x528
[   53.498504]  print_report from kasan_report+0xdc/0x118
[   53.498535]  kasan_report from kmalloc_oob_16+0x4b0/0x520
[   53.498565]  kmalloc_oob_16 from kunit_try_run_case+0x22c/0x5a8
[   53.498596]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.498596]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   53.498626]  kthread from ret_from_fork+0x14/0x20
[   53.498657] Exception stack(0xf240bfb0 to 0xf240bff8)
[   53.498657] bfa0:                                     00000000 00000000 00000000 00000000
[   53.498687] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   53.498687] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   53.498718] 
[   53.603057] Allocated by task 222:
[   53.606475]  kasan_save_track+0x30/0x5c
[   53.610351]  __kasan_kmalloc+0x8c/0x94
[   53.614135]  kmalloc_oob_16+0xcc/0x520
[   53.617919]  kunit_try_run_case+0x22c/0x5a8
[   53.622131]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.627655]  kthread+0x464/0x810
[   53.630920]  ret_from_fork+0x14/0x20
[   53.634521] 
[   53.636016] The buggy address belongs to the object at cc22b180
[   53.636016]  which belongs to the cache kmalloc-64 of size 64
[   53.647735] The buggy address is located 0 bytes inside of
[   53.647735]  allocated 13-byte region [cc22b180, cc22b18d)
[   53.658782] 
[   53.660278] The buggy address belongs to the physical page:
[   53.665893] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b
[   53.673156] flags: 0x0(zone=0)
[   53.676239] page_type: f5(slab)
[   53.679412] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   53.687561] raw: 00000000
[   53.690185] page dumped because: kasan: bad access detected
[   53.695800] 
[   53.697296] Memory state around the buggy address:
[   53.702117]  cc22b080: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.708679]  cc22b100: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.715270] >cc22b180: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.721832]               ^
[   53.724639]  cc22b200: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.731231]  cc22b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.737792] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   52.783081] ==================================================================
[   52.794708] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x208/0x5d4
[   52.801391] Read of size 1 at addr cb2d1c00 by task kunit_try_catch/220
[   52.808044] 
[   52.809539] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   52.809570] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   52.809570] Hardware name: Generic DRA74X (Flattened Device Tree)
[   52.809600] Call trace: 
[   52.809600]  unwind_backtrace from show_stack+0x18/0x1c
[   52.809631]  show_stack from dump_stack_lvl+0x70/0x90
[   52.809661]  dump_stack_lvl from print_report+0x158/0x528
[   52.809661]  print_report from kasan_report+0xdc/0x118
[   52.809692]  kasan_report from __kasan_check_byte+0x34/0x3c
[   52.809722]  __kasan_check_byte from krealloc_noprof+0x30/0x2e4
[   52.809753]  krealloc_noprof from krealloc_uaf+0x208/0x5d4
[   52.809753]  krealloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   52.809783]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.809814]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   52.809844]  kthread from ret_from_fork+0x14/0x20
[   52.809844] Exception stack(0xf23fbfb0 to 0xf23fbff8)
[   52.809875] bfa0:                                     00000000 00000000 00000000 00000000
[   52.809875] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   52.809906] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   52.809906] 
[   52.925720] Allocated by task 220:
[   52.929138]  kasan_save_track+0x30/0x5c
[   52.933013]  __kasan_kmalloc+0x8c/0x94
[   52.936798]  krealloc_uaf+0xd8/0x5d4
[   52.940399]  kunit_try_run_case+0x22c/0x5a8
[   52.944610]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.950134]  kthread+0x464/0x810
[   52.953399]  ret_from_fork+0x14/0x20
[   52.957000] 
[   52.958496] Freed by task 220:
[   52.961578]  kasan_save_track+0x30/0x5c
[   52.965454]  kasan_save_free_info+0x3c/0x48
[   52.969665]  __kasan_slab_free+0x40/0x50
[   52.973632]  kfree+0xe8/0x384
[   52.976623]  krealloc_uaf+0x180/0x5d4
[   52.980316]  kunit_try_run_case+0x22c/0x5a8
[   52.984527]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.990051]  kthread+0x464/0x810
[   52.993316]  ret_from_fork+0x14/0x20
[   52.996917] 
[   52.998413] The buggy address belongs to the object at cb2d1c00
[   52.998413]  which belongs to the cache kmalloc-256 of size 256
[   53.010314] The buggy address is located 0 bytes inside of
[   53.010314]  freed 256-byte region [cb2d1c00, cb2d1d00)
[   53.021057] 
[   53.022583] The buggy address belongs to the physical page:
[   53.028167] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   53.035461] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   53.043151] flags: 0x40(head|zone=0)
[   53.046752] page_type: f5(slab)
[   53.049926] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   53.058074] raw: 00000000
[   53.060729] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   53.068969] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   53.077178] head: 00000000 00000002
[   53.080688] page dumped because: kasan: bad access detected
[   53.086303] 
[   53.087799] Memory state around the buggy address:
[   53.092620]  cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.099212]  cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.105773] >cb2d1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.112335]            ^
[   53.114898]  cb2d1c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.121459]  cb2d1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.128051] ==================================================================
[   53.135650] ==================================================================
[   53.142944] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x580/0x5d4
[   53.149597] Read of size 1 at addr cb2d1c00 by task kunit_try_catch/220
[   53.156249] 
[   53.157745] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   53.157775] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   53.157806] Hardware name: Generic DRA74X (Flattened Device Tree)
[   53.157806] Call trace: 
[   53.157806]  unwind_backtrace from show_stack+0x18/0x1c
[   53.157836]  show_stack from dump_stack_lvl+0x70/0x90
[   53.157867]  dump_stack_lvl from print_report+0x158/0x528
[   53.157897]  print_report from kasan_report+0xdc/0x118
[   53.157897]  kasan_report from krealloc_uaf+0x580/0x5d4
[   53.157928]  krealloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   53.157958]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.157989]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   53.157989]  kthread from ret_from_fork+0x14/0x20
[   53.158020] Exception stack(0xf23fbfb0 to 0xf23fbff8)
[   53.158050] bfa0:                                     00000000 00000000 00000000 00000000
[   53.158050] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   53.158081] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   53.158081] 
[   53.262084] Allocated by task 220:
[   53.265502]  kasan_save_track+0x30/0x5c
[   53.269378]  __kasan_kmalloc+0x8c/0x94
[   53.273162]  krealloc_uaf+0xd8/0x5d4
[   53.276763]  kunit_try_run_case+0x22c/0x5a8
[   53.280975]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.286499]  kthread+0x464/0x810
[   53.289764]  ret_from_fork+0x14/0x20
[   53.293365] 
[   53.294860] Freed by task 220:
[   53.297943]  kasan_save_track+0x30/0x5c
[   53.301818]  kasan_save_free_info+0x3c/0x48
[   53.306030]  __kasan_slab_free+0x40/0x50
[   53.309967]  kfree+0xe8/0x384
[   53.312988]  krealloc_uaf+0x180/0x5d4
[   53.316680]  kunit_try_run_case+0x22c/0x5a8
[   53.320892]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.326416]  kthread+0x464/0x810
[   53.329681]  ret_from_fork+0x14/0x20
[   53.333282] 
[   53.334777] The buggy address belongs to the object at cb2d1c00
[   53.334777]  which belongs to the cache kmalloc-256 of size 256
[   53.346679] The buggy address is located 0 bytes inside of
[   53.346679]  freed 256-byte region [cb2d1c00, cb2d1d00)
[   53.357452] 
[   53.358947] The buggy address belongs to the physical page:
[   53.364562] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   53.371826] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   53.379516] flags: 0x40(head|zone=0)
[   53.383117] page_type: f5(slab)
[   53.386291] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   53.394439] raw: 00000000
[   53.397094] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   53.405334] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   53.413543] head: 00000000 00000002
[   53.417053] page dumped because: kasan: bad access detected
[   53.422668] 
[   53.424163] Memory state around the buggy address:
[   53.428985]  cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.435577]  cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.442138] >cb2d1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.448699]            ^
[   53.451263]  cb2d1c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.457824]  cb2d1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.464385] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   50.434387] ==================================================================
[   50.441650] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd58/0xea4
[   50.449279] Write of size 1 at addr cb2d1aea by task kunit_try_catch/214
[   50.456024] 
[   50.457519] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   50.457550] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   50.457550] Hardware name: Generic DRA74X (Flattened Device Tree)
[   50.457580] Call trace: 
[   50.457580]  unwind_backtrace from show_stack+0x18/0x1c
[   50.457611]  show_stack from dump_stack_lvl+0x70/0x90
[   50.457611]  dump_stack_lvl from print_report+0x158/0x528
[   50.457641]  print_report from kasan_report+0xdc/0x118
[   50.457672]  kasan_report from krealloc_less_oob_helper+0xd58/0xea4
[   50.457702]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   50.457702]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.457733]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   50.457763]  kthread from ret_from_fork+0x14/0x20
[   50.457794] Exception stack(0xf23cbfb0 to 0xf23cbff8)
[   50.457794] bfa0:                                     00000000 00000000 00000000 00000000
[   50.457824] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   50.457824] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   50.457855] 
[   50.563934] Allocated by task 214:
[   50.567352]  kasan_save_track+0x30/0x5c
[   50.571228]  __kasan_krealloc+0xf4/0x140
[   50.575195]  krealloc_noprof+0x104/0x2e4
[   50.579132]  krealloc_less_oob_helper+0x1d8/0xea4
[   50.583892]  kunit_try_run_case+0x22c/0x5a8
[   50.588104]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.593627]  kthread+0x464/0x810
[   50.596893]  ret_from_fork+0x14/0x20
[   50.600494] 
[   50.601989] The buggy address belongs to the object at cb2d1a00
[   50.601989]  which belongs to the cache kmalloc-256 of size 256
[   50.613891] The buggy address is located 33 bytes to the right of
[   50.613891]  allocated 201-byte region [cb2d1a00, cb2d1ac9)
[   50.625610] 
[   50.627105] The buggy address belongs to the physical page:
[   50.632720] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   50.639984] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.647705] flags: 0x40(head|zone=0)
[   50.651306] page_type: f5(slab)
[   50.654479] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.662597] raw: 00000000
[   50.665252] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.673492] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   50.681732] head: 00000000 00000002
[   50.685241] page dumped because: kasan: bad access detected
[   50.690826] 
[   50.692321] Memory state around the buggy address:
[   50.697143]  cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.703735]  cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.710296] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   50.716857]                                                   ^
[   50.722839]  cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.729400]  cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.735961] ==================================================================
[   50.743286] ==================================================================
[   50.750549] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd00/0xea4
[   50.758178] Write of size 1 at addr cb2d1aeb by task kunit_try_catch/214
[   50.764923] 
[   50.766448] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   50.766448] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   50.766479] Hardware name: Generic DRA74X (Flattened Device Tree)
[   50.766479] Call trace: 
[   50.766479]  unwind_backtrace from show_stack+0x18/0x1c
[   50.766510]  show_stack from dump_stack_lvl+0x70/0x90
[   50.766540]  dump_stack_lvl from print_report+0x158/0x528
[   50.766571]  print_report from kasan_report+0xdc/0x118
[   50.766571]  kasan_report from krealloc_less_oob_helper+0xd00/0xea4
[   50.766601]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   50.766632]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.766662]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   50.766693]  kthread from ret_from_fork+0x14/0x20
[   50.766693] Exception stack(0xf23cbfb0 to 0xf23cbff8)
[   50.766723] bfa0:                                     00000000 00000000 00000000 00000000
[   50.766723] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   50.766754] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   50.766754] 
[   50.872863] Allocated by task 214:
[   50.876281]  kasan_save_track+0x30/0x5c
[   50.880157]  __kasan_krealloc+0xf4/0x140
[   50.884094]  krealloc_noprof+0x104/0x2e4
[   50.888061]  krealloc_less_oob_helper+0x1d8/0xea4
[   50.892791]  kunit_try_run_case+0x22c/0x5a8
[   50.897003]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.902526]  kthread+0x464/0x810
[   50.905792]  ret_from_fork+0x14/0x20
[   50.909393] 
[   50.910919] The buggy address belongs to the object at cb2d1a00
[   50.910919]  which belongs to the cache kmalloc-256 of size 256
[   50.922790] The buggy address is located 34 bytes to the right of
[   50.922790]  allocated 201-byte region [cb2d1a00, cb2d1ac9)
[   50.934539] 
[   50.936035] The buggy address belongs to the physical page:
[   50.941650] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   50.948913] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.956604] flags: 0x40(head|zone=0)
[   50.960205] page_type: f5(slab)
[   50.963378] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.971527] raw: 00000000
[   50.974182] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.982421] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   50.990631] head: 00000000 00000002
[   50.994140] page dumped because: kasan: bad access detected
[   50.999755] 
[   51.001251] Memory state around the buggy address:
[   51.006072]  cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.012664]  cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.019226] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   51.025787]                                                   ^
[   51.031738]  cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.038330]  cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.044891] ==================================================================
[   52.044830] ==================================================================
[   52.052124] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd18/0xea4
[   52.059722] Write of size 1 at addr ccb3a0da by task kunit_try_catch/218
[   52.066467] 
[   52.067993] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   52.068023] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   52.068023] Hardware name: Generic DRA74X (Flattened Device Tree)
[   52.068023] Call trace: 
[   52.068054]  unwind_backtrace from show_stack+0x18/0x1c
[   52.068054]  show_stack from dump_stack_lvl+0x70/0x90
[   52.068084]  dump_stack_lvl from print_report+0x158/0x528
[   52.068115]  print_report from kasan_report+0xdc/0x118
[   52.068145]  kasan_report from krealloc_less_oob_helper+0xd18/0xea4
[   52.068145]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   52.068176]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.068206]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   52.068237]  kthread from ret_from_fork+0x14/0x20
[   52.068237] Exception stack(0xf23ebfb0 to 0xf23ebff8)
[   52.068267] bfa0:                                     00000000 00000000 00000000 00000000
[   52.068267] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   52.068298] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   52.068298] 
[   52.174407] The buggy address belongs to the physical page:
[   52.180023] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   52.187286] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.194976] flags: 0x40(head|zone=0)
[   52.198577] page_type: f8(unknown)
[   52.202026] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.210174] raw: 00000000
[   52.212799] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.221038] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   52.229278] head: 00000000 00000004
[   52.232788] page dumped because: kasan: bad access detected
[   52.238372] 
[   52.239898] Memory state around the buggy address:
[   52.244720]  ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.251281]  ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.257843] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   52.264434]                                             ^
[   52.269866]  ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.276428]  ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.282989] ==================================================================
[   52.536315] ==================================================================
[   52.543579] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd00/0xea4
[   52.551208] Write of size 1 at addr ccb3a0eb by task kunit_try_catch/218
[   52.557952] 
[   52.559448] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   52.559478] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   52.559509] Hardware name: Generic DRA74X (Flattened Device Tree)
[   52.559509] Call trace: 
[   52.559509]  unwind_backtrace from show_stack+0x18/0x1c
[   52.559539]  show_stack from dump_stack_lvl+0x70/0x90
[   52.559570]  dump_stack_lvl from print_report+0x158/0x528
[   52.559600]  print_report from kasan_report+0xdc/0x118
[   52.559600]  kasan_report from krealloc_less_oob_helper+0xd00/0xea4
[   52.559631]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   52.559661]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.559692]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   52.559722]  kthread from ret_from_fork+0x14/0x20
[   52.559722] Exception stack(0xf23ebfb0 to 0xf23ebff8)
[   52.559753] bfa0:                                     00000000 00000000 00000000 00000000
[   52.559753] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   52.559783] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   52.559783] 
[   52.665893] The buggy address belongs to the physical page:
[   52.671478] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   52.678771] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.686462] flags: 0x40(head|zone=0)
[   52.690063] page_type: f8(unknown)
[   52.693511] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.701660] raw: 00000000
[   52.704284] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.712524] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   52.720764] head: 00000000 00000004
[   52.724273] page dumped because: kasan: bad access detected
[   52.729858] 
[   52.731384] Memory state around the buggy address:
[   52.736206]  ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.742767]  ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.749328] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   52.755920]                                                   ^
[   52.761871]  ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.768432]  ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.774993] ==================================================================
[   51.550170] ==================================================================
[   51.561798] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf4/0xea4
[   51.569427] Write of size 1 at addr ccb3a0c9 by task kunit_try_catch/218
[   51.576171] 
[   51.577697] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   51.577728] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   51.577728] Hardware name: Generic DRA74X (Flattened Device Tree)
[   51.577728] Call trace: 
[   51.577728]  unwind_backtrace from show_stack+0x18/0x1c
[   51.577758]  show_stack from dump_stack_lvl+0x70/0x90
[   51.577789]  dump_stack_lvl from print_report+0x158/0x528
[   51.577819]  print_report from kasan_report+0xdc/0x118
[   51.577850]  kasan_report from krealloc_less_oob_helper+0xcf4/0xea4
[   51.577850]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   51.577880]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   51.577911]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   51.577941]  kthread from ret_from_fork+0x14/0x20
[   51.577941] Exception stack(0xf23ebfb0 to 0xf23ebff8)
[   51.577972] bfa0:                                     00000000 00000000 00000000 00000000
[   51.577972] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   51.578002] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   51.578002] 
[   51.684112] The buggy address belongs to the physical page:
[   51.689727] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   51.696990] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.704711] flags: 0x40(head|zone=0)
[   51.708312] page_type: f8(unknown)
[   51.711730] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.719879] raw: 00000000
[   51.722534] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.730743] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   51.738983] head: 00000000 00000004
[   51.742492] page dumped because: kasan: bad access detected
[   51.748107] 
[   51.749603] Memory state around the buggy address:
[   51.754425]  ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.760986]  ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.767578] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   51.774139]                                       ^
[   51.779052]  ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.785614]  ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.792175] ==================================================================
[   52.290313] ==================================================================
[   52.297576] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd58/0xea4
[   52.305206] Write of size 1 at addr ccb3a0ea by task kunit_try_catch/218
[   52.311950] 
[   52.313476] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   52.313476] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   52.313507] Hardware name: Generic DRA74X (Flattened Device Tree)
[   52.313507] Call trace: 
[   52.313507]  unwind_backtrace from show_stack+0x18/0x1c
[   52.313537]  show_stack from dump_stack_lvl+0x70/0x90
[   52.313568]  dump_stack_lvl from print_report+0x158/0x528
[   52.313598]  print_report from kasan_report+0xdc/0x118
[   52.313598]  kasan_report from krealloc_less_oob_helper+0xd58/0xea4
[   52.313629]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   52.313659]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.313690]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   52.313720]  kthread from ret_from_fork+0x14/0x20
[   52.313720] Exception stack(0xf23ebfb0 to 0xf23ebff8)
[   52.313751] bfa0:                                     00000000 00000000 00000000 00000000
[   52.313751] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   52.313781] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   52.313781] 
[   52.419891] The buggy address belongs to the physical page:
[   52.425476] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   52.432769] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.440460] flags: 0x40(head|zone=0)
[   52.444061] page_type: f8(unknown)
[   52.447509] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.455627] raw: 00000000
[   52.458282] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.466522] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   52.474761] head: 00000000 00000004
[   52.478271] page dumped because: kasan: bad access detected
[   52.483856] 
[   52.485382] Memory state around the buggy address:
[   52.490203]  ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.496765]  ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.503326] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   52.509918]                                                   ^
[   52.515869]  ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.522430]  ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.528991] ==================================================================
[   49.506317] ==================================================================
[   49.517425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf4/0xea4
[   49.525054] Write of size 1 at addr cb2d1ac9 by task kunit_try_catch/214
[   49.531799] 
[   49.533325] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   49.533355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   49.533355] Hardware name: Generic DRA74X (Flattened Device Tree)
[   49.533355] Call trace: 
[   49.533355]  unwind_backtrace from show_stack+0x18/0x1c
[   49.533386]  show_stack from dump_stack_lvl+0x70/0x90
[   49.533416]  dump_stack_lvl from print_report+0x158/0x528
[   49.533447]  print_report from kasan_report+0xdc/0x118
[   49.533477]  kasan_report from krealloc_less_oob_helper+0xcf4/0xea4
[   49.533477]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   49.533508]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.533538]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   49.533569]  kthread from ret_from_fork+0x14/0x20
[   49.533569] Exception stack(0xf23cbfb0 to 0xf23cbff8)
[   49.533599] bfa0:                                     00000000 00000000 00000000 00000000
[   49.533599] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   49.533630] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   49.533630] 
[   49.639739] Allocated by task 214:
[   49.643157]  kasan_save_track+0x30/0x5c
[   49.647033]  __kasan_krealloc+0xf4/0x140
[   49.650970]  krealloc_noprof+0x104/0x2e4
[   49.654937]  krealloc_less_oob_helper+0x1d8/0xea4
[   49.659667]  kunit_try_run_case+0x22c/0x5a8
[   49.663909]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.669433]  kthread+0x464/0x810
[   49.672668]  ret_from_fork+0x14/0x20
[   49.676300] 
[   49.677795] The buggy address belongs to the object at cb2d1a00
[   49.677795]  which belongs to the cache kmalloc-256 of size 256
[   49.689697] The buggy address is located 0 bytes to the right of
[   49.689697]  allocated 201-byte region [cb2d1a00, cb2d1ac9)
[   49.701324] 
[   49.702819] The buggy address belongs to the physical page:
[   49.708435] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   49.715698] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.723419] flags: 0x40(head|zone=0)
[   49.727020] page_type: f5(slab)
[   49.730194] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.738342] raw: 00000000
[   49.740966] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.749206] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   49.757446] head: 00000000 00000002
[   49.760955] page dumped because: kasan: bad access detected
[   49.766571] 
[   49.768066] Memory state around the buggy address:
[   49.772888]  cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.779449]  cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.786041] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   49.792602]                                       ^
[   49.797515]  cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.804077]  cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.810638] ==================================================================
[   50.125976] ==================================================================
[   50.133270] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd18/0xea4
[   50.140899] Write of size 1 at addr cb2d1ada by task kunit_try_catch/214
[   50.147644] 
[   50.149139] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   50.149169] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   50.149169] Hardware name: Generic DRA74X (Flattened Device Tree)
[   50.149169] Call trace: 
[   50.149200]  unwind_backtrace from show_stack+0x18/0x1c
[   50.149200]  show_stack from dump_stack_lvl+0x70/0x90
[   50.149230]  dump_stack_lvl from print_report+0x158/0x528
[   50.149261]  print_report from kasan_report+0xdc/0x118
[   50.149291]  kasan_report from krealloc_less_oob_helper+0xd18/0xea4
[   50.149291]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   50.149322]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.149353]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   50.149383]  kthread from ret_from_fork+0x14/0x20
[   50.149414] Exception stack(0xf23cbfb0 to 0xf23cbff8)
[   50.149414] bfa0:                                     00000000 00000000 00000000 00000000
[   50.149444] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   50.149444] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   50.149475] 
[   50.255554] Allocated by task 214:
[   50.258972]  kasan_save_track+0x30/0x5c
[   50.262847]  __kasan_krealloc+0xf4/0x140
[   50.266815]  krealloc_noprof+0x104/0x2e4
[   50.270751]  krealloc_less_oob_helper+0x1d8/0xea4
[   50.275512]  kunit_try_run_case+0x22c/0x5a8
[   50.279724]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.285247]  kthread+0x464/0x810
[   50.288513]  ret_from_fork+0x14/0x20
[   50.292114] 
[   50.293609] The buggy address belongs to the object at cb2d1a00
[   50.293609]  which belongs to the cache kmalloc-256 of size 256
[   50.305511] The buggy address is located 17 bytes to the right of
[   50.305511]  allocated 201-byte region [cb2d1a00, cb2d1ac9)
[   50.317230] 
[   50.318725] The buggy address belongs to the physical page:
[   50.324340] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   50.331604] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.339324] flags: 0x40(head|zone=0)
[   50.342926] page_type: f5(slab)
[   50.346099] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.354217] raw: 00000000
[   50.356872] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.365112] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   50.373352] head: 00000000 00000002
[   50.376861] page dumped because: kasan: bad access detected
[   50.382446] 
[   50.383972] Memory state around the buggy address:
[   50.388793]  cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.395355]  cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.401916] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   50.408477]                                             ^
[   50.413940]  cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.420501]  cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.427062] ==================================================================
[   51.799621] ==================================================================
[   51.806884] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xdd0/0xea4
[   51.814514] Write of size 1 at addr ccb3a0d0 by task kunit_try_catch/218
[   51.821258] 
[   51.822784] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   51.822814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   51.822814] Hardware name: Generic DRA74X (Flattened Device Tree)
[   51.822814] Call trace: 
[   51.822814]  unwind_backtrace from show_stack+0x18/0x1c
[   51.822845]  show_stack from dump_stack_lvl+0x70/0x90
[   51.822875]  dump_stack_lvl from print_report+0x158/0x528
[   51.822906]  print_report from kasan_report+0xdc/0x118
[   51.822937]  kasan_report from krealloc_less_oob_helper+0xdd0/0xea4
[   51.822937]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   51.822967]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   51.822998]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   51.823028]  kthread from ret_from_fork+0x14/0x20
[   51.823028] Exception stack(0xf23ebfb0 to 0xf23ebff8)
[   51.823059] bfa0:                                     00000000 00000000 00000000 00000000
[   51.823059] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   51.823089] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   51.823089] 
[   51.929199] The buggy address belongs to the physical page:
[   51.934814] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   51.942077] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.949768] flags: 0x40(head|zone=0)
[   51.953369] page_type: f8(unknown)
[   51.956817] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.964965] raw: 00000000
[   51.967590] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.975830] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   51.984069] head: 00000000 00000004
[   51.987579] page dumped because: kasan: bad access detected
[   51.993194] 
[   51.994689] Memory state around the buggy address:
[   51.999511]  ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.006072]  ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.012634] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   52.019226]                                          ^
[   52.024383]  ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.030975]  ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.037536] ==================================================================
[   49.817962] ==================================================================
[   49.825225] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xdd0/0xea4
[   49.832855] Write of size 1 at addr cb2d1ad0 by task kunit_try_catch/214
[   49.839599] 
[   49.841094] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   49.841125] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   49.841125] Hardware name: Generic DRA74X (Flattened Device Tree)
[   49.841156] Call trace: 
[   49.841156]  unwind_backtrace from show_stack+0x18/0x1c
[   49.841186]  show_stack from dump_stack_lvl+0x70/0x90
[   49.841186]  dump_stack_lvl from print_report+0x158/0x528
[   49.841217]  print_report from kasan_report+0xdc/0x118
[   49.841247]  kasan_report from krealloc_less_oob_helper+0xdd0/0xea4
[   49.841278]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   49.841308]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.841308]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   49.841339]  kthread from ret_from_fork+0x14/0x20
[   49.841369] Exception stack(0xf23cbfb0 to 0xf23cbff8)
[   49.841369] bfa0:                                     00000000 00000000 00000000 00000000
[   49.841400] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   49.841400] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   49.841430] 
[   49.947509] Allocated by task 214:
[   49.950927]  kasan_save_track+0x30/0x5c
[   49.954803]  __kasan_krealloc+0xf4/0x140
[   49.958770]  krealloc_noprof+0x104/0x2e4
[   49.962707]  krealloc_less_oob_helper+0x1d8/0xea4
[   49.967468]  kunit_try_run_case+0x22c/0x5a8
[   49.971679]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.977203]  kthread+0x464/0x810
[   49.980468]  ret_from_fork+0x14/0x20
[   49.984069] 
[   49.985565] The buggy address belongs to the object at cb2d1a00
[   49.985565]  which belongs to the cache kmalloc-256 of size 256
[   49.997467] The buggy address is located 7 bytes to the right of
[   49.997467]  allocated 201-byte region [cb2d1a00, cb2d1ac9)
[   50.009094] 
[   50.010589] The buggy address belongs to the physical page:
[   50.016204] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   50.023468] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.031188] flags: 0x40(head|zone=0)
[   50.034790] page_type: f5(slab)
[   50.037963] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.046112] raw: 00000000
[   50.048736] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.056976] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   50.065216] head: 00000000 00000002
[   50.068725] page dumped because: kasan: bad access detected
[   50.074310] 
[   50.075836] Memory state around the buggy address:
[   50.080657]  cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.087219]  cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.093780] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   50.100372]                                          ^
[   50.105529]  cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.112091]  cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.118682] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   49.196197] ==================================================================
[   49.203491] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x72c/0x808
[   49.211120] Write of size 1 at addr cb2d18f0 by task kunit_try_catch/212
[   49.217864] 
[   49.219360] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   49.219390] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   49.219390] Hardware name: Generic DRA74X (Flattened Device Tree)
[   49.219421] Call trace: 
[   49.219421]  unwind_backtrace from show_stack+0x18/0x1c
[   49.219451]  show_stack from dump_stack_lvl+0x70/0x90
[   49.219451]  dump_stack_lvl from print_report+0x158/0x528
[   49.219482]  print_report from kasan_report+0xdc/0x118
[   49.219512]  kasan_report from krealloc_more_oob_helper+0x72c/0x808
[   49.219543]  krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   49.219543]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.219573]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   49.219604]  kthread from ret_from_fork+0x14/0x20
[   49.219635] Exception stack(0xf23c3fb0 to 0xf23c3ff8)
[   49.219635] 3fa0:                                     00000000 00000000 00000000 00000000
[   49.219665] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   49.219665] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   49.219696] 
[   49.325775] Allocated by task 212:
[   49.329193]  kasan_save_track+0x30/0x5c
[   49.333068]  __kasan_krealloc+0xf4/0x140
[   49.337005]  krealloc_noprof+0x104/0x2e4
[   49.340972]  krealloc_more_oob_helper+0x1e0/0x808
[   49.345733]  kunit_try_run_case+0x22c/0x5a8
[   49.349945]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.355468]  kthread+0x464/0x810
[   49.358734]  ret_from_fork+0x14/0x20
[   49.362335] 
[   49.363830] The buggy address belongs to the object at cb2d1800
[   49.363830]  which belongs to the cache kmalloc-256 of size 256
[   49.375732] The buggy address is located 5 bytes to the right of
[   49.375732]  allocated 235-byte region [cb2d1800, cb2d18eb)
[   49.387359] 
[   49.388854] The buggy address belongs to the physical page:
[   49.394470] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   49.401733] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.409454] flags: 0x40(head|zone=0)
[   49.413055] page_type: f5(slab)
[   49.416229] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.424377] raw: 00000000
[   49.427001] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.435241] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   49.443481] head: 00000000 00000002
[   49.446990] page dumped because: kasan: bad access detected
[   49.452575] 
[   49.454101] Memory state around the buggy address:
[   49.458923]  cb2d1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.465484]  cb2d1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.472045] >cb2d1880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   49.478637]                                                      ^
[   49.484832]  cb2d1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.491424]  cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.497985] ==================================================================
[   48.883544] ==================================================================
[   48.894409] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x77c/0x808
[   48.902038] Write of size 1 at addr cb2d18eb by task kunit_try_catch/212
[   48.908782] 
[   48.910278] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   48.910308] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   48.910339] Hardware name: Generic DRA74X (Flattened Device Tree)
[   48.910339] Call trace: 
[   48.910339]  unwind_backtrace from show_stack+0x18/0x1c
[   48.910369]  show_stack from dump_stack_lvl+0x70/0x90
[   48.910400]  dump_stack_lvl from print_report+0x158/0x528
[   48.910430]  print_report from kasan_report+0xdc/0x118
[   48.910430]  kasan_report from krealloc_more_oob_helper+0x77c/0x808
[   48.910461]  krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   48.910491]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   48.910522]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   48.910552]  kthread from ret_from_fork+0x14/0x20
[   48.910552] Exception stack(0xf23c3fb0 to 0xf23c3ff8)
[   48.910583] 3fa0:                                     00000000 00000000 00000000 00000000
[   48.910583] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   48.910614] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   48.910614] 
[   49.016723] Allocated by task 212:
[   49.020141]  kasan_save_track+0x30/0x5c
[   49.024017]  __kasan_krealloc+0xf4/0x140
[   49.027954]  krealloc_noprof+0x104/0x2e4
[   49.031921]  krealloc_more_oob_helper+0x1e0/0x808
[   49.036651]  kunit_try_run_case+0x22c/0x5a8
[   49.040893]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.046417]  kthread+0x464/0x810
[   49.049652]  ret_from_fork+0x14/0x20
[   49.053253] 
[   49.054779] The buggy address belongs to the object at cb2d1800
[   49.054779]  which belongs to the cache kmalloc-256 of size 256
[   49.066680] The buggy address is located 0 bytes to the right of
[   49.066680]  allocated 235-byte region [cb2d1800, cb2d18eb)
[   49.078308] 
[   49.079803] The buggy address belongs to the physical page:
[   49.085418] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   49.092681] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.100402] flags: 0x40(head|zone=0)
[   49.104003] page_type: f5(slab)
[   49.107177] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.115325] raw: 00000000
[   49.117950] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.126190] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   49.134429] head: 00000000 00000002
[   49.137939] page dumped because: kasan: bad access detected
[   49.143554] 
[   49.145050] Memory state around the buggy address:
[   49.149871]  cb2d1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.156433]  cb2d1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.163024] >cb2d1880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   49.169586]                                                   ^
[   49.175537]  cb2d1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.182098]  cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.188690] ==================================================================
[   51.052917] ==================================================================
[   51.064056] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x77c/0x808
[   51.071685] Write of size 1 at addr ccb3a0eb by task kunit_try_catch/216
[   51.078430] 
[   51.079925] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   51.079956] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   51.079956] Hardware name: Generic DRA74X (Flattened Device Tree)
[   51.079986] Call trace: 
[   51.079986]  unwind_backtrace from show_stack+0x18/0x1c
[   51.080017]  show_stack from dump_stack_lvl+0x70/0x90
[   51.080017]  dump_stack_lvl from print_report+0x158/0x528
[   51.080047]  print_report from kasan_report+0xdc/0x118
[   51.080078]  kasan_report from krealloc_more_oob_helper+0x77c/0x808
[   51.080108]  krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   51.080139]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   51.080139]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   51.080169]  kthread from ret_from_fork+0x14/0x20
[   51.080200] Exception stack(0xf23dbfb0 to 0xf23dbff8)
[   51.080200] bfa0:                                     00000000 00000000 00000000 00000000
[   51.080230] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   51.080230] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   51.080261] 
[   51.186340] The buggy address belongs to the physical page:
[   51.191955] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   51.199218] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.206939] flags: 0x40(head|zone=0)
[   51.210540] page_type: f8(unknown)
[   51.213958] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.222106] raw: 00000000
[   51.224761] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.233001] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   51.241241] head: 00000000 00000004
[   51.244750] page dumped because: kasan: bad access detected
[   51.250335] 
[   51.251831] Memory state around the buggy address:
[   51.256652]  ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.263244]  ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.269805] >ccb3a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   51.276367]                                                   ^
[   51.282348]  ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.288909]  ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.295471] ==================================================================
[   51.302978] ==================================================================
[   51.310272] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x72c/0x808
[   51.317871] Write of size 1 at addr ccb3a0f0 by task kunit_try_catch/216
[   51.324645] 
[   51.326141] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   51.326171] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   51.326171] Hardware name: Generic DRA74X (Flattened Device Tree)
[   51.326171] Call trace: 
[   51.326202]  unwind_backtrace from show_stack+0x18/0x1c
[   51.326202]  show_stack from dump_stack_lvl+0x70/0x90
[   51.326232]  dump_stack_lvl from print_report+0x158/0x528
[   51.326263]  print_report from kasan_report+0xdc/0x118
[   51.326293]  kasan_report from krealloc_more_oob_helper+0x72c/0x808
[   51.326293]  krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   51.326324]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   51.326354]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   51.326385]  kthread from ret_from_fork+0x14/0x20
[   51.326416] Exception stack(0xf23dbfb0 to 0xf23dbff8)
[   51.326416] bfa0:                                     00000000 00000000 00000000 00000000
[   51.326446] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   51.326446] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   51.326446] 
[   51.432556] The buggy address belongs to the physical page:
[   51.438171] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   51.445434] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.453155] flags: 0x40(head|zone=0)
[   51.456756] page_type: f8(unknown)
[   51.460174] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.468322] raw: 00000000
[   51.470977] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.479217] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   51.487426] head: 00000000 00000004
[   51.490936] page dumped because: kasan: bad access detected
[   51.496551] 
[   51.498046] Memory state around the buggy address:
[   51.502868]  ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.509460]  ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.516021] >ccb3a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   51.522583]                                                      ^
[   51.528808]  ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.535369]  ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.541961] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   48.663543] ==================================================================
[   48.678680] BUG: KASAN: use-after-free in page_alloc_uaf+0x368/0x39c
[   48.685089] Read of size 1 at addr ccbb0000 by task kunit_try_catch/210
[   48.691741] 
[   48.693237] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   48.693267] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   48.693298] Hardware name: Generic DRA74X (Flattened Device Tree)
[   48.693298] Call trace: 
[   48.693298]  unwind_backtrace from show_stack+0x18/0x1c
[   48.693328]  show_stack from dump_stack_lvl+0x70/0x90
[   48.693359]  dump_stack_lvl from print_report+0x158/0x528
[   48.693389]  print_report from kasan_report+0xdc/0x118
[   48.693389]  kasan_report from page_alloc_uaf+0x368/0x39c
[   48.693420]  page_alloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   48.693450]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   48.693481]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   48.693481]  kthread from ret_from_fork+0x14/0x20
[   48.693511] Exception stack(0xf23bbfb0 to 0xf23bbff8)
[   48.693542] bfa0:                                     00000000 00000000 00000000 00000000
[   48.693542] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   48.693572] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   48.693572] 
[   48.797912] The buggy address belongs to the physical page:
[   48.803527] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cbb0
[   48.810791] flags: 0x0(zone=0)
[   48.813873] page_type: f0(buddy)
[   48.817138] raw: 00000000 c69ddb10 c69ddb10 00000000 00000000 00000004 f0000000 00000000
[   48.825286] raw: 00000000
[   48.827911] page dumped because: kasan: bad access detected
[   48.833526] 
[   48.835021] Memory state around the buggy address:
[   48.839843]  ccbaff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.846435]  ccbaff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.852996] >ccbb0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.859558]            ^
[   48.862121]  ccbb0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.868682]  ccbb0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.875244] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-invalid-free-in-kmalloc_large_invalid_free
[   48.403320] ==================================================================
[   48.414367] BUG: KASAN: invalid-free in kmalloc_large_invalid_free+0x14c/0x2dc
[   48.421630] Free of addr ccb38001 by task kunit_try_catch/206
[   48.427429] 
[   48.428924] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   48.428955] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   48.428985] Hardware name: Generic DRA74X (Flattened Device Tree)
[   48.428985] Call trace: 
[   48.428985]  unwind_backtrace from show_stack+0x18/0x1c
[   48.429016]  show_stack from dump_stack_lvl+0x70/0x90
[   48.429046]  dump_stack_lvl from print_report+0x158/0x528
[   48.429077]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   48.429077]  kasan_report_invalid_free from free_large_kmalloc+0x54/0x194
[   48.429107]  free_large_kmalloc from kmalloc_large_invalid_free+0x14c/0x2dc
[   48.429138]  kmalloc_large_invalid_free from kunit_try_run_case+0x22c/0x5a8
[   48.429168]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   48.429199]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   48.429199]  kthread from ret_from_fork+0x14/0x20
[   48.429229] Exception stack(0xf239bfb0 to 0xf239bff8)
[   48.429260] bfa0:                                     00000000 00000000 00000000 00000000
[   48.429260] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   48.429290] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   48.429290] 
[   48.544128] The buggy address belongs to the physical page:
[   48.549743] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   48.557006] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.564697] flags: 0x40(head|zone=0)
[   48.568328] page_type: f8(unknown)
[   48.571746] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   48.579895] raw: 00000000
[   48.582519] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   48.590759] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   48.598999] head: 00000000 00000004
[   48.602508] page dumped because: kasan: bad access detected
[   48.608123] 
[   48.609619] Memory state around the buggy address:
[   48.614440]  ccb37f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.621002]  ccb37f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.627593] >ccb38000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.634155]            ^
[   48.636718]  ccb38080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.643280]  ccb38100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.649841] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   48.189483] ==================================================================
[   48.201049] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x358/0x388
[   48.207702] Read of size 1 at addr ccb38000 by task kunit_try_catch/204
[   48.214355] 
[   48.215881] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   48.215911] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   48.215911] Hardware name: Generic DRA74X (Flattened Device Tree)
[   48.215911] Call trace: 
[   48.215942]  unwind_backtrace from show_stack+0x18/0x1c
[   48.215942]  show_stack from dump_stack_lvl+0x70/0x90
[   48.215972]  dump_stack_lvl from print_report+0x158/0x528
[   48.216003]  print_report from kasan_report+0xdc/0x118
[   48.216033]  kasan_report from kmalloc_large_uaf+0x358/0x388
[   48.216033]  kmalloc_large_uaf from kunit_try_run_case+0x22c/0x5a8
[   48.216064]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   48.216094]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   48.216125]  kthread from ret_from_fork+0x14/0x20
[   48.216125] Exception stack(0xf238bfb0 to 0xf238bff8)
[   48.216156] bfa0:                                     00000000 00000000 00000000 00000000
[   48.216186] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   48.216186] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   48.216186] 
[   48.321075] The buggy address belongs to the physical page:
[   48.326690] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   48.333953] flags: 0x0(zone=0)
[   48.337036] raw: 00000000 eebc8474 e8a4cbcc 00000000 00000000 00000000 ffffffff 00000000
[   48.345184] raw: 00000000
[   48.347808] page dumped because: kasan: bad access detected
[   48.353424] 
[   48.354919] Memory state around the buggy address:
[   48.359741]  ccb37f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.366333]  ccb37f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.372894] >ccb38000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.379455]            ^
[   48.382019]  ccb38080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.388580]  ccb38100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.395141] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   47.941772] ==================================================================
[   47.953155] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e8/0x330
[   47.960693] Write of size 1 at addr ccb3a00a by task kunit_try_catch/202
[   47.967437] 
[   47.968933] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   47.968963] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   47.968994] Hardware name: Generic DRA74X (Flattened Device Tree)
[   47.968994] Call trace: 
[   47.968994]  unwind_backtrace from show_stack+0x18/0x1c
[   47.969024]  show_stack from dump_stack_lvl+0x70/0x90
[   47.969055]  dump_stack_lvl from print_report+0x158/0x528
[   47.969085]  print_report from kasan_report+0xdc/0x118
[   47.969085]  kasan_report from kmalloc_large_oob_right+0x2e8/0x330
[   47.969116]  kmalloc_large_oob_right from kunit_try_run_case+0x22c/0x5a8
[   47.969146]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.969177]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   47.969207]  kthread from ret_from_fork+0x14/0x20
[   47.969207] Exception stack(0xf237bfb0 to 0xf237bff8)
[   47.969238] bfa0:                                     00000000 00000000 00000000 00000000
[   47.969238] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   47.969268] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   47.969268] 
[   48.075195] The buggy address belongs to the physical page:
[   48.080810] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   48.088073] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.095794] flags: 0x40(head|zone=0)
[   48.099395] page_type: f8(unknown)
[   48.102813] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   48.110961] raw: 00000000
[   48.113616] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   48.121826] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   48.130065] head: 00000000 00000004
[   48.133575] page dumped because: kasan: bad access detected
[   48.139190] 
[   48.140686] Memory state around the buggy address:
[   48.145507]  ccb39f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.152099]  ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.158660] >ccb3a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   48.165222]               ^
[   48.168029]  ccb3a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   48.174621]  ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   48.181182] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   47.635650] ==================================================================
[   47.647827] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x324/0x37c
[   47.655181] Write of size 1 at addr cbaedf00 by task kunit_try_catch/200
[   47.661926] 
[   47.663452] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   47.663482] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   47.663482] Hardware name: Generic DRA74X (Flattened Device Tree)
[   47.663482] Call trace: 
[   47.663482]  unwind_backtrace from show_stack+0x18/0x1c
[   47.663513]  show_stack from dump_stack_lvl+0x70/0x90
[   47.663543]  dump_stack_lvl from print_report+0x158/0x528
[   47.663574]  print_report from kasan_report+0xdc/0x118
[   47.663604]  kasan_report from kmalloc_big_oob_right+0x324/0x37c
[   47.663604]  kmalloc_big_oob_right from kunit_try_run_case+0x22c/0x5a8
[   47.663635]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.663665]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   47.663696]  kthread from ret_from_fork+0x14/0x20
[   47.663696] Exception stack(0xf236bfb0 to 0xf236bff8)
[   47.663726] bfa0:                                     00000000 00000000 00000000 00000000
[   47.663726] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   47.663757] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   47.663757] 
[   47.769348] Allocated by task 200:
[   47.772766]  kasan_save_track+0x30/0x5c
[   47.776641]  __kasan_kmalloc+0x8c/0x94
[   47.780426]  kmalloc_big_oob_right+0xd0/0x37c
[   47.784820]  kunit_try_run_case+0x22c/0x5a8
[   47.789031]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.794555]  kthread+0x464/0x810
[   47.797790]  ret_from_fork+0x14/0x20
[   47.801422] 
[   47.802917] The buggy address belongs to the object at cbaec000
[   47.802917]  which belongs to the cache kmalloc-8k of size 8192
[   47.814819] The buggy address is located 0 bytes to the right of
[   47.814819]  allocated 7936-byte region [cbaec000, cbaedf00)
[   47.826538] 
[   47.828033] The buggy address belongs to the physical page:
[   47.833648] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8bae8
[   47.840911] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.848632] flags: 0x40(head|zone=0)
[   47.852233] page_type: f5(slab)
[   47.855407] raw: 00000040 c7001a00 00000122 00000000 00000000 80020002 f5000000 00000000
[   47.863525] raw: 00000000
[   47.866180] head: 00000040 c7001a00 00000122 00000000 00000000 80020002 f5000000 00000000
[   47.874420] head: 00000000 00000003 eeba38a1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   47.882659] head: 00000000 00000008
[   47.886169] page dumped because: kasan: bad access detected
[   47.891754] 
[   47.893280] Memory state around the buggy address:
[   47.898101]  cbaede00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.904663]  cbaede80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.911224] >cbaedf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.917816]            ^
[   47.920349]  cbaedf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.926910]  cbaee000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.933502] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   47.060974] ==================================================================
[   47.072448] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c0/0x548
[   47.080596] Write of size 1 at addr cc228778 by task kunit_try_catch/198
[   47.087341] 
[   47.088867] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   47.088897] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   47.088897] Hardware name: Generic DRA74X (Flattened Device Tree)
[   47.088897] Call trace: 
[   47.088897]  unwind_backtrace from show_stack+0x18/0x1c
[   47.088928]  show_stack from dump_stack_lvl+0x70/0x90
[   47.088958]  dump_stack_lvl from print_report+0x158/0x528
[   47.088989]  print_report from kasan_report+0xdc/0x118
[   47.089019]  kasan_report from kmalloc_track_caller_oob_right+0x4c0/0x548
[   47.089019]  kmalloc_track_caller_oob_right from kunit_try_run_case+0x22c/0x5a8
[   47.089050]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.089080]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   47.089111]  kthread from ret_from_fork+0x14/0x20
[   47.089111] Exception stack(0xf2363fb0 to 0xf2363ff8)
[   47.089141] 3fa0:                                     00000000 00000000 00000000 00000000
[   47.089141] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   47.089172] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   47.089172] 
[   47.196319] Allocated by task 198:
[   47.199737]  kasan_save_track+0x30/0x5c
[   47.203613]  __kasan_kmalloc+0x8c/0x94
[   47.207397]  __kmalloc_node_track_caller_noprof+0x210/0x470
[   47.213012]  kmalloc_track_caller_oob_right+0x98/0x548
[   47.218200]  kunit_try_run_case+0x22c/0x5a8
[   47.222412]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.227935]  kthread+0x464/0x810
[   47.231201]  ret_from_fork+0x14/0x20
[   47.234802] 
[   47.236297] The buggy address belongs to the object at cc228700
[   47.236297]  which belongs to the cache kmalloc-128 of size 128
[   47.248199] The buggy address is located 0 bytes to the right of
[   47.248199]  allocated 120-byte region [cc228700, cc228778)
[   47.259826] 
[   47.261352] The buggy address belongs to the physical page:
[   47.266937] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   47.274230] flags: 0x0(zone=0)
[   47.277313] page_type: f5(slab)
[   47.280456] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   47.288604] raw: 00000000
[   47.291259] page dumped because: kasan: bad access detected
[   47.296844] 
[   47.298370] Memory state around the buggy address:
[   47.303192]  cc228600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.309753]  cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.316314] >cc228700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   47.322906]                                                         ^
[   47.329376]  cc228780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.335937]  cc228800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.342529] ==================================================================
[   47.350158] ==================================================================
[   47.357421] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x548
[   47.365600] Write of size 1 at addr cc228878 by task kunit_try_catch/198
[   47.372344] 
[   47.373840] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   47.373870] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   47.373870] Hardware name: Generic DRA74X (Flattened Device Tree)
[   47.373901] Call trace: 
[   47.373901]  unwind_backtrace from show_stack+0x18/0x1c
[   47.373931]  show_stack from dump_stack_lvl+0x70/0x90
[   47.373931]  dump_stack_lvl from print_report+0x158/0x528
[   47.373962]  print_report from kasan_report+0xdc/0x118
[   47.373992]  kasan_report from kmalloc_track_caller_oob_right+0x4c8/0x548
[   47.374023]  kmalloc_track_caller_oob_right from kunit_try_run_case+0x22c/0x5a8
[   47.374053]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.374053]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   47.374084]  kthread from ret_from_fork+0x14/0x20
[   47.374114] Exception stack(0xf2363fb0 to 0xf2363ff8)
[   47.374114] 3fa0:                                     00000000 00000000 00000000 00000000
[   47.374145] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   47.374145] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   47.374176] 
[   47.481323] Allocated by task 198:
[   47.484741]  kasan_save_track+0x30/0x5c
[   47.488616]  __kasan_kmalloc+0x8c/0x94
[   47.492370]  __kmalloc_node_track_caller_noprof+0x210/0x470
[   47.498016]  kmalloc_track_caller_oob_right+0x1c4/0x548
[   47.503265]  kunit_try_run_case+0x22c/0x5a8
[   47.507476]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.513031]  kthread+0x464/0x810
[   47.516265]  ret_from_fork+0x14/0x20
[   47.519866] 
[   47.521362] The buggy address belongs to the object at cc228800
[   47.521362]  which belongs to the cache kmalloc-128 of size 128
[   47.533264] The buggy address is located 0 bytes to the right of
[   47.533264]  allocated 120-byte region [cc228800, cc228878)
[   47.544921] 
[   47.546417] The buggy address belongs to the physical page:
[   47.552032] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   47.559295] flags: 0x0(zone=0)
[   47.562377] page_type: f5(slab)
[   47.565551] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   47.573669] raw: 00000000
[   47.576324] page dumped because: kasan: bad access detected
[   47.581939] 
[   47.583435] Memory state around the buggy address:
[   47.588256]  cc228700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.594818]  cc228780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.601409] >cc228800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   47.607971]                                                         ^
[   47.614440]  cc228880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.621032]  cc228900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.627593] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   46.756042] ==================================================================
[   46.766998] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x380/0x3c4
[   46.774444] Read of size 1 at addr ccb57000 by task kunit_try_catch/196
[   46.781097] 
[   46.782592] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   46.782623] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   46.782653] Hardware name: Generic DRA74X (Flattened Device Tree)
[   46.782653] Call trace: 
[   46.782653]  unwind_backtrace from show_stack+0x18/0x1c
[   46.782684]  show_stack from dump_stack_lvl+0x70/0x90
[   46.782714]  dump_stack_lvl from print_report+0x158/0x528
[   46.782745]  print_report from kasan_report+0xdc/0x118
[   46.782745]  kasan_report from kmalloc_node_oob_right+0x380/0x3c4
[   46.782775]  kmalloc_node_oob_right from kunit_try_run_case+0x22c/0x5a8
[   46.782806]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.782836]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   46.782867]  kthread from ret_from_fork+0x14/0x20
[   46.782867] Exception stack(0xf22f3fb0 to 0xf22f3ff8)
[   46.782897] 3fa0:                                     00000000 00000000 00000000 00000000
[   46.782897] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   46.782928] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   46.782928] 
[   46.888671] Allocated by task 196:
[   46.892120]  kasan_save_track+0x30/0x5c
[   46.895965]  __kasan_kmalloc+0x8c/0x94
[   46.899749]  kmalloc_node_oob_right+0xd4/0x3c4
[   46.904235]  kunit_try_run_case+0x22c/0x5a8
[   46.908447]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.913970]  kthread+0x464/0x810
[   46.917236]  ret_from_fork+0x14/0x20
[   46.920837] 
[   46.922332] The buggy address belongs to the object at ccb56000
[   46.922332]  which belongs to the cache kmalloc-4k of size 4096
[   46.934234] The buggy address is located 0 bytes to the right of
[   46.934234]  allocated 4096-byte region [ccb56000, ccb57000)
[   46.945953] 
[   46.947479] The buggy address belongs to the physical page:
[   46.953063] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb50
[   46.960357] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.968048] flags: 0x40(head|zone=0)
[   46.971649] page_type: f5(slab)
[   46.974822] raw: 00000040 c7001900 00000122 00000000 00000000 80040004 f5000000 00000000
[   46.982971] raw: 00000000
[   46.985626] head: 00000040 c7001900 00000122 00000000 00000000 80040004 f5000000 00000000
[   46.993865] head: 00000000 00000003 eebc8741 ffffffff 00000000 ffffffff 00000000 ffffffff
[   47.002075] head: 00000000 00000008
[   47.005584] page dumped because: kasan: bad access detected
[   47.011199] 
[   47.012695] Memory state around the buggy address:
[   47.017517]  ccb56f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.024108]  ccb56f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.030670] >ccb57000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.037231]            ^
[   47.039794]  ccb57080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.046356]  ccb57100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.052947] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   46.446166] ==================================================================
[   46.457214] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x378/0x3b8
[   46.464141] Read of size 1 at addr cc22a47f by task kunit_try_catch/194
[   46.470794] 
[   46.472320] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   46.472320] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   46.472351] Hardware name: Generic DRA74X (Flattened Device Tree)
[   46.472351] Call trace: 
[   46.472351]  unwind_backtrace from show_stack+0x18/0x1c
[   46.472381]  show_stack from dump_stack_lvl+0x70/0x90
[   46.472412]  dump_stack_lvl from print_report+0x158/0x528
[   46.472442]  print_report from kasan_report+0xdc/0x118
[   46.472473]  kasan_report from kmalloc_oob_left+0x378/0x3b8
[   46.472473]  kmalloc_oob_left from kunit_try_run_case+0x22c/0x5a8
[   46.472503]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.472534]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   46.472564]  kthread from ret_from_fork+0x14/0x20
[   46.472564] Exception stack(0xf22e3fb0 to 0xf22e3ff8)
[   46.472595] 3fa0:                                     00000000 00000000 00000000 00000000
[   46.472595] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   46.472625] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   46.472625] 
[   46.577331] Allocated by task 1:
[   46.580566]  kasan_save_track+0x30/0x5c
[   46.584442]  __kasan_kmalloc+0x8c/0x94
[   46.588226]  __kmalloc_node_track_caller_noprof+0x210/0x470
[   46.593841]  kvasprintf+0xac/0x128
[   46.597290]  __kthread_create_on_node+0x1d4/0x41c
[   46.602020]  kthread_create_on_node+0x88/0xbc
[   46.606414]  kunit_try_catch_run+0xe0/0x844
[   46.610626]  kunit_run_case_catch_errors+0x17c/0x350
[   46.615631]  kunit_run_tests+0xa58/0xd34
[   46.619598]  __kunit_test_suites_init+0x314/0x4b4
[   46.624328]  kunit_run_all_tests+0x13c/0x4b0
[   46.628631]  kernel_init_freeable+0x498/0x4d8
[   46.633026]  kernel_init+0x20/0x14c
[   46.636535]  ret_from_fork+0x14/0x20
[   46.640167] 
[   46.641662] The buggy address belongs to the object at cc22a400
[   46.641662]  which belongs to the cache kmalloc-64 of size 64
[   46.653381] The buggy address is located 104 bytes to the right of
[   46.653381]  allocated 23-byte region [cc22a400, cc22a417)
[   46.665100] 
[   46.666595] The buggy address belongs to the physical page:
[   46.672210] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22a
[   46.679473] flags: 0x0(zone=0)
[   46.682556] page_type: f5(slab)
[   46.685729] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   46.693878] raw: 00000000
[   46.696533] page dumped because: kasan: bad access detected
[   46.702117] 
[   46.703613] Memory state around the buggy address:
[   46.708465]  cc22a300: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc
[   46.715026]  cc22a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.721588] >cc22a400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.728149]                                                         ^
[   46.734649]  cc22a480: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.741210]  cc22a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.747802] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   46.174499] ==================================================================
[   46.181762] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6c0/0x744
[   46.188781] Read of size 1 at addr cc228680 by task kunit_try_catch/192
[   46.195434] 
[   46.196960] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   46.196960] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   46.196990] Hardware name: Generic DRA74X (Flattened Device Tree)
[   46.196990] Call trace: 
[   46.196990]  unwind_backtrace from show_stack+0x18/0x1c
[   46.197021]  show_stack from dump_stack_lvl+0x70/0x90
[   46.197052]  dump_stack_lvl from print_report+0x158/0x528
[   46.197082]  print_report from kasan_report+0xdc/0x118
[   46.197082]  kasan_report from kmalloc_oob_right+0x6c0/0x744
[   46.197113]  kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   46.197143]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.197174]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   46.197204]  kthread from ret_from_fork+0x14/0x20
[   46.197204] Exception stack(0xf22d3fb0 to 0xf22d3ff8)
[   46.197235] 3fa0:                                     00000000 00000000 00000000 00000000
[   46.197235] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   46.197265] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   46.197265] 
[   46.302154] Allocated by task 192:
[   46.305572]  kasan_save_track+0x30/0x5c
[   46.309417]  __kasan_kmalloc+0x8c/0x94
[   46.313201]  kmalloc_oob_right+0xcc/0x744
[   46.317260]  kunit_try_run_case+0x22c/0x5a8
[   46.321472]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.326995]  kthread+0x464/0x810
[   46.330261]  ret_from_fork+0x14/0x20
[   46.333862] 
[   46.335357] The buggy address belongs to the object at cc228600
[   46.335357]  which belongs to the cache kmalloc-128 of size 128
[   46.347259] The buggy address is located 13 bytes to the right of
[   46.347259]  allocated 115-byte region [cc228600, cc228673)
[   46.358978] 
[   46.360504] The buggy address belongs to the physical page:
[   46.366088] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   46.373382] flags: 0x0(zone=0)
[   46.376434] page_type: f5(slab)
[   46.379608] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   46.387756] raw: 00000000
[   46.390411] page dumped because: kasan: bad access detected
[   46.395996] 
[   46.397491] Memory state around the buggy address:
[   46.402313]  cc228580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.408905]  cc228600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.415466] >cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.422027]            ^
[   46.424591]  cc228700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.431152]  cc228780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.437713] ==================================================================
[   45.899719] ==================================================================
[   45.907012] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x660/0x744
[   45.914001] Write of size 1 at addr cc228678 by task kunit_try_catch/192
[   45.920776] 
[   45.922271] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   45.922302] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   45.922302] Hardware name: Generic DRA74X (Flattened Device Tree)
[   45.922332] Call trace: 
[   45.922332]  unwind_backtrace from show_stack+0x18/0x1c
[   45.922363]  show_stack from dump_stack_lvl+0x70/0x90
[   45.922363]  dump_stack_lvl from print_report+0x158/0x528
[   45.922393]  print_report from kasan_report+0xdc/0x118
[   45.922424]  kasan_report from kmalloc_oob_right+0x660/0x744
[   45.922454]  kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   45.922454]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.922485]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   45.922515]  kthread from ret_from_fork+0x14/0x20
[   45.922546] Exception stack(0xf22d3fb0 to 0xf22d3ff8)
[   45.922546] 3fa0:                                     00000000 00000000 00000000 00000000
[   45.922576] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   45.922576] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   45.922607] 
[   46.027465] Allocated by task 192:
[   46.030883]  kasan_save_track+0x30/0x5c
[   46.034759]  __kasan_kmalloc+0x8c/0x94
[   46.038543]  kmalloc_oob_right+0xcc/0x744
[   46.042602]  kunit_try_run_case+0x22c/0x5a8
[   46.046813]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.052337]  kthread+0x464/0x810
[   46.055603]  ret_from_fork+0x14/0x20
[   46.059204] 
[   46.060699] The buggy address belongs to the object at cc228600
[   46.060699]  which belongs to the cache kmalloc-128 of size 128
[   46.072601] The buggy address is located 5 bytes to the right of
[   46.072601]  allocated 115-byte region [cc228600, cc228673)
[   46.084228] 
[   46.085723] The buggy address belongs to the physical page:
[   46.091339] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   46.098602] flags: 0x0(zone=0)
[   46.101684] page_type: f5(slab)
[   46.104858] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   46.113006] raw: 00000000
[   46.115661] page dumped because: kasan: bad access detected
[   46.121246] 
[   46.122741] Memory state around the buggy address:
[   46.127593]  cc228500: 00 00 00 00 00 00 00 00 00 00 00 00 00 04 fc fc
[   46.134155]  cc228580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.140716] >cc228600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.147277]                                                         ^
[   46.153778]  cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.160339]  cc228700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.166900] ==================================================================
[   45.621215] ==================================================================
[   45.628509] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6a4/0x744
[   45.635528] Write of size 1 at addr cc228673 by task kunit_try_catch/192
[   45.642272] 
[   45.643768] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G        W        N  6.15.0-rc3 #1 NONE 
[   45.643798] Tainted: [W]=WARN, [N]=TEST
[   45.643829] Hardware name: Generic DRA74X (Flattened Device Tree)
[   45.643829] Call trace: 
[   45.643829]  unwind_backtrace from show_stack+0x18/0x1c
[   45.643859]  show_stack from dump_stack_lvl+0x70/0x90
[   45.643890]  dump_stack_lvl from print_report+0x158/0x528
[   45.643920]  print_report from kasan_report+0xdc/0x118
[   45.643951]  kasan_report from kmalloc_oob_right+0x6a4/0x744
[   45.643951]  kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   45.643981]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.644012]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   45.644042]  kthread from ret_from_fork+0x14/0x20
[   45.644073] Exception stack(0xf22d3fb0 to 0xf22d3ff8)
[   45.644073] 3fa0:                                     00000000 00000000 00000000 00000000
[   45.644104] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   45.644104] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   45.644134] 
[   45.747772] Allocated by task 192:
[   45.751220]  kasan_save_track+0x30/0x5c
[   45.755065]  __kasan_kmalloc+0x8c/0x94
[   45.758850]  kmalloc_oob_right+0xcc/0x744
[   45.762908]  kunit_try_run_case+0x22c/0x5a8
[   45.767120]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.772644]  kthread+0x464/0x810
[   45.775909]  ret_from_fork+0x14/0x20
[   45.779510] 
[   45.781005] The buggy address belongs to the object at cc228600
[   45.781005]  which belongs to the cache kmalloc-128 of size 128
[   45.792907] The buggy address is located 0 bytes to the right of
[   45.792907]  allocated 115-byte region [cc228600, cc228673)
[   45.804534] 
[   45.806060] The buggy address belongs to the physical page:
[   45.811645] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   45.818939] flags: 0x0(zone=0)
[   45.822021] page_type: f5(slab)
[   45.825195] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   45.833312] raw: 00000000
[   45.835968] page dumped because: kasan: bad access detected
[   45.841583] 
[   45.843078] Memory state around the buggy address:
[   45.847900]  cc228500: 00 00 00 00 00 00 00 00 00 00 00 00 00 04 fc fc
[   45.854461]  cc228580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.861053] >cc228600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   45.867614]                                                      ^
[   45.873840]  cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.880401]  cc228700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.886962] ==================================================================
Failure - log-parser-test/exception-warning-cpu-pid-at-driversbusomap_l3_noc-l3_interrupt_handler
------------[ cut here ]------------
[  200.396392] WARNING: CPU: 0 PID: 77 at drivers/bus/omap_l3_noc.c:133 l3_interrupt_handler+0x6e0/0xb2c
[  200.400299]     # rtc_time64_to_tm_test_date_range_160000.speed: slow
[  200.405700] 44000000.l3-noc:L3 Custom Error: MASTER MPU TARGET L4_PER1_P3 (Read): Data Access in User mode during Functional access
[  200.405731]     ok 2 rtc_time64_to_tm_test_date_range_160000
[  200.412200] Modules linked in:
[  200.412231] CPU: 0 UID: 0 PID: 77 Comm: irq/115-4807000 Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  200.412261] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  200.412261] Hardware name: Generic DRA74X (Flattened Device Tree)
[  200.412292] Call trace: 
[  200.412292]  unwind_backtrace from show_stack+0x18/0x1c
[  200.412322]  show_stack from dump_stack_lvl+0x70/0x90
[  200.412353]  dump_stack_lvl from __warn+0x154/0x2e0
[  200.412384]  __warn from warn_slowpath_fmt+0x200/0x258
[  200.412414]  warn_slowpath_fmt from l3_interrupt_handler+0x6e0/0xb2c
[  200.412445]  l3_interrupt_handler from __handle_irq_event_percpu+0x25c/0x5ec
[  200.412475]  __handle_irq_event_percpu from handle_irq_event+0x10c/0x268
[  200.412506]  handle_irq_event from handle_fasteoi_irq+0x27c/0x934
[  200.412536]  handle_fasteoi_irq from handle_irq_desc+0x128/0x17c
[  200.412567]  handle_irq_desc from gic_handle_irq+0xc8/0x138
[  200.412597]  gic_handle_irq from generic_handle_arch_irq+0x30/0x40
[  200.412628]  generic_handle_arch_irq from call_with_stack+0x18/0x20
[  200.412658]  call_with_stack from __irq_svc+0x90/0xac
[  200.412689] Exception stack(0xf067bd40 to 0xf067bd88)
[  200.412689] bd40: c50b2382 00000028 00000000 00000000 ca84a840 19509509 1950950f 19509508
[  200.412719] bd60: 00000000 00000007 00000007 c50b2380 00000000 f067bd90 c3331280 c33304b8
[  200.412750] bd80: 60000113 ffffffff
[  200.412750]  __irq_svc from omap_i2c_xfer_data+0xbd4/0x136c
[  200.412780]  omap_i2c_xfer_data from omap_i2c_isr_thread+0x18/0x88
[  200.412811]  omap_i2c_isr_thread from irq_thread_fn+0xb8/0x19c
[  200.412841]  irq_thread_fn from irq_thread+0x410/0x75c
[  200.412872]  irq_thread from kthread+0x464/0x810
[  200.412902]  kthread from ret_from_fork+0x14/0x20
[  200.412902] Exception stack(0xf067bfb0 to 0xf067bff8)
[  200.412933] bfa0:                                     00000000 00000000 00000000 00000000
[  200.412963] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  200.412963] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  200.412994] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale
------------[ cut here ]------------
[  163.238922] WARNING: CPU: 0 PID: 2952 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x180/0x1d0
[  163.249114] Modules linked in:
[  163.252288] CPU: 0 UID: 0 PID: 2952 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  163.252319] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  163.252319] Hardware name: Generic DRA74X (Flattened Device Tree)
[  163.252319] Call trace: 
[  163.252319]  unwind_backtrace from show_stack+0x18/0x1c
[  163.252349]  show_stack from dump_stack_lvl+0x70/0x90
[  163.252380]  dump_stack_lvl from __warn+0x154/0x2e0
[  163.252410]  __warn from warn_slowpath_fmt+0x24c/0x258
[  163.252441]  warn_slowpath_fmt from drm_rect_calc_vscale+0x180/0x1d0
[  163.252441]  drm_rect_calc_vscale from drm_test_rect_calc_vscale+0x134/0x2c4
[  163.252471]  drm_test_rect_calc_vscale from kunit_try_run_case+0x22c/0x5a8
[  163.252502]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  163.252532]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  163.252532]  kthread from ret_from_fork+0x14/0x20
[  163.252563] Exception stack(0xf2393fb0 to 0xf2393ff8)
[  163.252593] 3fa0:                                     00000000 00000000 00000000 00000000
[  163.252593] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  163.252593] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  163.252624] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  163.380126] WARNING: CPU: 0 PID: 2954 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x180/0x1d0
[  163.389709] Modules linked in:
[  163.392791] CPU: 0 UID: 0 PID: 2954 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  163.392822] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  163.392822] Hardware name: Generic DRA74X (Flattened Device Tree)
[  163.392822] Call trace: 
[  163.392852]  unwind_backtrace from show_stack+0x18/0x1c
[  163.392883]  show_stack from dump_stack_lvl+0x70/0x90
[  163.392883]  dump_stack_lvl from __warn+0x154/0x2e0
[  163.392913]  __warn from warn_slowpath_fmt+0x24c/0x258
[  163.392944]  warn_slowpath_fmt from drm_rect_calc_vscale+0x180/0x1d0
[  163.392944]  drm_rect_calc_vscale from drm_test_rect_calc_vscale+0x134/0x2c4
[  163.392974]  drm_test_rect_calc_vscale from kunit_try_run_case+0x22c/0x5a8
[  163.393005]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  163.393035]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  163.393066]  kthread from ret_from_fork+0x14/0x20
[  163.393066] Exception stack(0xf239bfb0 to 0xf239bff8)
[  163.393096] bfa0:                                     00000000 00000000 00000000 00000000
[  163.393096] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  163.393096] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  163.393127] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale
------------[ cut here ]------------
[  163.060089] WARNING: CPU: 0 PID: 2942 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x178/0x1d0
[  163.069671] Modules linked in:
[  163.072784] CPU: 0 UID: 0 PID: 2942 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  163.072814] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  163.072814] Hardware name: Generic DRA74X (Flattened Device Tree)
[  163.072845] Call trace: 
[  163.072845]  unwind_backtrace from show_stack+0x18/0x1c
[  163.072875]  show_stack from dump_stack_lvl+0x70/0x90
[  163.072906]  dump_stack_lvl from __warn+0x154/0x2e0
[  163.072937]  __warn from warn_slowpath_fmt+0x24c/0x258
[  163.072967]  warn_slowpath_fmt from drm_rect_calc_hscale+0x178/0x1d0
[  163.072998]  drm_rect_calc_hscale from drm_test_rect_calc_hscale+0x134/0x2c4
[  163.073028]  drm_test_rect_calc_hscale from kunit_try_run_case+0x22c/0x5a8
[  163.073059]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  163.073089]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  163.073120]  kthread from ret_from_fork+0x14/0x20
[  163.073120] Exception stack(0xf7ae3fb0 to 0xf7ae3ff8)
[  163.073150] 3fa0:                                     00000000 00000000 00000000 00000000
[  163.073181] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  163.073181] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  163.073211] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  162.920440] WARNING: CPU: 0 PID: 2940 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x178/0x1d0
[  162.930053] Modules linked in:
[  162.933166] CPU: 0 UID: 0 PID: 2940 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  162.933197] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  162.933197] Hardware name: Generic DRA74X (Flattened Device Tree)
[  162.933227] Call trace: 
[  162.933227]  unwind_backtrace from show_stack+0x18/0x1c
[  162.933258]  show_stack from dump_stack_lvl+0x70/0x90
[  162.933288]  dump_stack_lvl from __warn+0x154/0x2e0
[  162.933319]  __warn from warn_slowpath_fmt+0x24c/0x258
[  162.933349]  warn_slowpath_fmt from drm_rect_calc_hscale+0x178/0x1d0
[  162.933380]  drm_rect_calc_hscale from drm_test_rect_calc_hscale+0x134/0x2c4
[  162.933410]  drm_test_rect_calc_hscale from kunit_try_run_case+0x22c/0x5a8
[  162.933441]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  162.933471]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  162.933502]  kthread from ret_from_fork+0x14/0x20
[  162.933532] Exception stack(0xf22dbfb0 to 0xf22dbff8)
[  162.933563] bfa0:                                     00000000 00000000 00000000 00000000
[  162.933563] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  162.933593] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  162.933593] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init
------------[ cut here ]------------
[  161.368530] WARNING: CPU: 0 PID: 2738 at drivers/gpu/drm/drm_framebuffer.c:867 drm_framebuffer_init+0x2f4/0x384
[  161.378753] Modules linked in:
[  161.381896] CPU: 0 UID: 0 PID: 2738 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  161.381927] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  161.381927] Hardware name: Generic DRA74X (Flattened Device Tree)
[  161.381927] Call trace: 
[  161.381958]  unwind_backtrace from show_stack+0x18/0x1c
[  161.381988]  show_stack from dump_stack_lvl+0x70/0x90
[  161.382019]  dump_stack_lvl from __warn+0x154/0x2e0
[  161.382049]  __warn from warn_slowpath_fmt+0x24c/0x258
[  161.382080]  warn_slowpath_fmt from drm_framebuffer_init+0x2f4/0x384
[  161.382110]  drm_framebuffer_init from drm_test_framebuffer_init_bad_format+0x110/0x24c
[  161.382141]  drm_test_framebuffer_init_bad_format from kunit_try_run_case+0x22c/0x5a8
[  161.382171]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  161.382202]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  161.382232]  kthread from ret_from_fork+0x14/0x20
[  161.382232] Exception stack(0xf7873fb0 to 0xf7873ff8)
[  161.382263] 3fa0:                                     00000000 00000000 00000000 00000000
[  161.382293] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  161.382293] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  161.382293] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_free
------------[ cut here ]------------
[  161.198608] WARNING: CPU: 0 PID: 2734 at drivers/gpu/drm/drm_framebuffer.c:832 drm_framebuffer_free+0x1e0/0x28c
[  161.209228] drm-kunit-mock-device drm_test_framebuffer_free.drm-kunit-mock-device: [drm] drm_WARN_ON(!list_empty(&fb->filp_head))
[  161.209228] Modules linked in:
[  161.224121] CPU: 0 UID: 0 PID: 2734 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  161.224151] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  161.224151] Hardware name: Generic DRA74X (Flattened Device Tree)
[  161.224151] Call trace: 
[  161.224182]  unwind_backtrace from show_stack+0x18/0x1c
[  161.224212]  show_stack from dump_stack_lvl+0x70/0x90
[  161.224243]  dump_stack_lvl from __warn+0x154/0x2e0
[  161.224273]  __warn from warn_slowpath_fmt+0x200/0x258
[  161.224304]  warn_slowpath_fmt from drm_framebuffer_free+0x1e0/0x28c
[  161.224334]  drm_framebuffer_free from drm_test_framebuffer_free+0x1fc/0x5b8
[  161.224365]  drm_test_framebuffer_free from kunit_try_run_case+0x22c/0x5a8
[  161.224395]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  161.224426]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  161.224456]  kthread from ret_from_fork+0x14/0x20
[  161.224456] Exception stack(0xf785bfb0 to 0xf785bff8)
[  161.224487] bfa0:                                     00000000 00000000 00000000 00000000
[  161.224517] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  161.224517] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  161.224548] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register
------------[ cut here ]------------
[  157.754364] WARNING: CPU: 1 PID: 2172 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0x11c/0x14c
[  157.765258] Modules linked in:
[  157.768371] CPU: 1 UID: 0 PID: 2172 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  157.768402] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  157.768402] Hardware name: Generic DRA74X (Flattened Device Tree)
[  157.768402] Call trace: 
[  157.768432]  unwind_backtrace from show_stack+0x18/0x1c
[  157.768463]  show_stack from dump_stack_lvl+0x70/0x90
[  157.768463]  dump_stack_lvl from __warn+0x154/0x2e0
[  157.768493]  __warn from warn_slowpath_fmt+0x24c/0x258
[  157.768524]  warn_slowpath_fmt from drm_connector_dynamic_register+0x11c/0x14c
[  157.768554]  drm_connector_dynamic_register from drm_test_drm_connector_dynamic_register_no_init+0x12c/0x2c4
[  157.768585]  drm_test_drm_connector_dynamic_register_no_init from kunit_try_run_case+0x22c/0x5a8
[  157.768615]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  157.768615]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  157.768646]  kthread from ret_from_fork+0x14/0x20
[  157.768676] Exception stack(0xf6b93fb0 to 0xf6b93ff8)
[  157.768676] 3fa0:                                     00000000 00000000 00000000 00000000
[  157.768707] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  157.768707] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  157.768707] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  157.475769] WARNING: CPU: 1 PID: 2164 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0x11c/0x14c
[  157.486663] Modules linked in:
[  157.489776] CPU: 1 UID: 0 PID: 2164 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  157.489807] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  157.489837] Hardware name: Generic DRA74X (Flattened Device Tree)
[  157.489837] Call trace: 
[  157.489837]  unwind_backtrace from show_stack+0x18/0x1c
[  157.489868]  show_stack from dump_stack_lvl+0x70/0x90
[  157.489898]  dump_stack_lvl from __warn+0x154/0x2e0
[  157.489929]  __warn from warn_slowpath_fmt+0x24c/0x258
[  157.489959]  warn_slowpath_fmt from drm_connector_dynamic_register+0x11c/0x14c
[  157.489959]  drm_connector_dynamic_register from drm_test_drm_connector_dynamic_register_early_no_init+0x12c/0x2c4
[  157.490020]  drm_test_drm_connector_dynamic_register_early_no_init from kunit_try_run_case+0x22c/0x5a8
[  157.490020]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  157.490051]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  157.490081]  kthread from ret_from_fork+0x14/0x20
[  157.490112] Exception stack(0xf6b63fb0 to 0xf6b63ff8)
[  157.490112] 3fa0:                                     00000000 00000000 00000000 00000000
[  157.490142] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  157.490142] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  157.490142] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_init_only
------------[ cut here ]------------
[  154.696990] WARNING: CPU: 1 PID: 1774 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308
[  154.707611] Modules linked in:
[  154.710937] CPU: 1 UID: 0 PID: 1774 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  154.710968] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  154.710998] Hardware name: Generic DRA74X (Flattened Device Tree)
[  154.710998] Call trace: 
[  154.710998]  unwind_backtrace from show_stack+0x18/0x1c
[  154.711029]  show_stack from dump_stack_lvl+0x70/0x90
[  154.711059]  dump_stack_lvl from __warn+0x154/0x2e0
[  154.711090]  __warn from warn_slowpath_fmt+0x24c/0x258
[  154.711120]  warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308
[  154.711120]  drm_connector_init_only from drmm_connector_init+0x158/0x218
[  154.711151]  drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704
[  154.711181]  drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8
[  154.711212]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  154.711242]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  154.711242]  kthread from ret_from_fork+0x14/0x20
[  154.711273] Exception stack(0xf648bfb0 to 0xf648bff8)
[  154.711273] bfa0:                                     00000000 00000000 00000000 00000000
[  154.711303] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  154.711303] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  154.711334] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  154.238555] WARNING: CPU: 1 PID: 1768 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308
[  154.248962] Modules linked in:
[  154.252075] CPU: 1 UID: 0 PID: 1768 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  154.252105] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  154.252136] Hardware name: Generic DRA74X (Flattened Device Tree)
[  154.252136] Call trace: 
[  154.252136]  unwind_backtrace from show_stack+0x18/0x1c
[  154.252197]  show_stack from dump_stack_lvl+0x70/0x90
[  154.252227]  dump_stack_lvl from __warn+0x154/0x2e0
[  154.252258]  __warn from warn_slowpath_fmt+0x24c/0x258
[  154.252288]  warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308
[  154.252319]  drm_connector_init_only from drmm_connector_init+0x158/0x218
[  154.252349]  drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704
[  154.252380]  drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8
[  154.252410]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  154.252441]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  154.252471]  kthread from ret_from_fork+0x14/0x20
[  154.252471] Exception stack(0xf646bfb0 to 0xf646bff8)
[  154.252502] bfa0:                                     00000000 00000000 00000000 00000000
[  154.252532] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  154.252532] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  154.252563] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  154.073059] WARNING: CPU: 1 PID: 1766 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308
[  154.083496] Modules linked in:
[  154.086578] CPU: 1 UID: 0 PID: 1766 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  154.086608] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  154.086639] Hardware name: Generic DRA74X (Flattened Device Tree)
[  154.086639] Call trace: 
[  154.086639]  unwind_backtrace from show_stack+0x18/0x1c
[  154.086669]  show_stack from dump_stack_lvl+0x70/0x90
[  154.086700]  dump_stack_lvl from __warn+0x154/0x2e0
[  154.086730]  __warn from warn_slowpath_fmt+0x24c/0x258
[  154.086761]  warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308
[  154.086791]  drm_connector_init_only from drmm_connector_init+0x158/0x218
[  154.086791]  drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704
[  154.086822]  drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8
[  154.086853]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  154.086883]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  154.086914]  kthread from ret_from_fork+0x14/0x20
[  154.086914] Exception stack(0xf645bfb0 to 0xf645bff8)
[  154.086944] bfa0:                                     00000000 00000000 00000000 00000000
[  154.086944] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  154.086975] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  154.086975] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  154.544433] WARNING: CPU: 1 PID: 1772 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308
[  154.555053] Modules linked in:
[  154.558166] CPU: 1 UID: 0 PID: 1772 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  154.558197] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  154.558197] Hardware name: Generic DRA74X (Flattened Device Tree)
[  154.558197] Call trace: 
[  154.558227]  unwind_backtrace from show_stack+0x18/0x1c
[  154.558258]  show_stack from dump_stack_lvl+0x70/0x90
[  154.558258]  dump_stack_lvl from __warn+0x154/0x2e0
[  154.558288]  __warn from warn_slowpath_fmt+0x24c/0x258
[  154.558319]  warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308
[  154.558349]  drm_connector_init_only from drmm_connector_init+0x158/0x218
[  154.558349]  drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704
[  154.558380]  drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8
[  154.558410]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  154.558441]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  154.558471]  kthread from ret_from_fork+0x14/0x20
[  154.558471] Exception stack(0xf6483fb0 to 0xf6483ff8)
[  154.558502] 3fa0:                                     00000000 00000000 00000000 00000000
[  154.558502] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  154.558532] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  154.558532] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  154.391174] WARNING: CPU: 1 PID: 1770 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308
[  154.401855] Modules linked in:
[  154.404937] CPU: 1 UID: 0 PID: 1770 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  154.404968] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  154.404968] Hardware name: Generic DRA74X (Flattened Device Tree)
[  154.404998] Call trace: 
[  154.404998]  unwind_backtrace from show_stack+0x18/0x1c
[  154.405029]  show_stack from dump_stack_lvl+0x70/0x90
[  154.405059]  dump_stack_lvl from __warn+0x154/0x2e0
[  154.405090]  __warn from warn_slowpath_fmt+0x24c/0x258
[  154.405090]  warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308
[  154.405120]  drm_connector_init_only from drmm_connector_init+0x158/0x218
[  154.405151]  drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704
[  154.405181]  drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8
[  154.405212]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  154.405212]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  154.405242]  kthread from ret_from_fork+0x14/0x20
[  154.405273] Exception stack(0xf6473fb0 to 0xf6473ff8)
[  154.405273] 3fa0:                                     00000000 00000000 00000000 00000000
[  154.405303] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  154.405303] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  154.405334] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[  103.225891] WARNING: CPU: 1 PID: 656 at lib/math/int_log.c:120 intlog10+0x10c/0x140
[  103.234008] Modules linked in:
[  103.237121] CPU: 1 UID: 0 PID: 656 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  103.237152] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  103.237152] Hardware name: Generic DRA74X (Flattened Device Tree)
[  103.237182] Call trace: 
[  103.237182]  unwind_backtrace from show_stack+0x18/0x1c
[  103.237213]  show_stack from dump_stack_lvl+0x70/0x90
[  103.237243]  dump_stack_lvl from __warn+0x154/0x2e0
[  103.237274]  __warn from warn_slowpath_fmt+0x24c/0x258
[  103.237304]  warn_slowpath_fmt from intlog10+0x10c/0x140
[  103.237335]  intlog10 from intlog10_test+0x124/0x258
[  103.237365]  intlog10_test from kunit_try_run_case+0x22c/0x5a8
[  103.237365]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  103.237396]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  103.237426]  kthread from ret_from_fork+0x14/0x20
[  103.237457] Exception stack(0xf3023fb0 to 0xf3023ff8)
[  103.237487] 3fa0:                                     00000000 00000000 00000000 00000000
[  103.237487] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  103.237518] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  103.237518] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[  103.038269] WARNING: CPU: 1 PID: 638 at lib/math/int_log.c:63 intlog2+0xf8/0x12c
[  103.045776] Modules linked in:
[  103.048858] CPU: 1 UID: 0 PID: 638 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  103.048889] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  103.048919] Hardware name: Generic DRA74X (Flattened Device Tree)
[  103.048919] Call trace: 
[  103.048919]  unwind_backtrace from show_stack+0x18/0x1c
[  103.048950]  show_stack from dump_stack_lvl+0x70/0x90
[  103.048980]  dump_stack_lvl from __warn+0x154/0x2e0
[  103.049011]  __warn from warn_slowpath_fmt+0x24c/0x258
[  103.049011]  warn_slowpath_fmt from intlog2+0xf8/0x12c
[  103.049041]  intlog2 from intlog2_test+0x124/0x258
[  103.049072]  intlog2_test from kunit_try_run_case+0x22c/0x5a8
[  103.049072]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  103.049102]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  103.049133]  kthread from ret_from_fork+0x14/0x20
[  103.049163] Exception stack(0xf2f9bfb0 to 0xf2f9bff8)
[  103.049163] bfa0:                                     00000000 00000000 00000000 00000000
[  103.049194] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  103.049194] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  103.049194] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-unable-to-handle-kernel-paging-request-at-virtual-address-when-read
--- cut here ---
[  101.396911] Unable to handle kernel paging request at virtual address 9f000000 when read
[  101.405670] [9f000000] *pgd=80000080206003, *pmd=00000000
[  101.411163] Internal error: Oops: 206 [#1] SMP ARM
[  101.415985] Modules linked in:
[  101.419067] CPU: 0 UID: 0 PID: 532 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[  101.428802] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[  101.433898] Hardware name: Generic DRA74X (Flattened Device Tree)
[  101.440032] PC is at kunit_test_null_dereference+0x74/0x1a0
[  101.445648] LR is at kunit_generic_run_threadfn_adapter+0xc4/0x128
[  101.451873] pc : [<c1645858>]    lr : [<c163b110>]    psr: 60000013
[  101.458190] sp : f2ce3e48  ip : 41b58ab3  fp : ccf55450
[  101.463439] r10: b89eaa8a  r9 : cceb5400  r8 : c16457e4
[  101.468688] r7 : b86c89f0  r6 : cb644f84  r5 : bd59c7cc  r4 : f0013b40
[  101.475280] r3 : f2ce3ec0  r2 : ccf55240  r1 : 9f000000  r0 : 00000000
[  101.481842] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  101.489044] Control: 30c5387d  Table: 80203000  DAC: fffffffd
[  101.494812] Register r0 information: NULL pointer
[  101.499542] Register r1 information: non-paged memory
[  101.504638] Register r2 information: slab task_struct start ccf55240 pointer offset 0 size 2880
[  101.513427] Register r3 information: 4-page vmalloc region starting at 0xf2ce0000 allocated at kernel_clone+0x174/0x794
[  101.524291] Register r4 information: 4-page vmalloc region starting at 0xf0010000 allocated at kernel_clone+0x174/0x794
[  101.535156] Register r5 information: non-paged memory
[  101.540252] Register r6 information: slab kmalloc-64 start cb644f80 pointer offset 4 size 64
[  101.548797] Register r7 information: non-paged memory
[  101.553863] Register r8 information: non-slab/vmalloc memory
[  101.559570] Register r9 information: slab kmalloc-128 start cceb5400 pointer offset 0 size 128
[  101.568267] Register r10 information: non-paged memory
[  101.573455] Register r11 information: slab task_struct start ccf55240 pointer offset 528 size 2880
[  101.582519] Register r12 information: non-paged memory
[  101.587677] Process kunit_try_catch (pid: 532, stack limit = 0xfc87c6b5)
[  101.594421] Stack: (0xf2ce3e48 to 0xf2ce4000)
[  101.598815] 3e40:                   c05d832c 00000000 00000000 00000000 00000000 00000000
[  101.607055] 3e60: 41b58ab3 c57895a4 c16457e4 c5cc1574 c69e64e0 c431e200 22d73000 ccf55a54
[  101.615295] 3e80: ccf55240 cceb5400 199eaa88 c088f7f8 ccf55a54 60000013 00000003 c69e56e0
[  101.623535] 3ea0: ccf55a54 ccf55240 cceb5400 c431e200 c69e56e4 00000007 00000003 c0592d28
[  101.631744] 3ec0: 00000003 ccf55440 00000003 199d6a80 00000000 f5199995 f2ce3ef4 cb644f80
[  101.639984] 3ee0: 00000004 c163b110 cceb5400 ccf55240 f2ce3f80 c163b04c cb644f80 c0593b68
[  101.648223] 3f00: 22d73000 00000000 22d73000 00000000 f2ce3f8c c088f7f8 e8a37500 c5cc4500
[  101.656463] 3f20: 41b58ab3 c572ed4c c0593704 22d73000 00000000 c05be8d0 00000000 00000000
[  101.664672] 3f40: fefefefe 00000000 00000000 00000000 c05cbb24 c5cc1574 c69e64e0 c0544ac8
[  101.672912] 3f60: 22d73000 00000000 00000000 00000000 00000000 c088f7f8 ccf46780 ccf559f4
[  101.681152] 3f80: ccf55240 f5199995 00000000 cb647080 c0593704 00000000 00000000 00000000
[  101.689392] 3fa0: 00000000 00000000 00000000 c0400254 00000000 00000000 00000000 00000000
[  101.697601] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  101.705841] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[  101.714080] Call trace: 
[  101.714080]  kunit_test_null_dereference from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  101.725036]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  101.731811]  kthread from ret_from_fork+0x14/0x20
[  101.736541] Exception stack(0xf2ce3fb0 to 0xf2ce3ff8)
[  101.741638] 3fa0:                                     00000000 00000000 00000000 00000000
[  101.749877] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  101.758117] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  101.764770] Code: e1a04000 e5920678 e58d008c e3a00000 (e1d110d0) 
[  101.770935] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-kerneltraceftrace-ftrace_bug
------------[ cut here ]------------
[    0.000000] WARNING: CPU: 0 PID: 0 at kernel/trace/ftrace.c:2213 ftrace_bug+0x548/0x5b8
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G        W           6.15.0-rc3 #1 NONE 
[    0.000000] Tainted: [W]=WARN
[    0.000000] Hardware name: Generic DRA74X (Flattened Device Tree)
[    0.000000] Call trace: 
[    0.000000]  unwind_backtrace from show_stack+0x18/0x1c
[    0.000000]  show_stack from dump_stack_lvl+0x70/0x90
[    0.000000]  dump_stack_lvl from __warn+0x154/0x2e0
[    0.000000]  __warn from warn_slowpath_fmt+0x24c/0x258
[    0.000000]  warn_slowpath_fmt from ftrace_bug+0x548/0x5b8
[    0.000000]  ftrace_bug from ftrace_process_locs+0xe88/0xeb0
[    0.000000]  ftrace_process_locs from ftrace_init+0x6c/0x140
[    0.000000]  ftrace_init from start_kernel+0x1a8/0x3b8
[    0.000000]  start_kernel from 0x0
[    0.000000] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-archarmkernelinsn-__arm_gen_branch
------------[ cut here ]------------
[    0.000000] WARNING: CPU: 0 PID: 0 at arch/arm/kernel/insn.c:48 __arm_gen_branch+0x74/0x7c
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.15.0-rc3 #1 NONE 
[    0.000000] Hardware name: Generic DRA74X (Flattened Device Tree)
[    0.000000] Call trace: 
[    0.000000]  unwind_backtrace from show_stack+0x18/0x1c
[    0.000000]  show_stack from dump_stack_lvl+0x70/0x90
[    0.000000]  dump_stack_lvl from __warn+0x154/0x2e0
[    0.000000]  __warn from warn_slowpath_fmt+0x24c/0x258
[    0.000000]  warn_slowpath_fmt from __arm_gen_branch+0x74/0x7c
[    0.000000]  __arm_gen_branch from ftrace_make_nop+0x10c/0x24c
[    0.000000]  ftrace_make_nop from ftrace_process_locs+0x490/0xeb0
[    0.000000]  ftrace_process_locs from ftrace_init+0x6c/0x140
[    0.000000]  ftrace_init from start_kernel+0x1a8/0x3b8
[    0.000000]  start_kernel from 0x0
[    0.000000] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/uboot-action
(no logs available)
Failure - lava/uboot-commands
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)